route.c revision 1.11 1 /* $NetBSD: route.c,v 1.11 1995/03/18 15:00:15 cgd Exp $ */
2
3 /*
4 * Copyright (c) 1983, 1989, 1991, 1993
5 * The Regents of the University of California. All rights reserved.
6 *
7 * Redistribution and use in source and binary forms, with or without
8 * modification, are permitted provided that the following conditions
9 * are met:
10 * 1. Redistributions of source code must retain the above copyright
11 * notice, this list of conditions and the following disclaimer.
12 * 2. Redistributions in binary form must reproduce the above copyright
13 * notice, this list of conditions and the following disclaimer in the
14 * documentation and/or other materials provided with the distribution.
15 * 3. All advertising materials mentioning features or use of this software
16 * must display the following acknowledgement:
17 * This product includes software developed by the University of
18 * California, Berkeley and its contributors.
19 * 4. Neither the name of the University nor the names of its contributors
20 * may be used to endorse or promote products derived from this software
21 * without specific prior written permission.
22 *
23 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
24 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
25 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
26 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
27 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
28 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
29 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
30 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
31 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
32 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
33 * SUCH DAMAGE.
34 */
35
36 #ifndef lint
37 static char copyright[] =
38 "@(#) Copyright (c) 1983, 1989, 1991, 1993\n\
39 The Regents of the University of California. All rights reserved.\n";
40 #endif /* not lint */
41
42 #ifndef lint
43 #if 0
44 static char sccsid[] = "@(#)route.c 8.3 (Berkeley) 3/19/94";
45 #else
46 static char rcsid[] = "$NetBSD: route.c,v 1.11 1995/03/18 15:00:15 cgd Exp $";
47 #endif
48 #endif /* not lint */
49
50 #include <sys/param.h>
51 #include <sys/file.h>
52 #include <sys/socket.h>
53 #include <sys/ioctl.h>
54 #include <sys/mbuf.h>
55 #include <sys/sysctl.h>
56
57 #include <net/if.h>
58 #include <net/route.h>
59 #include <net/if_dl.h>
60 #include <netinet/in.h>
61 #include <netns/ns.h>
62 #include <netiso/iso.h>
63 #include <netccitt/x25.h>
64 #include <arpa/inet.h>
65 #include <netdb.h>
66
67 #include <errno.h>
68 #include <unistd.h>
69 #include <stdio.h>
70 #include <ctype.h>
71 #include <stdlib.h>
72 #include <string.h>
73 #include <paths.h>
74
75 struct keytab {
76 char *kt_cp;
77 int kt_i;
78 } keywords[] = {
79 #include "keywords.h"
80 {0, 0}
81 };
82
83 struct ortentry route;
84 union sockunion {
85 struct sockaddr sa;
86 struct sockaddr_in sin;
87 struct sockaddr_ns sns;
88 struct sockaddr_iso siso;
89 struct sockaddr_dl sdl;
90 struct sockaddr_x25 sx25;
91 } so_dst, so_gate, so_mask, so_genmask, so_ifa, so_ifp;
92
93 typedef union sockunion *sup;
94 int pid, rtm_addrs, uid;
95 int s;
96 int forcehost, forcenet, doflush, nflag, af, qflag, tflag, keyword();
97 int iflag, verbose, aflen = sizeof (struct sockaddr_in);
98 int locking, lockrest, debugonly;
99 struct rt_metrics rt_metrics;
100 u_long rtm_inits;
101 struct in_addr inet_makeaddr();
102 char *routename(), *netname();
103 void flushroutes(), newroute(), monitor(), sockaddr(), sodump(), bprintf();
104 void print_getmsg(), print_rtmsg(), pmsg_common(), pmsg_addrs(), mask_addr();
105 int getaddr(), rtmsg(), x25_makemask();
106 extern char *inet_ntoa(), *iso_ntoa(), *link_ntoa();
107
108 __dead void
109 usage(cp)
110 char *cp;
111 {
112 if (cp)
113 (void) fprintf(stderr, "route: botched keyword: %s\n", cp);
114 (void) fprintf(stderr,
115 "usage: route [ -nqv ] cmd [[ -<qualifers> ] args ]\n");
116 exit(1);
117 /* NOTREACHED */
118 }
119
120 void
121 quit(s)
122 char *s;
123 {
124 int sverrno = errno;
125
126 (void) fprintf(stderr, "route: ");
127 if (s)
128 (void) fprintf(stderr, "%s: ", s);
129 (void) fprintf(stderr, "%s\n", strerror(sverrno));
130 exit(1);
131 /* NOTREACHED */
132 }
133
134 #define ROUNDUP(a) \
135 ((a) > 0 ? (1 + (((a) - 1) | (sizeof(long) - 1))) : sizeof(long))
136 #define ADVANCE(x, n) (x += ROUNDUP((n)->sa_len))
137
138 int
139 main(argc, argv)
140 int argc;
141 char **argv;
142 {
143 extern int optind;
144 int ch;
145
146 if (argc < 2)
147 usage((char *)NULL);
148
149 while ((ch = getopt(argc, argv, "nqdtv")) != EOF)
150 switch(ch) {
151 case 'n':
152 nflag = 1;
153 break;
154 case 'q':
155 qflag = 1;
156 break;
157 case 'v':
158 verbose = 1;
159 break;
160 case 't':
161 tflag = 1;
162 break;
163 case 'd':
164 debugonly = 1;
165 break;
166 case '?':
167 default:
168 usage((char *)NULL);
169 }
170 argc -= optind;
171 argv += optind;
172
173 pid = getpid();
174 uid = getuid();
175 if (tflag)
176 s = open("/dev/null", O_WRONLY, 0);
177 else
178 s = socket(PF_ROUTE, SOCK_RAW, 0);
179 if (s < 0)
180 quit("socket");
181 if (*argv)
182 switch (keyword(*argv)) {
183 case K_GET:
184 uid = 0;
185 /* FALLTHROUGH */
186
187 case K_CHANGE:
188 case K_ADD:
189 case K_DELETE:
190 newroute(argc, argv);
191 exit(0);
192 /* NOTREACHED */
193
194 case K_MONITOR:
195 monitor();
196 /* NOTREACHED */
197
198 case K_FLUSH:
199 flushroutes(argc, argv);
200 exit(0);
201 /* NOTREACHED */
202 }
203 usage(*argv);
204 /* NOTREACHED */
205 }
206
207 /*
208 * Purge all entries in the routing tables not
209 * associated with network interfaces.
