route.c revision 1.13 1 /* $NetBSD: route.c,v 1.13 1995/04/20 17:39:20 mycroft Exp $ */
2
3 /*
4 * Copyright (c) 1983, 1989, 1991, 1993
5 * The Regents of the University of California. All rights reserved.
6 *
7 * Redistribution and use in source and binary forms, with or without
8 * modification, are permitted provided that the following conditions
9 * are met:
10 * 1. Redistributions of source code must retain the above copyright
11 * notice, this list of conditions and the following disclaimer.
12 * 2. Redistributions in binary form must reproduce the above copyright
13 * notice, this list of conditions and the following disclaimer in the
14 * documentation and/or other materials provided with the distribution.
15 * 3. All advertising materials mentioning features or use of this software
16 * must display the following acknowledgement:
17 * This product includes software developed by the University of
18 * California, Berkeley and its contributors.
19 * 4. Neither the name of the University nor the names of its contributors
20 * may be used to endorse or promote products derived from this software
21 * without specific prior written permission.
22 *
23 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
24 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
25 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
26 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
27 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
28 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
29 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
30 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
31 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
32 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
33 * SUCH DAMAGE.
34 */
35
36 #ifndef lint
37 static char copyright[] =
38 "@(#) Copyright (c) 1983, 1989, 1991, 1993\n\
39 The Regents of the University of California. All rights reserved.\n";
40 #endif /* not lint */
41
42 #ifndef lint
43 #if 0
44 static char sccsid[] = "@(#)route.c 8.3 (Berkeley) 3/19/94";
45 #else
46 static char rcsid[] = "$NetBSD: route.c,v 1.13 1995/04/20 17:39:20 mycroft Exp $";
47 #endif
48 #endif /* not lint */
49
50 #include <sys/param.h>
51 #include <sys/file.h>
52 #include <sys/socket.h>
53 #include <sys/ioctl.h>
54 #include <sys/mbuf.h>
55 #include <sys/sysctl.h>
56
57 #include <net/if.h>
58 #include <net/route.h>
59 #include <net/if_dl.h>
60 #include <netinet/in.h>
61 #include <netns/ns.h>
62 #include <netiso/iso.h>
63 #include <netccitt/x25.h>
64 #include <arpa/inet.h>
65 #include <netdb.h>
66
67 #include <errno.h>
68 #include <unistd.h>
69 #include <stdio.h>
70 #include <ctype.h>
71 #include <stdlib.h>
72 #include <string.h>
73 #include <paths.h>
74
75 struct keytab {
76 char *kt_cp;
77 int kt_i;
78 } keywords[] = {
79 #include "keywords.h"
80 {0, 0}
81 };
82
83 struct ortentry route;
84 union sockunion {
85 struct sockaddr sa;
86 struct sockaddr_in sin;
87 struct sockaddr_ns sns;
88 struct sockaddr_iso siso;
89 struct sockaddr_dl sdl;
90 struct sockaddr_x25 sx25;
91 } so_dst, so_gate, so_mask, so_genmask, so_ifa, so_ifp;
92
93 typedef union sockunion *sup;
94 int pid, rtm_addrs, uid;
95 int s;
96 int forcehost, forcenet, doflush, nflag, af, qflag, tflag, keyword();
97 int iflag, verbose, aflen = sizeof (struct sockaddr_in);
98 int locking, lockrest, debugonly;
99 struct rt_metrics rt_metrics;
100 u_long rtm_inits;
101 struct in_addr inet_makeaddr();
102 char *routename(), *netname();
103 void flushroutes(), newroute(), monitor(), sockaddr(), sodump(), bprintf();
104 void print_getmsg(), print_rtmsg(), pmsg_common(), pmsg_addrs(), mask_addr();
105 int getaddr(), rtmsg(), x25_makemask();
106 extern char *inet_ntoa(), *iso_ntoa(), *link_ntoa();
107
108 __dead void
109 usage(cp)
110 char *cp;
111 {
112 if (cp)
113 (void) fprintf(stderr, "route: botched keyword: %s\n", cp);
114 (void) fprintf(stderr,
115 "usage: route [ -nqv ] cmd [[ -<qualifers> ] args ]\n");
116 exit(1);
117 /* NOTREACHED */
118 }
119
120 void
121 quit(s)
122 char *s;
123 {
124 int sverrno = errno;
125
126 (void) fprintf(stderr, "route: ");
127 if (s)
128 (void) fprintf(stderr, "%s: ", s);
129 (void) fprintf(stderr, "%s\n", strerror(sverrno));
130 exit(1);
131 /* NOTREACHED */
132 }
133
134 #define ROUNDUP(a) \
135 ((a) > 0 ? (1 + (((a) - 1) | (sizeof(long) - 1))) : sizeof(long))
136 #define ADVANCE(x, n) (x += ROUNDUP((n)->sa_len))
137
138 int
139 main(argc, argv)
140 int argc;
141 char **argv;
142 {
143 extern int optind;
144 int ch;
145
146 if (argc < 2)
147 usage((char *)NULL);
148
149 while ((ch = getopt(argc, argv, "nqdtv")) != EOF)
150 switch(ch) {
151 case 'n':
152 nflag = 1;
153 break;
154 case 'q':
155 qflag = 1;
156 break;
157 case 'v':
158 verbose = 1;
159 break;
160 case 't':
161 tflag = 1;
162 break;
163 case 'd':
164 debugonly = 1;
165 break;
166 case '?':
167 default:
168 usage((char *)NULL);
169 }
170 argc -= optind;
171 argv += optind;
172
173 pid = getpid();
174 uid = getuid();
175 if (tflag)
176 s = open("/dev/null", O_WRONLY, 0);
177 else
178 s = socket(PF_ROUTE, SOCK_RAW, 0);
179 if (s < 0)
180 quit("socket");
181 if (*argv)
182 switch (keyword(*argv)) {
183 case K_GET:
184 uid = 0;
185 /* FALLTHROUGH */
186
187 case K_CHANGE:
188 case K_ADD:
189 case K_DELETE:
190 newroute(argc, argv);
191 exit(0);
192 /* NOTREACHED */
193
194 case K_MONITOR:
195 monitor();
196 /* NOTREACHED */
197
198 case K_FLUSH:
199 flushroutes(argc, argv);
200 exit(0);
201 /* NOTREACHED */
202 }
203 usage(*argv);
204 /* NOTREACHED */
205 }
206
207 /*
208 * Purge all entries in the routing tables not
209 * associated with network interfaces.
