route.c revision 1.14 1 /* $NetBSD: route.c,v 1.14 1995/04/20 20:52:46 mycroft Exp $ */
2
3 /*
4 * Copyright (c) 1983, 1989, 1991, 1993
5 * The Regents of the University of California. All rights reserved.
6 *
7 * Redistribution and use in source and binary forms, with or without
8 * modification, are permitted provided that the following conditions
9 * are met:
10 * 1. Redistributions of source code must retain the above copyright
11 * notice, this list of conditions and the following disclaimer.
12 * 2. Redistributions in binary form must reproduce the above copyright
13 * notice, this list of conditions and the following disclaimer in the
14 * documentation and/or other materials provided with the distribution.
15 * 3. All advertising materials mentioning features or use of this software
16 * must display the following acknowledgement:
17 * This product includes software developed by the University of
18 * California, Berkeley and its contributors.
19 * 4. Neither the name of the University nor the names of its contributors
20 * may be used to endorse or promote products derived from this software
21 * without specific prior written permission.
22 *
23 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
24 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
25 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
26 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
27 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
28 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
29 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
30 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
31 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
32 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
33 * SUCH DAMAGE.
34 */
35
36 #ifndef lint
37 static char copyright[] =
38 "@(#) Copyright (c) 1983, 1989, 1991, 1993\n\
39 The Regents of the University of California. All rights reserved.\n";
40 #endif /* not lint */
41
42 #ifndef lint
43 #if 0
44 static char sccsid[] = "@(#)route.c 8.3 (Berkeley) 3/19/94";
45 #else
46 static char rcsid[] = "$NetBSD: route.c,v 1.14 1995/04/20 20:52:46 mycroft Exp $";
47 #endif
48 #endif /* not lint */
49
50 #include <sys/param.h>
51 #include <sys/file.h>
52 #include <sys/socket.h>
53 #include <sys/ioctl.h>
54 #include <sys/mbuf.h>
55 #include <sys/sysctl.h>
56
57 #include <net/if.h>
58 #include <net/route.h>
59 #include <net/if_dl.h>
60 #include <netinet/in.h>
61 #include <netns/ns.h>
62 #include <netiso/iso.h>
63 #include <netccitt/x25.h>
64 #include <arpa/inet.h>
65 #include <netdb.h>
66
67 #include <errno.h>
68 #include <unistd.h>
69 #include <stdio.h>
70 #include <ctype.h>
71 #include <stdlib.h>
72 #include <string.h>
73 #include <paths.h>
74
75 struct keytab {
76 char *kt_cp;
77 int kt_i;
78 } keywords[] = {
79 #include "keywords.h"
80 {0, 0}
81 };
82
83 struct ortentry route;
84 union sockunion {
85 struct sockaddr sa;
86 struct sockaddr_in sin;
87 struct sockaddr_ns sns;
88 struct sockaddr_iso siso;
89 struct sockaddr_dl sdl;
90 struct sockaddr_x25 sx25;
91 } so_dst, so_gate, so_mask, so_genmask, so_ifa, so_ifp;
92
93 typedef union sockunion *sup;
94 int pid, rtm_addrs, uid;
95 int s;
96 int forcehost, forcenet, doflush, nflag, af, qflag, tflag, keyword();
97 int iflag, verbose, aflen = sizeof (struct sockaddr_in);
98 int locking, lockrest, debugonly;
99 struct rt_metrics rt_metrics;
100 u_long rtm_inits;
101 struct in_addr inet_makeaddr();
102 char *routename(), *netname();
103 void flushroutes(), newroute(), monitor(), sockaddr(), sodump(), bprintf();
104 void print_getmsg(), print_rtmsg(), pmsg_common(), pmsg_addrs(), mask_addr();
105 int getaddr(), rtmsg(), x25_makemask();
106 extern char *inet_ntoa(), *iso_ntoa(), *link_ntoa();
107
108 __dead void
109 usage(cp)
110 char *cp;
111 {
112 if (cp)
113 (void) fprintf(stderr, "route: botched keyword: %s\n", cp);
114 (void) fprintf(stderr,
115 "usage: route [ -nqv ] cmd [[ -<qualifers> ] args ]\n");
116 exit(1);
117 /* NOTREACHED */
118 }
119
120 void
121 quit(s)
122 char *s;
123 {
124 int sverrno = errno;
125
126 (void) fprintf(stderr, "route: ");
127 if (s)
128 (void) fprintf(stderr, "%s: ", s);
129 (void) fprintf(stderr, "%s\n", strerror(sverrno));
130 exit(1);
131 /* NOTREACHED */
132 }
133
134 #define ROUNDUP(a) \
135 ((a) > 0 ? (1 + (((a) - 1) | (sizeof(long) - 1))) : sizeof(long))
136 #define ADVANCE(x, n) (x += ROUNDUP((n)->sa_len))
137
138 int
139 main(argc, argv)
140 int argc;
141 char **argv;
142 {
143 extern int optind;
144 int ch;
145
146 if (argc < 2)
147 usage((char *)NULL);
148
149 while ((ch = getopt(argc, argv, "nqdtv")) != EOF)
150 switch(ch) {
151 case 'n':
152 nflag = 1;
153 break;
154 case 'q':
155 qflag = 1;
156 break;
157 case 'v':
158 verbose = 1;
159 break;
160 case 't':
161 tflag = 1;
162 break;
163 case 'd':
164 debugonly = 1;
165 break;
166 case '?':
167 default:
168 usage((char *)NULL);
169 }
170 argc -= optind;
171 argv += optind;
172
173 pid = getpid();
174 uid = getuid();
175 if (tflag)
176 s = open("/dev/null", O_WRONLY, 0);
177 else
178 s = socket(PF_ROUTE, SOCK_RAW, 0);
179 if (s < 0)
180 quit("socket");
181 if (*argv)
182 switch (keyword(*argv)) {
183 case K_GET:
184 uid = 0;
185 /* FALLTHROUGH */
186
187 case K_CHANGE:
188 case K_ADD:
189 case K_DELETE:
190 newroute(argc, argv);
191 exit(0);
192 /* NOTREACHED */
193
194 case K_MONITOR:
195 monitor();
196 /* NOTREACHED */
197
198 case K_FLUSH:
199 flushroutes(argc, argv);
200 exit(0);
201 /* NOTREACHED */
202 }
203 usage(*argv);
204 /* NOTREACHED */
205 }
206
207 /*
208 * Purge all entries in the routing tables not
209 * associated with network interfaces.
