xref: /freebsd/usr.sbin/ppp/command.c (revision b601c69bdbe8755d26570261d7fd4c02ee4eff74)
1 /*
2  *		PPP User command processing module
3  *
4  *	    Written by Toshiharu OHNO (tony-o@iij.ad.jp)
5  *
6  *   Copyright (C) 1993, Internet Initiative Japan, Inc. All rights reserverd.
7  *
8  * Redistribution and use in source and binary forms are permitted
9  * provided that the above copyright notice and this paragraph are
10  * duplicated in all such forms and that any documentation,
11  * advertising materials, and other materials related to such
12  * distribution and use acknowledge that the software was developed
13  * by the Internet Initiative Japan, Inc.  The name of the
14  * IIJ may not be used to endorse or promote products derived
15  * from this software without specific prior written permission.
16  * THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR
17  * IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED
18  * WARRANTIES OF MERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE.
19  *
20  * $FreeBSD$
21  *
22  */
23 #include <sys/param.h>
24 #include <netinet/in_systm.h>
25 #include <netinet/in.h>
26 #include <netinet/ip.h>
27 #include <arpa/inet.h>
28 #include <sys/socket.h>
29 #include <net/route.h>
30 #include <netdb.h>
31 #include <sys/un.h>
32 
33 #include <ctype.h>
34 #include <errno.h>
35 #include <fcntl.h>
36 #ifdef __OpenBSD__
37 #include <util.h>
38 #else
39 #include <libutil.h>
40 #endif
41 #include <paths.h>
42 #include <stdio.h>
43 #include <stdlib.h>
44 #include <string.h>
45 #include <sys/wait.h>
46 #include <termios.h>
47 #include <unistd.h>
48 
49 #ifndef NONAT
50 #ifdef LOCALNAT
51 #include "alias.h"
52 #else
53 #include <alias.h>
54 #endif
55 #endif
56 
57 #include "layer.h"
58 #include "defs.h"
59 #include "command.h"
60 #include "mbuf.h"
61 #include "log.h"
62 #include "timer.h"
63 #include "fsm.h"
64 #include "iplist.h"
65 #include "throughput.h"
66 #include "slcompress.h"
67 #include "lqr.h"
68 #include "hdlc.h"
69 #include "lcp.h"
70 #include "ipcp.h"
71 #ifndef NONAT
72 #include "nat_cmd.h"
73 #endif
74 #include "systems.h"
75 #include "filter.h"
76 #include "descriptor.h"
77 #include "main.h"
78 #include "route.h"
79 #include "ccp.h"
80 #include "auth.h"
81 #include "async.h"
82 #include "link.h"
83 #include "physical.h"
84 #include "mp.h"
85 #ifndef NORADIUS
86 #include "radius.h"
87 #endif
88 #include "bundle.h"
89 #include "server.h"
90 #include "prompt.h"
91 #include "chat.h"
92 #include "chap.h"
93 #include "cbcp.h"
94 #include "datalink.h"
95 #include "iface.h"
96 #include "id.h"
97 
98 /* ``set'' values */
99 #define	VAR_AUTHKEY	0
100 #define	VAR_DIAL	1
101 #define	VAR_LOGIN	2
102 #define	VAR_AUTHNAME	3
103 #define	VAR_AUTOLOAD	4
104 #define	VAR_WINSIZE	5
105 #define	VAR_DEVICE	6
106 #define	VAR_ACCMAP	7
107 #define	VAR_MRRU	8
108 #define	VAR_MRU		9
109 #define	VAR_MTU		10
110 #define	VAR_OPENMODE	11
111 #define	VAR_PHONE	12
112 #define	VAR_HANGUP	13
113 #define	VAR_IDLETIMEOUT	14
114 #define	VAR_LQRPERIOD	15
115 #define	VAR_LCPRETRY	16
116 #define	VAR_CHAPRETRY	17
117 #define	VAR_PAPRETRY	18
118 #define	VAR_CCPRETRY	19
119 #define	VAR_IPCPRETRY	20
120 #define	VAR_DNS		21
121 #define	VAR_NBNS	22
122 #define	VAR_MODE	23
123 #define	VAR_CALLBACK	24
124 #define	VAR_CBCP	25
125 #define	VAR_CHOKED	26
126 #define	VAR_SENDPIPE	27
127 #define	VAR_RECVPIPE	28
128 #define	VAR_RADIUS	29
129 #define	VAR_CD		30
130 #define	VAR_PARITY	31
131 #define VAR_CRTSCTS	32
132 #define VAR_URGENTPORTS	33
133 #define	VAR_LOGOUT	34
134 #define	VAR_IFQUEUE	35
135 
136 /* ``accept|deny|disable|enable'' masks */
137 #define NEG_HISMASK (1)
138 #define NEG_MYMASK (2)
139 
140 /* ``accept|deny|disable|enable'' values */
141 #define NEG_ACFCOMP	40
142 #define NEG_CHAP05	41
143 #define NEG_CHAP80	42
144 #define NEG_CHAP80LM	43
145 #define NEG_DEFLATE	44
146 #define NEG_DNS		45
147 #define NEG_ENDDISC	46
148 #define NEG_LQR		47
149 #define NEG_PAP		48
150 #define NEG_PPPDDEFLATE	49
151 #define NEG_PRED1	50
152 #define NEG_PROTOCOMP	51
153 #define NEG_SHORTSEQ	52
154 #define NEG_VJCOMP	53
155 
156 const char Version[] = "2.26";
157 
158 static int ShowCommand(struct cmdargs const *);
159 static int TerminalCommand(struct cmdargs const *);
160 static int QuitCommand(struct cmdargs const *);
161 static int OpenCommand(struct cmdargs const *);
162 static int CloseCommand(struct cmdargs const *);
163 static int DownCommand(struct cmdargs const *);
164 static int SetCommand(struct cmdargs const *);
165 static int LinkCommand(struct cmdargs const *);
166 static int AddCommand(struct cmdargs const *);
167 static int DeleteCommand(struct cmdargs const *);
168 static int NegotiateCommand(struct cmdargs const *);
169 static int ClearCommand(struct cmdargs const *);
170 static int RunListCommand(struct cmdargs const *);
171 static int IfaceAddCommand(struct cmdargs const *);
172 static int IfaceDeleteCommand(struct cmdargs const *);
173 static int IfaceClearCommand(struct cmdargs const *);
174 static int SetProcTitle(struct cmdargs const *);
175 #ifndef NONAT
176 static int NatEnable(struct cmdargs const *);
177 static int NatOption(struct cmdargs const *);
178 #endif
179 
180 static const char *
181 showcx(struct cmdtab const *cmd)
182 {
183   if (cmd->lauth & LOCAL_CX)
184     return "(c)";
185   else if (cmd->lauth & LOCAL_CX_OPT)
186     return "(o)";
187 
188   return "";
189 }
190 
191 static int
192 HelpCommand(struct cmdargs const *arg)
193 {
194   struct cmdtab const *cmd;
195   int n, cmax, dmax, cols, cxlen;
196   const char *cx;
197 
198   if (!arg->prompt) {
199     log_Printf(LogWARN, "help: Cannot help without a prompt\n");
200     return 0;
201   }
202 
203   if (arg->argc > arg->argn) {
204     for (cmd = arg->cmdtab; cmd->name || cmd->alias; cmd++)
205       if ((cmd->lauth & arg->prompt->auth) &&
206           ((cmd->name && !strcasecmp(cmd->name, arg->argv[arg->argn])) ||
207            (cmd->alias && !strcasecmp(cmd->alias, arg->argv[arg->argn])))) {
208 	prompt_Printf(arg->prompt, "%s %s\n", cmd->syntax, showcx(cmd));
209 	return 0;
210       }
211     return -1;
212   }
213 
214   cmax = dmax = 0;
215   for (cmd = arg->cmdtab; cmd->func; cmd++)
216     if (cmd->name && (cmd->lauth & arg->prompt->auth)) {
217       if ((n = strlen(cmd->name) + strlen(showcx(cmd))) > cmax)
218         cmax = n;
219       if ((n = strlen(cmd->helpmes)) > dmax)
220         dmax = n;
221     }
222 
223   cols = 80 / (dmax + cmax + 3);
224   n = 0;
225   prompt_Printf(arg->prompt, "(o) = Optional context,"
226                 " (c) = Context required\n");
227   for (cmd = arg->cmdtab; cmd->func; cmd++)
228     if (cmd->name && (cmd->lauth & arg->prompt->auth)) {
229       cx = showcx(cmd);
230       cxlen = cmax - strlen(cmd->name);
231       if (n % cols != 0)
232         prompt_Printf(arg->prompt, " ");
233       prompt_Printf(arg->prompt, "%s%-*.*s: %-*.*s",
234               cmd->name, cxlen, cxlen, cx, dmax, dmax, cmd->helpmes);
235       if (++n % cols == 0)
236         prompt_Printf(arg->prompt, "\n");
237     }
238   if (n % cols != 0)
239     prompt_Printf(arg->prompt, "\n");
240 
241   return 0;
242 }
243 
244 static int
245 IdentCommand(struct cmdargs const *arg)
246 {
247   int f, pos;
248 
249   *arg->cx->physical->link.lcp.cfg.ident = '\0';
250 
251   for (pos = 0, f = arg->argn; f < arg->argc; f++)
252     pos += snprintf(arg->cx->physical->link.lcp.cfg.ident + pos,
253                     sizeof arg->cx->physical->link.lcp.cfg.ident - pos, "%s%s",
254                     f == arg->argn ? "" : " ", arg->argv[f]);
255 
256   return 0;
257 }
258 
259 static int
260 SendIdentification(struct cmdargs const *arg)
261 {
262   if (arg->cx->state < DATALINK_LCP) {
263     log_Printf(LogWARN, "sendident: link has not reached LCP\n");
264     return 2;
265   }
266   return lcp_SendIdentification(&arg->cx->physical->link.lcp) ? 0 : 1;
267 }
268 
269 static int
270 CloneCommand(struct cmdargs const *arg)
271 {
272   char namelist[LINE_LEN];
273   char *name;
274   int f;
275 
276   if (arg->argc == arg->argn)
277     return -1;
278 
279   namelist[sizeof namelist - 1] = '\0';
280   for (f = arg->argn; f < arg->argc; f++) {
281     strncpy(namelist, arg->argv[f], sizeof namelist - 1);
282     for(name = strtok(namelist, ", "); name; name = strtok(NULL,", "))
283       bundle_DatalinkClone(arg->bundle, arg->cx, name);
284   }
285 
286   return 0;
287 }
288 
289 static int
290 RemoveCommand(struct cmdargs const *arg)
291 {
292   if (arg->argc != arg->argn)
293     return -1;
294 
295   if (arg->cx->state != DATALINK_CLOSED) {
296     log_Printf(LogWARN, "remove: Cannot delete links that aren't closed\n");
297     return 2;
298   }
299 
300   bundle_DatalinkRemove(arg->bundle, arg->cx);
301   return 0;
302 }
303 
304 static int
305 RenameCommand(struct cmdargs const *arg)
306 {
307   if (arg->argc != arg->argn + 1)
308     return -1;
309 
310   if (bundle_RenameDatalink(arg->bundle, arg->cx, arg->argv[arg->argn]))
311     return 0;
312 
313   log_Printf(LogWARN, "%s -> %s: target name already exists\n",
314              arg->cx->name, arg->argv[arg->argn]);
315   return 1;
316 }
317 
318 int
319 LoadCommand(struct cmdargs const *arg)
320 {
321   const char *err;
322   int n, mode;
323 
324   mode = arg->bundle->phys_type.all;
325 
326   if (arg->argn < arg->argc) {
327     for (n = arg->argn; n < arg->argc; n++)
328       if ((err = system_IsValid(arg->argv[n], arg->prompt, mode)) != NULL) {
329         log_Printf(LogWARN, "%s: %s\n", arg->argv[n], err);
330         return 1;
331       }
332 
333     for (n = arg->argn; n < arg->argc; n++) {
334       bundle_SetLabel(arg->bundle, arg->argv[arg->argc - 1]);
335       system_Select(arg->bundle, arg->argv[n], CONFFILE, arg->prompt, arg->cx);
336     }
337     bundle_SetLabel(arg->bundle, arg->argv[arg->argc - 1]);
338   } else if ((err = system_IsValid("default", arg->prompt, mode)) != NULL) {
339     log_Printf(LogWARN, "default: %s\n", err);
340     return 1;
341   } else {
342     bundle_SetLabel(arg->bundle, "default");
343     system_Select(arg->bundle, "default", CONFFILE, arg->prompt, arg->cx);
344     bundle_SetLabel(arg->bundle, "default");
345   }
346 
347   return 0;
348 }
349 
350 int
351 SaveCommand(struct cmdargs const *arg)
352 {
353   log_Printf(LogWARN, "save command is not implemented (yet).\n");
354   return 1;
355 }
356 
357 static int
358 DialCommand(struct cmdargs const *arg)
359 {
360   int res;
361 
362   if ((arg->cx && !(arg->cx->physical->type & (PHYS_INTERACTIVE|PHYS_AUTO)))
363       || (!arg->cx &&
364           (arg->bundle->phys_type.all & ~(PHYS_INTERACTIVE|PHYS_AUTO)))) {
365     log_Printf(LogWARN, "Manual dial is only available for auto and"
366               " interactive links\n");
367     return 1;
368   }
369 
370   if (arg->argc > arg->argn && (res = LoadCommand(arg)) != 0)
371     return res;
372 
373   bundle_Open(arg->bundle, arg->cx ? arg->cx->name : NULL, PHYS_ALL, 1);
374 
375   return 0;
376 }
377 
378 #define isinword(ch) (isalnum(ch) || (ch) == '_')
379 
380 static char *
381 strstrword(char *big, const char *little)
382 {
383   /* Get the first occurance of the word ``little'' in ``big'' */
384   char *pos;
385   int len;
386 
387   pos = big;
388   len = strlen(little);
389 
390   while ((pos = strstr(pos, little)) != NULL)
391     if ((pos != big && isinword(pos[-1])) || isinword(pos[len]))
392       pos++;
393     else if (pos != big && pos[-1] == '\\')
394       memmove(pos - 1, pos, strlen(pos) + 1);
395     else
396       break;
397 
398   return pos;
399 }
400 
401 static char *
402 subst(char *tgt, const char *oldstr, const char *newstr)
403 {
404   /* tgt is a malloc()d area... realloc() as necessary */
405   char *word, *ntgt;
406   int ltgt, loldstr, lnewstr, pos;
407 
408   if ((word = strstrword(tgt, oldstr)) == NULL)
409     return tgt;
410 
411   ltgt = strlen(tgt) + 1;
412   loldstr = strlen(oldstr);
413   lnewstr = strlen(newstr);
414   do {
415     pos = word - tgt;
416     if (loldstr > lnewstr)
417       bcopy(word + loldstr, word + lnewstr, ltgt - pos - loldstr);
418     if (loldstr != lnewstr) {
419       ntgt = realloc(tgt, ltgt += lnewstr - loldstr);
420       if (ntgt == NULL)
421         break;			/* Oh wonderful ! */
422       word = ntgt + pos;
423       tgt = ntgt;
424     }
425     if (lnewstr > loldstr)
426       bcopy(word + loldstr, word + lnewstr, ltgt - pos - loldstr);