210 */
211 void
212 flushroutes(argc, argv)
213 int argc;
214 char *argv[];
215 {
216 size_t needed;
217 int mib[6], rlen, seqno;
218 char *buf, *next, *lim;
219 register struct rt_msghdr *rtm;
220
221 if (uid) {
222 errno = EACCES;
223 quit("must be root to alter routing table");
224 }
225 shutdown(s, 0); /* Don't want to read back our messages */
226 if (argc > 1) {
227 argv++;
228 if (argc == 2 && **argv == '-')
229 switch (keyword(*argv + 1)) {
230 case K_INET:
231 af = AF_INET;
232 break;
233 case K_XNS:
234 af = AF_NS;
235 break;
236 case K_LINK:
237 af = AF_LINK;
238 break;
239 case K_ISO:
240 case K_OSI:
241 af = AF_ISO;
242 break;
243 case K_X25:
244 af = AF_CCITT;
245 default:
246 goto bad;
247 } else
248 bad: usage(*argv);
249 }
250 mib[0] = CTL_NET;
251 mib[1] = PF_ROUTE;
252 mib[2] = 0; /* protocol */
253 mib[3] = 0; /* wildcard address family */
254 mib[4] = NET_RT_DUMP;
255 mib[5] = 0; /* no flags */
256 if (sysctl(mib, 6, NULL, &needed, NULL, 0) < 0)
257 quit("route-sysctl-estimate");
258 if ((buf = malloc(needed)) == NULL)
259 quit("malloc");
260 if (sysctl(mib, 6, buf, &needed, NULL, 0) < 0)
261 quit("actual retrieval of routing table");
262 lim = buf + needed;
263 if (verbose)
264 (void) printf("Examining routing table from sysctl\n");
265 seqno = 0; /* ??? */
266 for (next = buf; next < lim; next += rtm->rtm_msglen) {
267 rtm = (struct rt_msghdr *)next;
268 if (verbose)
269 print_rtmsg(rtm, rtm->rtm_msglen);
270 if ((rtm->rtm_flags & RTF_GATEWAY) == 0)
271 continue;
272 if (af) {
273 struct sockaddr *sa = (struct sockaddr *)(rtm + 1);
274
275 if (sa->sa_family != af)
276 continue;
277 }
278 if (debugonly)
279 continue;
280 rtm->rtm_type = RTM_DELETE;
281 rtm->rtm_seq = seqno;
282 rlen = write(s, next, rtm->rtm_msglen);
283 if (rlen < (int)rtm->rtm_msglen) {
284 (void) fprintf(stderr,
285 "route: write to routing socket: %s\n",
286 strerror(errno));
287 (void) printf("got only %d for rlen\n", rlen);
288 break;
289 }
290 seqno++;
291 if (qflag)
292 continue;
293 if (verbose)
294 print_rtmsg(rtm, rlen);
295 else {
296 struct sockaddr *sa = (struct sockaddr *)(rtm + 1);
297 (void) printf("%-20.20s ", rtm->rtm_flags & RTF_HOST ?
298 routename(sa) : netname(sa));
299 sa = (struct sockaddr *)(sa->sa_len + (char *)sa);
300 (void) printf("%-20.20s ", routename(sa));
301 (void) printf("done\n");
302 }
303 }
304 }
305
306 char *
307 routename(sa)
308 struct sockaddr *sa;
309 {
310 register char *cp;
311 static char line[50];
312 struct hostent *hp;
313 static char domain[MAXHOSTNAMELEN + 1];
314 static int first = 1;
315 char *ns_print();
316
317 if (first) {
318 first = 0;
319 if (gethostname(domain, MAXHOSTNAMELEN) == 0 &&
320 (cp = strchr(domain, '.')))
321 (void) strcpy(domain, cp + 1);
322 else
323 domain[0] = 0;
324 }
325
326 if (sa->sa_len == 0)
327 strcpy(line, "default");
328 else switch (sa->sa_family) {
329
330 case AF_INET:
331 { struct in_addr in;
332 in = ((struct sockaddr_in *)sa)->sin_addr;
333
334 cp = 0;
335 if (in.s_addr == INADDR_ANY || sa->sa_len < 4)
336 cp = "default";
337 if (cp == 0 && !nflag) {
338 hp = gethostbyaddr((char *)&in, sizeof (struct in_addr),
339 AF_INET);
340 if (hp) {
341 if ((cp = strchr(hp->h_name, '.')) &&
342 !strcmp(cp + 1, domain))
343 *cp = 0;
344 cp = hp->h_name;
345 }
346 }
347 if (cp)
348 strcpy(line, cp);
349 else {
350 #define C(x) ((x) & 0xff)
351 in.s_addr = ntohl(in.s_addr);
352 (void) sprintf(line, "%u.%u.%u.%u", C(in.s_addr >> 24),
353 C(in.s_addr >> 16), C(in.s_addr >> 8), C(in.s_addr));
354 }
355 break;
356 }
357
358 case AF_NS:
359 return (ns_print((struct sockaddr_ns *)sa));
360
361 case AF_LINK:
362 return (link_ntoa((struct sockaddr_dl *)sa));
363
364 case AF_ISO:
365 (void) sprintf(line, "iso %s",
366 iso_ntoa(&((struct sockaddr_iso *)sa)->siso_addr));
367 break;
368
369 default:
370 { u_short *s = (u_short *)sa;
371 u_short *slim = s + ((sa->sa_len + 1) >> 1);
372 char *cp = line + sprintf(line, "(%d)", sa->sa_family);
373
374 while (++s < slim) /* start with sa->sa_data */
375 cp += sprintf(cp, " %x", *s);
376 break;
377 }
378 }
379 return (line);
380 }
381
382 /*
383 * Return the name of the network whose address is given.
384 * The address is assumed to be that of a net or subnet, not a host.
