ifconfig.c revision 1.2 1 /*
2 * Copyright (c) 1983 Regents of the University of California.
3 * All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
7 * are met:
8 * 1. Redistributions of source code must retain the above copyright
9 * notice, this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright
11 * notice, this list of conditions and the following disclaimer in the
12 * documentation and/or other materials provided with the distribution.
13 * 3. All advertising materials mentioning features or use of this software
14 * must display the following acknowledgement:
15 * This product includes software developed by the University of
16 * California, Berkeley and its contributors.
17 * 4. Neither the name of the University nor the names of its contributors
18 * may be used to endorse or promote products derived from this software
19 * without specific prior written permission.
20 *
21 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
22 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
25 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
31 * SUCH DAMAGE.
32 *
33 * PATCHES MAGIC LEVEL PATCH THAT GOT US HERE
34 * -------------------- ----- ----------------------
35 * CURRENT PATCH LEVEL: 1 00102
36 * -------------------- ----- ----------------------
37 *
38 * 06 Sep 92 Herb Peyerl Added "aui"/"bnc" options to ifconfig
39 * for 3COM 3C503 port selection
40 * 10 Mar 93 Rodney W. Grimes Made the aui/bnc more general, you now
41 * also have llc[0-2] and -llc[0-2].
42 * Added the rest of the output flag bits.
43 */
44
45 #ifndef lint
46 char copyright[] =
47 "@(#) Copyright (c) 1983 Regents of the University of California.\n\
48 All rights reserved.\n";
49 #endif /* not lint */
50
51 #ifndef lint
52 static char sccsid[] = "@(#)ifconfig.c 5.1 (Berkeley) 2/28/91";
53 #endif /* not lint */
54
55 #include <sys/param.h>
56 #include <sys/socket.h>
57 #include <sys/ioctl.h>
58
59 #include <net/if.h>
60 #include <netinet/in.h>
61 #include <arpa/inet.h>
62
63 #ifdef notdef
64 #define NSIP
65 #include <netns/ns.h>
66 #include <netns/ns_if.h>
67
68 #define EON
69 #include <netiso/iso.h>
70 #include <netiso/iso_var.h>
71 #endif
72 #include <netdb.h>
73 #include <sys/protosw.h>
74
75 #include <unistd.h>
76 #include <stdio.h>
77 #include <errno.h>
78 #include <ctype.h>
79 #include <stdlib.h>
80 #include <string.h>
81
82 struct ifreq ifr, ridreq;
83 struct ifaliasreq addreq;
84 #ifdef EON
85 struct iso_ifreq iso_ridreq;
86 struct iso_aliasreq iso_addreq;
87 #endif
88 struct sockaddr_in netmask;
89
90 char name[30];
91 int flags;
92 int metric;
93 int nsellength = 1;
94 int setaddr;
95 int setipdst;
96 int doalias;
97 int clearaddr;
98 int newaddr = 1;
99 int s;
100 extern int errno;
101
102 int setifflags(), setifaddr(), setifdstaddr(), setifnetmask();
103 int setifmetric(), setifbroadaddr(), setifipdst();
104 int notealias(), setsnpaoffset(), setnsellength();
105
106 #define NEXTARG 0xffffff
107
108 struct cmd {
109 char *c_name;
110 int c_parameter; /* NEXTARG means next argv */
111 int (*c_func)();
112 } cmds[] = {
113 { "up", IFF_UP, setifflags } ,
114 { "down", -IFF_UP, setifflags },
115 { "trailers", -IFF_NOTRAILERS,setifflags },
116 { "-trailers", IFF_NOTRAILERS, setifflags },
117 { "arp", -IFF_NOARP, setifflags },
118 { "-arp", IFF_NOARP, setifflags },
119 { "debug", IFF_DEBUG, setifflags },
120 { "-debug", -IFF_DEBUG, setifflags },
121 { "aui", IFF_LLC0, setifflags }, /* 06 Sep 92*/
122 { "bnc", -IFF_LLC0, setifflags },
123 { "llc0", IFF_LLC0, setifflags }, /* 10 Mar 93 */
124 { "-llc0", -IFF_LLC0, setifflags },
125 { "llc1", IFF_LLC1, setifflags },
126 { "-llc1", -IFF_LLC1, setifflags },
127 { "llc2", IFF_LLC2, setifflags },
128 { "-llc2", -IFF_LLC2, setifflags },
129 { "alias", IFF_UP, notealias },
130 { "-alias", -IFF_UP, notealias },
131 { "delete", -IFF_UP, notealias },
132 #ifdef notdef
133 #define EN_SWABIPS 0x1000
134 { "swabips", EN_SWABIPS, setifflags },
135 { "-swabips", -EN_SWABIPS, setifflags },
136 #endif
137 { "netmask", NEXTARG, setifnetmask },
138 { "metric", NEXTARG, setifmetric },
139 { "broadcast", NEXTARG, setifbroadaddr },
140 { "ipdst", NEXTARG, setifipdst },
141 { "snpaoffset", NEXTARG, setsnpaoffset },
142 { "nsellength", NEXTARG, setnsellength },
143 { 0, 0, setifaddr },
144 { 0, 0, setifdstaddr },
145 };
146
147 /*
148 * XNS support liberally adapted from
149 * code written at the University of Maryland
150 * principally by James O'Toole and Chris Torek.
