Merge branch 'Toastman-RT' into Toastman-RT-N
[tomato.git] / release / src / router / httpd / tomato.c
blob581bbb0e7a9d9375395fa0e9529a9bcc546b3c4f
1 /*
3 Tomato Firmware
4 Copyright (C) 2006-2010 Jonathan Zarate
6 */
8 #include "tomato.h"
10 #include <sys/sysinfo.h>
11 #include <sys/stat.h>
12 #include <sys/types.h>
13 #include <sys/socket.h>
14 #include <arpa/inet.h>
15 #include <time.h>
18 // #define DEBUG_NOEXECSERVICE
19 #define DEBUG_NVRAMSET(k, v) _dprintf("nvram set %s=%s\n", k, v);
22 char *post_buf = NULL;
23 int rboot = 0;
24 extern int post;
26 static void asp_css(int argc, char **argv);
27 static void asp_resmsg(int argc, char **argv);
30 static void wo_tomato(char *url);
31 static void wo_update(char *url);
32 static void wo_service(char *url);
33 static void wo_shutdown(char *url);
34 static void wo_nvcommit(char *url);
35 // static void wo_logout(char *url);
38 // ----------------------------------------------------------------------------
41 void exec_service(const char *action)
43 int i;
45 _dprintf("exec_service: %s\n", action);
47 i = 10;
48 while ((!nvram_match("action_service", "")) && (i-- > 0)) {
49 _dprintf("%s: waiting before %d\n", __FUNCTION__, i);
50 sleep(1);
53 nvram_set("action_service", action);
54 kill(1, SIGUSR1);
56 i = 3;
57 while ((nvram_match("action_service", (char *)action)) && (i-- > 0)) {
58 _dprintf("%s: waiting after %d\n", __FUNCTION__, i);
59 sleep(1);
63 if (atoi(webcgi_safeget("_service_wait", ""))) {
64 i = 10;
65 while ((nvram_match("action_service", (char *)action)) && (i-- > 0)) {
66 _dprintf("%s: waiting after %d\n", __FUNCTION__, i);
67 sleep(1);
73 static void wi_generic_noid(char *url, int len, char *boundary)
75 if (post == 1) {
76 if (len >= (32 * 1024)) {
77 // syslog(LOG_WARNING, "POST max");
78 exit(1);
81 if (post_buf) free(post_buf);
82 if ((post_buf = malloc(len + 1)) == NULL) {
83 // syslog(LOG_CRIT, "Unable to allocate post buffer");
84 exit(1);
87 if (web_read_x(post_buf, len) != len) {
88 exit(1);
90 post_buf[len] = 0;
91 webcgi_init(post_buf);
95 void wi_generic(char *url, int len, char *boundary)
97 wi_generic_noid(url, len, boundary);
98 check_id(url);
101 // !!TB - CGI Support
102 void wi_cgi_bin(char *url, int len, char *boundary)
104 if (post_buf) free(post_buf);
105 post_buf = NULL;
107 if (post) {
108 if (len >= (128 * 1024)) {
109 syslog(LOG_WARNING, "POST length exceeded maximum allowed");
110 exit(1);
113 if (len > 0) {
114 if ((post_buf = malloc(len + 1)) == NULL) {
115 exit(1);
117 if (web_read_x(post_buf, len) != len) {
118 exit(1);
120 post_buf[len] = 0;
125 static void _execute_command(char *url, char *command, char *query, wofilter_t wof)
127 char webExecFile[] = "/tmp/.wxXXXXXX";
128 char webQueryFile[] = "/tmp/.wqXXXXXX";
129 char cmd[sizeof(webExecFile) + 10];
130 FILE *f;
131 int fe, fq = -1;
133 if ((fe = mkstemp(webExecFile)) < 0)
134 exit(1);
135 if (query) {
136 if ((fq = mkstemp(webQueryFile)) < 0) {
137 close(fe);
138 unlink(webExecFile);
139 exit(1);
143 if ((f = fdopen(fe, "wb")) != NULL) {
144 fprintf(f,
145 "#!/bin/sh\n"
146 "export REQUEST_METHOD=\"%s\"\n"
147 "export PATH=%s\n"
148 ". /etc/profile\n"
149 "%s%s %s%s\n",
150 post ? "POST" : "GET", getenv("PATH"),
151 command ? "" : "./", command ? command : url,
152 query ? "<" : "", query ? webQueryFile : "");
153 fclose(f);
155 else {
156 close(fe);
157 unlink(webExecFile);
158 if (query) {
159 close(fq);
160 unlink(webQueryFile);
162 exit(1);
164 chmod(webExecFile, 0700);
166 if (query) {
167 if ((f = fdopen(fq, "wb")) != NULL) {
168 fprintf(f, "%s\n", query);
169 fclose(f);
171 else {
172 unlink(webExecFile);
173 close(fq);
174 unlink(webQueryFile);
175 exit(1);
179 sprintf(cmd, "%s 2>&1", webExecFile);
180 web_pipecmd(cmd, wof);
181 unlink(webQueryFile);
182 unlink(webExecFile);
185 static void wo_cgi_bin(char *url)
187 if (!header_sent) send_header(200, NULL, mime_html, 0);
188 _execute_command(url, NULL, post_buf, WOF_NONE);
189 if (post_buf) {
190 free(post_buf);
191 post_buf = NULL;
195 static void wo_shell(char *url)
197 web_puts("\ncmdresult = '");
198 _execute_command(NULL, webcgi_get("command"), NULL, WOF_JAVASCRIPT);
199 web_puts("';");
202 static void wo_blank(char *url)
204 web_puts("\n\n\n\n");
207 static void wo_favicon(char *url)
209 send_header(200, NULL, "image/vnd.microsoft.icon", 0);
210 do_file(url);
212 if (nvram_match("web_favicon", "1")) {
213 send_header(200, NULL, "image/vnd.microsoft.icon", 0);
214 do_file(url);
216 else {
217 send_error(404, NULL, NULL);
222 static void wo_cfe(char *url)
224 do_file(MTD_DEV(0ro));
227 static void wo_nvram(char *url)
229 web_pipecmd("nvram show", WOF_NONE);
232 static void wo_iptables(char *url)
234 web_pipecmd("iptables -nvL; echo; iptables -t nat -nvL; echo; iptables -t mangle -nvL", WOF_NONE);
237 #ifdef TCONFIG_IPV6
238 static void wo_ip6tables(char *url)
240 web_pipecmd("ip6tables -nvL; echo; ip6tables -t mangle -nvL", WOF_NONE);
242 #endif
245 static void wo_spin(char *url)
247 char s[64];
249 strlcpy(s, nvram_safe_get("web_css"), sizeof(s));
250 strlcat(s, "_spin.gif", sizeof(s));
251 if (f_exists(s)) do_file(s);
252 else do_file("_spin.gif");
256 void common_redirect(void)
258 if (atoi(webcgi_safeget("_ajax", ""))) {
259 send_header(200, NULL, mime_html, 0);
260 web_puts("OK");
262 else {
263 redirect(webcgi_safeget("_redirect", "/"));
267 // ----------------------------------------------------------------------------
269 const struct mime_handler mime_handlers[] = {
270 { "update.cgi", mime_javascript, 0, wi_generic, wo_update, 1 },
271 { "tomato.cgi", NULL, 0, wi_generic, wo_tomato, 1 },
273 { "debug.js", mime_javascript, 5, wi_generic_noid, wo_blank, 1 }, // while debugging
274 { "cfe/*.bin", mime_binary, 0, wi_generic, wo_cfe, 1 },
275 { "nvram/*.txt", mime_binary, 0, wi_generic, wo_nvram, 1 },
276 { "ipt/*.txt", mime_binary, 0, wi_generic, wo_iptables, 1 },
277 #ifdef TCONFIG_IPV6
278 { "ip6t/*.txt", mime_binary, 0, wi_generic, wo_ip6tables, 1 },
279 #endif
280 { "cfg/*.cfg", NULL, 0, wi_generic, wo_backup, 1 },
281 { "cfg/restore.cgi", mime_html, 0, wi_restore, wo_restore, 1 },
282 { "cfg/defaults.cgi", NULL, 0, wi_generic, wo_defaults, 1 },