385 */
386 char *
387 netname(sa)
388 struct sockaddr *sa;
389 {
390 char *cp = 0;
391 static char line[50];
392 struct netent *np = 0;
393 u_long net, mask;
394 register u_long i;
395 int subnetshift;
396 char *ns_print();
397
398 switch (sa->sa_family) {
399
400 case AF_INET:
401 { struct in_addr in;
402 in = ((struct sockaddr_in *)sa)->sin_addr;
403
404 i = in.s_addr = ntohl(in.s_addr);
405 if (in.s_addr == 0)
406 cp = "default";
407 else if (!nflag) {
408 if (IN_CLASSA(i)) {
409 mask = IN_CLASSA_NET;
410 subnetshift = 8;
411 } else if (IN_CLASSB(i)) {
412 mask = IN_CLASSB_NET;
413 subnetshift = 8;
414 } else {
415 mask = IN_CLASSC_NET;
416 subnetshift = 4;
417 }
418 /*
419 * If there are more bits than the standard mask
420 * would suggest, subnets must be in use.
421 * Guess at the subnet mask, assuming reasonable
422 * width subnet fields.
423 */
424 while (in.s_addr &~ mask)
425 mask = (long)mask >> subnetshift;
426 net = in.s_addr & mask;
427 while ((mask & 1) == 0)
428 mask >>= 1, net >>= 1;
429 np = getnetbyaddr(net, AF_INET);
430 if (np)
431 cp = np->n_name;
432 }
433 if (cp)
434 strcpy(line, cp);
435 else if ((in.s_addr & 0xffffff) == 0)
436 (void) sprintf(line, "%u", C(in.s_addr >> 24));
437 else if ((in.s_addr & 0xffff) == 0)
438 (void) sprintf(line, "%u.%u", C(in.s_addr >> 24),
439 C(in.s_addr >> 16));
440 else if ((in.s_addr & 0xff) == 0)
441 (void) sprintf(line, "%u.%u.%u", C(in.s_addr >> 24),
442 C(in.s_addr >> 16), C(in.s_addr >> 8));
443 else
444 (void) sprintf(line, "%u.%u.%u.%u", C(in.s_addr >> 24),
445 C(in.s_addr >> 16), C(in.s_addr >> 8),
446 C(in.s_addr));
447 break;
448 }
449
450 case AF_NS:
451 return (ns_print((struct sockaddr_ns *)sa));
452
453 case AF_LINK:
454 return (link_ntoa((struct sockaddr_dl *)sa));
455
456 case AF_ISO:
457 (void) sprintf(line, "iso %s",
458 iso_ntoa(&((struct sockaddr_iso *)sa)->siso_addr));
459 break;
460
461 default:
462 { u_short *s = (u_short *)sa->sa_data;
463 u_short *slim = s + ((sa->sa_len + 1)>>1);
464 char *cp = line + sprintf(line, "af %d:", sa->sa_family);
465
466 while (s < slim)
467 cp += sprintf(cp, " %x", *s++);
468 break;
469 }
470 }
471 return (line);
472 }
473
474 void
475 set_metric(value, key)
476 char *value;
477 int key;
478 {
479 int flag = 0;
480 u_long noval, *valp = &noval;
481
482 switch (key) {
483 #define caseof(x, y, z) case x: valp = &rt_metrics.z; flag = y; break
484 caseof(K_MTU, RTV_MTU, rmx_mtu);
485 caseof(K_HOPCOUNT, RTV_HOPCOUNT, rmx_hopcount);
486 caseof(K_EXPIRE, RTV_EXPIRE, rmx_expire);
487 caseof(K_RECVPIPE, RTV_RPIPE, rmx_recvpipe);
488 caseof(K_SENDPIPE, RTV_SPIPE, rmx_sendpipe);
489 caseof(K_SSTHRESH, RTV_SSTHRESH, rmx_ssthresh);
490 caseof(K_RTT, RTV_RTT, rmx_rtt);
491 caseof(K_RTTVAR, RTV_RTTVAR, rmx_rttvar);
492 }
493 rtm_inits |= flag;
494 if (lockrest || locking)
495 rt_metrics.rmx_locks |= flag;
496 if (locking)
497 locking = 0;
498 *valp = atoi(value);
499 }
500
501 void
502 newroute(argc, argv)
503 int argc;
504 register char **argv;
505 {
506 char *cmd, *dest = "", *gateway = "", *err;
507 int ishost = 0, ret, attempts, oerrno, flags = RTF_STATIC;
508 int key;
509 struct hostent *hp = 0;
510
511 if (uid) {
512 errno = EACCES;
513 quit("must be root to alter routing table");
514 }
515 cmd = argv[0];
516 if (*cmd != 'g')
517 shutdown(s, 0); /* Don't want to read back our messages */
518 while (--argc > 0) {
519 if (**(++argv)== '-') {
520 switch (key = keyword(1 + *argv)) {
521 case K_LINK:
522 af = AF_LINK;
523 aflen = sizeof(struct sockaddr_dl);
524 break;
525 case K_OSI:
526 case K_ISO:
527 af = AF_ISO;
528 aflen = sizeof(struct sockaddr_iso);
529 break;
530 case K_INET:
531 af = AF_INET;
532 aflen = sizeof(struct sockaddr_in);
533 break;
534 case K_X25:
535 af = AF_CCITT;
536 aflen = sizeof(struct sockaddr_x25);
537 break;
538 case K_SA:
539 af = PF_ROUTE;
540 aflen = sizeof(union sockunion);
541 break;
542 case K_XNS:
543 af = AF_NS;
544 aflen = sizeof(struct sockaddr_ns);
545 break;
546 case K_IFACE:
547 case K_INTERFACE:
548 iflag++;
549 case K_NOSTATIC:
550 flags &= ~RTF_STATIC;
551 break;
552 case K_LLINFO:
553 flags |= RTF_LLINFO;
554 break;
555 case K_LOCK:
556 locking = 1;
557 break;
558 case K_LOCKREST:
559 lockrest = 1;
560 break;
561 case K_HOST:
562 forcehost++;
563 break;
564 case K_REJECT:
