route.c revision 1.17 1 /* $NetBSD: route.c,v 1.17 1996/11/15 18:01:40 gwr Exp $ */
2
3 /*
4 * Copyright (c) 1983, 1989, 1991, 1993
5 * The Regents of the University of California. All rights reserved.
6 *
7 * Redistribution and use in source and binary forms, with or without
8 * modification, are permitted provided that the following conditions
9 * are met:
10 * 1. Redistributions of source code must retain the above copyright
11 * notice, this list of conditions and the following disclaimer.
12 * 2. Redistributions in binary form must reproduce the above copyright
13 * notice, this list of conditions and the following disclaimer in the
14 * documentation and/or other materials provided with the distribution.
15 * 3. All advertising materials mentioning features or use of this software
16 * must display the following acknowledgement:
17 * This product includes software developed by the University of
18 * California, Berkeley and its contributors.
19 * 4. Neither the name of the University nor the names of its contributors
20 * may be used to endorse or promote products derived from this software
21 * without specific prior written permission.
22 *
23 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
24 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
25 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
26 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
27 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
28 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
29 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
30 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
31 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
32 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
33 * SUCH DAMAGE.
34 */
35
36 #ifndef lint
37 static char copyright[] =
38 "@(#) Copyright (c) 1983, 1989, 1991, 1993\n\
39 The Regents of the University of California. All rights reserved.\n";
40 #endif /* not lint */
41
42 #ifndef lint
43 #if 0
44 static char sccsid[] = "@(#)route.c 8.3 (Berkeley) 3/19/94";
45 #else
46 static char rcsid[] = "$NetBSD: route.c,v 1.17 1996/11/15 18:01:40 gwr Exp $";
47 #endif
48 #endif /* not lint */
49
50 #include <sys/param.h>
51 #include <sys/file.h>
52 #include <sys/socket.h>
53 #include <sys/ioctl.h>
54 #include <sys/mbuf.h>
55 #include <sys/sysctl.h>
56
57 #include <net/if.h>
58 #include <net/route.h>
59 #include <net/if_dl.h>
60 #include <netinet/in.h>
61 #include <netns/ns.h>
62 #include <netiso/iso.h>
63 #include <netccitt/x25.h>
64 #include <arpa/inet.h>
65 #include <netdb.h>
66
67 #include <errno.h>
68 #include <unistd.h>
69 #include <stdio.h>
70 #include <ctype.h>
71 #include <stdlib.h>
72 #include <string.h>
73 #include <paths.h>
74
75 #include "keywords.h"
76
77 struct ortentry route;
78 union sockunion {
79 struct sockaddr sa;
80 struct sockaddr_in sin;
81 struct sockaddr_ns sns;
82 struct sockaddr_iso siso;
83 struct sockaddr_dl sdl;
84 struct sockaddr_x25 sx25;
85 } so_dst, so_gate, so_mask, so_genmask, so_ifa, so_ifp;
86
87 typedef union sockunion *sup;
88 int pid, rtm_addrs, uid;
89 int s;
90 int forcehost, forcenet, doflush, nflag, af, qflag, tflag, keyword();
91 int iflag, verbose, aflen = sizeof (struct sockaddr_in);
92 int locking, lockrest, debugonly;
93 struct rt_metrics rt_metrics;
94 u_long rtm_inits;
95 struct in_addr inet_makeaddr();
96 char *routename(), *netname();
97 void flushroutes(), newroute(), monitor(), sockaddr(), sodump();
98 void print_getmsg(), print_rtmsg(), pmsg_common(), pmsg_addrs();
99 void bprintf(), mask_addr();
100 int getaddr(), rtmsg(), x25_makemask();
101 extern char *inet_ntoa(), *iso_ntoa(), *link_ntoa();
102 extern void show();
103
104 __dead void
105 usage(cp)
106 char *cp;
107 {
108 if (cp)
109 (void) fprintf(stderr, "route: botched keyword: %s\n", cp);
110 (void) fprintf(stderr,
111 "usage: route [ -nqv ] cmd [[ -<qualifers> ] args ]\n");
112 exit(1);
113 /* NOTREACHED */
114 }
115
116 void
117 quit(s)
118 char *s;
119 {
120 int sverrno = errno;
121
122 (void) fprintf(stderr, "route: ");
123 if (s)
124 (void) fprintf(stderr, "%s: ", s);
125 (void) fprintf(stderr, "%s\n", strerror(sverrno));
126 exit(1);
127 /* NOTREACHED */
128 }
129
130 #define ROUNDUP(a) \
131 ((a) > 0 ? (1 + (((a) - 1) | (sizeof(long) - 1))) : sizeof(long))
132 #define ADVANCE(x, n) (x += ROUNDUP((n)->sa_len))
133
134 int
135 main(argc, argv)
136 int argc;
137 char **argv;
138 {
139 extern int optind;
140 int ch;
141
142 if (argc < 2)
143 usage((char *)NULL);
144
145 while ((ch = getopt(argc, argv, "nqdtv")) != EOF)
146 switch(ch) {
147 case 'n':
148 nflag = 1;
149 break;
150 case 'q':
151 qflag = 1;
152 break;
153 case 'v':
154 verbose = 1;
155 break;
156 case 't':
157 tflag = 1;
158 break;
159 case 'd':
160 debugonly = 1;
161 break;
162 case '?':
163 default:
164 usage((char *)NULL);
165 }
166 argc -= optind;
167 argv += optind;
168
169 pid = getpid();
170 uid = getuid();
171 if (tflag)
172 s = open("/dev/null", O_WRONLY, 0);
173 else
174 s = socket(PF_ROUTE, SOCK_RAW, 0);
175 if (s < 0)
176 quit("socket");
177
178 if (*argv == NULL)
179 goto no_cmd;
180 switch (keyword(*argv)) {
181
182 #ifndef SMALL
183 case K_GET:
184 uid = 0;
185 /* FALLTHROUGH */
186 #endif /* SMALL */
187
188 case K_CHANGE:
189 case K_ADD:
190 case K_DELETE:
191 newroute(argc, argv);
192 break;
193
194 case K_SHOW:
195 uid = 0;
196 show(argc, argv);
197 break;
198
199 #ifndef SMALL
200 case K_MONITOR:
201 monitor();
202 break;
203
204 case K_FLUSH:
205 flushroutes(argc, argv);
206 break;
207 #endif /* SMALL */
208
209 no_cmd:
210 default:
211 usage(*argv);
212 return 1;
213 }
214 return 0;
215 }
216
217 #ifndef SMALL
218 /*
219 * Purge all entries in the routing tables not
220 * associated with network interfaces.