284 { "bwm/*.gz", NULL, 0, wi_generic, wo_bwmbackup, 1 },
285 { "bwm/restore.cgi", NULL, 0, wi_bwmrestore, wo_bwmrestore, 1 },
287 { "ipt/*.gz", NULL, 0, wi_generic, wo_iptbackup, 1 },
288 { "ipt/restore.cgi", NULL, 0, wi_iptrestore, wo_iptrestore, 1 },
290 { "logs/view.cgi", NULL, 0, wi_generic, wo_viewlog, 1 },
291 { "logs/*.txt", NULL, 0, wi_generic, wo_syslog, 1 },
292 { "webmon_**", NULL, 0, wi_generic, wo_syslog, 1 },
294 { "logout.asp", NULL, 0, wi_generic, wo_asp, 1 },
295 { "clearcookies.asp", NULL, 0, wi_generic, wo_asp, 1 },
297 // { "spin.gif", NULL, 0, wi_generic_noid, wo_spin, 1 },
299 { "**.asp", NULL, 0, wi_generic_noid, wo_asp, 1 },
300 { "**.css", "text/css", 2, wi_generic_noid, do_file, 1 },
301 { "**.htm|**.html", mime_html, 2, wi_generic_noid, do_file, 1 },
302 { "**.gif", "image/gif", 5, wi_generic_noid, do_file, 1 },
303 { "**.jpg", "image/jpeg", 5, wi_generic_noid, do_file, 1 },
304 { "**.png", "image/png", 5, wi_generic_noid, do_file, 1 },
305 { "**.js", mime_javascript, 2, wi_generic_noid, do_file, 1 },
306 { "**.jsx", mime_javascript, 0, wi_generic, wo_asp, 1 },
307 { "**.svg", "image/svg+xml", 2, wi_generic_noid, do_file, 1 },
308 { "**.txt", mime_plain, 2, wi_generic_noid, do_file, 1 },
309 { "**.bin", mime_binary, 0, wi_generic_noid, do_file, 1 },
310 { "**.bino", mime_octetstream, 0, wi_generic_noid, do_file, 1 },
311 { "favicon.ico", NULL, 5, wi_generic_noid, wo_favicon, 1 },
312 // !!TB - CGI Support, enable downloading archives
313 { "**/cgi-bin/**|**.sh", NULL, 0, wi_cgi_bin, wo_cgi_bin, 1 },
314 { "**.tar|**.gz", mime_binary, 0, wi_generic_noid, do_file, 1 },
315 { "shell.cgi", mime_javascript, 0, wi_generic, wo_shell, 1 },
316 { "wpad.dat|proxy.pac", "application/x-ns-proxy-autoconfig", 0, wi_generic_noid, do_file, 0 },
318 { "webmon.cgi", mime_javascript, 0, wi_generic, wo_webmon, 1 },
319 { "dhcpc.cgi", NULL, 0, wi_generic, wo_dhcpc, 1 },
320 { "dhcpd.cgi", mime_javascript, 0, wi_generic, wo_dhcpd, 1 },
321 { "nvcommit.cgi", NULL, 0, wi_generic, wo_nvcommit, 1 },
322 { "ping.cgi", mime_javascript, 0, wi_generic, wo_ping, 1 },
323 { "trace.cgi", mime_javascript, 0, wi_generic, wo_trace, 1 },
324 { "upgrade.cgi", mime_html, 0, wi_upgrade, wo_flash, 1 },
325 { "upnp.cgi", NULL, 0, wi_generic, wo_upnp, 1 },
326 { "wakeup.cgi", NULL, 0, wi_generic, wo_wakeup, 1 },
327 { "wlmnoise.cgi", mime_html, 0, wi_generic, wo_wlmnoise, 1 },
328 { "wlradio.cgi", NULL, 0, wi_generic, wo_wlradio, 1 },
329 { "resolve.cgi", mime_javascript, 0, wi_generic, wo_resolve, 1 },
330 { "expct.cgi", mime_html, 0, wi_generic, wo_expct, 1 },
331 { "service.cgi", NULL, 0, wi_generic, wo_service, 1 },
332 // { "logout.cgi", NULL, 0, wi_generic, wo_logout, 0 },
333 // see httpd.c
334 { "shutdown.cgi", mime_html, 0, wi_generic, wo_shutdown, 1 },
335 #ifdef TCONFIG_OPENVPN
336 { "vpnstatus.cgi", mime_javascript, 0, wi_generic, wo_vpn_status, 1 },
337 #endif
338 #ifdef TCONFIG_USB
339 { "usbcmd.cgi", mime_javascript, 0, wi_generic, wo_usbcommand, 1 }, //!!TB - USB
340 #endif
341 #ifdef BLACKHOLE
342 { "blackhole.cgi", NULL, 0, wi_blackhole, NULL, 1 },
343 #endif
344 #ifdef TCONFIG_NOCAT
345 { "uploadsplash.cgi", NULL, 0, wi_uploadsplash, wo_uploadsplash, 1 },
346 { "ext/uploadsplash.cgi", NULL, 0, wi_uploadsplash, wo_uploadsplash, 1 },
347 #endif
348 { NULL, NULL, 0, NULL, NULL, 1 }
351 const aspapi_t aspapi[] = {
352 { "activeroutes", asp_activeroutes },
353 { "arplist", asp_arplist },
354 { "bandwidth", asp_bandwidth },
355 { "build_time", asp_build_time },
356 { "cgi_get", asp_cgi_get },
357 { "compmac", asp_compmac },
358 { "ctcount", asp_ctcount },
359 { "ctdump", asp_ctdump },
360 { "ctrate", asp_ctrate },
361 { "ddnsx", asp_ddnsx },
362 { "devlist", asp_devlist },
363 { "webmon", asp_webmon },
364 { "dhcpc_time", asp_dhcpc_time },
365 { "dns", asp_dns },
366 { "ident", asp_ident },
367 { "lanip", asp_lanip },
368 { "layer7", asp_layer7 },
369 { "link_uptime", asp_link_uptime },
370 { "lipp", asp_lipp },
371 { "netdev", asp_netdev },
372 { "iptraffic", asp_iptraffic },
373 { "iptmon", asp_iptmon },
374 { "ipt_bandwidth", asp_ipt_bandwidth },
375 { "notice", asp_notice },
376 { "nv", asp_nv },
377 { "nvram", asp_nvram },
378 { "nvramseq", asp_nvramseq },
379 { "nvstat", asp_nvstat },
380 { "psup", asp_psup },
381 { "qrate", asp_qrate },
382 { "resmsg", asp_resmsg },
383 { "rrule", asp_rrule },
384 { "statfs", asp_statfs },
385 { "sysinfo", asp_sysinfo },
386 { "jiffies", asp_jiffies },
387 { "time", asp_time },
388 { "upnpinfo", asp_upnpinfo },
389 { "version", asp_version },
390 { "wanstatus", asp_wanstatus },
391 { "wanup", asp_wanup },
392 { "wlstats", asp_wlstats },
393 { "wlclient", asp_wlclient },
394 { "wlnoise", asp_wlnoise },
395 { "wlscan", asp_wlscan },
396 { "wlchannels", asp_wlchannels }, //!!TB
397 { "wlcountries", asp_wlcountries },
398 { "wlifaces", asp_wlifaces },
399 { "wlbands", asp_wlbands },
400 #ifdef TCONFIG_USB
401 { "usbdevices", asp_usbdevices }, //!!TB - USB Support
402 #endif
403 { "css", asp_css },
404 { NULL, NULL }
407 // -----------------------------------------------------------------------------
409 static void asp_css(int argc, char **argv)
411 const char *css = nvram_safe_get("web_css");
413 if (strcmp(css, "tomato") != 0) {
414 web_printf("<link rel='stylesheet' type='text/css' href='%s.css'>", css);
418 // -----------------------------------------------------------------------------
420 const char *resmsg_get(void)
422 return webcgi_safeget("resmsg", "");
425 void resmsg_set(const char *msg)
427 webcgi_set("resmsg", strdup(msg)); // m ok
430 int resmsg_fread(const char *fname)
432 char s[256];
433 char *p;
435 f_read_string(fname, s, sizeof(s));
436 if ((p = strchr(s, '\n')) != NULL) *p = 0;
437 if (s[0]) {
438 resmsg_set(s);
439 return 1;
441 return 0;
444 static void asp_resmsg(int argc, char **argv)
446 char *p;
448 if ((p = js_string(webcgi_safeget("resmsg", (argc > 0) ? argv[0] : ""))) == NULL) return;
449 web_printf("\nresmsg='%s';\n", p);
450 free(p);
453 // ----------------------------------------------------------------------------
455 // verification... simple sanity checks. UI should verify all fields.