210 */
211 void
212 flushroutes(argc, argv)
213 int argc;
214 char *argv[];
215 {
216 size_t needed;
217 int mib[6], rlen, seqno;
218 char *buf, *next, *lim;
219 register struct rt_msghdr *rtm;
220
221 if (uid) {
222 errno = EACCES;
223 quit("must be root to alter routing table");
224 }
225 shutdown(s, 0); /* Don't want to read back our messages */
226 if (argc > 1) {
227 argv++;
228 if (argc == 2 && **argv == '-')
229 switch (keyword(*argv + 1)) {
230 case K_INET:
231 af = AF_INET;
232 break;
233 case K_XNS:
234 af = AF_NS;
235 break;
236 case K_LINK:
237 af = AF_LINK;
238 break;
239 case K_ISO:
240 case K_OSI:
241 af = AF_ISO;
242 break;
243 case K_X25:
244 af = AF_CCITT;
245 default:
246 goto bad;
247 } else
248 bad: usage(*argv);
249 }
250 mib[0] = CTL_NET;
251 mib[1] = PF_ROUTE;
252 mib[2] = 0; /* protocol */
253 mib[3] = 0; /* wildcard address family */
254 mib[4] = NET_RT_DUMP;
255 mib[5] = 0; /* no flags */
256 if (sysctl(mib, 6, NULL, &needed, NULL, 0) < 0)
257 quit("route-sysctl-estimate");
258 if ((buf = malloc(needed)) == NULL)
259 quit("malloc");
260 if (sysctl(mib, 6, buf, &needed, NULL, 0) < 0)
261 quit("actual retrieval of routing table");
262 lim = buf + needed;
263 if (verbose)
264 (void) printf("Examining routing table from sysctl\n");
265 seqno = 0; /* ??? */
266 for (next = buf; next < lim; next += rtm->rtm_msglen) {
267 rtm = (struct rt_msghdr *)next;
268 if (verbose)
269 print_rtmsg(rtm, rtm->rtm_msglen);
270 if ((rtm->rtm_flags & RTF_GATEWAY) == 0)
271 continue;
272 if (af) {
273 struct sockaddr *sa = (struct sockaddr *)(rtm + 1);
274
275 if (sa->sa_family != af)
276 continue;
277 }
278 if (debugonly)
279 continue;
280 rtm->rtm_type = RTM_DELETE;
281 rtm->rtm_seq = seqno;
282 rlen = write(s, next, rtm->rtm_msglen);
283 if (rlen < (int)rtm->rtm_msglen) {
284 (void) fprintf(stderr,
285 "route: write to routing socket: %s\n",
286 strerror(errno));
287 (void) printf("got only %d for rlen\n", rlen);
288 break;
289 }
290 seqno++;
291 if (qflag)
292 continue;
293 if (verbose)
294 print_rtmsg(rtm, rlen);
295 else {
296 struct sockaddr *sa = (struct sockaddr *)(rtm + 1);
297 (void) printf("%-20.20s ", rtm->rtm_flags & RTF_HOST ?
298 routename(sa) : netname(sa));
299 sa = (struct sockaddr *)(sa->sa_len + (char *)sa);
300 (void) printf("%-20.20s ", routename(sa));
301 (void) printf("done\n");
302 }
303 }
304 }
305
306 char *
307 routename(sa)
308 struct sockaddr *sa;
309 {
310 register char *cp;
311 static char line[50];
312 struct hostent *hp;
313 static char domain[MAXHOSTNAMELEN + 1];
314 static int first = 1;
315 char *ns_print();
316
317 if (first) {
318 first = 0;
319 if (gethostname(domain, MAXHOSTNAMELEN) == 0 &&
320 (cp = strchr(domain, '.')))
321 (void) strcpy(domain, cp + 1);
322 else
323 domain[0] = 0;
324 }
325
326 if (sa->sa_len == 0)
327 strcpy(line, "default");
328 else switch (sa->sa_family) {
329
330 case AF_INET:
331 { struct in_addr in;
332 in = ((struct sockaddr_in *)sa)->sin_addr;
333
334 cp = 0;
335 if (in.s_addr == INADDR_ANY || sa->sa_len < 4)
336 cp = "default";
337 if (cp == 0 && !nflag) {
338 hp = gethostbyaddr((char *)&in, sizeof (struct in_addr),
339 AF_INET);
340 if (hp) {
341 if ((cp = strchr(hp->h_name, '.')) &&
342 !strcmp(cp + 1, domain))
343 *cp = 0;
344 cp = hp->h_name;
345 }
346 }
347 if (cp)
348 strcpy(line, cp);
349 else {
350 #define C(x) ((x) & 0xff)
351 in.s_addr = ntohl(in.s_addr);
352 (void) sprintf(line, "%u.%u.%u.%u", C(in.s_addr >> 24),
353 C(in.s_addr >> 16), C(in.s_addr >> 8), C(in.s_addr));
354 }
355 break;
356 }
357
358 case AF_NS:
359 return (ns_print((struct sockaddr_ns *)sa));
360
361 case AF_LINK:
362 return (link_ntoa((struct sockaddr_dl *)sa));
363
364 case AF_ISO:
365 (void) sprintf(line, "iso %s",
366 iso_ntoa(&((struct sockaddr_iso *)sa)->siso_addr));
367 break;
368
369 default:
370 { u_short *s = (u_short *)sa;
371 u_short *slim = s + ((sa->sa_len + 1) >> 1);
372 char *cp = line + sprintf(line, "(%d)", sa->sa_family);
373
374 while (++s < slim) /* start with sa->sa_data */
375 cp += sprintf(cp, " %x", *s);
376 break;
377 }
378 }
379 return (line);
380 }
381
382 /*
383 * Return the name of the network whose address is given.
384 * The address is assumed to be that of a net or subnet, not a host.
