Merge branch 'vendor/GDTOA'
[dragonfly.git] / sbin / spppcontrol / spppcontrol.c
1 /*
2  * Copyright (c) 1997, 2001 Joerg Wunsch
3  *
4  * All rights reserved.
5  *
6  * Redistribution and use in source and binary forms, with or without
7  * modification, are permitted provided that the following conditions
8  * are met:
9  * 1. Redistributions of source code must retain the above copyright
10  *    notice, this list of conditions and the following disclaimer.
11  * 2. Redistributions in binary form must reproduce the above copyright
12  *    notice, this list of conditions and the following disclaimer in the
13  *    documentation and/or other materials provided with the distribution.
14  *
15  * THIS SOFTWARE IS PROVIDED BY THE DEVELOPERS ``AS IS'' AND ANY EXPRESS OR
16  * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
17  * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
18  * IN NO EVENT SHALL THE DEVELOPERS BE LIABLE FOR ANY DIRECT, INDIRECT,
19  * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
20  * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
21  * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
22  * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
23  * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
24  * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
25  *
26  * $FreeBSD: src/sbin/spppcontrol/spppcontrol.c,v 1.7.2.2 2002/04/24 18:47:22 joerg Exp $
27  * $DragonFly: src/sbin/spppcontrol/spppcontrol.c,v 1.3 2003/08/08 04:18:41 dillon Exp $
28  */
29
30 #include <sys/types.h>
31 #include <sys/ioctl.h>
32 #include <sys/socket.h>
33
34 #include <net/if.h>
35 #include <net/if_var.h>
36 #include <net/sppp/if_sppp.h>
37
38 #include <err.h>
39 #include <stdio.h>
40 #include <stdlib.h>
41 #include <string.h>
42 #include <sysexits.h>
43 #include <unistd.h>
44
45 static void usage(void);
46 void    print_vals(const char *ifname, struct spppreq *sp);
47 const char *phase_name(enum ppp_phase phase);
48 const char *proto_name(u_short proto);
49 const char *authflags(u_short flags);
50
51 #define PPP_PAP         0xc023
52 #define PPP_CHAP        0xc223
53
54 int
55 main(int argc, char **argv)
56 {
57         int s, c;
58         int errs = 0, verbose = 0;
59         size_t off;
60         long to;
61         char *endp;
62         const char *ifname, *cp;
63         struct ifreq ifr;
64         struct spppreq spr;
65
66         while ((c = getopt(argc, argv, "v")) != -1)
67                 switch (c) {
68                 case 'v':
69                         verbose++;
70                         break;
71
72                 default:
73                         errs++;
74                         break;
75                 }
76         argv += optind;
77         argc -= optind;
78
79         if (errs || argc < 1)
80                 usage();
81
82         ifname = argv[0];
83         strncpy(ifr.ifr_name, ifname, sizeof ifr.ifr_name);
84
85         /* use a random AF to create the socket */
86         if ((s = socket(AF_INET, SOCK_DGRAM, 0)) < 0)
87                 err(EX_UNAVAILABLE, "ifconfig: socket");
88
89         argc--;
90         argv++;
91
92         spr.cmd = (int)SPPPIOGDEFS;
93         ifr.ifr_data = (caddr_t)&spr;
94
95         if (ioctl(s, SIOCGIFGENERIC, &ifr) == -1)
96                 err(EX_OSERR, "SIOCGIFGENERIC(SPPPIOGDEFS)");
97
98         if (argc == 0) {
99                 /* list only mode */
100                 print_vals(ifname, &spr);
101                 return 0;
102         }
103
104 #define startswith(s) strncmp(argv[0], s, (off = strlen(s))) == 0
105
106         while (argc > 0) {
107                 if (startswith("authproto=")) {
108                         cp = argv[0] + off;
109                         if (strcmp(cp, "pap") == 0)
110                                 spr.defs.myauth.proto =
111                                         spr.defs.hisauth.proto = PPP_PAP;
112                         else if (strcmp(cp, "chap") == 0)
113                                 spr.defs.myauth.proto =
114                                         spr.defs.hisauth.proto = PPP_CHAP;
115                         else if (strcmp(cp, "none") == 0)
116                                 spr.defs.myauth.proto =
117                                         spr.defs.hisauth.proto = 0;
118                         else
119                                 errx(EX_DATAERR, "bad auth proto: %s", cp);
120                 } else if (startswith("myauthproto=")) {
121                         cp = argv[0] + off;
122                         if (strcmp(cp, "pap") == 0)
123                                 spr.defs.myauth.proto = PPP_PAP;
124                         else if (strcmp(cp, "chap") == 0)
125                                 spr.defs.myauth.proto = PPP_CHAP;
126                         else if (strcmp(cp, "none") == 0)
127                                 spr.defs.myauth.proto = 0;
128                         else
129                                 errx(EX_DATAERR, "bad auth proto: %s", cp);
130                 } else if (startswith("myauthname="))
131                         strncpy(spr.defs.myauth.name, argv[0] + off,
132                                 AUTHNAMELEN);
133                 else if (startswith("myauthsecret=") ||
134                          startswith("myauthkey="))
135                         strncpy(spr.defs.myauth.secret, argv[0] + off,
136                                 AUTHKEYLEN);
137                 else if (startswith("hisauthproto=")) {