427     bcopy(newstr, word, lnewstr);
428   } while ((word = strstrword(word, oldstr)));
429 
430   return tgt;
431 }
432 
433 void
434 command_Expand(char **nargv, int argc, char const *const *oargv,
435                struct bundle *bundle, int inc0, pid_t pid)
436 {
437   int arg;
438   char pidstr[12];
439 
440   if (inc0)
441     arg = 0;		/* Start at arg 0 */
442   else {
443     nargv[0] = strdup(oargv[0]);
444     arg = 1;
445   }
446   snprintf(pidstr, sizeof pidstr, "%d", (int)pid);
447   for (; arg < argc; arg++) {
448     nargv[arg] = strdup(oargv[arg]);
449     nargv[arg] = subst(nargv[arg], "HISADDR",
450                        inet_ntoa(bundle->ncp.ipcp.peer_ip));
451     nargv[arg] = subst(nargv[arg], "AUTHNAME", bundle->cfg.auth.name);
452     nargv[arg] = subst(nargv[arg], "INTERFACE", bundle->iface->name);
453     nargv[arg] = subst(nargv[arg], "MYADDR", inet_ntoa(bundle->ncp.ipcp.my_ip));
454     nargv[arg] = subst(nargv[arg], "USER", bundle->ncp.mp.peer.authname);
455     nargv[arg] = subst(nargv[arg], "PEER_ENDDISC",
456                        mp_Enddisc(bundle->ncp.mp.peer.enddisc.class,
457                                   bundle->ncp.mp.peer.enddisc.address,
458                                   bundle->ncp.mp.peer.enddisc.len));
459     nargv[arg] = subst(nargv[arg], "ENDDISC",
460                        mp_Enddisc(bundle->ncp.mp.cfg.enddisc.class,
461                                   bundle->ncp.mp.cfg.enddisc.address,
462                                   bundle->ncp.mp.cfg.enddisc.len));
463     nargv[arg] = subst(nargv[arg], "PROCESSID", pidstr);
464     nargv[arg] = subst(nargv[arg], "LABEL", bundle_GetLabel(bundle));
465     nargv[arg] = subst(nargv[arg], "DNS0",
466                        inet_ntoa(bundle->ncp.ipcp.ns.dns[0]));
467     nargv[arg] = subst(nargv[arg], "DNS1",
468                        inet_ntoa(bundle->ncp.ipcp.ns.dns[1]));
469     nargv[arg] = subst(nargv[arg], "VERSION", Version);
470     nargv[arg] = subst(nargv[arg], "COMPILATIONDATE", __DATE__);
471   }
472   nargv[arg] = NULL;
473 }
474 
475 static int
476 ShellCommand(struct cmdargs const *arg, int bg)
477 {
478   const char *shell;
479   pid_t shpid, pid;
480 
481 #ifdef SHELL_ONLY_INTERACTIVELY
482   /* we're only allowed to shell when we run ppp interactively */
483   if (arg->prompt && arg->prompt->owner) {
484     log_Printf(LogWARN, "Can't start a shell from a network connection\n");
485     return 1;
486   }
487 #endif
488 
489   if (arg->argc == arg->argn) {
490     if (!arg->prompt) {
491       log_Printf(LogWARN, "Can't start an interactive shell from"
492                 " a config file\n");
493       return 1;
494     } else if (arg->prompt->owner) {
495       log_Printf(LogWARN, "Can't start an interactive shell from"
496                 " a socket connection\n");
497       return 1;
498     } else if (bg) {
499       log_Printf(LogWARN, "Can only start an interactive shell in"
500 		" the foreground mode\n");
501       return 1;
502     }
503   }
504 
505   pid = getpid();
506   if ((shpid = fork()) == 0) {
507     int i, fd;
508 
509     if ((shell = getenv("SHELL")) == 0)
510       shell = _PATH_BSHELL;
511 
512     timer_TermService();
513 
514     if (arg->prompt)
515       fd = arg->prompt->fd_out;
516     else if ((fd = open(_PATH_DEVNULL, O_RDWR)) == -1) {
517       log_Printf(LogALERT, "Failed to open %s: %s\n",
518                 _PATH_DEVNULL, strerror(errno));
519       exit(1);
520     }
521     dup2(fd, STDIN_FILENO);
522     dup2(fd, STDOUT_FILENO);
523     dup2(fd, STDERR_FILENO);
524     for (i = getdtablesize(); i > STDERR_FILENO; i--)
525       fcntl(i, F_SETFD, 1);
526 
527     setuid(ID0realuid());
528     if (arg->argc > arg->argn) {
529       /* substitute pseudo args */
530       char *argv[MAXARGS];
531       int argc = arg->argc - arg->argn;
532 
533       if (argc >= sizeof argv / sizeof argv[0]) {
534         argc = sizeof argv / sizeof argv[0] - 1;
535         log_Printf(LogWARN, "Truncating shell command to %d args\n", argc);
536       }
537       command_Expand(argv, argc, arg->argv + arg->argn, arg->bundle, 0, pid);
538       if (bg) {
539 	pid_t p;
540 
541 	p = getpid();
542 	if (daemon(1, 1) == -1) {
543 	  log_Printf(LogERROR, "%d: daemon: %s\n", (int)p, strerror(errno));
544 	  exit(1);
545 	}
546       } else if (arg->prompt)
547         printf("ppp: Pausing until %s finishes\n", arg->argv[arg->argn]);
548       execvp(argv[0], argv);
549     } else {
550       if (arg->prompt)
551         printf("ppp: Pausing until %s finishes\n", shell);
552       prompt_TtyOldMode(arg->prompt);
553       execl(shell, shell, NULL);
554     }
555 
556     log_Printf(LogWARN, "exec() of %s failed: %s\n",
557               arg->argc > arg->argn ? arg->argv[arg->argn] : shell,
558               strerror(errno));
559     _exit(255);
560   }
561 
562   if (shpid == (pid_t) - 1)
563     log_Printf(LogERROR, "Fork failed: %s\n", strerror(errno));
564   else {
565     int status;
566     waitpid(shpid, &status, 0);
567   }
568 
569   if (arg->prompt && !arg->prompt->owner)
570     prompt_TtyCommandMode(arg->prompt);
571 
572   return 0;
573 }
574 
575 static int
576 BgShellCommand(struct cmdargs const *arg)
577 {
578   if (arg->argc == arg->argn)
579     return -1;
580   return ShellCommand(arg, 1);
581 }
582 
583 static int
584 FgShellCommand(struct cmdargs const *arg)
585 {
586   return ShellCommand(arg, 0);
587 }
588 
589 static int
590 ResolvCommand(struct cmdargs const *arg)
591 {
592   if (arg->argc == arg->argn + 1) {
593     if (!strcasecmp(arg->argv[arg->argn], "reload"))
594       ipcp_LoadDNS(&arg->bundle->ncp.ipcp);
595     else if (!strcasecmp(arg->argv[arg->argn], "restore"))
596       ipcp_RestoreDNS(&arg->bundle->ncp.ipcp);
597     else if (!strcasecmp(arg->argv[arg->argn], "rewrite"))
598       ipcp_WriteDNS(&arg->bundle->ncp.ipcp);
599     else if (!strcasecmp(arg->argv[arg->argn], "readonly"))
600       arg->bundle->ncp.ipcp.ns.writable = 0;
601     else if (!strcasecmp(arg->argv[arg->argn], "writable"))
602       arg->bundle->ncp.ipcp.ns.writable = 1;
603     else
604       return -1;
605 
606     return 0;
607   }
608 
609   return -1;
610 }
611 
612 #ifndef NONAT
613 static struct cmdtab const NatCommands[] =
614 {
615   {"addr", NULL, nat_RedirectAddr, LOCAL_AUTH,
616    "static address translation", "nat addr [addr_local addr_alias]"},
617   {"deny_incoming", NULL, NatOption, LOCAL_AUTH,
618    "stop incoming connections", "nat deny_incoming yes|no",
619    (const void *) PKT_ALIAS_DENY_INCOMING},
620   {"enable", NULL, NatEnable, LOCAL_AUTH,
621    "enable NAT", "nat enable yes|no"},
622   {"log", NULL, NatOption, LOCAL_AUTH,
623    "log NAT link creation", "nat log yes|no",
624    (const void *) PKT_ALIAS_LOG},
625   {"port", NULL, nat_RedirectPort, LOCAL_AUTH, "port redirection",
626    "nat port proto localaddr:port[-port] aliasport[-aliasport]"},
627   {"proxy", NULL, nat_ProxyRule, LOCAL_AUTH,
628    "proxy control", "nat proxy server host[:port] ..."},
629   {"same_ports", NULL, NatOption, LOCAL_AUTH,
630    "try to leave port numbers unchanged", "nat same_ports yes|no",
631    (const void *) PKT_ALIAS_SAME_PORTS},
632   {"target", NULL, nat_SetTarget, LOCAL_AUTH,
633    "Default address for incoming connections", "nat target addr" },
634   {"unregistered_only", NULL, NatOption, LOCAL_AUTH,
635    "translate unregistered (private) IP address space only",
636    "nat unregistered_only yes|no",
637    (const void *) PKT_ALIAS_UNREGISTERED_ONLY},
638   {"use_sockets", NULL, NatOption, LOCAL_AUTH,
639    "allocate host sockets", "nat use_sockets yes|no",
640    (const void *) PKT_ALIAS_USE_SOCKETS},
641   {"help", "?", HelpCommand, LOCAL_AUTH | LOCAL_NO_AUTH,
642    "Display this message", "nat help|? [command]", NatCommands},
643   {NULL, NULL, NULL},
644 };
645 #endif
646 
647 static struct cmdtab const AllowCommands[] = {
648   {"modes", "mode", AllowModes, LOCAL_AUTH,
649   "Only allow certain ppp modes", "allow modes mode..."},
650   {"users", "user", AllowUsers, LOCAL_AUTH,
651   "Only allow ppp access to certain users", "allow users logname..."},
652   {"help", "?", HelpCommand, LOCAL_AUTH | LOCAL_NO_AUTH,
653   "Display this message", "allow help|? [command]", AllowCommands},
654   {NULL, NULL, NULL},
655 };
656 
657 static struct cmdtab const IfaceCommands[] =
658 {
659   {"add", NULL, IfaceAddCommand, LOCAL_AUTH,
660    "Add iface address", "iface add addr[/bits| mask] peer", NULL},
661   {NULL, "add!", IfaceAddCommand, LOCAL_AUTH,
662    "Add or change an iface address", "iface add! addr[/bits| mask] peer",
663    (void *)1},
664   {"clear", NULL, IfaceClearCommand, LOCAL_AUTH,
665    "Clear iface address(es)", "iface clear"},
666   {"delete", "rm", IfaceDeleteCommand, LOCAL_AUTH,
667    "Delete iface address", "iface delete addr", NULL},
668   {NULL, "rm!", IfaceDeleteCommand, LOCAL_AUTH,
669    "Delete iface address", "iface delete addr", (void *)1},
670   {NULL, "delete!", IfaceDeleteCommand, LOCAL_AUTH,
671    "Delete iface address", "iface delete addr", (void *)1},
672   {"show", NULL, iface_Show, LOCAL_AUTH,
673    "Show iface address(es)", "iface show"},
674   {"help", "?", HelpCommand, LOCAL_AUTH | LOCAL_NO_AUTH,
675    "Display this message", "nat help|? [command]", IfaceCommands},
676   {NULL, NULL, NULL},
677 };
678 
679 static struct cmdtab const Commands[] = {
680   {"accept", NULL, NegotiateCommand, LOCAL_AUTH | LOCAL_CX_OPT,
681   "accept option request", "accept option .."},
682   {"add", NULL, AddCommand, LOCAL_AUTH,
683   "add route", "add dest mask gateway", NULL},
684   {NULL, "add!", AddCommand, LOCAL_AUTH,
685   "add or change route", "add! dest mask gateway", (void *)1},
686   {"allow", "auth", RunListCommand, LOCAL_AUTH,
687   "Allow ppp access", "allow users|modes ....", AllowCommands},
688   {"bg", "!bg", BgShellCommand, LOCAL_AUTH,
689   "Run a background command", "[!]bg command"},
690   {"clear", NULL, ClearCommand, LOCAL_AUTH | LOCAL_CX_OPT,
691   "Clear throughput statistics",
692   "clear ipcp|physical [current|overall|peak]..."},
693   {"clone", NULL, CloneCommand, LOCAL_AUTH | LOCAL_CX,
694   "Clone a link", "clone newname..."},
695   {"close", NULL, CloseCommand, LOCAL_AUTH | LOCAL_CX_OPT,
696   "Close an FSM", "close [lcp|ccp]"},
697   {"delete", NULL, DeleteCommand, LOCAL_AUTH,
698   "delete route", "delete dest", NULL},
699   {NULL, "delete!", DeleteCommand, LOCAL_AUTH,
700   "delete a route if it exists", "delete! dest", (void *)1},
701   {"deny", NULL, NegotiateCommand, LOCAL_AUTH | LOCAL_CX_OPT,
702   "Deny option request", "deny option .."},
703   {"dial", "call", DialCommand, LOCAL_AUTH | LOCAL_CX_OPT,
704   "Dial and login", "dial|call [system ...]", NULL},
705   {"disable", NULL, NegotiateCommand, LOCAL_AUTH | LOCAL_CX_OPT,
706   "Disable option", "disable option .."},
707   {"down", NULL, DownCommand, LOCAL_AUTH | LOCAL_CX_OPT,
708   "Generate a down event", "down [ccp|lcp]"},
709   {"enable", NULL, NegotiateCommand, LOCAL_AUTH | LOCAL_CX_OPT,
710   "Enable option", "enable option .."},
711   {"ident", NULL, IdentCommand, LOCAL_AUTH | LOCAL_CX,
712   "Set the link identity", "ident text..."},
713   {"iface", "interface", RunListCommand, LOCAL_AUTH,
714   "interface control", "iface option ...", IfaceCommands},
715   {"link", "datalink", LinkCommand, LOCAL_AUTH,
716   "Link specific commands", "link name command ..."},
717   {"load", NULL, LoadCommand, LOCAL_AUTH | LOCAL_CX_OPT,
718   "Load settings", "load [system ...]"},
719 #ifndef NONAT
720   {"nat", "alias", RunListCommand, LOCAL_AUTH,
721   "NAT control", "nat option yes|no", NatCommands},
722 #endif
723   {"open", NULL, OpenCommand, LOCAL_AUTH | LOCAL_CX_OPT,
724   "Open an FSM", "open! [lcp|ccp|ipcp]", (void *)1},
725   {"passwd", NULL, PasswdCommand, LOCAL_NO_AUTH,
726   "Password for manipulation", "passwd LocalPassword"},
727   {"quit", "bye", QuitCommand, LOCAL_AUTH | LOCAL_NO_AUTH,
728   "Quit PPP program", "quit|bye [all]"},
729   {"remove", "rm", RemoveCommand, LOCAL_AUTH | LOCAL_CX,
730   "Remove a link", "remove"},
731   {"rename", "mv", RenameCommand, LOCAL_AUTH | LOCAL_CX,
732   "Rename a link", "rename name"},
733   {"resolv", NULL, ResolvCommand, LOCAL_AUTH,
734   "Manipulate resolv.conf", "resolv readonly|reload|restore|rewrite|writable"},
735   {"save", NULL, SaveCommand, LOCAL_AUTH,
736   "Save settings", "save"},
