2 * options.c - handles option processing for PPP.
4 * Copyright (c) 1984-2000 Carnegie Mellon University. All rights reserved.
6 * Redistribution and use in source and binary forms, with or without
7 * modification, are permitted provided that the following conditions
10 * 1. Redistributions of source code must retain the above copyright
11 * notice, this list of conditions and the following disclaimer.
13 * 2. Redistributions in binary form must reproduce the above copyright
14 * notice, this list of conditions and the following disclaimer in
15 * the documentation and/or other materials provided with the
18 * 3. The name "Carnegie Mellon University" must not be used to
19 * endorse or promote products derived from this software without
20 * prior written permission. For permission or any legal
21 * details, please contact
22 * Office of Technology Transfer
23 * Carnegie Mellon University
25 * Pittsburgh, PA 15213-3890
26 * (412) 268-4387, fax: (412) 268-7395
27 * tech-transfer@andrew.cmu.edu
29 * 4. Redistributions of any form whatsoever must retain the following
31 * "This product includes software developed by Computing Services
32 * at Carnegie Mellon University (http://www.cmu.edu/computing/)."
34 * CARNEGIE MELLON UNIVERSITY DISCLAIMS ALL WARRANTIES WITH REGARD TO
35 * THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
36 * AND FITNESS, IN NO EVENT SHALL CARNEGIE MELLON UNIVERSITY BE LIABLE
37 * FOR ANY SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
38 * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN
39 * AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING
40 * OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
60 * There have been 3 or 4 different names for this in libpcap CVS, but
61 * this seems to be what they have settled on...
62 * For older versions of libpcap, use DLT_PPP - but that means
63 * we lose the inbound and outbound qualifiers.
66 #ifdef DLT_PPP_WITHDIRECTION
67 #define DLT_PPP_PPPD DLT_PPP_WITHDIRECTION
69 #define DLT_PPP_PPPD DLT_PPP
72 #endif /* PPP_FILTER */
75 #include "pathnames.h"
77 #if defined(ultrix) || defined(NeXT)
83 struct option_value *next;
89 * Option variables and default values.
91 int debug = 0; /* Debug flag */
92 int kdebugflag = 0; /* Tell kernel to print debug messages */
93 int default_device = 1; /* Using /dev/tty or equivalent */
94 char devnam[MAXPATHLEN]; /* Device name */
95 bool nodetach = 0; /* Don't detach from controlling tty */
96 bool updetach = 0; /* Detach once link is up */
97 bool master_detach; /* Detach when we're (only) multilink master */
99 bool up_sdnotify = 0; /* Notify systemd once link is up */
101 int maxconnect = 0; /* Maximum connect time */
102 char user[MAXNAMELEN]; /* Username for PAP */
103 char passwd[MAXSECRETLEN]; /* Password for PAP */
104 bool persist = 0; /* Reopen link after it goes down */
105 char our_name[MAXNAMELEN]; /* Our name for authentication purposes */
106 bool demand = 0; /* do dial-on-demand */
107 char *ipparam = NULL; /* Extra parameter for ip up/down scripts */
108 int idle_time_limit = 0; /* Disconnect if idle for this many seconds */
109 int holdoff = 30; /* # seconds to pause before reconnecting */
110 bool holdoff_specified; /* true if a holdoff value has been given */
111 int log_to_fd = 1; /* send log messages to this fd too */
112 bool log_default = 1; /* log_to_fd is default (stdout) */
113 int maxfail = 10; /* max # of unsuccessful connection attempts */
114 char linkname[MAXPATHLEN]; /* logical name for link */
115 bool tune_kernel; /* may alter kernel settings */
116 int connect_delay = 1000; /* wait this many ms after connect script */
117 int req_unit = -1; /* requested interface unit */
118 char path_ipup[MAXPATHLEN]; /* pathname of ip-up script */
119 char path_ipdown[MAXPATHLEN];/* pathname of ip-down script */
120 char req_ifname[MAXIFNAMELEN]; /* requested interface name */
121 bool multilink = 0; /* Enable multilink operation */
122 char *bundle_name = NULL; /* bundle name for multilink */
123 bool dump_options; /* print out option values */
124 bool dryrun; /* print out option values and exit */
125 char *domain; /* domain name set by domain option */
126 int child_wait = 5; /* # seconds to wait for children at exit */
127 struct userenv *userenv_list; /* user environment variables */
128 int dfl_route_metric = -1; /* metric of the default route to set over the PPP link */
131 unsigned int maxoctets = 0; /* default - no limit */
132 int maxoctets_dir = 0; /* default - sum of traffic */
133 int maxoctets_timeout = 1; /* default 1 second */
137 extern option_t auth_options[];
138 extern struct stat devstat;
141 struct bpf_program pass_filter;/* Filter program for packets to pass */
142 struct bpf_program active_filter; /* Filter program for link-active pkts */
145 static option_t *curopt; /* pointer to option being processed */
146 char *current_option; /* the name of the option being parsed */
147 int privileged_option; /* set iff the current option came from root */
148 char *option_source; /* string saying where the option came from */
149 int option_priority = OPRIO_CFGFILE; /* priority of the current options */
150 bool devnam_fixed; /* can no longer change device name */
152 static int logfile_fd = -1; /* fd opened for log file */
153 static char logfile_name[MAXPATHLEN]; /* name of log file */
158 static int setdomain(char **);
159 static int readfile(char **);
160 static int callfile(char **);
161 static int showversion(char **);
162 static int showhelp(char **);
163 static void usage(void);
164 static int setlogfile(char **);
166 static int loadplugin(char **);
170 static int setpassfilter(char **);
171 static int setactivefilter(char **);
175 static int setmodir(char **);
178 static int user_setenv(char **);
179 static void user_setprint(option_t *, printer_func, void *);
180 static int user_unsetenv(char **);
181 static void user_unsetprint(option_t *, printer_func, void *);
183 static option_t *find_option(char *name);
184 static int process_option(option_t *, char *, char **);
185 static int n_arguments(option_t *);
186 static int number_option(char *, u_int32_t *, int);
189 * Structure to store extra lists of options.