457 // todo: move and re-use for filtering - zzz
459 typedef union {
460 int i;
461 long l;
462 const char *s;
463 } nvset_varg_t;
465 typedef struct {
466 const char *name;
467 enum {
468 VT_NONE, // no checking
469 VT_LENGTH, // check length of string
470 VT_TEXT, // strip \r, check length of string
471 VT_RANGE, // expect an integer, check range
472 VT_IP, // expect an ip address
473 VT_MAC, // expect a mac address
474 #ifdef TCONFIG_IPV6
475 VT_IPV6, // expect an ipv6 address
476 #endif
477 VT_TEMP // no checks, no commit
478 } vtype;
479 nvset_varg_t va;
480 nvset_varg_t vb;
481 } nvset_t;
484 #define V_NONE VT_NONE, { }, { }
485 #define V_01 VT_RANGE, { .l = 0 }, { .l = 1 }
486 #define V_PORT VT_RANGE, { .l = 2 }, { .l = 65535 }
487 #define V_ONOFF VT_LENGTH, { .i = 2 }, { .i = 3 }
488 #define V_WORD VT_LENGTH, { .i = 1 }, { .i = 16 }
489 #define V_LENGTH(min, max) VT_LENGTH, { .i = min }, { .i = max }
490 #define V_TEXT(min, max) VT_TEXT, { .i = min }, { .i = max }
491 #define V_RANGE(min, max) VT_RANGE, { .l = min }, { .l = max }
492 #define V_IP VT_IP, { }, { }
493 #define V_OCTET VT_RANGE, { .l = 0 }, { .l = 255 }
494 #define V_NUM VT_RANGE, { .l = 0 }, { .l = 0x7FFFFFFF }
495 #define V_TEMP VT_TEMP, { }, { }
496 #ifdef TCONFIG_IPV6
497 #define V_IPV6(required) VT_IPV6, { .i = required }, { }
498 #endif
500 static const nvset_t nvset_list[] = {
502 // basic-ident
503 { "router_name", V_LENGTH(0, 32) },
504 { "wan_hostname", V_LENGTH(0, 32) },
505 { "wan_domain", V_LENGTH(0, 32) },
507 // basic-time
508 { "tm_tz", V_LENGTH(1, 64) }, // PST8PDT
509 { "tm_sel", V_LENGTH(1, 64) }, // PST8PDT
510 { "tm_dst", V_01 },
511 { "ntp_updates", V_RANGE(-1, 24) },
512 { "ntp_tdod", V_01 },
513 { "ntp_server", V_LENGTH(1, 150) }, // x y z
514 { "ntp_kiss", V_LENGTH(0, 255) },
516 // basic-static
517 { "bwm_client", V_LENGTH(0, 4096) },
518 { "dhcpd_static", V_LENGTH(0, 106*251)}, // 106 (max chars per entry) x 250 entries
519 { "dhcpd_static_only", V_01 },
520 { "arpbind_static", V_LENGTH(0, 34*251)}, // 34 (max chars per entry) x 250 entries
521 { "arpbind_listed", V_01 }, // AB - Enable static ARP for all devices on list
523 // basic-ddns
524 { "ddnsx0", V_LENGTH(0, 2048) },
525 { "ddnsx1", V_LENGTH(0, 2048) },
526 { "ddnsx0_cache", V_LENGTH(0, 1) }, // only to clear
527 { "ddnsx1_cache", V_LENGTH(0, 1) },
528 { "ddnsx_ip", V_LENGTH(0, 32) },
529 { "ddnsx_save", V_01 },
530 { "ddnsx_refresh", V_RANGE(0, 365) },
532 // basic-network
533 // WAN
534 { "wan_proto", V_LENGTH(1, 16) }, // disabled, dhcp, static, pppoe, pptp, l2tp
535 { "wan_ipaddr", V_IP },
536 { "wan_netmask", V_IP },
537 { "wan_gateway", V_IP },
538 { "hb_server_ip", V_LENGTH(0, 32) },
539 { "l2tp_server_ip", V_LENGTH(0, 128) },
540 { "pptp_server_ip", V_LENGTH(0, 128) },
541 { "pptp_dhcp", V_01 },
542 { "ppp_username", V_LENGTH(0, 60) },
543 { "ppp_passwd", V_LENGTH(0, 60) },
544 { "ppp_service", V_LENGTH(0, 50) },
545 { "ppp_demand", V_01 },
546 { "ppp_custom", V_LENGTH(0, 256) },
547 { "ppp_idletime", V_RANGE(0, 1440) },
548 { "ppp_redialperiod", V_RANGE(1, 86400) },
549 { "ppp_mlppp", V_01 },
550 { "mtu_enable", V_01 },
551 { "wan_mtu", V_RANGE(576, 1500) },
552 { "wan_islan", V_01 },
553 { "modem_ipaddr", V_IP },
555 // LAN
556 { "lan_ipaddr", V_IP },
557 { "lan_netmask", V_IP },
558 { "lan_gateway", V_IP },
559 { "wan_dns", V_LENGTH(0, 50) }, // ip ip ip
560 { "lan_proto", V_WORD }, // static, dhcp
561 { "dhcp_start", V_LENGTH(0, 15) }, // remove !
562 { "dhcp_num", V_LENGTH(0, 4) }, // remove !
563 { "dhcpd_startip", V_LENGTH(0, 15) },
564 { "dhcpd_endip", V_LENGTH(0, 15) },
565 { "dhcp_lease", V_LENGTH(0, 5) },
566 { "wan_wins", V_IP },
568 #ifdef TCONFIG_VLAN
569 // LAN networks
570 { "lan_ifname", V_LENGTH(0, 5) },
572 { "lan1_ifname", V_LENGTH(0, 5) },
573 { "lan1_ifnames", V_TEXT(0,64) },
574 { "lan1_ipaddr", V_LENGTH(0, 15) },
575 { "lan1_netmask", V_LENGTH(0, 15) },
576 { "lan1_proto", V_LENGTH(0, 6) },
577 { "lan1_stp", V_LENGTH(0, 1) },
578 { "dhcp1_start", V_LENGTH(0, 15) },
579 { "dhcp1_num", V_LENGTH(0, 4) },
580 { "dhcpd1_startip", V_LENGTH(0, 15) },
581 { "dhcpd1_endip", V_LENGTH(0, 15) },
582 { "dhcp1_lease", V_LENGTH(0, 5) },
584 { "lan2_ifname", V_LENGTH(0, 5) },
585 { "lan2_ifnames", V_TEXT(0,64) },
586 { "lan2_ipaddr", V_LENGTH(0, 15) },
587 { "lan2_netmask", V_LENGTH(0, 15) },
588 { "lan2_proto", V_LENGTH(0, 6) },
589 { "lan2_stp", V_LENGTH(0, 1) },
590 { "dhcp2_start", V_LENGTH(0, 15) },
591 { "dhcp2_num", V_LENGTH(0, 4) },
592 { "dhcpd2_startip", V_LENGTH(0, 15) },
593 { "dhcpd2_endip", V_LENGTH(0, 15) },
594 { "dhcp2_lease", V_LENGTH(0, 5) },
596 { "lan3_ifname", V_LENGTH(0, 5) },
597 { "lan3_ifnames", V_TEXT(0,64) },
598 { "lan3_ipaddr", V_LENGTH(0, 15) },
599 { "lan3_netmask", V_LENGTH(0, 15) },
600 { "lan3_proto", V_LENGTH(0, 6) },
601 { "lan3_stp", V_LENGTH(0, 1) },
602 { "dhcp3_start", V_LENGTH(0, 15) },
603 { "dhcp3_num", V_LENGTH(0, 4) },
604 { "dhcpd3_startip", V_LENGTH(0, 15) },
605 { "dhcpd3_endip", V_LENGTH(0, 15) },
606 { "dhcp3_lease", V_LENGTH(0, 5) },
607 #endif
609 // wireless
610 { "wl_radio", V_01 },
611 { "wl_mode", V_LENGTH(2, 3) }, // ap, sta, wet, wds
612 { "wl_net_mode", V_LENGTH(5, 8) }, // disabled, mixed, b-only, g-only, bg-mixed, n-only [speedbooster]
613 { "wl_ssid", V_LENGTH(1, 32) },
614 { "wl_closed", V_01 },
615 { "wl_channel", V_RANGE(0, 216) },
617 { "wl_security_mode", V_LENGTH(1, 32) }, // disabled, radius, wep, wpa_personal, wpa_enterprise, wpa2_personal, wpa2_enterprise
618 { "wl_radius_ipaddr", V_IP },
619 { "wl_radius_port", V_PORT },
620 { "wl_radius_key", V_LENGTH(1, 64) },
621 { "wl_wep_bit", V_RANGE(64, 128) }, // 64 or 128
622 { "wl_passphrase", V_LENGTH(0, 20) },
623 { "wl_key", V_RANGE(1, 4) },
624 { "wl_key1", V_LENGTH(0, 26) },
625 { "wl_key2", V_LENGTH(0, 26) },
626 { "wl_key3", V_LENGTH(0, 26) },
627 { "wl_key4", V_LENGTH(0, 26) },
628 { "wl_crypto", V_LENGTH(3, 8) }, // tkip, aes, tkip+aes
629 { "wl_wpa_psk", V_LENGTH(8, 64) },
630 { "wl_wpa_gtk_rekey", V_RANGE(60, 7200) },
632 { "wl_lazywds", V_01 },
633 { "wl_wds", V_LENGTH(0, 180) }, // mac mac mac (x 10)
635 { "wl_wds_enable", V_01 },
636 { "wl_gmode", V_RANGE(-1, 6) },
637 { "wl_wep", V_LENGTH(1, 32) }, // off, on, restricted,tkip,aes,tkip+aes
638 { "wl_akm", V_LENGTH(0, 32) }, // wpa, wpa2, psk, psk2, wpa wpa2, psk psk2, ""
639 { "wl_auth_mode", V_LENGTH(4, 6) }, // none, radius
641 { "wl_nmode", V_NONE },
642 { "wl_nband", V_RANGE(0, 2) }, // 2 - 2.4GHz, 1 - 5GHz, 0 - Auto
643 { "wl_nreqd", V_NONE },
644 { "wl_nbw_cap", V_RANGE(0, 2) }, // 0 - 20MHz, 1 - 40MHz, 2 - Auto
645 { "wl_nbw", V_NONE },
646 { "wl_mimo_preamble", V_WORD }, // 802.11n Preamble: mm/gf/auto/gfbcm
647 { "wl_nctrlsb", V_NONE }, // none, lower, upper
649 #ifdef TCONFIG_IPV6
650 // basic-ipv6
651 { "ipv6_service", V_LENGTH(0, 16) }, // '', native, native-pd, 6to4, sit, other
652 { "ipv6_prefix", V_IPV6(0) },
653 { "ipv6_prefix_length", V_RANGE(3, 127) },
654 { "ipv6_rtr_addr", V_IPV6(0) },
655 { "ipv6_radvd", V_01 },
656 { "ipv6_accept_ra", V_NUM },
657 { "ipv6_tun_addr", V_IPV6(1) },
658 { "ipv6_tun_addrlen", V_RANGE(3, 127) },
659 { "ipv6_ifname", V_LENGTH(0, 8) },
660 { "ipv6_tun_v4end", V_IP },
661 { "ipv6_relay", V_RANGE(1, 254) },
662 { "ipv6_tun_mtu", V_NUM }, // Tunnel MTU
663 { "ipv6_tun_ttl", V_NUM }, // Tunnel TTL
664 { "ipv6_dns", V_LENGTH(0, 40*3) }, // ip6 ip6 ip6
665 #endif
667 // basic-wfilter
668 { "wl_macmode", V_NONE }, // allow, deny, disabled
669 { "wl_maclist", V_LENGTH(0, 18*251) }, // 18 x 250 (11:22:33:44:55:66 ...)