565 flags |= RTF_REJECT;
566 break;
567 case K_BLACKHOLE:
568 flags |= RTF_BLACKHOLE;
569 break;
570 case K_PROTO1:
571 flags |= RTF_PROTO1;
572 break;
573 case K_PROTO2:
574 flags |= RTF_PROTO2;
575 break;
576 case K_CLONING:
577 flags |= RTF_CLONING;
578 break;
579 case K_XRESOLVE:
580 flags |= RTF_XRESOLVE;
581 break;
582 case K_STATIC:
583 flags |= RTF_STATIC;
584 break;
585 case K_IFA:
586 argc--;
587 (void) getaddr(RTA_IFA, *++argv, 0);
588 break;
589 case K_IFP:
590 argc--;
591 (void) getaddr(RTA_IFP, *++argv, 0);
592 break;
593 case K_GENMASK:
594 argc--;
595 (void) getaddr(RTA_GENMASK, *++argv, 0);
596 break;
597 case K_GATEWAY:
598 argc--;
599 (void) getaddr(RTA_GATEWAY, *++argv, 0);
600 break;
601 case K_DST:
602 argc--;
603 ishost = getaddr(RTA_DST, *++argv, &hp);
604 dest = *argv;
605 break;
606 case K_NETMASK:
607 argc--;
608 (void) getaddr(RTA_NETMASK, *++argv, 0);
609 /* FALLTHROUGH */
610 case K_NET:
611 forcenet++;
612 break;
613 case K_MTU:
614 case K_HOPCOUNT:
615 case K_EXPIRE:
616 case K_RECVPIPE:
617 case K_SENDPIPE:
618 case K_SSTHRESH:
619 case K_RTT:
620 case K_RTTVAR:
621 argc--;
622 set_metric(*++argv, key);
623 break;
624 default:
625 usage(1+*argv);
626 }
627 } else {
628 if ((rtm_addrs & RTA_DST) == 0) {
629 dest = *argv;
630 ishost = getaddr(RTA_DST, *argv, &hp);
631 } else if ((rtm_addrs & RTA_GATEWAY) == 0) {
632 gateway = *argv;
633 (void) getaddr(RTA_GATEWAY, *argv, &hp);
634 } else {
635 int ret = atoi(*argv);
636
637 if (ret == 0) {
638 if (strcmp(*argv, "0") == 0)
639 printf("%s,%s",
640 "old usage of trailing 0",
641 "assuming route to if\n");
642 else
643 usage((char *)NULL);
644 iflag = 1;
645 continue;
646 } else if (ret > 0 && ret < 10) {
647 printf("old usage of trailing digit, ");
648 printf("assuming route via gateway\n");
649 iflag = 0;
650 continue;
651 }
652 (void) getaddr(RTA_NETMASK, *argv, 0);
653 }
654 }
655 }
656 if (forcehost)
657 ishost = 1;
658 if (forcenet)
659 ishost = 0;
660 flags |= RTF_UP;
661 if (ishost)
662 flags |= RTF_HOST;
663 if (iflag == 0)
664 flags |= RTF_GATEWAY;
665 for (attempts = 1; ; attempts++) {
666 errno = 0;
667 if ((ret = rtmsg(*cmd, flags)) == 0)
668 break;
669 if (errno != ENETUNREACH && errno != ESRCH)
670 break;
671 if (af == AF_INET && *gateway && hp && hp->h_addr_list[1]) {
672 hp->h_addr_list++;
673 memcpy(&so_gate.sin.sin_addr, hp->h_addr_list[0],
674 hp->h_length);
675 } else
676 break;
677 }
678 if (*cmd == 'g')
679 exit(0);
680 oerrno = errno;
681 (void) printf("%s %s %s", cmd, ishost? "host" : "net", dest);
682 if (*gateway) {
683 (void) printf(": gateway %s", gateway);
684 if (attempts > 1 && ret == 0 && af == AF_INET)
685 (void) printf(" (%s)",
686 inet_ntoa(((struct sockaddr_in *)&route.rt_gateway)->sin_addr));
687 }
688 if (ret == 0)
689 (void) printf("\n");
690 else {
691 switch (oerrno) {
692 case ESRCH:
693 err = "not in table";
694 break;
695 case EBUSY:
696 err = "entry in use";
697 break;
698 case ENOBUFS:
699 err = "routing table overflow";
700 break;
701 default:
702 err = strerror(oerrno);
703 break;
704 }
705 (void) printf(": %s\n", err);
706 }
707 }
708
709 void
710 inet_makenetandmask(net, sin)
711 u_long net;
712 register struct sockaddr_in *sin;
713 {
714 u_long addr, mask = 0;
715 register char *cp;
716
717 rtm_addrs |= RTA_NETMASK;
718 if (net == 0)
719 mask = addr = 0;
720 else if (net < 128) {
721 addr = net << IN_CLASSA_NSHIFT;
722 mask = IN_CLASSA_NET;
723 } else if (net < 65536) {
724 addr = net << IN_CLASSB_NSHIFT;
725 mask = IN_CLASSB_NET;
726 } else if (net < 16777216L) {
727 addr = net << IN_CLASSC_NSHIFT;
728 mask = IN_CLASSC_NET;
729 } else {
730 addr = net;
731 if ((addr & IN_CLASSA_HOST) == 0)
732 mask = IN_CLASSA_NET;
733 else if ((addr & IN_CLASSB_HOST) == 0)
734 mask = IN_CLASSB_NET;
735 else if ((addr & IN_CLASSC_HOST) == 0)
736 mask = IN_CLASSC_NET;
737 else
738 mask = -1;
739 }
740 sin->sin_addr.s_addr = htonl(addr);
741 sin = &so_mask.sin;
742 sin->sin_addr.s_addr = htonl(mask);
743 sin->sin_len = 0;
744 sin->sin_family = 0;
745 cp = (char *)(&sin->sin_addr + 1);
746 while (*--cp == 0 && cp > (char *)sin)
747 ;
748 sin->sin_len = 1 + cp - (char *)sin;
749 }
750
751 /*
752 * Interpret an argument as a network address of some kind,
753 * returning 1 if a host address, 0 if a network address.
