/* chronyd/chronyc - Programs for keeping computer clocks accurate. ********************************************************************** * Copyright (C) Richard P. Curnow 1997-2003 * Copyright (C) Miroslav Lichvar 2009-2011 * * This program is free software; you can redistribute it and/or modify * it under the terms of version 2 of the GNU General Public License as * published by the Free Software Foundation. * * This program is distributed in the hope that it will be useful, but * WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU * General Public License for more details. * * You should have received a copy of the GNU General Public License along * with this program; if not, write to the Free Software Foundation, Inc., * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA. * ********************************************************************** ======================================================================= Command line client for configuring the daemon and obtaining status from it whilst running. */ #include "sysincl.h" #include "candm.h" #include "nameserv.h" #include "md5.h" #include "version.h" #include "getdate.h" #include "cmdparse.h" #include "pktlength.h" #include "memory.h" #include "util.h" #ifdef FEAT_READLINE #ifdef USE_EDITLINE #include #else #include #include #endif #endif #ifdef HAS_STDINT_H #include #elif defined(HAS_INTTYPES_H) #include #endif /* ================================================== */ union sockaddr_in46 { struct sockaddr_in in4; #ifdef HAVE_IPV6 struct sockaddr_in6 in6; #endif struct sockaddr u; }; static int sock_fd; union sockaddr_in46 his_addr; static socklen_t his_addr_len; static int on_terminal = 0; static int no_dns = 0; /* ================================================== */ /* Ought to extract some code from util.c to make a new set of utilities that can be linked into either the daemon or the client. */ static char * time_to_log_form(time_t t) { struct tm stm; static char buffer[64]; static const char *months[] = {"Jan", "Feb", "Mar", "Apr", "May", "Jun", "Jul", "Aug", "Sep", "Oct", "Nov", "Dec"}; stm = *gmtime(&t); snprintf(buffer, sizeof(buffer), "%2d%s%02d %02d:%02d:%02d", stm.tm_mday, months[stm.tm_mon], stm.tm_year % 100, stm.tm_hour, stm.tm_min, stm.tm_sec); return buffer; } /* ================================================== */ /* Read a single line of commands from standard input. Eventually we might want to use the GNU readline library. */ static char * read_line(void) { static char line[2048]; static const char *prompt = "chronyc> "; if (on_terminal) { #ifdef FEAT_READLINE char *cmd; /* save line only if not empty */ cmd = readline(prompt); if( cmd == NULL ) return( NULL ); /* user pressed return */ if( *cmd != '\0' ) { strncpy(line, cmd, sizeof(line) - 1); line[sizeof(line) - 1] = '\0'; add_history(cmd); /* free the buffer allocated by readline */ free(cmd); } else { /* simulate the user has entered an empty line */ *line = '\0'; } return( line ); #else printf("%s", prompt); #endif } if (fgets(line, sizeof(line), stdin)) { return line; } else { return NULL; } } /* ================================================== */ /* Initialise the socket used to talk to the daemon */ static void open_io(const char *hostname, int port) { IPAddr ip; /* Note, this call could block for a while */ if (DNS_Name2IPAddress(hostname, &ip) != DNS_Success) { fprintf(stderr, "Could not get IP address for %s\n", hostname); exit(1); } memset(&his_addr, 0, sizeof (his_addr)); switch (ip.family) { case IPADDR_INET4: sock_fd = socket(AF_INET, SOCK_DGRAM, 0); his_addr.in4.sin_family = AF_INET; his_addr.in4.sin_addr.s_addr = htonl(ip.addr.in4); his_addr.in4.sin_port = htons(port); his_addr_len = sizeof (his_addr.in4); break; #ifdef HAVE_IPV6 case IPADDR_INET6: sock_fd = socket(AF_INET6, SOCK_DGRAM, 0); his_addr.in6.sin6_family = AF_INET6; memcpy(his_addr.in6.sin6_addr.s6_addr, ip.addr.in6, sizeof (his_addr.in6.sin6_addr.s6_addr)); his_addr.in6.sin6_port = htons(port); his_addr_len = sizeof (his_addr.in6); break; #endif default: assert(0); } if (sock_fd < 0) { perror("Can't create socket"); exit(1); } return; } /* ================================================== */ static void close_io(void) { close(sock_fd); } /* ================================================== */ static void bits_to_mask(int bits, int family, IPAddr *mask) { int i; mask->family = family; switch (family) { case IPADDR_INET4: if (bits < 0) bits = 32; if (bits > 0) { mask->addr.in4 = -1; mask->addr.in4 <<= 32 - bits; } else { mask->addr.in4 = 0; } break; case IPADDR_INET6: if (bits > 128 || bits < 0) bits = 128; for (i = 0; i < bits / 8; i++) mask->addr.in6[i] = 0xff; if (i < 16) mask->addr.in6[i++] = (0xff << (8 - bits % 8)) & 0xff; for (; i < 16; i++) mask->addr.in6[i] = 0x0; break; default: assert(0); } } /* ================================================== */ static int read_mask_address(char *line, IPAddr *mask, IPAddr *address) { unsigned int bits; char *p, *q; p = line; while (*p && isspace((unsigned char)*p)) p++; if (!*p) { mask->family = address->family = IPADDR_UNSPEC; return 1; } else { q = strchr(p, '/'); if (q) { *q++ = 0; if (UTI_StringToIP(p, mask)) { p = q; while (*q && !isspace((unsigned char)*q)) q++; *q = 0; if (UTI_StringToIP(p, address)) { if (address->family == mask->family) return 1; } else if (sscanf(p, "%u", &bits) == 1) { *address = *mask; bits_to_mask(bits, address->family, mask); return 1; } } } else { if (UTI_StringToIP(p, address)) { bits_to_mask(-1, address->family, mask); return 1; } } } fprintf(stderr, "Invalid syntax for mask/address\n"); return 0; } /* ================================================== */ static int process_cmd_offline(CMD_Request *msg, char *line) { IPAddr mask, address; int ok; if (read_mask_address(line, &mask, &address)) { UTI_IPHostToNetwork(&mask, &msg->data.offline.mask); UTI_IPHostToNetwork(&address, &msg->data.offline.address); msg->command = htons(REQ_OFFLINE); ok = 1; } else { ok = 0; } return ok; } /* ================================================== */ static int process_cmd_online(CMD_Request *msg, char *line) { IPAddr mask, address; int ok; if (read_mask_address(line, &mask, &address)) { UTI_IPHostToNetwork(&mask, &msg->data.online.mask); UTI_IPHostToNetwork(&address, &msg->data.online.address); msg->command = htons(REQ_ONLINE); ok = 1; } else { ok = 0; } return ok; } /* ================================================== */ static int read_address_integer(char *line, IPAddr *address, int *value) { char hostname[2048]; int ok = 0; if (sscanf(line, "%2047s %d", hostname, value) != 2) { fprintf(stderr, "Invalid syntax for address value\n"); ok = 0; } else { if (DNS_Name2IPAddress(hostname, address) != DNS_Success) { fprintf(stderr, "Could not get address for hostname\n"); ok = 0; } else { ok = 1; } } return ok; } /* ================================================== */ static int read_address_double(char *line, IPAddr *address, double *value) { char hostname[2048]; int ok = 0; if (sscanf(line, "%2047s %lf", hostname, value) != 