193 struct option_list *next;
196 static struct option_list *extra_options = NULL;
201 option_t general_options[] = {
202 { "debug", o_int, &debug,
203 "Increase debugging level", OPT_INC | OPT_NOARG | 1 },
204 { "-d", o_int, &debug,
205 "Increase debugging level",
206 OPT_ALIAS | OPT_INC | OPT_NOARG | 1 },
208 { "kdebug", o_int, &kdebugflag,
209 "Set kernel driver debug level", OPT_PRIO },
211 { "nodetach", o_bool, &nodetach,
212 "Don't detach from controlling tty", OPT_PRIO | 1 },
213 { "-detach", o_bool, &nodetach,
214 "Don't detach from controlling tty", OPT_ALIAS | OPT_PRIOSUB | 1 },
216 { "up_sdnotify", o_bool, &up_sdnotify,
217 "Notify systemd once link is up (implies nodetach)",
218 OPT_PRIOSUB | OPT_A2COPY | 1, &nodetach },
220 { "updetach", o_bool, &updetach,
221 "Detach from controlling tty once link is up",
222 OPT_PRIOSUB | OPT_A2CLR | 1, &nodetach },
224 { "master_detach", o_bool, &master_detach,
225 "Detach when we're multilink master but have no link", 1 },
227 { "holdoff", o_int, &holdoff,
228 "Set time in seconds before retrying connection",
229 OPT_PRIO, &holdoff_specified },
231 { "idle", o_int, &idle_time_limit,
232 "Set time in seconds before disconnecting idle link", OPT_PRIO },
234 { "maxconnect", o_int, &maxconnect,
235 "Set connection time limit",
236 OPT_PRIO | OPT_LLIMIT | OPT_NOINCR | OPT_ZEROINF },
238 { "domain", o_special, (void *)setdomain,
239 "Add given domain name to hostname",
240 OPT_PRIO | OPT_PRIV | OPT_A2STRVAL, &domain },
242 { "file", o_special, (void *)readfile,
243 "Take options from a file", OPT_NOPRINT },
244 { "call", o_special, (void *)callfile,
245 "Take options from a privileged file", OPT_NOPRINT },
247 { "persist", o_bool, &persist,
248 "Keep on reopening connection after close", OPT_PRIO | 1 },
249 { "nopersist", o_bool, &persist,
250 "Turn off persist option", OPT_PRIOSUB },
252 { "demand", o_bool, &demand,
253 "Dial on demand", OPT_INITONLY | 1, &persist },
255 { "--version", o_special_noarg, (void *)showversion,
256 "Show version number" },
257 { "--help", o_special_noarg, (void *)showhelp,
258 "Show brief listing of options" },
259 { "-h", o_special_noarg, (void *)showhelp,
260 "Show brief listing of options", OPT_ALIAS },
262 { "logfile", o_special, (void *)setlogfile,
263 "Append log messages to this file",
264 OPT_PRIO | OPT_A2STRVAL | OPT_STATIC, &logfile_name },
265 { "logfd", o_int, &log_to_fd,
266 "Send log messages to this file descriptor",
267 OPT_PRIOSUB | OPT_A2CLR, &log_default },
268 { "nolog", o_int, &log_to_fd,
269 "Don't send log messages to any file",
270 OPT_PRIOSUB | OPT_NOARG | OPT_VAL(-1) },
271 { "nologfd", o_int, &log_to_fd,
272 "Don't send log messages to any file descriptor",
273 OPT_PRIOSUB | OPT_ALIAS | OPT_NOARG | OPT_VAL(-1) },
275 { "linkname", o_string, linkname,
276 "Set logical name for link",
277 OPT_PRIO | OPT_PRIV | OPT_STATIC, NULL, MAXPATHLEN },
279 { "maxfail", o_int, &maxfail,
280 "Maximum number of unsuccessful connection attempts to allow",
283 { "ktune", o_bool, &tune_kernel,
284 "Alter kernel settings as necessary", OPT_PRIO | 1 },
285 { "noktune", o_bool, &tune_kernel,
286 "Don't alter kernel settings", OPT_PRIOSUB },
288 { "connect-delay", o_int, &connect_delay,
289 "Maximum time (in ms) to wait after connect script finishes",
292 { "unit", o_int, &req_unit,
293 "PPP interface unit number to use if possible",
294 OPT_PRIO | OPT_LLIMIT, 0, 0 },
296 { "ifname", o_string, req_ifname,
297 "Set PPP interface name",
298 OPT_PRIO | OPT_PRIV | OPT_STATIC, NULL, MAXIFNAMELEN },
300 { "dump", o_bool, &dump_options,
301 "Print out option values after parsing all options", 1 },
302 { "dryrun", o_bool, &dryrun,
303 "Stop after parsing, printing, and checking options", 1 },
305 { "child-timeout", o_int, &child_wait,
306 "Number of seconds to wait for child processes at exit",
309 { "set", o_special, (void *)user_setenv,
310 "Set user environment variable",
311 OPT_A2PRINTER | OPT_NOPRINT, (void *)user_setprint },
312 { "unset", o_special, (void *)user_unsetenv,
313 "Unset user environment variable",
314 OPT_A2PRINTER | OPT_NOPRINT, (void *)user_unsetprint },
316 { "defaultroute-metric", o_int, &dfl_route_metric,
317 "Metric to use for the default route (Linux only; -1 for default behavior)",
