You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
732 lines
17 KiB
732 lines
17 KiB
|
|
/*
|
|
* kPPP: A pppd Front End for the KDE project
|
|
*
|
|
* $Id$
|
|
*
|
|
* Copyright (C) 1997,98 Bernd Johannes Wuebben,
|
|
* Mario Weilguni
|
|
* Copyright (C) 1998-2002 Harri Porten <porten@kde.org>
|
|
*
|
|
*
|
|
* This program is free software; you can redistribute it and/or
|
|
* modify it under the terms of the GNU Library General Public
|
|
* License as published by the Free Software Foundation; either
|
|
* version 2 of the License, or (at your option) any later version.
|
|
*
|
|
* This program is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
* Library General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU Library General Public
|
|
* License along with this program; if not, write to the Free
|
|
* Software Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
|
|
*/
|
|
|
|
/* A note to developers:
|
|
*
|
|
* Apart from the first dozen lines in main() the following code represents
|
|
* the setuid root part of kppp. So please be careful !
|
|
* o restrain from using X, TQt or KDE library calls
|
|
* o check for possible buffer overflows
|
|
* o handle requests from the parent process with care. They might be forged.
|
|
* o be paranoid and think twice about everything you change.
|
|
*/
|
|
|
|
#include <config.h>
|
|
|
|
#if defined(__osf__) || defined(__svr4__)
|
|
#define _POSIX_PII_SOCKET
|
|
extern "C" int sethostname(char *name, int name_len);
|
|
#if !defined(__osf__)
|
|
extern "C" int _Psendmsg(int, void*, int);
|
|
extern "C" int _Precvmsg(int, void*, int);
|
|
#endif
|
|
#endif
|
|
|
|
#include "kpppconfig.h"
|
|
|
|
#include <sys/types.h>
|
|
#include <sys/uio.h>
|
|
#include <sys/stat.h>
|
|
#include <sys/socket.h>
|
|
#include <sys/ioctl.h>
|
|
#include <sys/un.h>
|
|
#include <sys/wait.h>
|
|
#include <sys/param.h>
|
|
|
|
|
|
#include <netinet/in.h>
|
|
|
|
#ifdef __FreeBSD__
|
|
# include <sys/linker.h> // for kldload
|
|
#endif
|
|
|
|
#ifdef HAVE_CONFIG_H
|
|
# include <config.h>
|
|
#endif
|
|
|
|
#ifndef HAVE_NET_IF_PPP_H
|
|
# if defined(__DragonFly__)
|
|
# include <net/ppp_layer/ppp_defs.h>
|
|
# include <net/if.h>
|
|
# include <net/ppp/if_ppp.h>
|
|
# elif defined HAVE_LINUX_IF_PPP_H
|
|
# ifndef aligned_u64
|
|
# define aligned_u64 unsigned long long __attribute__((aligned(8)))
|
|
# endif
|
|
# include <linux/if_ppp.h>
|
|
# endif
|
|
#else
|
|
# include <net/ppp_defs.h>
|
|
# include <net/if.h>
|
|
# include <net/if_ppp.h>
|
|
#endif
|
|
|
|
#include <errno.h>
|
|
#include <fcntl.h>
|
|
#include <regex.h>
|
|
#include <signal.h>
|
|
#include <stdio.h>
|
|
#include <stdlib.h>
|
|
#include <string.h>
|
|
#include <unistd.h>
|
|
#include <termios.h>
|
|
|
|
#include "opener.h"
|
|
#include "devices.h"