138                         cp = argv[0] + off;
139                         if (strcmp(cp, "pap") == 0)
140                                 spr.defs.hisauth.proto = PPP_PAP;
141                         else if (strcmp(cp, "chap") == 0)
142                                 spr.defs.hisauth.proto = PPP_CHAP;
143                         else if (strcmp(cp, "none") == 0)
144                                 spr.defs.hisauth.proto = 0;
145                         else
146                                 errx(EX_DATAERR, "bad auth proto: %s", cp);
147                 } else if (startswith("hisauthname="))
148                         strncpy(spr.defs.hisauth.name, argv[0] + off,
149                                 AUTHNAMELEN);
150                 else if (startswith("hisauthsecret=") ||
151                          startswith("hisauthkey="))
152                         strncpy(spr.defs.hisauth.secret, argv[0] + off,
153                                 AUTHKEYLEN);
154                 else if (strcmp(argv[0], "callin") == 0)
155                         spr.defs.hisauth.flags |= AUTHFLAG_NOCALLOUT;
156                 else if (strcmp(argv[0], "always") == 0)
157                         spr.defs.hisauth.flags &= ~AUTHFLAG_NOCALLOUT;
158                 else if (strcmp(argv[0], "norechallenge") == 0)
159                         spr.defs.hisauth.flags |= AUTHFLAG_NORECHALLENGE;
160                 else if (strcmp(argv[0], "rechallenge") == 0)
161                         spr.defs.hisauth.flags &= ~AUTHFLAG_NORECHALLENGE;
162                 else if (startswith("lcp-timeout=")) {
163                         cp = argv[0] + off;
164                         to = strtol(cp, &endp, 10);
165                         if (*cp == '\0' || *endp != '\0' ||
166                             /*
167                              * NB: 10 ms is the minimal possible value for
168                              * hz=100.  We assume no kernel has less clock
169                              * frequency than that...
170                              */
171                             to < 10 || to > 20000)
172                                 errx(EX_DATAERR, "bad lcp timeout value: %s",
173                                      cp);
174                         spr.defs.lcp.timeout = to;
175                 } else if (strcmp(argv[0], "enable-vj") == 0)
176                         spr.defs.enable_vj = 1;
177                 else if (strcmp(argv[0], "disable-vj") == 0)
178                         spr.defs.enable_vj = 0;
179                 else if (strcmp(argv[0], "enable-ipv6") == 0)
180                         spr.defs.enable_ipv6 = 1;
181                 else if (strcmp(argv[0], "disable-ipv6") == 0)
182                         spr.defs.enable_ipv6 = 0;
183                 else
184                         errx(EX_DATAERR, "bad parameter: \"%s\"", argv[0]);
185
186                 argv++;
187                 argc--;
188         }
189
190         spr.cmd = (int)SPPPIOSDEFS;
191
192         if (ioctl(s, SIOCSIFGENERIC, &ifr) == -1)
193                 err(EX_OSERR, "SIOCSIFGENERIC(SPPPIOSDEFS)");
194
195         if (verbose)
196                 print_vals(ifname, &spr);
197
198         return 0;
199 }
200
201 static void
202 usage(void)
203 {
204         fprintf(stderr, "%s\n%s\n",
205         "usage: spppcontrol [-v] ifname [{my|his}auth{proto|name|secret}=...]",
206         "       spppcontrol [-v] ifname callin|always");
207         exit(EX_USAGE);
208 }
209
210 void
211 print_vals(const char *ifname, struct spppreq *sp)
212 {
213         printf("%s:\tphase=%s\n", ifname, phase_name(sp->defs.pp_phase));
214         if (sp->defs.myauth.proto) {
215                 printf("\tmyauthproto=%s myauthname=\"%.*s\"\n",
216                        proto_name(sp->defs.myauth.proto),
217                        AUTHNAMELEN, sp->defs.myauth.name);
218         }
219         if (sp->defs.hisauth.proto) {
220                 printf("\thisauthproto=%s hisauthname=\"%.*s\"%s\n",
221                        proto_name(sp->defs.hisauth.proto),
222                        AUTHNAMELEN, sp->defs.hisauth.name,
223                        authflags(sp->defs.hisauth.flags));
224         }
225         printf("\tlcp-timeout=%d ms\n", sp->defs.lcp.timeout);
226         printf("\t%sable-vj\n", sp->defs.enable_vj? "en": "dis");
227         printf("\t%sable-ipv6\n", sp->defs.enable_ipv6? "en": "dis");
228 }
229
230 const char *
231 phase_name(enum ppp_phase phase)
232 {
233         switch (phase) {
234         case PHASE_DEAD:        return "dead";
235         case PHASE_ESTABLISH:   return "establish";
236         case PHASE_TERMINATE:   return "terminate";
237         case PHASE_AUTHENTICATE: return "authenticate";
238         case PHASE_NETWORK:     return "network";
239         }
240         return "illegal";
241 }
242
243 const char *
244 proto_name(u_short proto)
245 {
246         static char buf[12];
247         switch (proto) {
248         case PPP_PAP:   return "pap";
249         case PPP_CHAP:  return "chap";
250         }
251         sprintf(buf, "0x%x", (unsigned)proto);
252         return buf;
253 }
254
255 const char *
256 authflags(u_short flags)
257 {
258         static char buf[30];
259         buf[0] = '\0';
260         if (flags & AUTHFLAG_NOCALLOUT)
261                 strcat(buf, " callin");
262         if (flags & AUTHFLAG_NORECHALLENGE)
263                 strcat(buf, " norechallenge");
264         return buf;
265 }