318 OPT_PRIV|OPT_LLIMIT|OPT_INITONLY, NULL, 0, -1 },
320 { "ip-up-script", o_string, path_ipup,
321 "Set pathname of ip-up script",
322 OPT_PRIV|OPT_STATIC, NULL, MAXPATHLEN },
323 { "ip-down-script", o_string, path_ipdown,
324 "Set pathname of ip-down script",
325 OPT_PRIV|OPT_STATIC, NULL, MAXPATHLEN },
327 #ifdef HAVE_MULTILINK
328 { "multilink", o_bool, &multilink,
329 "Enable multilink operation", OPT_PRIO | 1 },
330 { "mp", o_bool, &multilink,
331 "Enable multilink operation", OPT_PRIOSUB | OPT_ALIAS | 1 },
332 { "nomultilink", o_bool, &multilink,
333 "Disable multilink operation", OPT_PRIOSUB | 0 },
334 { "nomp", o_bool, &multilink,
335 "Disable multilink operation", OPT_PRIOSUB | OPT_ALIAS | 0 },
337 { "bundle", o_string, &bundle_name,
338 "Bundle name for multilink", OPT_PRIO },
339 #endif /* HAVE_MULTILINK */
342 { "plugin", o_special, (void *)loadplugin,
343 "Load a plug-in module into pppd", OPT_PRIV | OPT_A2LIST },
347 { "pass-filter", o_special, setpassfilter,
348 "set filter for packets to pass", OPT_PRIO },
350 { "active-filter", o_special, setactivefilter,
351 "set filter for active pkts", OPT_PRIO },
355 { "maxoctets", o_int, &maxoctets,
356 "Set connection traffic limit",
357 OPT_PRIO | OPT_LLIMIT | OPT_NOINCR | OPT_ZEROINF },
358 { "mo", o_int, &maxoctets,
359 "Set connection traffic limit",
360 OPT_ALIAS | OPT_PRIO | OPT_LLIMIT | OPT_NOINCR | OPT_ZEROINF },
361 { "mo-direction", o_special, setmodir,
362 "Set direction for limit traffic (sum,in,out,max)" },
363 { "mo-timeout", o_int, &maxoctets_timeout,
364 "Check for traffic limit every N seconds", OPT_PRIO | OPT_LLIMIT | 1 },
370 #ifndef IMPLEMENTATION
371 #define IMPLEMENTATION ""
374 static char *usage_string = "\
376 Usage: %s [ options ], where options are:\n\
377 <device> Communicate over the named device\n\
378 <speed> Set the baud rate to <speed>\n\
379 <loc>:<rem> Set the local and/or remote interface IP\n\
380 addresses. Either one may be omitted.\n\
381 asyncmap <n> Set the desired async map to hex <n>\n\
382 auth Require authentication from peer\n\
383 connect <p> Invoke shell command <p> to set up the serial line\n\
384 crtscts Use hardware RTS/CTS flow control\n\
385 defaultroute Add default route through interface\n\
386 file <f> Take options from file <f>\n\
387 modem Use modem control lines\n\
388 mru <n> Set MRU value to <n> for negotiation\n\
389 See pppd(8) for more options.\n\
393 * parse_args - parse a string of arguments from the command line.
396 parse_args(int argc, char **argv)
402 privileged_option = privileged;
403 option_source = "command line";
404 option_priority = OPRIO_CMDLINE;
408 opt = find_option(arg);
410 option_error("unrecognized option '%s'", arg);
414 n = n_arguments(opt);
416 option_error("too few parameters for option %s", arg);
419 if (!process_option(opt, arg, argv))
428 * options_from_file - Read a string of options from a file,
429 * and interpret them.
432 options_from_file(char *filename, int must_exist, int check_prot, int priv)
435 int i, newline, ret, err;
441 char args[MAXARGS][MAXWORDLEN];
442 char cmd[MAXWORDLEN];
445 if (check_prot && seteuid(getuid()) == -1) {
446 option_error("unable to drop privileges to open %s: %m", filename);
449 f = fopen(filename, "r");
451 if (check_prot && seteuid(euid) == -1)
452 fatal("unable to regain privileges");
456 if (err != ENOENT && err != ENOTDIR)
457 warn("Warning: can't open options file %s: %m", filename);
460 option_error("Can't open options file %s: %m", filename);
464 oldpriv = privileged_option;
465 privileged_option = priv;
466 oldsource = option_source;
467 option_source = strdup(filename);
468 if (option_source == NULL)
469 option_source = "file";
471 while (getword(f, cmd, &newline, filename)) {
472 opt = find_option(cmd);
474 option_error("In file %s: unrecognized option '%s'",
478 n = n_arguments(opt);
479 for (i = 0; i < n; ++i) {
480 if (!getword(f, args[i], &newline, filename)) {
482 "In file %s: too few parameters for option '%s'",
488 if (!process_option(opt, cmd, argv))
495 privileged_option = oldpriv;
496 option_source = oldsource;
501 * options_from_user - See if the use has a ~/.ppprc file,
502 * and if so, interpret options from it.