754 */
755 int
756 getaddr(which, s, hpp)
757 int which;
758 char *s;
759 struct hostent **hpp;
760 {
761 register sup su;
762 struct ns_addr ns_addr();
763 struct iso_addr *iso_addr();
764 struct hostent *hp;
765 struct netent *np;
766 u_long val;
767
768 if (af == 0) {
769 af = AF_INET;
770 aflen = sizeof(struct sockaddr_in);
771 }
772 rtm_addrs |= which;
773 switch (which) {
774 case RTA_DST:
775 su = &so_dst;
776 su->sa.sa_family = af;
777 break;
778 case RTA_GATEWAY:
779 su = &so_gate;
780 su->sa.sa_family = af;
781 break;
782 case RTA_NETMASK:
783 su = &so_mask;
784 break;
785 case RTA_GENMASK:
786 su = &so_genmask;
787 break;
788 case RTA_IFP:
789 su = &so_ifp;
790 su->sa.sa_family = af;
791 break;
792 case RTA_IFA:
793 su = &so_ifa;
794 su->sa.sa_family = af;
795 break;
796 default:
797 usage("Internal Error");
798 /*NOTREACHED*/
799 }
800 su->sa.sa_len = aflen;
801 if (strcmp(s, "default") == 0) {
802 switch (which) {
803 case RTA_DST:
804 forcenet++;
805 (void) getaddr(RTA_NETMASK, s, 0);
806 break;
807 case RTA_NETMASK:
808 case RTA_GENMASK:
809 su->sa.sa_len = 0;
810 }
811 return (0);
812 }
813 switch (af) {
814 case AF_NS:
815 if (which == RTA_DST) {
816 extern short ns_bh[3];
817 struct sockaddr_ns *sms = &(so_mask.sns);
818 memset(sms, 0, sizeof(*sms));
819 sms->sns_family = 0;
820 sms->sns_len = 6;
821 sms->sns_addr.x_net = *(union ns_net *)ns_bh;
822 rtm_addrs |= RTA_NETMASK;
823 }
824 su->sns.sns_addr = ns_addr(s);
825 return (!ns_nullhost(su->sns.sns_addr));
826
827 case AF_OSI:
828 su->siso.siso_addr = *iso_addr(s);
829 if (which == RTA_NETMASK || which == RTA_GENMASK) {
830 register char *cp = (char *)TSEL(&su->siso);
831 su->siso.siso_nlen = 0;
832 do {--cp ;} while ((cp > (char *)su) && (*cp == 0));
833 su->siso.siso_len = 1 + cp - (char *)su;
834 }
835 return (1);
836
837 case AF_LINK:
838 link_addr(s, &su->sdl);
839 return (1);
840
841 case AF_CCITT:
842 ccitt_addr(s, &su->sx25);
843 return (which == RTA_DST ? x25_makemask() : 1);
844
845 case PF_ROUTE:
846 su->sa.sa_len = sizeof(*su);
847 sockaddr(s, &su->sa);
848 return (1);
849
850 case AF_INET:
851 default:
852 break;
853 }
854
855 if (hpp == NULL)
856 hpp = &hp;
857 *hpp = NULL;
858 if (((val = inet_addr(s)) != -1) &&
859 (which != RTA_DST || forcenet == 0)) {
860 su->sin.sin_addr.s_addr = val;
861 if (inet_lnaof(su->sin.sin_addr) != INADDR_ANY)
862 return (1);
863 else {
864 val = ntohl(val);
865 goto netdone;
866 }
867 }
868 if ((val = inet_network(s)) != -1 ||
869 ((np = getnetbyname(s)) != NULL && (val = np->n_net) != 0)) {
870 netdone:
871 if (which == RTA_DST)
872 inet_makenetandmask(val, &su->sin);
873 return (0);
874 }
875 hp = gethostbyname(s);
876 if (hp) {
877 *hpp = hp;
878 su->sin.sin_family = hp->h_addrtype;
879 memcpy(&su->sin.sin_addr, hp->h_addr, hp->h_length);
880 return (1);
881 }
882 (void) fprintf(stderr, "%s: bad value\n", s);
883 exit(1);
884 }
885
886 int
887 x25_makemask()
888 {
889 register char *cp;
890
891 if ((rtm_addrs & RTA_NETMASK) == 0) {
892 rtm_addrs |= RTA_NETMASK;
893 for (cp = (char *)&so_mask.sx25.x25_net;
894 cp < &so_mask.sx25.x25_opts.op_flags; cp++)
895 *cp = -1;
896 so_mask.sx25.x25_len = (u_char)&(((sup)0)->sx25.x25_opts);
897 }
898 return 0;
899 }
900
901 short ns_nullh[] = {0,0,0};
902 short ns_bh[] = {-1,-1,-1};
903
904 char *
905 ns_print(sns)
906 struct sockaddr_ns *sns;
907 {
908 struct ns_addr work;
909 union { union ns_net net_e; u_long long_e; } net;
910 u_short port;
911 static char mybuf[50], cport[10], chost[25];
912 char *host = "";
913 register char *p;
914 register u_char *q;
915
916 work = sns->sns_addr;
917 port = ntohs(work.x_port);
918 work.x_port = 0;
919 net.net_e = work.x_net;
920 if (ns_nullhost(work) && net.long_e == 0) {
921 if (!port)
922 return ("*.*");
923 (void) sprintf(mybuf, "*.%XH", port);
924 return (mybuf);
925 }
926
927 if (memcmp(ns_bh, work.x_host.c_host, 6) == 0)
928 host = "any";
929 else if (memcmp(ns_nullh, work.x_host.c_host, 6) == 0)
930 host = "*";
931 else {
932 q = work.x_host.c_host;
933 (void) sprintf(chost, "%02X%02X%02X%02X%02X%02XH",
934 q[0], q[1], q[2], q[3], q[4], q[5]);
935 for (p = chost; *p == '0' && p < chost + 12; p++)
936 /* void */;
937 host = p;
938 }
939 if (port)
940 (void) sprintf(cport, ".%XH", htons(port));
941 else