737   {"sendident", NULL, SendIdentification, LOCAL_AUTH | LOCAL_CX,
738   "Transmit the link identity", "sendident"},
739   {"set", "setup", SetCommand, LOCAL_AUTH | LOCAL_CX_OPT,
740   "Set parameters", "set[up] var value"},
741   {"shell", "!", FgShellCommand, LOCAL_AUTH,
742   "Run a subshell", "shell|! [sh command]"},
743   {"show", NULL, ShowCommand, LOCAL_AUTH | LOCAL_CX_OPT,
744   "Show status and stats", "show var"},
745   {"term", NULL, TerminalCommand, LOCAL_AUTH | LOCAL_CX,
746   "Enter terminal mode", "term"},
747   {"help", "?", HelpCommand, LOCAL_AUTH | LOCAL_NO_AUTH,
748   "Display this message", "help|? [command]", Commands},
749   {NULL, NULL, NULL},
750 };
751 
752 static int
753 ShowEscape(struct cmdargs const *arg)
754 {
755   if (arg->cx->physical->async.cfg.EscMap[32]) {
756     int code, bit;
757     const char *sep = "";
758 
759     for (code = 0; code < 32; code++)
760       if (arg->cx->physical->async.cfg.EscMap[code])
761 	for (bit = 0; bit < 8; bit++)
762 	  if (arg->cx->physical->async.cfg.EscMap[code] & (1 << bit)) {
763 	    prompt_Printf(arg->prompt, "%s0x%02x", sep, (code << 3) + bit);
764             sep = ", ";
765           }
766     prompt_Printf(arg->prompt, "\n");
767   }
768   return 0;
769 }
770 
771 static int
772 ShowTimerList(struct cmdargs const *arg)
773 {
774   timer_Show(0, arg->prompt);
775   return 0;
776 }
777 
778 static int
779 ShowStopped(struct cmdargs const *arg)
780 {
781   prompt_Printf(arg->prompt, " Stopped Timer:  LCP: ");
782   if (!arg->cx->physical->link.lcp.fsm.StoppedTimer.load)
783     prompt_Printf(arg->prompt, "Disabled");
784   else
785     prompt_Printf(arg->prompt, "%ld secs",
786                   arg->cx->physical->link.lcp.fsm.StoppedTimer.load / SECTICKS);
787 
788   prompt_Printf(arg->prompt, ", CCP: ");
789   if (!arg->cx->physical->link.ccp.fsm.StoppedTimer.load)
790     prompt_Printf(arg->prompt, "Disabled");
791   else
792     prompt_Printf(arg->prompt, "%ld secs",
793                   arg->cx->physical->link.ccp.fsm.StoppedTimer.load / SECTICKS);
794 
795   prompt_Printf(arg->prompt, "\n");
796 
797   return 0;
798 }
799 
800 static int
801 ShowVersion(struct cmdargs const *arg)
802 {
803   prompt_Printf(arg->prompt, "PPP Version %s - %s\n", Version, __DATE__);
804   return 0;
805 }
806 
807 static int
808 ShowProtocolStats(struct cmdargs const *arg)
809 {
810   struct link *l = command_ChooseLink(arg);
811 
812   prompt_Printf(arg->prompt, "%s:\n", l->name);
813   link_ReportProtocolStatus(l, arg->prompt);
814   return 0;
815 }
816 
817 static struct cmdtab const ShowCommands[] = {
818   {"bundle", NULL, bundle_ShowStatus, LOCAL_AUTH,
819   "bundle details", "show bundle"},
820   {"ccp", NULL, ccp_ReportStatus, LOCAL_AUTH | LOCAL_CX_OPT,
821   "CCP status", "show cpp"},
822   {"compress", NULL, sl_Show, LOCAL_AUTH,
823   "VJ compression stats", "show compress"},
824   {"escape", NULL, ShowEscape, LOCAL_AUTH | LOCAL_CX,
825   "escape characters", "show escape"},
826   {"filter", NULL, filter_Show, LOCAL_AUTH,
827   "packet filters", "show filter [in|out|dial|alive]"},
828   {"hdlc", NULL, hdlc_ReportStatus, LOCAL_AUTH | LOCAL_CX,
829   "HDLC errors", "show hdlc"},
830   {"iface", "interface", iface_Show, LOCAL_AUTH,
831   "Interface status", "show iface"},
832   {"ipcp", NULL, ipcp_Show, LOCAL_AUTH,
833   "IPCP status", "show ipcp"},
834   {"layers", NULL, link_ShowLayers, LOCAL_AUTH | LOCAL_CX_OPT,
835   "Protocol layers", "show layers"},
836   {"lcp", NULL, lcp_ReportStatus, LOCAL_AUTH | LOCAL_CX,
837   "LCP status", "show lcp"},
838   {"link", "datalink", datalink_Show, LOCAL_AUTH | LOCAL_CX,
839   "(high-level) link info", "show link"},
840   {"links", NULL, bundle_ShowLinks, LOCAL_AUTH,
841   "available link names", "show links"},
842   {"log", NULL, log_ShowLevel, LOCAL_AUTH,
843   "log levels", "show log"},
844   {"mem", NULL, mbuf_Show, LOCAL_AUTH,
845   "mbuf allocations", "show mem"},
846   {"physical", NULL, physical_ShowStatus, LOCAL_AUTH | LOCAL_CX,
847   "(low-level) link info", "show physical"},
848   {"mp", "multilink", mp_ShowStatus, LOCAL_AUTH,
849   "multilink setup", "show mp"},
850   {"proto", NULL, ShowProtocolStats, LOCAL_AUTH | LOCAL_CX_OPT,
851   "protocol summary", "show proto"},
852   {"route", NULL, route_Show, LOCAL_AUTH,
853   "routing table", "show route"},
854   {"stopped", NULL, ShowStopped, LOCAL_AUTH | LOCAL_CX,
855   "STOPPED timeout", "show stopped"},
856   {"timers", NULL, ShowTimerList, LOCAL_AUTH,
857   "alarm timers", "show timers"},
858   {"version", NULL, ShowVersion, LOCAL_NO_AUTH | LOCAL_AUTH,
859   "version string", "show version"},
860   {"who", NULL, log_ShowWho, LOCAL_AUTH,
861   "client list", "show who"},
862   {"help", "?", HelpCommand, LOCAL_NO_AUTH | LOCAL_AUTH,
863   "Display this message", "show help|? [command]", ShowCommands},
864   {NULL, NULL, NULL},
865 };
866 
867 static struct cmdtab const *
868 FindCommand(struct cmdtab const *cmds, const char *str, int *pmatch)
869 {
870   int nmatch;
871   int len;
872   struct cmdtab const *found;
873 
874   found = NULL;
875   len = strlen(str);
876   nmatch = 0;
877   while (cmds->func) {
878     if (cmds->name && strncasecmp(str, cmds->name, len) == 0) {
879       if (cmds->name[len] == '\0') {
880 	*pmatch = 1;
881 	return cmds;
882       }
883       nmatch++;
884       found = cmds;
885     } else if (cmds->alias && strncasecmp(str, cmds->alias, len) == 0) {
886       if (cmds->alias[len] == '\0') {
887 	*pmatch = 1;
888 	return cmds;
889       }
890       nmatch++;
891       found = cmds;
892     }
893     cmds++;
894   }
895   *pmatch = nmatch;
896   return found;
897 }
898 
899 static const char *
900 mkPrefix(int argc, char const *const *argv, char *tgt, int sz)
901 {
902   int f, tlen, len;
903 
904   tlen = 0;
905   for (f = 0; f < argc && tlen < sz - 2; f++) {
906     if (f)
907       tgt[tlen++] = ' ';
908     len = strlen(argv[f]);
909     if (len > sz - tlen - 1)
910       len = sz - tlen - 1;
911     strncpy(tgt+tlen, argv[f], len);
912     tlen += len;
913   }
914   tgt[tlen] = '\0';
915   return tgt;
916 }
917 
918 static int
919 FindExec(struct bundle *bundle, struct cmdtab const *cmds, int argc, int argn,
920          char const *const *argv, struct prompt *prompt, struct datalink *cx)
921 {
922   struct cmdtab const *cmd;
923   int val = 1;
924   int nmatch;
925   struct cmdargs arg;
926   char prefix[100];
927 
928   cmd = FindCommand(cmds, argv[argn], &nmatch);
929   if (nmatch > 1)
930     log_Printf(LogWARN, "%s: Ambiguous command\n",
931               mkPrefix(argn+1, argv, prefix, sizeof prefix));
932   else if (cmd && (!prompt || (cmd->lauth & prompt->auth))) {
933     if ((cmd->lauth & LOCAL_CX) && !cx)
934       /* We've got no context, but we require it */
935       cx = bundle2datalink(bundle, NULL);
936 
937     if ((cmd->lauth & LOCAL_CX) && !cx)
938       log_Printf(LogWARN, "%s: No context (use the `link' command)\n",
939                 mkPrefix(argn+1, argv, prefix, sizeof prefix));
940     else {
941       if (cx && !(cmd->lauth & (LOCAL_CX|LOCAL_CX_OPT))) {
942         log_Printf(LogWARN, "%s: Redundant context (%s) ignored\n",
943                   mkPrefix(argn+1, argv, prefix, sizeof prefix), cx->name);
944         cx = NULL;
945       }
946       arg.cmdtab = cmds;
947       arg.cmd = cmd;
948       arg.argc = argc;
949       arg.argn = argn+1;
950       arg.argv = argv;
951       arg.bundle = bundle;
952       arg.cx = cx;
953       arg.prompt = prompt;
954       val = (*cmd->func) (&arg);
955     }
956   } else
957     log_Printf(LogWARN, "%s: Invalid command\n",
958               mkPrefix(argn+1, argv, prefix, sizeof prefix));
959 
960   if (val == -1)
961     log_Printf(LogWARN, "Usage: %s\n", cmd->syntax);
962   else if (val)
963     log_Printf(LogWARN, "%s: Failed %d\n",
964               mkPrefix(argn+1, argv, prefix, sizeof prefix), val);
965 
966   return val;
967 }
968 
969 int
970 command_Expand_Interpret(char *buff, int nb, char *argv[MAXARGS], int offset)
971 {
972   char buff2[LINE_LEN-offset];
973 
974   InterpretArg(buff, buff2);
975   strncpy(buff, buff2, LINE_LEN - offset - 1);
976   buff[LINE_LEN - offset - 1] = '\0';
977 
978   return command_Interpret(buff, nb, argv);
979 }
980 
981 int
982 command_Interpret(char *buff, int nb, char *argv[MAXARGS])
983 {
984   char *cp;
985 
986   if (nb > 0) {
987     cp = buff + strcspn(buff, "\r\n");
988     if (cp)
989       *cp = '\0';
990     return MakeArgs(buff, argv, MAXARGS, PARSE_REDUCE);
991   }
992   return 0;
993 }
994 
995 static int
996 arghidden(int argc, char const *const *argv, int n)
997 {
998   /* Is arg n of the given command to be hidden from the log ? */
999 
1000   /* set authkey xxxxx */
1001   /* set key xxxxx */
1002   if (n == 2 && !strncasecmp(argv[0], "se", 2) &&
1003       (!strncasecmp(argv[1], "authk", 5) || !strncasecmp(argv[1], "ke", 2)))
1004     return 1;
1005 
1006   /* passwd xxxxx */
1007   if (n == 1 && !strncasecmp(argv[0], "p", 1))
1008     return 1;
1009 
1010   /* set server port xxxxx .... */
1011   if (n == 3 && !strncasecmp(argv[0], "se", 2) &&
1012       !strncasecmp(argv[1], "se", 2))
1013     return 1;
1014 
1015   return 0;
1016 }
1017 
1018 void
1019 command_Run(struct bundle *bundle, int argc, char const *const *argv,
1020            struct prompt *prompt, const char *label, struct datalink *cx)
1021 {
1022   if (argc > 0) {
1023     if (log_IsKept(LogCOMMAND)) {
1024       char buf[LINE_LEN];
1025       int f, n;
1026 
1027       if (label) {
1028         strncpy(buf, label, sizeof buf - 3);
1029         buf[sizeof buf - 3] = '\0';
1030         strcat(buf, ": ");
1031         n = strlen(buf);
1032       } else {
1033         *buf = '\0';
1034         n = 0;
1035       }
1036       buf[sizeof buf - 1] = '\0';	/* In case we run out of room in buf */
1037 
1038       for (f = 0; f < argc; f++) {
1039         if (n < sizeof buf - 1 && f)
1040           buf[n++] = ' ';
1041         if (arghidden(argc, argv, f))
1042           strncpy(buf+n, "********", sizeof buf - n - 1);
1043         else
1044           strncpy(buf+n, argv[f], sizeof buf - n - 1);
1045         n += strlen(buf+n);
1046       }
1047       log_Printf(LogCOMMAND, "%s\n", buf);
1048     }
1049     FindExec(bundle, Commands, argc, 0, argv, prompt, cx);
1050   }
1051 }
1052 
1053 int
1054 command_Decode(struct bundle *bundle, char *buff, int nb, struct prompt *prompt,
1055               const char *label)
1056 {
1057   int argc;
1058   char *argv[MAXARGS];
1059 
1060   if ((argc = command_Expand_Interpret(buff, nb, argv, 0)) < 0)
1061     return 0;
1062 
1063   command_Run(bundle, argc, (char const *const *)argv, prompt, label, NULL);
1064   return 1;
1065 }
1066 
1067 static int
1068 ShowCommand(struct cmdargs const *arg)
1069 {
1070   if (!arg->prompt)
1071     log_Printf(LogWARN, "show: Cannot show without a prompt\n");
1072   else if (arg->argc > arg->argn)
1073     FindExec(arg->bundle, ShowCommands, arg->argc, arg->argn, arg->argv,
1074              arg->prompt, arg->cx);
1075   else
1076     prompt_Printf(arg->prompt, "Use ``show ?'' to get a list.\n");
1077 
1078   return 0;
1079 }
1080 
1081 static int
1082 TerminalCommand(struct cmdargs const *arg)
1083 {
1084   if (!arg->prompt) {
1085     log_Printf(LogWARN, "term: Need a prompt\n");
1086     return 1;
1087   }
1088 
1089   if (arg->cx->physical->link.lcp.fsm.state > ST_CLOSED) {
1090     prompt_Printf(arg->prompt, "LCP state is [%s]\n",
1091                   State2Nam(arg->cx->physical->link.lcp.fsm.state));
1092     return 1;
1093   }
1094 
1095   datalink_Up(arg->cx, 0, 0);
1096   prompt_TtyTermMode(arg->prompt, arg->cx);
1097   return 0;
1098 }
1099 
1100 static int
1101 QuitCommand(struct cmdargs const *arg)
1102 {
1103   if (!arg->prompt || prompt_IsController(arg->prompt) ||
1104       (arg->argc > arg->argn && !strcasecmp(arg->argv[arg->argn], "all") &&
1105        (arg->prompt->auth & LOCAL_AUTH)))
1106     Cleanup(EX_NORMAL);
1107   if (arg->prompt)
1108     prompt_Destroy(arg->prompt, 1);
1109 
1110   return 0;
1111 }
1112 
1113 static int
1114 OpenCommand(struct cmdargs const *arg)
1115 {
1116   if (arg->argc == arg->argn)
1117     bundle_Open(arg->bundle, arg->cx ? arg->cx->name : NULL, PHYS_ALL, 1);
1118   else if (arg->argc == arg->argn + 1) {
1119     if (!strcasecmp(arg->argv[arg->argn], "lcp")) {
1120       struct datalink *cx = arg->cx ?