505 options_from_user(void)
507 char *user, *path, *file;
512 pw = getpwuid(getuid());
513 if (pw == NULL || (user = pw->pw_dir) == NULL || user[0] == 0)
515 file = _PATH_USEROPT;
516 pl = strlen(user) + strlen(file) + 2;
519 novm("init file name");
520 slprintf(path, pl, "%s/%s", user, file);
521 option_priority = OPRIO_CFGFILE;
522 ret = options_from_file(path, 0, 1, privileged);
528 * options_for_tty - See if an options file exists for the serial
529 * device, and if so, interpret options from it.
530 * We only allow the per-tty options file to override anything from
531 * the command line if it is something that the user can't override
532 * once it has been set by root; this is done by giving configuration
533 * files a lower priority than the command line.
536 options_for_tty(void)
538 char *dev, *path, *p;
543 if ((p = strstr(dev, "/dev/")) != NULL)
545 if (dev[0] == 0 || strcmp(dev, "tty") == 0)
546 return 1; /* don't look for /etc/ppp/options.tty */
547 pl = strlen(_PATH_TTYOPT) + strlen(dev) + 1;
550 novm("tty init file name");
551 slprintf(path, pl, "%s%s", _PATH_TTYOPT, dev);
552 /* Turn slashes into dots, for Solaris case (e.g. /dev/term/a) */
553 for (p = path + strlen(_PATH_TTYOPT); *p != 0; ++p)
556 option_priority = OPRIO_CFGFILE;
557 ret = options_from_file(path, 0, 0, 1);
563 * options_from_list - process a string of options in a wordlist.
566 options_from_list(struct wordlist *w, int priv)
573 privileged_option = priv;
574 option_source = "secrets file";
575 option_priority = OPRIO_SECFILE;
578 opt = find_option(w->word);
580 option_error("In secrets file: unrecognized option '%s'",
584 n = n_arguments(opt);
586 for (i = 0; i < n; ++i) {
590 "In secrets file: too few parameters for option '%s'",
596 if (!process_option(opt, w0->word, argv))
607 * match_option - see if this option matches an option_t structure.
610 match_option(char *name, option_t *opt, int dowild)
612 int (*match)(char *, char **, int);
614 if (dowild != (opt->type == o_wild))
617 return strcmp(name, opt->name) == 0;
618 match = (int (*)(char *, char **, int)) opt->addr;
619 return (*match)(name, NULL, 0);
623 * find_option - scan the option lists for the various protocols
624 * looking for an entry with the given name.
625 * This could be optimized by using a hash table.
628 find_option(char *name)
631 struct option_list *list;
634 for (dowild = 0; dowild <= 1; ++dowild) {
635 for (opt = general_options; opt->name != NULL; ++opt)
636 if (match_option(name, opt, dowild))
638 for (opt = auth_options; opt->name != NULL; ++opt)
639 if (match_option(name, opt, dowild))
641 for (list = extra_options; list != NULL; list = list->next)
642 for (opt = list->options; opt->name != NULL; ++opt)
643 if (match_option(name, opt, dowild))
645 for (opt = the_channel->options; opt->name != NULL; ++opt)
646 if (match_option(name, opt, dowild))
648 for (i = 0; protocols[i] != NULL; ++i)
649 if ((opt = protocols[i]->options) != NULL)
650 for (; opt->name != NULL; ++opt)
651 if (match_option(name, opt, dowild))
658 * process_option - process one new-style option.
661 process_option(option_t *opt, char *cmd, char **argv)
666 int (*parser)(char **);
667 int (*wildp)(char *, char **, int);
668 char *optopt = (opt->type == o_wild)? "": " option";
669 int prio = option_priority;
670 option_t *mainopt = opt;
672 current_option = opt->name;
673 if ((opt->flags & OPT_PRIVFIX) && privileged_option)
675 while (mainopt->flags & OPT_PRIOSUB)
677 if (mainopt->flags & OPT_PRIO) {
678 if (prio < mainopt->priority) {
679 /* new value doesn't override old */
680 if (prio == OPRIO_CMDLINE && mainopt->priority > OPRIO_ROOT) {
681 option_error("%s%s set in %s cannot be overridden\n",
682 opt->name, optopt, mainopt->source);
687 if (prio > OPRIO_ROOT && mainopt->priority == OPRIO_CMDLINE)
688 warn("%s%s from %s overrides command line",
689 opt->name, optopt, option_source);
692 if ((opt->flags & OPT_INITONLY) && phase != PHASE_INITIALIZE) {
693 option_error("%s%s cannot be changed after initialization",
697 if ((opt->flags & OPT_PRIV) && !privileged_option) {
698 option_error("using the %s%s requires root privilege",
702 if ((opt->flags & OPT_ENABLE) && *(bool *)(opt->addr2) == 0) {
703 option_error("%s%s is disabled", opt->name, optopt);
706 if ((opt->flags & OPT_DEVEQUIV) && devnam_fixed) {
707 option_error("the %s%s may not be changed in %s",
708 opt->name, optopt, option_source);
714 v = opt->flags & OPT_VALUE;
715 *(bool *)(opt->addr) = v;
716 if (opt->addr2 && (opt->flags & OPT_A2COPY))
717 *(bool *)(opt->addr2) = v;
718 else if (opt->addr2 && (opt->flags & OPT_A2CLR))
719 *(bool *)(opt->addr2) = 0;
720 else if (opt->addr2 && (opt->flags & OPT_A2CLRB))
721 *(u_char *)(opt->addr2) &= ~v;
722 else if (opt->addr2 && (opt->flags & OPT_A2OR))
723 *(u_char *)(opt->addr2) |= v;
728 if ((opt->flags & OPT_NOARG) == 0) {
729 if (!int_option(*argv, &iv))
731 if ((((opt->flags & OPT_LLIMIT) && iv < opt->lower_limit)
732 || ((opt->flags & OPT_ULIMIT) && iv > opt->upper_limit))
733 && !((opt->flags & OPT_ZEROOK && iv == 0))) {
734 char *zok = (opt->flags & OPT_ZEROOK)? " zero or": "";
735 switch (opt->flags & OPT_LIMITS) {
737 option_error("%s value must be%s >= %d",
738 opt->name, zok, opt->lower_limit);
741 option_error("%s value must be%s <= %d",
742 opt->name, zok, opt->upper_limit);
745 option_error("%s value must be%s between %d and %d",
746 opt->name, zok, opt->lower_limit, opt->upper_limit);
752 a = opt->flags & OPT_VALUE;
754 a -= 256; /* sign extend */
756 if (opt->flags & OPT_INC)
757 iv += *(int *)(opt->addr);
758 if ((opt->flags & OPT_NOINCR) && !privileged_option) {
759 int oldv = *(int *)(opt->addr);
760 if ((opt->flags & OPT_ZEROINF) ?