210 */
211 void
212 flushroutes(argc, argv)
213 int argc;
214 char *argv[];
215 {
216 size_t needed;
217 int mib[6], rlen, seqno;
218 char *buf, *next, *lim;
219 register struct rt_msghdr *rtm;
220
221 if (uid) {
222 errno = EACCES;
223 quit("must be root to alter routing table");
224 }
225 shutdown(s, 0); /* Don't want to read back our messages */
226 if (argc > 1) {
227 argv++;
228 if (argc == 2 && **argv == '-')
229 switch (keyword(*argv + 1)) {
230 case K_INET:
231 af = AF_INET;
232 break;
233 case K_XNS:
234 af = AF_NS;
235 break;
236 case K_LINK:
237 af = AF_LINK;
238 break;
239 case K_ISO:
240 case K_OSI:
241 af = AF_ISO;
242 break;
243 case K_X25:
244 af = AF_CCITT;
245 default:
246 goto bad;
247 } else
248 bad: usage(*argv);
249 }
250 mib[0] = CTL_NET;
251 mib[1] = PF_ROUTE;
252 mib[2] = 0; /* protocol */
253 mib[3] = 0; /* wildcard address family */
254 mib[4] = NET_RT_DUMP;
255 mib[5] = 0; /* no flags */
256 if (sysctl(mib, 6, NULL, &needed, NULL, 0) < 0)
257 quit("route-sysctl-estimate");
258 if ((buf = malloc(needed)) == NULL)
259 quit("malloc");
260 if (sysctl(mib, 6, buf, &needed, NULL, 0) < 0)
261 quit("actual retrieval of routing table");
262 lim = buf + needed;
263 if (verbose)
264 (void) printf("Examining routing table from sysctl\n");
265 seqno = 0; /* ??? */
266 for (next = buf; next < lim; next += rtm->rtm_msglen) {
267 rtm = (struct rt_msghdr *)next;
268 if (verbose)
269 print_rtmsg(rtm, rtm->rtm_msglen);
270 if ((rtm->rtm_flags & RTF_GATEWAY) == 0)
271 continue;
272 if (af) {
273 struct sockaddr *sa = (struct sockaddr *)(rtm + 1);
274
275 if (sa->sa_family != af)
276 continue;
277 }
278 if (debugonly)
279 continue;
280 rtm->rtm_type = RTM_DELETE;
281 rtm->rtm_seq = seqno;
282 rlen = write(s, next, rtm->rtm_msglen);
283 if (rlen < (int)rtm->rtm_msglen) {
284 (void) fprintf(stderr,
285 "route: write to routing socket: %s\n",
286 strerror(errno));
287 (void) printf("got only %d for rlen\n", rlen);
288 break;
289 }
290 seqno++;
291 if (qflag)
292 continue;
293 if (verbose)
294 print_rtmsg(rtm, rlen);
295 else {
296 struct sockaddr *sa = (struct sockaddr *)(rtm + 1);
297 (void) printf("%-20.20s ", rtm->rtm_flags & RTF_HOST ?
298 routename(sa) : netname(sa));
299 sa = (struct sockaddr *)(sa->sa_len + (char *)sa);
300 (void) printf("%-20.20s ", routename(sa));
301 (void) printf("done\n");
302 }
303 }
304 }
305
306 char *
307 routename(sa)
308 struct sockaddr *sa;
309 {
310 register char *cp;
311 static char line[50];
312 struct hostent *hp;
313 static char domain[MAXHOSTNAMELEN + 1];
314 static int first = 1;
315 char *ns_print();
316
317 if (first) {
318 first = 0;
319 if (gethostname(domain, MAXHOSTNAMELEN) == 0 &&
320 (cp = strchr(domain, '.')))
321 (void) strcpy(domain, cp + 1);
322 else
323 domain[0] = 0;
324 }
325
326 if (sa->sa_len == 0)
327 strcpy(line, "default");
328 else switch (sa->sa_family) {
329
330 case AF_INET:
331 { struct in_addr in;
332 in = ((struct sockaddr_in *)sa)->sin_addr;
333
334 cp = 0;
335 if (in.s_addr == INADDR_ANY || sa->sa_len < 4)
336 cp = "default";
337 if (cp == 0 && !nflag) {
338 hp = gethostbyaddr((char *)&in, sizeof (struct in_addr),
339 AF_INET);
340 if (hp) {
341 if ((cp = strchr(hp->h_name, '.')) &&
342 !strcmp(cp + 1, domain))
343 *cp = 0;
344 cp = hp->h_name;
345 }
346 }
347 if (cp)
348 strcpy(line, cp);
349 else {
350 #define C(x) ((x) & 0xff)
351 in.s_addr = ntohl(in.s_addr);
352 (void) sprintf(line, "%u.%u.%u.%u", C(in.s_addr >> 24),
353 C(in.s_addr >> 16), C(in.s_addr >> 8), C(in.s_addr));
354 }
355 break;
356 }
357
358 case AF_NS:
359 return (ns_print((struct sockaddr_ns *)sa));
360
361 case AF_LINK:
362 return (link_ntoa((struct sockaddr_dl *)sa));
363
364 case AF_ISO:
365 (void) sprintf(line, "iso %s",
366 iso_ntoa(&((struct sockaddr_iso *)sa)->siso_addr));
367 break;
368
369 default:
370 { u_short *s = (u_short *)sa;
371 u_short *slim = s + ((sa->sa_len + 1) >> 1);
372 char *cp = line + sprintf(line, "(%d)", sa->sa_family);
373
374 while (++s < slim) /* start with sa->sa_data */
375 cp += sprintf(cp, " %x", *s);
376 break;
377 }
378 }
379 return (line);
380 }
381
382 /*
383 * Return the name of the network whose address is given.
384 * The address is assumed to be that of a net or subnet, not a host.
