2 * options.c - handles option processing for PPP.
4 * Copyright (c) 1989 Carnegie Mellon University.
7 * Redistribution and use in source and binary forms are permitted
8 * provided that the above copyright notice and this paragraph are
9 * duplicated in all such forms and that any documentation,
10 * advertising materials, and other materials related to such
11 * distribution and use acknowledge that the software was developed
12 * by Carnegie Mellon University. The name of the
13 * University may not be used to endorse or promote products derived
14 * from this software without specific prior written permission.
15 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR
16 * IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED
17 * WARRANTIES OF MERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE.
19 * $FreeBSD: src/usr.sbin/pppd/options.c,v 1.20.2.2 2002/08/31 18:16:01 dwmalone Exp $
20 * $DragonFly: src/usr.sbin/pppd/options.c,v 1.4 2003/11/03 19:31:40 eirikn Exp $
35 #include <sys/types.h>
37 #include <netinet/in.h>
38 #include <arpa/inet.h>
41 #include <pcap-int.h> /* XXX: To get struct pcap */
45 #include "pathnames.h"
46 #include "patchlevel.h"
59 #endif /* IPX_CHANGE */
61 #include <net/ppp_layer/ppp_comp.h>
66 #if defined(ultrix) || defined(NeXT)
71 #define GIDSET_TYPE gid_t
75 * Option variables and default values.
78 int dflag = 0; /* Tell libpcap we want debugging */
80 int debug = 0; /* Debug flag */
81 int kdebugflag = 0; /* Tell kernel to print debug messages */
82 int default_device = 1; /* Using /dev/tty or equivalent */
83 char devnam[MAXPATHLEN] = _PATH_TTY; /* Device name */
84 int crtscts = 0; /* Use hardware flow control */
85 int modem = 1; /* Use modem control lines */
86 int inspeed = 0; /* Input/Output speed requested */
87 u_int32_t netmask = 0; /* IP netmask to set on interface */
88 int lockflag = 0; /* Create lock file to lock the serial dev */
89 int nodetach = 0; /* Don't detach from controlling tty */
90 char *connector = NULL; /* Script to establish physical link */
91 char *disconnector = NULL; /* Script to disestablish physical link */
92 char *welcomer = NULL; /* Script to run after phys link estab. */
93 int max_con_attempts = 0; /* Maximum connect tries in non-demand mode */
94 int maxconnect = 0; /* Maximum connect time */
95 char user[MAXNAMELEN]; /* Username for PAP */
96 char passwd[MAXSECRETLEN]; /* Password for PAP */
97 int auth_required = 0; /* Peer is required to authenticate */
98 int defaultroute = 0; /* assign default route through interface */
99 int proxyarp = 0; /* Set up proxy ARP entry for peer */
100 int persist = 0; /* Reopen link after it goes down */
101 int uselogin = 0; /* Use /etc/passwd for checking PAP */
102 int lcp_echo_interval = 0; /* Interval between LCP echo-requests */
103 int lcp_echo_fails = 0; /* Tolerance to unanswered echo-requests */
104 char our_name[MAXNAMELEN]; /* Our name for authentication purposes */
105 char remote_name[MAXNAMELEN]; /* Peer's name for authentication */
106 int explicit_remote = 0; /* User specified explicit remote name */
107 int usehostname = 0; /* Use hostname for our_name */
108 int disable_defaultip = 0; /* Don't use hostname for default IP adrs */
109 int demand = 0; /* do dial-on-demand */
110 char *ipparam = NULL; /* Extra parameter for ip up/down scripts */
111 int cryptpap; /* Passwords in pap-secrets are encrypted */
112 int idle_time_limit = 0; /* Disconnect if idle for this many seconds */
113 int holdoff = 30; /* # seconds to pause before reconnecting */
114 int refuse_pap = 0; /* Set to say we won't do PAP */
115 int refuse_chap = 0; /* Set to say we won't do CHAP */
118 int ms_lanman = 0; /* Nonzero if use LanMan password instead of NT */
119 /* Has meaning only with MS-CHAP challenges */
122 struct option_info auth_req_info;
123 struct option_info connector_info;
124 struct option_info disconnector_info;
125 struct option_info welcomer_info;
126 struct option_info devnam_info;
128 struct bpf_program pass_filter;/* Filter program for packets to pass */
129 struct bpf_program active_filter; /* Filter program for link-active pkts */
130 pcap_t pc; /* Fake struct pcap so we can compile expr */
136 static int setdevname(char *, int);
137 static int setspeed(char *);
138 static int setdebug(char **);
139 static int setkdebug(char **);
140 static int setpassive(char **);
141 static int setsilent(char **);
142 static int noopt(char **);
143 static int setnovj(char **);
144 static int setnovjccomp(char **);
145 static int setvjslots(char **);
146 static int reqpap(char **);
147 static int nopap(char **);
149 static int setupapfile(char **);
151 static int nochap(char **);
152 static int reqchap(char **);
153 static int noaccomp(char **);
154 static int noasyncmap(char **);
155 static int noip(char **);
156 static int nomagicnumber(char **);
157 static int setasyncmap(char **);
158 static int setescape(char **);
159 static int setmru(char **);
160 static int setmtu(char **);
162 static int setcbcp(char **);
164 static int nomru(char **);
165 static int nopcomp(char **);
166 static int setconnector(char **);
167 static int setdisconnector(char **);
168 static int setwelcomer(char **);
169 static int setmaxcon(char **);
170 static int setmaxconnect(char **);
171 static int setdomain(char **);
172 static int setnetmask(char **);
173 static int setcrtscts(char **);
174 static int setnocrtscts(char **);
175 static int setxonxoff(char **);
176 static int setnodetach(char **);
177 static int setupdetach(char **);
178 static int setmodem(char **);
179 static int setlocal(char **);
180 static int setlock(char **);
181 static int setname(char **);
182 static int setuser(char **);
183 static int setremote(char **);
184 static int setauth(char **);
185 static int setnoauth(char **);
186 static int readfile(char **);
187 static int callfile(char **);
188 static int setdefaultroute(char **);
189 static int setnodefaultroute(char **);
190 static int setproxyarp(char **);
191 static int setnoproxyarp(char **);
192 static int setpersist(char **);
193 static int setnopersist(char **);
194 static int setdologin(char **);
195 static int setusehostname(char **);
196 static int setnoipdflt(char **);
197 static int setlcptimeout(char **);