761 (oldv != 0 && (iv == 0 || iv > oldv)) : (iv > oldv)) {
762 option_error("%s value cannot be increased", opt->name);
766 *(int *)(opt->addr) = iv;
767 if (opt->addr2 && (opt->flags & OPT_A2COPY))
768 *(int *)(opt->addr2) = iv;
772 if (opt->flags & OPT_NOARG) {
773 v = opt->flags & OPT_VALUE;
776 } else if (!number_option(*argv, &v, 16))
778 if (opt->flags & OPT_OR)
779 v |= *(u_int32_t *)(opt->addr);
780 *(u_int32_t *)(opt->addr) = v;
781 if (opt->addr2 && (opt->flags & OPT_A2COPY))
782 *(u_int32_t *)(opt->addr2) = v;
786 if (opt->flags & OPT_STATIC) {
787 strlcpy((char *)(opt->addr), *argv, opt->upper_limit);
789 char **optptr = (char **)(opt->addr);
792 novm("option argument");
797 /* obfuscate original argument for things like password */
798 if (opt->flags & OPT_HIDE) {
799 memset(*argv, '?', strlen(*argv));
804 case o_special_noarg:
806 parser = (int (*)(char **)) opt->addr;
808 if (!(*parser)(argv))
810 if (opt->flags & OPT_A2LIST) {
811 struct option_value *ovp, *pp;
813 ovp = malloc(sizeof(*ovp) + strlen(*argv));
815 strcpy(ovp->value, *argv);
816 ovp->source = option_source;
818 if (opt->addr2 == NULL) {
821 for (pp = opt->addr2; pp->next != NULL; pp = pp->next)
830 wildp = (int (*)(char *, char **, int)) opt->addr;
831 if (!(*wildp)(cmd, argv, 1))
837 * If addr2 wasn't used by any flag (OPT_A2COPY, etc.) but is set,
838 * treat it as a bool and set/clear it based on the OPT_A2CLR bit.
840 if (opt->addr2 && (opt->flags & (OPT_A2COPY|OPT_ENABLE
841 |OPT_A2PRINTER|OPT_A2STRVAL|OPT_A2LIST|OPT_A2OR)) == 0)
842 *(bool *)(opt->addr2) = !(opt->flags & OPT_A2CLR);
844 mainopt->source = option_source;
845 mainopt->priority = prio;
846 mainopt->winner = opt - mainopt;
852 * override_value - if the option priorities would permit us to
853 * override the value of option, return 1 and update the priority
854 * and source of the option value. Otherwise returns 0.
857 override_value(char *option, int priority, const char *source)
861 opt = find_option(option);
864 while (opt->flags & OPT_PRIOSUB)
866 if ((opt->flags & OPT_PRIO) && priority < opt->priority)
868 opt->priority = priority;
869 opt->source = source;
875 * n_arguments - tell how many arguments an option takes
878 n_arguments(option_t *opt)
880 return (opt->type == o_bool || opt->type == o_special_noarg
881 || (opt->flags & OPT_NOARG))? 0: 1;
885 * add_options - add a list of options to the set we grok.
888 add_options(option_t *opt)
890 struct option_list *list;
892 list = malloc(sizeof(*list));
894 novm("option list entry");
896 list->next = extra_options;
897 extra_options = list;
901 * check_options - check that options are valid and consistent.