942 *cport = 0;
943
944 (void) sprintf(mybuf,"%XH.%s%s", ntohl(net.long_e), host, cport);
945 return (mybuf);
946 }
947
948 void
949 interfaces()
950 {
951 size_t needed;
952 int mib[6];
953 char *buf, *lim, *next;
954 register struct rt_msghdr *rtm;
955
956 mib[0] = CTL_NET;
957 mib[1] = PF_ROUTE;
958 mib[2] = 0; /* protocol */
959 mib[3] = 0; /* wildcard address family */
960 mib[4] = NET_RT_IFLIST;
961 mib[5] = 0; /* no flags */
962 if (sysctl(mib, 6, NULL, &needed, NULL, 0) < 0)
963 quit("route-sysctl-estimate");
964 if ((buf = malloc(needed)) == NULL)
965 quit("malloc");
966 if (sysctl(mib, 6, buf, &needed, NULL, 0) < 0)
967 quit("actual retrieval of interface table");
968 lim = buf + needed;
969 for (next = buf; next < lim; next += rtm->rtm_msglen) {
970 rtm = (struct rt_msghdr *)next;
971 print_rtmsg(rtm, rtm->rtm_msglen);
972 }
973 }
974
975 void
976 monitor()
977 {
978 int n;
979 char msg[2048];
980
981 verbose = 1;
982 if (debugonly) {
983 interfaces();
984 exit(0);
985 }
986 for(;;) {
987 n = read(s, msg, 2048);
988 (void) printf("got message of size %d\n", n);
989 print_rtmsg((struct rt_msghdr *)msg, n);
990 }
991 }
992
993 struct {
994 struct rt_msghdr m_rtm;
995 char m_space[512];
996 } m_rtmsg;
997
998 int
999 rtmsg(cmd, flags)
1000 int cmd, flags;
1001 {
1002 static int seq;
1003 int rlen;
1004 register char *cp = m_rtmsg.m_space;
1005 register int l;
1006
1007 #define NEXTADDR(w, u) \
1008 if (rtm_addrs & (w)) {\
1009 l = ROUNDUP(u.sa.sa_len); memcpy(cp, &(u), l); cp += l;\
1010 if (verbose) sodump(&(u),"u");\
1011 }
1012
1013 errno = 0;
1014 memset(&m_rtmsg, 0, sizeof(m_rtmsg));
1015 if (cmd == 'a')
1016 cmd = RTM_ADD;
1017 else if (cmd == 'c')
1018 cmd = RTM_CHANGE;
1019 else if (cmd == 'g') {
1020 cmd = RTM_GET;
1021 if (so_ifp.sa.sa_family == 0) {
1022 so_ifp.sa.sa_family = AF_LINK;
1023 so_ifp.sa.sa_len = sizeof(struct sockaddr_dl);
1024 rtm_addrs |= RTA_IFP;
1025 }
1026 } else
1027 cmd = RTM_DELETE;
1028 #define rtm m_rtmsg.m_rtm
1029 rtm.rtm_type = cmd;
1030 rtm.rtm_flags = flags;
1031 rtm.rtm_version = RTM_VERSION;
1032 rtm.rtm_seq = ++seq;
1033 rtm.rtm_addrs = rtm_addrs;
1034 rtm.rtm_rmx = rt_metrics;
1035 rtm.rtm_inits = rtm_inits;
1036
1037 if (rtm_addrs & RTA_NETMASK)
1038 mask_addr();
1039 NEXTADDR(RTA_DST, so_dst);
1040 NEXTADDR(RTA_GATEWAY, so_gate);
1041 NEXTADDR(RTA_NETMASK, so_mask);
1042 NEXTADDR(RTA_GENMASK, so_genmask);
1043 NEXTADDR(RTA_IFP, so_ifp);
1044 NEXTADDR(RTA_IFA, so_ifa);
1045 rtm.rtm_msglen = l = cp - (char *)&m_rtmsg;
1046 if (verbose)
1047 print_rtmsg(&rtm, l);
1048 if (debugonly)
1049 return (0);
1050 if ((rlen = write(s, (char *)&m_rtmsg, l)) < 0) {
1051 perror("writing to routing socket");
1052 return (-1);
1053 }
1054 if (cmd == RTM_GET) {
1055 do {
1056 l = read(s, (char *)&m_rtmsg, sizeof(m_rtmsg));
1057 } while (l > 0 && (rtm.rtm_seq != seq || rtm.rtm_pid != pid));
1058 if (l < 0)
1059 (void) fprintf(stderr,
1060 "route: read from routing socket: %s\n",
1061 strerror(errno));
1062 else
1063 print_getmsg(&rtm, l);
1064 }
1065 #undef rtm
1066 return (0);
1067 }
1068
1069 void
1070 mask_addr()
1071 {
1072 int olen = so_mask.sa.sa_len;
1073 register char *cp1 = olen + (char *)&so_mask, *cp2;
1074
1075 for (so_mask.sa.sa_len = 0; cp1 > (char *)&so_mask; )
1076 if (*--cp1 != 0) {
1077 so_mask.sa.sa_len = 1 + cp1 - (char *)&so_mask;
1078 break;
1079 }
1080 if ((rtm_addrs & RTA_DST) == 0)
1081 return;
1082 switch (so_dst.sa.sa_family) {
1083 case AF_NS:
1084 case AF_INET:
1085 case AF_CCITT:
1086 case 0:
1087 return;
1088 case AF_ISO:
1089 olen = MIN(so_dst.siso.siso_nlen,
1090 MAX(so_mask.sa.sa_len - 6, 0));
1091 break;
1092 }
1093 cp1 = so_mask.sa.sa_len + 1 + (char *)&so_dst;
1094 cp2 = so_dst.sa.sa_len + 1 + (char *)&so_dst;
1095 while (cp2 > cp1)
1096 *--cp2 = 0;
1097 cp2 = so_mask.sa.sa_len + 1 + (char *)&so_mask;
1098 while (cp1 > so_dst.sa.sa_data)
1099 *--cp1 &= *--cp2;
1100 switch (so_dst.sa.sa_family) {
1101 case AF_ISO:
1102 so_dst.siso.siso_nlen = olen;
1103 break;
1104 }
1105 }
1106
1107 char *msgtypes[] = {
1108 "",
1109 "RTM_ADD: Add Route",
1110 "RTM_DELETE: Delete Route",
1111 "RTM_CHANGE: Change Metrics or flags",
1112 "RTM_GET: Report Metrics",
1113 "RTM_LOSING: Kernel Suspects Partitioning",
1114 "RTM_REDIRECT: Told to use different route",