385 */
386 char *
387 netname(sa)
388 struct sockaddr *sa;
389 {
390 char *cp = 0;
391 static char line[50];
392 struct netent *np = 0;
393 u_long net, mask;
394 register u_long i;
395 int subnetshift;
396 char *ns_print();
397
398 switch (sa->sa_family) {
399
400 case AF_INET:
401 { struct in_addr in;
402 in = ((struct sockaddr_in *)sa)->sin_addr;
403
404 i = in.s_addr = ntohl(in.s_addr);
405 if (in.s_addr == 0)
406 cp = "default";
407 else if (!nflag) {
408 if (IN_CLASSA(i)) {
409 mask = IN_CLASSA_NET;
410 subnetshift = 8;
411 } else if (IN_CLASSB(i)) {
412 mask = IN_CLASSB_NET;
413 subnetshift = 8;
414 } else {
415 mask = IN_CLASSC_NET;
416 subnetshift = 4;
417 }
418 /*
419 * If there are more bits than the standard mask
420 * would suggest, subnets must be in use.
421 * Guess at the subnet mask, assuming reasonable
422 * width subnet fields.
423 */
424 while (in.s_addr &~ mask)
425 mask = (long)mask >> subnetshift;
426 net = in.s_addr & mask;
427 while ((mask & 1) == 0)
428 mask >>= 1, net >>= 1;
429 np = getnetbyaddr(net, AF_INET);
430 if (np)
431 cp = np->n_name;
432 }
433 if (cp)
434 strcpy(line, cp);
435 else if ((in.s_addr & 0xffffff) == 0)
436 (void) sprintf(line, "%u", C(in.s_addr >> 24));
437 else if ((in.s_addr & 0xffff) == 0)
438 (void) sprintf(line, "%u.%u", C(in.s_addr >> 24),
439 C(in.s_addr >> 16));
440 else if ((in.s_addr & 0xff) == 0)
441 (void) sprintf(line, "%u.%u.%u", C(in.s_addr >> 24),
442 C(in.s_addr >> 16), C(in.s_addr >> 8));
443 else
444 (void) sprintf(line, "%u.%u.%u.%u", C(in.s_addr >> 24),
445 C(in.s_addr >> 16), C(in.s_addr >> 8),
446 C(in.s_addr));
447 break;
448 }
449
450 case AF_NS:
451 return (ns_print((struct sockaddr_ns *)sa));
452 break;
453
454 case AF_LINK:
455 return (link_ntoa((struct sockaddr_dl *)sa));
456
457 case AF_ISO:
458 (void) sprintf(line, "iso %s",
459 iso_ntoa(&((struct sockaddr_iso *)sa)->siso_addr));
460 break;
461
462 default:
463 { u_short *s = (u_short *)sa->sa_data;
464 u_short *slim = s + ((sa->sa_len + 1)>>1);
465 char *cp = line + sprintf(line, "af %d:", sa->sa_family);
466
467 while (s < slim)
468 cp += sprintf(cp, " %x", *s++);
469 break;
470 }
471 }
472 return (line);
473 }
474
475 void
476 set_metric(value, key)
477 char *value;
478 int key;
479 {
480 int flag = 0;
481 u_long noval, *valp = &noval;
482
483 switch (key) {
484 #define caseof(x, y, z) case x: valp = &rt_metrics.z; flag = y; break
485 caseof(K_MTU, RTV_MTU, rmx_mtu);
486 caseof(K_HOPCOUNT, RTV_HOPCOUNT, rmx_hopcount);
487 caseof(K_EXPIRE, RTV_EXPIRE, rmx_expire);
488 caseof(K_RECVPIPE, RTV_RPIPE, rmx_recvpipe);
489 caseof(K_SENDPIPE, RTV_SPIPE, rmx_sendpipe);
490 caseof(K_SSTHRESH, RTV_SSTHRESH, rmx_ssthresh);
491 caseof(K_RTT, RTV_RTT, rmx_rtt);
492 caseof(K_RTTVAR, RTV_RTTVAR, rmx_rttvar);
493 }
494 rtm_inits |= flag;
495 if (lockrest || locking)
496 rt_metrics.rmx_locks |= flag;
497 if (locking)
498 locking = 0;
499 *valp = atoi(value);
500 }
501
502 void
503 newroute(argc, argv)
504 int argc;
505 register char **argv;
506 {
507 char *cmd, *dest = "", *gateway = "", *err;
508 int ishost = 0, ret, attempts, oerrno, flags = RTF_STATIC;
509 int key;
510 struct hostent *hp = 0;
511
512 if (uid) {
513 errno = EACCES;
514 quit("must be root to alter routing table");
515 }
516 cmd = argv[0];
517 if (*cmd != 'g')
518 shutdown(s, 0); /* Don't want to read back our messages */
519 while (--argc > 0) {
520 if (**(++argv)== '-') {
521 switch (key = keyword(1 + *argv)) {
522 case K_LINK:
523 af = AF_LINK;
524 aflen = sizeof(struct sockaddr_dl);
525 break;
526 case K_OSI:
527 case K_ISO:
528 af = AF_ISO;
529 aflen = sizeof(struct sockaddr_iso);
530 break;
531 case K_INET:
532 af = AF_INET;
533 aflen = sizeof(struct sockaddr_in);
534 break;
535 case K_X25:
536 af = AF_CCITT;
537 aflen = sizeof(struct sockaddr_x25);
538 break;
539 case K_SA:
540 af = PF_ROUTE;
541 aflen = sizeof(union sockunion);
542 break;
543 case K_XNS:
544 af = AF_NS;
545 aflen = sizeof(struct sockaddr_ns);
546 break;
547 case K_IFACE:
548 case K_INTERFACE:
549 iflag++;
550 case K_NOSTATIC:
551 flags &= ~RTF_STATIC;
552 break;
553 case K_LOCK:
554 locking = 1;
555 break;
556 case K_LOCKREST:
557 lockrest = 1;
558 break;
559 case K_HOST:
560 forcehost++;
561 break;
562 case K_REJECT:
563 flags |= RTF_REJECT;