906 if (logfile_fd >= 0 && logfile_fd != log_to_fd)
911 * print_option - print out an option and its value
914 print_option(option_t *opt, option_t *mainopt, printer_func printer, void *arg)
919 if (opt->flags & OPT_NOPRINT)
923 v = opt->flags & OPT_VALUE;
924 if (*(bool *)opt->addr != v)
925 /* this can happen legitimately, e.g. lock
926 option turned off for default device */
928 printer(arg, "%s", opt->name);
931 v = opt->flags & OPT_VALUE;
934 i = *(int *)opt->addr;
935 if (opt->flags & OPT_NOARG) {
936 printer(arg, "%s", opt->name);
938 if (opt->flags & OPT_INC) {
939 for (; i > v; i -= v)
940 printer(arg, " %s", opt->name);
942 printer(arg, " # oops: %d not %d\n",
946 printer(arg, "%s %d", opt->name, i);
950 printer(arg, "%s", opt->name);
951 if ((opt->flags & OPT_NOARG) == 0)
952 printer(arg, " %x", *(u_int32_t *)opt->addr);
956 if (opt->flags & OPT_HIDE) {
959 p = (char *) opt->addr;
960 if ((opt->flags & OPT_STATIC) == 0)
963 printer(arg, "%s %q", opt->name, p);
967 case o_special_noarg:
969 if (opt->type != o_wild) {
970 printer(arg, "%s", opt->name);
971 if (n_arguments(opt) == 0)
975 if (opt->flags & OPT_A2PRINTER) {
976 void (*oprt)(option_t *, printer_func, void *);
977 oprt = (void (*)(option_t *, printer_func, void *))
979 (*oprt)(opt, printer, arg);
980 } else if (opt->flags & OPT_A2STRVAL) {
981 p = (char *) opt->addr2;
982 if ((opt->flags & OPT_STATIC) == 0)
984 printer(arg, "%q", p);
985 } else if (opt->flags & OPT_A2LIST) {
986 struct option_value *ovp;
988 ovp = (struct option_value *) opt->addr2;
990 printer(arg, "%q", ovp->value);
991 if ((ovp = ovp->next) == NULL)
993 printer(arg, "\t\t# (from %s)\n%s ",
994 ovp->source, opt->name);
997 printer(arg, "xxx # [don't know how to print value]");
1002 printer(arg, "# %s value (type %d\?\?)", opt->name, opt->type);
1005 printer(arg, "\t\t# (from %s)\n", mainopt->source);
1009 * print_option_list - print out options in effect from an
1013 print_option_list(option_t *opt, printer_func printer, void *arg)
1015 while (opt->name != NULL) {
1016 if (opt->priority != OPRIO_DEFAULT
1017 && opt->winner != (short int) -1)
1018 print_option(opt + opt->winner, opt, printer, arg);
1021 } while (opt->flags & OPT_PRIOSUB);
1026 * print_options - print out what options are in effect.
1029 print_options(printer_func printer, void *arg)
1031 struct option_list *list;
1034 printer(arg, "pppd options in effect:\n");
1035 print_option_list(general_options, printer, arg);
1036 print_option_list(auth_options, printer, arg);
1037 for (list = extra_options; list != NULL; list = list->next)
1038 print_option_list(list->options, printer, arg);
1039 print_option_list(the_channel->options, printer, arg);
1040 for (i = 0; protocols[i] != NULL; ++i)
1041 print_option_list(protocols[i]->options, printer, arg);
1045 * usage - print out a message telling how to use the program.
1050 if (phase == PHASE_INITIALIZE)
1051 fprintf(stderr, usage_string, VERSION, progname);
1055 * showhelp - print out usage message and exit.
1058 showhelp(char **argv)
1060 if (phase == PHASE_INITIALIZE) {
1068 * showversion - print out the version number and exit.
1071 showversion(char **argv)
1073 if (phase == PHASE_INITIALIZE) {
1074 fprintf(stdout, "pppd version %s\n", VERSION);
1081 * option_error - print a message about an error in an option.
1082 * The message is logged, and also sent to
1083 * stderr if phase == PHASE_INITIALIZE.
1086 option_error(char *fmt, ...)
1091 va_start(args, fmt);
1092 vslprintf(buf, sizeof(buf), fmt, args);
1094 if (phase == PHASE_INITIALIZE)
1095 fprintf(stderr, "%s: %s\n", progname, buf);
1096 syslog(LOG_ERR, "%s", buf);
1101 * readable - check if a file is readable by the real user.
1113 if (fstat(fd, &sbuf) != 0)
1115 if (sbuf.st_uid == uid)
1116 return sbuf.st_mode & S_IRUSR;
1117 if (sbuf.st_gid == getgid())
1118 return sbuf.st_mode & S_IRGRP;
1119 for (i = 0; i < ngroups; ++i)
1120 if (sbuf.st_gid == groups[i])
1121 return sbuf.st_mode & S_IRGRP;
1122 return sbuf.st_mode & S_IROTH;
1127 * Read a word from a file.
1128 * Words are delimited by white-space or by quotes (" or ').
1129 * Quotes, white-space and \ may be escaped with \.
1130 * \<newline> is ignored.
1133 getword(FILE *f, char *word, int *newlinep, char *filename)
1136 int quoted, comment;
1137 int value, digit, got, n;
1139 #define isoctal(c) ((c) >= '0' && (c) < '8')
1148 * First skip white-space and comments.
1156 * A newline means the end of a comment; backslash-newline
1157 * is ignored. Note that we cannot have escape && comment.
1169 * Ignore characters other than newline in a comment.
1175 * If this character is escaped, we have a word start.
1181 * If this is the escape character, look at the next character.
1189 * If this is the start of a comment, ignore the rest of the line.
1197 * A non-whitespace character is the start of a word.
1204 * Process characters until the end of the word.
1209 * This character is escaped: backslash-newline is ignored,
1210 * various other characters indicate particular values
1211 * as for C backslash-escapes.
