route.c revision 1.16 1 /* $NetBSD: route.c,v 1.16 1996/04/15 18:27:05 cgd Exp $ */
2
3 /*
4 * Copyright (c) 1983, 1989, 1991, 1993
5 * The Regents of the University of California. All rights reserved.
6 *
7 * Redistribution and use in source and binary forms, with or without
8 * modification, are permitted provided that the following conditions
9 * are met:
10 * 1. Redistributions of source code must retain the above copyright
11 * notice, this list of conditions and the following disclaimer.
12 * 2. Redistributions in binary form must reproduce the above copyright
13 * notice, this list of conditions and the following disclaimer in the
14 * documentation and/or other materials provided with the distribution.
15 * 3. All advertising materials mentioning features or use of this software
16 * must display the following acknowledgement:
17 * This product includes software developed by the University of
18 * California, Berkeley and its contributors.
19 * 4. Neither the name of the University nor the names of its contributors
20 * may be used to endorse or promote products derived from this software
21 * without specific prior written permission.
22 *
23 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
24 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
25 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
26 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
27 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
28 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
29 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
30 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
31 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
32 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
33 * SUCH DAMAGE.
34 */
35
36 #ifndef lint
37 static char copyright[] =
38 "@(#) Copyright (c) 1983, 1989, 1991, 1993\n\
39 The Regents of the University of California. All rights reserved.\n";
40 #endif /* not lint */
41
42 #ifndef lint
43 #if 0
44 static char sccsid[] = "@(#)route.c 8.3 (Berkeley) 3/19/94";
45 #else
46 static char rcsid[] = "$NetBSD: route.c,v 1.16 1996/04/15 18:27:05 cgd Exp $";
47 #endif
48 #endif /* not lint */
49
50 #include <sys/param.h>
51 #include <sys/file.h>
52 #include <sys/socket.h>
53 #include <sys/ioctl.h>
54 #include <sys/mbuf.h>
55 #include <sys/sysctl.h>
56
57 #include <net/if.h>
58 #include <net/route.h>
59 #include <net/if_dl.h>
60 #include <netinet/in.h>
61 #include <netns/ns.h>
62 #include <netiso/iso.h>
63 #include <netccitt/x25.h>
64 #include <arpa/inet.h>
65 #include <netdb.h>
66
67 #include <errno.h>
68 #include <unistd.h>
69 #include <stdio.h>
70 #include <ctype.h>
71 #include <stdlib.h>
72 #include <string.h>
73 #include <paths.h>
74
75 struct keytab {
76 char *kt_cp;
77 int kt_i;
78 } keywords[] = {
79 #include "keywords.h"
80 {0, 0}
81 };
82
83 struct ortentry route;
84 union sockunion {
85 struct sockaddr sa;
86 struct sockaddr_in sin;
87 struct sockaddr_ns sns;
88 struct sockaddr_iso siso;
89 struct sockaddr_dl sdl;
90 struct sockaddr_x25 sx25;
91 } so_dst, so_gate, so_mask, so_genmask, so_ifa, so_ifp;
92
93 typedef union sockunion *sup;
94 int pid, rtm_addrs, uid;
95 int s;
96 int forcehost, forcenet, doflush, nflag, af, qflag, tflag, keyword();
97 int iflag, verbose, aflen = sizeof (struct sockaddr_in);
98 int locking, lockrest, debugonly;
99 struct rt_metrics rt_metrics;
100 u_long rtm_inits;
101 struct in_addr inet_makeaddr();
102 char *routename(), *netname();
103 void flushroutes(), newroute(), monitor(), sockaddr(), sodump(), bprintf();
104 void print_getmsg(), print_rtmsg(), pmsg_common(), pmsg_addrs(), mask_addr();
105 int getaddr(), rtmsg(), x25_makemask();
106 extern char *inet_ntoa(), *iso_ntoa(), *link_ntoa();
107
108 __dead void
109 usage(cp)
110 char *cp;
111 {
112 if (cp)
113 (void) fprintf(stderr, "route: botched keyword: %s\n", cp);
114 (void) fprintf(stderr,
115 "usage: route [ -nqv ] cmd [[ -<qualifers> ] args ]\n");
116 exit(1);
117 /* NOTREACHED */
118 }
119
120 void
121 quit(s)
122 char *s;
123 {
124 int sverrno = errno;
125
126 (void) fprintf(stderr, "route: ");
127 if (s)
128 (void) fprintf(stderr, "%s: ", s);
129 (void) fprintf(stderr, "%s\n", strerror(sverrno));
130 exit(1);
131 /* NOTREACHED */
132 }
133
134 #define ROUNDUP(a) \
135 ((a) > 0 ? (1 + (((a) - 1) | (sizeof(long) - 1))) : sizeof(long))
136 #define ADVANCE(x, n) (x += ROUNDUP((n)->sa_len))
137
138 int
139 main(argc, argv)
140 int argc;
141 char **argv;
142 {
143 extern int optind;
144 int ch;
145
146 if (argc < 2)
147 usage((char *)NULL);
148
149 while ((ch = getopt(argc, argv, "nqdtv")) != EOF)
150 switch(ch) {
151 case 'n':
152 nflag = 1;
153 break;
154 case 'q':
155 qflag = 1;
156 break;
157 case 'v':
158 verbose = 1;
159 break;
160 case 't':
161 tflag = 1;
162 break;
163 case 'd':
164 debugonly = 1;
165 break;
166 case '?':
167 default:
168 usage((char *)NULL);
169 }
170 argc -= optind;
171 argv += optind;
172
173 pid = getpid();
174 uid = getuid();
175 if (tflag)
176 s = open("/dev/null", O_WRONLY, 0);
177 else
178 s = socket(PF_ROUTE, SOCK_RAW, 0);
179 if (s < 0)
180 quit("socket");
181 if (*argv)
182 switch (keyword(*argv)) {
183 case K_GET:
184 uid = 0;
185 /* FALLTHROUGH */
186
187 case K_CHANGE:
188 case K_ADD:
189 case K_DELETE:
190 newroute(argc, argv);
191 exit(0);
192 /* NOTREACHED */
193
194 case K_MONITOR:
195 monitor();
196 /* NOTREACHED */
197
198 case K_FLUSH:
199 flushroutes(argc, argv);
200 exit(0);
201 /* NOTREACHED */
202 }
203 usage(*argv);
204 /* NOTREACHED */
205 }
206
207 /*
208 * Purge all entries in the routing tables not
209 * associated with network interfaces.