1115 "RTM_MISS: Lookup failed on this address",
1116 "RTM_LOCK: fix specified metrics",
1117 "RTM_OLDADD: caused by SIOCADDRT",
1118 "RTM_OLDDEL: caused by SIOCDELRT",
1119 "RTM_RESOLVE: Route created by cloning",
1120 "RTM_NEWADDR: address being added to iface",
1121 "RTM_DELADDR: address being removed from iface",
1122 "RTM_IFINFO: iface status change",
1123 0,
1124 };
1125
1126 char metricnames[] =
1127 "\011pksent\010rttvar\7rtt\6ssthresh\5sendpipe\4recvpipe\3expire\2hopcount\1mtu";
1128 char routeflags[] =
1129 "\1UP\2GATEWAY\3HOST\4REJECT\5DYNAMIC\6MODIFIED\7DONE\010MASK_PRESENT\011CLONING\012XRESOLVE\013LLINFO\014STATIC\017PROTO2\020PROTO1";
1130 char ifnetflags[] =
1131 "\1UP\2BROADCAST\3DEBUG\4LOOPBACK\5PTP\6NOTRAILERS\7RUNNING\010NOARP\011PPROMISC\012ALLMULTI\013OACTIVE\014SIMPLEX\015LINK0\016LINK1\017LINK2\020MULTICAST";
1132 char addrnames[] =
1133 "\1DST\2GATEWAY\3NETMASK\4GENMASK\5IFP\6IFA\7AUTHOR\010BRD";
1134
1135 void
1136 print_rtmsg(rtm, msglen)
1137 register struct rt_msghdr *rtm;
1138 int msglen;
1139 {
1140 struct if_msghdr *ifm;
1141 struct ifa_msghdr *ifam;
1142
1143 if (verbose == 0)
1144 return;
1145 if (rtm->rtm_version != RTM_VERSION) {
1146 (void) printf("routing message version %d not understood\n",
1147 rtm->rtm_version);
1148 return;
1149 }
1150 (void)printf("%s: len %d, ", msgtypes[rtm->rtm_type], rtm->rtm_msglen);
1151 switch (rtm->rtm_type) {
1152 case RTM_IFINFO:
1153 ifm = (struct if_msghdr *)rtm;
1154 (void) printf("if# %d, flags:", ifm->ifm_index);
1155 bprintf(stdout, ifm->ifm_flags, ifnetflags);
1156 pmsg_addrs((char *)(ifm + 1), ifm->ifm_addrs);
1157 break;
1158 case RTM_NEWADDR:
1159 case RTM_DELADDR:
1160 ifam = (struct ifa_msghdr *)rtm;
1161 (void) printf("metric %d, flags:", ifam->ifam_metric);
1162 bprintf(stdout, ifam->ifam_flags, routeflags);
1163 pmsg_addrs((char *)(ifam + 1), ifam->ifam_addrs);
1164 break;
1165 default:
1166 (void) printf("pid: %d, seq %d, errno %d, flags:",
1167 rtm->rtm_pid, rtm->rtm_seq, rtm->rtm_errno);
1168 bprintf(stdout, rtm->rtm_flags, routeflags);
1169 pmsg_common(rtm);
1170 }
1171 }
1172
1173 void
1174 print_getmsg(rtm, msglen)
1175 register struct rt_msghdr *rtm;
1176 int msglen;
1177 {
1178 struct sockaddr *dst = NULL, *gate = NULL, *mask = NULL;
1179 struct sockaddr_dl *ifp = NULL;
1180 register struct sockaddr *sa;
1181 register char *cp;
1182 register int i;
1183
1184 (void) printf(" route to: %s\n", routename(&so_dst));
1185 if (rtm->rtm_version != RTM_VERSION) {
1186 (void)fprintf(stderr,
1187 "routing message version %d not understood\n",
1188 rtm->rtm_version);
1189 return;
1190 }
1191 if (rtm->rtm_msglen > msglen) {
1192 (void)fprintf(stderr,
1193 "message length mismatch, in packet %d, returned %d\n",
1194 rtm->rtm_msglen, msglen);
1195 }
1196 if (rtm->rtm_errno) {
1197 (void) fprintf(stderr, "RTM_GET: %s (errno %d)\n",
1198 strerror(rtm->rtm_errno), rtm->rtm_errno);
1199 return;
1200 }
1201 cp = ((char *)(rtm + 1));
1202 if (rtm->rtm_addrs)
1203 for (i = 1; i; i <<= 1)
1204 if (i & rtm->rtm_addrs) {
1205 sa = (struct sockaddr *)cp;
1206 switch (i) {
1207 case RTA_DST:
1208 dst = sa;
1209 break;
1210 case RTA_GATEWAY:
1211 gate = sa;
1212 break;
1213 case RTA_NETMASK:
1214 mask = sa;
1215 break;
1216 case RTA_IFP:
1217 if (sa->sa_family == AF_LINK &&
1218 ((struct sockaddr_dl *)sa)->sdl_nlen)
1219 ifp = (struct sockaddr_dl *)sa;
1220 break;
1221 }
1222 ADVANCE(cp, sa);
1223 }
1224 if (dst && mask)
1225 mask->sa_family = dst->sa_family; /* XXX */
1226 if (dst)
1227 (void)printf("destination: %s\n", routename(dst));
1228 if (mask) {
1229 int savenflag = nflag;
1230
1231 nflag = 1;
1232 (void)printf(" mask: %s\n", routename(mask));
1233 nflag = savenflag;
1234 }
1235 if (gate && rtm->rtm_flags & RTF_GATEWAY)
1236 (void)printf(" gateway: %s\n", routename(gate));
1237 if (ifp)
1238 (void)printf(" interface: %.*s\n",
1239 ifp->sdl_nlen, ifp->sdl_data);
1240 (void)printf(" flags: ");
1241 bprintf(stdout, rtm->rtm_flags, routeflags);
1242
1243 #define lock(f) ((rtm->rtm_rmx.rmx_locks & __CONCAT(RTV_,f)) ? 'L' : ' ')
1244 #define msec(u) (((u) + 500) / 1000) /* usec to msec */
1245
1246 (void) printf("\n%s\n", "\
1247 recvpipe sendpipe ssthresh rtt,msec rttvar hopcount mtu expire");
1248 printf("%8d%c ", rtm->rtm_rmx.rmx_recvpipe, lock(RPIPE));