1246 * \ddd octal sequence
1249 for (n = 0; n < 3 && isoctal(c); ++n) {
1250 value = (value << 3) + (c & 07);
1259 * \x<hex_string> sequence
1263 for (n = 0; n < 2 && isxdigit(c); ++n) {
1264 digit = toupper(c) - '0';
1266 digit += '0' + 10 - 'A';
1267 value = (value << 4) + digit;
1275 * Otherwise the character stands for itself.
1282 * Store the resulting character for the escape sequence.
1284 if (len < MAXWORDLEN) {
1295 * Backslash starts a new escape sequence.
1304 * Not escaped: check for the start or end of a quoted
1305 * section and see if we've reached the end of the word.
1313 } else if (c == '"' || c == '\'') {
1317 } else if (isspace(c) || c == '#') {
1323 * An ordinary character: store it in the word and get another.
1325 if (len < MAXWORDLEN) {
1332 word[MAXWORDLEN-1] = 0; /* make sure word is null-terminated */
1335 * End of the word: check for errors.
1341 option_error("Error reading %s: %m", filename);
1345 * If len is zero, then we didn't find a word before the
1351 option_error("warning: quoted word runs to end of file (%.20s...)",
1356 * Warn if the word was too long, and append a terminating null.
1358 if (len >= MAXWORDLEN) {
1359 option_error("warning: word in file %s too long (%.20s...)",
1361 len = MAXWORDLEN - 1;
1372 * number_option - parse an unsigned numeric parameter for an option.
1375 number_option(char *str, u_int32_t *valp, int base)
1379 *valp = strtoul(str, &ptr, base);
1381 option_error("invalid numeric parameter '%s' for %s option",
1382 str, current_option);
1390 * int_option - like number_option, but valp is int *,
1391 * the base is assumed to be 0, and *valp is not changed
1392 * if there is an error.
1395 int_option(char *str, int *valp)
1399 if (!number_option(str, &v, 0))
1407 * The following procedures parse options.
1411 * readfile - take commands from a file.
1414 readfile(char **argv)
1416 return options_from_file(*argv, 1, 1, privileged_option);
1420 * callfile - take commands from /etc/ppp/peers/<name>.
1421 * Name may not contain /../, start with / or ../, or end in /..
1424 callfile(char **argv)
1426 char *fname, *arg, *p;
1431 if (arg[0] == '/' || arg[0] == 0)
1434 for (p = arg; *p != 0; ) {
1435 if (p[0] == '.' && p[1] == '.' && (p[2] == '/' || p[2] == 0)) {
1439 while (*p != '/' && *p != 0)
1446 option_error("call option value may not contain .. or start with /");
1450 l = strlen(arg) + strlen(_PATH_PEERFILES) + 1;
1451 if ((fname = (char *) malloc(l)) == NULL)
1452 novm("call file name");
1453 slprintf(fname, l, "%s%s", _PATH_PEERFILES, arg);
1454 script_setenv("CALL_FILE", arg, 0);
1456 ok = options_from_file(fname, 1, 1, 1);
1464 * setpassfilter - Set the pass filter for packets
1467 setpassfilter(char **argv)
1472 pc = pcap_open_dead(DLT_PPP_PPPD, 65535);
1473 if (pcap_compile(pc, &pass_filter, *argv, 1, netmask) == -1) {
1474 option_error("error in pass-filter expression: %s\n",
1484 * setactivefilter - Set the active filter for packets
1487 setactivefilter(char **argv)
1492 pc = pcap_open_dead(DLT_PPP_PPPD, 65535);
1493 if (pcap_compile(pc, &active_filter, *argv, 1, netmask) == -1) {
1494 option_error("error in active-filter expression: %s\n",
1505 * setdomain - Set domain name to append to hostname
1508 setdomain(char **argv)
1510 gethostname(hostname, MAXNAMELEN);
1513 strncat(hostname, ".", MAXNAMELEN - strlen(hostname));
1514 domain = hostname + strlen(hostname);
1515 strncat(hostname, *argv, MAXNAMELEN - strlen(hostname));
1517 hostname[MAXNAMELEN-1] = 0;
1522 setlogfile(char **argv)
1528 if (!privileged_option && seteuid(getuid()) == -1) {
1529 option_error("unable to drop permissions to open %s: %m", *argv);
1532 fd = open(*argv, O_WRONLY | O_APPEND | O_CREAT | O_EXCL, 0644);
1533 if (fd < 0 && errno == EEXIST)
1534 fd = open(*argv, O_WRONLY | O_APPEND);
1536 if (!privileged_option && seteuid(euid) == -1)
1537 fatal("unable to regain privileges: %m");
1540 option_error("Can't open log file %s: %m", *argv);
1543 strlcpy(logfile_name, *argv, sizeof(logfile_name));
1544 if (logfile_fd >= 0)
1554 setmodir(char **argv)
1558 if(!strcmp(*argv,"in")) {
1559 maxoctets_dir = PPP_OCTETS_DIRECTION_IN;
1560 } else if (!strcmp(*argv,"out")) {
1561 maxoctets_dir = PPP_OCTETS_DIRECTION_OUT;
1562 } else if (!strcmp(*argv,"max")) {
1563 maxoctets_dir = PPP_OCTETS_DIRECTION_MAXOVERAL;
1565 maxoctets_dir = PPP_OCTETS_DIRECTION_SUM;
1573 loadplugin(char **argv)
1582 if (strchr(arg, '/') == 0) {
1583 const char *base = _PATH_PLUGIN;
1584 int l = strlen(base) + strlen(arg) + 2;
1587 novm("plugin file path");
1588 strlcpy(path, base, l);
1589 strlcat(path, "/", l);
1590 strlcat(path, arg, l);
1592 handle = dlopen(path, RTLD_GLOBAL | RTLD_NOW);
1596 option_error("%s", err);
1597 option_error("Couldn't load plugin %s", arg);
1600 init = (void (*)(void))dlsym(handle, "plugin_init");
1602 option_error("%s has no initialization entry point", arg);
1605 vers = (const char *) dlsym(handle, "pppd_version");
1607 warn("Warning: plugin %s has no version information", arg);
1608 } else if (strcmp(vers, VERSION) != 0) {
1609 option_error("Plugin %s is for pppd version %s, this is %s",
1610 arg, vers, VERSION);
1613 info("Plugin %s loaded.", arg);
1627 * Set an environment variable specified by the user.