198 static int setlcpterm(char **);
199 static int setlcpconf(char **);
200 static int setlcpfails(char **);
201 static int setipcptimeout(char **);
202 static int setipcpterm(char **);
203 static int setipcpconf(char **);
204 static int setipcpfails(char **);
205 static int setpaptimeout(char **);
206 static int setpapreqs(char **);
207 static int setpapreqtime(char **);
208 static int setchaptimeout(char **);
209 static int setchapchal(char **);
210 static int setchapintv(char **);
211 static int setipcpaccl(char **);
212 static int setipcpaccr(char **);
213 static int setlcpechointv(char **);
214 static int setlcpechofails(char **);
215 static int noccp(char **);
216 static int setbsdcomp(char **);
217 static int setnobsdcomp(char **);
218 static int setdeflate(char **);
219 static int setnodeflate(char **);
220 static int setnodeflatedraft(char **);
221 static int setdemand(char **);
222 static int setpred1comp(char **);
223 static int setnopred1comp(char **);
224 static int setipparam(char **);
225 static int setpapcrypt(char **);
226 static int setidle(char **);
227 static int setholdoff(char **);
228 static int setdnsaddr(char **);
229 static int resetipxproto(char **);
230 static int setwinsaddr(char **);
231 static int showversion(char **);
232 static int showhelp(char **);
235 static int setpdebug(char **);
236 static int setpassfilter(char **);
237 static int setactivefilter(char **);
241 static int setipxproto(char **);
242 static int setipxanet(char **);
243 static int setipxalcl(char **);
244 static int setipxarmt(char **);
245 static int setipxnetwork(char **);
246 static int setipxnode(char **);
247 static int setipxrouter(char **);
248 static int setipxname(char **);
249 static int setipxcptimeout(char **);
250 static int setipxcpterm(char **);
251 static int setipxcpconf(char **);
252 static int setipxcpfails(char **);
253 #endif /* IPX_CHANGE */
256 static int setmslanman(char **);
259 static int number_option(char *, u_int32_t *, int);
260 static int int_option(char *, int *);
261 static int readable(int fd);
269 int (*cmd_func)(char **);
271 {"-all", 0, noopt}, /* Don't request/allow any options (useless) */
272 {"noaccomp", 0, noaccomp}, /* Disable Address/Control compression */
273 {"-ac", 0, noaccomp}, /* Disable Address/Control compress */
274 {"default-asyncmap", 0, noasyncmap}, /* Disable asyncmap negoatiation */
275 {"-am", 0, noasyncmap}, /* Disable asyncmap negotiation */
276 {"-as", 1, setasyncmap}, /* set the desired async map */
277 {"-d", 0, setdebug}, /* Increase debugging level */
278 {"nodetach", 0, setnodetach}, /* Don't detach from controlling tty */
279 {"-detach", 0, setnodetach}, /* don't fork */
280 {"updetach", 0, setupdetach}, /* Detach once an NP has come up */
281 {"noip", 0, noip}, /* Disable IP and IPCP */
282 {"-ip", 0, noip}, /* Disable IP and IPCP */
283 {"nomagic", 0, nomagicnumber}, /* Disable magic number negotiation */
284 {"-mn", 0, nomagicnumber}, /* Disable magic number negotiation */
285 {"default-mru", 0, nomru}, /* Disable MRU negotiation */
286 {"-mru", 0, nomru}, /* Disable mru negotiation */
287 {"-p", 0, setpassive}, /* Set passive mode */
288 {"nopcomp", 0, nopcomp}, /* Disable protocol field compression */
289 {"-pc", 0, nopcomp}, /* Disable protocol field compress */
291 {"+ua", 1, setupapfile}, /* Get PAP user and password from file */
293 {"require-pap", 0, reqpap}, /* Require PAP authentication from peer */
294 {"+pap", 0, reqpap}, /* Require PAP auth from peer */
295 {"refuse-pap", 0, nopap}, /* Don't agree to auth to peer with PAP */
296 {"-pap", 0, nopap}, /* Don't allow UPAP authentication with peer */
297 {"require-chap", 0, reqchap}, /* Require CHAP authentication from peer */
298 {"+chap", 0, reqchap}, /* Require CHAP authentication from peer */
299 {"refuse-chap", 0, nochap}, /* Don't agree to auth to peer with CHAP */
300 {"-chap", 0, nochap}, /* Don't allow CHAP authentication with peer */
301 {"novj", 0, setnovj}, /* Disable VJ compression */
302 {"-vj", 0, setnovj}, /* disable VJ compression */
303 {"novjccomp", 0, setnovjccomp}, /* disable VJ connection-ID compression */
304 {"-vjccomp", 0, setnovjccomp}, /* disable VJ connection-ID compression */
305 {"vj-max-slots", 1, setvjslots}, /* Set maximum VJ header slots */
306 {"asyncmap", 1, setasyncmap}, /* set the desired async map */
307 {"escape", 1, setescape}, /* set chars to escape on transmission */
308 {"connect", 1, setconnector}, /* A program to set up a connection */
309 {"disconnect", 1, setdisconnector}, /* program to disconnect serial dev. */
310 {"welcome", 1, setwelcomer},/* Script to welcome client */
311 {"connect-max-attempts", 1, setmaxcon}, /* maximum # connect attempts */
312 {"maxconnect", 1, setmaxconnect}, /* specify a maximum connect time */
313 {"crtscts", 0, setcrtscts}, /* set h/w flow control */
314 {"nocrtscts", 0, setnocrtscts}, /* clear h/w flow control */
315 {"-crtscts", 0, setnocrtscts}, /* clear h/w flow control */
316 {"xonxoff", 0, setxonxoff}, /* set s/w flow control */
317 {"debug", 0, setdebug}, /* Increase debugging level */
318 {"kdebug", 1, setkdebug}, /* Enable kernel-level debugging */
319 {"domain", 1, setdomain}, /* Add given domain name to hostname*/
320 {"mru", 1, setmru}, /* Set MRU value for negotiation */
321 {"mtu", 1, setmtu}, /* Set our MTU */
323 {"callback", 1, setcbcp}, /* Ask for callback */
325 {"netmask", 1, setnetmask}, /* set netmask */
326 {"passive", 0, setpassive}, /* Set passive mode */
327 {"silent", 0, setsilent}, /* Set silent mode */
328 {"modem", 0, setmodem}, /* Use modem control lines */
329 {"local", 0, setlocal}, /* Don't use modem control lines */
330 {"lock", 0, setlock}, /* Lock serial device (with lock file) */
331 {"name", 1, setname}, /* Set local name for authentication */
332 {"user", 1, setuser}, /* Set name for auth with peer */
333 {"usehostname", 0, setusehostname}, /* Must use hostname for auth. */
334 {"remotename", 1, setremote}, /* Set remote name for authentication */
335 {"auth", 0, setauth}, /* Require authentication from peer */
336 {"noauth", 0, setnoauth}, /* Don't require peer to authenticate */
337 {"file", 1, readfile}, /* Take options from a file */