670 { "macnames", V_LENGTH(0, 62*251) }, // 62 (12+1+48+1) x 50 (112233445566<..>) todo: re-use -- zzz
672 // advanced-ctnf
673 { "ct_max", V_NUM },
674 { "ct_tcp_timeout", V_LENGTH(20, 70) },
675 { "ct_udp_timeout", V_LENGTH(5, 15) },
676 { "ct_timeout", V_LENGTH(5, 15) },
677 { "nf_ttl", V_LENGTH(1, 6) },
678 { "nf_l7in", V_01 },
679 #ifdef LINUX26
680 { "nf_sip", V_01 },
681 { "ct_hashsize", V_NUM },
682 #endif
683 { "nf_rtsp", V_01 },
684 { "nf_pptp", V_01 },
685 { "nf_h323", V_01 },
686 { "nf_ftp", V_01 },
688 // advanced-dhcpdns
689 { "dhcpd_slt", V_RANGE(-1, 43200) }, // -1=infinite, 0=follow normal lease time, >=1 custom
690 { "dhcpd_dmdns", V_01 },
691 { "dhcpd_lmax", V_NUM },
692 { "dhcpd_gwmode", V_NUM },
693 { "dns_addget", V_01 },
694 { "dns_intcpt", V_01 },
695 { "dhcpc_minpkt", V_01 },
696 { "dhcpc_custom", V_LENGTH(0, 80) },
697 { "dns_norebind", V_01 },
698 { "dnsmasq_custom", V_TEXT(0, 2048) },
699 { "dhcpd_static_only", V_01 },
700 // { "dnsmasq_norw", V_01 },
702 // advanced-firewall
703 { "block_wan", V_01 },
704 { "multicast_pass", V_01 },
705 #ifdef TCONFIG_VLAN
706 { "multicast_lan", V_01 },
707 { "multicast_lan1", V_01 },
708 { "multicast_lan2", V_01 },
709 { "multicast_lan3", V_01 },
710 #endif
711 { "udpxy_enable", V_01 },
712 { "udpxy_stats", V_01 },
713 { "udpxy_clients", V_RANGE(1, 5000) },
714 { "udpxy_port", V_RANGE(0, 65535) },
715 { "block_loopback", V_01 },
716 { "nf_loopback", V_NUM },
717 { "ne_syncookies", V_01 },
718 { "ne_snat", V_01 },
719 { "dhcp_pass", V_01 },
720 #ifdef TCONFIG_EMF
721 { "emf_entry", V_NONE },
722 { "emf_uffp_entry", V_NONE },
723 { "emf_rtport_entry", V_NONE },
724 { "emf_enable", V_01 },
725 #endif
727 // advanced-misc
728 { "wait_time", V_RANGE(3, 20) },
729 { "wan_speed", V_RANGE(0, 4) },
730 { "clkfreq", V_NONE }, // Toastman
731 { "jumbo_frame_enable", V_01 }, // Jumbo Frames support (for RT-N16/WNR3500L)
732 { "jumbo_frame_size", V_RANGE(1, 9720) },
733 #ifdef CONFIG_BCMWL5
734 { "ctf_disable", V_01 },
735 #endif
737 #ifdef TCONFIG_VLAN
738 // advanced-vlan
739 { "vlan0ports", V_TEXT(0,16) },
740 { "vlan1ports", V_TEXT(0,16) },
741 { "vlan2ports", V_TEXT(0,16) },
742 { "vlan3ports", V_TEXT(0,16) },
743 { "vlan4ports", V_TEXT(0,16) },
744 { "vlan5ports", V_TEXT(0,16) },
745 { "vlan6ports", V_TEXT(0,16) },
746 { "vlan7ports", V_TEXT(0,16) },
747 { "vlan8ports", V_TEXT(0,16) },
748 { "vlan9ports", V_TEXT(0,16) },
749 { "vlan10ports", V_TEXT(0,16) },
750 { "vlan11ports", V_TEXT(0,16) },
751 { "vlan12ports", V_TEXT(0,16) },
752 { "vlan13ports", V_TEXT(0,16) },
753 { "vlan14ports", V_TEXT(0,16) },
754 { "vlan15ports", V_TEXT(0,16) },
755 { "vlan0hwname", V_TEXT(0,8) },
756 { "vlan1hwname", V_TEXT(0,8) },
757 { "vlan2hwname", V_TEXT(0,8) },
758 { "vlan3hwname", V_TEXT(0,8) },
759 { "vlan4hwname", V_TEXT(0,8) },
760 { "vlan5hwname", V_TEXT(0,8) },
761 { "vlan6hwname", V_TEXT(0,8) },
762 { "vlan7hwname", V_TEXT(0,8) },
763 { "vlan8hwname", V_TEXT(0,8) },
764 { "vlan9hwname", V_TEXT(0,8) },
765 { "vlan10hwname", V_TEXT(0,8) },
766 { "vlan11hwname", V_TEXT(0,8) },
767 { "vlan12hwname", V_TEXT(0,8) },
768 { "vlan13hwname", V_TEXT(0,8) },
769 { "vlan14hwname", V_TEXT(0,8) },
770 { "vlan15hwname", V_TEXT(0,8) },
771 { "wan_ifnameX", V_TEXT(0,8) },
772 { "lan_ifnames", V_TEXT(0,64) },
773 { "manual_boot_nv", V_01 },
774 { "trunk_vlan_so", V_01 },
775 #endif
777 // advanced-mac
778 { "mac_wan", V_LENGTH(0, 17) },
779 { "wl_macaddr", V_LENGTH(0, 17) },
780 { "wl_hwaddr", V_LENGTH(0, 17) },
782 // advanced-routing
783 { "routes_static", V_LENGTH(0, 2048) },
784 { "dhcp_routes", V_01 },
785 { "lan_stp", V_RANGE(0, 1) },
786 { "wk_mode", V_LENGTH(1, 32) }, // gateway, router
787 #ifdef TCONFIG_ZEBRA
788 { "dr_setting", V_RANGE(0, 3) },
789 { "dr_lan_tx", V_LENGTH(0, 32) },
790 { "dr_lan_rx", V_LENGTH(0, 32) },
791 #ifdef TCONFIG_VLAN
792 { "dr_lan1_tx", V_LENGTH(0, 32) },
793 { "dr_lan1_rx", V_LENGTH(0, 32) },
794 { "dr_lan2_tx", V_LENGTH(0, 32) },
795 { "dr_lan2_rx", V_LENGTH(0, 32) },
796 { "dr_lan3_tx", V_LENGTH(0, 32) },
797 { "dr_lan3_rx", V_LENGTH(0, 32) },
798 #endif
799 { "dr_wan_tx", V_LENGTH(0, 32) },
800 { "dr_wan_rx", V_LENGTH(0, 32) },
801 #endif
803 #ifdef TCONFIG_VLAN
804 // advanced-access
805 { "lan_access", V_LENGTH(0, 4096) },
806 #endif
808 // advanced-wireless
809 { "wl_country", V_LENGTH(0, 64) }, // !!TB - Country code
810 { "wl_country_code", V_LENGTH(0, 4) }, // !!TB - Country code
811 { "wl_btc_mode", V_RANGE(0, 2) }, // !!TB - BT Coexistence Mode: 0 (disable), 1 (enable), 2 (preemption)
812 { "wl_afterburner", V_LENGTH(2, 4) }, // off, on, auto
813 { "wl_auth", V_01 },
814 { "wl_rateset", V_LENGTH(2, 7) }, // all, default, 12
815 { "wl_rate", V_RANGE(0, 54 * 1000 * 1000) },
816 { "wl_mrate", V_RANGE(0, 54 * 1000 * 1000) },