221 */
222 void
223 flushroutes(argc, argv)
224 int argc;
225 char *argv[];
226 {
227 size_t needed;
228 int mib[6], rlen, seqno;
229 char *buf, *next, *lim;
230 register struct rt_msghdr *rtm;
231
232 if (uid) {
233 errno = EACCES;
234 quit("must be root to alter routing table");
235 }
236 shutdown(s, 0); /* Don't want to read back our messages */
237 if (argc > 1) {
238 argv++;
239 if (argc == 2 && **argv == '-')
240 switch (keyword(*argv + 1)) {
241 case K_INET:
242 af = AF_INET;
243 break;
244 case K_XNS:
245 af = AF_NS;
246 break;
247 case K_LINK:
248 af = AF_LINK;
249 break;
250 case K_ISO:
251 case K_OSI:
252 af = AF_ISO;
253 break;
254 case K_X25:
255 af = AF_CCITT;
256 default:
257 goto bad;
258 } else
259 bad: usage(*argv);
260 }
261 mib[0] = CTL_NET;
262 mib[1] = PF_ROUTE;
263 mib[2] = 0; /* protocol */
264 mib[3] = 0; /* wildcard address family */
265 mib[4] = NET_RT_DUMP;
266 mib[5] = 0; /* no flags */
267 if (sysctl(mib, 6, NULL, &needed, NULL, 0) < 0)
268 quit("route-sysctl-estimate");
269 if ((buf = malloc(needed)) == NULL)
270 quit("malloc");
271 if (sysctl(mib, 6, buf, &needed, NULL, 0) < 0)
272 quit("actual retrieval of routing table");
273 lim = buf + needed;
274 if (verbose) {
275 (void) printf("Examining routing table from sysctl\n");
276 if (af) printf("(address family %s)\n", (*argv + 1));
277 }
278 seqno = 0; /* ??? */
279 for (next = buf; next < lim; next += rtm->rtm_msglen) {
280 rtm = (struct rt_msghdr *)next;
281 if (verbose)
282 print_rtmsg(rtm, rtm->rtm_msglen);
283 if ((rtm->rtm_flags & RTF_GATEWAY) == 0)
284 continue;
285 if (af) {
286 struct sockaddr *sa = (struct sockaddr *)(rtm + 1);
287
288 if (sa->sa_family != af)
289 continue;
290 }
291 if (debugonly)
292 continue;
293 rtm->rtm_type = RTM_DELETE;
294 rtm->rtm_seq = seqno;
295 rlen = write(s, next, rtm->rtm_msglen);
296 if (rlen < (int)rtm->rtm_msglen) {
297 (void) fprintf(stderr,
298 "route: write to routing socket: %s\n",
299 strerror(errno));
300 (void) printf("got only %d for rlen\n", rlen);
301 break;
302 }
303 seqno++;
304 if (qflag)
305 continue;
306 if (verbose)
307 print_rtmsg(rtm, rlen);
308 else {
309 struct sockaddr *sa = (struct sockaddr *)(rtm + 1);
310 (void) printf("%-20.20s ", rtm->rtm_flags & RTF_HOST ?
311 routename(sa) : netname(sa));
312 sa = (struct sockaddr *)(sa->sa_len + (char *)sa);
313 (void) printf("%-20.20s ", routename(sa));
314 (void) printf("done\n");
315 }
316 }
317 }
318 #endif /* SMALL */
319
320
321 static char hexlist[] = "0123456789abcdef";
322
323 char *
324 any_ntoa(sa)
325 const struct sockaddr *sa;
326 {
327 static char obuf[64];
328 const char *in;
329 char *out;
330 int len;
331
332 len = sa->sa_len;
333 in = sa->sa_data;
334 out = obuf;
335
336 do {
337 *out++ = hexlist[(*in >> 4) & 15];
338 *out++ = hexlist[(*in++) & 15];
339 *out++ = '.';
340 } while (--len > 0);
341 out[-1] = '\0';
342 return obuf;
343 }
344
345
346 char *
347 routename(sa)
348 struct sockaddr *sa;
349 {
350 register char *cp;
351 static char line[50];
352 struct hostent *hp;
353 static char domain[MAXHOSTNAMELEN + 1];
354 static int first = 1;
355 char *ns_print();
356 struct in_addr in;
357
358 if (first) {
359 first = 0;
360 if (gethostname(domain, MAXHOSTNAMELEN) == 0 &&
361 (cp = strchr(domain, '.')))
362 (void) strcpy(domain, cp + 1);
363 else
364 domain[0] = 0;
365 }
366
367 if (sa->sa_len == 0)
368 strcpy(line, "default");
369 else switch (sa->sa_family) {
370
371 case AF_INET:
372 in = ((struct sockaddr_in *)sa)->sin_addr;
373
374 cp = 0;
375 if (in.s_addr == INADDR_ANY || sa->sa_len < 4)
376 cp = "default";
377 if (cp == 0 && !nflag) {
378 hp = gethostbyaddr((char *)&in, sizeof (struct in_addr),
379 AF_INET);
380 if (hp) {
381 if ((cp = strchr(hp->h_name, '.')) &&
382 !strcmp(cp + 1, domain))
383 *cp = 0;
384 cp = hp->h_name;
385 }
386 }
387 if (cp)
388 strcpy(line, cp);
389 else
390 strcpy(line, inet_ntoa(in));
391 break;
392
393 case AF_LINK:
394 return (link_ntoa((struct sockaddr_dl *)sa));
395
396 #ifndef SMALL
397 case AF_NS:
398 return (ns_print((struct sockaddr_ns *)sa));
399
400 case AF_ISO:
401 (void) sprintf(line, "iso %s",
402 iso_ntoa(&((struct sockaddr_iso *)sa)->siso_addr));
403 break;
404 #endif /* SMALL */
405
406 default:
407 (void) sprintf(line, "(%d) %s",
408 sa->sa_family, any_ntoa(sa));
409 break;
410
411 }
412 return (line);
413 }
414
415 /*
416 * Return the name of the network whose address is given.
417 * The address is assumed to be that of a net or subnet, not a host.
