2 * cbcp - Call Back Configuration Protocol.
4 * Copyright (c) 1995 Pedro Roque Marques
7 * Redistribution and use in source and binary forms are permitted
8 * provided that the above copyright notice and this paragraph are
9 * duplicated in all such forms and that any documentation,
10 * advertising materials, and other materials related to such
11 * distribution and use acknowledge that the software was developed
12 * by Pedro Roque Marques. The name of the author may not be used to
13 * endorse or promote products derived from this software without
14 * specific prior written permission.
16 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR
17 * IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED
18 * WARRANTIES OF MERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE.
22 static char rcsid[] = "$Id: cbcp.c,v 1.1 1996/10/08 04:35:41 paulus Exp $";
27 #include <sys/types.h>
38 * Protocol entry points.
40 static void cbcp_init __P((int unit));
41 static void cbcp_open __P((int unit));
42 static void cbcp_lowerup __P((int unit));
43 static void cbcp_input __P((int unit, u_char *pkt, int len));
44 static void cbcp_protrej __P((int unit));
45 static int cbcp_printpkt __P((u_char *pkt, int len,
46 void (*printer) __P((void *, char *, ...)),
49 struct protent cbcp_protent = {
67 cbcp_state cbcp[NUM_PPP];
69 /* internal prototypes */
71 void cbcp_recvreq(cbcp_state *us, char *pckt, int len);
72 void cbcp_resp(cbcp_state *us);
73 void cbcp_up(cbcp_state *us);
74 void cbcp_recvack(cbcp_state *us, char *pckt, int len);
75 void cbcp_send(cbcp_state *us, u_char code, u_char *buf, int len);
85 memset(us, 0, sizeof(cbcp_state));
87 us->us_type |= (1 << CB_CONF_NO);
90 /* lower layer is up */
95 cbcp_state *us = &cbcp[iface];
97 syslog(LOG_DEBUG, "cbcp_lowerup");
98 syslog(LOG_DEBUG, "want: %d", us->us_type);
100 if (us->us_type == CB_CONF_USER)
101 syslog(LOG_DEBUG, "phone no: %s", us->us_number);
108 syslog(LOG_DEBUG, "cbcp_open");
111 /* process an incomming packet */
113 cbcp_input(unit, inpacket, pktlen)
122 cbcp_state *us = &cbcp[unit];
126 if (pktlen < CBCP_MINLEN) {
127 syslog(LOG_ERR, "CBCP packet is too small");
137 syslog(LOG_ERR, "CBCP packet: invalid length");
147 cbcp_recvreq(us, inp, len);
151 syslog(LOG_DEBUG, "CBCP_RESP received");
156 syslog(LOG_DEBUG, "id doesn't match: expected %d recv %d",
159 cbcp_recvack(us, inp, len);
167 /* protocol was rejected by foe */
168 void cbcp_protrej(int iface)
172 char *cbcp_codenames[] = {
173 "Request", "Response", "Ack"
176 char *cbcp_optionnames[] = {
183 /* pretty print a packet */
185 cbcp_printpkt(p, plen, printer, arg)
188 void (*printer) __P((void *, char *, ...));
191 int code, opt, id, len, olen, delay;
192 u_char *pstart, *optend;
196 if (plen < HEADERLEN)
202 if (len < HEADERLEN || len > plen)
205 if (code >= 1 && code <= sizeof(cbcp_codenames) / sizeof(char *))
206 printer(arg, " %s", cbcp_codenames[code-1]);
208 printer(arg, " code=0x%x", code);
210 printer(arg, " id=0x%x", id);
221 if (olen < 2 || olen > len) {
228 if (opt >= 1 && opt <= sizeof(cbcp_optionnames) / sizeof(char *))
229 printer(arg, " %s", cbcp_optionnames[opt-1]);
231 printer(arg, " option=0x%x", opt);
235 printer(arg, " delay = %d", delay);
243 memcpy(str, p, olen - 4);
245 printer(arg, " number = %s", str);
255 for (; len > 0; --len) {
257 printer(arg, " %.2x", code);
263 /* received CBCP request */
265 cbcp_recvreq(us, pckt, pcktlen)
270 u_char type, opt_len, delay, addr_type;
277 syslog(LOG_DEBUG, "length: %d", len);
280 GETCHAR(opt_len, pckt);
283 GETCHAR(delay, pckt);
285 us->us_allowed |= (1 << type);
289 syslog(LOG_DEBUG, "no callback allowed");
293 syslog(LOG_DEBUG, "user callback allowed");
295 GETCHAR(addr_type, pckt);
296 memcpy(address, pckt, opt_len - 4);
297 address[opt_len - 4] = 0;
299 syslog(LOG_DEBUG, "address: %s", address);
304 syslog(LOG_DEBUG, "user admin defined allowed");
325 cb_type = us->us_allowed & us->us_type;
326 syslog(LOG_DEBUG, "cbcp_resp cb_type=%d", cb_type);
330 lcp_down(us->us_unit);
333 if (cb_type & ( 1 << CB_CONF_USER ) ) {
334 syslog(LOG_DEBUG, "cbcp_resp CONF_USER");
335 PUTCHAR(CB_CONF_USER, bufp);
336 len = 3 + 1 + strlen(us->us_number) + 1;
338 PUTCHAR(5, bufp); /* delay */
340 BCOPY(us->us_number, bufp, strlen(us->us_number) + 1);
341 cbcp_send(us, CBCP_RESP, buf, len);
345 if (cb_type & ( 1 << CB_CONF_ADMIN ) ) {
346 syslog(LOG_DEBUG, "cbcp_resp CONF_ADMIN");
347 PUTCHAR(CB_CONF_ADMIN, bufp);
350 PUTCHAR(5, bufp); /* delay */
352 cbcp_send(us, CBCP_RESP, buf, len);
356 if (cb_type & ( 1 << CB_CONF_NO ) ) {
357 syslog(LOG_DEBUG, "cbcp_resp CONF_NO");
358 PUTCHAR(CB_CONF_NO, bufp);
362 cbcp_send(us, CBCP_RESP, buf, len);
363 ipcp_open(us->us_unit);
369 cbcp_send(us, code, buf, len)
378 outp = outpacket_buf;
382 MAKEHEADER(outp, PPP_CBCP);
385 PUTCHAR(us->us_id, outp);
386 PUTSHORT(outlen, outp);
389 BCOPY(buf, outp, len);
391 output(us->us_unit, outpacket_buf, outlen + PPP_HDRLEN);
395 cbcp_recvack(us, pckt, len)
400 u_char type, delay, addr_type;
406 GETCHAR(opt_len, pckt);
409 GETCHAR(delay, pckt);
412 GETCHAR(addr_type, pckt);
413 memcpy(address, pckt, opt_len - 4);
414 address[opt_len - 4] = 0;
416 syslog(LOG_DEBUG, "peer will call: %s", address);
425 /* ok peer will do callback */