817 { "wl_gmode_protection",V_LENGTH(3, 4) }, // off, auto
818 { "wl_frameburst", V_ONOFF }, // off, on
819 { "wl_bcn", V_RANGE(1, 65535) },
820 { "wl_dtim", V_RANGE(1, 255) },
821 { "wl_frag", V_RANGE(256, 2346) },
822 { "wl_rts", V_RANGE(0, 2347) },
823 { "wl_ap_isolate", V_01 },
824 { "wl_plcphdr", V_LENGTH(4, 5) }, // long, short
825 { "wl_antdiv", V_RANGE(0, 3) },
826 { "wl_txant", V_RANGE(0, 3) },
827 { "wl_txpwr", V_RANGE(0, 400) },
828 { "wl_wme", V_WORD }, // auto, off, on
829 { "wl_wme_no_ack", V_ONOFF }, // off, on
830 { "wl_wme_apsd", V_ONOFF }, // off, on
831 { "wl_maxassoc", V_RANGE(0, 255) },
832 { "wl_distance", V_LENGTH(0, 5) }, // "", 1-99999
833 { "wlx_hpamp", V_01 },
834 { "wlx_hperx", V_01 },
835 { "wl_reg_mode", V_LENGTH(1, 3) }, // !!TB - Regulatory: off, h, d
836 { "wl_mitigation", V_RANGE(0, 4) }, // Interference Mitigation Mode (0|1|2|3|4)
838 { "wl_nmode_protection", V_WORD, }, // off, auto
839 { "wl_nmcsidx", V_RANGE(-2, 32), }, // -2 - 32
840 { "wl_obss_coex", V_01 },
841 { "wl_wmf_bss_enable", V_01 }, // Toastman
843 // forward-dmz
844 { "dmz_enable", V_01 },
845 { "dmz_ipaddr", V_LENGTH(0, 15) },
846 { "dmz_sip", V_LENGTH(0, 512) },
848 // forward-upnp
849 { "upnp_enable", V_NUM },
850 { "upnp_secure", V_01 },
851 { "upnp_port", V_RANGE(0, 65535) },
852 { "upnp_ssdp_interval", V_RANGE(10, 9999) },
853 { "upnp_mnp", V_01 },
854 { "upnp_clean", V_01 },
855 { "upnp_clean_interval", V_RANGE(60, 65535) },
856 { "upnp_clean_threshold", V_RANGE(0, 9999) },
857 { "upnp_min_port_int", V_PORT },
858 { "upnp_max_port_int", V_PORT },
859 { "upnp_min_port_ext", V_PORT },
860 { "upnp_max_port_ext", V_PORT },
861 #ifdef TCONFIG_VLAN
862 { "upnp_lan", V_01 },
863 { "upnp_lan1", V_01 },
864 { "upnp_lan2", V_01 },
865 { "upnp_lan3", V_01 },
866 #endif
868 // forward-basic
869 { "portforward", V_LENGTH(0, 4096) },
871 #ifdef TCONFIG_IPV6
872 // forward-basic-ipv6
873 { "ipv6_portforward", V_LENGTH(0, 4096) },
874 #endif
876 // forward-triggered
877 { "trigforward", V_LENGTH(0, 4096) },
880 // access restriction
881 { "rruleN", V_RANGE(0, 99) },
882 // { "rrule##", V_LENGTH(0, 16384) }, // in save_variables()
884 // admin-access
885 { "http_enable", V_01 },
886 { "https_enable", V_01 },
887 { "https_crt_save", V_01 },
888 { "https_crt_cn", V_LENGTH(0, 64) },
889 { "https_crt_gen", V_TEMP },
890 { "remote_management", V_01 },
891 { "remote_mgt_https", V_01 },
892 { "http_lanport", V_PORT },
893 { "https_lanport", V_PORT },
894 { "web_wl_filter", V_01 },
895 { "web_css", V_LENGTH(1, 32) },
896 { "web_mx", V_LENGTH(0, 128) },
897 { "http_wanport", V_PORT },
898 { "telnetd_eas", V_01 },
899 { "telnetd_port", V_PORT },
900 { "sshd_eas", V_01 },
901 { "sshd_pass", V_01 },
902 { "sshd_port", V_PORT },
903 { "sshd_remote", V_01 },
904 { "sshd_forwarding", V_01 },
905 { "sshd_rport", V_PORT },
906 { "sshd_authkeys", V_TEXT(0, 4096) },
907 { "rmgt_sip", V_LENGTH(0, 512) },
908 { "ne_shlimit", V_TEXT(1, 50) },
910 // admin-bwm
911 { "rstats_enable", V_01 },
912 { "rstats_path", V_LENGTH(0, 48) },
913 { "rstats_stime", V_RANGE(1, 168) },
914 { "rstats_offset", V_RANGE(1, 31) },
915 { "rstats_exclude", V_LENGTH(0, 64) },
916 { "rstats_sshut", V_01 },
917 { "rstats_bak", V_01 },
919 // admin-ipt
920 { "cstats_enable", V_01 },
921 { "cstats_path", V_LENGTH(0, 48) },
922 { "cstats_stime", V_RANGE(1, 168) },
923 { "cstats_offset", V_RANGE(1, 31) },
924 { "cstats_labels", V_RANGE(0, 2) },
925 { "cstats_exclude", V_LENGTH(0, 512) },
926 { "cstats_include", V_LENGTH(0, 2048) },
927 { "cstats_all", V_01 },
928 { "cstats_sshut", V_01 },
929 { "cstats_bak", V_01 },
931 // admin-buttons
932 { "sesx_led", V_RANGE(0, 255) }, // amber, white, aoss
933 { "sesx_b0", V_RANGE(0, 5) }, // 0-5: toggle wireless, reboot, shutdown, script, usb unmount
934 { "sesx_b1", V_RANGE(0, 5) }, // "
935 { "sesx_b2", V_RANGE(0, 5) }, // "
936 { "sesx_b3", V_RANGE(0, 5) }, // "
937 { "sesx_script", V_TEXT(0, 1024) }, //
938 { "script_brau", V_TEXT(0, 1024) }, //
940 // admin-debug
941 { "debug_nocommit", V_01 },
942 { "debug_cprintf", V_01 },
943 { "debug_cprintf_file", V_01 },
944 // { "debug_keepfiles", V_01 },
945 { "debug_ddns", V_01 },
946 { "debug_norestart", V_TEXT(0, 128) },
947 { "console_loglevel", V_RANGE(1, 8) },
948 { "t_cafree", V_01 },
949 { "t_hidelr", V_01 },
951 // admin-sched
952 { "sch_rboot", V_TEXT(0, 64) },
953 { "sch_rcon", V_TEXT(0, 64) },
954 { "sch_c1", V_TEXT(0, 64) },
955 { "sch_c1_cmd", V_TEXT(0, 2048) },
956 { "sch_c2", V_TEXT(0, 64) },
957 { "sch_c2_cmd", V_TEXT(0, 2048) },
958 { "sch_c3", V_TEXT(0, 64) },
959 { "sch_c3_cmd", V_TEXT(0, 2048) },
961 // admin-scripts
962 { "script_init", V_TEXT(0, 4096) },
963 { "script_shut", V_TEXT(0, 4096) },
964 { "script_fire", V_TEXT(0, 8192) },