151 */
152 int in_status(), in_getaddr();
153 #ifdef NSIP
154 int xns_status(), xns_getaddr();
155 #endif
156 #ifdef EON
157 int iso_status(), iso_getaddr();
158 #endif
159
160 /* Known address families */
161 struct afswtch {
162 char *af_name;
163 short af_af;
164 int (*af_status)();
165 int (*af_getaddr)();
166 int af_difaddr;
167 int af_aifaddr;
168 caddr_t af_ridreq;
169 caddr_t af_addreq;
170 } afs[] = {
171 #define C(x) ((caddr_t) &x)
172 { "inet", AF_INET, in_status, in_getaddr,
173 SIOCDIFADDR, SIOCAIFADDR, C(ridreq), C(addreq) },
174 #ifdef NSIP
175 { "ns", AF_NS, xns_status, xns_getaddr,
176 SIOCDIFADDR, SIOCAIFADDR, C(ridreq), C(addreq) },
177 #endif
178 #ifdef EON
179 { "iso", AF_ISO, iso_status, iso_getaddr,
180 SIOCDIFADDR_ISO, SIOCAIFADDR_ISO, C(iso_ridreq), C(iso_addreq) },
181 #endif
182 { 0, 0, 0, 0 }
183 };
184
185 struct afswtch *afp; /*the address family being set or asked about*/
186
187 main(argc, argv)
188 int argc;
189 char *argv[];
190 {
191 int af = AF_INET;
192 register struct afswtch *rafp;
193
194 if (argc < 2) {
195 fprintf(stderr, "usage: ifconfig interface\n%s%s%s%s%s",
196 "\t[ af [ address [ dest_addr ] ] [ up ] [ down ]",
197 "[ netmask mask ] ]\n",
198 "\t[ metric n ]\n",
199 "\t[ trailers | -trailers ]\n",
200 "\t[ arp | -arp ]\n");
201 exit(1);
202 }
203 argc--, argv++;
204 strncpy(name, *argv, sizeof(name));
205 strncpy(ifr.ifr_name, name, sizeof(ifr.ifr_name));
206 argc--, argv++;
207 if (argc > 0) {
208 for (afp = rafp = afs; rafp->af_name; rafp++)
209 if (strcmp(rafp->af_name, *argv) == 0) {
210 afp = rafp; argc--; argv++;
211 break;
212 }
213 rafp = afp;
214 af = ifr.ifr_addr.sa_family = rafp->af_af;
215 }
216 s = socket(af, SOCK_DGRAM, 0);
217 if (s < 0) {
218 perror("ifconfig: socket");
219 exit(1);
220 }
221 if (ioctl(s, SIOCGIFFLAGS, (caddr_t)&ifr) < 0) {
222 Perror("ioctl (SIOCGIFFLAGS)");
223 exit(1);
224 }
225 strncpy(ifr.ifr_name, name, sizeof ifr.ifr_name);
226 flags = ifr.ifr_flags;
227 if (ioctl(s, SIOCGIFMETRIC, (caddr_t)&ifr) < 0)
228 perror("ioctl (SIOCGIFMETRIC)");
229 else
230 metric = ifr.ifr_metric;
231 if (argc == 0) {
232 status();
233 exit(0);
234 }
235 while (argc > 0) {
236 register struct cmd *p;
237
238 for (p = cmds; p->c_name; p++)
239 if (strcmp(*argv, p->c_name) == 0)
240 break;
241 if (p->c_name == 0 && setaddr)
242 p++; /* got src, do dst */
243 if (p->c_func) {
244 if (p->c_parameter == NEXTARG) {
245 (*p->c_func)(argv[1]);
246 argc--, argv++;
247 } else
248 (*p->c_func)(*argv, p->c_parameter);
249 }
250 argc--, argv++;
251 }
252 if (af == AF_ISO)
253 adjust_nsellength();
254 #ifdef NSIP
255 if (setipdst && af==AF_NS) {
256 struct nsip_req rq;
257 int size = sizeof(rq);
258
259 rq.rq_ns = addreq.ifra_addr;
260 rq.rq_ip = addreq.ifra_dstaddr;
261
262 if (setsockopt(s, 0, SO_NSIP_ROUTE, &rq, size) < 0)
263 Perror("Encapsulation Routing");
264 }
265 #endif
266 if (clearaddr) {
267 int ret;