1249 printf("%8d%c ", rtm->rtm_rmx.rmx_sendpipe, lock(SPIPE));
1250 printf("%8d%c ", rtm->rtm_rmx.rmx_ssthresh, lock(SSTHRESH));
1251 printf("%8d%c ", msec(rtm->rtm_rmx.rmx_rtt), lock(RTT));
1252 printf("%8d%c ", msec(rtm->rtm_rmx.rmx_rttvar), lock(RTTVAR));
1253 printf("%8d%c ", rtm->rtm_rmx.rmx_hopcount, lock(HOPCOUNT));
1254 printf("%8d%c ", rtm->rtm_rmx.rmx_mtu, lock(MTU));
1255 if (rtm->rtm_rmx.rmx_expire)
1256 rtm->rtm_rmx.rmx_expire -= time(0);
1257 printf("%8d%c\n", rtm->rtm_rmx.rmx_expire, lock(EXPIRE));
1258 #undef lock
1259 #undef msec
1260 #define RTA_IGN (RTA_DST|RTA_GATEWAY|RTA_NETMASK|RTA_IFP|RTA_IFA|RTA_BRD)
1261 if (verbose)
1262 pmsg_common(rtm);
1263 else if (rtm->rtm_addrs &~ RTA_IGN) {
1264 (void) printf("sockaddrs: ");
1265 bprintf(stdout, rtm->rtm_addrs, addrnames);
1266 putchar('\n');
1267 }
1268 #undef RTA_IGN
1269 }
1270
1271 void
1272 pmsg_common(rtm)
1273 register struct rt_msghdr *rtm;
1274 {
1275 (void) printf("\nlocks: ");
1276 bprintf(stdout, rtm->rtm_rmx.rmx_locks, metricnames);
1277 (void) printf(" inits: ");
1278 bprintf(stdout, rtm->rtm_inits, metricnames);
1279 pmsg_addrs(((char *)(rtm + 1)), rtm->rtm_addrs);
1280 }
1281
1282 void
1283 pmsg_addrs(cp, addrs)
1284 char *cp;
1285 int addrs;
1286 {
1287 register struct sockaddr *sa;
1288 int i;
1289
1290 if (addrs == 0)
1291 return;
1292 (void) printf("\nsockaddrs: ");
1293 bprintf(stdout, addrs, addrnames);
1294 (void) putchar('\n');
1295 for (i = 1; i; i <<= 1)
1296 if (i & addrs) {
1297 sa = (struct sockaddr *)cp;
1298 (void) printf(" %s", routename(sa));
1299 ADVANCE(cp, sa);
1300 }
1301 (void) putchar('\n');
1302 (void) fflush(stdout);
1303 }
1304
1305 void
1306 bprintf(fp, b, s)
1307 register FILE *fp;
1308 register int b;
1309 register u_char *s;
1310 {
1311 register int i;
1312 int gotsome = 0;
1313
1314 if (b == 0)
1315 return;
1316 while (i = *s++) {
1317 if (b & (1 << (i-1))) {
1318 if (gotsome == 0)
1319 i = '<';
1320 else
1321 i = ',';
1322 (void) putc(i, fp);
1323 gotsome = 1;
1324 for (; (i = *s) > 32; s++)
1325 (void) putc(i, fp);
1326 } else
1327 while (*s > 32)
1328 s++;
1329 }
1330 if (gotsome)
1331 (void) putc('>', fp);
1332 }
1333
1334 int
1335 keyword(cp)
1336 char *cp;
1337 {
1338 register struct keytab *kt = keywords;
1339
1340 while (kt->kt_cp && strcmp(kt->kt_cp, cp))
1341 kt++;
1342 return kt->kt_i;
1343 }
1344
1345 void
1346 sodump(su, which)
1347 register sup su;
1348 char *which;
1349 {
1350 switch (su->sa.sa_family) {
1351 case AF_LINK:
1352 (void) printf("%s: link %s; ",
1353 which, link_ntoa(&su->sdl));
1354 break;
1355 case AF_ISO:
1356 (void) printf("%s: iso %s; ",
1357 which, iso_ntoa(&su->siso.siso_addr));
1358 break;
1359 case AF_INET:
1360 (void) printf("%s: inet %s; ",
1361 which, inet_ntoa(su->sin.sin_addr));
1362 break;
1363 case AF_NS:
1364 (void) printf("%s: xns %s; ",
1365 which, ns_ntoa(su->sns.sns_addr));
1366 break;
1367 }
1368 (void) fflush(stdout);
1369 }
1370
1371 /* States*/
1372 #define VIRGIN 0
1373 #define GOTONE 1
1374 #define GOTTWO 2
1375 /* Inputs */
1376 #define DIGIT (4*0)
1377 #define END (4*1)
1378 #define DELIM (4*2)
1379
1380 void
1381 sockaddr(addr, sa)
1382 register char *addr;
1383 register struct sockaddr *sa;
1384 {
1385 register char *cp = (char *)sa;
1386 int size = sa->sa_len;
1387 char *cplim = cp + size;
1388 register int byte = 0, state = VIRGIN, new;
1389
1390 memset(cp, 0, size);
1391 cp++;
1392 do {
1393 if ((*addr >= '0') && (*addr <= '9')) {
1394 new = *addr - '0';
1395 } else if ((*addr >= 'a') && (*addr <= 'f')) {
1396 new = *addr - 'a' + 10;
1397 } else if ((*addr >= 'A') && (*addr <= 'F')) {
1398 new = *addr - 'A' + 10;
1399 } else if (*addr == 0)
1400 state |= END;
1401 else
1402 state |= DELIM;
1403 addr++;
1404 switch (state /* | INPUT */) {
1405 case GOTTWO | DIGIT:
1406 *cp++ = byte; /*FALLTHROUGH*/
1407 case VIRGIN | DIGIT:
1408 state = GOTONE; byte = new; continue;
1409 case GOTONE | DIGIT:
1410 state = GOTTWO; byte = new + (byte << 4); continue;
1411 default: /* | DELIM */
1412 state = VIRGIN; *cp++ = byte; byte = 0; continue;
1413 case GOTONE | END:
1414 case GOTTWO | END:
1415 *cp++ = byte; /* FALLTHROUGH */
1416 case VIRGIN | END:
1417 break;
1418 }
1419 break;
1420 } while (cp < cplim);
1421 sa->sa_len = cp - (char *)sa;
1422 }
1423