338 {"call", 1, callfile}, /* Take options from a privileged file */
339 {"defaultroute", 0, setdefaultroute}, /* Add default route */
340 {"nodefaultroute", 0, setnodefaultroute}, /* disable defaultroute option */
341 {"-defaultroute", 0, setnodefaultroute}, /* disable defaultroute option */
342 {"proxyarp", 0, setproxyarp}, /* Add proxy ARP entry */
343 {"noproxyarp", 0, setnoproxyarp}, /* disable proxyarp option */
344 {"-proxyarp", 0, setnoproxyarp}, /* disable proxyarp option */
345 {"persist", 0, setpersist}, /* Keep on reopening connection after close */
346 {"nopersist", 0, setnopersist}, /* Turn off persist option */
347 {"demand", 0, setdemand}, /* Dial on demand */
348 {"login", 0, setdologin}, /* Use system password database for UPAP */
349 {"noipdefault", 0, setnoipdflt}, /* Don't use name for default IP adrs */
350 {"lcp-echo-failure", 1, setlcpechofails}, /* consecutive echo failures */
351 {"lcp-echo-interval", 1, setlcpechointv}, /* time for lcp echo events */
352 {"lcp-restart", 1, setlcptimeout}, /* Set timeout for LCP */
353 {"lcp-max-terminate", 1, setlcpterm}, /* Set max #xmits for term-reqs */
354 {"lcp-max-configure", 1, setlcpconf}, /* Set max #xmits for conf-reqs */
355 {"lcp-max-failure", 1, setlcpfails}, /* Set max #conf-naks for LCP */
356 {"ipcp-restart", 1, setipcptimeout}, /* Set timeout for IPCP */
357 {"ipcp-max-terminate", 1, setipcpterm}, /* Set max #xmits for term-reqs */
358 {"ipcp-max-configure", 1, setipcpconf}, /* Set max #xmits for conf-reqs */
359 {"ipcp-max-failure", 1, setipcpfails}, /* Set max #conf-naks for IPCP */
360 {"pap-restart", 1, setpaptimeout}, /* Set retransmit timeout for PAP */
361 {"pap-max-authreq", 1, setpapreqs}, /* Set max #xmits for auth-reqs */
362 {"pap-timeout", 1, setpapreqtime}, /* Set time limit for peer PAP auth. */
363 {"chap-restart", 1, setchaptimeout}, /* Set timeout for CHAP */
364 {"chap-max-challenge", 1, setchapchal}, /* Set max #xmits for challenge */
365 {"chap-interval", 1, setchapintv}, /* Set interval for rechallenge */
366 {"ipcp-accept-local", 0, setipcpaccl}, /* Accept peer's address for us */
367 {"ipcp-accept-remote", 0, setipcpaccr}, /* Accept peer's address for it */
368 {"noccp", 0, noccp}, /* Disable CCP negotiation */
369 {"-ccp", 0, noccp}, /* Disable CCP negotiation */
370 {"bsdcomp", 1, setbsdcomp}, /* request BSD-Compress */
371 {"nobsdcomp", 0, setnobsdcomp}, /* don't allow BSD-Compress */
372 {"-bsdcomp", 0, setnobsdcomp}, /* don't allow BSD-Compress */
373 {"deflate", 1, setdeflate}, /* request Deflate compression */
374 {"nodeflate", 0, setnodeflate}, /* don't allow Deflate compression */
375 {"-deflate", 0, setnodeflate}, /* don't allow Deflate compression */
376 {"nodeflatedraft", 0, setnodeflatedraft}, /* don't use draft deflate # */
377 {"predictor1", 0, setpred1comp}, /* request Predictor-1 */
378 {"nopredictor1", 0, setnopred1comp},/* don't allow Predictor-1 */
379 {"-predictor1", 0, setnopred1comp}, /* don't allow Predictor-1 */
380 {"ipparam", 1, setipparam}, /* set ip script parameter */
381 {"papcrypt", 0, setpapcrypt}, /* PAP passwords encrypted */
382 {"idle", 1, setidle}, /* idle time limit (seconds) */
383 {"holdoff", 1, setholdoff}, /* set holdoff time (seconds) */
384 /* backwards compat hack */
385 {"dns1", 1, setdnsaddr}, /* DNS address for the peer's use */
386 {"dns2", 1, setdnsaddr}, /* DNS address for the peer's use */
387 /* end compat hack */
388 {"ms-dns", 1, setdnsaddr}, /* DNS address for the peer's use */
389 {"ms-wins", 1, setwinsaddr}, /* Nameserver for SMB over TCP/IP for peer */
390 {"noipx", 0, resetipxproto}, /* Disable IPXCP (and IPX) */
391 {"-ipx", 0, resetipxproto}, /* Disable IPXCP (and IPX) */
392 {"--version", 0, showversion}, /* Show version number */
393 {"--help", 0, showhelp}, /* Show brief listing of options */
394 {"-h", 0, showhelp}, /* ditto */
397 {"pdebug", 1, setpdebug}, /* libpcap debugging */
398 {"pass-filter", 1, setpassfilter}, /* set filter for packets to pass */
399 {"active-filter", 1, setactivefilter}, /* set filter for active pkts */
403 {"ipx-network", 1, setipxnetwork}, /* IPX network number */
404 {"ipxcp-accept-network", 0, setipxanet}, /* Accept peer netowrk */
405 {"ipx-node", 1, setipxnode}, /* IPX node number */
406 {"ipxcp-accept-local", 0, setipxalcl}, /* Accept our address */
407 {"ipxcp-accept-remote", 0, setipxarmt}, /* Accept peer's address */
408 {"ipx-routing", 1, setipxrouter}, /* IPX routing proto number */
409 {"ipx-router-name", 1, setipxname}, /* IPX router name */
410 {"ipxcp-restart", 1, setipxcptimeout}, /* Set timeout for IPXCP */
411 {"ipxcp-max-terminate", 1, setipxcpterm}, /* max #xmits for term-reqs */
412 {"ipxcp-max-configure", 1, setipxcpconf}, /* max #xmits for conf-reqs */
413 {"ipxcp-max-failure", 1, setipxcpfails}, /* max #conf-naks for IPXCP */
415 {"ipx-compression", 1, setipxcompression}, /* IPX compression number */
417 {"ipx", 0, setipxproto}, /* Enable IPXCP (and IPX) */
418 {"+ipx", 0, setipxproto}, /* Enable IPXCP (and IPX) */
419 #endif /* IPX_CHANGE */
422 {"ms-lanman", 0, setmslanman}, /* Use LanMan psswd when using MS-CHAP */
429 #ifndef IMPLEMENTATION
430 #define IMPLEMENTATION ""
433 static const char usage_string[] = "\
434 pppd version %s patch level %d%s\n\
435 Usage: %s [ options ], where options are:\n\
436 <device> Communicate over the named device\n\
437 <speed> Set the baud rate to <speed>\n\
438 <loc>:<rem> Set the local and/or remote interface IP\n\
439 addresses. Either one may be omitted.\n\
440 asyncmap <n> Set the desired async map to hex <n>\n\
441 auth Require authentication from peer\n\
442 connect <p> Invoke shell command <p> to set up the serial line\n\
443 crtscts Use hardware RTS/CTS flow control\n\
444 defaultroute Add default route through interface\n\
445 file <f> Take options from file <f>\n\
446 modem Use modem control lines\n\
447 mru <n> Set MRU value to <n> for negotiation\n\
448 See pppd(8) for more options.\n\
451 static char *current_option; /* the name of the option being parsed */
452 static int privileged_option; /* set iff the current option came from root */
453 static char *option_source; /* string saying where the option came from */
456 * parse_args - parse a string of arguments from the command line.