418 */
419 char *
420 netname(sa)
421 struct sockaddr *sa;
422 {
423 char *cp = 0;
424 static char line[50];
425 struct netent *np = 0;
426 u_long net, mask;
427 register u_long i;
428 int subnetshift;
429 char *ns_print();
430 struct in_addr in;
431
432 switch (sa->sa_family) {
433
434 case AF_INET:
435 in = ((struct sockaddr_in *)sa)->sin_addr;
436 i = ntohl(in.s_addr);
437 if (i == 0)
438 cp = "default";
439 else if (!nflag) {
440 if (IN_CLASSA(i)) {
441 mask = IN_CLASSA_NET;
442 subnetshift = 8;
443 } else if (IN_CLASSB(i)) {
444 mask = IN_CLASSB_NET;
445 subnetshift = 8;
446 } else {
447 mask = IN_CLASSC_NET;
448 subnetshift = 4;
449 }
450 /*
451 * If there are more bits than the standard mask
452 * would suggest, subnets must be in use.
453 * Guess at the subnet mask, assuming reasonable
454 * width subnet fields.
455 */
456 while (i &~ mask)
457 mask = (long)mask >> subnetshift;
458 net = i & mask;
459 while ((mask & 1) == 0)
460 mask >>= 1, net >>= 1;
461 np = getnetbyaddr(net, AF_INET);
462 if (np)
463 cp = np->n_name;
464 }
465 if (cp)
466 strcpy(line, cp);
467 else {
468 #if 0 /* XXX - This is silly... */
469 #define C(x) ((x) & 0xff)
470 if ((i & 0xffffff) == 0)
471 (void) sprintf(line, "%u", C(i >> 24));
472 else if ((i & 0xffff) == 0)
473 (void) sprintf(line, "%u.%u", C(i >> 24),
474 C(i >> 16));
475 else if ((i & 0xff) == 0)
476 (void) sprintf(line, "%u.%u.%u", C(i >> 24),
477 C(i >> 16), C(i >> 8));
478 else
479 (void) sprintf(line, "%u.%u.%u.%u", C(i >> 24),
480 C(i >> 16), C(i >> 8), C(i));
481 #undef C
482 #else /* XXX */
483 strcpy(line, inet_ntoa(in));
484 #endif /* XXX */
485 }
486 break;
487
488 case AF_LINK:
489 return (link_ntoa((struct sockaddr_dl *)sa));
490
491 #ifndef SMALL
492 case AF_NS:
493 return (ns_print((struct sockaddr_ns *)sa));
494
495 case AF_ISO:
496 (void) sprintf(line, "iso %s",
497 iso_ntoa(&((struct sockaddr_iso *)sa)->siso_addr));
498 break;
499 #endif /* SMALL */
500
501 default:
502 (void) sprintf(line, "af %d: %s",
503 sa->sa_family, any_ntoa(sa));
504 break;
505 }
506 return (line);
507 }
508
509 void
510 set_metric(value, key)
511 char *value;
512 int key;
513 {
514 int flag = 0;
515 u_long noval, *valp = &noval;
516
517 switch (key) {
518 #define caseof(x, y, z) case x: valp = &rt_metrics.z; flag = y; break
519 caseof(K_MTU, RTV_MTU, rmx_mtu);
520 caseof(K_HOPCOUNT, RTV_HOPCOUNT, rmx_hopcount);
521 caseof(K_EXPIRE, RTV_EXPIRE, rmx_expire);
522 caseof(K_RECVPIPE, RTV_RPIPE, rmx_recvpipe);
523 caseof(K_SENDPIPE, RTV_SPIPE, rmx_sendpipe);
524 caseof(K_SSTHRESH, RTV_SSTHRESH, rmx_ssthresh);
525 caseof(K_RTT, RTV_RTT, rmx_rtt);
526 caseof(K_RTTVAR, RTV_RTTVAR, rmx_rttvar);
527 }
528 rtm_inits |= flag;
529 if (lockrest || locking)
530 rt_metrics.rmx_locks |= flag;
531 if (locking)
532 locking = 0;
533 *valp = atoi(value);
534 }
535
536 void
537 newroute(argc, argv)
538 int argc;
539 register char **argv;
540 {
541 char *cmd, *dest = "", *gateway = "", *err;
542 int ishost = 0, ret, attempts, oerrno, flags = RTF_STATIC;
543 int key;
544 struct hostent *hp = 0;
545
546 if (uid) {
547 errno = EACCES;
548 quit("must be root to alter routing table");
549 }
550 cmd = argv[0];
551 if (*cmd != 'g')
552 shutdown(s, 0); /* Don't want to read back our messages */
553 while (--argc > 0) {
554 if (**(++argv)== '-') {
555 switch (key = keyword(1 + *argv)) {
556
557 case K_SA:
558 af = PF_ROUTE;
559 aflen = sizeof(union sockunion);
560 break;
561
562 case K_INET:
563 af = AF_INET;
564 aflen = sizeof(struct sockaddr_in);
565 break;
566
567 case K_LINK:
568 af = AF_LINK;
569 aflen = sizeof(struct sockaddr_dl);
570 break;
571
572 case K_OSI:
573 case K_ISO:
574 af = AF_ISO;
575 aflen = sizeof(struct sockaddr_iso);
576 break;
577
578 case K_X25:
579 af = AF_CCITT;
580 aflen = sizeof(struct sockaddr_x25);
581 break;
582
583 case K_XNS:
584 af = AF_NS;
585 aflen = sizeof(struct sockaddr_ns);
586 break;
587
588 case K_IFACE:
589 case K_INTERFACE:
590 iflag++;
591 break;
592 case K_NOSTATIC:
593 flags &= ~RTF_STATIC;
594 break;
595 case K_LLINFO:
596 flags |= RTF_LLINFO;
597 break;
598 case K_LOCK:
599 locking = 1;
600 break;
601 case K_LOCKREST:
602 lockrest = 1;
603 break;
604 case K_HOST:
605 forcehost++;
606 break;
607 case K_REJECT:
608 flags |= RTF_REJECT;
609 break;
610 case K_BLACKHOLE:
611 flags |= RTF_BLACKHOLE;
612 break;
613 case K_PROTO1:
614 flags |= RTF_PROTO1;
615 break;
616 case K_PROTO2:
617 flags |= RTF_PROTO2;
618 break;
619 case K_CLONING:
620 flags |= RTF_CLONING;
621 break;
622 case K_XRESOLVE:
623 flags |= RTF_XRESOLVE;
624 break;
625 case K_STATIC:
626 flags |= RTF_STATIC;
627 break;
628 case K_IFA:
629 argc--;
630 (void) getaddr(RTA_IFA, *++argv, 0);
631 break;
632 case K_IFP:
633 argc--;
634 (void) getaddr(RTA_IFP, *++argv, 0);
635 break;
636 case K_GENMASK:
637 argc--;
638 (void) getaddr(RTA_GENMASK, *++argv, 0);
639 break;
640 case K_GATEWAY:
641 argc--;
642 (void) getaddr(RTA_GATEWAY, *++argv, 0);
643 break;
644 case K_DST:
645 argc--;
646 ishost = getaddr(RTA_DST, *++argv, &hp);
647 dest = *argv;
648 break;
649 case K_NETMASK:
650 argc--;
651 (void) getaddr(RTA_NETMASK, *++argv, 0);
652 /* FALLTHROUGH */
653 case K_NET:
654 forcenet++;
655 break;
656 case K_MTU:
657 case K_HOPCOUNT:
658 case K_EXPIRE:
659 case K_RECVPIPE:
660 case K_SENDPIPE:
661 case K_SSTHRESH:
662 case K_RTT:
663 case K_RTTVAR:
664 argc--;
665 set_metric(*++argv, key);
666 break;
667 default:
668 usage(1+*argv);
669 }
670 } else {
671 if ((rtm_addrs & RTA_DST) == 0) {
672 dest = *argv;
673 ishost = getaddr(RTA_DST, *argv, &hp);
674 } else if ((rtm_addrs & RTA_GATEWAY) == 0) {
675 gateway = *argv;
676 (void) getaddr(RTA_GATEWAY, *argv, &hp);
677 } else {
678 int ret = atoi(*argv);
679
680 if (ret == 0) {
681 if (!qflag && strcmp(*argv, "0") == 0)
682 printf("%s,%s",
683 "old usage of trailing 0",
684 "assuming route to if\n");
685 else
686 usage((char *)NULL);
687 iflag = 1;
688 continue;
689 } else if (ret > 0 && ret < 10) {
690 if (!qflag) {
691 printf("old usage of trailing digit, ");
692 printf("assuming route via gateway\n");
693 }
694 iflag = 0;
695 continue;
696 }
697 (void) getaddr(RTA_NETMASK, *argv, 0);
698 }
699 }
700 }
701 if (forcehost)
702 ishost = 1;
703 if (forcenet)
704 ishost = 0;
705 flags |= RTF_UP;
706 if (ishost)
707 flags |= RTF_HOST;
708 if (iflag == 0)
709 flags |= RTF_GATEWAY;
710 for (attempts = 1; ; attempts++) {
711 errno = 0;
712 if ((ret = rtmsg(*cmd, flags)) == 0)
713 break;
714 if (errno != ENETUNREACH && errno != ESRCH)
715 break;
716 if (af == AF_INET && *gateway && hp && hp->h_addr_list[1]) {
717 hp->h_addr_list++;
718 memcpy(&so_gate.sin.sin_addr, hp->h_addr_list[0],
719 hp->h_length);
720 } else
721 break;
722 }
723 if (*cmd == 'g')
724 exit(0);
725 oerrno = errno;
726 if (!qflag) {
727 (void) printf("%s %s %s", cmd, ishost? "host" : "net", dest);
728 if (*gateway) {
729 (void) printf(": gateway %s", gateway);
730 if (attempts > 1 && ret == 0 && af == AF_INET)
731 (void) printf(" (%s)",
732 inet_ntoa(((struct sockaddr_in *)
733 &route.rt_gateway)->sin_addr));
734 }
735 if (ret == 0)
736 (void) printf("\n");
737 }
738 if (ret != 0) {
739 switch (oerrno) {
740 case ESRCH:
741 err = "not in table";
742 break;
743 case EBUSY:
744 err = "entry in use";
745 break;
746 case ENOBUFS:
747 err = "routing table overflow";
748 break;
749 default:
750 err = strerror(oerrno);
751 break;
752 }
753 (void) printf(": %s\n", err);
754 }
755 }
756
757 void
758 inet_makenetandmask(net, sin)
759 u_long net;
760 register struct sockaddr_in *sin;
761 {
762 u_long addr, mask = 0;
763 register char *cp;
764
765 rtm_addrs |= RTA_NETMASK;
766 if (net == 0)
767 mask = addr = 0;
768 else if (net < 128) {
769 addr = net << IN_CLASSA_NSHIFT;
770 mask = IN_CLASSA_NET;
771 } else if (net < 65536) {
772 addr = net << IN_CLASSB_NSHIFT;
773 mask = IN_CLASSB_NET;
774 } else if (net < 16777216L) {
775 addr = net << IN_CLASSC_NSHIFT;
776 mask = IN_CLASSC_NET;
777 } else {
778 addr = net;
779 if ((addr & IN_CLASSA_HOST) == 0)
780 mask = IN_CLASSA_NET;
781 else if ((addr & IN_CLASSB_HOST) == 0)
782 mask = IN_CLASSB_NET;
783 else if ((addr & IN_CLASSC_HOST) == 0)
784 mask = IN_CLASSC_NET;
785 else
786 mask = -1;
787 }
788 sin->sin_addr.s_addr = htonl(addr);
789 sin = &so_mask.sin;
790 sin->sin_addr.s_addr = htonl(mask);
791 sin->sin_len = 0;
792 sin->sin_family = 0;
793 cp = (char *)(&sin->sin_addr + 1);
794 while (*--cp == 0 && cp > (char *)sin)
795 ;
796 sin->sin_len = 1 + cp - (char *)sin;
797 }
798
799 /*
800 * Interpret an argument as a network address of some kind,
801 * returning 1 if a host address, 0 if a network address.