2) { fprintf(stderr, "Invalid syntax for address value\n"); ok = 0; } else { if (DNS_Name2IPAddress(hostname, address) != DNS_Success) { fprintf(stderr, "Could not get address for hostname\n"); ok = 0; } else { ok = 1; } } return ok; } /* ================================================== */ static int process_cmd_minpoll(CMD_Request *msg, char *line) { IPAddr address; int minpoll; int ok; if (read_address_integer(line, &address, &minpoll)) { UTI_IPHostToNetwork(&address, &msg->data.modify_minpoll.address); msg->data.modify_minpoll.new_minpoll = htonl(minpoll); msg->command = htons(REQ_MODIFY_MINPOLL); ok = 1; } else { ok = 0; } return ok; } /* ================================================== */ static int process_cmd_maxpoll(CMD_Request *msg, char *line) { IPAddr address; int maxpoll; int ok; if (read_address_integer(line, &address, &maxpoll)) { UTI_IPHostToNetwork(&address, &msg->data.modify_maxpoll.address); msg->data.modify_maxpoll.new_maxpoll = htonl(maxpoll); msg->command = htons(REQ_MODIFY_MAXPOLL); ok = 1; } else { ok = 0; } return ok; } /* ================================================== */ static int process_cmd_maxdelay(CMD_Request *msg, char *line) { IPAddr address; double max_delay; int ok; if (read_address_double(line, &address, &max_delay)) { UTI_IPHostToNetwork(&address, &msg->data.modify_maxdelay.address); msg->data.modify_maxdelay.new_max_delay = UTI_FloatHostToNetwork(max_delay); msg->command = htons(REQ_MODIFY_MAXDELAY); ok = 1; } else { ok = 0; } return ok; } /* ================================================== */ static int process_cmd_maxdelaydevratio(CMD_Request *msg, char *line) { IPAddr address; double max_delay_dev_ratio; int ok; if (read_address_double(line, &address, &max_delay_dev_ratio)) { UTI_IPHostToNetwork(&address, &msg->data.modify_maxdelaydevratio.address); msg->data.modify_maxdelayratio.new_max_delay_ratio = UTI_FloatHostToNetwork(max_delay_dev_ratio); msg->command = htons(REQ_MODIFY_MAXDELAYDEVRATIO); ok = 1; } else { ok = 0; } return ok; } /* ================================================== */ static int process_cmd_maxdelayratio(CMD_Request *msg, char *line) { IPAddr address; double max_delay_ratio; int ok; if (read_address_double(line, &address, &max_delay_ratio)) { UTI_IPHostToNetwork(&address, &msg->data.modify_maxdelayratio.address); msg->data.modify_maxdelayratio.new_max_delay_ratio = UTI_FloatHostToNetwork(max_delay_ratio); msg->command = htons(REQ_MODIFY_MAXDELAYRATIO); ok = 1; } else { ok = 0; } return ok; } /* ================================================== */ static int process_cmd_minstratum(CMD_Request *msg, char *line) { IPAddr address; int min_stratum; int ok; if (read_address_integer(line, &address, &min_stratum)) { UTI_IPHostToNetwork(&address, &msg->data.modify_minstratum.address); msg->data.modify_minstratum.new_min_stratum = htonl(min_stratum); msg->command = htons(REQ_MODIFY_MINSTRATUM); ok = 1; } else { ok = 0; } return ok; } /* ================================================== */ static int process_cmd_polltarget(CMD_Request *msg, char *line) { IPAddr address; int poll_target; int ok; if (read_address_integer(line, &address, &poll_target)) { UTI_IPHostToNetwork(&address, &msg->data.modify_polltarget.address); msg->data.modify_polltarget.new_poll_target = htonl(poll_target); msg->command = htons(REQ_MODIFY_POLLTARGET); ok = 1; } else { ok = 0; } return ok; } /* ================================================== */ static int process_cmd_maxupdateskew(CMD_Request *msg, char *line) { int ok; double new_max_update_skew; if (sscanf(line, "%lf", &new_max_update_skew) == 1) { msg->data.modify_maxupdateskew.new_max_update_skew = UTI_FloatHostToNetwork(new_max_update_skew); msg->command = htons(REQ_MODIFY_MAXUPDATESKEW); ok = 1; } else { ok = 0; } return ok; } /* ================================================== */ static void process_cmd_dump(CMD_Request *msg, char *line) { msg->command = htons(REQ_DUMP); } /* ================================================== */ static void process_cmd_writertc(CMD_Request *msg, char *line) { msg->command = htons(REQ_WRITERTC); } /* ================================================== */ static void process_cmd_trimrtc(CMD_Request *msg, char *line) { msg->command = htons(REQ_TRIMRTC); } /* ================================================== */ static void process_cmd_cyclelogs(CMD_Request *msg, char *line) { msg->command = htons(REQ_CYCLELOGS); } /* ================================================== */ static int process_cmd_burst(CMD_Request *msg, char *line) { int n_good_samples, n_total_samples; int n_parsed; char s[101]; IPAddr address, mask; n_parsed = sscanf(line, "%d/%d %100s", &n_good_samples, &n_total_samples, s); msg->command = htons(REQ_BURST); msg->data.burst.n_good_samples = ntohl(n_good_samples); msg->data.burst.n_total_samples = ntohl(n_total_samples); mask.family = address.family = IPADDR_UNSPEC; if (n_parsed < 2 || (n_parsed == 3 && !read_mask_address(s, &mask, &address))) { fprintf(stderr, "Invalid syntax for burst command\n"); return 0; } UTI_IPHostToNetwork(&mask, &msg->data.burst.mask); UTI_IPHostToNetwork(&address, &msg->data.burst.address); return 1; } /* ================================================== */ static int process_cmd_local(CMD_Request *msg, const char *line) { const char *p; int stratum; p = line; while (*p && isspace((unsigned char)*p)) p++; if (!*p) { return 0; } else if (!strncmp(p, "off", 3)) { msg->data.local.on_off = htonl(0); } else if (sscanf(p, "stratum%d", &stratum) == 1) { msg->data.local.on_off = htonl(1); msg->data.local.stratum = htonl(stratum); } else { fprintf(stderr, "Invalid syntax for local command\n"); return 0; } msg->command = htons(REQ_LOCAL); return 1; } /* ================================================== */ static int process_cmd_manual(CMD_Request *msg, const char *line) { const char *p; p = line; while (*p && isspace((unsigned char)*p)) p++; if (!*p) { return 0; } else if (!strncmp(p, "off", 3)) { msg->data.manual.option = htonl(0); } else if (!strncmp(p, "on", 2)) { msg->data.manual.option = htonl(1); } else if (!strncmp(p, "reset", 5)) { msg->data.manual.option = htonl(2); } else { return 0; } msg->command = htons(REQ_MANUAL); return 1; } /* ================================================== */ static int parse_allow_deny(CMD_Request *msg, char *line) { unsigned long a, b, c, d, n; IPAddr ip; char *p, *q; p = line; while (*p && isspace((unsigned char)*p)) p++; if (!*p) { /* blank line - applies to all addresses */ ip.family = IPADDR_UNSPEC; UTI_IPHostToNetwork(&ip, &msg->data.allow_deny.ip); msg->data.allow_deny.subnet_bits = htonl(0); } else { char *slashpos; slashpos = strchr(p, '/'); if (slashpos) *slashpos = 0; n = 0; if (!UTI_StringToIP(p, &ip) && (n = sscanf(p, "%lu.%lu.%lu.