|
|
|
|
#ifdef HAVE_RESOLV_H
|
|
# include <arpa/nameser.h>
|
|
# include <resolv.h>
|
|
#endif
|
|
|
|
#ifndef _PATH_RESCONF
|
|
#define _PATH_RESCONF "/etc/resolv.conf"
|
|
#endif
|
|
|
|
#ifdef _XPG4_2
|
|
extern "C" {
|
|
ssize_t recvmsg(int, struct msghdr *, int);
|
|
ssize_t sendmsg(int, const struct msghdr *, int);
|
|
}
|
|
#endif
|
|
|
|
#define MY_ASSERT(x) if (!(x)) { \
|
|
fprintf(stderr, "ASSERT: \"%s\" in %s (%d)\n",#x,__FILE__,__LINE__); \
|
|
exit(1); }
|
|
|
|
#define MY_DEBUG
|
|
#ifndef MY_DEBUG
|
|
#define Debug(s) ((void)0);
|
|
#define Debug2(s, i) ((void)0);
|
|
#else
|
|
#define Debug(s) fprintf(stderr, (s "\n"));
|
|
#define Debug2(s, i) fprintf(stderr, (s), (i));
|
|
#endif
|
|
|
|
static void sighandler_child(int);
|
|
static pid_t pppdPid = -1;
|
|
static int pppdExitStatus = -1;
|
|
static int checkForInterface();
|
|
|
|
// processing will stop at first file that could be opened successfully
|
|
const char * const kppp_syslog[] = { "/var/log/syslog.ppp",
|
|
"/var/log/syslog",
|
|
"/var/log/messages",
|
|
0 };
|
|
|
|
Opener::Opener(int s) : socket(s), ttyfd(-1) {
|
|
lockfile[0] = '\0';
|
|
signal(SIGUSR1, SIG_IGN);
|
|
signal(SIGTERM, SIG_IGN);
|
|
signal(SIGINT, SIG_IGN);
|
|
signal(SIGCHLD, sighandler_child);
|
|
mainLoop();
|
|
}
|
|
|
|
void Opener::mainLoop() {
|
|
|
|
int len;
|
|
int fd = -1;
|
|
int flags, mode;
|
|
const char *device, * const *logFile;
|
|
union AllRequests request;
|
|
struct ResponseHeader response;
|
|
struct msghdr msg;
|
|
struct iovec iov;
|
|
|
|
iov.iov_base = IOV_BASE_CAST &request;
|
|
iov.iov_len = sizeof(request);
|
|
|
|
msg.msg_name = 0L;
|
|
msg.msg_namelen = 0;
|
|
msg.msg_iov = &iov;
|
|
msg.msg_iovlen = 1;
|
|
msg.msg_control = 0L;
|
|
msg.msg_controllen = 0;
|
|
|
|
// loop forever
|
|
while(1) {
|
|
len = recvmsg(socket, &msg, 0);
|
|
if(len < 0) {
|
|
switch(errno) {
|
|
case EINTR:
|
|
Debug("Opener: interrupted system call, continuing");
|
|
break;
|
|
default:
|
|
perror("Opener: error reading from socket");
|
|
_exit(1);
|
|
}
|
|
} else {
|
|
switch(request.header.type) {
|
|
|
|
case OpenDevice:
|
|
Debug("Opener: received OpenDevice");
|
|
MY_ASSERT(len == sizeof(struct OpenModemRequest));
|
|
close(ttyfd);
|
|
device = deviceByIndex(request.modem.deviceNum);
|
|
response.status = 0;
|
|
if ((ttyfd = open(device, O_RDWR|O_NDELAY|O_NOCTTY)) == -1) {
|
|
Debug("error opening modem device !");
|
|
fd = open(DEVNULL, O_RDONLY);
|
|
response.status = -errno;
|
|
sendFD(fd, &response);
|
|
close(fd);
|
|
} else
|
|
sendFD(ttyfd, &response);
|
|
break;
|
|
|
|
case OpenLock:
|
|
Debug("Opener: received OpenLock\n");
|
|
MY_ASSERT(len == sizeof(struct OpenLockRequest));
|
|
flags = request.lock.flags;
|
|
MY_ASSERT(flags == O_RDONLY || flags == O_WRONLY|O_TRUNC|O_CREAT);
|
|
