2 * cbcp - Call Back Configuration Protocol.
4 * Copyright (c) 1995 Pedro Roque Marques. All rights reserved.
6 * Redistribution and use in source and binary forms, with or without
7 * modification, are permitted provided that the following conditions
10 * 1. Redistributions of source code must retain the above copyright
11 * notice, this list of conditions and the following disclaimer.
13 * 2. Redistributions in binary form must reproduce the above copyright
14 * notice, this list of conditions and the following disclaimer in
15 * the documentation and/or other materials provided with the
18 * 3. The names of the authors of this software must not be used to
19 * endorse or promote products derived from this software without
20 * prior written permission.
22 * 4. Redistributions of any form whatsoever must retain the following
24 * "This product includes software developed by Pedro Roque Marques
25 * <pedro_m@yahoo.com>"
27 * THE AUTHORS OF THIS SOFTWARE DISCLAIM ALL WARRANTIES WITH REGARD TO
28 * THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
29 * AND FITNESS, IN NO EVENT SHALL THE AUTHORS BE LIABLE FOR ANY
30 * SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
31 * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN
32 * AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING
33 * OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
36 #define RCSID "$Id: cbcp.c,v 1.17 2006/05/22 00:04:07 paulus Exp $"
40 #include <sys/types.h>
52 static int setcbcp __P((char **));
54 static option_t cbcp_option_list[] = {
55 { "callback", o_special, (void *)setcbcp,
56 "Ask for callback", OPT_PRIO | OPT_A2STRVAL, &cbcp[0].us_number },
61 * Protocol entry points.
63 static void cbcp_init __P((int unit));
64 static void cbcp_open __P((int unit));
65 static void cbcp_lowerup __P((int unit));
66 static void cbcp_input __P((int unit, u_char *pkt, int len));
67 static void cbcp_protrej __P((int unit));
68 static int cbcp_printpkt __P((u_char *pkt, int len,
69 void (*printer) __P((void *, char *, ...)),
72 struct protent cbcp_protent = {
92 cbcp_state cbcp[NUM_PPP];
94 /* internal prototypes */
96 static void cbcp_recvreq __P((cbcp_state *us, u_char *pckt, int len));
97 static void cbcp_resp __P((cbcp_state *us));
98 static void cbcp_up __P((cbcp_state *us));
99 static void cbcp_recvack __P((cbcp_state *us, u_char *pckt, int len));
100 static void cbcp_send __P((cbcp_state *us, int code, u_char *buf, int len));
102 /* option processing */
107 lcp_wantoptions[0].neg_cbcp = 1;
108 cbcp_protent.enabled_flag = 1;
109 cbcp[0].us_number = strdup(*argv);
110 if (cbcp[0].us_number == 0)
111 novm("callback number");
112 cbcp[0].us_type |= (1 << CB_CONF_USER);
113 cbcp[0].us_type |= (1 << CB_CONF_ADMIN);
125 memset(us, 0, sizeof(cbcp_state));
127 us->us_type |= (1 << CB_CONF_NO);
130 /* lower layer is up */
135 cbcp_state *us = &cbcp[iface];
137 dbglog("cbcp_lowerup");
138 dbglog("want: %d", us->us_type);
140 if (us->us_type == CB_CONF_USER)
141 dbglog("phone no: %s", us->us_number);
151 /* process an incomming packet */
153 cbcp_input(unit, inpacket, pktlen)
162 cbcp_state *us = &cbcp[unit];
166 if (pktlen < CBCP_MINLEN) {
168 dbglog("CBCP packet is too small");
176 if (len > pktlen || len < CBCP_MINLEN) {
178 dbglog("CBCP packet: invalid length %d", len);