210 */
211 void
212 flushroutes(argc, argv)
213 int argc;
214 char *argv[];
215 {
216 size_t needed;
217 int mib[6], rlen, seqno;
218 char *buf, *next, *lim;
219 register struct rt_msghdr *rtm;
220
221 if (uid) {
222 errno = EACCES;
223 quit("must be root to alter routing table");
224 }
225 shutdown(s, 0); /* Don't want to read back our messages */
226 if (argc > 1) {
227 argv++;
228 if (argc == 2 && **argv == '-')
229 switch (keyword(*argv + 1)) {
230 case K_INET:
231 af = AF_INET;
232 break;
233 case K_XNS:
234 af = AF_NS;
235 break;
236 case K_LINK:
237 af = AF_LINK;
238 break;
239 case K_ISO:
240 case K_OSI:
241 af = AF_ISO;
242 break;
243 case K_X25:
244 af = AF_CCITT;
245 default:
246 goto bad;
247 } else
248 bad: usage(*argv);
249 }
250 mib[0] = CTL_NET;
251 mib[1] = PF_ROUTE;
252 mib[2] = 0; /* protocol */
253 mib[3] = 0; /* wildcard address family */
254 mib[4] = NET_RT_DUMP;
255 mib[5] = 0; /* no flags */
256 if (sysctl(mib, 6, NULL, &needed, NULL, 0) < 0)
257 quit("route-sysctl-estimate");
258 if ((buf = malloc(needed)) == NULL)
259 quit("malloc");
260 if (sysctl(mib, 6, buf, &needed, NULL, 0) < 0)
261 quit("actual retrieval of routing table");
262 lim = buf + needed;
263 if (verbose)
264 (void) printf("Examining routing table from sysctl\n");
265 seqno = 0; /* ??? */
266 for (next = buf; next < lim; next += rtm->rtm_msglen) {
267 rtm = (struct rt_msghdr *)next;
268 if (verbose)
269 print_rtmsg(rtm, rtm->rtm_msglen);
270 if ((rtm->rtm_flags & RTF_GATEWAY) == 0)
271 continue;
272 if (af) {
273 struct sockaddr *sa = (struct sockaddr *)(rtm + 1);
274
275 if (sa->sa_family != af)
276 continue;
277 }
278 if (debugonly)
279 continue;
280 rtm->rtm_type = RTM_DELETE;
281 rtm->rtm_seq = seqno;
282 rlen = write(s, next, rtm->rtm_msglen);
283 if (rlen < (int)rtm->rtm_msglen) {
284 (void) fprintf(stderr,
285 "route: write to routing socket: %s\n",
286 strerror(errno));
287 (void) printf("got only %d for rlen\n", rlen);
288 break;
289 }
290 seqno++;
291 if (qflag)
292 continue;
293 if (verbose)
294 print_rtmsg(rtm, rlen);
295 else {
296 struct sockaddr *sa = (struct sockaddr *)(rtm + 1);
297 (void) printf("%-20.20s ", rtm->rtm_flags & RTF_HOST ?
298 routename(sa) : netname(sa));
299 sa = (struct sockaddr *)(sa->sa_len + (char *)sa);
300 (void) printf("%-20.20s ", routename(sa));
301 (void) printf("done\n");
302 }
303 }
304 }
305
306 char *
307 routename(sa)
308 struct sockaddr *sa;
309 {
310 register char *cp;
311 static char line[50];
312 struct hostent *hp;
313 static char domain[MAXHOSTNAMELEN + 1];
314 static int first = 1;
315 char *ns_print();
316
317 if (first) {
318 first = 0;
319 if (gethostname(domain, MAXHOSTNAMELEN) == 0 &&
320 (cp = strchr(domain, '.')))
321 (void) strcpy(domain, cp + 1);
322 else
323 domain[0] = 0;
324 }
325
326 if (sa->sa_len == 0)
327 strcpy(line, "default");
328 else switch (sa->sa_family) {
329
330 case AF_INET:
331 { struct in_addr in;
332 in = ((struct sockaddr_in *)sa)->sin_addr;
333
334 cp = 0;
335 if (in.s_addr == INADDR_ANY || sa->sa_len < 4)
336 cp = "default";
337 if (cp == 0 && !nflag) {
338 hp = gethostbyaddr((char *)&in, sizeof (struct in_addr),
339 AF_INET);
340 if (hp) {
341 if ((cp = strchr(hp->h_name, '.')) &&
342 !strcmp(cp + 1, domain))
343 *cp = 0;
344 cp = hp->h_name;
345 }
346 }
347 if (cp)
348 strcpy(line, cp);
349 else {
350 #define C(x) ((x) & 0xff)
351 in.s_addr = ntohl(in.s_addr);
352 (void) sprintf(line, "%u.%u.%u.%u", C(in.s_addr >> 24),
353 C(in.s_addr >> 16), C(in.s_addr >> 8), C(in.s_addr));
354 }
355 break;
356 }
357
358 case AF_NS:
359 return (ns_print((struct sockaddr_ns *)sa));
360
361 case AF_LINK:
362 return (link_ntoa((struct sockaddr_dl *)sa));
363
364 case AF_ISO:
365 (void) sprintf(line, "iso %s",
366 iso_ntoa(&((struct sockaddr_iso *)sa)->siso_addr));
367 break;
368
369 default:
370 { u_short *s = (u_short *)sa;
371 u_short *slim = s + ((sa->sa_len + 1) >> 1);
372 char *cp = line + sprintf(line, "(%d)", sa->sa_family);
373
374 while (++s < slim) /* start with sa->sa_data */
375 cp += sprintf(cp, " %x", *s);
376 break;
377 }
378 }
379 return (line);
380 }
381
382 /*
383 * Return the name of the network whose address is given.
384 * The address is assumed to be that of a net or subnet, not a host.