965 { "script_wanup", V_TEXT(0, 4096) },
967 // admin-log
968 { "log_remote", V_01 },
969 { "log_remoteip", V_LENGTH(0, 512) },
970 { "log_remoteport", V_PORT },
971 { "log_file", V_01 },
972 { "log_file_custom", V_01 },
973 { "log_file_path", V_TEXT(0, 4096) },
974 { "log_file_size", V_RANGE(0, 99999) },
975 { "log_file_keep", V_RANGE(0, 99) },
976 { "log_limit", V_RANGE(0, 2400) },
977 { "log_in", V_RANGE(0, 3) },
978 { "log_out", V_RANGE(0, 3) },
979 { "log_mark", V_RANGE(0, 99999) },
980 { "log_events", V_TEXT(0, 32) }, // "acre,crond,ntp"
982 // admin-log-webmonitor
983 { "log_wm", V_01 },
984 { "log_wmtype", V_RANGE(0, 2) },
985 { "log_wmip", V_LENGTH(0, 512) },
986 { "log_wmdmax", V_RANGE(0, 9999) },
987 { "log_wmsmax", V_RANGE(0, 9999) },
989 // admin-cifs
990 { "cifs1", V_LENGTH(1, 1024) },
991 { "cifs2", V_LENGTH(1, 1024) },
993 // admin-jffs2
994 { "jffs2_on", V_01 },
995 { "jffs2_exec", V_LENGTH(0, 64) },
996 { "jffs2_format", V_01 },
998 // nas-usb - !!TB
999 #ifdef TCONFIG_USB
1000 { "usb_enable", V_01 },
1001 { "usb_uhci", V_RANGE(-1, 1) }, // -1 - disabled, 0 - off, 1 - on
1002 { "usb_ohci", V_RANGE(-1, 1) },
1003 { "usb_usb2", V_RANGE(-1, 1) },
1004 #if defined(LINUX26) && defined(TCONFIG_USB_EXTRAS)
1005 { "usb_mmc", V_RANGE(-1, 1) },
1006 #endif
1007 { "usb_irq_thresh", V_RANGE(0, 6) },
1008 { "usb_storage", V_01 },
1009 { "usb_printer", V_01 },
1010 { "usb_printer_bidirect", V_01 },
1011 { "usb_fs_ext3", V_01 },
1012 { "usb_fs_fat", V_01 },
1013 #ifdef TCONFIG_NTFS
1014 { "usb_fs_ntfs", V_01 },
1015 #endif
1016 { "usb_fs_hfs", V_01 }, //!Victek
1017 { "usb_fs_hfsplus", V_01 }, //!Victek
1018 { "usb_automount", V_01 },
1019 { "script_usbhotplug", V_TEXT(0, 2048) },
1020 { "script_usbmount", V_TEXT(0, 2048) },
1021 { "script_usbumount", V_TEXT(0, 2048) },
1022 { "idle_enable", V_01 },
1023 #endif
1025 // nas-ftp - !!TB
1026 #ifdef TCONFIG_FTP
1027 { "ftp_enable", V_RANGE(0, 2) },
1028 { "ftp_super", V_01 },
1029 { "ftp_anonymous", V_RANGE(0, 3) },
1030 { "ftp_dirlist", V_RANGE(0, 2) },
1031 { "ftp_port", V_PORT },
1032 { "ftp_max", V_RANGE(0, 12) },
1033 { "ftp_ipmax", V_RANGE(0, 12) },
1034 { "ftp_staytimeout", V_RANGE(0, 65535) },
1035 { "ftp_rate", V_RANGE(0, 99999) },
1036 { "ftp_anonrate", V_RANGE(0, 99999) },
1037 { "ftp_anonroot", V_LENGTH(0, 256) },
1038 { "ftp_pubroot", V_LENGTH(0, 256) },
1039 { "ftp_pvtroot", V_LENGTH(0, 256) },
1040 { "ftp_users", V_LENGTH(0, 4096) },
1041 { "ftp_custom", V_TEXT(0, 2048) },
1042 { "ftp_sip", V_LENGTH(0, 512) },
1043 { "ftp_limit", V_TEXT(1, 50) },
1044 { "log_ftp", V_01 },
1045 #endif
1047 #ifdef TCONFIG_SNMP
1048 { "snmp_enable", V_RANGE(0, 1) },
1049 { "snmp_location", V_LENGTH(0, 20) },
1050 { "snmp_contact", V_LENGTH(0, 20) },
1051 { "snmp_ro", V_LENGTH(0, 20) },
1052 #endif
1054 #ifdef TCONFIG_SAMBASRV
1055 // nas-samba - !!TB
1056 { "smbd_enable", V_RANGE(0, 2) },
1057 { "smbd_wgroup", V_LENGTH(0, 20) },
1058 { "smbd_master", V_01 },
1059 { "smbd_wins", V_01 },
1060 { "smbd_cpage", V_LENGTH(0, 4) },
1061 { "smbd_cset", V_LENGTH(0, 20) },
1062 { "smbd_custom", V_TEXT(0, 2048) },
1063 { "smbd_autoshare", V_RANGE(0, 3) },
1064 { "smbd_shares", V_LENGTH(0, 4096) },
1065 { "smbd_user", V_LENGTH(0, 50) },
1066 { "smbd_passwd", V_LENGTH(0, 50) },
1067 #endif
1069 #ifdef TCONFIG_MEDIA_SERVER
1070 // nas-media
1071 { "ms_enable", V_01 },
1072 { "ms_dirs", V_LENGTH(0, 1024) },
1073 { "ms_port", V_RANGE(0, 65535) },
1074 { "ms_dbdir", V_LENGTH(0, 256) },
1075 { "ms_tivo", V_01 },
1076 { "ms_stdlna", V_01 },
1077 { "ms_rescan", V_01 },
1078 { "ms_sas", V_01 },
1079 #endif
1081 // qos
1082 { "qos_enable", V_01 },
1083 { "qos_pfifo", V_01 },
1084 { "qos_ack", V_01 },
1085 { "qos_syn", V_01 },
1086 { "qos_fin", V_01 },
1087 { "qos_rst", V_01 },
1088 { "qos_icmp", V_01 },
1089 { "qos_udp", V_01 },
1090 { "qos_reset", V_01 },
1091 { "qos_pfifo", V_01 }, // !!TB
1092 { "qos_obw", V_RANGE(10, 999999) },
1093 { "qos_ibw", V_RANGE(10, 999999) },
1094 { "qos_orules", V_LENGTH(0, 8192) },
1095 { "qos_default", V_RANGE(0, 9) },
1096 { "qos_irates", V_LENGTH(0, 128) },
1097 { "qos_orates", V_LENGTH(0, 128) },
1098 { "qos_classnames", V_LENGTH(10, 128) }, // !!TOASTMAN
1100 { "ne_vegas", V_01 },
1101 { "ne_valpha", V_NUM },
1102 { "ne_vbeta", V_NUM },
1103 { "ne_vgamma", V_NUM },
1105 // qos-bw-limiter
1106 { "qosl_enable", V_01 },
1107 { "qosl_rules", V_LENGTH(0, 4096) },
1108 { "qosl_denable", V_01 },
1109 { "qosl_dulr", V_RANGE(0, 999999) },
1110 { "qosl_dulc", V_RANGE(0, 999999) },
1111 { "qosl_ddlr", V_RANGE(0, 999999) },
1112 { "qosl_ddlc", V_RANGE(0, 999999) },
1113 { "qosl_dtcp", V_RANGE(0, 1000) },
1114 { "qosl_dudp", V_RANGE(0, 100) },
1115 /*qosl_ibw unused - qos_ibw shared*/
1116 /*qosl_obw unused - qos_obw shared*/
1118 //NoCatSplash. Victek.