268 strncpy(rafp->af_ridreq, name, sizeof ifr.ifr_name);
269 if ((ret = ioctl(s, rafp->af_difaddr, rafp->af_ridreq)) < 0) {
270 if (errno == EADDRNOTAVAIL && (doalias >= 0)) {
271 /* means no previous address for interface */
272 } else
273 Perror("ioctl (SIOCDIFADDR)");
274 }
275 }
276 if (newaddr) {
277 strncpy(rafp->af_addreq, name, sizeof ifr.ifr_name);
278 if (ioctl(s, rafp->af_aifaddr, rafp->af_addreq) < 0)
279 Perror("ioctl (SIOCAIFADDR)");
280 }
281 exit(0);
282 }
283 #define RIDADDR 0
284 #define ADDR 1
285 #define MASK 2
286 #define DSTADDR 3
287
288 /*ARGSUSED*/
289 setifaddr(addr, param)
290 char *addr;
291 short param;
292 {
293 /*
294 * Delay the ioctl to set the interface addr until flags are all set.
295 * The address interpretation may depend on the flags,
296 * and the flags may change when the address is set.
297 */
298 setaddr++;
299 if (doalias == 0)
300 clearaddr = 1;
301 (*afp->af_getaddr)(addr, (doalias >= 0 ? ADDR : RIDADDR));
302 }
303
304 setifnetmask(addr)
305 char *addr;
306 {
307 (*afp->af_getaddr)(addr, MASK);
308 }
309
310 setifbroadaddr(addr)
311 char *addr;
312 {
313 (*afp->af_getaddr)(addr, DSTADDR);
314 }
315
316 setifipdst(addr)
317 char *addr;
318 {
319 in_getaddr(addr, DSTADDR);
320 setipdst++;
321 clearaddr = 0;
322 newaddr = 0;
323 }
324 #define rqtosa(x) (&(((struct ifreq *)(afp->x))->ifr_addr))
325 /*ARGSUSED*/
326 notealias(addr, param)
327 char *addr;
328 {
329 if (setaddr && doalias == 0 && param < 0)
330 bcopy((caddr_t)rqtosa(af_addreq),
331 (caddr_t)rqtosa(af_ridreq),
332 rqtosa(af_addreq)->sa_len);
333 doalias = param;
334 if (param < 0) {
335 clearaddr = 1;
336 newaddr = 0;
337 } else
338 clearaddr = 0;
339 }
340
341 /*ARGSUSED*/
342 setifdstaddr(addr, param)
343 char *addr;
344 int param;
345 {
346 (*afp->af_getaddr)(addr, DSTADDR);
347 }
348
349 setifflags(vname, value)
350 char *vname;
351 short value;
352 {
353 if (ioctl(s, SIOCGIFFLAGS, (caddr_t)&ifr) < 0) {
354 Perror("ioctl (SIOCGIFFLAGS)");
355 exit(1);
356 }
357 strncpy(ifr.ifr_name, name, sizeof (ifr.ifr_name));
358 flags = ifr.ifr_flags;
359
360 if (value < 0) {
361 value = -value;
362 flags &= ~value;
363 } else
364 flags |= value;
365 ifr.ifr_flags = flags;
366 if (ioctl(s, SIOCSIFFLAGS, (caddr_t)&ifr) < 0)
367 Perror(vname);
368 }
369
370 setifmetric(val)
371 char *val;
372 {
373 strncpy(ifr.ifr_name, name, sizeof (ifr.ifr_name));
374 ifr.ifr_metric = atoi(val);
375 if (ioctl(s, SIOCSIFMETRIC, (caddr_t)&ifr) < 0)
376 perror("ioctl (set metric)");
377 }
378
379 setsnpaoffset(val)
380 char *val;
381 {
382 #ifdef EON
383 iso_addreq.ifra_snpaoffset = atoi(val);
384 #endif
385 }
386
387 #define IFFBITS \
388 "\020\1UP\2BROADCAST\3DEBUG\4LOOPBACK\5POINTOPOINT\6NOTRAILERS\7RUNNING\10NOARP\
389 \11PROMISC\12ALLMULTI\13OACTIVE\14SIMPLEX\15LLC0\16LLC1\17LLC2\
390 "
391
392 /*
393 * Print the status of the interface. If an address family was
394 * specified, show it and it only; otherwise, show them all.