385 */
386 char *
387 netname(sa)
388 struct sockaddr *sa;
389 {
390 char *cp = 0;
391 static char line[50];
392 struct netent *np = 0;
393 u_long net, mask;
394 register u_long i;
395 int subnetshift;
396 char *ns_print();
397
398 switch (sa->sa_family) {
399
400 case AF_INET:
401 { struct in_addr in;
402 in = ((struct sockaddr_in *)sa)->sin_addr;
403
404 i = in.s_addr = ntohl(in.s_addr);
405 if (in.s_addr == 0)
406 cp = "default";
407 else if (!nflag) {
408 if (IN_CLASSA(i)) {
409 mask = IN_CLASSA_NET;
410 subnetshift = 8;
411 } else if (IN_CLASSB(i)) {
412 mask = IN_CLASSB_NET;
413 subnetshift = 8;
414 } else {
415 mask = IN_CLASSC_NET;
416 subnetshift = 4;
417 }
418 /*
419 * If there are more bits than the standard mask
420 * would suggest, subnets must be in use.
421 * Guess at the subnet mask, assuming reasonable
422 * width subnet fields.
423 */
424 while (in.s_addr &~ mask)
425 mask = (long)mask >> subnetshift;
426 net = in.s_addr & mask;
427 while ((mask & 1) == 0)
428 mask >>= 1, net >>= 1;
429 np = getnetbyaddr(net, AF_INET);
430 if (np)
431 cp = np->n_name;
432 }
433 if (cp)
434 strcpy(line, cp);
435 else if ((in.s_addr & 0xffffff) == 0)
436 (void) sprintf(line, "%u", C(in.s_addr >> 24));
437 else if ((in.s_addr & 0xffff) == 0)
438 (void) sprintf(line, "%u.%u", C(in.s_addr >> 24),
439 C(in.s_addr >> 16));
440 else if ((in.s_addr & 0xff) == 0)
441 (void) sprintf(line, "%u.%u.%u", C(in.s_addr >> 24),
442 C(in.s_addr >> 16), C(in.s_addr >> 8));
443 else
444 (void) sprintf(line, "%u.%u.%u.%u", C(in.s_addr >> 24),
445 C(in.s_addr >> 16), C(in.s_addr >> 8),
446 C(in.s_addr));
447 break;
448 }
449
450 case AF_NS:
451 return (ns_print((struct sockaddr_ns *)sa));
452
453 case AF_LINK:
454 return (link_ntoa((struct sockaddr_dl *)sa));
455
456 case AF_ISO:
457 (void) sprintf(line, "iso %s",
458 iso_ntoa(&((struct sockaddr_iso *)sa)->siso_addr));
459 break;
460
461 default:
462 { u_short *s = (u_short *)sa->sa_data;
463 u_short *slim = s + ((sa->sa_len + 1)>>1);
464 char *cp = line + sprintf(line, "af %d:", sa->sa_family);
465
466 while (s < slim)
467 cp += sprintf(cp, " %x", *s++);
468 break;
469 }
470 }
471 return (line);
472 }
473
474 void
475 set_metric(value, key)
476 char *value;
477 int key;
478 {
479 int flag = 0;
480 u_long noval, *valp = &noval;
481
482 switch (key) {
483 #define caseof(x, y, z) case x: valp = &rt_metrics.z; flag = y; break
484 caseof(K_MTU, RTV_MTU, rmx_mtu);
485 caseof(K_HOPCOUNT, RTV_HOPCOUNT, rmx_hopcount);
486 caseof(K_EXPIRE, RTV_EXPIRE, rmx_expire);
487 caseof(K_RECVPIPE, RTV_RPIPE, rmx_recvpipe);
488 caseof(K_SENDPIPE, RTV_SPIPE, rmx_sendpipe);
489 caseof(K_SSTHRESH, RTV_SSTHRESH, rmx_ssthresh);
490 caseof(K_RTT, RTV_RTT, rmx_rtt);
491 caseof(K_RTTVAR, RTV_RTTVAR, rmx_rttvar);
492 }
493 rtm_inits |= flag;
494 if (lockrest || locking)
495 rt_metrics.rmx_locks |= flag;
496 if (locking)
497 locking = 0;
498 *valp = atoi(value);
499 }
500
501 void
502 newroute(argc, argv)
503 int argc;
504 register char **argv;
505 {
506 char *cmd, *dest = "", *gateway = "", *err;
507 int ishost = 0, ret, attempts, oerrno, flags = RTF_STATIC;
508 int key;
509 struct hostent *hp = 0;
510
511 if (uid) {
512 errno = EACCES;
513 quit("must be root to alter routing table");
514 }
515 cmd = argv[0];
516 if (*cmd != 'g')
517 shutdown(s, 0); /* Don't want to read back our messages */
518 while (--argc > 0) {
519 if (**(++argv)== '-') {
520 switch (key = keyword(1 + *argv)) {
521 case K_LINK:
522 af = AF_LINK;
523 aflen = sizeof(struct sockaddr_dl);
524 break;
525 case K_OSI:
526 case K_ISO:
527 af = AF_ISO;
528 aflen = sizeof(struct sockaddr_iso);
529 break;
530 case K_INET:
531 af = AF_INET;
532 aflen = sizeof(struct sockaddr_in);
533 break;
534 case K_X25:
535 af = AF_CCITT;
536 aflen = sizeof(struct sockaddr_x25);
537 break;
538 case K_SA:
539 af = PF_ROUTE;
540 aflen = sizeof(union sockunion);
541 break;
542 case K_XNS:
543 af = AF_NS;
544 aflen = sizeof(struct sockaddr_ns);
545 break;
546 case K_IFACE:
547 case K_INTERFACE:
548 iflag++;
549 break;
550 case K_NOSTATIC:
551 flags &= ~RTF_STATIC;
552 break;
553 case K_LLINFO:
554 flags |= RTF_LLINFO;
555 break;
556 case K_LOCK:
557 locking = 1;
558 break;
559 case K_LOCKREST:
560 lockrest = 1;
561 break;
562 case K_HOST:
563 forcehost++;
564 break;
565 case K_REJECT:
566 flags |= RTF_REJECT;
567 break;