%lu", &a, &b, &c, &d)) == 0) { /* Try to parse as the name of a machine */ q = p; while (*q) { if (*q == '\n') *q = 0; q++; } if (DNS_Name2IPAddress(p, &ip) != DNS_Success) { fprintf(stderr, "Could not read address\n"); return 0; } else { UTI_IPHostToNetwork(&ip, &msg->data.allow_deny.ip); if (ip.family == IPADDR_INET6) msg->data.allow_deny.subnet_bits = htonl(128); else msg->data.allow_deny.subnet_bits = htonl(32); } } else { if (n == 0) { if (ip.family == IPADDR_INET6) msg->data.allow_deny.subnet_bits = htonl(128); else msg->data.allow_deny.subnet_bits = htonl(32); } else { ip.family = IPADDR_INET4; a &= 0xff; b &= 0xff; c &= 0xff; d &= 0xff; switch (n) { case 1: ip.addr.in4 = htonl((a<<24)); msg->data.allow_deny.subnet_bits = htonl(8); break; case 2: ip.addr.in4 = htonl((a<<24) | (b<<16)); msg->data.allow_deny.subnet_bits = htonl(16); break; case 3: ip.addr.in4 = htonl((a<<24) | (b<<16) | (c<<8)); msg->data.allow_deny.subnet_bits = htonl(24); break; case 4: ip.addr.in4 = htonl((a<<24) | (b<<16) | (c<<8) | d); msg->data.allow_deny.subnet_bits = htonl(32); break; default: assert(0); } } UTI_IPHostToNetwork(&ip, &msg->data.allow_deny.ip); if (slashpos) { int specified_subnet_bits, cnt; cnt = sscanf(slashpos+1, "%d", &specified_subnet_bits); if (cnt == 1) { msg->data.allow_deny.subnet_bits = htonl(specified_subnet_bits); } else { fprintf(stderr, "Warning: badly formatted subnet size, using %ld\n", (long) ntohl(msg->data.allow_deny.subnet_bits)); } } } } return 1; } /* ================================================== */ static int process_cmd_allow(CMD_Request *msg, char *line) { int status; msg->command = htons(REQ_ALLOW); status = parse_allow_deny(msg, line); return status; } /* ================================================== */ static int process_cmd_allowall(CMD_Request *msg, char *line) { int status; msg->command = htons(REQ_ALLOWALL); status = parse_allow_deny(msg, line); return status; } /* ================================================== */ static int process_cmd_deny(CMD_Request *msg, char *line) { int status; msg->command = htons(REQ_DENY); status = parse_allow_deny(msg, line); return status; } /* ================================================== */ static int process_cmd_denyall(CMD_Request *msg, char *line) { int status; msg->command = htons(REQ_DENYALL); status = parse_allow_deny(msg, line); return status; } /* ================================================== */ static int process_cmd_cmdallow(CMD_Request *msg, char *line) { int status; msg->command = htons(REQ_CMDALLOW); status = parse_allow_deny(msg, line); return status; } /* ================================================== */ static int process_cmd_cmdallowall(CMD_Request *msg, char *line) { int status; msg->command = htons(REQ_CMDALLOWALL); status = parse_allow_deny(msg, line); return status; } /* ================================================== */ static int process_cmd_cmddeny(CMD_Request *msg, char *line) { int status; msg->command = htons(REQ_CMDDENY); status = parse_allow_deny(msg, line); return status; } /* ================================================== */ static int process_cmd_cmddenyall(CMD_Request *msg, char *line) { int status; msg->command = htons(REQ_CMDDENYALL); status = parse_allow_deny(msg, line); return status; } /* ================================================== */ static int accheck_getaddr(char *line, IPAddr *addr) { unsigned long a, b, c, d; IPAddr ip; char *p, *q; p = line; while (*p && isspace(*p)) p++; if (!*p) { return 0; } else { if (sscanf(p, "%lu.%lu.%lu.%lu", &a, &b, &c, &d) == 4) { addr->family = IPADDR_INET4; addr->addr.in4 = (a<<24) | (b<<16) | (c<<8) | d; return 1; } else { q = p; while (*q) { if (*q == '\n') *q = 0; q++; } if (DNS_Name2IPAddress(p, &ip) != DNS_Success) { return 0; } else { *addr = ip; return 1; } } } } /* ================================================== */ static int process_cmd_accheck(CMD_Request *msg, char *line) { IPAddr ip; msg->command = htons(REQ_ACCHECK); if (accheck_getaddr(line, &ip)) { UTI_IPHostToNetwork(&ip, &msg->data.ac_check.ip); return 1; } else { fprintf(stderr, "Could not read address\n"); return 0; } } /* ================================================== */ static int process_cmd_cmdaccheck(CMD_Request *msg, char *line) { IPAddr ip; msg->command = htons(REQ_CMDACCHECK); if (accheck_getaddr(line, &ip)) { UTI_IPHostToNetwork(&ip, &msg->data.ac_check.ip); return 1; } else { fprintf(stderr, "Could not read address\n"); return 0; } } /* ================================================== */ static void process_cmd_dfreq(CMD_Request *msg, char *line) { double dfreq; msg->command = htons(REQ_DFREQ); if (sscanf(line, "%lf", &dfreq) == 1) { msg->data.dfreq.dfreq = UTI_FloatHostToNetwork(dfreq); } else { msg->data.dfreq.dfreq = UTI_FloatHostToNetwork(0.0); } } /* ================================================== */ static void cvt_to_sec_usec(double x, long *sec, long *usec) { long s, us; s = (long) x; us = (long)(0.5 + 1.0e6 * (x - (double) s)); while (us >= 1000000) { us -= 1000000; s += 1; } while (us < 0) { us += 1000000; s -= 1; } *sec = s; *usec = us; return; } /* ================================================== */ static void process_cmd_doffset(CMD_Request *msg, char *line) { double doffset; long sec, usec; msg->command = htons(REQ_DOFFSET); if (sscanf(line, "%lf", &doffset) == 1) { cvt_to_sec_usec(doffset, &sec, &usec); msg->data.doffset.sec = htonl(sec); msg->data.doffset.usec = htonl(usec); } else { msg->data.doffset.sec = htonl(0); msg->data.doffset.usec = htonl(0); } } /* ================================================== */ static int process_cmd_add_server_or_peer(CMD_Request *msg, char *line) { CPS_NTP_Source data; CPS_Status status; int result = 0; status = CPS_ParseNTPSourceAdd(line, &data); switch (status) { case CPS_Success: /* Don't retry name resolving */ if (data.ip_addr.family == IPADDR_UNSPEC) { Free(data.name); fprintf(stderr, "Invalid host/IP address\n"); break; } if (data.params.min_stratum != SRC_DEFAULT_MINSTRATUM) { fprintf(stderr, "Option minstratum not supported\n"); break; } if (data.params.poll_target != SRC_DEFAULT_POLLTARGET) { fprintf(stderr, "Option polltarget not supported\n"); break; } if (data.params.max_delay_dev_ratio != SRC_DEFAULT_MAXDELAYDEVRATIO) { fprintf(stderr, "Option maxdelaydevratio not supported\n"); break; } msg->data.ntp_source.port = htonl((unsigned long) data.port); UTI_IPHostToNetwork(&data.ip_addr, &msg->data.ntp_source.ip_addr); msg->data.ntp_source.minpoll = htonl(data.params.minpoll); msg->data.ntp_source.maxpoll = htonl(data.params.maxpoll); msg->data.ntp_source.presend_minpoll = htonl(data.params.presend_minpoll); msg->data.ntp_source.authkey = htonl(data.params.authkey); msg->data.ntp_source.max_delay = UTI_FloatHostToNetwork(data.params.max_delay); msg->data.ntp_source.max_delay_ratio = UTI_FloatHostToNetwork(data.params.max_delay_ratio); msg->data.ntp_source.flags = htonl( (data.params.online ? REQ_ADDSRC_ONLINE : 0) | (data.params.auto_offline ? REQ_ADDSRC_AUTOOFFLINE : 0) | (data.params.iburst ? REQ_ADDSRC_IBURST : 0) | (data.params.sel_option == SRC_SelectPrefer ? REQ_ADDSRC_PREFER : 0) | (data.params.sel_option == SRC_SelectNoselect ? REQ_ADDSRC_NOSELECT : 0)); result = 1; break; case CPS_BadOption: fprintf(stderr, "Unrecognized