385 */
386 char *
387 netname(sa)
388 struct sockaddr *sa;
389 {
390 char *cp = 0;
391 static char line[50];
392 struct netent *np = 0;
393 u_long net, mask;
394 register u_long i;
395 int subnetshift;
396 char *ns_print();
397
398 switch (sa->sa_family) {
399
400 case AF_INET:
401 { struct in_addr in;
402 in = ((struct sockaddr_in *)sa)->sin_addr;
403
404 i = in.s_addr = ntohl(in.s_addr);
405 if (in.s_addr == 0)
406 cp = "default";
407 else if (!nflag) {
408 if (IN_CLASSA(i)) {
409 mask = IN_CLASSA_NET;
410 subnetshift = 8;
411 } else if (IN_CLASSB(i)) {
412 mask = IN_CLASSB_NET;
413 subnetshift = 8;
414 } else {
415 mask = IN_CLASSC_NET;
416 subnetshift = 4;
417 }
418 /*
419 * If there are more bits than the standard mask
420 * would suggest, subnets must be in use.
421 * Guess at the subnet mask, assuming reasonable
422 * width subnet fields.
423 */
424 while (in.s_addr &~ mask)
425 mask = (long)mask >> subnetshift;
426 net = in.s_addr & mask;
427 while ((mask & 1) == 0)
428 mask >>= 1, net >>= 1;
429 np = getnetbyaddr(net, AF_INET);
430 if (np)
431 cp = np->n_name;
432 }
433 if (cp)
434 strcpy(line, cp);
435 else if ((in.s_addr & 0xffffff) == 0)
436 (void) sprintf(line, "%u", C(in.s_addr >> 24));
437 else if ((in.s_addr & 0xffff) == 0)
438 (void) sprintf(line, "%u.%u", C(in.s_addr >> 24),
439 C(in.s_addr >> 16));
440 else if ((in.s_addr & 0xff) == 0)
441 (void) sprintf(line, "%u.%u.%u", C(in.s_addr >> 24),
442 C(in.s_addr >> 16), C(in.s_addr >> 8));
443 else
444 (void) sprintf(line, "%u.%u.%u.%u", C(in.s_addr >> 24),
445 C(in.s_addr >> 16), C(in.s_addr >> 8),
446 C(in.s_addr));
447 break;
448 }
449
450 case AF_NS:
451 return (ns_print((struct sockaddr_ns *)sa));
452
453 case AF_LINK:
454 return (link_ntoa((struct sockaddr_dl *)sa));
455
456 case AF_ISO:
457 (void) sprintf(line, "iso %s",
458 iso_ntoa(&((struct sockaddr_iso *)sa)->siso_addr));
459 break;
460
461 default:
462 { u_short *s = (u_short *)sa->sa_data;
463 u_short *slim = s + ((sa->sa_len + 1)>>1);
464 char *cp = line + sprintf(line, "af %d:", sa->sa_family);
465
466 while (s < slim)
467 cp += sprintf(cp, " %x", *s++);
468 break;
469 }
470 }
471 return (line);
472 }
473
474 void
475 set_metric(value, key)
476 char *value;
477 int key;
478 {
479 int flag = 0;
480 u_long noval, *valp = &noval;
481
482 switch (key) {
483 #define caseof(x, y, z) case x: valp = &rt_metrics.z; flag = y; break
484 caseof(K_MTU, RTV_MTU, rmx_mtu);
485 caseof(K_HOPCOUNT, RTV_HOPCOUNT, rmx_hopcount);
486 caseof(K_EXPIRE, RTV_EXPIRE, rmx_expire);
487 caseof(K_RECVPIPE, RTV_RPIPE, rmx_recvpipe);
488 caseof(K_SENDPIPE, RTV_SPIPE, rmx_sendpipe);
489 caseof(K_SSTHRESH, RTV_SSTHRESH, rmx_ssthresh);
490 caseof(K_RTT, RTV_RTT, rmx_rtt);
491 caseof(K_RTTVAR, RTV_RTTVAR, rmx_rttvar);
492 }
493 rtm_inits |= flag;
494 if (lockrest || locking)
495 rt_metrics.rmx_locks |= flag;
496 if (locking)
497 locking = 0;
498 *valp = atoi(value);
499 }
500
501 void
502 newroute(argc, argv)
503 int argc;
504 register char **argv;
505 {
506 char *cmd, *dest = "", *gateway = "", *err;
507 int ishost = 0, ret, attempts, oerrno, flags = RTF_STATIC;
508 int key;
509 struct hostent *hp = 0;
510
511 if (uid) {
512 errno = EACCES;
513 quit("must be root to alter routing table");
514 }
515 cmd = argv[0];
516 if (*cmd != 'g')
517 shutdown(s, 0); /* Don't want to read back our messages */
518 while (--argc > 0) {
519 if (**(++argv)== '-') {
520 switch (key = keyword(1 + *argv)) {
521 case K_LINK:
522 af = AF_LINK;
523 aflen = sizeof(struct sockaddr_dl);
524 break;
525 case K_OSI:
526 case K_ISO:
527 af = AF_ISO;
528 aflen = sizeof(struct sockaddr_iso);
529 break;
530 case K_INET:
531 af = AF_INET;
532 aflen = sizeof(struct sockaddr_in);
533 break;
534 case K_X25:
535 af = AF_CCITT;
536 aflen = sizeof(struct sockaddr_x25);
537 break;
538 case K_SA:
539 af = PF_ROUTE;
540 aflen = sizeof(union sockunion);
541 break;
542 case K_XNS:
543 af = AF_NS;
544 aflen = sizeof(struct sockaddr_ns);
545 break;
546 case K_IFACE:
547 case K_INTERFACE:
548 iflag++;
549 break;
550 case K_NOSTATIC:
551 flags &= ~RTF_STATIC;
552 break;
553 case K_LLINFO:
554 flags |= RTF_LLINFO;
555 break;
556 case K_LOCK:
557 locking = 1;
558 break;
559 case K_LOCKREST:
560 lockrest = 1;
561 break;
562 case K_HOST:
563 forcehost++;
564 break;
565 case K_REJECT:
566 flags |= RTF_REJECT;
567 break;
568 case K_BLACKHOLE:
569 flags |= RTF_BLACKHOLE;
570 break;
571 case K_PROTO1:
572 flags |= RTF_PROTO1;
573 break;
574 case K_PROTO2:
575 flags |= RTF_PROTO2;
576 break;
577 case K_CLONING:
578 flags |= RTF_CLONING;
579 break;
580 case K_XRESOLVE:
581 flags |= RTF_XRESOLVE;
582 break;
583 case K_STATIC:
584 flags |= RTF_STATIC;
585 break;
586 case K_IFA:
587 argc--;
588 (void) getaddr(RTA_IFA, *++argv, 0);
589 break;
590 case K_IFP:
591 argc--;
592 (void) getaddr(RTA_IFP, *++argv, 0);
593 break;
594 case K_GENMASK:
595 argc--;
596 (void) getaddr(RTA_GENMASK, *++argv, 0);
597 break;
598 case K_GATEWAY:
599 argc--;
600 (void) getaddr(RTA_GATEWAY, *++argv, 0);
601 break;
602 case K_DST:
603 argc--;
604 ishost = getaddr(RTA_DST, *++argv, &hp);
605 dest = *argv;
606 break;
607 case K_NETMASK:
608 argc--;
609 (void) getaddr(RTA_NETMASK, *++argv, 0);
610 /* FALLTHROUGH */
611 case K_NET:
612 forcenet++;
613 break;
614 case K_MTU:
615 case K_HOPCOUNT:
616 case K_EXPIRE:
617 case K_RECVPIPE:
618 case K_SENDPIPE:
619 case K_SSTHRESH:
620 case K_RTT:
621 case K_RTTVAR:
622 argc--;
623 set_metric(*++argv, key);
624 break;
625 default:
626 usage(1+*argv);
627 }
628 } else {
629 if ((rtm_addrs & RTA_DST) == 0) {
630 dest = *argv;
631 ishost = getaddr(RTA_DST, *argv, &hp);
632 } else if ((rtm_addrs & RTA_GATEWAY) == 0) {
633 gateway = *argv;
634 (void) getaddr(RTA_GATEWAY, *argv, &hp);
635 } else {
636 int ret = atoi(*argv);
637
638 if (ret == 0) {
639 if (strcmp(*argv, "0") == 0)
640 printf("%s,%s",
641 "old usage of trailing 0",
642 "assuming route to if\n");
643 else
644 usage((char *)NULL);
645 iflag = 1;
646 continue;
647 } else if (ret > 0 && ret < 10) {
648 printf("old usage of trailing digit, ");
649 printf("assuming route via gateway\n");
650 iflag = 0;
651 continue;
652 }
653 (void) getaddr(RTA_NETMASK, *argv, 0);
654 }
655 }
656 }
657 if (forcehost)
658 ishost = 1;
659 if (forcenet)
660 ishost = 0;
661 flags |= RTF_UP;
662 if (ishost)
663 flags |= RTF_HOST;
664 if (iflag == 0)
665 flags |= RTF_GATEWAY;
666 for (attempts = 1; ; attempts++) {
667 errno = 0;
668 if ((ret = rtmsg(*cmd, flags)) == 0)
669 break;
670 if (errno != ENETUNREACH && errno != ESRCH)
671 break;
672 if (af == AF_INET && *gateway && hp && hp->h_addr_list[1]) {
673 hp->h_addr_list++;
674 memcpy(&so_gate.sin.sin_addr, hp->h_addr_list[0],
675 hp->h_length);
676 } else
677 break;
678 }
679 if (*cmd == 'g')
680 exit(0);
681 oerrno = errno;
682 (void) printf("%s %s %s", cmd, ishost? "host" : "net", dest);
683 if (*gateway) {
684 (void) printf(": gateway %s", gateway);
685 if (attempts > 1 && ret == 0 && af == AF_INET)
686 (void) printf(" (%s)",
687 inet_ntoa(((struct sockaddr_in *)&route.rt_gateway)->sin_addr));
688 }
689 if (ret == 0)
690 (void) printf("\n");
691 else {
692 switch (oerrno) {
693 case ESRCH:
694 err = "not in table";
695 break;
696 case EBUSY:
697 err = "entry in use";
698 break;
699 case ENOBUFS:
700 err = "routing table overflow";
701 break;
702 default:
703 err = strerror(oerrno);
704 break;
705 }
706 (void) printf(": %s\n", err);
707 }
708 }
709
710 void
711 inet_makenetandmask(net, sin)
712 u_long net;
713 register struct sockaddr_in *sin;
714 {
715 u_long addr, mask = 0;
716 register char *cp;
717
718 rtm_addrs |= RTA_NETMASK;
719 if (net == 0)
720 mask = addr = 0;
721 else if (net < 128) {
722 addr = net << IN_CLASSA_NSHIFT;
723 mask = IN_CLASSA_NET;
724 } else if (net < 65536) {
725 addr = net << IN_CLASSB_NSHIFT;
726 mask = IN_CLASSB_NET;
727 } else if (net < 16777216L) {
728 addr = net << IN_CLASSC_NSHIFT;
729 mask = IN_CLASSC_NET;
730 } else {
731 addr = net;
732 if ((addr & IN_CLASSA_HOST) == 0)
733 mask = IN_CLASSA_NET;
734 else if ((addr & IN_CLASSB_HOST) == 0)
735 mask = IN_CLASSB_NET;
736 else if ((addr & IN_CLASSC_HOST) == 0)
737 mask = IN_CLASSC_NET;
738 else
739 mask = -1;
740 }
741 sin->sin_addr.s_addr = htonl(addr);
742 sin = &so_mask.sin;
743 sin->sin_addr.s_addr = htonl(mask);
744 sin->sin_len = 0;
745 sin->sin_family = 0;
746 cp = (char *)(&sin->sin_addr + 1);
747 while (*--cp == 0 && cp > (char *)sin)
748 ;
749 sin->sin_len = 1 + cp - (char *)sin;
750 }
751
752 /*
753 * Interpret an argument as a network address of some kind,
754 * returning 1 if a host address, 0 if a network address.