if(flags == O_WRONLY|O_TRUNC|O_CREAT)
|
|
mode = 0644;
|
|
else
|
|
mode = 0;
|
|
|
|
device = deviceByIndex(request.lock.deviceNum);
|
|
MY_ASSERT(strlen(LOCK_DIR)+strlen(device) < MaxPathLen);
|
|
strlcpy(lockfile, LOCK_DIR"/LCK..", MaxPathLen);
|
|
strlcat(lockfile, strrchr(device, '/') + 1, MaxPathLen );
|
|
response.status = 0;
|
|
// TODO:
|
|
// struct stat st;
|
|
// if(stat(lockfile.data(), &st) == -1) {
|
|
// if(errno == EBADF)
|
|
// return -1;
|
|
// } else {
|
|
// // make sure that this is a regular file
|
|
// if(!S_ISREG(st.st_mode))
|
|
// return -1;
|
|
// }
|
|
if ((fd = open(lockfile, flags, mode)) == -1) {
|
|
Debug("error opening lockfile!");
|
|
lockfile[0] = '\0';
|
|
fd = open(DEVNULL, O_RDONLY);
|
|
response.status = -errno;
|
|
} else
|
|
fchown(fd, 0, 0);
|
|
sendFD(fd, &response);
|
|
close(fd);
|
|
break;
|
|
|
|
case RemoveLock:
|
|
Debug("Opener: received RemoveLock");
|
|
MY_ASSERT(len == sizeof(struct RemoveLockRequest));
|
|
close(ttyfd);
|
|
ttyfd = -1;
|
|
response.status = unlink(lockfile);
|
|
lockfile[0] = '\0';
|
|
sendResponse(&response);
|
|
break;
|
|
|
|
case OpenResolv:
|
|
Debug("Opener: received OpenResolv");
|
|
MY_ASSERT(len == sizeof(struct OpenResolvRequest));
|
|
flags = request.resolv.flags;
|
|
response.status = 0;
|
|
if ((fd = open(_PATH_RESCONF, flags)) == -1) {
|
|
Debug("error opening resolv.conf!");
|
|
fd = open(DEVNULL, O_RDONLY);
|
|
response.status = -errno;
|
|
}
|
|
sendFD(fd, &response);
|
|
close(fd);
|
|
break;
|
|
|
|
case OpenSysLog:
|
|
Debug("Opener: received OpenSysLog");
|
|
MY_ASSERT(len == sizeof(struct OpenLogRequest));
|
|
response.status = 0;
|
|
logFile = &kppp_syslog[0];
|
|
while (*logFile) {
|
|
if ((fd = open(*logFile, O_RDONLY)) >= 0)
|
|
break;
|
|
logFile++;
|
|
}
|
|
if (!*logFile) {
|
|
Debug("No success opening a syslog file !");
|
|
fd = open(DEVNULL, O_RDONLY);
|
|
response.status = -errno;
|
|
}
|
|
sendFD(fd, &response);
|
|
close(fd);
|
|
break;
|
|
|
|
case SetSecret:
|
|
Debug("Opener: received SetSecret");
|
|
MY_ASSERT(len == sizeof(struct SetSecretRequest));
|
|
response.status = !createAuthFile(request.secret.method,
|
|
request.secret.username,
|
|
request.secret.password);
|
|
sendResponse(&response);
|
|
break;
|
|
|
|
case RemoveSecret:
|
|
Debug("Opener: received RemoveSecret");
|
|
MY_ASSERT(len == sizeof(struct RemoveSecretRequest));
|
|
response.status = !removeAuthFile(request.remove.method);
|
|
sendResponse(&response);
|
|
break;
|
|
|
|
case SetHostname:
|
|
Debug("Opener: received SetHostname");
|
|
MY_ASSERT(len == sizeof(struct SetHostnameRequest));
|
|
response.status = 0;
|
|
if(sethostname(request.host.name, strlen(request.host.name)))
|
|
response.status = -errno;
|
|
sendResponse(&response);
|
|
break;
|
|
|
|
case ExecPPPDaemon:
|