1121         arg->cx : bundle2datalink(arg->bundle, NULL);
1122       if (cx) {
1123         if (cx->physical->link.lcp.fsm.state == ST_OPENED)
1124           fsm_Reopen(&cx->physical->link.lcp.fsm);
1125         else
1126           bundle_Open(arg->bundle, cx->name, PHYS_ALL, 1);
1127       } else
1128         log_Printf(LogWARN, "open lcp: You must specify a link\n");
1129     } else if (!strcasecmp(arg->argv[arg->argn], "ccp")) {
1130       struct fsm *fp;
1131 
1132       fp = &command_ChooseLink(arg)->ccp.fsm;
1133       if (fp->link->lcp.fsm.state != ST_OPENED)
1134         log_Printf(LogWARN, "open: LCP must be open before opening CCP\n");
1135       else if (fp->state == ST_OPENED)
1136         fsm_Reopen(fp);
1137       else {
1138         fp->open_mode = 0;	/* Not passive any more */
1139         if (fp->state == ST_STOPPED) {
1140           fsm_Down(fp);
1141           fsm_Up(fp);
1142         } else {
1143           fsm_Up(fp);
1144           fsm_Open(fp);
1145         }
1146       }
1147     } else if (!strcasecmp(arg->argv[arg->argn], "ipcp")) {
1148       if (arg->cx)
1149         log_Printf(LogWARN, "open ipcp: You need not specify a link\n");
1150       if (arg->bundle->ncp.ipcp.fsm.state == ST_OPENED)
1151         fsm_Reopen(&arg->bundle->ncp.ipcp.fsm);
1152       else
1153         bundle_Open(arg->bundle, NULL, PHYS_ALL, 1);
1154     } else
1155       return -1;
1156   } else
1157     return -1;
1158 
1159   return 0;
1160 }
1161 
1162 static int
1163 CloseCommand(struct cmdargs const *arg)
1164 {
1165   if (arg->argc == arg->argn)
1166     bundle_Close(arg->bundle, arg->cx ? arg->cx->name : NULL, CLOSE_STAYDOWN);
1167   else if (arg->argc == arg->argn + 1) {
1168     if (!strcasecmp(arg->argv[arg->argn], "lcp"))
1169       bundle_Close(arg->bundle, arg->cx ? arg->cx->name : NULL, CLOSE_LCP);
1170     else if (!strcasecmp(arg->argv[arg->argn], "ccp") ||
1171              !strcasecmp(arg->argv[arg->argn], "ccp!")) {
1172       struct fsm *fp;
1173 
1174       fp = &command_ChooseLink(arg)->ccp.fsm;
1175       if (fp->state == ST_OPENED) {
1176         fsm_Close(fp);
1177         if (arg->argv[arg->argn][3] == '!')
1178           fp->open_mode = 0;		/* Stay ST_CLOSED */
1179         else
1180           fp->open_mode = OPEN_PASSIVE;	/* Wait for the peer to start */
1181       }
1182     } else
1183       return -1;
1184   } else
1185     return -1;
1186 
1187   return 0;
1188 }
1189 
1190 static int
1191 DownCommand(struct cmdargs const *arg)
1192 {
1193   if (arg->argc == arg->argn) {
1194       if (arg->cx)
1195         datalink_Down(arg->cx, CLOSE_STAYDOWN);
1196       else
1197         bundle_Down(arg->bundle, CLOSE_STAYDOWN);
1198   } else if (arg->argc == arg->argn + 1) {
1199     if (!strcasecmp(arg->argv[arg->argn], "lcp")) {
1200       if (arg->cx)
1201         datalink_Down(arg->cx, CLOSE_LCP);
1202       else
1203         bundle_Down(arg->bundle, CLOSE_LCP);
1204     } else if (!strcasecmp(arg->argv[arg->argn], "ccp")) {
1205       struct fsm *fp = arg->cx ? &arg->cx->physical->link.ccp.fsm :
1206                                  &arg->bundle->ncp.mp.link.ccp.fsm;
1207       fsm2initial(fp);
1208     } else
1209       return -1;
1210   } else
1211     return -1;
1212 
1213   return 0;
1214 }
1215 
1216 static int
1217 SetModemSpeed(struct cmdargs const *arg)
1218 {
1219   long speed;
1220   char *end;
1221 
1222   if (arg->argc > arg->argn && *arg->argv[arg->argn]) {
1223     if (arg->argc > arg->argn+1) {
1224       log_Printf(LogWARN, "SetModemSpeed: Too many arguments\n");
1225       return -1;
1226     }
1227     if (strcasecmp(arg->argv[arg->argn], "sync") == 0) {
1228       physical_SetSync(arg->cx->physical);
1229       return 0;
1230     }
1231     end = NULL;
1232     speed = strtol(arg->argv[arg->argn], &end, 10);
1233     if (*end) {
1234       log_Printf(LogWARN, "SetModemSpeed: Bad argument \"%s\"",
1235                 arg->argv[arg->argn]);
1236       return -1;
1237     }
1238     if (physical_SetSpeed(arg->cx->physical, speed))
1239       return 0;
1240     log_Printf(LogWARN, "%s: Invalid speed\n", arg->argv[arg->argn]);
1241   } else
1242     log_Printf(LogWARN, "SetModemSpeed: No speed specified\n");
1243 
1244   return -1;
1245 }
1246 
1247 static int
1248 SetStoppedTimeout(struct cmdargs const *arg)
1249 {
1250   struct link *l = &arg->cx->physical->link;
1251 
1252   l->lcp.fsm.StoppedTimer.load = 0;
1253   l->ccp.fsm.StoppedTimer.load = 0;
1254   if (arg->argc <= arg->argn+2) {
1255     if (arg->argc > arg->argn) {
1256       l->lcp.fsm.StoppedTimer.load = atoi(arg->argv[arg->argn]) * SECTICKS;
1257       if (arg->argc > arg->argn+1)
1258         l->ccp.fsm.StoppedTimer.load = atoi(arg->argv[arg->argn+1]) * SECTICKS;
1259     }
1260     return 0;
1261   }
1262   return -1;
1263 }
1264 
1265 static int
1266 SetServer(struct cmdargs const *arg)
1267 {
1268   int res = -1;
1269 
1270   if (arg->argc > arg->argn && arg->argc < arg->argn+4) {
1271     const char *port, *passwd, *mask;
1272     int mlen;
1273 
1274     /* What's what ? */
1275     port = arg->argv[arg->argn];
1276     if (arg->argc == arg->argn + 2) {
1277       passwd = arg->argv[arg->argn+1];
1278       mask = NULL;
1279     } else if (arg->argc == arg->argn + 3) {
1280       passwd = arg->argv[arg->argn+1];
1281       mask = arg->argv[arg->argn+2];
1282       mlen = strlen(mask);
1283       if (mlen == 0 || mlen > 4 || strspn(mask, "01234567") != mlen ||
1284           (mlen == 4 && *mask != '0')) {
1285         log_Printf(LogWARN, "%s %s: %s: Invalid mask\n",
1286                    arg->argv[arg->argn - 2], arg->argv[arg->argn - 1], mask);
1287         return -1;
1288       }
1289     } else if (strcasecmp(port, "none") == 0) {
1290       if (server_Close(arg->bundle))
1291         log_Printf(LogPHASE, "Disabled server port.\n");
1292       return 0;
1293     } else
1294       return -1;
1295 
1296     strncpy(server.passwd, passwd, sizeof server.passwd - 1);
1297     server.passwd[sizeof server.passwd - 1] = '\0';
1298 
1299     if (*port == '/') {
1300       mode_t imask;
1301       char *ptr, name[LINE_LEN + 12];
1302 
1303       if (mask == NULL)
1304         imask = (mode_t)-1;
1305       else for (imask = mlen = 0; mask[mlen]; mlen++)
1306         imask = (imask * 8) + mask[mlen] - '0';
1307 
1308       ptr = strstr(port, "%d");
1309       if (ptr) {
1310         snprintf(name, sizeof name, "%.*s%d%s",
1311                  (int)(ptr - port), port, arg->bundle->unit, ptr + 2);
1312         port = name;
1313       }
1314       res = server_LocalOpen(arg->bundle, port, imask);
1315     } else {
1316       int iport, add = 0;
1317 
1318       if (mask != NULL)
1319         return -1;
1320 
1321       if (*port == '+') {
1322         port++;
1323         add = 1;
1324       }
1325       if (strspn(port, "0123456789") != strlen(port)) {
1326         struct servent *s;
1327 
1328         if ((s = getservbyname(port, "tcp")) == NULL) {
1329 	  iport = 0;
1330 	  log_Printf(LogWARN, "%s: Invalid port or service\n", port);
1331 	} else
1332 	  iport = ntohs(s->s_port);
1333       } else
1334         iport = atoi(port);
1335 
1336       if (iport) {
1337         if (add)
1338           iport += arg->bundle->unit;
1339         res = server_TcpOpen(arg->bundle, iport);
1340       } else
1341         res = -1;
1342     }
1343   }
1344 
1345   return res;
1346 }
1347 
1348 static int
1349 SetEscape(struct cmdargs const *arg)
1350 {
1351   int code;
1352   int argc = arg->argc - arg->argn;
1353   char const *const *argv = arg->argv + arg->argn;
1354 
1355   for (code = 0; code < 33; code++)
1356     arg->cx->physical->async.cfg.EscMap[code] = 0;
1357 
1358   while (argc-- > 0) {
1359     sscanf(*argv++, "%x", &code);
1360     code &= 0xff;
1361     arg->cx->physical->async.cfg.EscMap[code >> 3] |= (1 << (code & 7));
1362     arg->cx->physical->async.cfg.EscMap[32] = 1;
1363   }
1364   return 0;
1365 }
1366 
1367 static int
1368 SetInterfaceAddr(struct cmdargs const *arg)
1369 {
1370   struct ipcp *ipcp = &arg->bundle->ncp.ipcp;
1371   const char *hisaddr;
1372 
1373   if (arg->argc > arg->argn + 4)
1374     return -1;
1375 
1376   hisaddr = NULL;
1377   memset(&ipcp->cfg.my_range, '\0', sizeof ipcp->cfg.my_range);
1378   memset(&ipcp->cfg.peer_range, '\0', sizeof ipcp->cfg.peer_range);
1379   ipcp->cfg.HaveTriggerAddress = 0;
1380   ipcp->cfg.netmask.s_addr = INADDR_ANY;
1381   iplist_reset(&ipcp->cfg.peer_list);
1382 
1383   if (arg->argc > arg->argn) {
1384     if (!ParseAddr(ipcp, arg->argv[arg->argn],
1385                    &ipcp->cfg.my_range.ipaddr, &ipcp->cfg.my_range.mask,
1386                    &ipcp->cfg.my_range.width))
1387       return 1;
1388     if (arg->argc > arg->argn+1) {
1389       hisaddr = arg->argv[arg->argn+1];
1390       if (arg->argc > arg->argn+2) {
1391         ipcp->ifmask = ipcp->cfg.netmask = GetIpAddr(arg->argv[arg->argn+2]);
1392 	if (arg->argc > arg->argn+3) {
1393 	  ipcp->cfg.TriggerAddress = GetIpAddr(arg->argv[arg->argn+3]);
1394 	  ipcp->cfg.HaveTriggerAddress = 1;
1395 	}
1396       }
1397     }
1398   }
1399 
1400   /* 0.0.0.0 means any address (0 bits) */
1401   if (ipcp->cfg.my_range.ipaddr.s_addr == INADDR_ANY) {
1402     ipcp->cfg.my_range.mask.s_addr = INADDR_ANY;
1403     ipcp->cfg.my_range.width = 0;
1404   }
1405   ipcp->my_ip.s_addr = ipcp->cfg.my_range.ipaddr.s_addr;
1406   bundle_AdjustFilters(arg->bundle, &ipcp->my_ip, NULL);
1407 
1408   if (hisaddr && !ipcp_UseHisaddr(arg->bundle, hisaddr,
1409                                   arg->bundle->phys_type.all & PHYS_AUTO))
1410     return 4;
1411 
1412   return 0;
1413 }
1414 
1415 static int
1416 SetRetry(int argc, char const *const *argv, u_int *timeout, u_int *maxreq,
1417           u_int *maxtrm, int def)
1418 {
1419   if (argc == 0) {
1420     *timeout = DEF_FSMRETRY;
1421     *maxreq = def;
1422     if (maxtrm != NULL)
1423       *maxtrm = def;
1424   } else {
1425     long l = atol(argv[0]);
1426 
1427     if (l < MIN_FSMRETRY) {
1428       log_Printf(LogWARN, "%ld: Invalid FSM retry period - min %d\n",
1429                  l, MIN_FSMRETRY);
1430       return 1;
1431     } else
1432       *timeout = l;
1433 
1434     if (argc > 1) {
1435       l = atol(argv[1]);
1436       if (l < 1) {
1437         log_Printf(LogWARN, "%ld: Invalid FSM REQ tries - changed to 1\n", l);
1438         l = 1;
1439       }
1440       *maxreq = l;
1441 
1442       if (argc > 2 && maxtrm != NULL) {
1443         l = atol(argv[2]);
1444         if (l < 1) {
1445           log_Printf(LogWARN, "%ld: Invalid FSM TRM tries - changed to 1\n", l);
1446           l = 1;
1447         }
1448         *maxtrm = l;
1449       }
1450     }
1451   }
1452 
1453   return 0;
1454 }
1455 
1456 static int
1457 SetVariable(struct cmdargs const *arg)
1458 {
1459   long long_val, param = (long)arg->cmd->args;
1460   int mode, dummyint, f, first;
1461   const char *argp;
1462   struct datalink *cx = arg->cx;	/* LOCAL_CX uses this */
1463   const char *err = NULL;
1464   struct link *l = command_ChooseLink(arg);	/* LOCAL_CX_OPT uses this */
1465   struct in_addr dummyaddr, *addr;
1466 
1467   if (arg->argc > arg->argn)
1468     argp = arg->argv[arg->argn];
1469   else
1470     argp = "";
1471 
1472   if ((arg->cmd->lauth & LOCAL_CX) && !cx) {
1473     log_Printf(LogWARN, "set %s: No context (use the `link' command)\n",
1474               arg->cmd->name);
1475     return 1;
1476   } else if (cx && !(arg->cmd->lauth & (LOCAL_CX|LOCAL_CX_OPT))) {
1477     log_Printf(LogWARN, "set %s: Redundant context (%s) ignored\n",
1478               arg->cmd->name, cx->name);
1479     cx = NULL;
1480   }
1481 
1482   switch (param) {
1483   case VAR_AUTHKEY:
1484     strncpy(arg->bundle->cfg.auth.key, argp,
1485             sizeof arg->bundle->cfg.auth.key - 1);
1486     arg->bundle->cfg.auth.key[sizeof arg->bundle->cfg.auth.key - 1] = '\0';
1487     break;
1488 
1489   case VAR_AUTHNAME:
1490     switch (bundle_Phase(arg->bundle)) {
1491       default:
1492         log_Printf(LogWARN, "Altering authname while at phase %s\n",
1493                    bundle_PhaseName(arg->bundle));
1494         /* drop through */
1495       case PHASE_DEAD:
1496       case PHASE_ESTABLISH:
1497         strncpy(arg->bundle->cfg.auth.name, argp,
1498                 sizeof arg->bundle->cfg.auth.name - 1);
1499         arg->bundle->cfg.auth.name[sizeof arg->bundle->cfg.auth.name-1] = '\0';
1500         break;
1501     }
1502     break;
1503 
1504   case VAR_AUTOLOAD:
1505     if (arg->argc == arg->argn + 3) {
1506       int v1, v2, v3;
1507       char *end;
1508 
1509       v1 = strtol(arg->argv[arg->argn], &end, 0);
1510       if (v1 < 0 || *end) {
1511         log_Printf(LogWARN, "autoload: %s: Invalid min percentage\n",
1512                    arg->argv[arg->argn]);
1513         return 1;
1514       }
1515 
1516       v2 = strtol(arg->argv[arg->argn + 1], &end, 0);