459 parse_args(argc, argv)
467 privileged_option = privileged;
468 option_source = "command line";
474 * First see if it's a command.
476 for (cmdp = cmds; cmdp->cmd_name; cmdp++)
477 if (!strcmp(arg, cmdp->cmd_name))
480 if (cmdp->cmd_name != NULL) {
481 if (argc < cmdp->num_args) {
482 option_error("too few parameters for option %s", arg);
485 current_option = arg;
486 if (!(*cmdp->cmd_func)(argv))
488 argc -= cmdp->num_args;
489 argv += cmdp->num_args;
493 * Maybe a tty name, speed or IP address?
495 if ((ret = setdevname(arg, 0)) == 0
496 && (ret = setspeed(arg)) == 0
497 && (ret = setipaddr(arg)) == 0) {
498 option_error("unrecognized option '%s'", arg);
502 if (ret < 0) /* error */
510 * scan_args - scan the command line arguments to get the tty name,
514 scan_args(argc, argv)
525 /* Skip options and their arguments */
526 for (cmdp = cmds; cmdp->cmd_name; cmdp++)
527 if (!strcmp(arg, cmdp->cmd_name))
530 if (cmdp->cmd_name != NULL) {
531 argc -= cmdp->num_args;
532 argv += cmdp->num_args;
536 /* Check if it's a tty name and copy it if so */
537 (void) setdevname(arg, 1);
542 * usage - print out a message telling how to use the program.
547 if (phase == PHASE_INITIALIZE)
548 fprintf(stderr, usage_string, VERSION, PATCHLEVEL, IMPLEMENTATION,
553 * showhelp - print out usage message and exit.
559 if (phase == PHASE_INITIALIZE) {
567 * showversion - print out the version number and exit.
573 if (phase == PHASE_INITIALIZE) {
574 fprintf(stderr, "pppd version %s patch level %d%s\n",
575 VERSION, PATCHLEVEL, IMPLEMENTATION);
582 * options_from_file - Read a string of options from a file,
583 * and interpret them.
586 options_from_file(filename, must_exist, check_prot, priv)
597 char args[MAXARGS][MAXWORDLEN];
598 char cmd[MAXWORDLEN];
600 if ((f = fopen(filename, "r")) == NULL) {
601 if (!must_exist && errno == ENOENT)
603 option_error("Can't open options file %s: %m", filename);
606 if (check_prot && !readable(fileno(f))) {
607 option_error("Can't open options file %s: access denied", filename);
612 oldpriv = privileged_option;
613 privileged_option = priv;
615 while (getword(f, cmd, &newline, filename)) {
617 * First see if it's a command.
619 for (cmdp = cmds; cmdp->cmd_name; cmdp++)
620 if (!strcmp(cmd, cmdp->cmd_name))
623 if (cmdp->cmd_name != NULL) {
624 for (i = 0; i < cmdp->num_args; ++i) {
625 if (!getword(f, args[i], &newline, filename)) {
627 "In file %s: too few parameters for option '%s'",
633 current_option = cmd;
634 if (!(*cmdp->cmd_func)(argv))
639 * Maybe a tty name, speed or IP address?
641 if ((i = setdevname(cmd, 0)) == 0
642 && (i = setspeed(cmd)) == 0
643 && (i = setipaddr(cmd)) == 0) {
644 option_error("In file %s: unrecognized option '%s'",
648 if (i < 0) /* error */
656 privileged_option = oldpriv;
661 * options_from_user - See if the use has a ~/.ppprc file,
662 * and if so, interpret options from it.
667 char *user, *path, *file;
671 pw = getpwuid(getuid());
672 if (pw == NULL || (user = pw->pw_dir) == NULL || user[0] == 0)
674 file = _PATH_USEROPT;
675 path = malloc(strlen(user) + strlen(file) + 2);
677 novm("init file name");
681 ret = options_from_file(path, 0, 1, privileged);
687 * options_for_tty - See if an options file exists for the serial
688 * device, and if so, interpret options from it.
693 char *dev, *path, *p;
697 if (strncmp(dev, _PATH_DEV, sizeof _PATH_DEV - 1) == 0)
699 if (strcmp(dev, "tty") == 0)
700 return 1; /* don't look for /etc/ppp/options.tty */
701 path = malloc(strlen(_PATH_TTYOPT) + strlen(dev) + 1);
703 novm("tty init file name");
704 strcpy(path, _PATH_TTYOPT);
705 /* Turn slashes into dots, for Solaris case (e.g. /dev/term/a) */
706 for (p = path + strlen(path); *dev != 0; ++dev)
707 *p++ = (*dev == '/'? '.': *dev);
709 ret = options_from_file(path, 0, 0, 1);
715 * option_error - print a message about an error in an option.
716 * The message is logged, and also sent to
717 * stderr if phase == PHASE_INITIALIZE.
720 option_error __V((char *fmt, ...))
730 fmt = va_arg(args, char *);
732 vfmtmsg(buf, sizeof(buf), fmt, args);
734 if (phase == PHASE_INITIALIZE)
735 fprintf(stderr, "%s: %s\n", progname, buf);
736 syslog(LOG_ERR, "%s", buf);
740 * readable - check if a file is readable by the real user.