564 break;
565 case K_BLACKHOLE:
566 flags |= RTF_BLACKHOLE;
567 break;
568 case K_PROTO1:
569 flags |= RTF_PROTO1;
570 break;
571 case K_PROTO2:
572 flags |= RTF_PROTO2;
573 break;
574 case K_CLONING:
575 flags |= RTF_CLONING;
576 break;
577 case K_XRESOLVE:
578 flags |= RTF_XRESOLVE;
579 break;
580 case K_STATIC:
581 flags |= RTF_STATIC;
582 break;
583 case K_IFA:
584 argc--;
585 (void) getaddr(RTA_IFA, *++argv, 0);
586 break;
587 case K_IFP:
588 argc--;
589 (void) getaddr(RTA_IFP, *++argv, 0);
590 break;
591 case K_GENMASK:
592 argc--;
593 (void) getaddr(RTA_GENMASK, *++argv, 0);
594 break;
595 case K_GATEWAY:
596 argc--;
597 (void) getaddr(RTA_GATEWAY, *++argv, 0);
598 break;
599 case K_DST:
600 argc--;
601 ishost = getaddr(RTA_DST, *++argv, &hp);
602 dest = *argv;
603 break;
604 case K_NETMASK:
605 argc--;
606 (void) getaddr(RTA_NETMASK, *++argv, 0);
607 /* FALLTHROUGH */
608 case K_NET:
609 forcenet++;
610 break;
611 case K_MTU:
612 case K_HOPCOUNT:
613 case K_EXPIRE:
614 case K_RECVPIPE:
615 case K_SENDPIPE:
616 case K_SSTHRESH:
617 case K_RTT:
618 case K_RTTVAR:
619 argc--;
620 set_metric(*++argv, key);
621 break;
622 default:
623 usage(1+*argv);
624 }
625 } else {
626 if ((rtm_addrs & RTA_DST) == 0) {
627 dest = *argv;
628 ishost = getaddr(RTA_DST, *argv, &hp);
629 } else if ((rtm_addrs & RTA_GATEWAY) == 0) {
630 gateway = *argv;
631 (void) getaddr(RTA_GATEWAY, *argv, &hp);
632 } else {
633 int ret = atoi(*argv);
634
635 if (ret == 0) {
636 if (strcmp(*argv, "0") == 0)
637 printf("%s,%s",
638 "old usage of trailing 0",
639 "assuming route to if\n");
640 else
641 usage((char *)NULL);
642 iflag = 1;
643 continue;
644 } else if (ret > 0 && ret < 10) {
645 printf("old usage of trailing digit, ");
646 printf("assuming route via gateway\n");
647 iflag = 0;
648 continue;
649 }
650 (void) getaddr(RTA_NETMASK, *argv, 0);
651 }
652 }
653 }
654 if (forcehost)
655 ishost = 1;
656 if (forcenet)
657 ishost = 0;
658 flags |= RTF_UP;
659 if (ishost)
660 flags |= RTF_HOST;
661 if (iflag == 0)
662 flags |= RTF_GATEWAY;
663 for (attempts = 1; ; attempts++) {
664 errno = 0;
665 if ((ret = rtmsg(*cmd, flags)) == 0)
666 break;
667 if (errno != ENETUNREACH && errno != ESRCH)
668 break;
669 if (af == AF_INET && *gateway && hp && hp->h_addr_list[1]) {
670 hp->h_addr_list++;
671 memcpy(&so_gate.sin.sin_addr, hp->h_addr_list[0],
672 hp->h_length);
673 } else
674 break;
675 }
676 if (*cmd == 'g')
677 exit(0);
678 oerrno = errno;
679 (void) printf("%s %s %s", cmd, ishost? "host" : "net", dest);
680 if (*gateway) {
681 (void) printf(": gateway %s", gateway);
682 if (attempts > 1 && ret == 0 && af == AF_INET)
683 (void) printf(" (%s)",
684 inet_ntoa(((struct sockaddr_in *)&route.rt_gateway)->sin_addr));
685 }
686 if (ret == 0)
687 (void) printf("\n");
688 else {
689 switch (oerrno) {
690 case ESRCH:
691 err = "not in table";
692 break;
693 case EBUSY:
694 err = "entry in use";
695 break;
696 case ENOBUFS:
697 err = "routing table overflow";
698 break;
699 default:
700 err = strerror(oerrno);
701 break;
702 }
703 (void) printf(": %s\n", err);
704 }
705 }
706
707 void
708 inet_makenetandmask(net, sin)
709 u_long net;
710 register struct sockaddr_in *sin;
711 {
712 u_long addr, mask = 0;
713 register char *cp;
714
715 rtm_addrs |= RTA_NETMASK;
716 if (net == 0)
717 mask = addr = 0;
718 else if (net < 128) {
719 addr = net << IN_CLASSA_NSHIFT;
720 mask = IN_CLASSA_NET;
721 } else if (net < 65536) {
722 addr = net << IN_CLASSB_NSHIFT;
723 mask = IN_CLASSB_NET;
724 } else if (net < 16777216L) {
725 addr = net << IN_CLASSC_NSHIFT;
726 mask = IN_CLASSC_NET;
727 } else {
728 addr = net;
729 if ((addr & IN_CLASSA_HOST) == 0)
730 mask = IN_CLASSA_NET;
731 else if ((addr & IN_CLASSB_HOST) == 0)
732 mask = IN_CLASSB_NET;
733 else if ((addr & IN_CLASSC_HOST) == 0)
734 mask = IN_CLASSC_NET;
735 else
736 mask = -1;
737 }
738 sin->sin_addr.s_addr = htonl(addr);
739 sin = &so_mask.sin;
740 sin->sin_addr.s_addr = htonl(mask);
741 sin->sin_len = 0;
742 sin->sin_family = 0;
743 cp = (char *)(&sin->sin_addr + 1);
744 while (*--cp == 0 && cp > (char *)sin)
745 ;
746 sin->sin_len = 1 + cp - (char *)sin;
747 }
748
749 /*
750 * Interpret an argument as a network address of some kind,
751 * returning 1 if a host address, 0 if a network address.