|
Debug("Opener: received ExecPPPDaemon");
|
|
MY_ASSERT(len == sizeof(struct ExecDaemonRequest));
|
|
response.status = execpppd(request.daemon.arguments);
|
|
sendResponse(&response);
|
|
break;
|
|
|
|
case KillPPPDaemon:
|
|
Debug("Opener: received KillPPPDaemon");
|
|
MY_ASSERT(len == sizeof(struct KillDaemonRequest));
|
|
response.status = killpppd();
|
|
sendResponse(&response);
|
|
break;
|
|
|
|
case PPPDExitStatus:
|
|
Debug("Opener: received PPPDExitStatus");
|
|
MY_ASSERT(len == sizeof(struct PPPDExitStatusRequest));
|
|
response.status = pppdExitStatus;
|
|
sendResponse(&response);
|
|
break;
|
|
|
|
case Stop:
|
|
Debug("Opener: received STOP command");
|
|
_exit(0);
|
|
break;
|
|
|
|
default:
|
|
Debug("Opener: unknown command type. Exiting ...");
|
|
_exit(1);
|
|
}
|
|
} // else
|
|
}
|
|
}
|
|
|
|
|
|
//
|
|
// Send an open fd over a UNIX socket pair
|
|
//
|
|
int Opener::sendFD(int fd, struct ResponseHeader *response) {
|
|
|
|
union {
|
|
struct {
|
|
char _cmsg[sizeof(struct cmsghdr)];
|
|
char data[sizeof(int)]; // int fd field
|
|
};
|
|
struct cmsghdr cmsg;
|
|
} control;
|
|
struct msghdr msg;
|
|
struct iovec iov;
|
|
|
|
msg.msg_name = 0L;
|
|
msg.msg_namelen = 0;
|
|
msg.msg_iov = &iov;
|
|
msg.msg_iovlen = 1;
|
|
|
|
// Send data
|
|
iov.iov_base = IOV_BASE_CAST response;
|
|
iov.iov_len = sizeof(struct ResponseHeader);
|
|
|
|
// Send a (duplicate of) the file descriptor
|
|
control.cmsg.cmsg_len = sizeof(struct cmsghdr) + sizeof(int);
|
|
control.cmsg.cmsg_level = SOL_SOCKET;
|
|
control.cmsg.cmsg_type = MY_SCM_RIGHTS;
|
|
|
|
msg.msg_control = (char *) &control;
|
|
msg.msg_controllen = control.cmsg.cmsg_len;
|
|
|
|
#ifdef CMSG_DATA
|
|
*((int *)CMSG_DATA(&control.cmsg)) = fd;
|
|
#else
|
|
*((int *) &control.cmsg.cmsg_data) = fd;
|
|
#endif
|
|
|
|
if (sendmsg(socket, &msg, 0) < 0) {
|
|
perror("unable to send file descriptors");
|
|
return -1;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
int Opener::sendResponse(struct ResponseHeader *response) {
|
|
|
|
struct msghdr msg;
|
|
struct iovec iov;
|
|
|
|
msg.msg_name = 0L;
|
|
msg.msg_namelen = 0;
|
|
msg.msg_iov = &iov;
|
|
msg.msg_iovlen = 1;
|
|
msg.msg_control = 0L;
|
|
msg.msg_controllen = 0;
|
|
|
|
// Send data
|
|
iov.iov_base = IOV_BASE_CAST response;
|
|
iov.iov_len = sizeof(struct ResponseHeader);
|
|
|
|
if (sendmsg(socket, &msg, 0) < 0) {
|
|
perror("unable to send response");
|
|
return -1;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
const char* Opener::deviceByIndex(int idx) {
|
|
|
|
const char *device = 0L;
|
|
|
|
for(int i = 0; devices[i]; i++)
|
|
if(i == idx)
|
|
device = devices[i];
|
|
MY_ASSERT(device);
|
|
return device;
|
|
}
|
|
|
|
bool Opener::createAuthFile(Auth method, char *username, char *password) {
|
|
