route.c revision 1.87 1 /* $NetBSD: route.c,v 1.87 2005/08/09 21:25:42 ginsbach Exp $ */
2
3 /*
4 * Copyright (c) 1983, 1989, 1991, 1993
5 * The Regents of the University of California. All rights reserved.
6 *
7 * Redistribution and use in source and binary forms, with or without
8 * modification, are permitted provided that the following conditions
9 * are met:
10 * 1. Redistributions of source code must retain the above copyright
11 * notice, this list of conditions and the following disclaimer.
12 * 2. Redistributions in binary form must reproduce the above copyright
13 * notice, this list of conditions and the following disclaimer in the
14 * documentation and/or other materials provided with the distribution.
15 * 3. Neither the name of the University nor the names of its contributors
16 * may be used to endorse or promote products derived from this software
17 * without specific prior written permission.
18 *
19 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
20 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
21 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
22 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
23 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
24 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
25 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
26 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
27 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
28 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
29 * SUCH DAMAGE.
30 */
31
32 #include <sys/cdefs.h>
33 #ifndef lint
34 __COPYRIGHT("@(#) Copyright (c) 1983, 1989, 1991, 1993\n\
35 The Regents of the University of California. All rights reserved.\n");
36 #endif /* not lint */
37
38 #ifndef lint
39 #if 0
40 static char sccsid[] = "@(#)route.c 8.6 (Berkeley) 4/28/95";
41 #else
42 __RCSID("$NetBSD: route.c,v 1.87 2005/08/09 21:25:42 ginsbach Exp $");
43 #endif
44 #endif /* not lint */
45
46 #include <sys/param.h>
47 #include <sys/file.h>
48 #include <sys/socket.h>
49 #include <sys/ioctl.h>
50 #include <sys/mbuf.h>
51 #include <sys/sysctl.h>
52
53 #include <net/if.h>
54 #include <net/route.h>
55 #include <net/if_dl.h>
56 #include <net80211/ieee80211_netbsd.h>
57 #include <netinet/in.h>
58 #include <netatalk/at.h>
59 #include <netns/ns.h>
60 #include <netiso/iso.h>
61 #include <netccitt/x25.h>
62 #include <arpa/inet.h>
63 #include <netdb.h>
64
65 #include <errno.h>
66 #include <unistd.h>
67 #include <stdio.h>
68 #include <ctype.h>
69 #include <stdlib.h>
70 #include <string.h>
71 #include <time.h>
72 #include <paths.h>
73 #include <err.h>
74
75 #include "keywords.h"
76 #include "extern.h"
77
78 typedef union sockunion *sup;
79
80 static char *any_ntoa(const struct sockaddr *);
81 static void set_metric(char *, int);
82 static int newroute(int, char **);
83 static void inet_makenetandmask(u_int32_t, struct sockaddr_in *);
84 #ifdef INET6
85 static int inet6_makenetandmask(struct sockaddr_in6 *);
86 #endif
87 static int getaddr(int, char *, struct hostent **);
88 static int flushroutes(int, char *[], int);
89 #ifndef SMALL
90 static int prefixlen(const char *);
91 static int x25_makemask(void);
92 static void interfaces(void);
93 static void monitor(void);
94 static void print_getmsg(struct rt_msghdr *, int);
95 static const char *linkstate(struct if_msghdr *);
96 #endif /* SMALL */
97 static int rtmsg(int, int );
98 static void mask_addr(void);
99 static void print_rtmsg(struct rt_msghdr *, int);
100 static void pmsg_common(struct rt_msghdr *);
101 static void pmsg_addrs(char *, int);
102 static void bprintf(FILE *, int, u_char *);
103 static void sodump(sup, const char *);
104 static void sockaddr(char *, struct sockaddr *);
105
106 union sockunion {
107 struct sockaddr sa;
108 struct sockaddr_in sin;
109 #ifdef INET6
110 struct sockaddr_in6 sin6;
111 #endif
112 struct sockaddr_at sat;
113 struct sockaddr_dl sdl;
114 #ifndef SMALL
115 struct sockaddr_ns sns;
116 struct sockaddr_iso siso;
117 struct sockaddr_x25 sx25;
118 #endif /* SMALL */
119 } so_dst, so_gate, so_mask, so_genmask, so_ifa, so_ifp;
120
121 int pid, rtm_addrs;
122 int sock;
123 int forcehost, forcenet, doflush, nflag, af, qflag, tflag;
124 int iflag, verbose, aflen = sizeof(struct sockaddr_in);
125 int locking, lockrest, debugonly, shortoutput, rv;
126 struct rt_metrics rt_metrics;
127 u_int32_t rtm_inits;
128 short ns_nullh[] = {0,0,0};
129 short ns_bh[] = {-1,-1,-1};
130
131
132 void
133 usage(const char *cp)
134 {
135
136 if (cp)
137 warnx("botched keyword: %s", cp);
138 (void)fprintf(stderr,
139 "Usage: %s [ -fnqvs ] cmd [[ -<qualifers> ] args ]\n",
140 getprogname());
141 exit(1);
142 /* NOTREACHED */
143 }
144
145 #define PRIETHER "02x:%02x:%02x:%02x:%02x:%02x"
146 #define PRIETHER_ARGS(__enaddr) (__enaddr)[0], (__enaddr)[1], (__enaddr)[2], \
147 (__enaddr)[3], (__enaddr)[4], (__enaddr)[5]
148 #define ROUNDUP(a) \
149 ((a) > 0 ? (1 + (((a) - 1) | (sizeof(long) - 1))) : sizeof(long))
150 #define ADVANCE(x, n) (x += ROUNDUP((n)->sa_len))
151
152 int
153 main(int argc, char **argv)
154 {
155 int ch;
156
157 if (argc < 2)
158 usage(NULL);
159
160 while ((ch = getopt(argc, argv, "fnqvdts")) != -1)
161 switch (ch) {
162 case 'd':
163 debugonly = 1;
164 break;
165 case 'f':
166 doflush = 1;
167 break;
168 case 'n':
169 nflag = 1;
170 break;
171 case 'q':
172 qflag = 1;
173 break;
174 case 's':
175 shortoutput = 1;
176 break;
177 case 't':
178 tflag = 1;
179 break;
180 case 'v':
181 verbose = 1;
182 break;
183 case '?':
184 default:
185 usage(NULL);
186 /*NOTREACHED*/
187 }
188 argc -= optind;
189 argv += optind;
190
191 pid = getpid();
192 if (tflag)
193 sock = open("/dev/null", O_WRONLY, 0);
194 else
195 sock = socket(PF_ROUTE, SOCK_RAW, 0);
196 if (sock < 0)
197 err(1, "socket");
198
199 if (*argv == NULL) {
200 if (doflush)
201 ch = K_FLUSH;
202 else
203 goto no_cmd;
204 } else
205 ch = keyword(*argv);
206
207 switch (ch) {
208 #ifndef SMALL
209 case K_GET:
210 #endif /* SMALL */
211 case K_CHANGE:
212 case K_ADD:
213 case K_DELETE:
214 if (doflush)
215 (void)flushroutes(1, argv, 0);
216 return newroute(argc, argv);
217
218 case K_SHOW:
219 show(argc, argv);
220 return 0;
221
222 #ifndef SMALL
223 case K_MONITOR:
224 monitor();
225 return 0;
226
227 #endif /* SMALL */
228 case K_FLUSH:
229 return flushroutes(argc, argv, 0);
230
231 case K_FLUSHALL:
232 return flushroutes(argc, argv, 1);
233 no_cmd:
234 default:
235 usage(*argv);
236 /*NOTREACHED*/
237 }
238 }
239
240 /*
241 * Purge all entries in the routing tables not
242 * associated with network interfaces.