802 */
803 int
804 getaddr(which, s, hpp)
805 int which;
806 char *s;
807 struct hostent **hpp;
808 {
809 register sup su;
810 struct ns_addr ns_addr();
811 struct iso_addr *iso_addr();
812 struct hostent *hp;
813 struct netent *np;
814 u_long val;
815
816 if (af == 0) {
817 af = AF_INET;
818 aflen = sizeof(struct sockaddr_in);
819 }
820 rtm_addrs |= which;
821 switch (which) {
822 case RTA_DST:
823 su = &so_dst;
824 su->sa.sa_family = af;
825 break;
826 case RTA_GATEWAY:
827 su = &so_gate;
828 su->sa.sa_family = af;
829 break;
830 case RTA_NETMASK:
831 su = &so_mask;
832 break;
833 case RTA_GENMASK:
834 su = &so_genmask;
835 break;
836 case RTA_IFP:
837 su = &so_ifp;
838 su->sa.sa_family = af;
839 break;
840 case RTA_IFA:
841 su = &so_ifa;
842 su->sa.sa_family = af;
843 break;
844 default:
845 usage("Internal Error");
846 /*NOTREACHED*/
847 }
848 su->sa.sa_len = aflen;
849 if (strcmp(s, "default") == 0) {
850 switch (which) {
851 case RTA_DST:
852 forcenet++;
853 (void) getaddr(RTA_NETMASK, s, 0);
854 break;
855 case RTA_NETMASK:
856 case RTA_GENMASK:
857 su->sa.sa_len = 0;
858 }
859 return (0);
860 }
861 switch (af) {
862 #ifndef SMALL
863 case AF_NS:
864 if (which == RTA_DST) {
865 extern short ns_bh[3];
866 struct sockaddr_ns *sms = &(so_mask.sns);
867 memset(sms, 0, sizeof(*sms));
868 sms->sns_family = 0;
869 sms->sns_len = 6;
870 sms->sns_addr.x_net = *(union ns_net *)ns_bh;
871 rtm_addrs |= RTA_NETMASK;
872 }
873 su->sns.sns_addr = ns_addr(s);
874 return (!ns_nullhost(su->sns.sns_addr));
875
876 case AF_OSI:
877 su->siso.siso_addr = *iso_addr(s);
878 if (which == RTA_NETMASK || which == RTA_GENMASK) {
879 register char *cp = (char *)TSEL(&su->siso);
880 su->siso.siso_nlen = 0;
881 do {--cp ;} while ((cp > (char *)su) && (*cp == 0));
882 su->siso.siso_len = 1 + cp - (char *)su;
883 }
884 return (1);
885
886 case AF_CCITT:
887 ccitt_addr(s, &su->sx25);
888 return (which == RTA_DST ? x25_makemask() : 1);
889 #endif /* SMALL */
890
891 case PF_ROUTE:
892 su->sa.sa_len = sizeof(*su);
893 sockaddr(s, &su->sa);
894 return (1);
895
896 case AF_LINK:
897 link_addr(s, &su->sdl);
898 return (1);
899
900 case AF_INET:
901 default:
902 break;
903 }
904
905 if (hpp == NULL)
906 hpp = &hp;
907 *hpp = NULL;
908 if (((val = inet_addr(s)) != INADDR_NONE) &&
909 (which != RTA_DST || forcenet == 0)) {
910 su->sin.sin_addr.s_addr = val;
911 if (inet_lnaof(su->sin.sin_addr) != INADDR_ANY)
912 return (1);
913 else {
914 val = ntohl(val);
915 goto netdone;
916 }
917 }
918 if ((val = inet_network(s)) != INADDR_NONE ||
919 ((np = getnetbyname(s)) != NULL && (val = np->n_net) != 0)) {
920 netdone:
921 if (which == RTA_DST)
922 inet_makenetandmask(val, &su->sin);
923 return (0);
924 }
925 hp = gethostbyname(s);
926 if (hp) {
927 *hpp = hp;
928 su->sin.sin_family = hp->h_addrtype;
929 memcpy(&su->sin.sin_addr, hp->h_addr, hp->h_length);
930 return (1);
931 }
932 (void) fprintf(stderr, "%s: bad value\n", s);
933 exit(1);
934 }
935
936 #ifndef SMALL
937 int
938 x25_makemask()
939 {
940 register char *cp;
941
942 if ((rtm_addrs & RTA_NETMASK) == 0) {
943 rtm_addrs |= RTA_NETMASK;
944 for (cp = (char *)&so_mask.sx25.x25_net;
945 cp < &so_mask.sx25.x25_opts.op_flags; cp++)
946 *cp = -1;
947 so_mask.sx25.x25_len = (u_char)&(((sup)0)->sx25.x25_opts);
948 }
949 return 0;
950 }
951
952 short ns_nullh[] = {0,0,0};
953 short ns_bh[] = {-1,-1,-1};
954
955 char *
956 ns_print(sns)
957 struct sockaddr_ns *sns;
958 {
959 struct ns_addr work;
960 union { union ns_net net_e; u_long long_e; } net;
961 u_short port;
962 static char mybuf[50], cport[10], chost[25];
963 char *host = "";
964 register char *p;
965 register u_char *q;
966
967 work = sns->sns_addr;
968 port = ntohs(work.x_port);
969 work.x_port = 0;
970 net.net_e = work.x_net;
971 if (ns_nullhost(work) && net.long_e == 0) {
972 if (!port)
973 return ("*.*");
974 (void) sprintf(mybuf, "*.%XH", port);
975 return (mybuf);
976 }
977
978 if (memcmp(ns_bh, work.x_host.c_host, 6) == 0)
979 host = "any";
980 else if (memcmp(ns_nullh, work.x_host.c_host, 6) == 0)
981 host = "*";
982 else {
983 q = work.x_host.c_host;
984 (void) sprintf(chost, "%02X%02X%02X%02X%02X%02XH",
985 q[0], q[1], q[2], q[3], q[4], q[5]);
986 for (p = chost; *p == '0' && p < chost + 12; p++)
987 /* void */;
988 host = p;
989 }
990 if (port)
991 (void) sprintf(cport, ".%XH", htons(port));
992 else
993 *cport = 0;
994