subcommand\n"); break; case CPS_BadHost: fprintf(stderr, "Invalid host/IP address\n"); break; case CPS_BadPort: fprintf(stderr, "Unreadable port number\n"); break; case CPS_BadMinpoll: fprintf(stderr, "Unreadable minpoll value\n"); break; case CPS_BadMaxpoll: fprintf(stderr, "Unreadable maxpoll value\n"); break; case CPS_BadPresend: fprintf(stderr, "Unreadable presend value\n"); break; case CPS_BadMaxdelaydevratio: fprintf(stderr, "Unreadable max delay dev ratio value\n"); break; case CPS_BadMaxdelayratio: fprintf(stderr, "Unreadable max delay ratio value\n"); break; case CPS_BadMaxdelay: fprintf(stderr, "Unreadable max delay value\n"); break; case CPS_BadKey: fprintf(stderr, "Unreadable key value\n"); break; case CPS_BadMinstratum: fprintf(stderr, "Unreadable minstratum value\n"); break; case CPS_BadPolltarget: fprintf(stderr, "Unreadable polltarget value\n"); break; } return result; } /* ================================================== */ static int process_cmd_add_server(CMD_Request *msg, char *line) { msg->command = htons(REQ_ADD_SERVER); return process_cmd_add_server_or_peer(msg, line); } /* ================================================== */ static int process_cmd_add_peer(CMD_Request *msg, char *line) { msg->command = htons(REQ_ADD_PEER); return process_cmd_add_server_or_peer(msg, line); } /* ================================================== */ static int process_cmd_delete(CMD_Request *msg, char *line) { char hostname[2048]; int ok = 0; IPAddr address; msg->command = htons(REQ_DEL_SOURCE); if (sscanf(line, "%2047s", hostname) != 1) { fprintf(stderr, "Invalid syntax for address\n"); ok = 0; } else { if (DNS_Name2IPAddress(hostname, &address) != DNS_Success) { fprintf(stderr, "Could not get address for hostname\n"); ok = 0; } else { ok = 1; } } UTI_IPHostToNetwork(&address, &msg->data.del_source.ip_addr); return ok; } /* ================================================== */ static int password_seen = 0; static MD5_CTX md5_after_just_password; /* ================================================== */ static int process_cmd_password(CMD_Request *msg, char *line) { char *p, *q; char *password; struct timeval now; p = line; while (*p && isspace((unsigned char)*p)) p++; /* Get rid of trailing newline */ for (q=p; *q; q++) { if (isspace((unsigned char)*q)) *q = 0; } if (*p) { password = p; } else { /* blank line, prompt for password */ password = getpass("Password: "); } if (!*password) { password_seen = 0; } else { password_seen = 1; } /* Generate MD5 initial context */ MD5Init(&md5_after_just_password); MD5Update(&md5_after_just_password, (unsigned char *) password, strlen(password)); /* Blank the password for security */ for (p = password; *p; p++) { *p = 0; } if (gettimeofday(&now, NULL) < 0) { printf("500 - Could not read time of day\n"); return 0; } else { msg->command = htons(REQ_LOGON); /* Just force a round trip so that we get tokens etc */ UTI_TimevalHostToNetwork(&now, &msg->data.logon.ts); return 1; } } /* ================================================== */ static void generate_auth(CMD_Request *msg) { MD5_CTX ctx; int pkt_len; pkt_len = PKL_CommandLength(msg); ctx = md5_after_just_password; MD5Update(&ctx, (unsigned char *) msg, offsetof(CMD_Request, auth)); if (pkt_len > offsetof(CMD_Request, data)) { MD5Update(&ctx, (unsigned char *) &(msg->data), pkt_len - offsetof(CMD_Request, data)); } MD5Final(&ctx); memcpy(&(msg->auth), &ctx.digest, 16); } /* ================================================== */ static int check_reply_auth(CMD_Reply *msg) { int pkt_len; MD5_CTX ctx; pkt_len = PKL_ReplyLength(msg); ctx = md5_after_just_password; MD5Update(&ctx, (unsigned char *) msg, offsetof(CMD_Request, auth)); if (pkt_len > offsetof(CMD_Reply, data)) { MD5Update(&ctx, (unsigned char *) &(msg->data), pkt_len - offsetof(CMD_Reply, data)); } MD5Final(&ctx); if (!memcmp((void *) &ctx.digest, (void *) &(msg->auth), 16)) { return 1; } else { return 0; } } /* ================================================== */ static void give_help(void) { printf("Commands:\n"); printf("accheck
: Check whether NTP access is allowed to
\n"); printf("activity : Check how many NTP sources are online/offline\n"); printf("add peer
... : Add a new NTP peer\n"); printf("add server
... : Add a new NTP server\n"); printf("allow [] : Allow NTP access to that subnet as a default\n"); printf("allow all [] : Allow NTP access to that subnet and all children\n"); printf("burst / [/] : Start a rapid set of measurements\n"); printf("clients : Report on clients that have accessed the server\n"); printf("cmdaccheck
: Check whether command access is allowed to
\n"); printf("cmdallow [] : Allow command access to that subnet as a default\n"); printf("cmdallow all [] : Allow command access to that subnet and all children\n"); printf("cmddeny [] : Deny command access to that subnet as a default\n"); printf("cmddeny all [] : Deny command access to that subnet and all children\n"); printf("cyclelogs : Close and re-open logs files\n"); printf("delete
: Remove an NTP server or peer\n"); printf("deny [] : Deny NTP access to that subnet as a default\n"); printf("deny all [] : Deny NTP access to that subnet and all children\n"); printf("dump : Dump all measurements to save files\n"); printf("local off : Disable server capability for unsynchronised clock\n"); printf("local stratum : Enable server capability for unsynchronised clock\n"); printf("makestep : Jump the time to remove any correction being slewed\n"); printf("manual off|on|reset : Disable/enable/reset settime command and statistics\n"); printf("manual list : Show previous settime entries\n"); printf("maxdelay
: Modify maximum round-trip valid sample delay for source\n"); printf("maxdelayratio
: Modify max round-trip delay ratio for source\n"); printf("maxdelaydevratio
: Modify max round-trip delay dev ratio for source\n"); printf("maxpoll
: Modify maximum polling interval of source\n"); printf("maxupdateskew : Modify maximum skew for a clock frequency update to be made\n"); printf("minpoll
: Modify minimum polling interval of source\n"); printf("minstratum
: Modify minimum stratum of source\n"); printf("offline [/] : Set sources in subnet to offline status\n"); printf("online [/] : Set sources in subnet to online status\n"); printf("password [] : Set command authentication password\n"); printf("polltarget