243 */
244 static int
245 flushroutes(int argc, char *argv[], int doall)
246 {
247 size_t needed;
248 int mib[6], rlen, seqno;
249 char *buf, *next, *lim;
250 struct rt_msghdr *rtm;
251
252 af = 0;
253 shutdown(sock, SHUT_RD); /* Don't want to read back our messages */
254 if (argc > 1) {
255 argv++;
256 if (argc == 2 && **argv == '-')
257 switch (keyword(*argv + 1)) {
258 case K_INET:
259 af = AF_INET;
260 break;
261 #ifdef INET6
262 case K_INET6:
263 af = AF_INET6;
264 break;
265 #endif
266 #ifndef SMALL
267 case K_ATALK:
268 af = AF_APPLETALK;
269 break;
270 case K_XNS:
271 af = AF_NS;
272 break;
273 #endif /* SMALL */
274 case K_LINK:
275 af = AF_LINK;
276 break;
277 #ifndef SMALL
278 case K_ISO:
279 case K_OSI:
280 af = AF_ISO;
281 break;
282 case K_X25:
283 af = AF_CCITT;
284 #endif /* SMALL */
285 default:
286 goto bad;
287 } else
288 bad: usage(*argv);
289 }
290 mib[0] = CTL_NET;
291 mib[1] = PF_ROUTE;
292 mib[2] = 0; /* protocol */
293 mib[3] = 0; /* wildcard address family */
294 mib[4] = NET_RT_DUMP;
295 mib[5] = 0; /* no flags */
296 if (sysctl(mib, 6, NULL, &needed, NULL, 0) < 0)
297 err(1, "route-sysctl-estimate");
298 if (needed == 0)
299 return 0;
300 if ((buf = malloc(needed)) == NULL)
301 err(1, "malloc");
302 if (sysctl(mib, 6, buf, &needed, NULL, 0) < 0)
303 err(1, "actual retrieval of routing table");
304 lim = buf + needed;
305 if (verbose) {
306 (void)printf("Examining routing table from sysctl\n");
307 if (af) printf("(address family %s)\n", (*argv + 1));
308 }
309 seqno = 0; /* ??? */
310 for (next = buf; next < lim; next += rtm->rtm_msglen) {
311 rtm = (struct rt_msghdr *)next;
312 if (verbose)
313 print_rtmsg(rtm, rtm->rtm_msglen);
314 if (!(rtm->rtm_flags & (RTF_GATEWAY | RTF_STATIC |
315 RTF_LLINFO)) && !doall)
316 continue;
317 if (af) {
318 struct sockaddr *sa = (struct sockaddr *)(rtm + 1);
319
320 if (sa->sa_family != af)
321 continue;
322 }
323 if (debugonly)
324 continue;
325 rtm->rtm_type = RTM_DELETE;
326 rtm->rtm_seq = seqno;
327 rlen = write(sock, next, rtm->rtm_msglen);
328 if (rlen < (int)rtm->rtm_msglen) {
329 warn("write to routing socket, got %d for rlen", rlen);
330 return 1;
331 }
332 seqno++;
333 if (qflag)
334 continue;
335 if (verbose)
336 print_rtmsg(rtm, rlen);
337 else {
338 struct sockaddr *sa = (struct sockaddr *)(rtm + 1);
339 (void)printf("%-20.20s ",
340 routename(sa, NULL, rtm->rtm_flags));
341 sa = (struct sockaddr *)(ROUNDUP(sa->sa_len) + (char *)sa);
342 (void)printf("%-20.20s ",
343 routename(sa, NULL, RTF_HOST));
344 (void)printf("done\n");
345 }
346 }
347 return 0;
348 }
349
350
351 static char hexlist[] = "0123456789abcdef";
352
353 static char *
354 any_ntoa(const struct sockaddr *sa)
355 {
356 static char obuf[3 * 256];
357 const char *in;
358 char *out;
359 int len;
360
361 #if __GNUC__ > 2
362 len = sa->sa_len - offsetof(struct sockaddr, sa_data);
363 #else
364 len = sa->sa_len - ((caddr_t)&sa->sa_data - (caddr_t)sa);
365 #endif
366 in = sa->sa_data;
367 out = obuf;
368
369 do {
370 *out++ = hexlist[(*in >> 4) & 15];
371 *out++ = hexlist[(*in++) & 15];
372 *out++ = '.';
373 } while (--len > 0);
374 out[-1] = '\0';
375 return obuf;
376 }
377
378
379 int
380 netmask_length(struct sockaddr *nm, int family)
381 {
382 static int
383 /* number of bits in a nibble */
384 _t[] = { 0,1,1,2,1,2,2,3,1,2,2,3,2,3,3,4 },
385 /* good nibbles are 1111, 1110, 1100, 1000, 0000 */
386 _g[] = { 1,0,0,0,0,0,0,0,1,0,0,0,1,0,1,1 };
387 int mask, good, zeroes, maskbytes, bit, i;
388 unsigned char *maskdata;
389
390 if (nm == NULL)
391 return 0;
392
393 mask = 0;
394 good = 1;
395 zeroes = 0;
396
397 switch (family) {
398 case AF_INET: {
399 struct sockaddr_in *nsin = (struct sockaddr_in *)nm;
400 maskdata = (unsigned char *)&nsin->sin_addr;
401 maskbytes = nsin->sin_len -
402 ((caddr_t)&nsin->sin_addr - (caddr_t)nsin);
403 break;
404 }
405 case AF_INET6: {
406 struct sockaddr_in6 *sin6 = (struct sockaddr_in6 *)nm;
407 maskdata = (unsigned char *)&sin6->sin6_addr;
408 maskbytes = sin6->sin6_len -
409 ((caddr_t)&sin6->sin6_addr - (caddr_t)sin6);
410 break;
411 }
412 default:
413 return 0;
414 }
415
416 /*
417 * Count the bits in the nibbles of the mask, and marking the
418 * netmask as not good (or at best, non-standard and very
419 * discouraged, in the case of AF_INET) if we find either of
420 * a nibble with non-contiguous bits, or a non-zero nibble
421 * after we've found a zero nibble.
422 */
423 for (i = 0; i < maskbytes; i++) {
424 /* high nibble */
425 mask += bit = _t[maskdata[i] >> 4];
426 good &= _g[maskdata[i] >> 4];
427 if (zeroes && bit)
428 good = 0;
429 if (bit == 0)
430 zeroes = 1;
431 /* low nibble */
432 mask += bit = _t[maskdata[i] & 0xf];
433 good &= _g[maskdata[i] & 0xf];
434 if (zeroes && bit)
435 good = 0;
436 if (bit == 0)
437 zeroes = 1;
438 }
439
440 /*
441 * Always return the number of bits found, but as a negative
442 * if the mask wasn't one we like.
443 */
444 return good ? mask : -mask;
445 }
446
447 char *
448 netmask_string(struct sockaddr *mask, int len)
449 {
450 static char smask[16];
451
452 if (len >= 0)
453 snprintf(smask, sizeof(smask), "%d", len);
454 else {
455 /* XXX AF_INET only?! */
456 struct sockaddr_in nsin;
457
458 memset(&nsin, 0, sizeof(nsin));
459 memcpy(&nsin, mask, mask->sa_len);
460 snprintf(smask, sizeof(smask), "%s", inet_ntoa(nsin.sin_addr));
461 }
462
463 return smask;
464 }
465
466
467 const char *
468 routename(struct sockaddr *sa, struct sockaddr *nm, int flags)
469 {
470 const char *cp;
471 static char line[50];
472 struct hostent *hp;
473 static char domain[MAXHOSTNAMELEN + 1];
474 static int first = 1;
475 struct in_addr in;
476 int nml;
477
478 if ((flags & RTF_HOST) == 0)
479 return netname(sa, nm);
480
481 if (first) {
482 first = 0;
483 if (gethostname(domain, MAXHOSTNAMELEN) == 0 &&
484 (cp = strchr(domain, '.')))
485 (void)strlcpy(domain, cp + 1, sizeof(domain));
486 else
487 domain[0] = 0;
488 }
489
490 if (sa->sa_len == 0)
491 strlcpy(line, "default", sizeof(line));
492 else switch (sa->sa_family) {
493
494 case AF_INET:
495 in = ((struct sockaddr_in *)sa)->sin_addr;
496 nml = netmask_length(nm, AF_INET);
497
498 cp = 0;
499 if (in.s_addr == INADDR_ANY || sa->sa_len < 4) {
500 if (nml == 0)
501 cp = "default";
502 else {
503 static char notdefault[sizeof(NOTDEFSTRING)];
504
505 snprintf(notdefault, sizeof(notdefault),
506 "0.0.0.0/%s", netmask_string(nm, nml));
507 cp = notdefault;
508 }
509 }
510 if (cp == 0 && !nflag) {
511 hp = gethostbyaddr((char *)&in, sizeof(struct in_addr),
512 AF_INET);
513 if (hp) {
514 char *ccp;
515 if ((ccp = strchr(hp->h_name, '.')) &&
516 !strcmp(ccp + 1, domain))
517 *ccp = 0;
518 cp = hp->h_name;
519 }
520 }
521 if (cp)
522 (void)strlcpy(line, cp, sizeof(line));
523 else
524 (void)strlcpy(line, inet_ntoa(in), sizeof(line));
525 break;
526
527 case AF_LINK:
528 return (link_ntoa((struct sockaddr_dl *)sa));
529
530 #ifndef SMALL
531 #ifdef INET6
532 case AF_INET6:
533 {
534 struct sockaddr_in6 sin6;
535 int niflags;
536
537 niflags = 0;
538 if (nflag)
539 niflags |= NI_NUMERICHOST;
540 memset(&sin6, 0, sizeof(sin6));
541 memcpy(&sin6, sa, sa->sa_len);
542 sin6.sin6_len = sizeof(struct sockaddr_in6);
543 sin6.sin6_family = AF_INET6;
544 #ifdef __KAME__
545 if (sa->sa_len == sizeof(struct sockaddr_in6) &&
546 (IN6_IS_ADDR_LINKLOCAL(&sin6.sin6_addr) ||
547 IN6_IS_ADDR_MC_LINKLOCAL(&sin6.sin6_addr)) &&
548 sin6.sin6_scope_id == 0) {
549 sin6.sin6_scope_id =
550 ntohs(*(u_int16_t *)&sin6.sin6_addr.s6_addr[2]);
551 sin6.sin6_addr.s6_addr[2] = 0;
552 sin6.sin6_addr.s6_addr[3] = 0;
553 }
554 #endif
555 nml = netmask_length(nm, AF_INET6);
556 if (IN6_IS_ADDR_UNSPECIFIED(&sin6.sin6_addr)) {
557 if (nml == 0)
558 strlcpy(line, "::", sizeof(line));
559 else
560 /* noncontiguous never happens in ipv6 */
561 snprintf(line, sizeof(line), "::/%d", nml);
562 }
563
564 else if (getnameinfo((struct sockaddr *)&sin6, sin6.sin6_len,
565 line, sizeof(line), NULL, 0, niflags) != 0)
566 strlcpy(line, "invalid", sizeof(line));
567 break;
568 }
569 #endif
570
571 case AF_NS:
572 return (ns_print((struct sockaddr_ns *)sa));
573
574 case AF_ISO:
575 (void)snprintf(line, sizeof line, "iso %s",
576 iso_ntoa(&((struct sockaddr_iso *)sa)->siso_addr));
577 break;
578
579 case AF_APPLETALK:
580 (void)snprintf(line, sizeof(line), "atalk %d.%d",
581 ((struct sockaddr_at *)sa)->sat_addr.s_net,
582 ((struct sockaddr_at *)sa)->sat_addr.s_node);
583 break;
584 #endif /* SMALL */
585
586 default:
587 (void)snprintf(line, sizeof line, "(%d) %s",
588 sa->sa_family, any_ntoa(sa));
589 break;
590
591 }
592 return (line);
593 }
594
595 /*
596 * Return the name of the network whose address is given.