995 (void) sprintf(mybuf,"%XH.%s%s", ntohl(net.long_e), host, cport);
996 return (mybuf);
997 }
998
999 void
1000 interfaces()
1001 {
1002 size_t needed;
1003 int mib[6];
1004 char *buf, *lim, *next;
1005 register struct rt_msghdr *rtm;
1006
1007 mib[0] = CTL_NET;
1008 mib[1] = PF_ROUTE;
1009 mib[2] = 0; /* protocol */
1010 mib[3] = 0; /* wildcard address family */
1011 mib[4] = NET_RT_IFLIST;
1012 mib[5] = 0; /* no flags */
1013 if (sysctl(mib, 6, NULL, &needed, NULL, 0) < 0)
1014 quit("route-sysctl-estimate");
1015 if ((buf = malloc(needed)) == NULL)
1016 quit("malloc");
1017 if (sysctl(mib, 6, buf, &needed, NULL, 0) < 0)
1018 quit("actual retrieval of interface table");
1019 lim = buf + needed;
1020 for (next = buf; next < lim; next += rtm->rtm_msglen) {
1021 rtm = (struct rt_msghdr *)next;
1022 print_rtmsg(rtm, rtm->rtm_msglen);
1023 }
1024 }
1025
1026 void
1027 monitor()
1028 {
1029 int n;
1030 char msg[2048];
1031
1032 verbose = 1;
1033 if (debugonly) {
1034 interfaces();
1035 exit(0);
1036 }
1037 for(;;) {
1038 n = read(s, msg, 2048);
1039 (void) printf("got message of size %d\n", n);
1040 print_rtmsg((struct rt_msghdr *)msg, n);
1041 }
1042 }
1043
1044 #endif /* SMALL */
1045
1046
1047 struct {
1048 struct rt_msghdr m_rtm;
1049 char m_space[512];
1050 } m_rtmsg;
1051
1052 int
1053 rtmsg(cmd, flags)
1054 int cmd, flags;
1055 {
1056 static int seq;
1057 int rlen;
1058 register char *cp = m_rtmsg.m_space;
1059 register int l;
1060
1061 #define NEXTADDR(w, u) \
1062 if (rtm_addrs & (w)) {\
1063 l = ROUNDUP(u.sa.sa_len); memcpy(cp, &(u), l); cp += l;\
1064 if (verbose) sodump(&(u),"u");\
1065 }
1066
1067 errno = 0;
1068 memset(&m_rtmsg, 0, sizeof(m_rtmsg));
1069 if (cmd == 'a')
1070 cmd = RTM_ADD;
1071 else if (cmd == 'c')
1072 cmd = RTM_CHANGE;
1073 else if (cmd == 'g') {
1074 #ifdef SMALL
1075 return (-1);
1076 #else /* SMALL */
1077 cmd = RTM_GET;
1078 if (so_ifp.sa.sa_family == 0) {
1079 so_ifp.sa.sa_family = AF_LINK;
1080 so_ifp.sa.sa_len = sizeof(struct sockaddr_dl);
1081 rtm_addrs |= RTA_IFP;
1082 }
1083 #endif /* SMALL */
1084 } else
1085 cmd = RTM_DELETE;
1086 #define rtm m_rtmsg.m_rtm
1087 rtm.rtm_type = cmd;
1088 rtm.rtm_flags = flags;
1089 rtm.rtm_version = RTM_VERSION;
1090 rtm.rtm_seq = ++seq;
1091 rtm.rtm_addrs = rtm_addrs;
1092 rtm.rtm_rmx = rt_metrics;
1093 rtm.rtm_inits = rtm_inits;
1094
1095 if (rtm_addrs & RTA_NETMASK)
1096 mask_addr();
1097 NEXTADDR(RTA_DST, so_dst);
1098 NEXTADDR(RTA_GATEWAY, so_gate);
1099 NEXTADDR(RTA_NETMASK, so_mask);
1100 NEXTADDR(RTA_GENMASK, so_genmask);
1101 NEXTADDR(RTA_IFP, so_ifp);
1102 NEXTADDR(RTA_IFA, so_ifa);
1103 rtm.rtm_msglen = l = cp - (char *)&m_rtmsg;
1104 if (verbose)
1105 print_rtmsg(&rtm, l);
1106 if (debugonly)
1107 return (0);
1108 if ((rlen = write(s, (char *)&m_rtmsg, l)) < 0) {
1109 perror("writing to routing socket");
1110 return (-1);
1111 }
1112 #ifndef SMALL
1113 if (cmd == RTM_GET) {
1114 do {
1115 l = read(s, (char *)&m_rtmsg, sizeof(m_rtmsg));
1116 } while (l > 0 && (rtm.rtm_seq != seq || rtm.rtm_pid != pid));
1117 if (l < 0)
1118 (void) fprintf(stderr,
1119 "route: read from routing socket: %s\n",
1120 strerror(errno));
1121 else
1122 print_getmsg(&rtm, l);
1123 }
1124 #endif /* SMALL */
1125 #undef rtm
1126 return (0);
1127 }
1128
1129 void
1130 mask_addr()
1131 {
1132 int olen = so_mask.sa.sa_len;
1133 register char *cp1 = olen + (char *)&so_mask, *cp2;
1134
1135 for (so_mask.sa.sa_len = 0; cp1 > (char *)&so_mask; )
1136 if (*--cp1 != 0) {
1137 so_mask.sa.sa_len = 1 + cp1 - (char *)&so_mask;
1138 break;
1139 }
1140 if ((rtm_addrs & RTA_DST) == 0)
1141 return;
1142 switch (so_dst.sa.sa_family) {
1143 case AF_NS:
1144 case AF_INET:
1145 case AF_CCITT:
1146 case 0:
1147 return;
1148 case AF_ISO:
1149 olen = MIN(so_dst.siso.siso_nlen,
1150 MAX(so_mask.sa.sa_len - 6, 0));
1151 break;
1152 }
1153 cp1 = so_mask.sa.sa_len + 1 + (char *)&so_dst;
1154 cp2 = so_dst.sa.sa_len + 1 + (char *)&so_dst;
1155 while (cp2 > cp1)
1156 *--cp2 = 0;
1157 cp2 = so_mask.sa.sa_len + 1 + (char *)&so_mask;
1158 while (cp1 > so_dst.sa.sa_data)
1159 *--cp1 &= *--cp2;
1160 switch (so_dst.sa.sa_family) {
1161 case AF_ISO:
1162 so_dst.siso.siso_nlen = olen;
1163 break;
1164 }
1165 }
1166
1167 char *msgtypes[] = {
1168 "",
1169 "RTM_ADD: Add Route",
1170 "RTM_DELETE: Delete Route",
1171 "RTM_CHANGE: Change Metrics or flags",
1172 "RTM_GET: Report Metrics",
1173 "RTM_LOSING: Kernel Suspects Partitioning",