187 cbcp_recvreq(us, inp, len);
192 dbglog("CBCP_RESP received");
196 if (debug && id != us->us_id)
197 dbglog("id doesn't match: expected %d recv %d",
200 cbcp_recvack(us, inp, len);
208 /* protocol was rejected by foe */
209 void cbcp_protrej(int iface)
213 char *cbcp_codenames[] = {
214 "Request", "Response", "Ack"
217 char *cbcp_optionnames[] = {
224 /* pretty print a packet */
226 cbcp_printpkt(p, plen, printer, arg)
229 void (*printer) __P((void *, char *, ...));
232 int code, opt, id, len, olen, delay;
235 if (plen < HEADERLEN)
241 if (len < HEADERLEN || len > plen)
244 if (code >= 1 && code <= sizeof(cbcp_codenames) / sizeof(char *))
245 printer(arg, " %s", cbcp_codenames[code-1]);
247 printer(arg, " code=0x%x", code);
249 printer(arg, " id=0x%x", id);
260 if (olen < 2 || olen > len) {
267 if (opt >= 1 && opt <= sizeof(cbcp_optionnames) / sizeof(char *))
268 printer(arg, " %s", cbcp_optionnames[opt-1]);
270 printer(arg, " option=0x%x", opt);
274 printer(arg, " delay = %d", delay);
282 memcpy(str, p, olen - 4);
284 printer(arg, " number = %s", str);
294 for (; len > 0; --len) {
296 printer(arg, " %.2x", code);
302 /* received CBCP request */
304 cbcp_recvreq(us, pckt, pcktlen)
309 u_char type, opt_len, delay, addr_type;
316 dbglog("length: %d", len);
319 GETCHAR(opt_len, pckt);
320 if (opt_len < 2 || opt_len > len)
324 GETCHAR(delay, pckt);
326 us->us_allowed |= (1 << type);
330 dbglog("no callback allowed");
334 dbglog("user callback allowed");
336 GETCHAR(addr_type, pckt);
337 memcpy(address, pckt, opt_len - 4);
338 address[opt_len - 4] = 0;
340 dbglog("address: %s", address);
345 dbglog("user admin defined allowed");
355 dbglog("cbcp_recvreq: malformed packet (%d bytes left)", len);
372 cb_type = us->us_allowed & us->us_type;
373 dbglog("cbcp_resp cb_type=%d", cb_type);
377 lcp_down(us->us_unit);
380 if (cb_type & ( 1 << CB_CONF_USER ) ) {
381 dbglog("cbcp_resp CONF_USER");
382 slen = strlen(us->us_number);
384 warn("callback number truncated to 250 characters");
387 PUTCHAR(CB_CONF_USER, bufp);
388 len = 3 + 1 + slen + 1;
390 PUTCHAR(5, bufp); /* delay */
392 BCOPY(us->us_number, bufp, slen + 1);
393 cbcp_send(us, CBCP_RESP, buf, len);
397 if (cb_type & ( 1 << CB_CONF_ADMIN ) ) {
398 dbglog("cbcp_resp CONF_ADMIN");
399 PUTCHAR(CB_CONF_ADMIN, bufp);
402 PUTCHAR(5, bufp); /* delay */
403 cbcp_send(us, CBCP_RESP, buf, len);
407 if (cb_type & ( 1 << CB_CONF_NO ) ) {
408 dbglog("cbcp_resp CONF_NO");
409 PUTCHAR(CB_CONF_NO, bufp);
412 cbcp_send(us, CBCP_RESP, buf, len);
413 start_networks(us->us_unit);
419 cbcp_send(us, code, buf, len)
428 outp = outpacket_buf;
432 MAKEHEADER(outp, PPP_CBCP);
435 PUTCHAR(us->us_id, outp);
436 PUTSHORT(outlen, outp);
439 BCOPY(buf, outp, len);
441 output(us->us_unit, outpacket_buf, outlen + PPP_HDRLEN);
445 cbcp_recvack(us, pckt, len)
450 u_char type, delay, addr_type;
456 GETCHAR(opt_len, pckt);
457 if (opt_len >= 2 && opt_len <= len) {
460 GETCHAR(delay, pckt);
463 GETCHAR(addr_type, pckt);
464 memcpy(address, pckt, opt_len - 4);
465 address[opt_len - 4] = 0;
467 dbglog("peer will call: %s", address);
469 if (type == CB_CONF_NO)
475 dbglog("cbcp_recvack: malformed packet");
479 /* ok peer will do callback */
485 status = EXIT_CALLBACK;
486 lcp_close(0, "Call me back, please");