1517       if (v2 < 0 || *end) {
1518         log_Printf(LogWARN, "autoload: %s: Invalid max percentage\n",
1519                    arg->argv[arg->argn + 1]);
1520         return 1;
1521       }
1522       if (v2 < v1) {
1523         v3 = v1;
1524         v1 = v2;
1525         v2 = v3;
1526       }
1527 
1528       v3 = strtol(arg->argv[arg->argn + 2], &end, 0);
1529       if (v3 <= 0 || *end) {
1530         log_Printf(LogWARN, "autoload: %s: Invalid throughput period\n",
1531                    arg->argv[arg->argn + 2]);
1532         return 1;
1533       }
1534 
1535       arg->bundle->ncp.mp.cfg.autoload.min = v1;
1536       arg->bundle->ncp.mp.cfg.autoload.max = v2;
1537       arg->bundle->ncp.mp.cfg.autoload.period = v3;
1538       mp_RestartAutoloadTimer(&arg->bundle->ncp.mp);
1539     } else {
1540       err = "Set autoload requires three arguments\n";
1541       log_Printf(LogWARN, err);
1542     }
1543     break;
1544 
1545   case VAR_DIAL:
1546     strncpy(cx->cfg.script.dial, argp, sizeof cx->cfg.script.dial - 1);
1547     cx->cfg.script.dial[sizeof cx->cfg.script.dial - 1] = '\0';
1548     break;
1549 
1550   case VAR_LOGIN:
1551     strncpy(cx->cfg.script.login, argp, sizeof cx->cfg.script.login - 1);
1552     cx->cfg.script.login[sizeof cx->cfg.script.login - 1] = '\0';
1553     break;
1554 
1555   case VAR_WINSIZE:
1556     if (arg->argc > arg->argn) {
1557       l->ccp.cfg.deflate.out.winsize = atoi(arg->argv[arg->argn]);
1558       if (l->ccp.cfg.deflate.out.winsize < 8 ||
1559           l->ccp.cfg.deflate.out.winsize > 15) {
1560           log_Printf(LogWARN, "%d: Invalid outgoing window size\n",
1561                     l->ccp.cfg.deflate.out.winsize);
1562           l->ccp.cfg.deflate.out.winsize = 15;
1563       }
1564       if (arg->argc > arg->argn+1) {
1565         l->ccp.cfg.deflate.in.winsize = atoi(arg->argv[arg->argn+1]);
1566         if (l->ccp.cfg.deflate.in.winsize < 8 ||
1567             l->ccp.cfg.deflate.in.winsize > 15) {
1568             log_Printf(LogWARN, "%d: Invalid incoming window size\n",
1569                       l->ccp.cfg.deflate.in.winsize);
1570             l->ccp.cfg.deflate.in.winsize = 15;
1571         }
1572       } else
1573         l->ccp.cfg.deflate.in.winsize = 0;
1574     } else {
1575       err = "No window size specified\n";
1576       log_Printf(LogWARN, err);
1577     }
1578     break;
1579 
1580   case VAR_DEVICE:
1581     physical_SetDeviceList(cx->physical, arg->argc - arg->argn,
1582                            arg->argv + arg->argn);
1583     break;
1584 
1585   case VAR_ACCMAP:
1586     if (arg->argc > arg->argn) {
1587       u_long ulong_val;
1588       sscanf(argp, "%lx", &ulong_val);
1589       cx->physical->link.lcp.cfg.accmap = (u_int32_t)ulong_val;
1590     } else {
1591       err = "No accmap specified\n";
1592       log_Printf(LogWARN, err);
1593     }
1594     break;
1595 
1596   case VAR_MODE:
1597     mode = Nam2mode(argp);
1598     if (mode == PHYS_NONE || mode == PHYS_ALL) {
1599       log_Printf(LogWARN, "%s: Invalid mode\n", argp);
1600       return -1;
1601     }
1602     bundle_SetMode(arg->bundle, cx, mode);
1603     break;
1604 
1605   case VAR_MRRU:
1606     switch (bundle_Phase(arg->bundle)) {
1607       case PHASE_DEAD:
1608         break;
1609       case PHASE_ESTABLISH:
1610         /* Make sure none of our links are DATALINK_LCP or greater */
1611         if (bundle_HighestState(arg->bundle) >= DATALINK_LCP) {
1612           log_Printf(LogWARN, "mrru: Only changable before LCP negotiations\n");
1613           return 1;
1614         }
1615         break;
1616       default:
1617         log_Printf(LogWARN, "mrru: Only changable at phase DEAD/ESTABLISH\n");
1618         return 1;
1619     }
1620     long_val = atol(argp);
1621     if (long_val && long_val < MIN_MRU) {
1622       log_Printf(LogWARN, "MRRU %ld: too small - min %d\n", long_val, MIN_MRU);
1623       return 1;
1624     } else if (long_val > MAX_MRU) {
1625       log_Printf(LogWARN, "MRRU %ld: too big - max %d\n", long_val, MAX_MRU);
1626       return 1;
1627     } else
1628       arg->bundle->ncp.mp.cfg.mrru = long_val;
1629     break;
1630 
1631   case VAR_MRU:
1632     long_val = atol(argp);
1633     if (long_val == 0)
1634       l->lcp.cfg.mru = DEF_MRU;
1635     else if (long_val < MIN_MRU) {
1636       log_Printf(LogWARN, "MRU %ld: too small - min %d\n", long_val, MIN_MRU);
1637       return 1;
1638     } else if (long_val > MAX_MRU) {
1639       log_Printf(LogWARN, "MRU %ld: too big - max %d\n", long_val, MAX_MRU);
1640       return 1;
1641     } else
1642       l->lcp.cfg.mru = long_val;
1643     break;
1644 
1645   case VAR_MTU:
1646     long_val = atol(argp);
1647     if (long_val && long_val < MIN_MTU) {
1648       log_Printf(LogWARN, "MTU %ld: too small - min %d\n", long_val, MIN_MTU);
1649       return 1;
1650     } else if (long_val > MAX_MTU) {
1651       log_Printf(LogWARN, "MTU %ld: too big - max %d\n", long_val, MAX_MTU);
1652       return 1;
1653     } else
1654       arg->bundle->cfg.mtu = long_val;
1655     break;
1656 
1657   case VAR_OPENMODE:
1658     if (strcasecmp(argp, "active") == 0)
1659       cx->physical->link.lcp.cfg.openmode = arg->argc > arg->argn+1 ?
1660         atoi(arg->argv[arg->argn+1]) : 1;
1661     else if (strcasecmp(argp, "passive") == 0)
1662       cx->physical->link.lcp.cfg.openmode = OPEN_PASSIVE;
1663     else {
1664       err = "%s: Invalid openmode\n";
1665       log_Printf(LogWARN, err, argp);
1666     }
1667     break;
1668 
1669   case VAR_PHONE:
1670     strncpy(cx->cfg.phone.list, argp, sizeof cx->cfg.phone.list - 1);
1671     cx->cfg.phone.list[sizeof cx->cfg.phone.list - 1] = '\0';
1672     cx->phone.alt = cx->phone.next = NULL;
1673     break;
1674 
1675   case VAR_HANGUP:
1676     strncpy(cx->cfg.script.hangup, argp, sizeof cx->cfg.script.hangup - 1);
1677     cx->cfg.script.hangup[sizeof cx->cfg.script.hangup - 1] = '\0';
1678     break;
1679 
1680   case VAR_IFQUEUE:
1681     long_val = atol(argp);
1682     arg->bundle->cfg.ifqueue = long_val < 0 ? 0 : long_val;
1683     break;
1684 
1685   case VAR_LOGOUT:
1686     strncpy(cx->cfg.script.logout, argp, sizeof cx->cfg.script.logout - 1);
1687     cx->cfg.script.logout[sizeof cx->cfg.script.logout - 1] = '\0';
1688     break;
1689 
1690   case VAR_IDLETIMEOUT:
1691     if (arg->argc > arg->argn+2)
1692       err = "Too many idle timeout values\n";
1693     else if (arg->argc == arg->argn)
1694       err = "Too few idle timeout values\n";
1695     else {
1696       int timeout, min;
1697 
1698       timeout = atoi(argp);
1699       min = arg->argc == arg->argn + 2 ? atoi(arg->argv[arg->argn + 1]) : -1;
1700       bundle_SetIdleTimer(arg->bundle, timeout, min);
1701     }
1702     if (err)
1703       log_Printf(LogWARN, err);
1704     break;
1705 
1706   case VAR_LQRPERIOD:
1707     long_val = atol(argp);
1708     if (long_val < MIN_LQRPERIOD) {
1709       log_Printf(LogWARN, "%ld: Invalid lqr period - min %d\n",
1710                  long_val, MIN_LQRPERIOD);
1711       return 1;
1712     } else
1713       l->lcp.cfg.lqrperiod = long_val;
1714     break;
1715 
1716   case VAR_LCPRETRY:
1717     return SetRetry(arg->argc - arg->argn, arg->argv + arg->argn,
1718                     &cx->physical->link.lcp.cfg.fsm.timeout,
1719                     &cx->physical->link.lcp.cfg.fsm.maxreq,
1720                     &cx->physical->link.lcp.cfg.fsm.maxtrm, DEF_FSMTRIES);
1721     break;
1722 
1723   case VAR_CHAPRETRY:
1724     return SetRetry(arg->argc - arg->argn, arg->argv + arg->argn,
1725                     &cx->chap.auth.cfg.fsm.timeout,
1726                     &cx->chap.auth.cfg.fsm.maxreq, NULL, DEF_FSMAUTHTRIES);
1727     break;
1728 
1729   case VAR_PAPRETRY:
1730     return SetRetry(arg->argc - arg->argn, arg->argv + arg->argn,
1731                     &cx->pap.cfg.fsm.timeout, &cx->pap.cfg.fsm.maxreq,
1732                     NULL, DEF_FSMAUTHTRIES);
1733     break;
1734 
1735   case VAR_CCPRETRY:
1736     return SetRetry(arg->argc - arg->argn, arg->argv + arg->argn,
1737                     &l->ccp.cfg.fsm.timeout, &l->ccp.cfg.fsm.maxreq,
1738                     &l->ccp.cfg.fsm.maxtrm, DEF_FSMTRIES);
1739     break;
1740 
1741   case VAR_IPCPRETRY:
1742     return SetRetry(arg->argc - arg->argn, arg->argv + arg->argn,
1743                     &arg->bundle->ncp.ipcp.cfg.fsm.timeout,
1744                     &arg->bundle->ncp.ipcp.cfg.fsm.maxreq,
1745                     &arg->bundle->ncp.ipcp.cfg.fsm.maxtrm, DEF_FSMTRIES);
1746     break;
1747 
1748   case VAR_NBNS:
1749   case VAR_DNS:
1750     if (param == VAR_DNS) {
1751       addr = arg->bundle->ncp.ipcp.cfg.ns.dns;
1752       addr[0].s_addr = addr[1].s_addr = INADDR_NONE;
1753     } else {
1754       addr = arg->bundle->ncp.ipcp.cfg.ns.nbns;
1755       addr[0].s_addr = addr[1].s_addr = INADDR_ANY;
1756     }
1757 
1758     if (arg->argc > arg->argn) {
1759       ParseAddr(&arg->bundle->ncp.ipcp, arg->argv[arg->argn],
1760                 addr, &dummyaddr, &dummyint);
1761       if (arg->argc > arg->argn+1)
1762         ParseAddr(&arg->bundle->ncp.ipcp, arg->argv[arg->argn + 1],
1763                   addr + 1, &dummyaddr, &dummyint);
1764 
1765       if (addr[0].s_addr == INADDR_ANY) {
1766         addr[0].s_addr = addr[1].s_addr;
1767         addr[1].s_addr = INADDR_ANY;
1768       }
1769       if (addr[0].s_addr == INADDR_NONE) {
1770         addr[0].s_addr = addr[1].s_addr;
1771         addr[1].s_addr = INADDR_NONE;
1772       }
1773     }
1774     break;
1775 
1776   case VAR_CALLBACK:
1777     cx->cfg.callback.opmask = 0;
1778     for (dummyint = arg->argn; dummyint < arg->argc; dummyint++) {
1779       if (!strcasecmp(arg->argv[dummyint], "auth"))
1780         cx->cfg.callback.opmask |= CALLBACK_BIT(CALLBACK_AUTH);
1781       else if (!strcasecmp(arg->argv[dummyint], "cbcp"))
1782         cx->cfg.callback.opmask |= CALLBACK_BIT(CALLBACK_CBCP);
1783       else if (!strcasecmp(arg->argv[dummyint], "e.164")) {
1784         if (dummyint == arg->argc - 1)
1785           log_Printf(LogWARN, "No E.164 arg (E.164 ignored) !\n");
1786         else {
1787           cx->cfg.callback.opmask |= CALLBACK_BIT(CALLBACK_E164);
1788           strncpy(cx->cfg.callback.msg, arg->argv[++dummyint],
1789                   sizeof cx->cfg.callback.msg - 1);
1790           cx->cfg.callback.msg[sizeof cx->cfg.callback.msg - 1] = '\0';
1791         }
1792       } else if (!strcasecmp(arg->argv[dummyint], "none"))
1793         cx->cfg.callback.opmask |= CALLBACK_BIT(CALLBACK_NONE);
1794       else
1795         return -1;
1796     }
1797     if (cx->cfg.callback.opmask == CALLBACK_BIT(CALLBACK_NONE))
1798       cx->cfg.callback.opmask = 0;
1799     break;
1800 
1801   case VAR_CBCP:
1802     cx->cfg.cbcp.delay = 0;
1803     *cx->cfg.cbcp.phone = '\0';
1804     cx->cfg.cbcp.fsmretry = DEF_FSMRETRY;
1805     if (arg->argc > arg->argn) {
1806       strncpy(cx->cfg.cbcp.phone, arg->argv[arg->argn],
1807               sizeof cx->cfg.cbcp.phone - 1);
1808       cx->cfg.cbcp.phone[sizeof cx->cfg.cbcp.phone - 1] = '\0';
1809       if (arg->argc > arg->argn + 1) {
1810         cx->cfg.cbcp.delay = atoi(arg->argv[arg->argn + 1]);
1811         if (arg->argc > arg->argn + 2) {
1812           long_val = atol(arg->argv[arg->argn + 2]);
1813           if (long_val < MIN_FSMRETRY)
1814             log_Printf(LogWARN, "%ld: Invalid CBCP FSM retry period - min %d\n",
1815                        long_val, MIN_FSMRETRY);
1816           else
1817             cx->cfg.cbcp.fsmretry = long_val;
1818         }
1819       }
1820     }
1821     break;
1822 
1823   case VAR_CHOKED:
1824     arg->bundle->cfg.choked.timeout = atoi(argp);
1825     if (arg->bundle->cfg.choked.timeout <= 0)
1826       arg->bundle->cfg.choked.timeout = CHOKED_TIMEOUT;
1827     break;
1828 
1829   case VAR_SENDPIPE:
1830     long_val = atol(argp);
1831     arg->bundle->ncp.ipcp.cfg.sendpipe = long_val;
1832     break;
1833 
1834   case VAR_RECVPIPE:
1835     long_val = atol(argp);
1836     arg->bundle->ncp.ipcp.cfg.recvpipe = long_val;
1837     break;
1838 
1839 #ifndef NORADIUS
1840   case VAR_RADIUS:
1841     if (!*argp)
1842       *arg->bundle->radius.cfg.file = '\0';
1843     else if (access(argp, R_OK)) {
1844       log_Printf(LogWARN, "%s: %s\n", argp, strerror(errno));
1845       return 1;
1846     } else {
1847       strncpy(arg->bundle->radius.cfg.file, argp,
1848               sizeof arg->bundle->radius.cfg.file - 1);
1849       arg->bundle->radius.cfg.file
1850         [sizeof arg->bundle->radius.cfg.file - 1] = '\0';
1851     }
1852     break;
1853 #endif
1854 
1855   case VAR_CD:
1856     if (*argp) {
1857       if (strcasecmp(argp, "off")) {
1858         long_val = atol(argp);
1859         if (long_val < 0)
1860           long_val = 0;
1861         cx->physical->cfg.cd.delay = long_val;
1862         cx->physical->cfg.cd.necessity = argp[strlen(argp)-1] == '!' ?