1174 "RTM_REDIRECT: Told to use different route",
1175 "RTM_MISS: Lookup failed on this address",
1176 "RTM_LOCK: fix specified metrics",
1177 "RTM_OLDADD: caused by SIOCADDRT",
1178 "RTM_OLDDEL: caused by SIOCDELRT",
1179 "RTM_RESOLVE: Route created by cloning",
1180 "RTM_NEWADDR: address being added to iface",
1181 "RTM_DELADDR: address being removed from iface",
1182 "RTM_IFINFO: iface status change",
1183 0,
1184 };
1185
1186 char metricnames[] =
1187 "\011pksent\010rttvar\7rtt\6ssthresh\5sendpipe\4recvpipe\3expire\2hopcount\1mtu";
1188 char routeflags[] =
1189 "\1UP\2GATEWAY\3HOST\4REJECT\5DYNAMIC\6MODIFIED\7DONE\010MASK_PRESENT\011CLONING\012XRESOLVE\013LLINFO\014STATIC\017PROTO2\020PROTO1";
1190 char ifnetflags[] =
1191 "\1UP\2BROADCAST\3DEBUG\4LOOPBACK\5PTP\6NOTRAILERS\7RUNNING\010NOARP\011PPROMISC\012ALLMULTI\013OACTIVE\014SIMPLEX\015LINK0\016LINK1\017LINK2\020MULTICAST";
1192 char addrnames[] =
1193 "\1DST\2GATEWAY\3NETMASK\4GENMASK\5IFP\6IFA\7AUTHOR\010BRD";
1194
1195 void
1196 print_rtmsg(rtm, msglen)
1197 register struct rt_msghdr *rtm;
1198 int msglen;
1199 {
1200 struct if_msghdr *ifm;
1201 struct ifa_msghdr *ifam;
1202
1203 if (verbose == 0)
1204 return;
1205 if (rtm->rtm_version != RTM_VERSION) {
1206 (void) printf("routing message version %d not understood\n",
1207 rtm->rtm_version);
1208 return;
1209 }
1210 (void)printf("%s: len %d, ", msgtypes[rtm->rtm_type], rtm->rtm_msglen);
1211 switch (rtm->rtm_type) {
1212 case RTM_IFINFO:
1213 ifm = (struct if_msghdr *)rtm;
1214 (void) printf("if# %d, flags:", ifm->ifm_index);
1215 bprintf(stdout, ifm->ifm_flags, ifnetflags);
1216 pmsg_addrs((char *)(ifm + 1), ifm->ifm_addrs);
1217 break;
1218 case RTM_NEWADDR:
1219 case RTM_DELADDR:
1220 ifam = (struct ifa_msghdr *)rtm;
1221 (void) printf("metric %d, flags:", ifam->ifam_metric);
1222 bprintf(stdout, ifam->ifam_flags, routeflags);
1223 pmsg_addrs((char *)(ifam + 1), ifam->ifam_addrs);
1224 break;
1225 default:
1226 (void) printf("pid: %d, seq %d, errno %d, flags:",
1227 rtm->rtm_pid, rtm->rtm_seq, rtm->rtm_errno);
1228 bprintf(stdout, rtm->rtm_flags, routeflags);
1229 pmsg_common(rtm);
1230 }
1231 }
1232
1233 #ifndef SMALL
1234 void
1235 print_getmsg(rtm, msglen)
1236 register struct rt_msghdr *rtm;
1237 int msglen;
1238 {
1239 struct sockaddr *dst = NULL, *gate = NULL, *mask = NULL;
1240 struct sockaddr_dl *ifp = NULL;
1241 register struct sockaddr *sa;
1242 register char *cp;
1243 register int i;
1244
1245 (void) printf(" route to: %s\n", routename(&so_dst));
1246 if (rtm->rtm_version != RTM_VERSION) {
1247 (void)fprintf(stderr,
1248 "routing message version %d not understood\n",
1249 rtm->rtm_version);
1250 return;
1251 }
1252 if (rtm->rtm_msglen > msglen) {
1253 (void)fprintf(stderr,
1254 "message length mismatch, in packet %d, returned %d\n",
1255 rtm->rtm_msglen, msglen);
1256 }
1257 if (rtm->rtm_errno) {
1258 (void) fprintf(stderr, "RTM_GET: %s (errno %d)\n",
1259 strerror(rtm->rtm_errno), rtm->rtm_errno);
1260 return;
1261 }
1262 cp = ((char *)(rtm + 1));
1263 if (rtm->rtm_addrs)
1264 for (i = 1; i; i <<= 1)
1265 if (i & rtm->rtm_addrs) {
1266 sa = (struct sockaddr *)cp;
1267 switch (i) {
1268 case RTA_DST:
1269 dst = sa;
1270 break;
1271 case RTA_GATEWAY:
1272 gate = sa;
1273 break;
1274 case RTA_NETMASK:
1275 mask = sa;
1276 break;
1277 case RTA_IFP:
1278 if (sa->sa_family == AF_LINK &&
1279 ((struct sockaddr_dl *)sa)->sdl_nlen)
1280 ifp = (struct sockaddr_dl *)sa;
1281 break;
1282 }
1283 ADVANCE(cp, sa);
1284 }
1285 if (dst && mask)
1286 mask->sa_family = dst->sa_family; /* XXX */
1287 if (dst)
1288 (void)printf("destination: %s\n", routename(dst));
1289 if (mask) {
1290 int savenflag = nflag;
1291
1292 nflag = 1;
1293 (void)printf(" mask: %s\n", routename(mask));
1294 nflag = savenflag;
1295 }
1296 if (gate && rtm->rtm_flags & RTF_GATEWAY)
1297 (void)printf(" gateway: %s\n", routename(gate));
1298 if (ifp)
1299 (void)printf(" interface: %.*s\n",
1300 ifp->sdl_nlen, ifp->sdl_data);
1301 (void)printf(" flags: ");
1302 bprintf(stdout, rtm->rtm_flags, routeflags);
1303
1304 #define lock(f) ((rtm->rtm_rmx.rmx_locks & __CONCAT(RTV_,f)) ? 'L' : ' ')
1305 #define msec(u) (((u) + 500) / 1000) /* usec to msec */
1306
1307 (void) printf("\n%s\n", "\
1308 recvpipe sendpipe ssthresh rtt,msec rttvar hopcount mtu expire");
1309 printf("%8d%c ", rtm->rtm_rmx.rmx_recvpipe, lock(RPIPE));