597 * The address is assumed to be that of a net or subnet, not a host.
598 */
599 const char *
600 netname(struct sockaddr *sa, struct sockaddr *nm)
601 {
602 const char *cp = 0;
603 static char line[50];
604 struct netent *np = 0;
605 u_int32_t net, mask;
606 u_int32_t i;
607 int subnetshift, nml;
608 struct in_addr in;
609
610 switch (sa->sa_family) {
611
612 case AF_INET:
613 in = ((struct sockaddr_in *)sa)->sin_addr;
614 i = ntohl(in.s_addr);
615 nml = netmask_length(nm, AF_INET);
616 if (i == 0) {
617 if (nml == 0)
618 cp = "default";
619 else {
620 static char notdefault[sizeof(NOTDEFSTRING)];
621
622 snprintf(notdefault, sizeof(notdefault),
623 "0.0.0.0/%s", netmask_string(nm, nml));
624 cp = notdefault;
625 }
626 }
627 else if (!nflag) {
628 if (IN_CLASSA(i)) {
629 mask = IN_CLASSA_NET;
630 subnetshift = 8;
631 } else if (IN_CLASSB(i)) {
632 mask = IN_CLASSB_NET;
633 subnetshift = 8;
634 } else {
635 mask = IN_CLASSC_NET;
636 subnetshift = 4;
637 }
638 /*
639 * If there are more bits than the standard mask
640 * would suggest, subnets must be in use.
641 * Guess at the subnet mask, assuming reasonable
642 * width subnet fields.
643 */
644 while (i &~ mask)
645 mask = (int32_t)mask >> subnetshift;
646 net = i & mask;
647 while ((mask & 1) == 0)
648 mask >>= 1, net >>= 1;
649 np = getnetbyaddr(net, AF_INET);
650 if (np)
651 cp = np->n_name;
652 }
653 if (cp)
654 (void)strlcpy(line, cp, sizeof(line));
655 else {
656 #if 0 /* XXX - This is silly... */
657 #define C(x) ((x) & 0xff)
658 if ((i & 0xffffff) == 0)
659 (void)snprintf(line, sizeof line, "%u",
660 C(i >> 24));
661 else if ((i & 0xffff) == 0)
662 (void)snprintf(line, sizeof line, "%u.%u",
663 C(i >> 24), C(i >> 16));
664 else if ((i & 0xff) == 0)
665 (void)snprintf(line, sizeof line, "%u.%u.%u",
666 C(i >> 24), C(i >> 16), C(i >> 8));
667 else
668 (void)snprintf(line, sizeof line, "%u.%u.%u.%u",
669 C(i >> 24), C(i >> 16), C(i >> 8), C(i));
670 #undef C
671 #else /* XXX */
672 if (nml == 0)
673 strlcpy(line, inet_ntoa(in), sizeof(line));
674 else
675 snprintf(line, sizeof(line), "%s/%d", inet_ntoa(in), nml);
676 #endif /* XXX */
677 }
678 break;
679
680 case AF_LINK:
681 return (link_ntoa((struct sockaddr_dl *)sa));
682
683 #ifndef SMALL
684 #ifdef INET6
685 case AF_INET6:
686 {
687 struct sockaddr_in6 sin6;
688 int niflags;
689
690 niflags = 0;
691 if (nflag)
692 niflags |= NI_NUMERICHOST;
693 memset(&sin6, 0, sizeof(sin6));
694 memcpy(&sin6, sa, sa->sa_len);
695 sin6.sin6_len = sizeof(struct sockaddr_in6);
696 sin6.sin6_family = AF_INET6;
697 #ifdef __KAME__
698 if (sa->sa_len == sizeof(struct sockaddr_in6) &&
699 (IN6_IS_ADDR_LINKLOCAL(&sin6.sin6_addr) ||
700 IN6_IS_ADDR_MC_LINKLOCAL(&sin6.sin6_addr)) &&
701 sin6.sin6_scope_id == 0) {
702 sin6.sin6_scope_id =
703 ntohs(*(u_int16_t *)&sin6.sin6_addr.s6_addr[2]);
704 sin6.sin6_addr.s6_addr[2] = 0;
705 sin6.sin6_addr.s6_addr[3] = 0;
706 }
707 #endif
708 nml = netmask_length(nm, AF_INET6);
709 if (IN6_IS_ADDR_UNSPECIFIED(&sin6.sin6_addr)) {
710 if (nml == 0)
711 strlcpy(line, "::", sizeof(line));
712 else
713 /* noncontiguous never happens in ipv6 */
714 snprintf(line, sizeof(line), "::/%d", nml);
715 }
716
717 else if (getnameinfo((struct sockaddr *)&sin6, sin6.sin6_len,
718 line, sizeof(line), NULL, 0, niflags) != 0)
719 strlcpy(line, "invalid", sizeof(line));
720 break;
721 }
722 #endif
723
724 case AF_NS:
725 return (ns_print((struct sockaddr_ns *)sa));
726
727 case AF_ISO:
728 (void)snprintf(line, sizeof line, "iso %s",
729 iso_ntoa(&((struct sockaddr_iso *)sa)->siso_addr));
730 break;
731
732 case AF_APPLETALK:
733 (void)snprintf(line, sizeof(line), "atalk %d.%d",
734 ((struct sockaddr_at *)sa)->sat_addr.s_net,
735 ((struct sockaddr_at *)sa)->sat_addr.s_node);
736 break;
737 #endif /* SMALL */
738
739 default:
740 (void)snprintf(line, sizeof line, "af %d: %s",
741 sa->sa_family, any_ntoa(sa));
742 break;
743 }
744 return (line);
745 }
746
747 static void
748 set_metric(char *value, int key)
749 {
750 int flag = 0;
751 u_long noval, *valp = &noval;
752
753 switch (key) {
754 #define caseof(x, y, z) case x: valp = &rt_metrics.z; flag = y; break
755 caseof(K_MTU, RTV_MTU, rmx_mtu);
756 caseof(K_HOPCOUNT, RTV_HOPCOUNT, rmx_hopcount);
757 caseof(K_EXPIRE, RTV_EXPIRE, rmx_expire);
758 caseof(K_RECVPIPE, RTV_RPIPE, rmx_recvpipe);
759 caseof(K_SENDPIPE, RTV_SPIPE, rmx_sendpipe);
760 caseof(K_SSTHRESH, RTV_SSTHRESH, rmx_ssthresh);
761 caseof(K_RTT, RTV_RTT, rmx_rtt);
762 caseof(K_RTTVAR, RTV_RTTVAR, rmx_rttvar);
763 }
764 rtm_inits |= flag;
765 if (lockrest || locking)
766 rt_metrics.rmx_locks |= flag;
767 if (locking)
768 locking = 0;
769 *valp = atoi(value);
770 }
771
772 static int
773 newroute(int argc, char **argv)
774 {
775 const char *cmd, *dest = "", *gateway = "";
776 const char *error;
777 int ishost = 0, ret, attempts, oerrno, flags = RTF_STATIC;
778 int key;
779 struct hostent *hp = 0;
780
781 cmd = argv[0];
782 af = 0;
783 if (*cmd != 'g')
784 shutdown(sock, SHUT_RD); /* Don't want to read back our messages */
785 while (--argc > 0) {
786 if (**(++argv)== '-') {
787 switch (key = keyword(1 + *argv)) {
788
789 case K_SA:
790 af = PF_ROUTE;
791 aflen = sizeof(union sockunion);
792 break;
793
794 #ifndef SMALL
795 case K_ATALK:
796 af = AF_APPLETALK;
797 aflen = sizeof(struct sockaddr_at);
798 break;
799 #endif
800
801 case K_INET:
802 af = AF_INET;
803 aflen = sizeof(struct sockaddr_in);
804 break;
805
806 #ifdef INET6
807 case K_INET6:
808 af = AF_INET6;
809 aflen = sizeof(struct sockaddr_in6);
810 break;
811 #endif
812
813 case K_LINK:
814 af = AF_LINK;
815 aflen = sizeof(struct sockaddr_dl);
816 break;
817
818 #ifndef SMALL
819 case K_OSI:
820 case K_ISO:
821 af = AF_ISO;
822 aflen = sizeof(struct sockaddr_iso);
823 break;
824
825 case K_X25:
826 af = AF_CCITT;
827 aflen = sizeof(struct sockaddr_x25);
828 break;
829
830 case K_XNS:
831 af = AF_NS;
832 aflen = sizeof(struct sockaddr_ns);
833 break;
834 #endif /* SMALL */
835
836 case K_IFACE:
837 case K_INTERFACE:
838 iflag++;
839 break;
840 case K_NOSTATIC:
841 flags &= ~RTF_STATIC;
842 break;
843 case K_LLINFO:
844 flags |= RTF_LLINFO;
845 break;
846 case K_LOCK:
847 locking = 1;
848 break;
849 case K_LOCKREST:
850 lockrest = 1;
851 break;
852 case K_HOST:
853 forcehost++;
854 break;
855 case K_REJECT:
856 flags |= RTF_REJECT;
857 break;
858 case K_BLACKHOLE:
859 flags |= RTF_BLACKHOLE;
860 break;
861 case K_CLONED:
862 flags |= RTF_CLONED;
863 break;
864 case K_PROTO1:
865 flags |= RTF_PROTO1;
866 break;
867 case K_PROTO2:
868 flags |= RTF_PROTO2;
869 break;
870 case K_CLONING:
871 flags |= RTF_CLONING;
872 break;
873 case K_XRESOLVE:
874 flags |= RTF_XRESOLVE;
875 break;
876 case K_STATIC:
877 flags |= RTF_STATIC;
878 break;
879 case K_IFA:
880 if (!--argc)
881 usage(1+*argv);
882 (void)getaddr(RTA_IFA, *++argv, 0);
883 break;
884 case K_IFP:
885 if (!--argc)
886 usage(1+*argv);
887 (void)getaddr(RTA_IFP, *++argv, 0);
888 break;
889 case K_GENMASK:
890 if (!--argc)
891 usage(1+*argv);
892 (void)getaddr(RTA_GENMASK, *++argv, 0);
893 break;
894 case K_GATEWAY:
895 if (!--argc)
896 usage(1+*argv);
897 (void)getaddr(RTA_GATEWAY, *++argv, 0);
898 break;
899 case K_DST:
900 if (!--argc)
901 usage(1+*argv);
902 ishost = getaddr(RTA_DST, *++argv, &hp);
903 dest = *argv;
904 break;
905 case K_NETMASK:
906 if (!--argc)
907 usage(1+*argv);
908 (void)getaddr(RTA_NETMASK, *++argv, 0);
909 /* FALLTHROUGH */
910 case K_NET:
911 forcenet++;
912 break;
913 case K_PREFIXLEN:
914 if (!--argc)
915 usage(1+*argv);
916 ishost = prefixlen(*++argv);
917 break;
918 case K_MTU:
919 case K_HOPCOUNT:
920 case K_EXPIRE:
921 case K_RECVPIPE:
922 case K_SENDPIPE:
923 case K_SSTHRESH:
924 case K_RTT:
925 case K_RTTVAR:
926 if (!--argc)
927 usage(1+*argv);
928 set_metric(*++argv, key);
929 break;
930 default:
931 usage(1+*argv);
932 }
933 } else {
934 if ((rtm_addrs & RTA_DST) == 0) {
935 dest = *argv;
936 ishost = getaddr(RTA_DST, *argv, &hp);
937 } else if ((rtm_addrs & RTA_GATEWAY) == 0) {
938 gateway = *argv;
939 (void)getaddr(RTA_GATEWAY, *argv, &hp);
940 } else {
941 ret = atoi(*argv);
942
943 if (ret == 0) {
944 if (strcmp(*argv, "0") == 0) {
945 if (!qflag) {
946 warnx("%s, %s",
947 "old usage of trailing 0",
948 "assuming route to if");
949 }
950 } else
951 usage((char *)NULL);
952 iflag = 1;
953 continue;
954 } else if (ret > 0 && ret < 10) {
955 if (!qflag) {
956 warnx("%s, %s",
957 "old usage of trailing digit",
958 "assuming route via gateway");
959 }
960 iflag = 0;
961 continue;
962 }
963 (void)getaddr(RTA_NETMASK, *argv, 0);
964 }
965 }
966 }
967 if (forcehost && forcenet)
968 errx(1, "-host and -net conflict");
969 else if (forcehost)
970 ishost = 1;
971 else if (forcenet)
972 ishost = 0;
973 flags |= RTF_UP;
974 if (ishost)
975 flags |= RTF_HOST;
976 if (iflag == 0)
977 flags |= RTF_GATEWAY;
978 for (attempts = 1; ; attempts++) {
979 errno = 0;
980 if ((ret = rtmsg(*cmd, flags)) == 0)
981 break;
982 if (errno != ENETUNREACH && errno != ESRCH)
983 break;
984 if (af == AF_INET && *gateway && hp && hp->h_addr_list[1]) {
985 hp->h_addr_list++;
986 memmove(&so_gate.sin.sin_addr, hp->h_addr_list[0],
987 hp->h_length);
988 } else
989 break;
990 }
991 if (*cmd == 'g')
992 return rv;
993 if (!qflag) {
994 oerrno = errno;
995 (void)printf("%s %s %s", cmd, ishost? "host" : "net", dest);
996 if (*gateway) {
997 (void)printf(": gateway %s", gateway);
998 if (attempts > 1 && ret == 0 && af == AF_INET)
999 (void)printf(" (%s)",
1000 inet_ntoa(so_gate.sin.sin_addr));
1001 }
1002 if (ret == 0)
1003 (void)printf("\n");
1004 else {
1005 switch (oerrno) {
1006 case ESRCH:
1007 error = "not in table";
1008 break;
1009 case EBUSY:
1010 error = "entry in use";
1011 break;
1012 case ENOBUFS:
1013 error = "routing table overflow";
1014 break;
1015 default:
1016 error = strerror(oerrno);
1017 break;
1018 }
1019 (void)printf(": %s\n", error);
1020 }
1021 }
1022 return (ret != 0);
1023 }
1024
1025 static void
1026 inet_makenetandmask(u_int32_t net, struct sockaddr_in *isin)
1027 {
1028 u_int32_t addr, mask = 0;
1029 char *cp;
1030
1031 rtm_addrs |= RTA_NETMASK;
1032 if (net == 0)
1033 mask = addr = 0;
1034 else if (net < 128) {
1035 addr = net << IN_CLASSA_NSHIFT;
1036 mask = IN_CLASSA_NET;
1037 } else if (net < 192) {
1038 addr = net << IN_CLASSA_NSHIFT;
1039 mask = IN_CLASSB_NET;
1040 } else if (net < 224) {
1041 addr = net << IN_CLASSA_NSHIFT;
1042 mask = IN_CLASSC_NET;
1043 } else if (net < 256) {
1044 addr = net << IN_CLASSA_NSHIFT;
1045 mask = IN_CLASSD_NET;
1046 } else if (net < 49152) { /* 192 * 256 */
1047 addr = net << IN_CLASSB_NSHIFT;
1048 mask = IN_CLASSB_NET;
1049 } else if (net < 57344) { /* 224 * 256 */
1050 addr = net << IN_CLASSB_NSHIFT;
1051 mask = IN_CLASSC_NET;
1052 } else if (net < 65536) {
1053 addr = net << IN_CLASSB_NSHIFT;
1054 mask = IN_CLASSB_NET;
1055 } else if (net < 14680064L) { /* 224 * 65536 */
1056 addr = net << IN_CLASSC_NSHIFT;
1057 mask = IN_CLASSC_NET;
1058 } else if (net < 16777216L) {
1059 addr = net << IN_CLASSC_NSHIFT;
1060 mask = IN_CLASSD_NET;
1061 } else {
1062 addr = net;
1063 if ((addr & IN_CLASSA_HOST) == 0)
1064 mask = IN_CLASSA_NET;
1065 else if ((addr & IN_CLASSB_HOST) == 0)
1066 mask = IN_CLASSB_NET;
1067 else if ((addr & IN_CLASSC_HOST) == 0)
1068 mask = IN_CLASSC_NET;
1069 else
1070 mask = -1;
1071 }
1072 isin->sin_addr.s_addr = htonl(addr);
1073 isin = &so_mask.sin;
1074 isin->sin_addr.s_addr = htonl(mask);
1075 isin->sin_len = 0;
1076 isin->sin_family = 0;
1077 cp = (char *)(&isin->sin_addr + 1);
1078 while (*--cp == 0 && cp > (char *)isin)
1079 ;
1080 isin->sin_len = 1 + cp - (char *)isin;
1081 }
1082
1083 #ifdef INET6
1084 /*
1085 * XXX the function may need more improvement...
1086 */
1087 static int
1088 inet6_makenetandmask(struct sockaddr_in6 *sin6)
1089 {
1090 const char *plen;
1091 struct in6_addr in6;
1092
1093 plen = NULL;
1094 if (IN6_IS_ADDR_UNSPECIFIED(&sin6->sin6_addr) &&
1095 sin6->sin6_scope_id == 0) {
1096 plen = "0";
1097 } else if ((sin6->sin6_addr.s6_addr[0] & 0xe0) == 0x20) {
1098 /* aggregatable global unicast - RFC2374 */
1099 memset(&in6, 0, sizeof(in6));
1100 if (!memcmp(&sin6->sin6_addr.s6_addr[8], &in6.s6_addr[8], 8))
1101 plen = "64";
1102 }
1103
1104 if (!plen || strcmp(plen, "128") == 0)
1105 return 1;
1106 else {
1107 rtm_addrs |= RTA_NETMASK;
1108 (void)prefixlen(plen);
1109 return 0;
1110 }
1111 }
1112 #endif
1113
1114 /*
1115 * Interpret an argument as a network address of some kind,
1116 * returning 1 if a host address, 0 if a network address.