568 case K_BLACKHOLE:
569 flags |= RTF_BLACKHOLE;
570 break;
571 case K_PROTO1:
572 flags |= RTF_PROTO1;
573 break;
574 case K_PROTO2:
575 flags |= RTF_PROTO2;
576 break;
577 case K_CLONING:
578 flags |= RTF_CLONING;
579 break;
580 case K_XRESOLVE:
581 flags |= RTF_XRESOLVE;
582 break;
583 case K_STATIC:
584 flags |= RTF_STATIC;
585 break;
586 case K_IFA:
587 argc--;
588 (void) getaddr(RTA_IFA, *++argv, 0);
589 break;
590 case K_IFP:
591 argc--;
592 (void) getaddr(RTA_IFP, *++argv, 0);
593 break;
594 case K_GENMASK:
595 argc--;
596 (void) getaddr(RTA_GENMASK, *++argv, 0);
597 break;
598 case K_GATEWAY:
599 argc--;
600 (void) getaddr(RTA_GATEWAY, *++argv, 0);
601 break;
602 case K_DST:
603 argc--;
604 ishost = getaddr(RTA_DST, *++argv, &hp);
605 dest = *argv;
606 break;
607 case K_NETMASK:
608 argc--;
609 (void) getaddr(RTA_NETMASK, *++argv, 0);
610 /* FALLTHROUGH */
611 case K_NET:
612 forcenet++;
613 break;
614 case K_MTU:
615 case K_HOPCOUNT:
616 case K_EXPIRE:
617 case K_RECVPIPE:
618 case K_SENDPIPE:
619 case K_SSTHRESH:
620 case K_RTT:
621 case K_RTTVAR:
622 argc--;
623 set_metric(*++argv, key);
624 break;
625 default:
626 usage(1+*argv);
627 }
628 } else {
629 if ((rtm_addrs & RTA_DST) == 0) {
630 dest = *argv;
631 ishost = getaddr(RTA_DST, *argv, &hp);
632 } else if ((rtm_addrs & RTA_GATEWAY) == 0) {
633 gateway = *argv;
634 (void) getaddr(RTA_GATEWAY, *argv, &hp);
635 } else {
636 int ret = atoi(*argv);
637
638 if (ret == 0) {
639 if (!qflag && strcmp(*argv, "0") == 0)
640 printf("%s,%s",
641 "old usage of trailing 0",
642 "assuming route to if\n");
643 else
644 usage((char *)NULL);
645 iflag = 1;
646 continue;
647 } else if (ret > 0 && ret < 10) {
648 if (!qflag) {
649 printf("old usage of trailing digit, ");
650 printf("assuming route via gateway\n");
651 }
652 iflag = 0;
653 continue;
654 }
655 (void) getaddr(RTA_NETMASK, *argv, 0);
656 }
657 }
658 }
659 if (forcehost)
660 ishost = 1;
661 if (forcenet)
662 ishost = 0;
663 flags |= RTF_UP;
664 if (ishost)
665 flags |= RTF_HOST;
666 if (iflag == 0)
667 flags |= RTF_GATEWAY;
668 for (attempts = 1; ; attempts++) {
669 errno = 0;
670 if ((ret = rtmsg(*cmd, flags)) == 0)
671 break;
672 if (errno != ENETUNREACH && errno != ESRCH)
673 break;
674 if (af == AF_INET && *gateway && hp && hp->h_addr_list[1]) {
675 hp->h_addr_list++;
676 memcpy(&so_gate.sin.sin_addr, hp->h_addr_list[0],
677 hp->h_length);
678 } else
679 break;
680 }
681 if (*cmd == 'g')
682 exit(0);
683 oerrno = errno;
684 if (!qflag) {
685 (void) printf("%s %s %s", cmd, ishost? "host" : "net", dest);
686 if (*gateway) {
687 (void) printf(": gateway %s", gateway);
688 if (attempts > 1 && ret == 0 && af == AF_INET)
689 (void) printf(" (%s)",
690 inet_ntoa(((struct sockaddr_in *)
691 &route.rt_gateway)->sin_addr));
692 }
693 if (ret == 0)
694 (void) printf("\n");
695 }
696 if (ret != 0) {
697 switch (oerrno) {
698 case ESRCH:
699 err = "not in table";
700 break;
701 case EBUSY:
702 err = "entry in use";
703 break;
704 case ENOBUFS:
705 err = "routing table overflow";
706 break;
707 default:
708 err = strerror(oerrno);
709 break;
710 }
711 (void) printf(": %s\n", err);
712 }
713 }
714
715 void
716 inet_makenetandmask(net, sin)
717 u_long net;
718 register struct sockaddr_in *sin;
719 {
720 u_long addr, mask = 0;
721 register char *cp;
722
723 rtm_addrs |= RTA_NETMASK;
724 if (net == 0)
725 mask = addr = 0;
726 else if (net < 128) {
727 addr = net << IN_CLASSA_NSHIFT;
728 mask = IN_CLASSA_NET;
729 } else if (net < 65536) {
730 addr = net << IN_CLASSB_NSHIFT;
731 mask = IN_CLASSB_NET;
732 } else if (net < 16777216L) {
733 addr = net << IN_CLASSC_NSHIFT;
734 mask = IN_CLASSC_NET;
735 } else {
736 addr = net;
737 if ((addr & IN_CLASSA_HOST) == 0)
738 mask = IN_CLASSA_NET;
739 else if ((addr & IN_CLASSB_HOST) == 0)
740 mask = IN_CLASSB_NET;
741 else if ((addr & IN_CLASSC_HOST) == 0)
742 mask = IN_CLASSC_NET;
743 else
744 mask = -1;
745 }
746 sin->sin_addr.s_addr = htonl(addr);
747 sin = &so_mask.sin;
748 sin->sin_addr.s_addr = htonl(mask);
749 sin->sin_len = 0;
750 sin->sin_family = 0;
751 cp = (char *)(&sin->sin_addr + 1);
752 while (*--cp == 0 && cp > (char *)sin)
753 ;
754 sin->sin_len = 1 + cp - (char *)sin;
755 }
756
757 /*
758 * Interpret an argument as a network address of some kind,
759 * returning 1 if a host address, 0 if a network address.