: Modify poll target of source\n"); printf("reselect : Reselect synchronisation source\n"); printf("rtcdata : Print current RTC performance parameters\n"); printf("settime : Manually set the daemon time\n"); printf("sources [-v] : Display information about current sources\n"); printf("sourcestats [-v] : Display estimation information about current sources\n"); printf("tracking : Display system time information\n"); printf("trimrtc : Correct RTC relative to system clock\n"); printf("writertc : Save RTC parameters to file\n"); printf("\n"); printf("dns -n|+n : Disable/enable resolving IP addresses to hostnames\n"); printf("dns -4|-6|-46 : Resolve hostnames only to IPv4/IPv6/both addresses\n"); printf("timeout : Set initial response timeout\n"); printf("retries : Set maximum number of retries\n"); printf("exit|quit : Leave the program\n"); printf("help : Generate this help\n"); printf("\n"); } /* ================================================== */ static unsigned long sequence = 0; static unsigned long utoken = 0; static unsigned long token = 0; static int max_retries = 2; static int initial_timeout = 1000; /* This is the core protocol module. Complete particular fields in the outgoing packet, send it, wait for a response, handle retries, etc. Returns a Boolean indicating whether the protocol was successful or not.*/ static int submit_request(CMD_Request *request, CMD_Reply *reply, int *reply_auth_ok) { unsigned long tx_sequence; socklen_t where_from_len; union sockaddr_in46 where_from; int bad_length, bad_sender, bad_sequence, bad_header; int select_status; int recvfrom_status; int read_length; int expected_length; int command_length; struct timeval tv; int timeout; int n_attempts; fd_set rdfd, wrfd, exfd; request->version = PROTO_VERSION_NUMBER; request->pkt_type = PKT_TYPE_CMD_REQUEST; request->res1 = 0; request->res2 = 0; tx_sequence = sequence++; request->sequence = htonl(tx_sequence); request->attempt = 0; request->utoken = htonl(utoken); request->token = htonl(token); timeout = initial_timeout; n_attempts = 0; do { /* Decide whether to authenticate */ if (password_seen) { if (!utoken || (request->command == htons(REQ_LOGON))) { /* Otherwise, the daemon won't bother authenticating our packet and we won't get a token back */ request->utoken = htonl(SPECIAL_UTOKEN); } generate_auth(request); } else { memset(request->auth, 0, sizeof (request->auth)); } command_length = PKL_CommandLength(request); assert(command_length > 0); #if 0 printf("Sent command length=%d bytes\n", command_length); #endif if (sendto(sock_fd, (void *) request, command_length, 0, &his_addr.u, his_addr_len) < 0) { #if 0 perror("Could not send packet"); #endif return 0; } /* Increment this for next time */ ++ request->attempt; tv.tv_sec = timeout / 1000; tv.tv_usec = timeout % 1000 * 1000; timeout *= 2; FD_ZERO(&rdfd); FD_ZERO(&wrfd); FD_ZERO(&exfd); FD_SET(sock_fd, &rdfd); select_status = select(sock_fd + 1, &rdfd, &wrfd, &exfd, &tv); if (select_status < 0) { #if 0 perror("Select returned negative status"); #endif } else if (select_status == 0) { /* Timeout must have elapsed, try a resend? */ n_attempts ++; if (n_attempts > max_retries) { return 0; } /* Back to top of loop to do resend */ continue; } else { where_from_len = sizeof(where_from); recvfrom_status = recvfrom(sock_fd, (void *) reply, sizeof(CMD_Reply), 0, &where_from.u, &where_from_len); #if 0 printf("Received packet, status=%d\n", recvfrom_status); #endif if (recvfrom_status < 0) { /* If we get connrefused here, it suggests the sendto is going to a dead port - but only if the daemon machine is running Linux (Solaris doesn't return anything) */ n_attempts++; if (n_attempts > max_retries) { return 0; } } else { read_length = recvfrom_status; expected_length = PKL_ReplyLength(reply); bad_length = (read_length != expected_length); bad_sender = (where_from.u.sa_family != his_addr.u.sa_family || (where_from.u.sa_family == AF_INET && (where_from.in4.sin_addr.s_addr != his_addr.in4.sin_addr.s_addr || where_from.in4.sin_port != his_addr.in4.sin_port)) || #ifdef HAVE_IPV6 (where_from.u.sa_family == AF_INET6 && (memcmp(where_from.in6.sin6_addr.s6_addr, his_addr.in6.sin6_addr.s6_addr, sizeof (where_from.in6.sin6_addr.s6_addr)) != 0 || where_from.in6.sin6_port != his_addr.in6.sin6_port)) || #endif 0); if (!bad_length) { bad_sequence = (ntohl(reply->sequence) != tx_sequence); } else { bad_sequence = 0; } if (bad_length || bad_sender || bad_sequence) { n_attempts++; if (n_attempts > max_retries) { return 0; } continue; } bad_header = ((reply->version != PROTO_VERSION_NUMBER && !(reply->version >= PROTO_VERSION_MISMATCH_COMPAT && ntohs(reply->status) == STT_BADPKTVERSION)) || (reply->pkt_type != PKT_TYPE_CMD_REPLY) || (reply->res1 != 0) || (reply->res2 != 0) || (reply->command != request->command)); if (bad_header) { n_attempts++; if (n_attempts > max_retries) { return 0; } continue; } /* Good packet received, print out results */ #if 0 printf("Reply cmd=%d reply=%d stat=%d num=%d tot=%d seq=%d utok=%08lx tok=%d\n", ntohs(reply->command), ntohs(reply->reply), ntohs(reply->status), ntohs(reply->number), ntohs(reply->total), ntohl(reply->sequence), ntohl(reply->utoken), ntohl(reply->token)); #endif if (password_seen) { *reply_auth_ok = check_reply_auth(reply); } else { /* Assume in this case that the reply is always considered to be authentic */ *reply_auth_ok = 1; } utoken = ntohl(reply->utoken); if (*reply_auth_ok) { /* If we're in authenticated mode, only acquire the utoken and new token values if the reply authenticated properly. This protects against forged packets with bogus tokens in. We won't accept a repeat of an old message with a stale token in it, due to bad_sequence processing earlier. */ utoken = ntohl(reply->utoken); token = ntohl(reply->token); } break; } } } while (1); return 1; } /* ================================================== */ static int request_reply(CMD_Request *request, CMD_Reply *reply, int requested_reply, int verbose) { int reply_auth_ok; int status; if (!submit_request(request, reply, &reply_auth_ok)) { printf("506 Cannot talk to daemon\n"); return 0; } status = ntohs(reply->status); if (verbose || status != STT_SUCCESS) { switch (status) { case STT_SUCCESS: printf("200 OK"); break; case STT_ACCESSALLOWED: printf("208 Access allowed"); break; case STT_ACCESSDENIED: printf("209 Access denied"); break; case STT_FAILED: printf("500 Failure"); break; case STT_UNAUTH: printf("501 Not authorised"); break; case STT_INVALID: printf("502 Invalid command"); break; case STT_NOSUCHSOURCE: printf("503 No such source"); break; case STT_INVALIDTS: printf("504 Duplicate or stale logon detected"); break; case STT_NOTENABLED: printf("505 Facility not enabled in daemon"); break; case STT_BADSUBNET: printf("507 Bad subnet"); break; case STT_NOHOSTACCESS: printf("510 No command access from this host"); break; case STT_SOURCEALREADYKNOWN: printf("511 Source already present"); break; case STT_TOOMANYSOURCES: printf("512 Too many sources present"); break; case STT_NORTC: printf("513 RTC driver not running"); break; case STT_BADRTCFILE: printf("514 Can't write RTC parameters"); break; case STT_INVALIDAF: printf("515 Invalid address family"); break; case STT_BADSAMPLE: printf("516 Sample index out of range"); break; case STT_BADPKTVERSION: printf("517 Protocol version mismatch"); break; case STT_BADPKTLENGTH: printf("518 Packet length mismatch"); break; case STT_INACTIVE: printf("519 Client logging is not active in the daemon"); break; default: printf("520 Got unexpected error from daemon"); } if (reply_auth_ok) { printf("\n"); } else { printf(" --- Reply not authenticated\n"); } } if (status != STT_SUCCESS && status != STT_ACCESSALLOWED && status != STT_ACCESSDENIED) { return 