749 GIDSET_TYPE groups[NGROUPS_MAX];
754 if (fstat(fd, &sbuf) != 0)
756 if (sbuf.st_uid == uid)
757 return sbuf.st_mode & S_IRUSR;
758 if (sbuf.st_gid == getgid())
759 return sbuf.st_mode & S_IRGRP;
760 ngroups = getgroups(NGROUPS_MAX, groups);
761 for (i = 0; i < ngroups; ++i)
762 if (sbuf.st_gid == groups[i])
763 return sbuf.st_mode & S_IRGRP;
764 return sbuf.st_mode & S_IROTH;
768 * Read a word from a file.
769 * Words are delimited by white-space or by quotes (" or ').
770 * Quotes, white-space and \ may be escaped with \.
771 * \<newline> is ignored.
774 getword(f, word, newlinep, filename)
782 int value, digit, got, n;
784 #define isoctal(c) ((c) >= '0' && (c) < '8')
792 * First skip white-space and comments.
800 * A newline means the end of a comment; backslash-newline
801 * is ignored. Note that we cannot have escape && comment.
813 * Ignore characters other than newline in a comment.
819 * If this character is escaped, we have a word start.
825 * If this is the escape character, look at the next character.
833 * If this is the start of a comment, ignore the rest of the line.
841 * A non-whitespace character is the start of a word.
848 * Save the delimiter for quoted strings.
850 if (!escape && (c == '"' || c == '\'')) {
857 * Process characters until the end of the word.
862 * This character is escaped: backslash-newline is ignored,
863 * various other characters indicate particular values
864 * as for C backslash-escapes.
899 * \ddd octal sequence
902 for (n = 0; n < 3 && isoctal(c); ++n) {
903 value = (value << 3) + (c & 07);
912 * \x<hex_string> sequence
916 for (n = 0; n < 2 && isxdigit(c); ++n) {
917 digit = toupper(c) - '0';
919 digit += '0' + 10 - 'A';
920 value = (value << 4) + digit;
928 * Otherwise the character stands for itself.
935 * Store the resulting character for the escape sequence.
937 if (len < MAXWORDLEN-1)
948 * Not escaped: see if we've reached the end of the word.
954 if (isspace(c) || c == '#') {
961 * Backslash starts an escape sequence.
970 * An ordinary character: store it in the word and get another.
972 if (len < MAXWORDLEN-1)
980 * End of the word: check for errors.
986 option_error("Error reading %s: %m", filename);
990 * If len is zero, then we didn't find a word before the
998 * Warn if the word was too long, and append a terminating null.
1000 if (len >= MAXWORDLEN) {
1001 option_error("warning: word in file %s too long (%.20s...)",
1003 len = MAXWORDLEN - 1;
1014 * number_option - parse an unsigned numeric parameter for an option.
1017 number_option(str, valp, base)
1024 *valp = strtoul(str, &ptr, base);
1026 option_error("invalid numeric parameter '%s' for %s option",
1027 str, current_option);
1035 * int_option - like number_option, but valp is int *,
1036 * the base is assumed to be 0, and *valp is not changed
1037 * if there is an error.
1040 int_option(str, valp)
1046 if (!number_option(str, &v, 0))
1054 * The following procedures parse options.
1058 * readfile - take commands from a file.
1064 return options_from_file(*argv, 1, 1, privileged_option);
1068 * callfile - take commands from /etc/ppp/peers/<name>.
1069 * Name may not contain /../, start with / or ../, or end in /..
1075 char *fname, *arg, *p;
1080 if (arg[0] == '/' || arg[0] == 0)
1083 for (p = arg; *p != 0; ) {
1084 if (p[0] == '.' && p[1] == '.' && (p[2] == '/' || p[2] == 0)) {
1088 while (*p != '/' && *p != 0)
1095 option_error("call option value may not contain .. or start with /");
1099 l = strlen(arg) + strlen(_PATH_PEERFILES) + 1;
1100 if ((fname = (char *) malloc(l)) == NULL)
1101 novm("call file name");
1102 strcpy(fname, _PATH_PEERFILES);
1105 ok = options_from_file(fname, 1, 1, 1);
1113 * setdebug - Set debug (command line argument).
1124 * setkdebug - Set kernel debugging level.
1130 return int_option(*argv, &kdebugflag);
1135 * setpdebug - Set libpcap debugging level.
1141 return int_option(*argv, &dflag);
1145 * setpassfilter - Set the pass filter for packets
1151 pc.linktype = DLT_PPP;
1152 pc.snapshot = PPP_HDRLEN;
1154 if (pcap_compile(&pc, &pass_filter, *argv, 1, netmask) == 0)
1156 option_error("error in pass-filter expression: %s\n", pcap_geterr(&pc));
1161 * setactivefilter - Set the active filter for packets
1164 setactivefilter(argv)
1167 pc.linktype = DLT_PPP;
1168 pc.snapshot = PPP_HDRLEN;
1170 if (pcap_compile(&pc, &active_filter, *argv, 1, netmask) == 0)
1172 option_error("error in active-filter expression: %s\n", pcap_geterr(&pc));
1178 * noopt - Disable all options.
1184 BZERO((char *) &lcp_wantoptions[0], sizeof (struct lcp_options));
1185 BZERO((char *) &lcp_allowoptions[0], sizeof (struct lcp_options));
1186 BZERO((char *) &ipcp_wantoptions[0], sizeof (struct ipcp_options));
1187 BZERO((char *) &ipcp_allowoptions[0], sizeof (struct ipcp_options));
1190 BZERO((char *) &ipxcp_wantoptions[0], sizeof (struct ipxcp_options));
1191 BZERO((char *) &ipxcp_allowoptions[0], sizeof (struct ipxcp_options));
1192 #endif /* IPX_CHANGE */
1198 * noaccomp - Disable Address/Control field compression negotiation.
1204 lcp_wantoptions[0].neg_accompression = 0;
1205 lcp_allowoptions[0].neg_accompression = 0;
1211 * noasyncmap - Disable async map negotiation.
1217 lcp_wantoptions[0].neg_asyncmap = 0;
1218 lcp_allowoptions[0].neg_asyncmap = 0;
1224 * noip - Disable IP and IPCP.
1230 ipcp_protent.enabled_flag = 0;
1236 * nomagicnumber - Disable magic number negotiation.
1242 lcp_wantoptions[0].neg_magicnumber = 0;
1243 lcp_allowoptions[0].neg_magicnumber = 0;
1249 * nomru - Disable mru negotiation.