760 */
761 int
762 getaddr(which, s, hpp)
763 int which;
764 char *s;
765 struct hostent **hpp;
766 {
767 register sup su;
768 struct ns_addr ns_addr();
769 struct iso_addr *iso_addr();
770 struct hostent *hp;
771 struct netent *np;
772 u_long val;
773
774 if (af == 0) {
775 af = AF_INET;
776 aflen = sizeof(struct sockaddr_in);
777 }
778 rtm_addrs |= which;
779 switch (which) {
780 case RTA_DST:
781 su = &so_dst;
782 su->sa.sa_family = af;
783 break;
784 case RTA_GATEWAY:
785 su = &so_gate;
786 su->sa.sa_family = af;
787 break;
788 case RTA_NETMASK:
789 su = &so_mask;
790 break;
791 case RTA_GENMASK:
792 su = &so_genmask;
793 break;
794 case RTA_IFP:
795 su = &so_ifp;
796 su->sa.sa_family = af;
797 break;
798 case RTA_IFA:
799 su = &so_ifa;
800 su->sa.sa_family = af;
801 break;
802 default:
803 usage("Internal Error");
804 /*NOTREACHED*/
805 }
806 su->sa.sa_len = aflen;
807 if (strcmp(s, "default") == 0) {
808 switch (which) {
809 case RTA_DST:
810 forcenet++;
811 (void) getaddr(RTA_NETMASK, s, 0);
812 break;
813 case RTA_NETMASK:
814 case RTA_GENMASK:
815 su->sa.sa_len = 0;
816 }
817 return (0);
818 }
819 switch (af) {
820 case AF_NS:
821 if (which == RTA_DST) {
822 extern short ns_bh[3];
823 struct sockaddr_ns *sms = &(so_mask.sns);
824 memset(sms, 0, sizeof(*sms));
825 sms->sns_family = 0;
826 sms->sns_len = 6;
827 sms->sns_addr.x_net = *(union ns_net *)ns_bh;
828 rtm_addrs |= RTA_NETMASK;
829 }
830 su->sns.sns_addr = ns_addr(s);
831 return (!ns_nullhost(su->sns.sns_addr));
832
833 case AF_OSI:
834 su->siso.siso_addr = *iso_addr(s);
835 if (which == RTA_NETMASK || which == RTA_GENMASK) {
836 register char *cp = (char *)TSEL(&su->siso);
837 su->siso.siso_nlen = 0;
838 do {--cp ;} while ((cp > (char *)su) && (*cp == 0));
839 su->siso.siso_len = 1 + cp - (char *)su;
840 }
841 return (1);
842
843 case AF_LINK:
844 link_addr(s, &su->sdl);
845 return (1);
846
847 case AF_CCITT:
848 ccitt_addr(s, &su->sx25);
849 return (which == RTA_DST ? x25_makemask() : 1);
850
851 case PF_ROUTE:
852 su->sa.sa_len = sizeof(*su);
853 sockaddr(s, &su->sa);
854 return (1);
855
856 case AF_INET:
857 default:
858 break;
859 }
860
861 if (hpp == NULL)
862 hpp = &hp;
863 *hpp = NULL;
864 if (((val = inet_addr(s)) != INADDR_NONE) &&
865 (which != RTA_DST || forcenet == 0)) {
866 su->sin.sin_addr.s_addr = val;
867 if (inet_lnaof(su->sin.sin_addr) != INADDR_ANY)
868 return (1);
869 else {
870 val = ntohl(val);
871 goto netdone;
872 }
873 }
874 if ((val = inet_network(s)) != INADDR_NONE ||
875 ((np = getnetbyname(s)) != NULL && (val = np->n_net) != 0)) {
876 netdone:
877 if (which == RTA_DST)
878 inet_makenetandmask(val, &su->sin);
879 return (0);
880 }
881 hp = gethostbyname(s);
882 if (hp) {
883 *hpp = hp;
884 su->sin.sin_family = hp->h_addrtype;
885 memcpy(&su->sin.sin_addr, hp->h_addr, hp->h_length);
886 return (1);
887 }
888 (void) fprintf(stderr, "%s: bad value\n", s);
889 exit(1);
890 }
891
892 int
893 x25_makemask()
894 {
895 register char *cp;
896
897 if ((rtm_addrs & RTA_NETMASK) == 0) {
898 rtm_addrs |= RTA_NETMASK;
899 for (cp = (char *)&so_mask.sx25.x25_net;
900 cp < &so_mask.sx25.x25_opts.op_flags; cp++)
901 *cp = -1;
902 so_mask.sx25.x25_len = (u_char)&(((sup)0)->sx25.x25_opts);
903 }
904 return 0;
905 }
906
907 short ns_nullh[] = {0,0,0};
908 short ns_bh[] = {-1,-1,-1};
909
910 char *
911 ns_print(sns)
912 struct sockaddr_ns *sns;
913 {
914 struct ns_addr work;
915 union { union ns_net net_e; u_long long_e; } net;
916 u_short port;
917 static char mybuf[50], cport[10], chost[25];
918 char *host = "";
919 register char *p;
920 register u_char *q;
921
922 work = sns->sns_addr;
923 port = ntohs(work.x_port);
924 work.x_port = 0;
925 net.net_e = work.x_net;
926 if (ns_nullhost(work) && net.long_e == 0) {
927 if (!port)
928 return ("*.*");
929 (void) sprintf(mybuf, "*.%XH", port);
930 return (mybuf);
931 }
932
933 if (memcmp(ns_bh, work.x_host.c_host, 6) == 0)
934 host = "any";
935 else if (memcmp(ns_nullh, work.x_host.c_host, 6) == 0)
936 host = "*";
937 else {
938 q = work.x_host.c_host;
939 (void) sprintf(chost, "%02X%02X%02X%02X%02X%02XH",
940 q[0], q[1], q[2], q[3], q[4], q[5]);
941 for (p = chost; *p == '0' && p < chost + 12; p++)
942 /* void */;
943 host = p;
944 }
945 if (port)
946 (void) sprintf(cport, ".%XH", htons(port));