1119 #ifdef TCONFIG_NOCAT
1120 { "NC_enable", V_01 },
1121 { "NC_Verbosity", V_RANGE(0, 10) },
1122 { "NC_GatewayName", V_LENGTH(0, 255) },
1123 { "NC_GatewayPort", V_PORT },
1124 { "NC_ForcedRedirect", V_01 },
1125 { "NC_HomePage", V_LENGTH(0, 255) },
1126 { "NC_DocumentRoot", V_LENGTH(0, 255) },
1127 { "NC_SplashURL", V_LENGTH(0, 255) },
1128 { "NC_LoginTimeout", V_RANGE(0, 86400000) },
1129 { "NC_IdleTimeout", V_RANGE(0, 86400000) },
1130 { "NC_MaxMissedARP", V_RANGE(0, 10) },
1131 { "NC_PeerChecktimeout", V_RANGE(0, 60) },
1132 { "NC_ExcludePorts", V_LENGTH(0, 255) },
1133 { "NC_IncludePorts", V_LENGTH(0, 255) },
1134 { "NC_AllowedWebHosts", V_LENGTH(0, 255) },
1135 { "NC_MACWhiteList", V_LENGTH(0, 255) },
1136 { "NC_SplashFile", V_LENGTH(0, 8192) },
1137 #endif
1139 #ifdef TCONFIG_OPENVPN
1140 // vpn
1141 { "vpn_debug", V_01 },
1142 { "vpn_server_eas", V_NONE },
1143 { "vpn_server_dns", V_NONE },
1144 { "vpn_server1_poll", V_RANGE(0, 1440) },
1145 { "vpn_server1_if", V_TEXT(3, 3) }, // tap, tun
1146 { "vpn_server1_proto", V_TEXT(3, 10) }, // udp, tcp-server
1147 { "vpn_server1_port", V_PORT },
1148 { "vpn_server1_firewall", V_TEXT(0, 8) }, // auto, external, custom
1149 { "vpn_server1_crypt", V_TEXT(0, 6) }, // tls, secret, custom
1150 { "vpn_server1_comp", V_TEXT(0, 8) }, // yes, no, adaptive
1151 { "vpn_server1_cipher", V_TEXT(0, 16) },
1152 { "vpn_server1_dhcp", V_01 },
1153 { "vpn_server1_r1", V_IP },
1154 { "vpn_server1_r2", V_IP },
1155 { "vpn_server1_sn", V_IP },
1156 { "vpn_server1_nm", V_IP },
1157 { "vpn_server1_local", V_IP },
1158 { "vpn_server1_remote", V_IP },
1159 { "vpn_server1_reneg", V_RANGE(-1,2147483647)},
1160 { "vpn_server1_hmac", V_RANGE(-1, 2) },
1161 { "vpn_server1_plan", V_01 },
1162 { "vpn_server1_ccd", V_01 },
1163 { "vpn_server1_c2c", V_01 },
1164 { "vpn_server1_ccd_excl", V_01 },
1165 { "vpn_server1_ccd_val", V_NONE },
1166 { "vpn_server1_pdns", V_01 },
1167 { "vpn_server1_rgw", V_01 },
1168 { "vpn_server1_custom", V_NONE },
1169 { "vpn_server1_static", V_NONE },
1170 { "vpn_server1_ca", V_NONE },
1171 { "vpn_server1_crt", V_NONE },
1172 { "vpn_server1_key", V_NONE },
1173 { "vpn_server1_dh", V_NONE },
1174 { "vpn_server2_poll", V_RANGE(0, 1440) },
1175 { "vpn_server2_if", V_TEXT(3, 3) }, // tap, tun
1176 { "vpn_server2_proto", V_TEXT(3, 10) }, // udp, tcp-server
1177 { "vpn_server2_port", V_PORT },
1178 { "vpn_server2_firewall", V_TEXT(0, 8) }, // auto, external, custom
1179 { "vpn_server2_crypt", V_TEXT(0, 6) }, // tls, secret, custom
1180 { "vpn_server2_comp", V_TEXT(0, 8) }, // yes, no, adaptive
1181 { "vpn_server2_cipher", V_TEXT(0, 16) },
1182 { "vpn_server2_dhcp", V_01 },
1183 { "vpn_server2_r1", V_IP },
1184 { "vpn_server2_r2", V_IP },
1185 { "vpn_server2_sn", V_IP },
1186 { "vpn_server2_nm", V_IP },
1187 { "vpn_server2_local", V_IP },
1188 { "vpn_server2_remote", V_IP },
1189 { "vpn_server2_reneg", V_RANGE(-1,2147483647)},
1190 { "vpn_server2_hmac", V_RANGE(-1, 2) },
1191 { "vpn_server2_plan", V_01 },
1192 { "vpn_server2_pdns", V_01 },
1193 { "vpn_server2_rgw", V_01 },
1194 { "vpn_server2_custom", V_NONE },
1195 { "vpn_server2_ccd", V_01 },
1196 { "vpn_server2_c2c", V_01 },
1197 { "vpn_server2_ccd_excl", V_01 },
1198 { "vpn_server2_ccd_val", V_NONE },
1199 { "vpn_server2_static", V_NONE },
1200 { "vpn_server2_ca", V_NONE },
1201 { "vpn_server2_crt", V_NONE },
1202 { "vpn_server2_key", V_NONE },
1203 { "vpn_server2_dh", V_NONE },
1204 { "vpn_client_eas", V_NONE },
1205 { "vpn_client1_poll", V_RANGE(0, 1440) },
1206 { "vpn_client1_if", V_TEXT(3, 3) }, // tap, tun
1207 { "vpn_client1_bridge", V_01 },
1208 { "vpn_client1_nat", V_01 },
1209 { "vpn_client1_proto", V_TEXT(3, 10) }, // udp, tcp-server
1210 { "vpn_client1_addr", V_NONE },
1211 { "vpn_client1_port", V_PORT },
1212 { "vpn_client1_retry", V_RANGE(-1,32767) }, // -1 infinite, 0 disabled, >= 1 custom
1213 { "vpn_client1_firewall", V_TEXT(0, 6) }, // auto, custom
1214 { "vpn_client1_crypt", V_TEXT(0, 6) }, // tls, secret, custom
1215 { "vpn_client1_comp", V_TEXT(0, 8) }, // yes, no, adaptive
1216 { "vpn_client1_cipher", V_TEXT(0, 16) },
1217 { "vpn_client1_local", V_IP },
1218 { "vpn_client1_remote", V_IP },
1219 { "vpn_client1_nm", V_IP },
1220 { "vpn_client1_reneg", V_RANGE(-1,2147483647)},
1221 { "vpn_client1_hmac", V_RANGE(-1, 2) },
1222 { "vpn_client1_adns", V_RANGE(0, 3) },
1223 { "vpn_client1_rgw", V_01 },
1224 { "vpn_client1_gw", V_TEXT(0, 15) },
1225 { "vpn_client1_custom", V_NONE },
1226 { "vpn_client1_static", V_NONE },
1227 { "vpn_client1_ca", V_NONE },
1228 { "vpn_client1_crt", V_NONE },
1229 { "vpn_client1_key", V_NONE },
1230 { "vpn_client1_userauth", V_01 },
1231 { "vpn_client1_username", V_TEXT(0,50) },
1232 { "vpn_client1_password", V_TEXT(0,50) },
1233 { "vpn_client1_useronly", V_01 },
1234 { "vpn_client1_tlsremote",V_01 },
1235 { "vpn_client1_cn", V_NONE },
1236 { "vpn_client2_poll", V_RANGE(0, 1440) },
1237 { "vpn_client2_if", V_TEXT(3, 3) }, // tap, tun
1238 { "vpn_client2_bridge", V_01 },
1239 { "vpn_client2_nat", V_01 },
1240 { "vpn_client2_proto", V_TEXT(3, 10) }, // udp, tcp-server
1241 { "vpn_client2_addr", V_NONE },
1242 { "vpn_client2_port", V_PORT },
1243 { "vpn_client2_retry", V_RANGE(-1,32767) }, // -1 infinite, 0 disabled, >= 1 custom
1244 { "vpn_client2_firewall", V_TEXT(0, 6) }, // auto, custom
1245 { "vpn_client2_crypt", V_TEXT(0, 6) }, // tls, secret, custom
1246 { "vpn_client2_comp", V_TEXT(0, 8) }, // yes, no, adaptive
1247 { "vpn_client2_cipher", V_TEXT(0, 16) },
1248 { "vpn_client2_local", V_IP },
1249 { "vpn_client2_remote", V_IP },
1250 { "vpn_client2_nm", V_IP },
1251 { "vpn_client2_reneg", V_RANGE(-1,2147483647)},
1252 { "vpn_client2_hmac", V_RANGE(-1, 2) },
1253 { "vpn_client2_adns", V_RANGE(0, 3) },
1254 { "vpn_client2_rgw", V_01 },
1255 { "vpn_client2_gw", V_TEXT(0, 15) },
1256 { "vpn_client2_custom", V_NONE },
1257 { "vpn_client2_static", V_NONE },
1258 { "vpn_client2_ca", V_NONE },
1259 { "vpn_client2_crt", V_NONE },
1260 { "vpn_client2_key", V_NONE },
1261 { "vpn_client2_userauth", V_01 },
1262 { "vpn_client2_username", V_TEXT(0,50) },
1263 { "vpn_client2_password", V_TEXT(0,50) },
1264 { "vpn_client2_useronly", V_01 },
1265 { "vpn_client2_tlsremote",V_01 },
1266 { "vpn_client2_cn", V_NONE },
1267 #endif // vpn
1272 ppp_static 0/1
1273 ppp_static_ip IP
1274 wl_enable 0/1
1275 wl_wds_timeout
1276 wl_maxassoc 1-256
1277 wl_phytype a,b,g
1278 wl_net_reauth
1279 wl_preauth
1280 wl_wme_ap_bk
1281 wl_wme_ap_be
1282 wl_wme_ap_vi
1283 wl_wme_ap_vo
1284 wl_wme_sta_bk
1285 wl_wme_sta_be
1286 wl_wme_sta_vi
1287 wl_wme_sta_vo
1289 port_priority_1 0-2
1290 port_flow_control_1 0,1
1291 port_rate_limit_1 0-8
1292 port_priority_2 0-2
1293 port_flow_control_2 0,1
1294 port_rate_limit_2 0-8