1255 lcp_wantoptions[0].neg_mru = 0;
1256 lcp_allowoptions[0].neg_mru = 0;
1262 * setmru - Set MRU for negotiation.
1270 if (!number_option(*argv, &mru, 0))
1272 lcp_wantoptions[0].mru = mru;
1273 lcp_wantoptions[0].neg_mru = 1;
1279 * setmru - Set the largest MTU we'll use.
1287 if (!number_option(*argv, &mtu, 0))
1289 if (mtu < MINMRU || mtu > MAXMRU) {
1290 option_error("mtu option value of %u is too %s", mtu,
1291 (mtu < MINMRU? "small": "large"));
1294 lcp_allowoptions[0].mru = mtu;
1303 lcp_wantoptions[0].neg_cbcp = 1;
1304 cbcp_protent.enabled_flag = 1;
1305 cbcp[0].us_number = strdup(*argv);
1306 if (cbcp[0].us_number == 0)
1307 novm("callback number");
1308 cbcp[0].us_type |= (1 << CB_CONF_USER);
1309 cbcp[0].us_type |= (1 << CB_CONF_ADMIN);
1315 * nopcomp - Disable Protocol field compression negotiation.
1321 lcp_wantoptions[0].neg_pcompression = 0;
1322 lcp_allowoptions[0].neg_pcompression = 0;
1328 * setpassive - Set passive mode (don't give up if we time out sending
1329 * LCP configure-requests).
1335 lcp_wantoptions[0].passive = 1;
1341 * setsilent - Set silent mode (don't start sending LCP configure-requests
1342 * until we get one from the peer).
1348 lcp_wantoptions[0].silent = 1;
1354 * nopap - Disable PAP authentication with peer.
1366 * reqpap - Require PAP authentication from peer.
1372 lcp_wantoptions[0].neg_upap = 1;
1379 * setupapfile - specifies UPAP info for authenticating with peer.
1388 lcp_allowoptions[0].neg_upap = 1;
1390 /* open user info file */
1391 if ((ufile = fopen(*argv, "r")) == NULL) {
1392 option_error("unable to open user login data file %s", *argv);
1395 if (!readable(fileno(ufile))) {
1396 option_error("%s: access denied", *argv);
1399 check_access(ufile, *argv);
1402 if (fgets(user, MAXNAMELEN - 1, ufile) == NULL
1403 || fgets(passwd, MAXSECRETLEN - 1, ufile) == NULL){
1404 option_error("unable to read user login data file %s", *argv);
1409 /* get rid of newlines */
1411 if (l > 0 && user[l-1] == '\n')
1414 if (l > 0 && passwd[l-1] == '\n')
1422 * nochap - Disable CHAP authentication with peer.
1434 * reqchap - Require CHAP authentication from peer.
1440 lcp_wantoptions[0].neg_chap = 1;
1447 * setnovj - disable vj compression
1453 ipcp_wantoptions[0].neg_vj = 0;
1454 ipcp_allowoptions[0].neg_vj = 0;
1460 * setnovjccomp - disable VJ connection-ID compression
1466 ipcp_wantoptions[0].cflag = 0;
1467 ipcp_allowoptions[0].cflag = 0;
1473 * setvjslots - set maximum number of connection slots for VJ compression
1481 if (!int_option(*argv, &value))
1483 if (value < 2 || value > 16) {
1484 option_error("vj-max-slots value must be between 2 and 16");
1487 ipcp_wantoptions [0].maxslotindex =
1488 ipcp_allowoptions[0].maxslotindex = value - 1;
1494 * setconnector - Set a program to connect to a serial line
1500 connector = strdup(*argv);
1501 if (connector == NULL)
1502 novm("connect script");
1503 connector_info.priv = privileged_option;
1504 connector_info.source = option_source;
1510 * setdisconnector - Set a program to disconnect from the serial line
1513 setdisconnector(argv)
1516 disconnector = strdup(*argv);
1517 if (disconnector == NULL)
1518 novm("disconnect script");
1519 disconnector_info.priv = privileged_option;
1520 disconnector_info.source = option_source;
1526 * setwelcomer - Set a program to welcome a client after connection
1532 welcomer = strdup(*argv);
1533 if (welcomer == NULL)
1534 novm("welcome script");
1535 welcomer_info.priv = privileged_option;
1536 welcomer_info.source = option_source;
1545 return int_option(*argv, &max_con_attempts);
1549 * setmaxconnect - Set the maximum connect time
1557 if (!int_option(*argv, &value))
1560 option_error("maxconnect time must be positive");
1563 if (maxconnect > 0 && (value == 0 || value > maxconnect)) {
1564 option_error("maxconnect time cannot be increased");
1572 * setdomain - Set domain name to append to hostname
1578 if (!privileged_option) {
1579 option_error("using the domain option requires root privilege");
1582 gethostname(hostname, MAXNAMELEN);
1585 strncat(hostname, ".", MAXNAMELEN - strlen(hostname));
1586 strncat(hostname, *argv, MAXNAMELEN - strlen(hostname));
1588 hostname[MAXNAMELEN-1] = 0;
1594 * setasyncmap - add bits to asyncmap (what we request peer to escape).
1602 if (!number_option(*argv, &asyncmap, 16))
1604 lcp_wantoptions[0].asyncmap |= asyncmap;
1605 lcp_wantoptions[0].neg_asyncmap = 1;
1611 * setescape - add chars to the set we escape on transmission.
1623 n = strtol(p, &endp, 16);
1625 option_error("escape parameter contains invalid hex number '%s'",
1630 if (n < 0 || (0x20 <= n && n <= 0x3F) || n == 0x5E || n > 0xFF) {
1631 option_error("can't escape character 0x%x", n);
1634 xmit_accm[0][n >> 5] |= 1 << (n & 0x1F);
1635 while (*p == ',' || *p == ' ')
1643 * setspeed - Set the speed.
1652 spd = strtol(arg, &ptr, 0);
1653 if (ptr == arg || *ptr != 0 || spd == 0)
1661 * setdevname - Set the device name.
1664 setdevname(cp, quiet)
1668 struct stat statbuf;
1669 char dev[MAXPATHLEN];
1674 if (strncmp(_PATH_DEV, cp, sizeof _PATH_DEV - 1) != 0) {
1675 strcpy(dev, _PATH_DEV);
1676 strncat(dev, cp, MAXPATHLEN - sizeof _PATH_DEV - 1);
1677 dev[MAXPATHLEN-1] = 0;
1682 * Check if there is a device by this name.