755 */
756 int
757 getaddr(which, s, hpp)
758 int which;
759 char *s;
760 struct hostent **hpp;
761 {
762 register sup su;
763 struct ns_addr ns_addr();
764 struct iso_addr *iso_addr();
765 struct hostent *hp;
766 struct netent *np;
767 u_long val;
768
769 if (af == 0) {
770 af = AF_INET;
771 aflen = sizeof(struct sockaddr_in);
772 }
773 rtm_addrs |= which;
774 switch (which) {
775 case RTA_DST:
776 su = &so_dst;
777 su->sa.sa_family = af;
778 break;
779 case RTA_GATEWAY:
780 su = &so_gate;
781 su->sa.sa_family = af;
782 break;
783 case RTA_NETMASK:
784 su = &so_mask;
785 break;
786 case RTA_GENMASK:
787 su = &so_genmask;
788 break;
789 case RTA_IFP:
790 su = &so_ifp;
791 su->sa.sa_family = af;
792 break;
793 case RTA_IFA:
794 su = &so_ifa;
795 su->sa.sa_family = af;
796 break;
797 default:
798 usage("Internal Error");
799 /*NOTREACHED*/
800 }
801 su->sa.sa_len = aflen;
802 if (strcmp(s, "default") == 0) {
803 switch (which) {
804 case RTA_DST:
805 forcenet++;
806 (void) getaddr(RTA_NETMASK, s, 0);
807 break;
808 case RTA_NETMASK:
809 case RTA_GENMASK:
810 su->sa.sa_len = 0;
811 }
812 return (0);
813 }
814 switch (af) {
815 case AF_NS:
816 if (which == RTA_DST) {
817 extern short ns_bh[3];
818 struct sockaddr_ns *sms = &(so_mask.sns);
819 memset(sms, 0, sizeof(*sms));
820 sms->sns_family = 0;
821 sms->sns_len = 6;
822 sms->sns_addr.x_net = *(union ns_net *)ns_bh;
823 rtm_addrs |= RTA_NETMASK;
824 }
825 su->sns.sns_addr = ns_addr(s);
826 return (!ns_nullhost(su->sns.sns_addr));
827
828 case AF_OSI:
829 su->siso.siso_addr = *iso_addr(s);
830 if (which == RTA_NETMASK || which == RTA_GENMASK) {
831 register char *cp = (char *)TSEL(&su->siso);
832 su->siso.siso_nlen = 0;
833 do {--cp ;} while ((cp > (char *)su) && (*cp == 0));
834 su->siso.siso_len = 1 + cp - (char *)su;
835 }
836 return (1);
837
838 case AF_LINK:
839 link_addr(s, &su->sdl);
840 return (1);
841
842 case AF_CCITT:
843 ccitt_addr(s, &su->sx25);
844 return (which == RTA_DST ? x25_makemask() : 1);
845
846 case PF_ROUTE:
847 su->sa.sa_len = sizeof(*su);
848 sockaddr(s, &su->sa);
849 return (1);
850
851 case AF_INET:
852 default:
853 break;
854 }
855
856 if (hpp == NULL)
857 hpp = &hp;
858 *hpp = NULL;
859 if (((val = inet_addr(s)) != -1) &&
860 (which != RTA_DST || forcenet == 0)) {
861 su->sin.sin_addr.s_addr = val;
862 if (inet_lnaof(su->sin.sin_addr) != INADDR_ANY)
863 return (1);
864 else {
865 val = ntohl(val);
866 goto netdone;
867 }
868 }
869 if ((val = inet_network(s)) != -1 ||
870 ((np = getnetbyname(s)) != NULL && (val = np->n_net) != 0)) {
871 netdone:
872 if (which == RTA_DST)
873 inet_makenetandmask(val, &su->sin);
874 return (0);
875 }
876 hp = gethostbyname(s);
877 if (hp) {
878 *hpp = hp;
879 su->sin.sin_family = hp->h_addrtype;
880 memcpy(&su->sin.sin_addr, hp->h_addr, hp->h_length);
881 return (1);
882 }
883 (void) fprintf(stderr, "%s: bad value\n", s);
884 exit(1);
885 }
886
887 int
888 x25_makemask()
889 {
890 register char *cp;
891
892 if ((rtm_addrs & RTA_NETMASK) == 0) {
893 rtm_addrs |= RTA_NETMASK;
894 for (cp = (char *)&so_mask.sx25.x25_net;
895 cp < &so_mask.sx25.x25_opts.op_flags; cp++)
896 *cp = -1;
897 so_mask.sx25.x25_len = (u_char)&(((sup)0)->sx25.x25_opts);
898 }
899 return 0;
900 }
901
902 short ns_nullh[] = {0,0,0};
903 short ns_bh[] = {-1,-1,-1};
904
905 char *
906 ns_print(sns)
907 struct sockaddr_ns *sns;
908 {
909 struct ns_addr work;
910 union { union ns_net net_e; u_long long_e; } net;
911 u_short port;
912 static char mybuf[50], cport[10], chost[25];
913 char *host = "";
914 register char *p;
915 register u_char *q;
916
917 work = sns->sns_addr;
918 port = ntohs(work.x_port);
919 work.x_port = 0;
920 net.net_e = work.x_net;
921 if (ns_nullhost(work) && net.long_e == 0) {
922 if (!port)
923 return ("*.*");
924 (void) sprintf(mybuf, "*.%XH", port);
925 return (mybuf);
926 }
927
928 if (memcmp(ns_bh, work.x_host.c_host, 6) == 0)
929 host = "any";
930 else if (memcmp(ns_nullh, work.x_host.c_host, 6) == 0)
931 host = "*";
932 else {
933 q = work.x_host.c_host;
934 (void) sprintf(chost, "%02X%02X%02X%02X%02X%02XH",
935 q[0], q[1], q[2], q[3], q[4], q[5]);
936 for (p = chost; *p == '0' && p < chost + 12; p++)
937 /* void */;
938 host = p;
939 }
940 if (port)
941 (void) sprintf(cport, ".%XH", htons(port));
942 else