0; } if (ntohs(reply->reply) != requested_reply) { printf("508 Bad reply from daemon\n"); return 0; } return 1; } /* ================================================== */ static void print_seconds(unsigned long s) { unsigned long d; if (s <= 1024) { printf("%4ld", s); } else if (s < 36000) { printf("%3ldm", s / 60); } else if (s < 345600) { printf("%3ldh", s / 3600); } else { d = s / 86400; if (d > 999) { printf("%3ldy", d / 365); } else { printf("%3ldd", d); } } } /* ================================================== */ static void print_nanoseconds(double s) { s = fabs(s); if (s < 9999.5e-9) { printf("%4.0fns", s * 1e9); } else if (s < 9999.5e-6) { printf("%4.0fus", s * 1e6); } else if (s < 9999.5e-3) { printf("%4.0fms", s * 1e3); } else if (s < 999.5) { printf("%5.1fs", s); } else if (s < 99999.5) { printf("%5.0fs", s); } else if (s < 99999.5 * 60) { printf("%5.0fm", s / 60); } else if (s < 99999.5 * 3600) { printf("%5.0fh", s / 3600); } else if (s < 99999.5 * 3600 * 24) { printf("%5.0fd", s / (3600 * 24)); } else { printf("%5.0fy", s / (3600 * 24 * 365)); } } /* ================================================== */ static void print_signed_nanoseconds(double s) { double x; x = fabs(s); if (x < 9999.5e-9) { printf("%+5.0fns", s * 1e9); } else if (x < 9999.5e-6) { printf("%+5.0fus", s * 1e6); } else if (x < 9999.5e-3) { printf("%+5.0fms", s * 1e3); } else if (x < 999.5) { printf("%+6.1fs", s); } else if (x < 99999.5) { printf("%+6.0fs", s); } else if (x < 99999.5 * 60) { printf("%+6.0fm", s / 60); } else if (x < 99999.5 * 3600) { printf("%+6.0fh", s / 3600); } else if (x < 99999.5 * 3600 * 24) { printf("%+6.0fd", s / (3600 * 24)); } else { printf("%+6.0fy", s / (3600 * 24 * 365)); } } /* ================================================== */ static void print_freq_ppm(double f) { if (fabs(f) < 99999.5) { printf("%10.3f", f); } else { printf("%10.0f", f); } } /* ================================================== */ static int check_for_verbose_flag(char *line) { char *p = line; while (*p && isspace((unsigned char)*p)) p++; if (!strncmp(p, "-v", 2)) { return 1; } else { return 0; } } /* ================================================== */ static int process_cmd_sources(char *line) { CMD_Request request; CMD_Reply reply; int n_sources, i; int verbose = 0; double orig_latest_meas, latest_meas, latest_meas_err; IPAddr ip_addr; uint32_t latest_meas_ago; uint16_t poll, stratum; uint16_t state, mode; char hostname_buf[50]; /* Check whether to output verbose headers */ verbose = check_for_verbose_flag(line); request.command = htons(REQ_N_SOURCES); if (request_reply(&request, &reply, RPY_N_SOURCES, 0)) { n_sources = ntohl(reply.data.n_sources.n_sources); printf("210 Number of sources = %d\n", n_sources); if (verbose) { printf("\n"); printf(" .-- Source mode '^' = server, '=' = peer, '#' = local clock.\n"); printf(" / .- Source state '*' = current synced, '+' = OK for sync, '?' = unreachable,\n"); printf("| / 'x' = time may be in error, '~' = time is too variable.\n"); printf("|| .- xxxx [ yyyy ] +/- zzzz\n"); printf("|| / xxxx = adjusted offset,\n"); printf("|| Log2(Polling interval) -. | yyyy = measured offset,\n"); printf("|| \\ | zzzz = estimated error.\n"); printf("|| | | \n"); } printf("MS Name/IP address Stratum Poll LastRx Last sample\n"); printf("============================================================================\n"); /* "MS NNNNNNNNNNNNNNNNNNNNNNNNN SS PP RRRR SSSSSSS[SSSSSSS] +/- SSSSSS" */ for (i=0; i> 24); b = (ref_id >> 16) & 0xff; c = (ref_id >> 8) & 0xff; d = (ref_id) & 0xff; UTI_IPNetworkToHost(&reply.data.tracking.ip_addr, &ip_addr); if (ip_addr.family == IPADDR_UNSPEC) { ref_ip = UTI_RefidToString(ref_id); } else if (no_dns) { ref_ip = UTI_IPToString(&ip_addr); } else { DNS_IPAddress2Name(&ip_addr, host, sizeof (host)); ref_ip = host; } printf("Reference ID : %lu.%lu.%lu.%lu (%s)\n", a, b, c, d, ref_ip); printf("Stratum : %lu\n", (unsigned long) ntohl(reply.data.tracking.stratum)); UTI_TimevalNetworkToHost(&reply.data.tracking.ref_time, &ref_time); ref_time_tm = *gmtime((time_t *)&ref_time.tv_sec); printf("Ref time (UTC) : %s", asctime(&ref_time_tm)); correction = UTI_FloatNetworkToHost(reply.data.tracking.current_correction); printf("System time : %.9f seconds %s of NTP time\n", fabs(correction), (correction > 0.0) ? "slow" : "fast"); freq_ppm = UTI_FloatNetworkToHost(reply.data.tracking.freq_ppm); resid_freq_ppm = UTI_FloatNetworkToHost(reply.data.tracking.resid_freq_ppm); skew_ppm = UTI_FloatNetworkToHost(reply.data.tracking.skew_ppm); root_delay = UTI_FloatNetworkToHost(reply.data.tracking.root_delay); root_dispersion = UTI_FloatNetworkToHost(reply.data.tracking.root_dispersion); printf("Frequency : %.3f ppm %s\n", fabs(freq_ppm), (freq_ppm < 0.0) ? "slow" : "fast"); printf("Residual freq : %.3f ppm\n", resid_freq_ppm); printf("Skew : %.3f ppm\n", skew_ppm); printf("Root delay : %.6f seconds\n", root_delay); printf("Root dispersion : %.6f seconds\n", root_dispersion); return 1; } return 0; } /* ================================================== */ static int process_cmd_rtcreport(char *line) { CMD_Request request; CMD_Reply reply; struct timeval ref_time; struct tm ref_time_tm; unsigned short n_samples; unsigned short n_runs; unsigned long span_seconds; double coef_seconds_fast; double coef_gain_rate_ppm; request.command = htons(REQ_RTCREPORT); if (request_reply(&request, &reply, RPY_RTC, 0)) { UTI_TimevalNetworkToHost(&reply.data.rtc.ref_time, &ref_time); ref_time_tm = *gmtime(&ref_time.tv_sec); n_samples = ntohs(reply.data.rtc.n_samples); n_runs = ntohs(reply.data.rtc.n_runs); span_seconds = ntohl(reply.data.rtc.span_seconds); coef_seconds_fast = UTI_FloatNetworkToHost(reply.data.rtc.rtc_seconds_fast); coef_gain_rate_ppm = UTI_FloatNetworkToHost(reply.data.rtc.rtc_gain_rate_ppm); printf("RTC ref time (UTC) : %s", asctime(&ref_time_tm)); printf("Number of samples : %d\n", n_samples); printf("Number of runs : %d\n", n_runs); printf("Sample span period : "); print_seconds(span_seconds); printf("\n"); printf("RTC is fast by : %12.6f seconds\n", coef_seconds_fast); printf("RTC gains time at : %9.3f ppm\n", coef_gain_rate_ppm); return 1; } return 0; } /* ================================================== */ #if 0 /* This is a previous attempt at implementing the clients command. It could be re-instated sometime as a way of looking at all clients in a particular subnet. The problem with it is that is requires at least 5 round trips to the server even if the server only has one client to report. */ typedef struct XSubnetToDo { struct XSubnetToDo *next; unsigned long ip; unsigned long bits; } SubnetToDo; static void process_cmd_clients(char *line) { CMD_Request request; CMD_Reply reply; SubnetToDo *head, *todo, *tail, *p, *next_node, *new_node; int i, j, nets_looked_up, clients_looked_up; int word; unsigned long mask; unsigned long ip, bits; unsigned long client_hits; unsigned long peer_hits; unsigned long cmd_hits_auth; unsigned long cmd_hits_normal; unsigned long cmd_hits_bad; unsigned