const char *authfile, *oldName, *newName;
|
|
char line[100];
|
|
char regexp[2*MaxStrLen+30];
|
|
regex_t preg;
|
|
|
|
if(!(authfile = authFile(method)))
|
|
return false;
|
|
|
|
if(!(newName = authFile(method, New)))
|
|
return false;
|
|
|
|
// look for username, "username" or 'username'
|
|
// if you modify this RE you have to adapt regexp's size above
|
|
snprintf(regexp, sizeof(regexp), "^[ \t]*%s[ \t]\\|^[ \t]*[\"\']%s[\"\']",
|
|
username,username);
|
|
MY_ASSERT(regcomp(&preg, regexp, 0) == 0);
|
|
|
|
// copy to new file pap- or chap-secrets
|
|
int old_umask = umask(0077);
|
|
FILE *fout = fopen(newName, "w");
|
|
if(fout) {
|
|
// copy old file
|
|
FILE *fin = fopen(authfile, "r");
|
|
if(fin) {
|
|
while(fgets(line, sizeof(line), fin)) {
|
|
if(regexec(&preg, line, 0, 0L, 0) == 0)
|
|
continue;
|
|
fputs(line, fout);
|
|
}
|
|
fclose(fin);
|
|
}
|
|
|
|
// append user/pass pair
|
|
fprintf(fout, "\"%s\"\t*\t\"%s\"\n", username, password);
|
|
fclose(fout);
|
|
}
|
|
|
|
// restore umask
|
|
umask(old_umask);
|
|
|
|
// free memory allocated by regcomp
|
|
regfree(&preg);
|
|
|
|
if(!(oldName = authFile(method, Old)))
|
|
return false;
|
|
|
|
// delete old file if any
|
|
unlink(oldName);
|
|
|
|
rename(authfile, oldName);
|
|
rename(newName, authfile);
|
|
|
|
return true;
|
|
}
|
|
|
|
|
|
bool Opener::removeAuthFile(Auth method) {
|
|
const char *authfile, *oldName;
|
|
|
|
if(!(authfile = authFile(method)))
|
|
return false;
|
|
if(!(oldName = authFile(method, Old)))
|
|
return false;
|
|
|
|
if(access(oldName, F_OK) == 0) {
|
|
unlink(authfile);
|
|
return (rename(oldName, authfile) == 0);
|
|
} else
|
|
return false;
|
|
}
|
|
|
|
|
|
const char* Opener::authFile(Auth method, int version) {
|
|
switch(method|version) {
|
|
case PAP|Original:
|
|
return PAP_AUTH_FILE;
|
|
break;
|
|
case PAP|New:
|
|
return PAP_AUTH_FILE".new";
|
|
break;
|
|
case PAP|Old:
|
|
return PAP_AUTH_FILE".old";
|
|
break;
|
|
case CHAP|Original:
|
|
return CHAP_AUTH_FILE;
|
|
break;
|
|
case CHAP|New:
|
|
return CHAP_AUTH_FILE".new";
|
|
break;
|
|
case CHAP|Old:
|
|
return CHAP_AUTH_FILE".old";
|
|
break;
|
|
default:
|
|
return 0L;
|
|
}
|
|
}
|
|
|
|
|
|
bool Opener::execpppd(const char *arguments) {
|
|
char buf[MAX_CMDLEN];
|
|
char *args[MaxArgs];
|
|
pid_t pgrpid;
|
|
|
|
if(ttyfd<0)
|
|
return false;
|
|
|
|
pppdExitStatus = -1;
|
|
|
|
switch(pppdPid = fork())
|
|
{
|
|
case -1:
|
|
fprintf(stderr,"In parent: fork() failed\n");
|
|
return false;
|
|
break;
|
|
|
|
case 0:
|
|
// let's parse the arguments the user supplied into UNIX suitable form
|
|
// that is a list of pointers each pointing to exactly one word
|
|
strlcpy(buf, arguments, sizeof(buf));
|
|
parseargs(buf, args);
|
|
// become a session leader and let /dev/ttySx
|
|
// be the controlling terminal.