943 *cport = 0;
944
945 (void) sprintf(mybuf,"%XH.%s%s", ntohl(net.long_e), host, cport);
946 return (mybuf);
947 }
948
949 void
950 interfaces()
951 {
952 size_t needed;
953 int mib[6];
954 char *buf, *lim, *next;
955 register struct rt_msghdr *rtm;
956
957 mib[0] = CTL_NET;
958 mib[1] = PF_ROUTE;
959 mib[2] = 0; /* protocol */
960 mib[3] = 0; /* wildcard address family */
961 mib[4] = NET_RT_IFLIST;
962 mib[5] = 0; /* no flags */
963 if (sysctl(mib, 6, NULL, &needed, NULL, 0) < 0)
964 quit("route-sysctl-estimate");
965 if ((buf = malloc(needed)) == NULL)
966 quit("malloc");
967 if (sysctl(mib, 6, buf, &needed, NULL, 0) < 0)
968 quit("actual retrieval of interface table");
969 lim = buf + needed;
970 for (next = buf; next < lim; next += rtm->rtm_msglen) {
971 rtm = (struct rt_msghdr *)next;
972 print_rtmsg(rtm, rtm->rtm_msglen);
973 }
974 }
975
976 void
977 monitor()
978 {
979 int n;
980 char msg[2048];
981
982 verbose = 1;
983 if (debugonly) {
984 interfaces();
985 exit(0);
986 }
987 for(;;) {
988 n = read(s, msg, 2048);
989 (void) printf("got message of size %d\n", n);
990 print_rtmsg((struct rt_msghdr *)msg, n);
991 }
992 }
993
994 struct {
995 struct rt_msghdr m_rtm;
996 char m_space[512];
997 } m_rtmsg;
998
999 int
1000 rtmsg(cmd, flags)
1001 int cmd, flags;
1002 {
1003 static int seq;
1004 int rlen;
1005 register char *cp = m_rtmsg.m_space;
1006 register int l;
1007
1008 #define NEXTADDR(w, u) \
1009 if (rtm_addrs & (w)) {\
1010 l = ROUNDUP(u.sa.sa_len); memcpy(cp, &(u), l); cp += l;\
1011 if (verbose) sodump(&(u),"u");\
1012 }
1013
1014 errno = 0;
1015 memset(&m_rtmsg, 0, sizeof(m_rtmsg));
1016 if (cmd == 'a')
1017 cmd = RTM_ADD;
1018 else if (cmd == 'c')
1019 cmd = RTM_CHANGE;
1020 else if (cmd == 'g') {
1021 cmd = RTM_GET;
1022 if (so_ifp.sa.sa_family == 0) {
1023 so_ifp.sa.sa_family = AF_LINK;
1024 so_ifp.sa.sa_len = sizeof(struct sockaddr_dl);
1025 rtm_addrs |= RTA_IFP;
1026 }
1027 } else
1028 cmd = RTM_DELETE;
1029 #define rtm m_rtmsg.m_rtm
1030 rtm.rtm_type = cmd;
1031 rtm.rtm_flags = flags;
1032 rtm.rtm_version = RTM_VERSION;
1033 rtm.rtm_seq = ++seq;
1034 rtm.rtm_addrs = rtm_addrs;
1035 rtm.rtm_rmx = rt_metrics;
1036 rtm.rtm_inits = rtm_inits;
1037
1038 if (rtm_addrs & RTA_NETMASK)
1039 mask_addr();
1040 NEXTADDR(RTA_DST, so_dst);
1041 NEXTADDR(RTA_GATEWAY, so_gate);
1042 NEXTADDR(RTA_NETMASK, so_mask);
1043 NEXTADDR(RTA_GENMASK, so_genmask);
1044 NEXTADDR(RTA_IFP, so_ifp);
1045 NEXTADDR(RTA_IFA, so_ifa);
1046 rtm.rtm_msglen = l = cp - (char *)&m_rtmsg;
1047 if (verbose)
1048 print_rtmsg(&rtm, l);
1049 if (debugonly)
1050 return (0);
1051 if ((rlen = write(s, (char *)&m_rtmsg, l)) < 0) {
1052 perror("writing to routing socket");
1053 return (-1);
1054 }
1055 if (cmd == RTM_GET) {
1056 do {
1057 l = read(s, (char *)&m_rtmsg, sizeof(m_rtmsg));
1058 } while (l > 0 && (rtm.rtm_seq != seq || rtm.rtm_pid != pid));
1059 if (l < 0)
1060 (void) fprintf(stderr,
1061 "route: read from routing socket: %s\n",
1062 strerror(errno));
1063 else
1064 print_getmsg(&rtm, l);
1065 }
1066 #undef rtm
1067 return (0);
1068 }
1069
1070 void
1071 mask_addr()
1072 {
1073 int olen = so_mask.sa.sa_len;
1074 register char *cp1 = olen + (char *)&so_mask, *cp2;
1075
1076 for (so_mask.sa.sa_len = 0; cp1 > (char *)&so_mask; )
1077 if (*--cp1 != 0) {
1078 so_mask.sa.sa_len = 1 + cp1 - (char *)&so_mask;
1079 break;
1080 }
1081 if ((rtm_addrs & RTA_DST) == 0)
1082 return;
1083 switch (so_dst.sa.sa_family) {
1084 case AF_NS:
1085 case AF_INET:
1086 case AF_CCITT:
1087 case 0:
1088 return;
1089 case AF_ISO:
1090 olen = MIN(so_dst.siso.siso_nlen,
1091 MAX(so_mask.sa.sa_len - 6, 0));
1092 break;
1093 }
1094 cp1 = so_mask.sa.sa_len + 1 + (char *)&so_dst;
1095 cp2 = so_dst.sa.sa_len + 1 + (char *)&so_dst;
1096 while (cp2 > cp1)
1097 *--cp2 = 0;
1098 cp2 = so_mask.sa.sa_len + 1 + (char *)&so_mask;
1099 while (cp1 > so_dst.sa.sa_data)
1100 *--cp1 &= *--cp2;
1101 switch (so_dst.sa.sa_family) {
1102 case AF_ISO:
1103 so_dst.siso.siso_nlen = olen;
1104 break;
1105 }
1106 }
1107
1108 char *msgtypes[] = {
1109 "",
1110 "RTM_ADD: Add Route",
1111 "RTM_DELETE: Delete Route",
1112 "RTM_CHANGE: Change Metrics or flags",
1113 "RTM_GET: Report Metrics",
1114 "RTM_LOSING: Kernel Suspects Partitioning",
1115 "RTM_REDIRECT: Told to use different route",
