Lines Matching refs:value

87 static void setenv_option();		/* execute "setenv name value" */
89 static void severity_option(); /* execute "severity value" */
140 char *value;
150 * Separate the option into name and value parts. For backwards
151 * compatibility we ignore exactly one '=' between name and value.
154 if (*(value = curr_opt + strcspn(curr_opt, whitespace_eq))) {
155 if (*value != '=') {
156 *value++ = 0;
157 value += strspn(value, whitespace);
159 if (*value == '=') {
160 *value++ = 0;
161 value += strspn(value, whitespace);
164 if (*value == 0)
165 value = 0;
183 if (!value && need_arg(op))
184 tcpd_jump("option \"%s\" requires value", key);
185 if (value && !permit_arg(op))
186 tcpd_jump("option \"%s\" requires no value", key);
189 if (value && expand_arg(op))
190 value = chop_string(percent_x(bf, sizeof(bf), value, request));
192 syslog(LOG_DEBUG, "option: %s %s", key, value ? value : "");
193 (*(op->func)) (value, request);
201 static void allow_option(value, request)
202 char *value;
212 static void deny_option(value, request)
213 char *value;
221 static void banners_option(value, request)
222 char *value;
232 sprintf(path, "%s/%s", value, eval_daemon(request));
244 } else if (stat(value, &st) < 0) {
245 tcpd_warn("%s: %m", value);
253 static void group_option(value, request)
254 char *value;
260 if ((grp = getgrnam(value)) == 0)
261 tcpd_jump("unknown group: \"%s\"", value);
265 tcpd_jump("setgid(%s): %m", value);
272 static void user_option(value, request)
273 char *value;
280 if ((group = split_at(value, '.')) != 0)
282 if ((pwd = getpwnam(value)) == 0)
283 tcpd_jump("unknown user: \"%s\"", value);
287 tcpd_jump("setuid(%s): %m", value);
294 static void umask_option(value, request)
295 char *value;
301 if (sscanf(value, "%o%c", &mask, &junk) != 1 || (mask & 0777) != mask)
302 tcpd_jump("bad umask value: \"%s\"", value);
310 static void spawn_option(value, request)
311 char *value;
315 shell_cmd(value);
322 static void linger_option(value, request)
323 char *value;
329 if (sscanf(value, "%d%c", &linger.l_linger, &junk) != 1
331 tcpd_jump("bad linger value: \"%s\"", value);
344 static void keepalive_option(value, request)
345 char *value;
355 /* nice_option - set nice value */
359 static void nice_option(value, request)
360 char *value;
366 if (value != 0 && sscanf(value, "%d%c", &niceval, &junk) != 1)
367 tcpd_jump("bad nice value: \"%s\"", value);
374 static void twist_option(value, request)
375 char *value;
386 syslog(deny_severity, "twist %s to %s", eval_client(request), value);
399 (void) execl("/bin/sh", "sh", "-c", value, (char *) 0);
412 static void rfc931_option(value, request)
413 char *value;
419 if (value != 0) {
420 if (sscanf(value, "%d%c", &timeout, &junk) != 1 || timeout <= 0)
421 tcpd_jump("bad rfc931 timeout: \"%s\"", value);
431 static void setenv_option(value, request)
432 char *value;
437 if (*(var_value = value + strcspn(value, whitespace)))
439 if (setenv(chop_string(value), chop_string(var_value), 1))
443 /* severity_map - lookup facility or severity value */
467 static void severity_option(value, request)
468 char *value;
471 char *level = split_at(value, '.');
474 severity_map(facilitynames, value) | severity_map(prioritynames, level)
475 : severity_map(prioritynames, value);