947 else
948 *cport = 0;
949
950 (void) sprintf(mybuf,"%XH.%s%s", ntohl(net.long_e), host, cport);
951 return (mybuf);
952 }
953
954 void
955 interfaces()
956 {
957 size_t needed;
958 int mib[6];
959 char *buf, *lim, *next;
960 register struct rt_msghdr *rtm;
961
962 mib[0] = CTL_NET;
963 mib[1] = PF_ROUTE;
964 mib[2] = 0; /* protocol */
965 mib[3] = 0; /* wildcard address family */
966 mib[4] = NET_RT_IFLIST;
967 mib[5] = 0; /* no flags */
968 if (sysctl(mib, 6, NULL, &needed, NULL, 0) < 0)
969 quit("route-sysctl-estimate");
970 if ((buf = malloc(needed)) == NULL)
971 quit("malloc");
972 if (sysctl(mib, 6, buf, &needed, NULL, 0) < 0)
973 quit("actual retrieval of interface table");
974 lim = buf + needed;
975 for (next = buf; next < lim; next += rtm->rtm_msglen) {
976 rtm = (struct rt_msghdr *)next;
977 print_rtmsg(rtm, rtm->rtm_msglen);
978 }
979 }
980
981 void
982 monitor()
983 {
984 int n;
985 char msg[2048];
986
987 verbose = 1;
988 if (debugonly) {
989 interfaces();
990 exit(0);
991 }
992 for(;;) {
993 n = read(s, msg, 2048);
994 (void) printf("got message of size %d\n", n);
995 print_rtmsg((struct rt_msghdr *)msg, n);
996 }
997 }
998
999 struct {
1000 struct rt_msghdr m_rtm;
1001 char m_space[512];
1002 } m_rtmsg;
1003
1004 int
1005 rtmsg(cmd, flags)
1006 int cmd, flags;
1007 {
1008 static int seq;
1009 int rlen;
1010 register char *cp = m_rtmsg.m_space;
1011 register int l;
1012
1013 #define NEXTADDR(w, u) \
1014 if (rtm_addrs & (w)) {\
1015 l = ROUNDUP(u.sa.sa_len); memcpy(cp, &(u), l); cp += l;\
1016 if (verbose) sodump(&(u),"u");\
1017 }
1018
1019 errno = 0;
1020 memset(&m_rtmsg, 0, sizeof(m_rtmsg));
1021 if (cmd == 'a')
1022 cmd = RTM_ADD;
1023 else if (cmd == 'c')
1024 cmd = RTM_CHANGE;
1025 else if (cmd == 'g') {
1026 cmd = RTM_GET;
1027 if (so_ifp.sa.sa_family == 0) {
1028 so_ifp.sa.sa_family = AF_LINK;
1029 so_ifp.sa.sa_len = sizeof(struct sockaddr_dl);
1030 rtm_addrs |= RTA_IFP;
1031 }
1032 } else
1033 cmd = RTM_DELETE;
1034 #define rtm m_rtmsg.m_rtm
1035 rtm.rtm_type = cmd;
1036 rtm.rtm_flags = flags;
1037 rtm.rtm_version = RTM_VERSION;
1038 rtm.rtm_seq = ++seq;
1039 rtm.rtm_addrs = rtm_addrs;
1040 rtm.rtm_rmx = rt_metrics;
1041 rtm.rtm_inits = rtm_inits;
1042
1043 if (rtm_addrs & RTA_NETMASK)
1044 mask_addr();
1045 NEXTADDR(RTA_DST, so_dst);
1046 NEXTADDR(RTA_GATEWAY, so_gate);
1047 NEXTADDR(RTA_NETMASK, so_mask);
1048 NEXTADDR(RTA_GENMASK, so_genmask);
1049 NEXTADDR(RTA_IFP, so_ifp);
1050 NEXTADDR(RTA_IFA, so_ifa);
1051 rtm.rtm_msglen = l = cp - (char *)&m_rtmsg;
1052 if (verbose)
1053 print_rtmsg(&rtm, l);
1054 if (debugonly)
1055 return (0);
1056 if ((rlen = write(s, (char *)&m_rtmsg, l)) < 0) {
1057 perror("writing to routing socket");
1058 return (-1);
1059 }
1060 if (cmd == RTM_GET) {
1061 do {
1062 l = read(s, (char *)&m_rtmsg, sizeof(m_rtmsg));
1063 } while (l > 0 && (rtm.rtm_seq != seq || rtm.rtm_pid != pid));
1064 if (l < 0)
1065 (void) fprintf(stderr,
1066 "route: read from routing socket: %s\n",
1067 strerror(errno));
1068 else
1069 print_getmsg(&rtm, l);
1070 }
1071 #undef rtm
1072 return (0);
1073 }
1074
1075 void
1076 mask_addr()
1077 {
1078 int olen = so_mask.sa.sa_len;
1079 register char *cp1 = olen + (char *)&so_mask, *cp2;
1080
1081 for (so_mask.sa.sa_len = 0; cp1 > (char *)&so_mask; )
1082 if (*--cp1 != 0) {
1083 so_mask.sa.sa_len = 1 + cp1 - (char *)&so_mask;
1084 break;
1085 }
1086 if ((rtm_addrs & RTA_DST) == 0)
1087 return;
1088 switch (so_dst.sa.sa_family) {
1089 case AF_NS:
1090 case AF_INET:
1091 case AF_CCITT:
1092 case 0:
1093 return;
1094 case AF_ISO:
1095 olen = MIN(so_dst.siso.siso_nlen,
1096 MAX(so_mask.sa.sa_len - 6, 0));
1097 break;
1098 }
1099 cp1 = so_mask.sa.sa_len + 1 + (char *)&so_dst;
1100 cp2 = so_dst.sa.sa_len + 1 + (char *)&so_dst;
1101 while (cp2 > cp1)
1102 *--cp2 = 0;
1103 cp2 = so_mask.sa.sa_len + 1 + (char *)&so_mask;
1104 while (cp1 > so_dst.sa.sa_data)
1105 *--cp1 &= *--cp2;
1106 switch (so_dst.sa.sa_family) {
1107 case AF_ISO:
1108 so_dst.siso.siso_nlen = olen;
1109 break;
1110 }
1111 }
1112
1113 char *msgtypes[] = {
1114 "",
1115 "RTM_ADD: Add Route",
1116 "RTM_DELETE: Delete Route",
1117 "RTM_CHANGE: Change Metrics or flags",
1118 "RTM_GET: Report Metrics",
1119 "RTM_LOSING: Kernel Suspects Partitioning",
1120 "RTM_REDIRECT: Told to use different route",