long last_ntp_hit_ago; unsigned long last_cmd_hit_ago; char hostname_buf[50]; int n_replies; head = todo = MallocNew(SubnetToDo); todo->next = NULL; /* Set up initial query = root subnet */ todo->ip = 0; todo->bits = 0; tail = todo; do { request.command = htons(REQ_SUBNETS_ACCESSED); /* Build list of subnets to examine */ i=0; p=todo; while((i < MAX_SUBNETS_ACCESSED) && p && (p->bits < 32)) { request.data.subnets_accessed.subnets[i].ip = htonl(p->ip); request.data.subnets_accessed.subnets[i].bits_specd = htonl(p->bits); p = p->next; i++; } nets_looked_up = i; if (nets_looked_up == 0) { /* No subnets need examining */ break; } request.data.subnets_accessed.n_subnets = htonl(nets_looked_up); if (request_reply(&request, &reply, RPY_SUBNETS_ACCESSED, 0)) { n_replies = ntohl(reply.data.subnets_accessed.n_subnets); for (j=0; jnext = NULL; new_node->bits = bits + 8; new_node->ip = ip | (i << (24 - bits)); tail->next = new_node; tail = new_node; #if 0 printf("%08lx %2d %3d %08lx\n", ip, bits, i, new_node->ip); #endif } } } /* Skip the todo pointer forwards by the number of nets looked up. Can't do this earlier, because we might have to point at the next layer of subnets that have only just been concatenated to the linked list. */ for (i=0; inext; } } } else { return; } } while (1); /* keep going until all subnets have been expanded, down to single nodes */ /* Now the todo list consists of client records */ request.command = htons(REQ_CLIENT_ACCESSES); #if 0 printf("%d %d\n", sizeof (RPY_ClientAccesses_Client), offsetof(CMD_Reply, data.client_accesses.clients)); #endif printf("Hostname Client Peer CmdAuth CmdNorm CmdBad LstN LstC\n" "========================= ====== ====== ====== ====== ====== ==== ====\n"); do { i = 0; p = todo; while ((i < MAX_CLIENT_ACCESSES) && p) { request.data.client_accesses.client_ips[i] = htonl(p->ip); p = p->next; i++; } clients_looked_up = i; if (clients_looked_up == 0) { /* No more clients to do */ break; } request.data.client_accesses.n_clients = htonl(clients_looked_up); if (request_reply(&request, &reply, RPY_CLIENT_ACCESSES, 0)) { n_replies = ntohl(reply.data.client_accesses.n_clients); for (j=0; jnext; } } } while (1); cleanup: for (p = head; p; ) { next_node = p->next; Free(p); p = next_node; } } #endif /* New implementation of clients command */ static int process_cmd_clients(char *line) { CMD_Request request; CMD_Reply reply; unsigned long next_index; int j; IPAddr ip; unsigned long client_hits; unsigned long peer_hits; unsigned long cmd_hits_auth; unsigned long cmd_hits_normal; unsigned long cmd_hits_bad; unsigned long last_ntp_hit_ago; unsigned long last_cmd_hit_ago; char hostname_buf[50]; int n_replies; int n_indices_in_table; next_index = 0; printf("Hostname Client Peer CmdAuth CmdNorm CmdBad LstN LstC\n" "========================= ====== ====== ====== ====== ====== ==== ====\n"); do { request.command = htons(REQ_CLIENT_ACCESSES_BY_INDEX); request.data.client_accesses_by_index.first_index = htonl(next_index); request.data.client_accesses_by_index.n_indices = htonl(MAX_CLIENT_ACCESSES); if (request_reply(&request, &reply, RPY_CLIENT_ACCESSES_BY_INDEX, 0)) { n_replies = ntohl(reply.data.client_accesses_by_index.n_clients); n_indices_in_table = ntohl(reply.data.client_accesses_by_index.n_indices); if (n_replies == 0) { goto finished; } for (j=0; j= n_indices_in_table) { goto finished; } } else { return 0; } } while (1); /* keep going until all subnets have been expanded, down to single nodes */ finished: return 1; } /* ================================================== */ /* Process the manual list command */ static int process_cmd_manual_list(const char *line) { CMD_Request request; CMD_Reply reply; int n_samples; RPY_ManualListSample *sample; int i; struct timeval when; double slewed_offset, orig_offset, residual; request.command = htons(REQ_MANUAL_LIST); if (request_reply(&request, &reply, RPY_MANUAL_LIST, 0)) { n_samples = ntohl(reply.data.manual_list.n_samples); printf("210 n_samples = %d\n", n_samples); printf("# Date Time(UTC) Slewed Original Residual\n" "====================================================\n"); for (i=0; iwhen, &when); slewed_offset = UTI_FloatNetworkToHost(sample->slewed_offset); orig_offset = UTI_FloatNetworkToHost(sample->orig_offset); residual = UTI_FloatNetworkToHost(sample->residual); printf("%2d %s %10.2f %10.2f %10.2f\n", i, time_to_log_form(when.tv_sec), slewed_offset, orig_offset, residual); } return 1; } return 0; } /* ================================================== */ static int process_cmd_manual_delete(CMD_Request *msg, const char *line) { int index; if (sscanf(line, "%d", &index) != 1) { fprintf(stderr, "Bad syntax for manual delete command\n"); return 0; } msg->command = htons(REQ_MANUAL_DELETE); msg->data.manual_delete.index = htonl(index); return 1; } /* ================================================== */ static int process_cmd_settime(char *line) { struct timeval ts; time_t now, new_time; CMD_Request request; CMD_Reply reply; long offset_cs; double dfreq_ppm, new_afreq_ppm; double offset; now = time(NULL); new_time = get_date(line, &now); if (new_time == -1) { printf("510 - Could not parse date string\n"); } else { ts.tv_sec = new_time; ts.tv_usec = 0; UTI_TimevalHostToNetwork(&ts, &request.data.settime.ts); request.command = htons(REQ_SETTIME); if (request_reply(&request, &reply, RPY_MANUAL_TIMESTAMP, 1)) { offset_cs = ntohl(reply.data.manual_timestamp.centiseconds); offset = 0.01 * (double) offset_cs; dfreq_ppm = UTI_FloatNetworkToHost(reply.data.manual_timestamp.dfreq_ppm); new_afreq_ppm = UTI_FloatNetworkToHost(reply.data.manual_timestamp.new_afreq_ppm); printf("Clock was %.2f seconds fast. Frequency change = %.2fppm, new frequency = %.2fppm\n", offset, dfreq_ppm, new_afreq_ppm); return 1; } } return 0; } /* ================================================== */ static void process_cmd_rekey(CMD_Request *msg, char *line) { msg->command = htons(REQ_REKEY); } /* ================================================== */ static void process_cmd_makestep(CMD_Request *msg, char *line) { msg->command = htons(REQ_MAKESTEP); } /* ================================================== */ static int process_cmd_activity(const char *line) { CMD_Request request; CMD_Reply reply; request.command = htons(REQ_ACTIVITY); if (request_reply(&request, &reply, RPY_ACTIVITY, 1)) { printf( "%ld sources online\n" "%ld sources offline\n" "%ld sources doing burst (return to online)\n" "%ld sources doing burst (return to offline)\n", (long) ntohl(reply.data.activity.online), (long) ntohl(reply.data.activity.offline), (long) ntohl(reply.data.activity.burst_online), (long) ntohl(reply.data.activity.burst_offline)); return 1; } return 0; } /* ================================================== */ static void process_cmd_reselect(CMD_Request *msg, char *line) { msg->command = htons(REQ_RESELECT); } /* ================================================== */ static int process_cmd_dns(const char *line) { if (!strncmp(line, "-46", 3)) { DNS_SetAddressFamily(IPADDR_UNSPEC); } else