1295 port_priority_3 0-2
1296 port_flow_control_3 0,1
1297 port_rate_limit_3 0-8
1298 port_priority_4 0-2
1299 port_flow_control_4 0,1
1300 port_rate_limit_4 0-8
1301 wl_ap_ip
1302 wl_ap_ssid
1304 { "pptp_client_enable", V_01 },
1305 { "pptp_client_peerdns", V_RANGE(0,2) },
1306 { "pptp_client_mtuenable",V_01 },
1307 { "pptp_client_mtu", V_RANGE(576, 1500) },
1308 { "pptp_client_mruenable",V_01 },
1309 { "pptp_client_mru", V_RANGE(576, 1500) },
1310 { "pptp_client_nat", V_01 },
1311 { "pptp_client_srvip", V_NONE },
1312 { "pptp_client_srvsub", V_IP },
1313 { "pptp_client_srvsubmsk",V_IP },
1314 { "pptp_client_username", V_TEXT(0,50) },
1315 { "pptp_client_passwd", V_TEXT(0,50) },
1316 { "pptp_client_crypt", V_RANGE(0, 3) },
1317 { "pptp_client_custom", V_NONE },
1318 { "pptp_client_dfltroute",V_01 },
1319 { "pptp_client_stateless",V_01 },
1321 { NULL }
1325 static int webcgi_nvram_set(const nvset_t *v, const char *name, int write)
1327 char *p, *e;
1328 int n;
1329 long l;
1330 unsigned u[6];
1331 int ok;
1332 int dirty;
1333 #ifdef TCONFIG_IPV6
1334 struct in6_addr addr;
1335 #endif
1337 if ((p = webcgi_get((char*)name)) == NULL) return 0;
1339 _dprintf("[%s] %s=%s\n", v->name, (char*)name, p);
1340 dirty = 0;
1341 ok = 1;
1342 switch (v->vtype) {
1343 case VT_TEXT:
1344 p = unix_string(p); // NOTE: p = malloc'd
1345 // drop
1346 case VT_LENGTH:
1347 n = strlen(p);
1348 if ((n < v->va.i) || (n > v->vb.i)) ok = 0;
1349 break;
1350 case VT_RANGE:
1351 l = strtol(p, &e, 10);
1352 if ((p == e) || (*e) || (l < v->va.l) || (l > v->vb.l)) ok = 0;
1353 break;
1354 case VT_IP:
1355 if ((sscanf(p, "%3u.%3u.%3u.%3u", &u[0], &u[1], &u[2], &u[3]) != 4) ||
1356 (u[0] > 255) || (u[1] > 255) || (u[2] > 255) || (u[3] > 255)) ok = 0;
1357 break;
1358 case VT_MAC:
1359 if ((sscanf(p, "%2x:%2x:%2x:%2x:%2x:%2x", &u[0], &u[1], &u[2], &u[3], &u[4], &u[5]) != 6) ||
1360 (u[0] > 255) || (u[1] > 255) || (u[2] > 255) || (u[3] > 255) || (u[4] > 255) || (u[5] > 255)) ok = 0;
1361 break;
1362 #ifdef TCONFIG_IPV6
1363 case VT_IPV6:
1364 if (strlen(p) > 0 || v->va.i) {
1365 if (inet_pton(AF_INET6, p, &addr) != 1) ok = 0;
1367 break;
1368 #endif
1369 default:
1370 // shutup gcc
1371 break;
1373 if (!ok) {
1374 if (v->vtype == VT_TEXT) free(p);
1375 return -1;
1377 if (write) {
1378 if (!nvram_match((char *)name, p)) {
1379 if (v->vtype != VT_TEMP) dirty = 1;
1380 DEBUG_NVRAMSET(name, p);
1381 nvram_set(name, p);
1384 if (v->vtype == VT_TEXT) free(p);
1386 return dirty;
1389 typedef struct {
1390 const nvset_t *v;
1391 int write;
1392 int dirty;
1393 } nv_list_t;
1395 static int nv_wl_find(int idx, int unit, int subunit, void *param)
1397 nv_list_t *p = param;
1399 int ok = webcgi_nvram_set(p->v, wl_nvname(p->v->name + 3, unit, subunit), p->write);
1400 if (ok < 0)
1401 return 1;
1402 else {
1403 p->dirty |= ok;
1404 return 0;
1408 static int save_variables(int write)
1410 const nvset_t *v;
1411 char *p;
1412 int n;
1413 int ok;
1414 char s[256];
1415 int dirty;
1416 static const char *msgf = "The field \"%s\" is invalid. Please report this problem.";
1417 nv_list_t nv;
1419 dirty = 0;
1420 nv.write = write;
1421 for (v = nvset_list; v->name; ++v) {
1422 ok = webcgi_nvram_set(v, v->name, write);
1424 if ((ok >= 0) && (strncmp(v->name, "wl_", 3) == 0)) {
1425 nv.dirty = dirty;
1426 nv.v = v;
1427 if (foreach_wif(1, &nv, nv_wl_find) == 0)
1428 ok |= nv.dirty;
1429 else
1430 ok = -1;
1433 if (ok < 0) {
1434 sprintf(s, msgf, v->name);
1435 resmsg_set(s);
1436 return 0;
1438 dirty |= ok;
1441 // special cases
1443 char *p1, *p2;
1444 if (((p1 = webcgi_get("set_password_1")) != NULL) && (strcmp(p1, "**********") != 0)) {
1445 if (((p2 = webcgi_get("set_password_2")) != NULL) && (strcmp(p1, p2) == 0)) {
1446 if ((write) && (!nvram_match("http_passwd", p1))) {
1447 dirty = 1;
1448 nvram_set("http_passwd", p1);
1451 else {
1452 sprintf(s, msgf, "password");
1453 resmsg_set(s);
1454 return 0;
1458 for (n = 0; n < 50; ++n) {
1459 sprintf(s, "rrule%d", n);
1460 if ((p = webcgi_get(s)) != NULL) {
1461 if (strlen(p) > 8192) { //Toastman
1462 sprintf(s, msgf, s);
1463 resmsg_set(s);
1464 return 0;
1466 if ((write) && (!nvram_match(s, p))) {
1467 dirty = 1;
1468 DEBUG_NVRAMSET(s, p);
1469 nvram_set(s, p);
1474 return (write) ? dirty : 1;
1477 static void wo_tomato(char *url)
1479 char *v;
1480 int i;
1481 int ajax;
1482 int nvset;
1483 const char *red;
1484 int commit;
1486 // _dprintf("tomato.cgi\n");
1488 red = webcgi_safeget("_redirect", "");
1489 if (!*red) send_header(200, NULL, mime_html, 0);
1491 commit = atoi(webcgi_safeget("_commit", "1"));
1492 ajax = atoi(webcgi_safeget("_ajax", "0"));
1494 nvset = atoi(webcgi_safeget("_nvset", "1"));
1495 if (nvset) {
1496 if (!save_variables(0)) {
1497 if (ajax) {
1498 web_printf("@msg:%s", resmsg_get());
1500 else {
1501 parse_asp("error.asp");
1503 return;
1505 commit = save_variables(1) && commit;
1507 resmsg_set("Settings saved.");
1510 rboot = atoi(webcgi_safeget("_reboot", "0"));
1511 if (rboot) {
1512 parse_asp("reboot.asp");
1514 else {
1515 if (ajax) {
1516 web_printf("@msg:%s", resmsg_get());
1518 else if (atoi(webcgi_safeget("_moveip", "0"))) {
1519 parse_asp("saved-moved.asp");
1521 else if (!*red) {
1522 parse_asp("saved.asp");
1526 if (commit) {
1527 _dprintf("commit from tomato.cgi\n");
1528 nvram_commit_x();
1531 if ((v = webcgi_get("_service")) != NULL && *v != 0) {
1532 if (!*red) {
1533 if (ajax) web_printf(" Some services are being restarted...");
1534 web_close();
1536 sleep(1);
1538 if (*v == '*') {
1539 kill(1, SIGHUP);
1541 else {
1542 exec_service(v);
1546 for (i = atoi(webcgi_safeget("_sleep", "0")); i > 0; --i) sleep(1);
1548 if (*red) redirect(red);
1550 if (rboot) {
1551 web_close();
1552 sleep(1);
1553 kill(1, SIGTERM);
1558 // ----------------------------------------------------------------------------
1561 static void wo_update(char *url)
1563 const aspapi_t *api;
1564 const char *name;
1565 int argc;
1566 char *argv[16];
1567 char s[32];
1569 if ((name = webcgi_get("exec")) != NULL) {
1570 for (api = aspapi; api->name; ++api) {
1571 if (strcmp(api->name, name) == 0) {
1572 for (argc = 0; argc < 16; ++argc) {
1573 sprintf(s, "arg%d", argc);
1574 if ((argv[argc] = (char *)webcgi_get(s)) == NULL) break;
1576 api->exec(argc, argv);
1577 break;
1583 static void wo_service(char *url)
1585 int n;
1587 exec_service(webcgi_safeget("_service", ""));
1589 if ((n = atoi(webcgi_safeget("_sleep", "2"))) <= 0) n = 2;
1590 sleep(n);
1592 common_redirect();
1595 static void wo_shutdown(char *url)
1597 parse_asp("shutdown.asp");
1598 web_close();
1599 sleep(1);
1601 kill(1, SIGQUIT);
1604 static void wo_nvcommit(char *url)
1606 parse_asp("saved.asp");
1607 web_close();
1608 nvram_commit();