395 */
396 status()
397 {
398 register struct afswtch *p = afp;
399 short af = ifr.ifr_addr.sa_family;
400
401 printf("%s: ", name);
402 printb("flags", flags, IFFBITS);
403 if (metric)
404 printf(" metric %d", metric);
405 putchar('\n');
406 if ((p = afp) != NULL) {
407 (*p->af_status)(1);
408 } else for (p = afs; p->af_name; p++) {
409 ifr.ifr_addr.sa_family = p->af_af;
410 (*p->af_status)(0);
411 }
412 }
413
414 in_status(force)
415 int force;
416 {
417 struct sockaddr_in *sin;
418 char *inet_ntoa();
419
420 strncpy(ifr.ifr_name, name, sizeof (ifr.ifr_name));
421 if (ioctl(s, SIOCGIFADDR, (caddr_t)&ifr) < 0) {
422 if (errno == EADDRNOTAVAIL || errno == EAFNOSUPPORT) {
423 if (!force)
424 return;
425 bzero((char *)&ifr.ifr_addr, sizeof(ifr.ifr_addr));
426 } else
427 perror("ioctl (SIOCGIFADDR)");
428 }
429 sin = (struct sockaddr_in *)&ifr.ifr_addr;
430 printf("\tinet %s ", inet_ntoa(sin->sin_addr));
431 strncpy(ifr.ifr_name, name, sizeof (ifr.ifr_name));
432 if (ioctl(s, SIOCGIFNETMASK, (caddr_t)&ifr) < 0) {
433 if (errno != EADDRNOTAVAIL)
434 perror("ioctl (SIOCGIFNETMASK)");
435 bzero((char *)&ifr.ifr_addr, sizeof(ifr.ifr_addr));
436 } else
437 netmask.sin_addr =
438 ((struct sockaddr_in *)&ifr.ifr_addr)->sin_addr;
439 if (flags & IFF_POINTOPOINT) {
440 if (ioctl(s, SIOCGIFDSTADDR, (caddr_t)&ifr) < 0) {
441 if (errno == EADDRNOTAVAIL)
442 bzero((char *)&ifr.ifr_addr, sizeof(ifr.ifr_addr));
443 else
444 perror("ioctl (SIOCGIFDSTADDR)");
445 }
446 strncpy(ifr.ifr_name, name, sizeof (ifr.ifr_name));
447 sin = (struct sockaddr_in *)&ifr.ifr_dstaddr;
448 printf("--> %s ", inet_ntoa(sin->sin_addr));
449 }
450 printf("netmask %x ", ntohl(netmask.sin_addr.s_addr));
451 if (flags & IFF_BROADCAST) {
452 if (ioctl(s, SIOCGIFBRDADDR, (caddr_t)&ifr) < 0) {
453 if (errno == EADDRNOTAVAIL)
454 bzero((char *)&ifr.ifr_addr, sizeof(ifr.ifr_addr));
455 else
456 perror("ioctl (SIOCGIFADDR)");
457 }
458 strncpy(ifr.ifr_name, name, sizeof (ifr.ifr_name));
459 sin = (struct sockaddr_in *)&ifr.ifr_addr;
460 if (sin->sin_addr.s_addr != 0)
461 printf("broadcast %s", inet_ntoa(sin->sin_addr));
462 }
463 putchar('\n');
464 }
465
466 #ifdef NSIP
467
468 xns_status(force)
469 int force;
470 {
471 struct sockaddr_ns *sns;
472
473 close(s);
474 s = socket(AF_NS, SOCK_DGRAM, 0);
475 if (s < 0) {
476 if (errno == EPROTONOSUPPORT)
477 return;
478 perror("ifconfig: socket");
479 exit(1);
480 }
481 if (ioctl(s, SIOCGIFADDR, (caddr_t)&ifr) < 0) {
482 if (errno == EADDRNOTAVAIL || errno == EAFNOSUPPORT) {
483 if (!force)
484 return;
485 bzero((char *)&ifr.ifr_addr, sizeof(ifr.ifr_addr));
486 } else
487 perror("ioctl (SIOCGIFADDR)");
488 }
489 strncpy(ifr.ifr_name, name, sizeof ifr.ifr_name);
490 sns = (struct sockaddr_ns *)&ifr.ifr_addr;