if (!strncmp(line, "-4", 2)) { DNS_SetAddressFamily(IPADDR_INET4); } else if (!strncmp(line, "-6", 2)) { DNS_SetAddressFamily(IPADDR_INET6); } else if (!strncmp(line, "-n", 2)) { no_dns = 1; } else if (!strncmp(line, "+n", 2)) { no_dns = 0; } else { fprintf(stderr, "Unrecognized dns command\n"); return 0; } return 1; } /* ================================================== */ static int process_cmd_timeout(const char *line) { int timeout; timeout = atoi(line); if (timeout < 100) { fprintf(stderr, "Timeout %d is too short\n", timeout); return 0; } initial_timeout = timeout; return 1; } /* ================================================== */ static int process_cmd_retries(const char *line) { int retries; retries = atoi(line); if (retries < 0) { fprintf(stderr, "Invalid maximum number of retries\n"); return 0; } max_retries = retries; return 1; } /* ================================================== */ static int process_line(char *line, int *quit) { char *p; int do_normal_submit; int ret; CMD_Request tx_message; CMD_Reply rx_message; *quit = 0; ret = 0; do_normal_submit = 1; /* Check for line being blank */ p = line; while (*p && isspace((unsigned char)*p)) p++; if (!*p) { fflush(stderr); fflush(stdout); return ret; }; if (!strncmp(p, "offline", 7)) { do_normal_submit = process_cmd_offline(&tx_message, p+7); } else if (!strncmp(p, "online", 6)) { do_normal_submit = process_cmd_online(&tx_message, p+6); } else if (!strncmp(p, "burst", 5)) { do_normal_submit = process_cmd_burst(&tx_message, p+5); } else if (!strncmp(p, "password", 8)) { do_normal_submit = process_cmd_password(&tx_message, p+8); } else if (!strncmp(p, "minpoll", 7)) { do_normal_submit = process_cmd_minpoll(&tx_message, p+7); } else if (!strncmp(p, "maxpoll", 7)) { do_normal_submit = process_cmd_maxpoll(&tx_message, p+7); } else if (!strncmp(p, "dump", 4)) { process_cmd_dump(&tx_message, p+4); } else if (!strncmp(p, "maxdelaydevratio", 16)) { do_normal_submit = process_cmd_maxdelaydevratio(&tx_message, p+16); } else if (!strncmp(p, "maxdelayratio", 13)) { do_normal_submit = process_cmd_maxdelayratio(&tx_message, p+13); } else if (!strncmp(p, "maxdelay", 8)) { do_normal_submit = process_cmd_maxdelay(&tx_message, p+8); } else if (!strncmp(p, "maxupdateskew", 13)) { do_normal_submit = process_cmd_maxupdateskew(&tx_message, p+13); } else if (!strncmp(p, "minstratum", 10)) { do_normal_submit = process_cmd_minstratum(&tx_message, p+10); } else if (!strncmp(p, "polltarget", 10)) { do_normal_submit = process_cmd_polltarget(&tx_message, p+10); } else if (!strncmp(p, "settime", 7)) { do_normal_submit = 0; ret = process_cmd_settime(p+7); } else if (!strncmp(p, "local", 5)) { do_normal_submit = process_cmd_local(&tx_message, p+5); } else if (!strncmp(p, "manual list", 11)) { do_normal_submit = 0; ret = process_cmd_manual_list(p+11); } else if (!strncmp(p, "manual delete", 13)) { do_normal_submit = process_cmd_manual_delete(&tx_message, p+13); } else if (!strncmp(p, "manual", 6)) { do_normal_submit = process_cmd_manual(&tx_message, p+6); } else if (!strncmp(p, "sourcestats", 11)) { do_normal_submit = 0; ret = process_cmd_sourcestats(p+11); } else if (!strncmp(p, "sources", 7)) { do_normal_submit = 0; ret = process_cmd_sources(p+7); } else if (!strncmp(p, "rekey", 5)) { process_cmd_rekey(&tx_message, p+5); } else if (!strncmp(p, "allow all", 9)) { do_normal_submit = process_cmd_allowall(&tx_message, p+9); } else if (!strncmp(p, "allow", 5)) { do_normal_submit = process_cmd_allow(&tx_message, p+5); } else if (!strncmp(p, "deny all", 8)) { do_normal_submit = process_cmd_denyall(&tx_message, p+8); } else if (!strncmp(p, "deny", 4)) { do_normal_submit = process_cmd_deny(&tx_message, p+4); } else if (!strncmp(p, "cmdallow all", 12)) { do_normal_submit = process_cmd_cmdallowall(&tx_message, p+12); } else if (!strncmp(p, "cmdallow", 8)) { do_normal_submit = process_cmd_cmdallow(&tx_message, p+8); } else if (!strncmp(p, "cmddeny all", 11)) { do_normal_submit = process_cmd_cmddenyall(&tx_message, p+11); } else if (!strncmp(p, "cmddeny", 7)) { do_normal_submit = process_cmd_cmddeny(&tx_message, p+7); } else if (!strncmp(p, "accheck", 7)) { do_normal_submit = process_cmd_accheck(&tx_message, p+7); } else if (!strncmp(p, "cmdaccheck", 10)) { do_normal_submit = process_cmd_cmdaccheck(&tx_message, p+10); } else if (!strncmp(p, "add server", 10)) { do_normal_submit = process_cmd_add_server(&tx_message, p+10); } else if (!strncmp(p, "add peer", 8)) { do_normal_submit = process_cmd_add_peer(&tx_message, p+8); } else if (!strncmp(p, "delete", 6)) { do_normal_submit = process_cmd_delete(&tx_message, p+6); } else if (!strncmp(p, "writertc", 7)) { process_cmd_writertc(&tx_message, p+7); } else if (!strncmp(p, "rtcdata", 7)) { do_normal_submit = 0; ret = process_cmd_rtcreport(p); } else if (!strncmp(p, "trimrtc", 7)) { process_cmd_trimrtc(&tx_message, p); } else if (!strncmp(p, "cyclelogs", 9)) { process_cmd_cyclelogs(&tx_message, p); } else if (!strncmp(p, "dfreq", 5)) { process_cmd_dfreq(&tx_message, p+5); } else if (!strncmp(p, "doffset", 7)) { process_cmd_doffset(&tx_message, p+7); } else if (!strncmp(p, "tracking", 8)) { ret = process_cmd_tracking(p+8); do_normal_submit = 0; } else if (!strncmp(p, "clients", 7)) { ret = process_cmd_clients(p+7); do_normal_submit = 0; } else if (!strncmp(p, "makestep", 8)) { process_cmd_makestep(&tx_message, p+8); } else if (!strncmp(p, "activity", 8)) { ret = process_cmd_activity(p+8); do_normal_submit = 0; } else if (!strncmp(p, "reselect", 8)) { process_cmd_reselect(&tx_message, p+8); } else if (!strncmp(p, "dns ", 4)) { ret = process_cmd_dns(p+4); do_normal_submit = 0; } else if (!strncmp(p, "timeout", 7)) { ret = process_cmd_timeout(p+7); do_normal_submit = 0; } else if (!strncmp(p, "retries", 7)) { ret = process_cmd_retries(p+7); do_normal_submit = 0; } else if (!strncmp(p, "help", 4)) { do_normal_submit = 0; give_help(); ret = 1; } else if (!strncmp(p, "quit", 4)) { do_normal_submit = 0; *quit = 1; ret = 1; } else if (!strncmp(p, "exit", 4)) { do_normal_submit = 0; *quit = 1; ret = 1; } else { fprintf(stderr, "Unrecognized command\n"); do_normal_submit = 0; } if (do_normal_submit) { ret = request_reply(&tx_message, &rx_message, RPY_NULL, 1); } fflush(stderr); fflush(stdout); return ret; } /* ================================================== */ static int process_args(int argc, char **argv, int multi) { int total_length, i, ret, quit; char *line; total_length = 0; for(i=0; i] [-p ] [-n] [-4|-6] [-m] [command]\n", progname); exit(1); } else { break; /* And process remainder of line as a command */ } } if (isatty(0) && isatty(1) && isatty(2)) { on_terminal = 1; } if (on_terminal && (argc == 0)) { display_gpl(); } open_io(hostname, port); if (argc > 0) { ret = process_args(argc, argv, multi); } else { do { line = read_line(); if (line) { ret = process_line(line, &quit); }else { /* supply the final '\n' when user exits via ^D */ if( on_terminal ) printf("\n"); } } while (line && !quit); } close_io(); return !ret; }