1684 if (stat(cp, &statbuf) < 0) {
1685 if (errno == ENOENT || quiet)
1687 option_error("Couldn't stat %s: %m", cp);
1691 (void) strncpy(devnam, cp, MAXPATHLEN);
1692 devnam[MAXPATHLEN-1] = 0;
1693 default_device = FALSE;
1694 devnam_info.priv = privileged_option;
1695 devnam_info.source = option_source;
1702 * setipaddr - Set the IP address
1710 u_int32_t local, remote;
1711 ipcp_options *wo = &ipcp_wantoptions[0];
1714 * IP address pair separated by ":".
1716 if ((colon = strchr(arg, ':')) == NULL)
1720 * If colon first character, then no local addr.
1724 if ((local = inet_addr(arg)) == -1) {
1725 if ((hp = gethostbyname(arg)) == NULL) {
1726 option_error("unknown host: %s", arg);
1729 local = *(u_int32_t *)hp->h_addr;
1732 if (bad_ip_adrs(local)) {
1733 option_error("bad local IP address %s", ip_ntoa(local));
1737 wo->ouraddr = local;
1742 * If colon last character, then no remote addr.
1744 if (*++colon != '\0') {
1745 if ((remote = inet_addr(colon)) == -1) {
1746 if ((hp = gethostbyname(colon)) == NULL) {
1747 option_error("unknown host: %s", colon);
1750 remote = *(u_int32_t *)hp->h_addr;
1751 if (remote_name[0] == 0) {
1752 strncpy(remote_name, colon, MAXNAMELEN);
1753 remote_name[MAXNAMELEN-1] = 0;
1757 if (bad_ip_adrs(remote)) {
1758 option_error("bad remote IP address %s", ip_ntoa(remote));
1762 wo->hisaddr = remote;
1770 * setnoipdflt - disable setipdefault()
1776 disable_defaultip = 1;
1782 * setipcpaccl - accept peer's idea of our address
1788 ipcp_wantoptions[0].accept_local = 1;
1794 * setipcpaccr - accept peer's idea of its address
1800 ipcp_wantoptions[0].accept_remote = 1;
1806 * setnetmask - set the netmask to be used on the interface.
1812 struct in_addr mask;
1814 if (!inet_aton(*argv, &mask) || (netmask & ~mask.s_addr)) {
1815 fprintf(stderr, "Invalid netmask %s\n", *argv);
1819 netmask = mask.s_addr;
1843 lcp_wantoptions[0].asyncmap |= 0x000A0000; /* escape ^S and ^Q */
1844 lcp_wantoptions[0].neg_asyncmap = 1;
1900 setusehostname(argv)
1911 if (!privileged_option) {
1912 option_error("using the name option requires root privilege");
1915 strncpy(our_name, argv[0], MAXNAMELEN);
1916 our_name[MAXNAMELEN-1] = 0;
1924 strncpy(user, argv[0], MAXNAMELEN);
1925 user[MAXNAMELEN-1] = 0;
1933 strncpy(remote_name, argv[0], MAXNAMELEN);
1934 remote_name[MAXNAMELEN-1] = 0;
1943 if (privileged_option > auth_req_info.priv) {
1944 auth_req_info.priv = privileged_option;
1945 auth_req_info.source = option_source;
1954 if (auth_required && privileged_option < auth_req_info.priv) {
1955 option_error("cannot override auth option set by %s",
1956 auth_req_info.source);
1964 setdefaultroute(argv)
1967 if (!ipcp_allowoptions[0].default_route) {
1968 option_error("defaultroute option is disabled");
1971 ipcp_wantoptions[0].default_route = 1;
1976 setnodefaultroute(argv)
1979 ipcp_allowoptions[0].default_route = 0;
1980 ipcp_wantoptions[0].default_route = 0;
1988 if (!ipcp_allowoptions[0].proxy_arp) {
1989 option_error("proxyarp option is disabled");
1992 ipcp_wantoptions[0].proxy_arp = 1;
2000 ipcp_wantoptions[0].proxy_arp = 0;
2001 ipcp_allowoptions[0].proxy_arp = 0;
2030 * Functions to set the echo interval for modem-less monitors
2034 setlcpechointv(argv)
2037 return int_option(*argv, &lcp_echo_interval);
2041 setlcpechofails(argv)
2044 return int_option(*argv, &lcp_echo_fails);
2048 * Functions to set timeouts, max transmits, etc.
2054 return int_option(*argv, &lcp_fsm[0].timeouttime);
2061 return int_option(*argv, &lcp_fsm[0].maxtermtransmits);
2068 return int_option(*argv, &lcp_fsm[0].maxconfreqtransmits);
2075 return int_option(*argv, &lcp_fsm[0].maxnakloops);
2079 setipcptimeout(argv)
2082 return int_option(*argv, &ipcp_fsm[0].timeouttime);
2089 return int_option(*argv, &ipcp_fsm[0].maxtermtransmits);
2096 return int_option(*argv, &ipcp_fsm[0].maxconfreqtransmits);
2103 return int_option(*argv, &lcp_fsm[0].maxnakloops);
2110 return int_option(*argv, &upap[0].us_timeouttime);
2117 return int_option(*argv, &upap[0].us_reqtimeout);
2124 return int_option(*argv, &upap[0].us_maxtransmits);
2128 setchaptimeout(argv)
2131 return int_option(*argv, &chap[0].timeouttime);
2138 return int_option(*argv, &chap[0].max_transmits);
2145 return int_option(*argv, &chap[0].chal_interval);
2152 ccp_protent.enabled_flag = 0;
2164 abits = rbits = strtol(str, &endp, 0);
2165 if (endp != str && *endp == ',') {
2167 abits = strtol(str, &endp, 0);
2169 if (*endp != 0 || endp == str) {
2170 option_error("invalid parameter '%s' for bsdcomp option", *argv);
2173 if ((rbits != 0 && (rbits < BSD_MIN_BITS || rbits > BSD_MAX_BITS))
2174 || (abits != 0 && (abits < BSD_MIN_BITS || abits > BSD_MAX_BITS))) {
2175 option_error("bsdcomp option values must be 0 or %d .. %d",
2176 BSD_MIN_BITS, BSD_MAX_BITS);
2180 ccp_wantoptions[0].bsd_compress = 1;
2181 ccp_wantoptions[0].bsd_bits = rbits;
2183 ccp_wantoptions[0].bsd_compress = 0;
2185 ccp_allowoptions[0].bsd_compress = 1;