1116 "RTM_MISS: Lookup failed on this address",
1117 "RTM_LOCK: fix specified metrics",
1118 "RTM_OLDADD: caused by SIOCADDRT",
1119 "RTM_OLDDEL: caused by SIOCDELRT",
1120 "RTM_RESOLVE: Route created by cloning",
1121 "RTM_NEWADDR: address being added to iface",
1122 "RTM_DELADDR: address being removed from iface",
1123 "RTM_IFINFO: iface status change",
1124 0,
1125 };
1126
1127 char metricnames[] =
1128 "\011pksent\010rttvar\7rtt\6ssthresh\5sendpipe\4recvpipe\3expire\2hopcount\1mtu";
1129 char routeflags[] =
1130 "\1UP\2GATEWAY\3HOST\4REJECT\5DYNAMIC\6MODIFIED\7DONE\010MASK_PRESENT\011CLONING\012XRESOLVE\013LLINFO\014STATIC\017PROTO2\020PROTO1";
1131 char ifnetflags[] =
1132 "\1UP\2BROADCAST\3DEBUG\4LOOPBACK\5PTP\6NOTRAILERS\7RUNNING\010NOARP\011PPROMISC\012ALLMULTI\013OACTIVE\014SIMPLEX\015LINK0\016LINK1\017LINK2\020MULTICAST";
1133 char addrnames[] =
1134 "\1DST\2GATEWAY\3NETMASK\4GENMASK\5IFP\6IFA\7AUTHOR\010BRD";
1135
1136 void
1137 print_rtmsg(rtm, msglen)
1138 register struct rt_msghdr *rtm;
1139 int msglen;
1140 {
1141 struct if_msghdr *ifm;
1142 struct ifa_msghdr *ifam;
1143
1144 if (verbose == 0)
1145 return;
1146 if (rtm->rtm_version != RTM_VERSION) {
1147 (void) printf("routing message version %d not understood\n",
1148 rtm->rtm_version);
1149 return;
1150 }
1151 (void)printf("%s: len %d, ", msgtypes[rtm->rtm_type], rtm->rtm_msglen);
1152 switch (rtm->rtm_type) {
1153 case RTM_IFINFO:
1154 ifm = (struct if_msghdr *)rtm;
1155 (void) printf("if# %d, flags:", ifm->ifm_index);
1156 bprintf(stdout, ifm->ifm_flags, ifnetflags);
1157 pmsg_addrs((char *)(ifm + 1), ifm->ifm_addrs);
1158 break;
1159 case RTM_NEWADDR:
1160 case RTM_DELADDR:
1161 ifam = (struct ifa_msghdr *)rtm;
1162 (void) printf("metric %d, flags:", ifam->ifam_metric);
1163 bprintf(stdout, ifam->ifam_flags, routeflags);
1164 pmsg_addrs((char *)(ifam + 1), ifam->ifam_addrs);
1165 break;
1166 default:
1167 (void) printf("pid: %d, seq %d, errno %d, flags:",
1168 rtm->rtm_pid, rtm->rtm_seq, rtm->rtm_errno);
1169 bprintf(stdout, rtm->rtm_flags, routeflags);
1170 pmsg_common(rtm);
1171 }
1172 }
1173
1174 void
1175 print_getmsg(rtm, msglen)
1176 register struct rt_msghdr *rtm;
1177 int msglen;
1178 {
1179 struct sockaddr *dst = NULL, *gate = NULL, *mask = NULL;
1180 struct sockaddr_dl *ifp = NULL;
1181 register struct sockaddr *sa;
1182 register char *cp;
1183 register int i;
1184
1185 (void) printf(" route to: %s\n", routename(&so_dst));
1186 if (rtm->rtm_version != RTM_VERSION) {
1187 (void)fprintf(stderr,
1188 "routing message version %d not understood\n",
1189 rtm->rtm_version);
1190 return;
1191 }
1192 if (rtm->rtm_msglen > msglen) {
1193 (void)fprintf(stderr,
1194 "message length mismatch, in packet %d, returned %d\n",
1195 rtm->rtm_msglen, msglen);
1196 }
1197 if (rtm->rtm_errno) {
1198 (void) fprintf(stderr, "RTM_GET: %s (errno %d)\n",
1199 strerror(rtm->rtm_errno), rtm->rtm_errno);
1200 return;
1201 }
1202 cp = ((char *)(rtm + 1));
1203 if (rtm->rtm_addrs)
1204 for (i = 1; i; i <<= 1)
1205 if (i & rtm->rtm_addrs) {
1206 sa = (struct sockaddr *)cp;
1207 switch (i) {
1208 case RTA_DST:
1209 dst = sa;
1210 break;
1211 case RTA_GATEWAY:
1212 gate = sa;
1213 break;
1214 case RTA_NETMASK:
1215 mask = sa;
1216 break;
1217 case RTA_IFP:
1218 if (sa->sa_family == AF_LINK &&
1219 ((struct sockaddr_dl *)sa)->sdl_nlen)
1220 ifp = (struct sockaddr_dl *)sa;
1221 break;
1222 }
1223 ADVANCE(cp, sa);
1224 }
1225 if (dst && mask)
1226 mask->sa_family = dst->sa_family; /* XXX */
1227 if (dst)
1228 (void)printf("destination: %s\n", routename(dst));
1229 if (mask) {
1230 int savenflag = nflag;
1231
1232 nflag = 1;
1233 (void)printf(" mask: %s\n", routename(mask));
1234 nflag = savenflag;
1235 }
1236 if (gate && rtm->rtm_flags & RTF_GATEWAY)
1237 (void)printf(" gateway: %s\n", routename(gate));
1238 if (ifp)
1239 (void)printf(" interface: %.*s\n",
1240 ifp->sdl_nlen, ifp->sdl_data);
1241 (void)printf(" flags: ");
1242 bprintf(stdout, rtm->rtm_flags, routeflags);
1243
1244 #define lock(f) ((rtm->rtm_rmx.rmx_locks & __CONCAT(RTV_,f)) ? 'L' : ' ')
1245 #define msec(u) (((u) + 500) / 1000) /* usec to msec */
1246
1247 (void) printf("\n%s\n", "\
1248 recvpipe sendpipe ssthresh rtt,msec rttvar hopcount mtu expire");
1249 printf("%8d%c ", rtm->rtm_rmx.rmx_recvpipe, lock(RPIPE));