|
|
pgrpid = setsid();
|
|
#ifdef TIOCSCTTY
|
|
if(ioctl(ttyfd, TIOCSCTTY, 0)<0)
|
|
fprintf(stderr, "ioctl() failed.\n");
|
|
#elif defined (TIOCSPGRP)
|
|
if(ioctl(ttyfd, TIOCSPGRP, &pgrpid)<0)
|
|
fprintf(stderr, "ioctl() failed.\n");
|
|
#endif
|
|
if(tcsetpgrp(ttyfd, pgrpid)<0)
|
|
fprintf(stderr, "tcsetpgrp() failed.\n");
|
|
|
|
dup2(ttyfd, 0);
|
|
dup2(ttyfd, 1);
|
|
|
|
switch (checkForInterface()) {
|
|
case 1:
|
|
fprintf(stderr, "Cannot determine if kernel supports ppp.\n");
|
|
break;
|
|
case -1:
|
|
fprintf(stderr, "Kernel does not support ppp, oops.\n");
|
|
break;
|
|
case 0:
|
|
fprintf(stderr, "Kernel supports ppp alright.\n");
|
|
break;
|
|
}
|
|
|
|
execve(pppdPath(), args, 0L);
|
|
_exit(0);
|
|
break;
|
|
|
|
default:
|
|
Debug2("In parent: pppd pid %d\n",pppdPid);
|
|
close(ttyfd);
|
|
ttyfd = -1;
|
|
return true;
|
|
break;
|
|
}
|
|
}
|
|
|
|
|
|
bool Opener::killpppd()const {
|
|
if(pppdPid > 0) {
|
|
Debug2("In killpppd(): Sending SIGTERM to %d\n", pppdPid);
|
|
if(kill(pppdPid, SIGTERM) < 0) {
|
|
Debug2("Error terminating %d. Sending SIGKILL\n", pppdPid);
|
|
if(kill(pppdPid, SIGKILL) < 0) {
|
|
Debug2("Error killing %d\n", pppdPid);
|
|
return false;
|
|
}
|
|
}
|
|
}
|
|
return true;
|
|
}
|
|
|
|
|
|
void Opener::parseargs(char* buf, char** args) {
|
|
int nargs = 0;
|
|
int quotes;
|
|
|
|
while(nargs < MaxArgs-1 && *buf != '\0') {
|
|
|
|
quotes = 0;
|
|
|
|
// Strip whitespace. Use nulls, so that the previous argument is
|
|
// terminated automatically.