1117 */
1118 static int
1119 getaddr(int which, char *s, struct hostent **hpp)
1120 {
1121 sup su;
1122 struct hostent *hp;
1123 struct netent *np;
1124 u_int32_t val;
1125 char *t;
1126 int afamily; /* local copy of af so we can change it */
1127
1128 if (af == 0) {
1129 af = AF_INET;
1130 aflen = sizeof(struct sockaddr_in);
1131 }
1132 afamily = af;
1133 rtm_addrs |= which;
1134 switch (which) {
1135 case RTA_DST:
1136 su = &so_dst;
1137 break;
1138 case RTA_GATEWAY:
1139 su = &so_gate;
1140 break;
1141 case RTA_NETMASK:
1142 su = &so_mask;
1143 break;
1144 case RTA_GENMASK:
1145 su = &so_genmask;
1146 break;
1147 case RTA_IFP:
1148 su = &so_ifp;
1149 afamily = AF_LINK;
1150 break;
1151 case RTA_IFA:
1152 su = &so_ifa;
1153 su->sa.sa_family = af;
1154 break;
1155 default:
1156 su = NULL;
1157 usage("Internal Error");
1158 /*NOTREACHED*/
1159 }
1160 su->sa.sa_len = aflen;
1161 su->sa.sa_family = afamily; /* cases that don't want it have left already */
1162 if (strcmp(s, "default") == 0) {
1163 switch (which) {
1164 case RTA_DST:
1165 forcenet++;
1166 (void)getaddr(RTA_NETMASK, s, 0);
1167 break;
1168 case RTA_NETMASK:
1169 case RTA_GENMASK:
1170 su->sa.sa_len = 0;
1171 }
1172 return (0);
1173 }
1174 switch (afamily) {
1175 #ifndef SMALL
1176 #ifdef INET6
1177 case AF_INET6:
1178 {
1179 struct addrinfo hints, *res;
1180 char *slash = 0;
1181
1182 if (which == RTA_DST && (slash = (strrchr(s, '/'))) != 0)
1183 *slash = '\0';
1184 memset(&hints, 0, sizeof(hints));
1185 hints.ai_family = afamily; /*AF_INET6*/
1186 hints.ai_flags = AI_NUMERICHOST;
1187 hints.ai_socktype = SOCK_DGRAM; /*dummy*/
1188 if (getaddrinfo(s, "0", &hints, &res) != 0) {
1189 hints.ai_flags = 0;
1190 if (slash) {
1191 *slash = '/';
1192 slash = 0;
1193 }
1194 if (getaddrinfo(s, "0", &hints, &res) != 0)
1195 errx(1, "bad value: %s", s);
1196 }
1197 if (slash)
1198 *slash = '/';
1199 if (sizeof(su->sin6) != res->ai_addrlen)
1200 errx(1, "%s: bad value", s);
1201 if (res->ai_next)
1202 errx(1, "address resolved to multiple values: %s", s);
1203 memcpy(&su->sin6, res->ai_addr, sizeof(su->sin6));
1204 freeaddrinfo(res);
1205 #ifdef __KAME__
1206 if ((IN6_IS_ADDR_LINKLOCAL(&su->sin6.sin6_addr) ||
1207 IN6_IS_ADDR_MC_LINKLOCAL(&su->sin6.sin6_addr)) &&
1208 su->sin6.sin6_scope_id) {
1209 *(u_int16_t *)&su->sin6.sin6_addr.s6_addr[2] =
1210 htons(su->sin6.sin6_scope_id);
1211 su->sin6.sin6_scope_id = 0;
1212 }
1213 #endif
1214 if (hints.ai_flags == AI_NUMERICHOST) {
1215 if (slash)
1216 return (prefixlen(slash + 1));
1217 if (which == RTA_DST)
1218 return (inet6_makenetandmask(&su->sin6));
1219 return (0);
1220 } else
1221 return (1);
1222 }
1223 #endif
1224
1225 case AF_NS:
1226 if (which == RTA_DST) {
1227 struct sockaddr_ns *sms = &(so_mask.sns);
1228 memset(sms, 0, sizeof(*sms));
1229 sms->sns_family = 0;
1230 sms->sns_len = 6;
1231 sms->sns_addr.x_net = *(union ns_net *)ns_bh;
1232 rtm_addrs |= RTA_NETMASK;
1233 }
1234 su->sns.sns_addr = ns_addr(s);
1235 return (!ns_nullhost(su->sns.sns_addr));
1236
1237 case AF_OSI:
1238 su->siso.siso_addr = *iso_addr(s);
1239 if (which == RTA_NETMASK || which == RTA_GENMASK) {
1240 char *cp = (char *)TSEL(&su->siso);
1241 su->siso.siso_nlen = 0;
1242 do {--cp ;} while ((cp > (char *)su) && (*cp == 0));
1243 su->siso.siso_len = 1 + cp - (char *)su;
1244 }
1245 return (1);
1246
1247 case AF_CCITT:
1248 ccitt_addr(s, &su->sx25);
1249 return (which == RTA_DST ? x25_makemask() : 1);
1250 #endif /* SMALL */
1251
1252 case PF_ROUTE:
1253 su->sa.sa_len = sizeof(*su);
1254 sockaddr(s, &su->sa);
1255 return (1);
1256
1257 #ifndef SMALL
1258 case AF_APPLETALK:
1259 t = strchr (s, '.');
1260 if (!t) {
1261 badataddr:
1262 errx(1, "bad address: %s", s);
1263 }
1264 val = atoi (s);
1265 if (val > 65535)
1266 goto badataddr;
1267 su->sat.sat_addr.s_net = val;
1268 val = atoi (t);
1269 if (val > 256)
1270 goto badataddr;
1271 su->sat.sat_addr.s_node = val;
1272 rtm_addrs |= RTA_NETMASK;
1273 return(forcehost || su->sat.sat_addr.s_node != 0);
1274 #endif
1275
1276 case AF_LINK:
1277 link_addr(s, &su->sdl);
1278 return (1);
1279
1280 case AF_INET:
1281 default:
1282 break;
1283 }
1284
1285 if (hpp == NULL)
1286 hpp = &hp;
1287 *hpp = NULL;
1288
1289 if ((t = strchr(s, '/')) != NULL && which == RTA_DST) {
1290 *t = '\0';
1291 if (forcenet == 0) {
1292 if ((val = inet_addr(s)) != INADDR_NONE) {
1293 inet_makenetandmask(htonl(val), &su->sin);
1294 return prefixlen(&t[1]);
1295 }
1296 } else {
1297 if ((val = inet_network(s)) != INADDR_NONE) {
1298 inet_makenetandmask(val, &su->sin);
1299 return prefixlen(&t[1]);
1300 }
1301 }
1302 *t = '/';
1303 }
1304 if (inet_aton(s, &su->sin.sin_addr) &&
1305 (which != RTA_DST || forcenet == 0)) {
1306 val = su->sin.sin_addr.s_addr;
1307 if (inet_lnaof(su->sin.sin_addr) != INADDR_ANY)
1308 return (1);
1309 else {
1310 val = ntohl(val);
1311 goto netdone;
1312 }
1313 }
1314 if ((val = inet_network(s)) != INADDR_NONE ||
1315 ((np = getnetbyname(s)) != NULL && (val = np->n_net) != 0)) {
1316 netdone:
1317 if (which == RTA_DST)
1318 inet_makenetandmask(val, &su->sin);
1319 return (0);
1320 }
1321 hp = gethostbyname(s);
1322 if (hp) {
1323 *hpp = hp;
1324 su->sin.sin_family = hp->h_addrtype;
1325 memmove(&su->sin.sin_addr, hp->h_addr, hp->h_length);
1326 return (1);
1327 }
1328 errx(1, "bad value: %s", s);
1329 }
1330
1331 int
1332 prefixlen(const char *s)
1333 {
1334 int len = atoi(s), q, r;
1335 int max;
1336
1337 switch (af) {
1338 case AF_INET:
1339 max = sizeof(struct in_addr) * 8;
1340 break;
1341 #ifdef INET6
1342 case AF_INET6:
1343 max = sizeof(struct in6_addr) * 8;
1344 break;
1345 #endif
1346 default:
1347 errx(1, "prefixlen is not supported with af %d", af);
1348 }
1349
1350 rtm_addrs |= RTA_NETMASK;
1351 if (len < -1 || len > max)
1352 errx(1, "bad value: %s", s);
1353
1354 q = len >> 3;
1355 r = len & 7;
1356 switch (af) {
1357 case AF_INET:
1358 memset(&so_mask, 0, sizeof(so_mask));
1359 so_mask.sin.sin_family = AF_INET;
1360 so_mask.sin.sin_len = sizeof(struct sockaddr_in);
1361 so_mask.sin.sin_addr.s_addr = htonl(0xffffffff << (32 - len));
1362 break;
1363 #ifdef INET6
1364 case AF_INET6:
1365 so_mask.sin6.sin6_family = AF_INET6;
1366 so_mask.sin6.sin6_len = sizeof(struct sockaddr_in6);
1367 memset((void *)&so_mask.sin6.sin6_addr, 0,
1368 sizeof(so_mask.sin6.sin6_addr));
1369 if (q > 0)
1370 memset((void *)&so_mask.sin6.sin6_addr, 0xff, q);
1371 if (r > 0)
1372 *((u_char *)&so_mask.sin6.sin6_addr + q) =