1250 printf("%8d%c ", rtm->rtm_rmx.rmx_sendpipe, lock(SPIPE));
1251 printf("%8d%c ", rtm->rtm_rmx.rmx_ssthresh, lock(SSTHRESH));
1252 printf("%8d%c ", msec(rtm->rtm_rmx.rmx_rtt), lock(RTT));
1253 printf("%8d%c ", msec(rtm->rtm_rmx.rmx_rttvar), lock(RTTVAR));
1254 printf("%8d%c ", rtm->rtm_rmx.rmx_hopcount, lock(HOPCOUNT));
1255 printf("%8d%c ", rtm->rtm_rmx.rmx_mtu, lock(MTU));
1256 if (rtm->rtm_rmx.rmx_expire)
1257 rtm->rtm_rmx.rmx_expire -= time(0);
1258 printf("%8d%c\n", rtm->rtm_rmx.rmx_expire, lock(EXPIRE));
1259 #undef lock
1260 #undef msec
1261 #define RTA_IGN (RTA_DST|RTA_GATEWAY|RTA_NETMASK|RTA_IFP|RTA_IFA|RTA_BRD)
1262 if (verbose)
1263 pmsg_common(rtm);
1264 else if (rtm->rtm_addrs &~ RTA_IGN) {
1265 (void) printf("sockaddrs: ");
1266 bprintf(stdout, rtm->rtm_addrs, addrnames);
1267 putchar('\n');
1268 }
1269 #undef RTA_IGN
1270 }
1271
1272 void
1273 pmsg_common(rtm)
1274 register struct rt_msghdr *rtm;
1275 {
1276 (void) printf("\nlocks: ");
1277 bprintf(stdout, rtm->rtm_rmx.rmx_locks, metricnames);
1278 (void) printf(" inits: ");
1279 bprintf(stdout, rtm->rtm_inits, metricnames);
1280 pmsg_addrs(((char *)(rtm + 1)), rtm->rtm_addrs);
1281 }
1282
1283 void
1284 pmsg_addrs(cp, addrs)
1285 char *cp;
1286 int addrs;
1287 {
1288 register struct sockaddr *sa;
1289 int i;
1290
1291 if (addrs == 0)
1292 return;
1293 (void) printf("\nsockaddrs: ");
1294 bprintf(stdout, addrs, addrnames);
1295 (void) putchar('\n');
1296 for (i = 1; i; i <<= 1)
1297 if (i & addrs) {
1298 sa = (struct sockaddr *)cp;
1299 (void) printf(" %s", routename(sa));
1300 ADVANCE(cp, sa);
1301 }
1302 (void) putchar('\n');
1303 (void) fflush(stdout);
1304 }
1305
1306 void
1307 bprintf(fp, b, s)
1308 register FILE *fp;
1309 register int b;
1310 register u_char *s;
1311 {
1312 register int i;
1313 int gotsome = 0;
1314
1315 if (b == 0)
1316 return;
1317 while (i = *s++) {
1318 if (b & (1 << (i-1))) {
1319 if (gotsome == 0)
1320 i = '<';
1321 else
1322 i = ',';
1323 (void) putc(i, fp);
1324 gotsome = 1;
1325 for (; (i = *s) > 32; s++)
1326 (void) putc(i, fp);
1327 } else
1328 while (*s > 32)
1329 s++;
1330 }
1331 if (gotsome)
1332 (void) putc('>', fp);
1333 }
1334
1335 int
1336 keyword(cp)
1337 char *cp;
1338 {
1339 register struct keytab *kt = keywords;
1340
1341 while (kt->kt_cp && strcmp(kt->kt_cp, cp))
1342 kt++;
1343 return kt->kt_i;
1344 }
1345
1346 void
1347 sodump(su, which)
1348 register sup su;
1349 char *which;
1350 {
1351 switch (su->sa.sa_family) {
1352 case AF_LINK:
1353 (void) printf("%s: link %s; ",
1354 which, link_ntoa(&su->sdl));
1355 break;
1356 case AF_ISO:
1357 (void) printf("%s: iso %s; ",
1358 which, iso_ntoa(&su->siso.siso_addr));
1359 break;
1360 case AF_INET:
1361 (void) printf("%s: inet %s; ",
1362 which, inet_ntoa(su->sin.sin_addr));
1363 break;
1364 case AF_NS:
1365 (void) printf("%s: xns %s; ",
1366 which, ns_ntoa(su->sns.sns_addr));
1367 break;
1368 }
1369 (void) fflush(stdout);
1370 }
1371
1372 /* States*/
1373 #define VIRGIN 0
1374 #define GOTONE 1
1375 #define GOTTWO 2
1376 /* Inputs */
1377 #define DIGIT (4*0)
1378 #define END (4*1)
1379 #define DELIM (4*2)
1380
1381 void
1382 sockaddr(addr, sa)
1383 register char *addr;
1384 register struct sockaddr *sa;
1385 {
1386 register char *cp = (char *)sa;
1387 int size = sa->sa_len;
1388 char *cplim = cp + size;
1389 register int byte = 0, state = VIRGIN, new;
1390
1391 memset(cp, 0, size);
1392 cp++;
1393 do {
1394 if ((*addr >= '0') && (*addr <= '9')) {
1395 new = *addr - '0';
1396 } else if ((*addr >= 'a') && (*addr <= 'f')) {
1397 new = *addr - 'a' + 10;
1398 } else if ((*addr >= 'A') && (*addr <= 'F')) {
1399 new = *addr - 'A' + 10;
1400 } else if (*addr == 0)
1401 state |= END;
1402 else
1403 state |= DELIM;
1404 addr++;
1405 switch (state /* | INPUT */) {
1406 case GOTTWO | DIGIT:
1407 *cp++ = byte; /*FALLTHROUGH*/
1408 case VIRGIN | DIGIT:
1409 state = GOTONE; byte = new; continue;
1410 case GOTONE | DIGIT:
1411 state = GOTTWO; byte = new + (byte << 4); continue;
1412 default: /* | DELIM */
1413 state = VIRGIN; *cp++ = byte; byte = 0; continue;
1414 case GOTONE | END:
1415 case GOTTWO | END:
1416 *cp++ = byte; /* FALLTHROUGH */
1417 case VIRGIN | END:
1418 break;
1419 }
1420 break;
1421 } while (cp < cplim);
1422 sa->sa_len = cp - (char *)sa;
1423 }
1424