1121 "RTM_MISS: Lookup failed on this address",
1122 "RTM_LOCK: fix specified metrics",
1123 "RTM_OLDADD: caused by SIOCADDRT",
1124 "RTM_OLDDEL: caused by SIOCDELRT",
1125 "RTM_RESOLVE: Route created by cloning",
1126 "RTM_NEWADDR: address being added to iface",
1127 "RTM_DELADDR: address being removed from iface",
1128 "RTM_IFINFO: iface status change",
1129 0,
1130 };
1131
1132 char metricnames[] =
1133 "\011pksent\010rttvar\7rtt\6ssthresh\5sendpipe\4recvpipe\3expire\2hopcount\1mtu";
1134 char routeflags[] =
1135 "\1UP\2GATEWAY\3HOST\4REJECT\5DYNAMIC\6MODIFIED\7DONE\010MASK_PRESENT\011CLONING\012XRESOLVE\013LLINFO\014STATIC\017PROTO2\020PROTO1";
1136 char ifnetflags[] =
1137 "\1UP\2BROADCAST\3DEBUG\4LOOPBACK\5PTP\6NOTRAILERS\7RUNNING\010NOARP\011PPROMISC\012ALLMULTI\013OACTIVE\014SIMPLEX\015LINK0\016LINK1\017LINK2\020MULTICAST";
1138 char addrnames[] =
1139 "\1DST\2GATEWAY\3NETMASK\4GENMASK\5IFP\6IFA\7AUTHOR\010BRD";
1140
1141 void
1142 print_rtmsg(rtm, msglen)
1143 register struct rt_msghdr *rtm;
1144 int msglen;
1145 {
1146 struct if_msghdr *ifm;
1147 struct ifa_msghdr *ifam;
1148
1149 if (verbose == 0)
1150 return;
1151 if (rtm->rtm_version != RTM_VERSION) {
1152 (void) printf("routing message version %d not understood\n",
1153 rtm->rtm_version);
1154 return;
1155 }
1156 (void)printf("%s: len %d, ", msgtypes[rtm->rtm_type], rtm->rtm_msglen);
1157 switch (rtm->rtm_type) {
1158 case RTM_IFINFO:
1159 ifm = (struct if_msghdr *)rtm;
1160 (void) printf("if# %d, flags:", ifm->ifm_index);
1161 bprintf(stdout, ifm->ifm_flags, ifnetflags);
1162 pmsg_addrs((char *)(ifm + 1), ifm->ifm_addrs);
1163 break;
1164 case RTM_NEWADDR:
1165 case RTM_DELADDR:
1166 ifam = (struct ifa_msghdr *)rtm;
1167 (void) printf("metric %d, flags:", ifam->ifam_metric);
1168 bprintf(stdout, ifam->ifam_flags, routeflags);
1169 pmsg_addrs((char *)(ifam + 1), ifam->ifam_addrs);
1170 break;
1171 default:
1172 (void) printf("pid: %d, seq %d, errno %d, flags:",
1173 rtm->rtm_pid, rtm->rtm_seq, rtm->rtm_errno);
1174 bprintf(stdout, rtm->rtm_flags, routeflags);
1175 pmsg_common(rtm);
1176 }
1177 }
1178
1179 void
1180 print_getmsg(rtm, msglen)
1181 register struct rt_msghdr *rtm;
1182 int msglen;
1183 {
1184 struct sockaddr *dst = NULL, *gate = NULL, *mask = NULL;
1185 struct sockaddr_dl *ifp = NULL;
1186 register struct sockaddr *sa;
1187 register char *cp;
1188 register int i;
1189
1190 (void) printf(" route to: %s\n", routename(&so_dst));
1191 if (rtm->rtm_version != RTM_VERSION) {
1192 (void)fprintf(stderr,
1193 "routing message version %d not understood\n",
1194 rtm->rtm_version);
1195 return;
1196 }
1197 if (rtm->rtm_msglen > msglen) {
1198 (void)fprintf(stderr,
1199 "message length mismatch, in packet %d, returned %d\n",
1200 rtm->rtm_msglen, msglen);
1201 }
1202 if (rtm->rtm_errno) {
1203 (void) fprintf(stderr, "RTM_GET: %s (errno %d)\n",
1204 strerror(rtm->rtm_errno), rtm->rtm_errno);
1205 return;
1206 }
1207 cp = ((char *)(rtm + 1));
1208 if (rtm->rtm_addrs)
1209 for (i = 1; i; i <<= 1)
1210 if (i & rtm->rtm_addrs) {
1211 sa = (struct sockaddr *)cp;
1212 switch (i) {
1213 case RTA_DST:
1214 dst = sa;
1215 break;
1216 case RTA_GATEWAY:
1217 gate = sa;
1218 break;
1219 case RTA_NETMASK:
1220 mask = sa;
1221 break;
1222 case RTA_IFP:
1223 if (sa->sa_family == AF_LINK &&
1224 ((struct sockaddr_dl *)sa)->sdl_nlen)
1225 ifp = (struct sockaddr_dl *)sa;
1226 break;
1227 }
1228 ADVANCE(cp, sa);
1229 }
1230 if (dst && mask)
1231 mask->sa_family = dst->sa_family; /* XXX */
1232 if (dst)
1233 (void)printf("destination: %s\n", routename(dst));
1234 if (mask) {
1235 int savenflag = nflag;
1236
1237 nflag = 1;
1238 (void)printf(" mask: %s\n", routename(mask));
1239 nflag = savenflag;
1240 }
1241 if (gate && rtm->rtm_flags & RTF_GATEWAY)
1242 (void)printf(" gateway: %s\n", routename(gate));
1243 if (ifp)
1244 (void)printf(" interface: %.*s\n",
1245 ifp->sdl_nlen, ifp->sdl_data);
1246 (void)printf(" flags: ");
1247 bprintf(stdout, rtm->rtm_flags, routeflags);
1248
1249 #define lock(f) ((rtm->rtm_rmx.rmx_locks & __CONCAT(RTV_,f)) ? 'L' : ' ')
1250 #define msec(u) (((u) + 500) / 1000) /* usec to msec */
1251
1252 (void) printf("\n%s\n", "\
1253 recvpipe sendpipe ssthresh rtt,msec rttvar hopcount mtu expire");
1254 printf("%8d%c ", rtm->rtm_rmx.rmx_recvpipe, lock(RPIPE));