2186 ccp_allowoptions[0].bsd_bits = abits;
2188 ccp_allowoptions[0].bsd_compress = 0;
2196 ccp_wantoptions[0].bsd_compress = 0;
2197 ccp_allowoptions[0].bsd_compress = 0;
2209 abits = rbits = strtol(str, &endp, 0);
2210 if (endp != str && *endp == ',') {
2212 abits = strtol(str, &endp, 0);
2214 if (*endp != 0 || endp == str) {
2215 option_error("invalid parameter '%s' for deflate option", *argv);
2218 if ((rbits != 0 && (rbits < DEFLATE_MIN_SIZE || rbits > DEFLATE_MAX_SIZE))
2219 || (abits != 0 && (abits < DEFLATE_MIN_SIZE
2220 || abits > DEFLATE_MAX_SIZE))) {
2221 option_error("deflate option values must be 0 or %d .. %d",
2222 DEFLATE_MIN_SIZE, DEFLATE_MAX_SIZE);
2226 ccp_wantoptions[0].deflate = 1;
2227 ccp_wantoptions[0].deflate_size = rbits;
2229 ccp_wantoptions[0].deflate = 0;
2231 ccp_allowoptions[0].deflate = 1;
2232 ccp_allowoptions[0].deflate_size = abits;
2234 ccp_allowoptions[0].deflate = 0;
2236 /* XXX copy over settings for switch compatibility */
2237 ccp_wantoptions[0].baddeflate = ccp_wantoptions[0].deflate;
2238 ccp_wantoptions[0].baddeflate_size = ccp_wantoptions[0].deflate_size;
2239 ccp_allowoptions[0].baddeflate = ccp_allowoptions[0].deflate;
2240 ccp_allowoptions[0].baddeflate_size = ccp_allowoptions[0].deflate_size;
2249 ccp_wantoptions[0].deflate = 0;
2250 ccp_allowoptions[0].deflate = 0;
2255 setnodeflatedraft(argv)
2258 ccp_wantoptions[0].deflate_draft = 0;
2259 ccp_allowoptions[0].deflate_draft = 0;
2267 ccp_wantoptions[0].predictor_1 = 1;
2268 ccp_allowoptions[0].predictor_1 = 1;
2273 setnopred1comp(argv)
2276 ccp_wantoptions[0].predictor_1 = 0;
2277 ccp_allowoptions[0].predictor_1 = 0;
2285 ipparam = strdup(*argv);
2286 if (ipparam == NULL)
2287 novm("ipparam string");
2304 return int_option(*argv, &idle_time_limit);
2311 return int_option(*argv, &holdoff);
2315 * setdnsaddr - set the dns address(es)
2324 dns = inet_addr(*argv);
2326 if ((hp = gethostbyname(*argv)) == NULL) {
2327 option_error("invalid address parameter '%s' for ms-dns option",
2331 dns = *(u_int32_t *)hp->h_addr;
2334 /* if there is no primary then update it. */
2335 if (ipcp_allowoptions[0].dnsaddr[0] == 0)
2336 ipcp_allowoptions[0].dnsaddr[0] = dns;
2338 /* always set the secondary address value to the same value. */
2339 ipcp_allowoptions[0].dnsaddr[1] = dns;
2345 * setwinsaddr - set the wins address(es)
2346 * This is primrarly used with the Samba package under UNIX or for pointing
2347 * the caller to the existing WINS server on a Windows NT platform.
2356 wins = inet_addr(*argv);
2358 if ((hp = gethostbyname(*argv)) == NULL) {
2359 option_error("invalid address parameter '%s' for ms-wins option",
2363 wins = *(u_int32_t *)hp->h_addr;
2366 /* if there is no primary then update it. */
2367 if (ipcp_allowoptions[0].winsaddr[0] == 0)
2368 ipcp_allowoptions[0].winsaddr[0] = wins;
2370 /* always set the secondary address value to the same value. */
2371 ipcp_allowoptions[0].winsaddr[1] = wins;
2381 ipxcp_wantoptions[0].neg_router = 1;
2382 ipxcp_allowoptions[0].neg_router = 1;
2383 return int_option(*argv, &ipxcp_wantoptions[0].router);
2390 char *dest = ipxcp_wantoptions[0].name;
2395 ipxcp_wantoptions[0].neg_name = 1;
2396 ipxcp_allowoptions[0].neg_name = 1;
2397 memset (dest, '\0', sizeof (ipxcp_wantoptions[0].name));
2402 if (! isalnum (ch) && ch != '_') {
2403 option_error("IPX router name must be alphanumeric or _");
2407 if (count >= sizeof (ipxcp_wantoptions[0].name)) {
2408 option_error("IPX router name is limited to %d characters",
2409 sizeof (ipxcp_wantoptions[0].name) - 1);
2413 dest[count++] = toupper (ch);
2420 setipxcptimeout (argv)
2423 return int_option(*argv, &ipxcp_fsm[0].timeouttime);
2430 return int_option(*argv, &ipxcp_fsm[0].maxtermtransmits);
2437 return int_option(*argv, &ipxcp_fsm[0].maxconfreqtransmits);
2441 setipxcpfails (argv)
2444 return int_option(*argv, &ipxcp_fsm[0].maxnakloops);
2453 if (!number_option(*argv, &v, 16))
2456 ipxcp_wantoptions[0].our_network = (int) v;
2457 ipxcp_wantoptions[0].neg_nn = 1;
2465 ipxcp_wantoptions[0].accept_network = 1;
2466 ipxcp_allowoptions[0].accept_network = 1;
2474 ipxcp_wantoptions[0].accept_local = 1;
2475 ipxcp_allowoptions[0].accept_local = 1;
2483 ipxcp_wantoptions[0].accept_remote = 1;
2484 ipxcp_allowoptions[0].accept_remote = 1;
2489 setipxnodevalue(src,dst)
2496 if (!isxdigit (*src))
2499 for (indx = 0; indx < 5; ++indx) {
2501 dst[indx] |= (dst[indx + 1] >> 4) & 0x0F;
2504 item = toupper (*src) - '0';
2508 dst[5] = (dst[5] << 4) | item;
2520 memset (&ipxcp_wantoptions[0].our_node[0], 0, 6);
2521 memset (&ipxcp_wantoptions[0].his_node[0], 0, 6);
2523 end = setipxnodevalue (*argv, &ipxcp_wantoptions[0].our_node[0]);
2525 end = setipxnodevalue (++end, &ipxcp_wantoptions[0].his_node[0]);
2528 ipxcp_wantoptions[0].neg_node = 1;
2532 option_error("invalid parameter '%s' for ipx-node option", *argv);
2540 ipxcp_protent.enabled_flag = 1;
2548 ipxcp_protent.enabled_flag = 0;
2559 #endif /* IPX_CHANGE */