1863           CD_REQUIRED : CD_VARIABLE;
1864       } else
1865         cx->physical->cfg.cd.necessity = CD_NOTREQUIRED;
1866     } else {
1867       cx->physical->cfg.cd.delay = 0;
1868       cx->physical->cfg.cd.necessity = CD_DEFAULT;
1869     }
1870     break;
1871 
1872   case VAR_PARITY:
1873     if (arg->argc == arg->argn + 1)
1874       return physical_SetParity(arg->cx->physical, argp);
1875     else {
1876       err = "Parity value must be odd, even or none\n";
1877       log_Printf(LogWARN, err);
1878     }
1879     break;
1880 
1881   case VAR_CRTSCTS:
1882     if (strcasecmp(argp, "on") == 0)
1883       physical_SetRtsCts(arg->cx->physical, 1);
1884     else if (strcasecmp(argp, "off") == 0)
1885       physical_SetRtsCts(arg->cx->physical, 0);
1886     else {
1887       err = "RTS/CTS value must be on or off\n";
1888       log_Printf(LogWARN, err);
1889     }
1890     break;
1891 
1892   case VAR_URGENTPORTS:
1893     if (arg->argn == arg->argc) {
1894       ipcp_SetUrgentTOS(&arg->bundle->ncp.ipcp);
1895       ipcp_ClearUrgentTcpPorts(&arg->bundle->ncp.ipcp);
1896       ipcp_ClearUrgentUdpPorts(&arg->bundle->ncp.ipcp);
1897     } else if (!strcasecmp(arg->argv[arg->argn], "udp")) {
1898       ipcp_SetUrgentTOS(&arg->bundle->ncp.ipcp);
1899       if (arg->argn == arg->argc - 1)
1900         ipcp_ClearUrgentUdpPorts(&arg->bundle->ncp.ipcp);
1901       else for (f = arg->argn + 1; f < arg->argc; f++)
1902         if (*arg->argv[f] == '+')
1903           ipcp_AddUrgentUdpPort(&arg->bundle->ncp.ipcp, atoi(arg->argv[f] + 1));
1904         else if (*arg->argv[f] == '-')
1905           ipcp_RemoveUrgentUdpPort(&arg->bundle->ncp.ipcp,
1906                                    atoi(arg->argv[f] + 1));
1907         else {
1908           if (f == arg->argn)
1909             ipcp_ClearUrgentUdpPorts(&arg->bundle->ncp.ipcp);
1910           ipcp_AddUrgentUdpPort(&arg->bundle->ncp.ipcp, atoi(arg->argv[f]));
1911         }
1912     } else if (arg->argn == arg->argc - 1 &&
1913                !strcasecmp(arg->argv[arg->argn], "none")) {
1914       ipcp_ClearUrgentTcpPorts(&arg->bundle->ncp.ipcp);
1915       ipcp_ClearUrgentUdpPorts(&arg->bundle->ncp.ipcp);
1916       ipcp_ClearUrgentTOS(&arg->bundle->ncp.ipcp);
1917     } else {
1918       ipcp_SetUrgentTOS(&arg->bundle->ncp.ipcp);
1919       first = arg->argn;
1920       if (!strcasecmp(arg->argv[first], "tcp") && ++first == arg->argc)
1921         ipcp_ClearUrgentTcpPorts(&arg->bundle->ncp.ipcp);
1922 
1923       for (f = first; f < arg->argc; f++)
1924         if (*arg->argv[f] == '+')
1925           ipcp_AddUrgentTcpPort(&arg->bundle->ncp.ipcp, atoi(arg->argv[f] + 1));
1926         else if (*arg->argv[f] == '-')
1927           ipcp_RemoveUrgentTcpPort(&arg->bundle->ncp.ipcp,
1928                                    atoi(arg->argv[f] + 1));
1929         else {
1930           if (f == first)
1931             ipcp_ClearUrgentTcpPorts(&arg->bundle->ncp.ipcp);
1932           ipcp_AddUrgentTcpPort(&arg->bundle->ncp.ipcp, atoi(arg->argv[f]));
1933         }
1934     }
1935     break;
1936   }
1937 
1938   return err ? 1 : 0;
1939 }
1940 
1941 static struct cmdtab const SetCommands[] = {
1942   {"accmap", NULL, SetVariable, LOCAL_AUTH | LOCAL_CX,
1943   "accmap value", "set accmap hex-value", (const void *)VAR_ACCMAP},
1944   {"authkey", "key", SetVariable, LOCAL_AUTH,
1945   "authentication key", "set authkey|key key", (const void *)VAR_AUTHKEY},
1946   {"authname", NULL, SetVariable, LOCAL_AUTH,
1947   "authentication name", "set authname name", (const void *)VAR_AUTHNAME},
1948   {"autoload", NULL, SetVariable, LOCAL_AUTH,
1949   "auto link [de]activation", "set autoload maxtime maxload mintime minload",
1950   (const void *)VAR_AUTOLOAD},
1951   {"bandwidth", NULL, mp_SetDatalinkBandwidth, LOCAL_AUTH | LOCAL_CX,
1952   "datalink bandwidth", "set bandwidth value"},
1953   {"callback", NULL, SetVariable, LOCAL_AUTH | LOCAL_CX,
1954   "callback control", "set callback [none|auth|cbcp|"
1955   "E.164 *|number[,number]...]...", (const void *)VAR_CALLBACK},
1956   {"cbcp", NULL, SetVariable, LOCAL_AUTH | LOCAL_CX,
1957   "CBCP control", "set cbcp [*|phone[,phone...] [delay [timeout]]]",
1958   (const void *)VAR_CBCP},
1959   {"ccpretry", "ccpretries", SetVariable, LOCAL_AUTH | LOCAL_CX_OPT,
1960    "CCP retries", "set ccpretry value [attempts]", (const void *)VAR_CCPRETRY},
1961   {"cd", NULL, SetVariable, LOCAL_AUTH | LOCAL_CX, "Carrier delay requirement",
1962    "set cd value[!]", (const void *)VAR_CD},
1963   {"chapretry", "chapretries", SetVariable, LOCAL_AUTH | LOCAL_CX,
1964    "CHAP retries", "set chapretry value [attempts]",
1965    (const void *)VAR_CHAPRETRY},
1966   {"choked", NULL, SetVariable, LOCAL_AUTH,
1967   "choked timeout", "set choked [secs]", (const void *)VAR_CHOKED},
1968   {"ctsrts", "crtscts", SetVariable, LOCAL_AUTH | LOCAL_CX,
1969    "Use hardware flow control", "set ctsrts [on|off]",
1970    (const char *)VAR_CRTSCTS},
1971   {"deflate", NULL, SetVariable, LOCAL_AUTH | LOCAL_CX_OPT,
1972   "deflate window sizes", "set deflate out-winsize in-winsize",
1973   (const void *) VAR_WINSIZE},
1974   {"device", "line", SetVariable, LOCAL_AUTH | LOCAL_CX,
1975   "physical device name", "set device|line device-name[,device-name]",
1976   (const void *) VAR_DEVICE},
1977   {"dial", NULL, SetVariable, LOCAL_AUTH | LOCAL_CX,
1978   "dialing script", "set dial chat-script", (const void *) VAR_DIAL},
1979   {"dns", NULL, SetVariable, LOCAL_AUTH, "Domain Name Server",
1980   "set dns pri-addr [sec-addr]", (const void *)VAR_DNS},
1981   {"enddisc", NULL, mp_SetEnddisc, LOCAL_AUTH,
1982   "Endpoint Discriminator", "set enddisc [IP|magic|label|psn value]"},
1983   {"escape", NULL, SetEscape, LOCAL_AUTH | LOCAL_CX,
1984   "escape characters", "set escape hex-digit ..."},
1985   {"filter", NULL, filter_Set, LOCAL_AUTH,
1986   "packet filters", "set filter alive|dial|in|out rule-no permit|deny "
1987   "[src_addr[/width]] [dst_addr[/width]] [tcp|udp|icmp|ospf|igmp "
1988   "[src [lt|eq|gt port]] [dst [lt|eq|gt port]] [estab] [syn] [finrst]]"},
1989   {"hangup", NULL, SetVariable, LOCAL_AUTH | LOCAL_CX,
1990   "hangup script", "set hangup chat-script", (const void *) VAR_HANGUP},
1991   {"ifaddr", NULL, SetInterfaceAddr, LOCAL_AUTH, "destination address",
1992   "set ifaddr [src-addr [dst-addr [netmask [trg-addr]]]]"},
1993   {"ifqueue", NULL, SetVariable, LOCAL_AUTH, "interface queue",
1994   "set ifqueue packets", (const void *)VAR_IFQUEUE},
1995   {"ipcpretry", "ipcpretries", SetVariable, LOCAL_AUTH, "IPCP retries",
1996    "set ipcpretry value [attempts]", (const void *)VAR_IPCPRETRY},
1997   {"lcpretry", "lcpretries", SetVariable, LOCAL_AUTH | LOCAL_CX, "LCP retries",
1998    "set lcpretry value [attempts]", (const void *)VAR_LCPRETRY},
1999   {"log", NULL, log_SetLevel, LOCAL_AUTH, "log level",
2000   "set log [local] [+|-]async|cbcp|ccp|chat|command|connect|debug|dns|hdlc|"
2001   "id0|ipcp|lcp|lqm|phase|physical|sync|tcp/ip|timer|tun..."},
2002   {"login", NULL, SetVariable, LOCAL_AUTH | LOCAL_CX,
2003   "login script", "set login chat-script", (const void *) VAR_LOGIN},
2004   {"logout", NULL, SetVariable, LOCAL_AUTH | LOCAL_CX,
2005   "logout script", "set logout chat-script", (const void *) VAR_LOGOUT},
2006   {"lqrperiod", NULL, SetVariable, LOCAL_AUTH | LOCAL_CX_OPT,
2007   "LQR period", "set lqrperiod value", (const void *)VAR_LQRPERIOD},
2008   {"mode", NULL, SetVariable, LOCAL_AUTH | LOCAL_CX, "mode value",
2009   "set mode interactive|auto|ddial|background", (const void *)VAR_MODE},
2010   {"mrru", NULL, SetVariable, LOCAL_AUTH, "MRRU value",
2011   "set mrru value", (const void *)VAR_MRRU},
2012   {"mru", NULL, SetVariable, LOCAL_AUTH | LOCAL_CX_OPT,
2013   "MRU value", "set mru value", (const void *)VAR_MRU},
2014   {"mtu", NULL, SetVariable, LOCAL_AUTH,
2015   "interface MTU value", "set mtu value", (const void *)VAR_MTU},
2016   {"nbns", NULL, SetVariable, LOCAL_AUTH, "NetBIOS Name Server",
2017   "set nbns pri-addr [sec-addr]", (const void *)VAR_NBNS},
2018   {"openmode", NULL, SetVariable, LOCAL_AUTH | LOCAL_CX, "open mode",
2019   "set openmode active|passive [secs]", (const void *)VAR_OPENMODE},
2020   {"papretry", "papretries", SetVariable, LOCAL_AUTH | LOCAL_CX, "PAP retries",
2021    "set papretry value [attempts]", (const void *)VAR_PAPRETRY},
2022   {"parity", NULL, SetVariable, LOCAL_AUTH | LOCAL_CX, "serial parity",
2023    "set parity [odd|even|none]", (const void *)VAR_PARITY},
2024   {"phone", NULL, SetVariable, LOCAL_AUTH | LOCAL_CX, "telephone number(s)",
2025   "set phone phone1[:phone2[...]]", (const void *)VAR_PHONE},
2026   {"proctitle", "title", SetProcTitle, LOCAL_AUTH,
2027   "Process title", "set proctitle [value]"},
2028 #ifndef NORADIUS
2029   {"radius", NULL, SetVariable, LOCAL_AUTH,
2030   "RADIUS Config", "set radius cfgfile", (const void *)VAR_RADIUS},
2031 #endif
2032   {"reconnect", NULL, datalink_SetReconnect, LOCAL_AUTH | LOCAL_CX,
2033   "Reconnect timeout", "set reconnect value ntries"},
2034   {"recvpipe", NULL, SetVariable, LOCAL_AUTH,
2035   "RECVPIPE value", "set recvpipe value", (const void *)VAR_RECVPIPE},
2036   {"redial", NULL, datalink_SetRedial, LOCAL_AUTH | LOCAL_CX,
2037   "Redial timeout", "set redial secs[+inc[-incmax]][.next] [attempts]"},
2038   {"sendpipe", NULL, SetVariable, LOCAL_AUTH,
2039   "SENDPIPE value", "set sendpipe value", (const void *)VAR_SENDPIPE},
2040   {"server", "socket", SetServer, LOCAL_AUTH,
2041   "server port", "set server|socket TcpPort|LocalName|none password [mask]"},
2042   {"speed", NULL, SetModemSpeed, LOCAL_AUTH | LOCAL_CX,
2043   "physical speed", "set speed value|sync"},
2044   {"stopped", NULL, SetStoppedTimeout, LOCAL_AUTH | LOCAL_CX,
2045   "STOPPED timeouts", "set stopped [LCPseconds [CCPseconds]]"},
2046   {"timeout", NULL, SetVariable, LOCAL_AUTH, "Idle timeout",
2047   "set timeout idletime", (const void *)VAR_IDLETIMEOUT},
2048   {"urgent", NULL, SetVariable, LOCAL_AUTH, "urgent ports",
2049   "set urgent [tcp|udp] [+|-]port...", (const void *)VAR_URGENTPORTS},
2050   {"vj", NULL, ipcp_vjset, LOCAL_AUTH,
2051   "vj values", "set vj slots|slotcomp [value]"},
2052   {"help", "?", HelpCommand, LOCAL_AUTH | LOCAL_NO_AUTH,
2053   "Display this message", "set help|? [command]", SetCommands},
2054   {NULL, NULL, NULL},
2055 };
2056 
2057 static int
2058 SetCommand(struct cmdargs const *arg)
2059 {
2060   if (arg->argc > arg->argn)
2061     FindExec(arg->bundle, SetCommands, arg->argc, arg->argn, arg->argv,
2062              arg->prompt, arg->cx);
2063   else if (arg->prompt)
2064     prompt_Printf(arg->prompt, "Use `set ?' to get a list or `set ? <var>' for"
2065 	          " syntax help.\n");
2066   else
2067     log_Printf(LogWARN, "set command must have arguments\n");
2068 
2069   return 0;
2070 }
2071 
2072 static int
2073 AddCommand(struct cmdargs const *arg)
2074 {
2075   struct in_addr dest, gateway, netmask;
2076   int gw, addrs;
2077 
2078   if (arg->argc != arg->argn+3 && arg->argc != arg->argn+2)
2079     return -1;
2080 
2081   addrs = 0;
2082   if (arg->argc == arg->argn+2) {
2083     if (!strcasecmp(arg->argv[arg->argn], "default"))
2084       dest.s_addr = netmask.s_addr = INADDR_ANY;
2085     else {
2086       int width;
2087 
2088       if (!ParseAddr(&arg->bundle->ncp.ipcp, arg->argv[arg->argn],
2089 	             &dest, &netmask, &width))
2090         return -1;
2091       if (!strncasecmp(arg->argv[arg->argn], "MYADDR", 6))
2092         addrs = ROUTE_DSTMYADDR;