|
|
|
|
while ((*buf == ' ' ) || (*buf == '\t' ) || (*buf == '\n' ) )
|
|
*buf++ = '\0';
|
|
|
|
// detect begin of quoted argument
|
|
if (*buf == '"' || *buf == '\'') {
|
|
quotes = *buf;
|
|
*buf++ = '\0';
|
|
}
|
|
|
|
// save the argument
|
|
if(*buf != '\0') {
|
|
*args++ = buf;
|
|
nargs++;
|
|
}
|
|
|
|
if (!quotes)
|
|
while ((*buf != '\0') && (*buf != '\n') &&
|
|
(*buf != '\t') && (*buf != ' '))
|
|
buf++;
|
|
else {
|
|
while ((*buf != '\0') && (*buf != quotes))
|
|
buf++;
|
|
*buf++ = '\0';
|
|
}
|
|
}
|
|
|
|
*args = 0L;
|
|
}
|
|
|
|
|
|
const char* pppdPath() {
|
|
// wasting a few bytes
|
|
static char buffer[sizeof(PPPDSEARCHPATH)+sizeof(PPPDNAME)];
|
|
static char *pppdPath = 0L;
|
|
char *p;
|
|
|
|
if(pppdPath == 0L) {
|
|
const char *c = PPPDSEARCHPATH;
|
|
while(*c != '\0') {
|
|
while(*c == ':')
|
|
c++;
|
|
p = buffer;
|
|
while(*c != '\0' && *c != ':')
|
|
*p++ = *c++;
|
|
*p = '\0';
|
|
strcat(p, "/");
|
|
strcat(p, PPPDNAME);
|
|
if(access(buffer, F_OK) == 0)
|
|
return (pppdPath = buffer);
|
|
}
|
|
}
|
|
|
|
return pppdPath;
|
|
}
|
|
|
|
int checkForInterface()
|
|
{
|
|
// I don't know if Linux needs more initialization to get the ioctl to
|
|
// work, pppd seems to hint it does. But BSD doesn't, and the following
|
|
// code should compile.
|
|
#if (defined(HAVE_NET_IF_PPP_H) || defined(HAVE_LINUX_IF_PPP_H)) && !defined(__svr4__)
|
|
int s, ok;
|
|
struct ifreq ifr;
|
|
// extern char *no_ppp_msg;
|
|
|
|
if ((s = socket(AF_INET, SOCK_DGRAM, 0)) < 0)
|
|
return 1; /* can't tell */
|
|
|
|
strlcpy(ifr.ifr_name, "ppp0", sizeof (ifr.ifr_name));
|
|
ok = ioctl(s, SIOCGIFFLAGS, (caddr_t) &ifr) >= 0;
|
|
close(s);
|
|
|
|
if (ok == -1) {
|
|
// This is ifdef'd FreeBSD, because FreeBSD is the only BSD that supports
|
|
// KLDs, the old LKM interface couldn't handle loading devices
|
|
// dynamically, and thus can't load ppp support on the fly
|
|
#ifdef __FreeBSD__
|
|
// If we failed to load ppp support and don't have it already.
|
|
if (kldload("if_ppp") == -1) {
|
|
return -1;
|
|
}
|
|
return 0;
|
|
#else
|
|
return -1;
|
|
#endif
|
|
}
|
|
return 0;
|
|
#else
|
|
// We attempt to use the SunOS/SysVr4 method and stat /dev/ppp
|
|
struct stat buf;
|
|
|
|
memset(&buf, 0, sizeof(buf));
|
|
return stat("/dev/ppp", &buf);
|
|
#endif
|
|
}
|
|
|
|
|
|
void sighandler_child(int) {
|
|
pid_t pid;
|
|
int status;
|
|
|
|
signal(SIGCHLD, sighandler_child);
|
|
if(pppdPid>0) {
|
|
pid = waitpid(pppdPid, &status, WNOHANG);
|
|
if(pid != pppdPid) {
|
|
fprintf(stderr, "received SIGCHLD from unknown origin.\n");
|
|
} else {
|
|
Debug("It was pppd that died");
|
|
pppdPid = -1;
|
|
if((WIFEXITED(status))) {
|
|
pppdExitStatus = (WEXITSTATUS(status));
|
|
Debug2("pppd exited with return value %d\n", pppdExitStatus);
|
|
} else {
|
|
pppdExitStatus = 99;
|
|
Debug("pppd exited abnormally.");
|
|
}
|
|
Debug2("Sending %i a SIGUSR1\n", getppid());
|
|
kill(getppid(), SIGUSR1);
|
|
}
|
|
} else
|
|
fprintf(stderr, "received unexpected SIGCHLD.\n");
|
|
}
|