752 */
753 int
754 getaddr(which, s, hpp)
755 int which;
756 char *s;
757 struct hostent **hpp;
758 {
759 register sup su;
760 struct ns_addr ns_addr();
761 struct iso_addr *iso_addr();
762 struct hostent *hp;
763 struct netent *np;
764 u_long val;
765
766 if (af == 0) {
767 af = AF_INET;
768 aflen = sizeof(struct sockaddr_in);
769 }
770 rtm_addrs |= which;
771 switch (which) {
772 case RTA_DST:
773 su = &so_dst;
774 su->sa.sa_family = af;
775 break;
776 case RTA_GATEWAY:
777 su = &so_gate;
778 su->sa.sa_family = af;
779 break;
780 case RTA_NETMASK:
781 su = &so_mask;
782 break;
783 case RTA_GENMASK:
784 su = &so_genmask;
785 break;
786 case RTA_IFP:
787 su = &so_ifp;
788 su->sa.sa_family = af;
789 break;
790 case RTA_IFA:
791 su = &so_ifa;
792 su->sa.sa_family = af;
793 break;
794 default:
795 usage("Internal Error");
796 /*NOTREACHED*/
797 }
798 su->sa.sa_len = aflen;
799 if (strcmp(s, "default") == 0) {
800 switch (which) {
801 case RTA_DST:
802 forcenet++;
803 (void) getaddr(RTA_NETMASK, s, 0);
804 break;
805 case RTA_NETMASK:
806 case RTA_GENMASK:
807 su->sa.sa_len = 0;
808 }
809 return (0);
810 }
811 switch (af) {
812 case AF_NS:
813 if (which == RTA_DST) {
814 extern short ns_bh[3];
815 struct sockaddr_ns *sms = &(so_mask.sns);
816 memset(sms, 0, sizeof(*sms));
817 sms->sns_family = 0;
818 sms->sns_len = 6;
819 sms->sns_addr.x_net = *(union ns_net *)ns_bh;
820 rtm_addrs |= RTA_NETMASK;
821 }
822 su->sns.sns_addr = ns_addr(s);
823 return (!ns_nullhost(su->sns.sns_addr));
824
825 case AF_OSI:
826 su->siso.siso_addr = *iso_addr(s);
827 if (which == RTA_NETMASK || which == RTA_GENMASK) {
828 register char *cp = (char *)TSEL(&su->siso);
829 su->siso.siso_nlen = 0;
830 do {--cp ;} while ((cp > (char *)su) && (*cp == 0));
831 su->siso.siso_len = 1 + cp - (char *)su;
832 }
833 return (1);
834
835 case AF_LINK:
836 link_addr(s, &su->sdl);
837 return (1);
838
839 case AF_CCITT:
840 ccitt_addr(s, &su->sx25);
841 return (which == RTA_DST ? x25_makemask() : 1);
842
843 case PF_ROUTE:
844 su->sa.sa_len = sizeof(*su);
845 sockaddr(s, &su->sa);
846 return (1);
847
848 case AF_INET:
849 default:
850 break;
851 }
852
853 if (hpp == NULL)
854 hpp = &hp;
855 *hpp = NULL;
856 if (((val = inet_addr(s)) != -1) &&
857 (which != RTA_DST || forcenet == 0)) {
858 su->sin.sin_addr.s_addr = val;
859 if (inet_lnaof(su->sin.sin_addr) != INADDR_ANY)
860 return (1);
861 else {
862 val = ntohl(val);
863 goto netdone;
864 }
865 }
866 if ((val = inet_network(s)) != -1 ||
867 ((np = getnetbyname(s)) != NULL && (val = np->n_net) != 0)) {
868 netdone:
869 if (which == RTA_DST)
870 inet_makenetandmask(val, &su->sin);
871 return (0);
872 }
873 hp = gethostbyname(s);
874 if (hp) {
875 *hpp = hp;
876 su->sin.sin_family = hp->h_addrtype;
877 memcpy(&su->sin.sin_addr, hp->h_addr, hp->h_length);
878 return (1);
879 }
880 (void) fprintf(stderr, "%s: bad value\n", s);
881 exit(1);
882 }
883
884 int
885 x25_makemask()
886 {
887 register char *cp;
888
889 if ((rtm_addrs & RTA_NETMASK) == 0) {
890 rtm_addrs |= RTA_NETMASK;
891 for (cp = (char *)&so_mask.sx25.x25_net;
892 cp < &so_mask.sx25.x25_opts.op_flags; cp++)
893 *cp = -1;
894 so_mask.sx25.x25_len = (u_char)&(((sup)0)->sx25.x25_opts);
895 }
896 return 0;
897 }
898
899 short ns_nullh[] = {0,0,0};
900 short ns_bh[] = {-1,-1,-1};
901
902 char *
903 ns_print(sns)
904 struct sockaddr_ns *sns;
905 {
906 struct ns_addr work;
907 union { union ns_net net_e; u_long long_e; } net;
908 u_short port;
909 static char mybuf[50], cport[10], chost[25];
910 char *host = "";
911 register char *p;
912 register u_char *q;
913
914 work = sns->sns_addr;
915 port = ntohs(work.x_port);
916 work.x_port = 0;
917 net.net_e = work.x_net;
918 if (ns_nullhost(work) && net.long_e == 0) {
919 if (!port)
920 return ("*.*");
921 (void) sprintf(mybuf, "*.%XH", port);
922 return (mybuf);
923 }
924
925 if (memcmp(ns_bh, work.x_host.c_host, 6) == 0)
926 host = "any";
927 else if (memcmp(ns_nullh, work.x_host.c_host, 6) == 0)
928 host = "*";
929 else {
930 q = work.x_host.c_host;
931 (void) sprintf(chost, "%02X%02X%02X%02X%02X%02XH",
932 q[0], q[1], q[2], q[3], q[4], q[5]);
933 for (p = chost; *p == '0' && p < chost + 12; p++)
934 /* void */;
935 host = p;
936 }
937 if (port)
938 (void) sprintf(cport, ".%XH", htons(port));
939 else