2093       else if (!strncasecmp(arg->argv[arg->argn], "HISADDR", 7))
2094         addrs = ROUTE_DSTHISADDR;
2095       else if (!strncasecmp(arg->argv[arg->argn], "DNS0", 4))
2096         addrs = ROUTE_DSTDNS0;
2097       else if (!strncasecmp(arg->argv[arg->argn], "DNS1", 4))
2098         addrs = ROUTE_DSTDNS1;
2099     }
2100     gw = 1;
2101   } else {
2102     if (strcasecmp(arg->argv[arg->argn], "MYADDR") == 0) {
2103       addrs = ROUTE_DSTMYADDR;
2104       dest = arg->bundle->ncp.ipcp.my_ip;
2105     } else if (strcasecmp(arg->argv[arg->argn], "HISADDR") == 0) {
2106       addrs = ROUTE_DSTHISADDR;
2107       dest = arg->bundle->ncp.ipcp.peer_ip;
2108     } else if (strcasecmp(arg->argv[arg->argn], "DNS0") == 0) {
2109       addrs = ROUTE_DSTDNS0;
2110       dest = arg->bundle->ncp.ipcp.ns.dns[0];
2111     } else if (strcasecmp(arg->argv[arg->argn], "DNS1") == 0) {
2112       addrs = ROUTE_DSTDNS1;
2113       dest = arg->bundle->ncp.ipcp.ns.dns[1];
2114     } else
2115       dest = GetIpAddr(arg->argv[arg->argn]);
2116     netmask = GetIpAddr(arg->argv[arg->argn+1]);
2117     gw = 2;
2118   }
2119 
2120   if (strcasecmp(arg->argv[arg->argn+gw], "HISADDR") == 0) {
2121     gateway = arg->bundle->ncp.ipcp.peer_ip;
2122     addrs |= ROUTE_GWHISADDR;
2123   } else
2124     gateway = GetIpAddr(arg->argv[arg->argn+gw]);
2125 
2126   if (bundle_SetRoute(arg->bundle, RTM_ADD, dest, gateway, netmask,
2127                   arg->cmd->args ? 1 : 0, (addrs & ROUTE_GWHISADDR) ? 1 : 0)
2128       && addrs != ROUTE_STATIC)
2129     route_Add(&arg->bundle->ncp.ipcp.route, addrs, dest, netmask, gateway);
2130 
2131   return 0;
2132 }
2133 
2134 static int
2135 DeleteCommand(struct cmdargs const *arg)
2136 {
2137   struct in_addr dest, none;
2138   int addrs;
2139 
2140   if (arg->argc == arg->argn+1) {
2141     if(strcasecmp(arg->argv[arg->argn], "all") == 0) {
2142       route_IfDelete(arg->bundle, 0);
2143       route_DeleteAll(&arg->bundle->ncp.ipcp.route);
2144     } else {
2145       addrs = 0;
2146       if (strcasecmp(arg->argv[arg->argn], "MYADDR") == 0) {
2147         dest = arg->bundle->ncp.ipcp.my_ip;
2148         addrs = ROUTE_DSTMYADDR;
2149       } else if (strcasecmp(arg->argv[arg->argn], "HISADDR") == 0) {
2150         dest = arg->bundle->ncp.ipcp.peer_ip;
2151         addrs = ROUTE_DSTHISADDR;
2152       } else if (strcasecmp(arg->argv[arg->argn], "DNS0") == 0) {
2153         dest = arg->bundle->ncp.ipcp.ns.dns[0];
2154         addrs = ROUTE_DSTDNS0;
2155       } else if (strcasecmp(arg->argv[arg->argn], "DNS1") == 0) {
2156         dest = arg->bundle->ncp.ipcp.ns.dns[1];
2157         addrs = ROUTE_DSTDNS1;
2158       } else {
2159         dest = GetIpAddr(arg->argv[arg->argn]);
2160         if (dest.s_addr == INADDR_NONE) {
2161           log_Printf(LogWARN, "%s: Invalid IP address\n", arg->argv[arg->argn]);
2162           return -1;
2163         }
2164         addrs = ROUTE_STATIC;
2165       }
2166       none.s_addr = INADDR_ANY;
2167       bundle_SetRoute(arg->bundle, RTM_DELETE, dest, none, none,
2168                       arg->cmd->args ? 1 : 0, 0);
2169       route_Delete(&arg->bundle->ncp.ipcp.route, addrs, dest);
2170     }
2171   } else
2172     return -1;
2173 
2174   return 0;
2175 }
2176 
2177 #ifndef NONAT
2178 static int
2179 NatEnable(struct cmdargs const *arg)
2180 {
2181   if (arg->argc == arg->argn+1) {
2182     if (strcasecmp(arg->argv[arg->argn], "yes") == 0) {
2183       if (!arg->bundle->NatEnabled) {
2184         if (arg->bundle->ncp.ipcp.fsm.state == ST_OPENED)
2185           PacketAliasSetAddress(arg->bundle->ncp.ipcp.my_ip);
2186         arg->bundle->NatEnabled = 1;
2187       }
2188       return 0;
2189     } else if (strcasecmp(arg->argv[arg->argn], "no") == 0) {
2190       arg->bundle->NatEnabled = 0;
2191       arg->bundle->cfg.opt &= ~OPT_IFACEALIAS;
2192       /* Don't iface_Clear() - there may be manually configured addresses */
2193       return 0;
2194     }
2195   }
2196 
2197   return -1;
2198 }
2199 
2200 
2201 static int
2202 NatOption(struct cmdargs const *arg)
2203 {
2204   long param = (long)arg->cmd->args;
2205 
2206   if (arg->argc == arg->argn+1) {
2207     if (strcasecmp(arg->argv[arg->argn], "yes") == 0) {
2208       if (arg->bundle->NatEnabled) {
2209 	PacketAliasSetMode(param, param);
2210 	return 0;
2211       }
2212       log_Printf(LogWARN, "nat not enabled\n");
2213     } else if (strcmp(arg->argv[arg->argn], "no") == 0) {
2214       if (arg->bundle->NatEnabled) {
2215 	PacketAliasSetMode(0, param);
2216 	return 0;
2217       }
2218       log_Printf(LogWARN, "nat not enabled\n");
2219     }
2220   }
2221   return -1;
2222 }
2223 #endif /* #ifndef NONAT */
2224 
2225 static int
2226 LinkCommand(struct cmdargs const *arg)
2227 {
2228   if (arg->argc > arg->argn+1) {
2229     char namelist[LINE_LEN];
2230     struct datalink *cx;
2231     char *name;
2232     int result = 0;
2233 
2234     if (!strcmp(arg->argv[arg->argn], "*")) {
2235       struct datalink *dl;
2236 
2237       cx = arg->bundle->links;
2238       while (cx) {
2239         /* Watch it, the command could be a ``remove'' */
2240         dl = cx->next;
2241         FindExec(arg->bundle, Commands, arg->argc, arg->argn+1, arg->argv,
2242                  arg->prompt, cx);
2243         for (cx = arg->bundle->links; cx; cx = cx->next)
2244           if (cx == dl)
2245             break;		/* Pointer's still valid ! */
2246       }
2247     } else {
2248       strncpy(namelist, arg->argv[arg->argn], sizeof namelist - 1);
2249       namelist[sizeof namelist - 1] = '\0';
2250       for(name = strtok(namelist, ", "); name; name = strtok(NULL,", "))
2251         if (!bundle2datalink(arg->bundle, name)) {
2252           log_Printf(LogWARN, "link: %s: Invalid link name\n", name);
2253           return 1;
2254         }
2255 
2256       strncpy(namelist, arg->argv[arg->argn], sizeof namelist - 1);
2257       namelist[sizeof namelist - 1] = '\0';
2258       for(name = strtok(namelist, ", "); name; name = strtok(NULL,", ")) {
2259         cx = bundle2datalink(arg->bundle, name);
2260         if (cx)
2261           FindExec(arg->bundle, Commands, arg->argc, arg->argn+1, arg->argv,
2262                    arg->prompt, cx);
2263         else {
2264           log_Printf(LogWARN, "link: %s: Invalidated link name !\n", name);
2265           result++;
2266         }
2267       }
2268     }
2269     return result;
2270   }
2271 
2272   log_Printf(LogWARN, "Usage: %s\n", arg->cmd->syntax);
2273   return 2;
2274 }
2275 
2276 struct link *
2277 command_ChooseLink(struct cmdargs const *arg)
2278 {
2279   if (arg->cx)
2280     return &arg->cx->physical->link;
2281   else if (!arg->bundle->ncp.mp.cfg.mrru) {
2282     struct datalink *dl = bundle2datalink(arg->bundle, NULL);
2283     if (dl)
2284       return &dl->physical->link;
2285   }
2286   return &arg->bundle->ncp.mp.link;
2287 }
2288 
2289 static const char *
2290 ident_cmd(const char *cmd, unsigned *keep, unsigned *add)
2291 {
2292   const char *result;
2293 
2294   switch (*cmd) {
2295     case 'A':
2296     case 'a':
2297       result = "accept";
2298       *keep = NEG_MYMASK;
2299       *add = NEG_ACCEPTED;
2300       break;
2301     case 'D':
2302     case 'd':
2303       switch (cmd[1]) {
2304         case 'E':
2305         case 'e':
2306           result = "deny";
2307           *keep = NEG_MYMASK;
2308           *add = 0;
2309           break;
2310         case 'I':
2311         case 'i':
2312           result = "disable";
2313           *keep = NEG_HISMASK;
2314           *add = 0;
2315           break;
2316         default:
2317           return NULL;
2318       }
2319       break;
2320     case 'E':
2321     case 'e':
2322       result = "enable";
2323       *keep = NEG_HISMASK;
2324       *add = NEG_ENABLED;
2325       break;
2326     default:
2327       return NULL;
2328   }
2329 
2330   return result;
2331 }
2332 
2333 static int
2334 OptSet(struct cmdargs const *arg)
2335 {
2336   int bit = (int)(long)arg->cmd->args;
2337   const char *cmd;
2338   unsigned keep;			/* Keep these bits */
2339   unsigned add;				/* Add these bits */
2340 
2341   if ((cmd = ident_cmd(arg->argv[arg->argn-2], &keep, &add)) == NULL)
2342     return 1;
2343 
2344   if (add)
2345     arg->bundle->cfg.opt |= bit;
2346   else
2347     arg->bundle->cfg.opt &= ~bit;
2348   return 0;
2349 }
2350 
2351 static int
2352 IfaceAliasOptSet(struct cmdargs const *arg)
2353 {
2354   unsigned save = arg->bundle->cfg.opt;
2355   int result = OptSet(arg);
2356 
2357   if (result == 0)
2358     if (Enabled(arg->bundle, OPT_IFACEALIAS) && !arg->bundle->NatEnabled) {
2359       arg->bundle->cfg.opt = save;
2360       log_Printf(LogWARN, "Cannot enable iface-alias without NAT\n");
2361       result = 2;
2362     }
2363 
2364   return result;
2365 }
2366 
2367 static int
2368 NegotiateSet(struct cmdargs const *arg)
2369 {
2370   long param = (long)arg->cmd->args;
2371   struct link *l = command_ChooseLink(arg);	/* LOCAL_CX_OPT uses this */
2372   struct datalink *cx = arg->cx;	/* LOCAL_CX uses this */
2373   const char *cmd;
2374   unsigned keep;			/* Keep these bits */
2375   unsigned add;				/* Add these bits */
2376 
2377   if ((cmd = ident_cmd(arg->argv[arg->argn-2], &keep, &add)) == NULL)
2378     return 1;
2379 
2380   if ((arg->cmd->lauth & LOCAL_CX) && !cx) {
2381     log_Printf(LogWARN, "%s %s: No context (use the `link' command)\n",
2382               cmd, arg->cmd->name);
2383     return 2;
2384   } else if (cx && !(arg->cmd->lauth & (LOCAL_CX|LOCAL_CX_OPT))) {
2385     log_Printf(LogWARN, "%s %s: Redundant context (%s) ignored\n",
2386               cmd, arg->cmd->name, cx->name);
2387     cx = NULL;
2388   }
2389 
2390   switch (param) {
2391     case NEG_ACFCOMP:
2392       cx->physical->link.lcp.cfg.acfcomp &= keep;
2393       cx->physical->link.lcp.cfg.acfcomp |= add;
2394       break;
2395     case NEG_CHAP05:
2396       cx->physical->link.lcp.cfg.chap05 &= keep;
2397       cx->physical->link.lcp.cfg.chap05 |= add;
2398       break;
2399 #ifdef HAVE_DES
2400     case NEG_CHAP80:
2401       cx->physical->link.lcp.cfg.chap80nt &= keep;
2402       cx->physical->link.lcp.cfg.chap80nt |= add;
2403       break;
2404     case NEG_CHAP80LM:
2405       cx->physical->link.lcp.cfg.chap80lm &= keep;
2406       cx->physical->link.lcp.cfg.chap80lm |= add;
2407       break;
2408 #endif
2409     case NEG_DEFLATE:
2410       l->ccp.cfg.neg[CCP_NEG_DEFLATE] &= keep;
2411       l->ccp.cfg.neg[CCP_NEG_DEFLATE] |= add;
2412       break;
2413     case NEG_DNS:
2414       arg->bundle->ncp.ipcp.cfg.ns.dns_neg &= keep;
2415       arg->bundle->ncp.ipcp.cfg.ns.dns_neg |= add;
2416       break;
2417     case NEG_ENDDISC:
2418       arg->bundle->ncp.mp.cfg.negenddisc &= keep;
2419       arg->bundle->ncp.mp.cfg.negenddisc |= add;
2420       break;
2421     case NEG_LQR:
2422       cx->physical->link.lcp.cfg.lqr &= keep;
2423       cx->physical->link.lcp.cfg.lqr |= add;
2424       break;
2425     case NEG_PAP:
2426       cx->physical->link.lcp.cfg.pap &= keep;
2427       cx->physical->link.lcp.cfg.pap |= add;
2428       break;
2429     case NEG_PPPDDEFLATE:
2430       l->ccp.cfg.neg[CCP_NEG_DEFLATE24] &= keep;
2431       l->ccp.cfg.neg[CCP_NEG_DEFLATE24] |= add;
2432       break;
2433     case NEG_PRED1:
2434       l->ccp.cfg.neg[CCP_NEG_PRED1] &= keep;
2435       l->ccp.cfg.neg[CCP_NEG_PRED1] |= add;
2436       break;
2437     case NEG_PROTOCOMP:
2438       cx->physical->link.lcp.cfg.protocomp &= keep;
2439       cx->physical->link.lcp.cfg.protocomp |= add;
2440       break;