1373 (0xff00 >> r) & 0xff;
1374 break;
1375 #endif
1376 }
1377 return (len == max);
1378 }
1379
1380 #ifndef SMALL
1381 int
1382 x25_makemask(void)
1383 {
1384 char *cp;
1385
1386 if ((rtm_addrs & RTA_NETMASK) == 0) {
1387 rtm_addrs |= RTA_NETMASK;
1388 for (cp = (char *)&so_mask.sx25.x25_net;
1389 cp < &so_mask.sx25.x25_opts.op_flags; cp++)
1390 *cp = -1;
1391 so_mask.sx25.x25_len = (u_char)&(((sup)0)->sx25.x25_opts);
1392 }
1393 return 0;
1394 }
1395
1396
1397 const char *
1398 ns_print(struct sockaddr_ns *sns)
1399 {
1400 struct ns_addr work;
1401 union { union ns_net net_e; u_int32_t int32_t_e; } net;
1402 u_short port;
1403 static char mybuf[50], cport[10], chost[25];
1404 const char *host = "";
1405 char *p;
1406 u_char *q;
1407
1408 work = sns->sns_addr;
1409 port = ntohs(work.x_port);
1410 work.x_port = 0;
1411 net.net_e = work.x_net;
1412 if (ns_nullhost(work) && net.int32_t_e == 0) {
1413 if (!port)
1414 return ("*.*");
1415 (void)snprintf(mybuf, sizeof mybuf, "*.%XH", port);
1416 return (mybuf);
1417 }
1418
1419 if (memcmp(ns_bh, work.x_host.c_host, 6) == 0)
1420 host = "any";
1421 else if (memcmp(ns_nullh, work.x_host.c_host, 6) == 0)
1422 host = "*";
1423 else {
1424 q = work.x_host.c_host;
1425 (void)snprintf(chost, sizeof chost, "%02X%02X%02X%02X%02X%02XH",
1426 q[0], q[1], q[2], q[3], q[4], q[5]);
1427 for (p = chost; *p == '0' && p < chost + 12; p++)
1428 /* void */;
1429 host = p;
1430 }
1431 if (port)
1432 (void)snprintf(cport, sizeof cport, ".%XH", htons(port));
1433 else
1434 *cport = 0;
1435
1436 (void)snprintf(mybuf, sizeof mybuf, "%XH.%s%s",
1437 (u_int32_t)ntohl(net.int32_t_e), host, cport);
1438 return (mybuf);
1439 }
1440
1441 static void
1442 interfaces(void)
1443 {
1444 size_t needed;
1445 int mib[6];
1446 char *buf, *lim, *next;
1447 struct rt_msghdr *rtm;
1448
1449 mib[0] = CTL_NET;
1450 mib[1] = PF_ROUTE;
1451 mib[2] = 0; /* protocol */
1452 mib[3] = 0; /* wildcard address family */
1453 mib[4] = NET_RT_IFLIST;
1454 mib[5] = 0; /* no flags */
1455 if (sysctl(mib, 6, NULL, &needed, NULL, 0) < 0)
1456 err(1, "route-sysctl-estimate");
1457 if ((buf = malloc(needed)) == NULL)
1458 err(1, "malloc");
1459 if (sysctl(mib, 6, buf, &needed, NULL, 0) < 0)
1460 err(1, "actual retrieval of interface table");
1461 lim = buf + needed;
1462 for (next = buf; next < lim; next += rtm->rtm_msglen) {
1463 rtm = (struct rt_msghdr *)next;
1464 print_rtmsg(rtm, rtm->rtm_msglen);
1465 }
1466 }
1467
1468 static void
1469 monitor(void)
1470 {
1471 int n;
1472 char msg[2048];
1473
1474 verbose = 1;
1475 if (debugonly) {
1476 interfaces();
1477 exit(0);
1478 }
1479 for(;;) {
1480 time_t now;
1481 n = read(sock, msg, 2048);
1482 now = time(NULL);
1483 (void)printf("got message of size %d on %s", n, ctime(&now));
1484 print_rtmsg((struct rt_msghdr *)msg, n);
1485 }
1486 }
1487
1488 #endif /* SMALL */
1489
1490
1491 struct {
1492 struct rt_msghdr m_rtm;
1493 char m_space[512];
1494 } m_rtmsg;
1495
1496 static int
1497 rtmsg(int cmd, int flags)
1498 {
1499 static int seq;
1500 int rlen;
1501 char *cp = m_rtmsg.m_space;
1502 int l;
1503
1504 #define NEXTADDR(w, u) \
1505 if (rtm_addrs & (w)) {\
1506 l = ROUNDUP(u.sa.sa_len); memmove(cp, &(u), l); cp += l;\
1507 if (verbose && ! shortoutput) sodump(&(u),#u);\
1508 }
1509
1510 errno = 0;
1511 memset(&m_rtmsg, 0, sizeof(m_rtmsg));
1512 if (cmd == 'a')
1513 cmd = RTM_ADD;
1514 else if (cmd == 'c')
1515 cmd = RTM_CHANGE;
1516 else if (cmd == 'g') {
1517 #ifdef SMALL
1518 return (-1);
1519 #else /* SMALL */
1520 cmd = RTM_GET;
1521 if (so_ifp.sa.sa_family == 0) {
1522 so_ifp.sa.sa_family = AF_LINK;
1523 so_ifp.sa.sa_len = sizeof(struct sockaddr_dl);
1524 rtm_addrs |= RTA_IFP;
1525 }
1526 #endif /* SMALL */
1527 } else
1528 cmd = RTM_DELETE;
1529 #define rtm m_rtmsg.m_rtm
1530 rtm.rtm_type = cmd;
1531 rtm.rtm_flags = flags;
1532 rtm.rtm_version = RTM_VERSION;
1533 rtm.rtm_seq = ++seq;
1534 rtm.rtm_addrs = rtm_addrs;
1535 rtm.rtm_rmx = rt_metrics;
1536 rtm.rtm_inits = rtm_inits;
1537
1538 if (rtm_addrs & RTA_NETMASK)
1539 mask_addr();
1540 NEXTADDR(RTA_DST, so_dst);
1541 NEXTADDR(RTA_GATEWAY, so_gate);
1542 NEXTADDR(RTA_NETMASK, so_mask);
1543 NEXTADDR(RTA_GENMASK, so_genmask);
1544 NEXTADDR(RTA_IFP, so_ifp);
1545 NEXTADDR(RTA_IFA, so_ifa);
1546 rtm.rtm_msglen = l = cp - (char *)&m_rtmsg;
1547 if (verbose && ! shortoutput)
1548 print_rtmsg(&rtm, l);
1549 if (debugonly)
1550 return (0);
1551 if ((rlen = write(sock, (char *)&m_rtmsg, l)) < 0) {
1552 warn("writing to routing socket");
1553 return (-1);
1554 }
1555 #ifndef SMALL
1556 if (cmd == RTM_GET) {
1557 do {
1558 l = read(sock, (char *)&m_rtmsg, sizeof(m_rtmsg));
1559 } while (l > 0 && (rtm.rtm_seq != seq || rtm.rtm_pid != pid));
1560 if (l < 0)
1561 err(1, "read from routing socket");
1562 else
1563 print_getmsg(&rtm, l);
1564 }
1565 #endif /* SMALL */
1566 #undef rtm
1567 return (0);
1568 }
1569
1570 static void
1571 mask_addr(void)
1572 {
1573 int olen = so_mask.sa.sa_len;
1574 char *cp1 = olen + (char *)&so_mask, *cp2;
1575
1576 for (so_mask.sa.sa_len = 0; cp1 > (char *)&so_mask; )
1577 if (*--cp1 != 0) {
1578 so_mask.sa.sa_len = 1 + cp1 - (char *)&so_mask;
1579 break;
1580 }
1581 if ((rtm_addrs & RTA_DST) == 0)
1582 return;
1583 switch (so_dst.sa.sa_family) {
1584 case AF_INET:
1585 #ifdef INET6
1586 case AF_INET6:
1587 #endif
1588 #ifndef SMALL
1589 case AF_APPLETALK:
1590 case AF_NS:
1591 case AF_CCITT:
1592 #endif /* SMALL */
1593 case 0:
1594 return;
1595 #ifndef SMALL
1596 case AF_ISO:
1597 olen = MIN(so_dst.siso.siso_nlen,
1598 MAX(so_mask.sa.sa_len - 6, 0));
1599 break;
1600 #endif /* SMALL */
1601 }
1602 cp1 = so_mask.sa.sa_len + 1 + (char *)&so_dst;
1603 cp2 = so_dst.sa.sa_len + 1 + (char *)&so_dst;
1604 while (cp2 > cp1)
1605 *--cp2 = 0;
1606 cp2 = so_mask.sa.sa_len + 1 + (char *)&so_mask;
1607 while (cp1 > so_dst.sa.sa_data)
1608 *--cp1 &= *--cp2;
1609 #ifndef SMALL
1610 switch (so_dst.sa.sa_family) {
1611 case AF_ISO:
1612 so_dst.siso.siso_nlen = olen;
1613 break;
1614 }
1615 #endif /* SMALL */
1616 }
1617
1618 const char *msgtypes[] = {
1619 "",
1620 "RTM_ADD: Add Route",
1621 "RTM_DELETE: Delete Route",
1622 "RTM_CHANGE: Change Metrics or flags",
1623 "RTM_GET: Report Metrics",
1624 "RTM_LOSING: Kernel Suspects Partitioning",
1625 "RTM_REDIRECT: Told to use different route",
1626 "RTM_MISS: Lookup failed on this address",
1627 "RTM_LOCK: fix specified metrics",
1628 "RTM_OLDADD: caused by SIOCADDRT",
1629 "RTM_OLDDEL: caused by SIOCDELRT",