940 *cport = 0;
941
942 (void) sprintf(mybuf,"%XH.%s%s", ntohl(net.long_e), host, cport);
943 return (mybuf);
944 }
945
946 void
947 interfaces()
948 {
949 size_t needed;
950 int mib[6];
951 char *buf, *lim, *next;
952 register struct rt_msghdr *rtm;
953
954 mib[0] = CTL_NET;
955 mib[1] = PF_ROUTE;
956 mib[2] = 0; /* protocol */
957 mib[3] = 0; /* wildcard address family */
958 mib[4] = NET_RT_IFLIST;
959 mib[5] = 0; /* no flags */
960 if (sysctl(mib, 6, NULL, &needed, NULL, 0) < 0)
961 quit("route-sysctl-estimate");
962 if ((buf = malloc(needed)) == NULL)
963 quit("malloc");
964 if (sysctl(mib, 6, buf, &needed, NULL, 0) < 0)
965 quit("actual retrieval of interface table");
966 lim = buf + needed;
967 for (next = buf; next < lim; next += rtm->rtm_msglen) {
968 rtm = (struct rt_msghdr *)next;
969 print_rtmsg(rtm, rtm->rtm_msglen);
970 }
971 }
972
973 void
974 monitor()
975 {
976 int n;
977 char msg[2048];
978
979 verbose = 1;
980 if (debugonly) {
981 interfaces();
982 exit(0);
983 }
984 for(;;) {
985 n = read(s, msg, 2048);
986 (void) printf("got message of size %d\n", n);
987 print_rtmsg((struct rt_msghdr *)msg, n);
988 }
989 }
990
991 struct {
992 struct rt_msghdr m_rtm;
993 char m_space[512];
994 } m_rtmsg;
995
996 int
997 rtmsg(cmd, flags)
998 int cmd, flags;
999 {
1000 static int seq;
1001 int rlen;
1002 register char *cp = m_rtmsg.m_space;
1003 register int l;
1004
1005 #define NEXTADDR(w, u) \
1006 if (rtm_addrs & (w)) {\
1007 l = ROUNDUP(u.sa.sa_len); memcpy(cp, &(u), l); cp += l;\
1008 if (verbose) sodump(&(u),"u");\
1009 }
1010
1011 errno = 0;
1012 memset(&m_rtmsg, 0, sizeof(m_rtmsg));
1013 if (cmd == 'a')
1014 cmd = RTM_ADD;
1015 else if (cmd == 'c')
1016 cmd = RTM_CHANGE;
1017 else if (cmd == 'g') {
1018 cmd = RTM_GET;
1019 if (so_ifp.sa.sa_family == 0) {
1020 so_ifp.sa.sa_family = AF_LINK;
1021 so_ifp.sa.sa_len = sizeof(struct sockaddr_dl);
1022 rtm_addrs |= RTA_IFP;
1023 }
1024 } else
1025 cmd = RTM_DELETE;
1026 #define rtm m_rtmsg.m_rtm
1027 rtm.rtm_type = cmd;
1028 rtm.rtm_flags = flags;
1029 rtm.rtm_version = RTM_VERSION;
1030 rtm.rtm_seq = ++seq;
1031 rtm.rtm_addrs = rtm_addrs;
1032 rtm.rtm_rmx = rt_metrics;
1033 rtm.rtm_inits = rtm_inits;
1034
1035 if (rtm_addrs & RTA_NETMASK)
1036 mask_addr();
1037 NEXTADDR(RTA_DST, so_dst);
1038 NEXTADDR(RTA_GATEWAY, so_gate);
1039 NEXTADDR(RTA_NETMASK, so_mask);
1040 NEXTADDR(RTA_GENMASK, so_genmask);
1041 NEXTADDR(RTA_IFP, so_ifp);
1042 NEXTADDR(RTA_IFA, so_ifa);
1043 rtm.rtm_msglen = l = cp - (char *)&m_rtmsg;
1044 if (verbose)
1045 print_rtmsg(&rtm, l);
1046 if (debugonly)
1047 return (0);
1048 if ((rlen = write(s, (char *)&m_rtmsg, l)) < 0) {
1049 perror("writing to routing socket");
1050 return (-1);
1051 }
1052 if (cmd == RTM_GET) {
1053 do {
1054 l = read(s, (char *)&m_rtmsg, sizeof(m_rtmsg));
1055 } while (l > 0 && (rtm.rtm_seq != seq || rtm.rtm_pid != pid));
1056 if (l < 0)
1057 (void) fprintf(stderr,
1058 "route: read from routing socket: %s\n",
1059 strerror(errno));
1060 else
1061 print_getmsg(&rtm, l);
1062 }
1063 #undef rtm
1064 return (0);
1065 }
1066
1067 void
1068 mask_addr()
1069 {
1070 int olen = so_mask.sa.sa_len;
1071 register char *cp1 = olen + (char *)&so_mask, *cp2;
1072
1073 for (so_mask.sa.sa_len = 0; cp1 > (char *)&so_mask; )
1074 if (*--cp1 != 0) {
1075 so_mask.sa.sa_len = 1 + cp1 - (char *)&so_mask;
1076 break;
1077 }
1078 if ((rtm_addrs & RTA_DST) == 0)
1079 return;
1080 switch (so_dst.sa.sa_family) {
1081 case AF_NS:
1082 case AF_INET:
1083 case AF_CCITT:
1084 case 0:
1085 return;
1086 case AF_ISO:
1087 olen = MIN(so_dst.siso.siso_nlen,
1088 MAX(so_mask.sa.sa_len - 6, 0));
1089 break;
1090 }
1091 cp1 = so_mask.sa.sa_len + 1 + (char *)&so_dst;
1092 cp2 = so_dst.sa.sa_len + 1 + (char *)&so_dst;
1093 while (cp2 > cp1)
1094 *--cp2 = 0;
1095 cp2 = so_mask.sa.sa_len + 1 + (char *)&so_mask;
1096 while (cp1 > so_dst.sa.sa_data)
1097 *--cp1 &= *--cp2;
1098 switch (so_dst.sa.sa_family) {
1099 case AF_ISO:
1100 so_dst.siso.siso_nlen = olen;
1101 break;
1102 }
1103 }
1104
1105 char *msgtypes[] = {
1106 "",
1107 "RTM_ADD: Add Route",
1108 "RTM_DELETE: Delete Route",
1109 "RTM_CHANGE: Change Metrics or flags",
1110 "RTM_GET: Report Metrics",
1111 "RTM_LOSING: Kernel Suspects Partitioning",
1112 "RTM_REDIRECT: Told to use different route",