2441     case NEG_SHORTSEQ:
2442       switch (bundle_Phase(arg->bundle)) {
2443         case PHASE_DEAD:
2444           break;
2445         case PHASE_ESTABLISH:
2446           /* Make sure none of our links are DATALINK_LCP or greater */
2447           if (bundle_HighestState(arg->bundle) >= DATALINK_LCP) {
2448             log_Printf(LogWARN, "shortseq: Only changable before"
2449                        " LCP negotiations\n");
2450             return 1;
2451           }
2452           break;
2453         default:
2454           log_Printf(LogWARN, "shortseq: Only changable at phase"
2455                      " DEAD/ESTABLISH\n");
2456           return 1;
2457       }
2458       arg->bundle->ncp.mp.cfg.shortseq &= keep;
2459       arg->bundle->ncp.mp.cfg.shortseq |= add;
2460       break;
2461     case NEG_VJCOMP:
2462       arg->bundle->ncp.ipcp.cfg.vj.neg &= keep;
2463       arg->bundle->ncp.ipcp.cfg.vj.neg |= add;
2464       break;
2465   }
2466 
2467   return 0;
2468 }
2469 
2470 static struct cmdtab const NegotiateCommands[] = {
2471   {"filter-decapsulation", NULL, OptSet, LOCAL_AUTH,
2472   "filter on PPPoUDP payloads", "disable|enable",
2473   (const void *)OPT_FILTERDECAP},
2474   {"idcheck", NULL, OptSet, LOCAL_AUTH, "Check FSM reply ids",
2475   "disable|enable", (const void *)OPT_IDCHECK},
2476   {"iface-alias", NULL, IfaceAliasOptSet, LOCAL_AUTH,
2477   "retain interface addresses", "disable|enable",
2478   (const void *)OPT_IFACEALIAS},
2479   {"keep-session", NULL, OptSet, LOCAL_AUTH, "Retain device session leader",
2480   "disable|enable", (const void *)OPT_KEEPSESSION},
2481   {"loopback", NULL, OptSet, LOCAL_AUTH, "Loop packets for local iface",
2482   "disable|enable", (const void *)OPT_LOOPBACK},
2483   {"passwdauth", NULL, OptSet, LOCAL_AUTH, "Use passwd file",
2484   "disable|enable", (const void *)OPT_PASSWDAUTH},
2485   {"proxy", NULL, OptSet, LOCAL_AUTH, "Create a proxy ARP entry",
2486   "disable|enable", (const void *)OPT_PROXY},
2487   {"proxyall", NULL, OptSet, LOCAL_AUTH, "Proxy ARP for all remote hosts",
2488   "disable|enable", (const void *)OPT_PROXYALL},
2489   {"sroutes", NULL, OptSet, LOCAL_AUTH, "Use sticky routes",
2490   "disable|enable", (const void *)OPT_SROUTES},
2491   {"throughput", NULL, OptSet, LOCAL_AUTH, "Rolling throughput",
2492   "disable|enable", (const void *)OPT_THROUGHPUT},
2493   {"utmp", NULL, OptSet, LOCAL_AUTH, "Log connections in utmp",
2494   "disable|enable", (const void *)OPT_UTMP},
2495 
2496 #define OPT_MAX 10	/* accept/deny allowed below and not above */
2497 
2498   {"acfcomp", NULL, NegotiateSet, LOCAL_AUTH | LOCAL_CX,
2499   "Address & Control field compression", "accept|deny|disable|enable",
2500   (const void *)NEG_ACFCOMP},
2501   {"chap", "chap05", NegotiateSet, LOCAL_AUTH | LOCAL_CX,
2502   "Challenge Handshake Authentication Protocol", "accept|deny|disable|enable",
2503   (const void *)NEG_CHAP05},
2504 #ifdef HAVE_DES
2505   {"mschap", "chap80nt", NegotiateSet, LOCAL_AUTH | LOCAL_CX,
2506   "Microsoft (NT) CHAP", "accept|deny|disable|enable",
2507   (const void *)NEG_CHAP80},
2508   {"LANMan", "chap80lm", NegotiateSet, LOCAL_AUTH | LOCAL_CX,
2509   "Microsoft (NT) CHAP", "accept|deny|disable|enable",
2510   (const void *)NEG_CHAP80LM},
2511 #endif
2512   {"deflate", NULL, NegotiateSet, LOCAL_AUTH | LOCAL_CX_OPT,
2513   "Deflate compression", "accept|deny|disable|enable",
2514   (const void *)NEG_DEFLATE},
2515   {"deflate24", NULL, NegotiateSet, LOCAL_AUTH | LOCAL_CX_OPT,
2516   "Deflate (type 24) compression", "accept|deny|disable|enable",
2517   (const void *)NEG_PPPDDEFLATE},
2518   {"dns", NULL, NegotiateSet, LOCAL_AUTH,
2519   "DNS specification", "accept|deny|disable|enable", (const void *)NEG_DNS},
2520   {"enddisc", NULL, NegotiateSet, LOCAL_AUTH, "ENDDISC negotiation",
2521   "accept|deny|disable|enable", (const void *)NEG_ENDDISC},
2522   {"lqr", NULL, NegotiateSet, LOCAL_AUTH | LOCAL_CX,
2523   "Link Quality Reports", "accept|deny|disable|enable",
2524   (const void *)NEG_LQR},
2525   {"pap", NULL, NegotiateSet, LOCAL_AUTH | LOCAL_CX,
2526   "Password Authentication protocol", "accept|deny|disable|enable",
2527   (const void *)NEG_PAP},
2528   {"pred1", "predictor1", NegotiateSet, LOCAL_AUTH | LOCAL_CX_OPT,
2529   "Predictor 1 compression", "accept|deny|disable|enable",
2530   (const void *)NEG_PRED1},
2531   {"protocomp", NULL, NegotiateSet, LOCAL_AUTH | LOCAL_CX,
2532   "Protocol field compression", "accept|deny|disable|enable",
2533   (const void *)NEG_PROTOCOMP},
2534   {"shortseq", NULL, NegotiateSet, LOCAL_AUTH,
2535   "MP Short Sequence Numbers", "accept|deny|disable|enable",
2536   (const void *)NEG_SHORTSEQ},
2537   {"vjcomp", NULL, NegotiateSet, LOCAL_AUTH,
2538   "Van Jacobson header compression", "accept|deny|disable|enable",
2539   (const void *)NEG_VJCOMP},
2540   {"help", "?", HelpCommand, LOCAL_AUTH | LOCAL_NO_AUTH,
2541   "Display this message", "accept|deny|disable|enable help|? [value]",
2542   NegotiateCommands},
2543   {NULL, NULL, NULL},
2544 };
2545 
2546 static int
2547 NegotiateCommand(struct cmdargs const *arg)
2548 {
2549   if (arg->argc > arg->argn) {
2550     char const *argv[3];
2551     unsigned keep, add;
2552     int n;
2553 
2554     if ((argv[0] = ident_cmd(arg->argv[arg->argn-1], &keep, &add)) == NULL)
2555       return -1;
2556     argv[2] = NULL;
2557 
2558     for (n = arg->argn; n < arg->argc; n++) {
2559       argv[1] = arg->argv[n];
2560       FindExec(arg->bundle, NegotiateCommands + (keep == NEG_HISMASK ?
2561                0 : OPT_MAX), 2, 1, argv, arg->prompt, arg->cx);
2562     }
2563   } else if (arg->prompt)
2564     prompt_Printf(arg->prompt, "Use `%s ?' to get a list.\n",
2565 	    arg->argv[arg->argn-1]);
2566   else
2567     log_Printf(LogWARN, "%s command must have arguments\n",
2568               arg->argv[arg->argn] );
2569 
2570   return 0;
2571 }
2572 
2573 const char *
2574 command_ShowNegval(unsigned val)
2575 {
2576   switch (val&3) {
2577     case 1: return "disabled & accepted";
2578     case 2: return "enabled & denied";
2579     case 3: return "enabled & accepted";
2580   }
2581   return "disabled & denied";
2582 }
2583 
2584 static int
2585 ClearCommand(struct cmdargs const *arg)
2586 {
2587   struct pppThroughput *t;
2588   struct datalink *cx;
2589   int i, clear_type;
2590 
2591   if (arg->argc < arg->argn + 1)
2592     return -1;
2593 
2594   if (strcasecmp(arg->argv[arg->argn], "physical") == 0) {
2595     cx = arg->cx;
2596     if (!cx)
2597       cx = bundle2datalink(arg->bundle, NULL);
2598     if (!cx) {
2599       log_Printf(LogWARN, "A link must be specified for ``clear physical''\n");
2600       return 1;
2601     }
2602     t = &cx->physical->link.throughput;
2603   } else if (strcasecmp(arg->argv[arg->argn], "ipcp") == 0)
2604     t = &arg->bundle->ncp.ipcp.throughput;
2605   else
2606     return -1;
2607 
2608   if (arg->argc > arg->argn + 1) {
2609     clear_type = 0;
2610     for (i = arg->argn + 1; i < arg->argc; i++)
2611       if (strcasecmp(arg->argv[i], "overall") == 0)
2612         clear_type |= THROUGHPUT_OVERALL;
2613       else if (strcasecmp(arg->argv[i], "current") == 0)
2614         clear_type |= THROUGHPUT_CURRENT;
2615       else if (strcasecmp(arg->argv[i], "peak") == 0)
2616         clear_type |= THROUGHPUT_PEAK;
2617       else
2618         return -1;
2619   } else
2620     clear_type = THROUGHPUT_ALL;
2621 
2622   throughput_clear(t, clear_type, arg->prompt);
2623   return 0;
2624 }
2625 
2626 static int
2627 RunListCommand(struct cmdargs const *arg)
2628 {
2629   const char *cmd = arg->argc ? arg->argv[arg->argc - 1] : "???";
2630 
2631   if (arg->argc > arg->argn)
2632     FindExec(arg->bundle, arg->cmd->args, arg->argc, arg->argn, arg->argv,
2633              arg->prompt, arg->cx);
2634   else if (arg->prompt)
2635     prompt_Printf(arg->prompt, "Use `%s help' to get a list or `%s help"
2636                   " <option>' for syntax help.\n", cmd, cmd);
2637   else
2638     log_Printf(LogWARN, "%s command must have arguments\n", cmd);
2639 
2640   return 0;
2641 }
2642 
2643 static int
2644 IfaceAddCommand(struct cmdargs const *arg)
2645 {
2646   int bits, n, how;
2647   struct in_addr ifa, mask, brd;
2648 
2649   if (arg->argc == arg->argn + 1) {
2650     if (!ParseAddr(NULL, arg->argv[arg->argn], &ifa, NULL, NULL))
2651       return -1;
2652     mask.s_addr = brd.s_addr = INADDR_BROADCAST;
2653   } else {
2654     if (arg->argc == arg->argn + 2) {
2655       if (!ParseAddr(NULL, arg->argv[arg->argn], &ifa, &mask, &bits))
2656         return -1;
2657       n = 1;
2658     } else if (arg->argc == arg->argn + 3) {
2659       if (!ParseAddr(NULL, arg->argv[arg->argn], &ifa, NULL, NULL))
2660         return -1;
2661       if (!ParseAddr(NULL, arg->argv[arg->argn + 1], &mask, NULL, NULL))
2662         return -1;
2663       n = 2;
2664     } else
2665       return -1;
2666 
2667     if (!ParseAddr(NULL, arg->argv[arg->argn + n], &brd, NULL, NULL))
2668       return -1;
2669   }
2670 
2671   how = IFACE_ADD_LAST;
2672   if (arg->cmd->args)
2673     how |= IFACE_FORCE_ADD;
2674 
2675   return !iface_inAdd(arg->bundle->iface, ifa, mask, brd, how);
2676 }
2677 
2678 static int
2679 IfaceDeleteCommand(struct cmdargs const *arg)
2680 {
2681   struct in_addr ifa;
2682   int ok;
2683 
2684   if (arg->argc != arg->argn + 1)
2685     return -1;
2686 
2687   if (!ParseAddr(NULL, arg->argv[arg->argn], &ifa, NULL, NULL))
2688     return -1;
2689 
2690   if (arg->bundle->ncp.ipcp.fsm.state == ST_OPENED &&
2691       arg->bundle->ncp.ipcp.my_ip.s_addr == ifa.s_addr) {
2692     log_Printf(LogWARN, "%s: Cannot remove active interface address\n",
2693                inet_ntoa(ifa));
2694     return 1;
2695   }
2696 
2697   ok = iface_inDelete(arg->bundle->iface, ifa);
2698   if (!ok) {
2699     if (arg->cmd->args)
2700       ok = 1;
2701     else if (arg->prompt)
2702       prompt_Printf(arg->prompt, "%s: No such address\n", inet_ntoa(ifa));
2703     else
2704       log_Printf(LogWARN, "%s: No such address\n", inet_ntoa(ifa));
2705   }
2706 
2707   return !ok;
2708 }
2709 
2710 static int
2711 IfaceClearCommand(struct cmdargs const *arg)
2712 {
2713   int how;
2714 
2715   if (arg->argc != arg->argn)
2716     return -1;
2717 
2718   how = arg->bundle->ncp.ipcp.fsm.state == ST_OPENED ||
2719         arg->bundle->phys_type.all & PHYS_AUTO ?
2720         IFACE_CLEAR_ALIASES : IFACE_CLEAR_ALL;
2721   iface_Clear(arg->bundle->iface, how);
2722 
2723   return 0;
2724 }
2725 
2726 static int
2727 SetProcTitle(struct cmdargs const *arg)
2728 {
2729   static char title[LINE_LEN];
2730   char *argv[MAXARGS], *ptr;
2731   int len, remaining, f, argc = arg->argc - arg->argn;
2732 
2733   if (arg->argc == arg->argn) {
2734     ID0setproctitle(NULL);
2735     return 0;
2736   }
2737 
2738   if (argc >= sizeof argv / sizeof argv[0]) {
2739     argc = sizeof argv / sizeof argv[0] - 1;
2740     log_Printf(LogWARN, "Truncating proc title to %d args\n", argc);
2741   }
2742   command_Expand(argv, argc, arg->argv + arg->argn, arg->bundle, 1, getpid());
2743 
2744   ptr = title;
2745   remaining = sizeof title - 1;
2746   for (f = 0; f < argc && remaining; f++) {
2747     if (f) {
2748       *ptr++ = ' ';
2749       remaining--;
2750     }
2751     len = strlen(argv[f]);
2752     if (len > remaining)
2753       len = remaining;
2754     memcpy(ptr, argv[f], len);
2755     remaining -= len;
2756     ptr += len;
2757   }
2758   *ptr = '\0';
2759 
2760   ID0setproctitle(title);
2761 
2762   return 0;
2763 }
2764