1630 "RTM_RESOLVE: Route created by cloning",
1631 "RTM_NEWADDR: address being added to iface",
1632 "RTM_DELADDR: address being removed from iface",
1633 "RTM_OIFINFO: iface status change (pre-1.5)",
1634 "RTM_IFINFO: iface status change",
1635 "RTM_IFANNOUNCE: iface arrival/departure",
1636 "RTM_IEEE80211: IEEE80211 wireless event",
1637 0,
1638 };
1639
1640 char metricnames[] =
1641 "\011pksent\010rttvar\7rtt\6ssthresh\5sendpipe\4recvpipe\3expire\2hopcount\1mtu";
1642 char routeflags[] =
1643 "\1UP\2GATEWAY\3HOST\4REJECT\5DYNAMIC\6MODIFIED\7DONE\010MASK_PRESENT\011CLONING\012XRESOLVE\013LLINFO\014STATIC\015BLACKHOLE\016CLONED\017PROTO2\020PROTO1";
1644 char ifnetflags[] =
1645 "\1UP\2BROADCAST\3DEBUG\4LOOPBACK\5PTP\6NOTRAILERS\7RUNNING\010NOARP\011PPROMISC\012ALLMULTI\013OACTIVE\014SIMPLEX\015LINK0\016LINK1\017LINK2\020MULTICAST";
1646 char addrnames[] =
1647 "\1DST\2GATEWAY\3NETMASK\4GENMASK\5IFP\6IFA\7AUTHOR\010BRD";
1648
1649
1650 #ifndef SMALL
1651 static const char *
1652 linkstate(struct if_msghdr *ifm)
1653 {
1654 static char buf[64];
1655
1656 switch (ifm->ifm_data.ifi_link_state) {
1657 case LINK_STATE_UNKNOWN:
1658 return "carrier: unknown";
1659 case LINK_STATE_DOWN:
1660 return "carrier: no carrier";
1661 case LINK_STATE_UP:
1662 return "carrier: active";
1663 default:
1664 (void)snprintf(buf, sizeof(buf), "carrier: 0x%x",
1665 ifm->ifm_data.ifi_link_state);
1666 return buf;
1667 }
1668 }
1669 #endif /* SMALL */
1670
1671 static void
1672 print_rtmsg(struct rt_msghdr *rtm, int msglen)
1673 {
1674 struct if_msghdr *ifm;
1675 struct ifa_msghdr *ifam;
1676 struct if_announcemsghdr *ifan;
1677 union {
1678 struct ieee80211_join_event join;
1679 struct ieee80211_leave_event leave;
1680 struct ieee80211_replay_event replay;
1681 struct ieee80211_michael_event michael;
1682 } ev;
1683 size_t evlen = 0;
1684
1685 if (verbose == 0)
1686 return;
1687 if (rtm->rtm_version != RTM_VERSION) {
1688 (void)printf("routing message version %d not understood\n",
1689 rtm->rtm_version);
1690 return;
1691 }
1692 if (msgtypes[rtm->rtm_type])
1693 (void)printf("%s: ", msgtypes[rtm->rtm_type]);
1694 else
1695 (void)printf("#%d: ", rtm->rtm_type);
1696 (void)printf("len %d, ", rtm->rtm_msglen);
1697 switch (rtm->rtm_type) {
1698 case RTM_IFINFO:
1699 ifm = (struct if_msghdr *)rtm;
1700 (void)printf("if# %d, %s, flags:", ifm->ifm_index,
1701 #ifdef SMALL
1702 ""
1703 #else
1704 linkstate(ifm)
1705 #endif /* SMALL */
1706 );
1707 bprintf(stdout, ifm->ifm_flags, ifnetflags);
1708 pmsg_addrs((char *)(ifm + 1), ifm->ifm_addrs);
1709 break;
1710 case RTM_NEWADDR:
1711 case RTM_DELADDR:
1712 ifam = (struct ifa_msghdr *)rtm;
1713 (void)printf("metric %d, flags:", ifam->ifam_metric);
1714 bprintf(stdout, ifam->ifam_flags, routeflags);
1715 pmsg_addrs((char *)(ifam + 1), ifam->ifam_addrs);
1716 break;
1717 case RTM_IEEE80211:
1718 ifan = (struct if_announcemsghdr *)rtm;
1719 (void)printf("if# %d, what: ", ifan->ifan_index);
1720 switch (ifan->ifan_what) {
1721 case RTM_IEEE80211_ASSOC:
1722 printf("associate");
1723 break;
1724 case RTM_IEEE80211_REASSOC:
1725 printf("re-associate");
1726 break;
1727 case RTM_IEEE80211_DISASSOC:
1728 printf("disassociate");
1729 break;
1730 case RTM_IEEE80211_SCAN:
1731 printf("scan complete");
1732 break;
1733 case RTM_IEEE80211_JOIN:
1734 evlen = sizeof(ev.join);
1735 printf("join");
1736 break;
1737 case RTM_IEEE80211_LEAVE:
1738 evlen = sizeof(ev.leave);
1739 printf("leave");
1740 break;
1741 case RTM_IEEE80211_MICHAEL:
1742 evlen = sizeof(ev.michael);
1743 printf("michael");
1744 break;
1745 case RTM_IEEE80211_REPLAY:
1746 evlen = sizeof(ev.replay);
1747 printf("replay");
1748 break;
1749 default:
1750 evlen = 0;
1751 printf("#%d", ifan->ifan_what);
1752 break;
1753 }
1754 if (sizeof(*ifan) + evlen > ifan->ifan_msglen) {
1755 printf(" (truncated)\n");
1756 break;
1757 }
1758 (void)memcpy(&ev, (ifan + 1), evlen);
1759 switch (ifan->ifan_what) {
1760 case RTM_IEEE80211_JOIN:
1761 case RTM_IEEE80211_LEAVE:
1762 printf(" mac %" PRIETHER,
1763 PRIETHER_ARGS(ev.join.iev_addr));
1764 break;
1765 case RTM_IEEE80211_REPLAY:
1766 case RTM_IEEE80211_MICHAEL:
1767 printf(" src %" PRIETHER " dst %" PRIETHER
1768 " cipher %" PRIu8 " keyix %" PRIu8,
1769 PRIETHER_ARGS(ev.replay.iev_src),
1770 PRIETHER_ARGS(ev.replay.iev_dst),
1771 ev.replay.iev_cipher,
1772 ev.replay.iev_keyix);
1773 if (ifan->ifan_what == RTM_IEEE80211_REPLAY) {
1774 printf(" key rsc %#" PRIx64
1775 " frame rsc %#" PRIx64,
1776 ev.replay.iev_keyrsc, ev.replay.iev_rsc);
1777 }
1778 break;
1779 default:
1780 break;
1781 }
1782 printf("\n");
1783 break;
1784 case RTM_IFANNOUNCE:
1785 ifan = (struct if_announcemsghdr *)rtm;
1786 (void)printf("if# %d, what: ", ifan->ifan_index);
1787 switch (ifan->ifan_what) {
1788 case IFAN_ARRIVAL:
1789 printf("arrival");
1790 break;
1791 case IFAN_DEPARTURE:
1792 printf("departure");
1793 break;
1794 default:
1795 printf("#%d", ifan->ifan_what);
1796 break;
1797 }
1798 printf("\n");
1799 break;
1800 default:
1801 (void)printf("pid: %d, seq %d, errno %d, flags:",
1802 rtm->rtm_pid, rtm->rtm_seq, rtm->rtm_errno);
1803 bprintf(stdout, rtm->rtm_flags, routeflags);
1804 pmsg_common(rtm);
1805 }
1806 }
1807
1808 #ifndef SMALL
1809 static void
1810 print_getmsg(struct rt_msghdr *rtm, int msglen)
1811 {
1812 struct sockaddr *dst = NULL, *gate = NULL, *mask = NULL, *ifa = NULL;
1813 struct sockaddr_dl *ifp = NULL;
1814 struct sockaddr *sa;
1815 char *cp;
1816 int i;
1817
1818 if (! shortoutput)
1819 (void)printf(" route to: %s\n",
1820 routename((struct sockaddr *) &so_dst, NULL, RTF_HOST));
1821 if (rtm->rtm_version != RTM_VERSION) {
1822 warnx("routing message version %d not understood",
1823 rtm->rtm_version);
1824 return;
1825 }
1826 if (rtm->rtm_msglen > msglen) {
1827 warnx("message length mismatch, in packet %d, returned %d",
1828 rtm->rtm_msglen, msglen);
1829 }
1830 if (rtm->rtm_errno) {
1831 warn("RTM_GET");
1832 return;
1833 }
1834 cp = ((char *)(rtm + 1));
1835 if (rtm->rtm_addrs)
1836 for (i = 1; i; i <<= 1)
1837 if (i & rtm->rtm_addrs) {
1838 sa = (struct sockaddr *)cp;
1839 switch (i) {
1840 case RTA_DST:
1841 dst = sa;
1842 break;
1843 case RTA_GATEWAY:
1844 gate = sa;
1845 break;
1846 case RTA_NETMASK:
1847 mask = sa;
1848 break;
1849 case RTA_IFP:
1850 if (sa->sa_family == AF_LINK &&
1851 ((struct sockaddr_dl *)sa)->sdl_nlen)
1852 ifp = (struct sockaddr_dl *)sa;
1853 break;
1854 case RTA_IFA:
1855 ifa = sa;
1856 break;