1113 "RTM_MISS: Lookup failed on this address",
1114 "RTM_LOCK: fix specified metrics",
1115 "RTM_OLDADD: caused by SIOCADDRT",
1116 "RTM_OLDDEL: caused by SIOCDELRT",
1117 "RTM_RESOLVE: Route created by cloning",
1118 "RTM_NEWADDR: address being added to iface",
1119 "RTM_DELADDR: address being removed from iface",
1120 "RTM_IFINFO: iface status change",
1121 0,
1122 };
1123
1124 char metricnames[] =
1125 "\011pksent\010rttvar\7rtt\6ssthresh\5sendpipe\4recvpipe\3expire\2hopcount\1mtu";
1126 char routeflags[] =
1127 "\1UP\2GATEWAY\3HOST\4REJECT\5DYNAMIC\6MODIFIED\7DONE\010MASK_PRESENT\011CLONING\012XRESOLVE\013LLINFO\014STATIC\017PROTO2\020PROTO1";
1128 char ifnetflags[] =
1129 "\1UP\2BROADCAST\3DEBUG\4LOOPBACK\5PTP\6NOTRAILERS\7RUNNING\010NOARP\011PPROMISC\012ALLMULTI\013OACTIVE\014SIMPLEX\015LINK0\016LINK1\017LINK2\020MULTICAST";
1130 char addrnames[] =
1131 "\1DST\2GATEWAY\3NETMASK\4GENMASK\5IFP\6IFA\7AUTHOR\010BRD";
1132
1133 void
1134 print_rtmsg(rtm, msglen)
1135 register struct rt_msghdr *rtm;
1136 int msglen;
1137 {
1138 struct if_msghdr *ifm;
1139 struct ifa_msghdr *ifam;
1140
1141 if (verbose == 0)
1142 return;
1143 if (rtm->rtm_version != RTM_VERSION) {
1144 (void) printf("routing message version %d not understood\n",
1145 rtm->rtm_version);
1146 return;
1147 }
1148 (void)printf("%s: len %d, ", msgtypes[rtm->rtm_type], rtm->rtm_msglen);
1149 switch (rtm->rtm_type) {
1150 case RTM_IFINFO:
1151 ifm = (struct if_msghdr *)rtm;
1152 (void) printf("if# %d, flags:", ifm->ifm_index);
1153 bprintf(stdout, ifm->ifm_flags, ifnetflags);
1154 pmsg_addrs((char *)(ifm + 1), ifm->ifm_addrs);
1155 break;
1156 case RTM_NEWADDR:
1157 case RTM_DELADDR:
1158 ifam = (struct ifa_msghdr *)rtm;
1159 (void) printf("metric %d, flags:", ifam->ifam_metric);
1160 bprintf(stdout, ifam->ifam_flags, routeflags);
1161 pmsg_addrs((char *)(ifam + 1), ifam->ifam_addrs);
1162 break;
1163 default:
1164 (void) printf("pid: %d, seq %d, errno %d, flags:",
1165 rtm->rtm_pid, rtm->rtm_seq, rtm->rtm_errno);
1166 bprintf(stdout, rtm->rtm_flags, routeflags);
1167 pmsg_common(rtm);
1168 }
1169 }
1170
1171 void
1172 print_getmsg(rtm, msglen)
1173 register struct rt_msghdr *rtm;
1174 int msglen;
1175 {
1176 struct sockaddr *dst = NULL, *gate = NULL, *mask = NULL;
1177 struct sockaddr_dl *ifp = NULL;
1178 register struct sockaddr *sa;
1179 register char *cp;
1180 register int i;
1181
1182 (void) printf(" route to: %s\n", routename(&so_dst));
1183 if (rtm->rtm_version != RTM_VERSION) {
1184 (void)fprintf(stderr,
1185 "routing message version %d not understood\n",
1186 rtm->rtm_version);
1187 return;
1188 }
1189 if (rtm->rtm_msglen > msglen) {
1190 (void)fprintf(stderr,
1191 "message length mismatch, in packet %d, returned %d\n",
1192 rtm->rtm_msglen, msglen);
1193 }
1194 if (rtm->rtm_errno) {
1195 (void) fprintf(stderr, "RTM_GET: %s (errno %d)\n",
1196 strerror(rtm->rtm_errno), rtm->rtm_errno);
1197 return;
1198 }
1199 cp = ((char *)(rtm + 1));
1200 if (rtm->rtm_addrs)
1201 for (i = 1; i; i <<= 1)
1202 if (i & rtm->rtm_addrs) {
1203 sa = (struct sockaddr *)cp;
1204 switch (i) {
1205 case RTA_DST:
1206 dst = sa;
1207 break;
1208 case RTA_GATEWAY:
1209 gate = sa;
1210 break;
1211 case RTA_NETMASK:
1212 mask = sa;
1213 break;
1214 case RTA_IFP:
1215 if (sa->sa_family == AF_LINK &&
1216 ((struct sockaddr_dl *)sa)->sdl_nlen)
1217 ifp = (struct sockaddr_dl *)sa;
1218 break;
1219 }
1220 ADVANCE(cp, sa);
1221 }
1222 if (dst && mask)
1223 mask->sa_family = dst->sa_family; /* XXX */
1224 if (dst)
1225 (void)printf("destination: %s\n", routename(dst));
1226 if (mask) {
1227 int savenflag = nflag;
1228
1229 nflag = 1;
1230 (void)printf(" mask: %s\n", routename(mask));
1231 nflag = savenflag;
1232 }
1233 if (gate && rtm->rtm_flags & RTF_GATEWAY)
1234 (void)printf(" gateway: %s\n", routename(gate));
1235 if (ifp)
1236 (void)printf(" interface: %.*s\n",
1237 ifp->sdl_nlen, ifp->sdl_data);
1238 (void)printf(" flags: ");
1239 bprintf(stdout, rtm->rtm_flags, routeflags);
1240
1241 #define lock(f) ((rtm->rtm_rmx.rmx_locks & __CONCAT(RTV_,f)) ? 'L' : ' ')
1242 #define msec(u) (((u) + 500) / 1000) /* usec to msec */
1243
1244 (void) printf("\n%s\n", "\
1245 recvpipe sendpipe ssthresh rtt,msec rttvar hopcount mtu expire");
1246 printf("%8d%c ", rtm->rtm_rmx.rmx_recvpipe, lock(RPIPE));