1310 printf("%8d%c ", rtm->rtm_rmx.rmx_sendpipe, lock(SPIPE));
1311 printf("%8d%c ", rtm->rtm_rmx.rmx_ssthresh, lock(SSTHRESH));
1312 printf("%8d%c ", msec(rtm->rtm_rmx.rmx_rtt), lock(RTT));
1313 printf("%8d%c ", msec(rtm->rtm_rmx.rmx_rttvar), lock(RTTVAR));
1314 printf("%8d%c ", rtm->rtm_rmx.rmx_hopcount, lock(HOPCOUNT));
1315 printf("%8d%c ", rtm->rtm_rmx.rmx_mtu, lock(MTU));
1316 if (rtm->rtm_rmx.rmx_expire)
1317 rtm->rtm_rmx.rmx_expire -= time(0);
1318 printf("%8d%c\n", rtm->rtm_rmx.rmx_expire, lock(EXPIRE));
1319 #undef lock
1320 #undef msec
1321 #define RTA_IGN (RTA_DST|RTA_GATEWAY|RTA_NETMASK|RTA_IFP|RTA_IFA|RTA_BRD)
1322 if (verbose)
1323 pmsg_common(rtm);
1324 else if (rtm->rtm_addrs &~ RTA_IGN) {
1325 (void) printf("sockaddrs: ");
1326 bprintf(stdout, rtm->rtm_addrs, addrnames);
1327 putchar('\n');
1328 }
1329 #undef RTA_IGN
1330 }
1331 #endif /* SMALL */
1332
1333 void
1334 pmsg_common(rtm)
1335 register struct rt_msghdr *rtm;
1336 {
1337 (void) printf("\nlocks: ");
1338 bprintf(stdout, rtm->rtm_rmx.rmx_locks, metricnames);
1339 (void) printf(" inits: ");
1340 bprintf(stdout, rtm->rtm_inits, metricnames);
1341 pmsg_addrs(((char *)(rtm + 1)), rtm->rtm_addrs);
1342 }
1343
1344 void
1345 pmsg_addrs(cp, addrs)
1346 char *cp;
1347 int addrs;
1348 {
1349 register struct sockaddr *sa;
1350 int i;
1351
1352 if (addrs == 0)
1353 return;
1354 (void) printf("\nsockaddrs: ");
1355 bprintf(stdout, addrs, addrnames);
1356 (void) putchar('\n');
1357 for (i = 1; i; i <<= 1)
1358 if (i & addrs) {
1359 sa = (struct sockaddr *)cp;
1360 (void) printf(" %s", routename(sa));
1361 ADVANCE(cp, sa);
1362 }
1363 (void) putchar('\n');
1364 (void) fflush(stdout);
1365 }
1366
1367 void
1368 bprintf(fp, b, s)
1369 register FILE *fp;
1370 register int b;
1371 register u_char *s;
1372 {
1373 register int i;
1374 int gotsome = 0;
1375
1376 if (b == 0)
1377 return;
1378 while (i = *s++) {
1379 if (b & (1 << (i-1))) {
1380 if (gotsome == 0)
1381 i = '<';
1382 else
1383 i = ',';
1384 (void) putc(i, fp);
1385 gotsome = 1;
1386 for (; (i = *s) > 32; s++)
1387 (void) putc(i, fp);
1388 } else
1389 while (*s > 32)
1390 s++;
1391 }
1392 if (gotsome)
1393 (void) putc('>', fp);
1394 }
1395
1396 int
1397 keyword(cp)
1398 char *cp;
1399 {
1400 register struct keytab *kt = keywords;
1401
1402 while (kt->kt_cp && strcmp(kt->kt_cp, cp))
1403 kt++;
1404 return kt->kt_i;
1405 }
1406
1407 void
1408 sodump(su, which)
1409 register sup su;
1410 char *which;
1411 {
1412 switch (su->sa.sa_family) {
1413 case AF_INET:
1414 (void) printf("%s: inet %s; ",
1415 which, inet_ntoa(su->sin.sin_addr));
1416 break;
1417 case AF_LINK:
1418 (void) printf("%s: link %s; ",
1419 which, link_ntoa(&su->sdl));
1420 break;
1421 #ifndef SMALL
1422 case AF_ISO:
1423 (void) printf("%s: iso %s; ",
1424 which, iso_ntoa(&su->siso.siso_addr));
1425 break;
1426 case AF_NS:
1427 (void) printf("%s: xns %s; ",
1428 which, ns_ntoa(su->sns.sns_addr));
1429 break;
1430 #endif /* SMALL */
1431 default:
1432 (void) printf("af %d: %s; ",
1433 which, any_ntoa(&su->sa));
1434 }
1435 (void) fflush(stdout);
1436 }
1437
1438 /* States*/
1439 #define VIRGIN 0
1440 #define GOTONE 1
1441 #define GOTTWO 2
1442 /* Inputs */
1443 #define DIGIT (4*0)
1444 #define END (4*1)
1445 #define DELIM (4*2)
1446
1447 void
1448 sockaddr(addr, sa)
1449 register char *addr;
1450 register struct sockaddr *sa;
1451 {
1452 register char *cp = (char *)sa;
1453 int size = sa->sa_len;
1454 char *cplim = cp + size;
1455 register int byte = 0, state = VIRGIN, new;
1456
1457 memset(cp, 0, size);
1458 cp++;
1459 do {
1460 if ((*addr >= '0') && (*addr <= '9')) {
1461 new = *addr - '0';
1462 } else if ((*addr >= 'a') && (*addr <= 'f')) {
1463 new = *addr - 'a' + 10;
1464 } else if ((*addr >= 'A') && (*addr <= 'F')) {
1465 new = *addr - 'A' + 10;
1466 } else if (*addr == 0)
1467 state |= END;
1468 else
1469 state |= DELIM;
1470 addr++;
1471 switch (state /* | INPUT */) {
1472 case GOTTWO | DIGIT:
1473 *cp++ = byte; /*FALLTHROUGH*/
1474 case VIRGIN | DIGIT:
1475 state = GOTONE; byte = new; continue;
1476 case GOTONE | DIGIT:
1477 state = GOTTWO; byte = new + (byte << 4); continue;
1478 default: /* | DELIM */
1479 state = VIRGIN; *cp++ = byte; byte = 0; continue;
1480 case GOTONE | END:
1481 case GOTTWO | END:
1482 *cp++ = byte; /* FALLTHROUGH */
1483 case VIRGIN | END:
1484 break;
1485 }
1486 break;
1487 } while (cp < cplim);
1488 sa->sa_len = cp - (char *)sa;
1489 }
1490