491 printf("\tns %s ", ns_ntoa(sns->sns_addr));
492 if (flags & IFF_POINTOPOINT) { /* by W. Nesheim@Cornell */
493 if (ioctl(s, SIOCGIFDSTADDR, (caddr_t)&ifr) < 0) {
494 if (errno == EADDRNOTAVAIL)
495 bzero((char *)&ifr.ifr_addr, sizeof(ifr.ifr_addr));
496 else
497 Perror("ioctl (SIOCGIFDSTADDR)");
498 }
499 strncpy(ifr.ifr_name, name, sizeof (ifr.ifr_name));
500 sns = (struct sockaddr_ns *)&ifr.ifr_dstaddr;
501 printf("--> %s ", ns_ntoa(sns->sns_addr));
502 }
503 putchar('\n');
504 }
505
506 #endif
507 #ifdef EON
508 iso_status(force)
509 int force;
510 {
511 struct sockaddr_iso *siso;
512 struct iso_ifreq ifr;
513
514 close(s);
515 s = socket(AF_ISO, SOCK_DGRAM, 0);
516 if (s < 0) {
517 if (errno == EPROTONOSUPPORT)
518 return;
519 perror("ifconfig: socket");
520 exit(1);
521 }
522 bzero((caddr_t)&ifr, sizeof(ifr));
523 strncpy(ifr.ifr_name, name, sizeof(ifr.ifr_name));
524 if (ioctl(s, SIOCGIFADDR_ISO, (caddr_t)&ifr) < 0) {
525 if (errno == EADDRNOTAVAIL || errno == EAFNOSUPPORT) {
526 if (!force)
527 return;
528 bzero((char *)&ifr.ifr_Addr, sizeof(ifr.ifr_Addr));
529 } else {
530 perror("ioctl (SIOCGIFADDR_ISO)");
531 exit(1);
532 }
533 }
534 strncpy(ifr.ifr_name, name, sizeof ifr.ifr_name);
535 siso = &ifr.ifr_Addr;
536 printf("\tiso %s ", iso_ntoa(&siso->siso_addr));
537 if (ioctl(s, SIOCGIFNETMASK_ISO, (caddr_t)&ifr) < 0) {
538 if (errno != EADDRNOTAVAIL)
539 perror("ioctl (SIOCGIFNETMASK_ISO)");
540 } else {
541 printf(" netmask %s ", iso_ntoa(&siso->siso_addr));
542 }
543 if (flags & IFF_POINTOPOINT) {
544 if (ioctl(s, SIOCGIFDSTADDR_ISO, (caddr_t)&ifr) < 0) {
545 if (errno == EADDRNOTAVAIL)
546 bzero((char *)&ifr.ifr_Addr, sizeof(ifr.ifr_Addr));
547 else
548 Perror("ioctl (SIOCGIFDSTADDR_ISO)");
549 }
550 strncpy(ifr.ifr_name, name, sizeof (ifr.ifr_name));
551 siso = &ifr.ifr_Addr;
552 printf("--> %s ", iso_ntoa(&siso->siso_addr));
553 }
554 putchar('\n');
555 }
556 #endif
557
558 Perror(cmd)
559 char *cmd;
560 {
561 extern int errno;
562
563 fprintf(stderr, "ifconfig: ");
564 switch (errno) {
565
566 case ENXIO:
567 fprintf(stderr, "%s: no such interface\n", cmd);
568 break;
569
570 case EPERM:
571 fprintf(stderr, "%s: permission denied\n", cmd);
572 break;
573
574 default:
575 perror(cmd);
576 }
577 exit(1);
578 }
579
580 struct in_addr inet_makeaddr();
581
582 #define SIN(x) ((struct sockaddr_in *) &(x))
583 struct sockaddr_in *sintab[] = {
584 SIN(ridreq.ifr_addr), SIN(addreq.ifra_addr),
585 SIN(addreq.ifra_mask), SIN(addreq.ifra_broadaddr)};
586
587 in_getaddr(s, which)
588 char *s;
589 {
590 register struct sockaddr_in *sin = sintab[which];
591 struct hostent *hp;
592 struct netent *np;
593 int val;
594
595 sin->sin_len = sizeof(*sin);
596 if (which != MASK)
597 sin->sin_family = AF_INET;
598