1247 printf("%8d%c ", rtm->rtm_rmx.rmx_sendpipe, lock(SPIPE));
1248 printf("%8d%c ", rtm->rtm_rmx.rmx_ssthresh, lock(SSTHRESH));
1249 printf("%8d%c ", msec(rtm->rtm_rmx.rmx_rtt), lock(RTT));
1250 printf("%8d%c ", msec(rtm->rtm_rmx.rmx_rttvar), lock(RTTVAR));
1251 printf("%8d%c ", rtm->rtm_rmx.rmx_hopcount, lock(HOPCOUNT));
1252 printf("%8d%c ", rtm->rtm_rmx.rmx_mtu, lock(MTU));
1253 if (rtm->rtm_rmx.rmx_expire)
1254 rtm->rtm_rmx.rmx_expire -= time(0);
1255 printf("%8d%c\n", rtm->rtm_rmx.rmx_expire, lock(EXPIRE));
1256 #undef lock
1257 #undef msec
1258 #define RTA_IGN (RTA_DST|RTA_GATEWAY|RTA_NETMASK|RTA_IFP|RTA_IFA|RTA_BRD)
1259 if (verbose)
1260 pmsg_common(rtm);
1261 else if (rtm->rtm_addrs &~ RTA_IGN) {
1262 (void) printf("sockaddrs: ");
1263 bprintf(stdout, rtm->rtm_addrs, addrnames);
1264 putchar('\n');
1265 }
1266 #undef RTA_IGN
1267 }
1268
1269 void
1270 pmsg_common(rtm)
1271 register struct rt_msghdr *rtm;
1272 {
1273 (void) printf("\nlocks: ");
1274 bprintf(stdout, rtm->rtm_rmx.rmx_locks, metricnames);
1275 (void) printf(" inits: ");
1276 bprintf(stdout, rtm->rtm_inits, metricnames);
1277 pmsg_addrs(((char *)(rtm + 1)), rtm->rtm_addrs);
1278 }
1279
1280 void
1281 pmsg_addrs(cp, addrs)
1282 char *cp;
1283 int addrs;
1284 {
1285 register struct sockaddr *sa;
1286 int i;
1287
1288 if (addrs == 0)
1289 return;
1290 (void) printf("\nsockaddrs: ");
1291 bprintf(stdout, addrs, addrnames);
1292 (void) putchar('\n');
1293 for (i = 1; i; i <<= 1)
1294 if (i & addrs) {
1295 sa = (struct sockaddr *)cp;
1296 (void) printf(" %s", routename(sa));
1297 ADVANCE(cp, sa);
1298 }
1299 (void) putchar('\n');
1300 (void) fflush(stdout);
1301 }
1302
1303 void
1304 bprintf(fp, b, s)
1305 register FILE *fp;
1306 register int b;
1307 register u_char *s;
1308 {
1309 register int i;
1310 int gotsome = 0;
1311
1312 if (b == 0)
1313 return;
1314 while (i = *s++) {
1315 if (b & (1 << (i-1))) {
1316 if (gotsome == 0)
1317 i = '<';
1318 else
1319 i = ',';
1320 (void) putc(i, fp);
1321 gotsome = 1;
1322 for (; (i = *s) > 32; s++)
1323 (void) putc(i, fp);
1324 } else
1325 while (*s > 32)
1326 s++;
1327 }
1328 if (gotsome)
1329 (void) putc('>', fp);
1330 }
1331
1332 int
1333 keyword(cp)
1334 char *cp;
1335 {
1336 register struct keytab *kt = keywords;
1337
1338 while (kt->kt_cp && strcmp(kt->kt_cp, cp))
1339 kt++;
1340 return kt->kt_i;
1341 }
1342
1343 void
1344 sodump(su, which)
1345 register sup su;
1346 char *which;
1347 {
1348 switch (su->sa.sa_family) {
1349 case AF_LINK:
1350 (void) printf("%s: link %s; ",
1351 which, link_ntoa(&su->sdl));
1352 break;
1353 case AF_ISO:
1354 (void) printf("%s: iso %s; ",
1355 which, iso_ntoa(&su->siso.siso_addr));
1356 break;
1357 case AF_INET:
1358 (void) printf("%s: inet %s; ",
1359 which, inet_ntoa(su->sin.sin_addr));
1360 break;
1361 case AF_NS:
1362 (void) printf("%s: xns %s; ",
1363 which, ns_ntoa(su->sns.sns_addr));
1364 break;
1365 }
1366 (void) fflush(stdout);
1367 }
1368
1369 /* States*/
1370 #define VIRGIN 0
1371 #define GOTONE 1
1372 #define GOTTWO 2
1373 /* Inputs */
1374 #define DIGIT (4*0)
1375 #define END (4*1)
1376 #define DELIM (4*2)
1377
1378 void
1379 sockaddr(addr, sa)
1380 register char *addr;
1381 register struct sockaddr *sa;
1382 {
1383 register char *cp = (char *)sa;
1384 int size = sa->sa_len;
1385 char *cplim = cp + size;
1386 register int byte = 0, state = VIRGIN, new;
1387
1388 memset(cp, 0, size);
1389 cp++;
1390 do {
1391 if ((*addr >= '0') && (*addr <= '9')) {
1392 new = *addr - '0';
1393 } else if ((*addr >= 'a') && (*addr <= 'f')) {
1394 new = *addr - 'a' + 10;
1395 } else if ((*addr >= 'A') && (*addr <= 'F')) {
1396 new = *addr - 'A' + 10;
1397 } else if (*addr == 0)
1398 state |= END;
1399 else
1400 state |= DELIM;
1401 addr++;
1402 switch (state /* | INPUT */) {
1403 case GOTTWO | DIGIT:
1404 *cp++ = byte; /*FALLTHROUGH*/
1405 case VIRGIN | DIGIT:
1406 state = GOTONE; byte = new; continue;
1407 case GOTONE | DIGIT:
1408 state = GOTTWO; byte = new + (byte << 4); continue;
1409 default: /* | DELIM */
1410 state = VIRGIN; *cp++ = byte; byte = 0; continue;
1411 case GOTONE | END:
1412 case GOTTWO | END:
1413 *cp++ = byte; /* FALLTHROUGH */
1414 case VIRGIN | END:
1415 break;
1416 }
1417 break;
1418 } while (cp < cplim);
1419 sa->sa_len = cp - (char *)sa;
1420 }
1421