1630 user_setenv(char **argv)
1632 char *arg = argv[0];
1634 struct userenv *uep, **insp;
1636 if ((eqp = strchr(arg, '=')) == NULL) {
1637 option_error("missing = in name=value: %s", arg);
1641 option_error("missing variable name: %s", arg);
1644 for (uep = userenv_list; uep != NULL; uep = uep->ue_next) {
1645 int nlen = strlen(uep->ue_name);
1646 if (nlen == (eqp - arg) &&
1647 strncmp(arg, uep->ue_name, nlen) == 0)
1650 /* Ignore attempts by unprivileged users to override privileged sources */
1651 if (uep != NULL && !privileged_option && uep->ue_priv)
1653 /* The name never changes, so allocate it with the structure */
1655 uep = malloc(sizeof (*uep) + (eqp-arg));
1656 strncpy(uep->ue_name, arg, eqp-arg);
1657 uep->ue_name[eqp-arg] = '\0';
1658 uep->ue_next = NULL;
1659 insp = &userenv_list;
1660 while (*insp != NULL)
1661 insp = &(*insp)->ue_next;
1664 struct userenv *uep2;
1665 for (uep2 = userenv_list; uep2 != NULL; uep2 = uep2->ue_next) {
1666 if (uep2 != uep && !uep2->ue_isset)
1669 if (uep2 == NULL && !uep->ue_isset)
1670 find_option("unset")->flags |= OPT_NOPRINT;
1671 free(uep->ue_value);
1674 uep->ue_priv = privileged_option;
1675 uep->ue_source = option_source;
1676 uep->ue_value = strdup(eqp + 1);
1677 curopt->flags &= ~OPT_NOPRINT;
1682 user_setprint(option_t *opt, printer_func printer, void *arg)
1684 struct userenv *uep, *uepnext;
1686 uepnext = userenv_list;
1687 while (uepnext != NULL && !uepnext->ue_isset)
1688 uepnext = uepnext->ue_next;
1689 while ((uep = uepnext) != NULL) {
1690 uepnext = uep->ue_next;
1691 while (uepnext != NULL && !uepnext->ue_isset)
1692 uepnext = uepnext->ue_next;
1693 (*printer)(arg, "%s=%s", uep->ue_name, uep->ue_value);
1694 if (uepnext != NULL)
1695 (*printer)(arg, "\t\t# (from %s)\n%s ", uep->ue_source, opt->name);
1697 opt->source = uep->ue_source;
1702 user_unsetenv(char **argv)
1704 struct userenv *uep, **insp;
1705 char *arg = argv[0];
1707 if (strchr(arg, '=') != NULL) {
1708 option_error("unexpected = in name: %s", arg);
1712 option_error("missing variable name for unset");
1715 for (uep = userenv_list; uep != NULL; uep = uep->ue_next) {
1716 if (strcmp(arg, uep->ue_name) == 0)
1719 /* Ignore attempts by unprivileged users to override privileged sources */
1720 if (uep != NULL && !privileged_option && uep->ue_priv)
1722 /* The name never changes, so allocate it with the structure */
1724 uep = malloc(sizeof (*uep) + strlen(arg));
1725 strcpy(uep->ue_name, arg);
1726 uep->ue_next = NULL;
1727 insp = &userenv_list;
1728 while (*insp != NULL)
1729 insp = &(*insp)->ue_next;
1732 struct userenv *uep2;
1733 for (uep2 = userenv_list; uep2 != NULL; uep2 = uep2->ue_next) {
1734 if (uep2 != uep && uep2->ue_isset)
1737 if (uep2 == NULL && uep->ue_isset)
1738 find_option("set")->flags |= OPT_NOPRINT;
1739 free(uep->ue_value);
1742 uep->ue_priv = privileged_option;
1743 uep->ue_source = option_source;
1744 uep->ue_value = NULL;
1745 curopt->flags &= ~OPT_NOPRINT;
1750 user_unsetprint(option_t *opt, printer_func printer, void *arg)
1752 struct userenv *uep, *uepnext;
1754 uepnext = userenv_list;
1755 while (uepnext != NULL && uepnext->ue_isset)
1756 uepnext = uepnext->ue_next;
1757 while ((uep = uepnext) != NULL) {
1758 uepnext = uep->ue_next;
1759 while (uepnext != NULL && uepnext->ue_isset)
1760 uepnext = uepnext->ue_next;
1761 (*printer)(arg, "%s", uep->ue_name);
1762 if (uepnext != NULL)
1763 (*printer)(arg, "\t\t# (from %s)\n%s ", uep->ue_source, opt->name);
1765 opt->source = uep->ue_source;