599 if ((val = inet_addr(s)) != -1)
600 sin->sin_addr.s_addr = val;
601 else if (hp = gethostbyname(s))
602 bcopy(hp->h_addr, (char *)&sin->sin_addr, hp->h_length);
603 else if (np = getnetbyname(s))
604 sin->sin_addr = inet_makeaddr(np->n_net, INADDR_ANY);
605 else {
606 fprintf(stderr, "%s: bad value\n", s);
607 exit(1);
608 }
609 }
610
611 /*
612 * Print a value a la the %b format of the kernel's printf
613 */
614 printb(s, v, bits)
615 char *s;
616 register char *bits;
617 register unsigned short v;
618 {
619 register int i, any = 0;
620 register char c;
621
622 if (bits && *bits == 8)
623 printf("%s=%o", s, v);
624 else
625 printf("%s=%x", s, v);
626 bits++;
627 if (bits) {
628 putchar('<');
629 while (i = *bits++) {
630 if (v & (1 << (i-1))) {
631 if (any)
632 putchar(',');
633 any = 1;
634 for (; (c = *bits) > 32; bits++)
635 putchar(c);
636 } else
637 for (; *bits > 32; bits++)
638 ;
639 }
640 putchar('>');
641 }
642 }
643 #ifdef NSIP
644
645 #define SNS(x) ((struct sockaddr_ns *) &(x))
646 struct sockaddr_ns *snstab[] = {
647 SNS(ridreq.ifr_addr), SNS(addreq.ifra_addr),
648 SNS(addreq.ifra_mask), SNS(addreq.ifra_broadaddr)};
649
650 xns_getaddr(addr, which)
651 char *addr;
652 {
653 struct sockaddr_ns *sns = snstab[which];
654 struct ns_addr ns_addr();
655
656 sns->sns_family = AF_NS;
657 sns->sns_len = sizeof(*sns);
658 sns->sns_addr = ns_addr(addr);
659 if (which == MASK)
660 printf("Attempt to set XNS netmask will be ineffectual\n");
661 }
662
663 #endif
664 #ifdef EON
665 #define SISO(x) ((struct sockaddr_iso *) &(x))
666 struct sockaddr_iso *sisotab[] = {
667 SISO(iso_ridreq.ifr_Addr), SISO(iso_addreq.ifra_addr),
668 SISO(iso_addreq.ifra_mask), SISO(iso_addreq.ifra_dstaddr)};
669
670 iso_getaddr(addr, which)
671 char *addr;
672 {
673 register struct sockaddr_iso *siso = sisotab[which];
674 struct iso_addr *iso_addr();
675 siso->siso_addr = *iso_addr(addr);
676
677 if (which == MASK) {
678 siso->siso_len = TSEL(siso) - (caddr_t)(siso);
679 siso->siso_nlen = 0;
680 } else {
681 siso->siso_len = sizeof(*siso);
682 siso->siso_family = AF_ISO;
683 }
684 }
685 #endif
686
687 setnsellength(val)
688 char *val;
689 {
690 nsellength = atoi(val);
691 if (nsellength < 0) {
692 fprintf(stderr, "Negative NSEL length is absurd\n");
693 exit (1);
694 }
695 if (afp == 0 || afp->af_af != AF_ISO) {
696 fprintf(stderr, "Setting NSEL length valid only for iso\n");
697 exit (1);
698 }
699 }
700
701 #ifdef notdef
702 fixnsel(s)
703 register struct sockaddr_iso *s;
704 {
705 if (s->siso_family == 0)
706 return;
707 s->siso_tlen = nsellength;
708 }
709 #endif
710
711 adjust_nsellength()
712 {
713 #ifdef notdef
714 fixnsel(sisotab[RIDADDR]);
715 fixnsel(sisotab[ADDR]);
716 fixnsel(sisotab[DSTADDR]);
717 #endif
718 }
719