1255 printf("%8d%c ", rtm->rtm_rmx.rmx_sendpipe, lock(SPIPE));
1256 printf("%8d%c ", rtm->rtm_rmx.rmx_ssthresh, lock(SSTHRESH));
1257 printf("%8d%c ", msec(rtm->rtm_rmx.rmx_rtt), lock(RTT));
1258 printf("%8d%c ", msec(rtm->rtm_rmx.rmx_rttvar), lock(RTTVAR));
1259 printf("%8d%c ", rtm->rtm_rmx.rmx_hopcount, lock(HOPCOUNT));
1260 printf("%8d%c ", rtm->rtm_rmx.rmx_mtu, lock(MTU));
1261 if (rtm->rtm_rmx.rmx_expire)
1262 rtm->rtm_rmx.rmx_expire -= time(0);
1263 printf("%8d%c\n", rtm->rtm_rmx.rmx_expire, lock(EXPIRE));
1264 #undef lock
1265 #undef msec
1266 #define RTA_IGN (RTA_DST|RTA_GATEWAY|RTA_NETMASK|RTA_IFP|RTA_IFA|RTA_BRD)
1267 if (verbose)
1268 pmsg_common(rtm);
1269 else if (rtm->rtm_addrs &~ RTA_IGN) {
1270 (void) printf("sockaddrs: ");
1271 bprintf(stdout, rtm->rtm_addrs, addrnames);
1272 putchar('\n');
1273 }
1274 #undef RTA_IGN
1275 }
1276
1277 void
1278 pmsg_common(rtm)
1279 register struct rt_msghdr *rtm;
1280 {
1281 (void) printf("\nlocks: ");
1282 bprintf(stdout, rtm->rtm_rmx.rmx_locks, metricnames);
1283 (void) printf(" inits: ");
1284 bprintf(stdout, rtm->rtm_inits, metricnames);
1285 pmsg_addrs(((char *)(rtm + 1)), rtm->rtm_addrs);
1286 }
1287
1288 void
1289 pmsg_addrs(cp, addrs)
1290 char *cp;
1291 int addrs;
1292 {
1293 register struct sockaddr *sa;
1294 int i;
1295
1296 if (addrs == 0)
1297 return;
1298 (void) printf("\nsockaddrs: ");
1299 bprintf(stdout, addrs, addrnames);
1300 (void) putchar('\n');
1301 for (i = 1; i; i <<= 1)
1302 if (i & addrs) {
1303 sa = (struct sockaddr *)cp;
1304 (void) printf(" %s", routename(sa));
1305 ADVANCE(cp, sa);
1306 }
1307 (void) putchar('\n');
1308 (void) fflush(stdout);
1309 }
1310
1311 void
1312 bprintf(fp, b, s)
1313 register FILE *fp;
1314 register int b;
1315 register u_char *s;
1316 {
1317 register int i;
1318 int gotsome = 0;
1319
1320 if (b == 0)
1321 return;
1322 while (i = *s++) {
1323 if (b & (1 << (i-1))) {
1324 if (gotsome == 0)
1325 i = '<';
1326 else
1327 i = ',';
1328 (void) putc(i, fp);
1329 gotsome = 1;
1330 for (; (i = *s) > 32; s++)
1331 (void) putc(i, fp);
1332 } else
1333 while (*s > 32)
1334 s++;
1335 }
1336 if (gotsome)
1337 (void) putc('>', fp);
1338 }
1339
1340 int
1341 keyword(cp)
1342 char *cp;
1343 {
1344 register struct keytab *kt = keywords;
1345
1346 while (kt->kt_cp && strcmp(kt->kt_cp, cp))
1347 kt++;
1348 return kt->kt_i;
1349 }
1350
1351 void
1352 sodump(su, which)
1353 register sup su;
1354 char *which;
1355 {
1356 switch (su->sa.sa_family) {
1357 case AF_LINK:
1358 (void) printf("%s: link %s; ",
1359 which, link_ntoa(&su->sdl));
1360 break;
1361 case AF_ISO:
1362 (void) printf("%s: iso %s; ",
1363 which, iso_ntoa(&su->siso.siso_addr));
1364 break;
1365 case AF_INET:
1366 (void) printf("%s: inet %s; ",
1367 which, inet_ntoa(su->sin.sin_addr));
1368 break;
1369 case AF_NS:
1370 (void) printf("%s: xns %s; ",
1371 which, ns_ntoa(su->sns.sns_addr));
1372 break;
1373 }
1374 (void) fflush(stdout);
1375 }
1376
1377 /* States*/
1378 #define VIRGIN 0
1379 #define GOTONE 1
1380 #define GOTTWO 2
1381 /* Inputs */
1382 #define DIGIT (4*0)
1383 #define END (4*1)
1384 #define DELIM (4*2)
1385
1386 void
1387 sockaddr(addr, sa)
1388 register char *addr;
1389 register struct sockaddr *sa;
1390 {
1391 register char *cp = (char *)sa;
1392 int size = sa->sa_len;
1393 char *cplim = cp + size;
1394 register int byte = 0, state = VIRGIN, new;
1395
1396 memset(cp, 0, size);
1397 cp++;
1398 do {
1399 if ((*addr >= '0') && (*addr <= '9')) {
1400 new = *addr - '0';
1401 } else if ((*addr >= 'a') && (*addr <= 'f')) {
1402 new = *addr - 'a' + 10;
1403 } else if ((*addr >= 'A') && (*addr <= 'F')) {
1404 new = *addr - 'A' + 10;
1405 } else if (*addr == 0)
1406 state |= END;
1407 else
1408 state |= DELIM;
1409 addr++;
1410 switch (state /* | INPUT */) {
1411 case GOTTWO | DIGIT:
1412 *cp++ = byte; /*FALLTHROUGH*/
1413 case VIRGIN | DIGIT:
1414 state = GOTONE; byte = new; continue;
1415 case GOTONE | DIGIT:
1416 state = GOTTWO; byte = new + (byte << 4); continue;
1417 default: /* | DELIM */
1418 state = VIRGIN; *cp++ = byte; byte = 0; continue;
1419 case GOTONE | END:
1420 case GOTTWO | END:
1421 *cp++ = byte; /* FALLTHROUGH */
1422 case VIRGIN | END:
1423 break;
1424 }
1425 break;
1426 } while (cp < cplim);
1427 sa->sa_len = cp - (char *)sa;
1428 }
1429