1857 }
1858 ADVANCE(cp, sa);
1859 }
1860 if (dst && mask)
1861 mask->sa_family = dst->sa_family; /* XXX */
1862 if (dst && ! shortoutput)
1863 (void)printf("destination: %s\n",
1864 routename(dst, mask, RTF_HOST));
1865 if (mask && ! shortoutput) {
1866 int savenflag = nflag;
1867
1868 nflag = 1;
1869 (void)printf(" mask: %s\n",
1870 routename(mask, NULL, RTF_HOST));
1871 nflag = savenflag;
1872 }
1873 if (gate && rtm->rtm_flags & RTF_GATEWAY && ! shortoutput)
1874 (void)printf(" gateway: %s\n",
1875 routename(gate, NULL, RTF_HOST));
1876 if (ifa && ! shortoutput)
1877 (void)printf(" local addr: %s\n",
1878 routename(ifa, NULL, RTF_HOST));
1879 if (ifp && ! shortoutput)
1880 (void)printf(" interface: %.*s\n",
1881 ifp->sdl_nlen, ifp->sdl_data);
1882 if (! shortoutput) {
1883 (void)printf(" flags: ");
1884 bprintf(stdout, rtm->rtm_flags, routeflags);
1885 }
1886
1887 #define lock(f) ((rtm->rtm_rmx.rmx_locks & __CONCAT(RTV_,f)) ? 'L' : ' ')
1888 #define msec(u) (((u) + 500) / 1000) /* usec to msec */
1889
1890 if (! shortoutput) {
1891 (void)printf("\n%s\n", "\
1892 recvpipe sendpipe ssthresh rtt,msec rttvar hopcount mtu expire");
1893 printf("%8ld%c ", rtm->rtm_rmx.rmx_recvpipe, lock(RPIPE));
1894 printf("%8ld%c ", rtm->rtm_rmx.rmx_sendpipe, lock(SPIPE));
1895 printf("%8ld%c ", rtm->rtm_rmx.rmx_ssthresh, lock(SSTHRESH));
1896 printf("%8ld%c ", msec(rtm->rtm_rmx.rmx_rtt), lock(RTT));
1897 printf("%8ld%c ", msec(rtm->rtm_rmx.rmx_rttvar), lock(RTTVAR));
1898 printf("%8ld%c ", rtm->rtm_rmx.rmx_hopcount, lock(HOPCOUNT));
1899 printf("%8ld%c ", rtm->rtm_rmx.rmx_mtu, lock(MTU));
1900 if (rtm->rtm_rmx.rmx_expire)
1901 rtm->rtm_rmx.rmx_expire -= time(0);
1902 printf("%8ld%c\n", rtm->rtm_rmx.rmx_expire, lock(EXPIRE));
1903 }
1904 #undef lock
1905 #undef msec
1906 #define RTA_IGN (RTA_DST|RTA_GATEWAY|RTA_NETMASK|RTA_IFP|RTA_IFA|RTA_BRD)
1907
1908 if ((rtm->rtm_addrs & RTF_GATEWAY) == 0)
1909 rv = 1;
1910 else {
1911 const char *name;
1912 int addrs;
1913
1914 cp = (char *)(rtm + 1);
1915 addrs = rtm->rtm_addrs;
1916
1917 for (i = 1; i; i <<= 1) {
1918 sa = (struct sockaddr *)cp;
1919 if (i == RTF_GATEWAY) {
1920 name = routename(sa, NULL, RTF_HOST);
1921 if (name[0] == '\0')
1922 rv = 1;
1923 else if (shortoutput)
1924 printf("%s\n", name);
1925 }
1926 if (i & addrs)
1927 ADVANCE(cp, sa);
1928 }
1929 }
1930
1931 if (shortoutput)
1932 return;
1933 else if (verbose)
1934 pmsg_common(rtm);
1935 else if (rtm->rtm_addrs &~ RTA_IGN) {
1936 (void)printf("sockaddrs: ");
1937 bprintf(stdout, rtm->rtm_addrs, addrnames);
1938 putchar('\n');
1939 }
1940 #undef RTA_IGN
1941 }
1942 #endif /* SMALL */
1943
1944 void
1945 pmsg_common(struct rt_msghdr *rtm)
1946 {
1947 (void)printf("\nlocks: ");
1948 bprintf(stdout, rtm->rtm_rmx.rmx_locks, metricnames);
1949 (void)printf(" inits: ");
1950 bprintf(stdout, rtm->rtm_inits, metricnames);
1951 pmsg_addrs(((char *)(rtm + 1)), rtm->rtm_addrs);
1952 }
1953
1954 static void
1955 pmsg_addrs(char *cp, int addrs)
1956 {
1957 struct sockaddr *sa;
1958 int i;
1959
1960 if (addrs != 0) {
1961 (void)printf("\nsockaddrs: ");
1962 bprintf(stdout, addrs, addrnames);
1963 (void)putchar('\n');
1964 for (i = 1; i; i <<= 1)
1965 if (i & addrs) {
1966 sa = (struct sockaddr *)cp;
1967 (void)printf(" %s",
1968 routename(sa, NULL, RTF_HOST));
1969 ADVANCE(cp, sa);
1970 }
1971 }
1972 (void)putchar('\n');
1973 (void)fflush(stdout);
1974 }
1975
1976 static void
1977 bprintf(FILE *fp, int b, u_char *s)
1978 {
1979 int i;
1980 int gotsome = 0;
1981
1982 if (b == 0)
1983 return;
1984 while ((i = *s++) != 0) {
1985 if (b & (1 << (i-1))) {
1986 if (gotsome == 0)
1987 i = '<';
1988 else
1989 i = ',';
1990 (void)putc(i, fp);
1991 gotsome = 1;
1992 for (; (i = *s) > 32; s++)
1993 (void)putc(i, fp);
1994 } else
1995 while (*s > 32)
1996 s++;
1997 }
1998 if (gotsome)
1999 (void)putc('>', fp);
2000 }
2001
2002 int
2003 keyword(char *cp)
2004 {
2005 struct keytab *kt = keywords;
2006
2007 while (kt->kt_cp && strcmp(kt->kt_cp, cp))
2008 kt++;
2009 return kt->kt_i;
2010 }
2011
2012 static void
2013 sodump(sup su, const char *which)
2014 {
2015 #ifdef INET6
2016 char ntop_buf[NI_MAXHOST];
2017 #endif
2018
2019 switch (su->sa.sa_family) {
2020 case AF_INET:
2021 (void)printf("%s: inet %s; ",
2022 which, inet_ntoa(su->sin.sin_addr));
2023 break;
2024 #ifndef SMALL
2025 case AF_APPLETALK:
2026 (void)printf("%s: atalk %d.%d; ",
2027 which, su->sat.sat_addr.s_net, su->sat.sat_addr.s_node);
2028 break;
2029 #endif
2030 case AF_LINK:
2031 (void)printf("%s: link %s; ",
2032 which, link_ntoa(&su->sdl));
2033 break;
2034 #ifndef SMALL
2035 #ifdef INET6
2036 case AF_INET6:
2037 (void)printf("%s: inet6 %s; ",
2038 which, inet_ntop(AF_INET6, &su->sin6.sin6_addr,
2039 ntop_buf, sizeof(ntop_buf)));
2040 break;
2041 #endif
2042 case AF_ISO:
2043 (void)printf("%s: iso %s; ",
2044 which, iso_ntoa(&su->siso.siso_addr));
2045 break;
2046 case AF_NS:
2047 (void)printf("%s: xns %s; ",
2048 which, ns_ntoa(su->sns.sns_addr));
2049 break;
2050 #endif /* SMALL */
2051 default:
2052 (void)printf("%s: (%d) %s; ",
2053 which, su->sa.sa_family, any_ntoa(&su->sa));
2054 }
2055 (void)fflush(stdout);
2056 }
2057
2058 /* States*/
2059 #define VIRGIN 0
2060 #define GOTONE 1
2061 #define GOTTWO 2
2062 /* Inputs */
2063 #define DIGIT (4*0)
2064 #define END (4*1)
2065 #define DELIM (4*2)
2066
2067 static void
2068 sockaddr(char *addr, struct sockaddr *sa)
2069 {
2070 char *cp = (char *)sa;
2071 int size = sa->sa_len;
2072 char *cplim = cp + size;
2073 int byte = 0, state = VIRGIN, new = 0;
2074
2075 (void)memset(cp, 0, size);
2076 cp++;
2077 do {
2078 if ((*addr >= '0') && (*addr <= '9')) {
2079 new = *addr - '0';
2080 } else if ((*addr >= 'a') && (*addr <= 'f')) {
2081 new = *addr - 'a' + 10;
2082 } else if ((*addr >= 'A') && (*addr <= 'F')) {
2083 new = *addr - 'A' + 10;
2084 } else if (*addr == 0)
2085 state |= END;
2086 else
2087 state |= DELIM;
2088 addr++;
2089 switch (state /* | INPUT */) {
2090 case GOTTWO | DIGIT:
2091 *cp++ = byte; /*FALLTHROUGH*/
2092 case VIRGIN | DIGIT:
2093 state = GOTONE; byte = new; continue;
2094 case GOTONE | DIGIT:
2095 state = GOTTWO; byte = new + (byte << 4); continue;
2096 default: /* | DELIM */
2097 state = VIRGIN; *cp++ = byte; byte = 0; continue;
2098 case GOTONE | END:
2099 case GOTTWO | END:
2100 *cp++ = byte; /* FALLTHROUGH */
2101 case VIRGIN | END:
2102 break;
2103 }
2104 break;
2105 } while (cp < cplim);
2106 sa->sa_len = cp - (char *)sa;
2107 }
2108