]> git.saurik.com Git - apple/network_cmds.git/blob - route.tproj/route.c
network_cmds-511.tar.gz
[apple/network_cmds.git] / route.tproj / route.c
1 /*
2 * Copyright (c) 2008-2013 Apple Inc. All rights reserved.
3 *
4 * @APPLE_OSREFERENCE_LICENSE_HEADER_START@
5 *
6 * This file contains Original Code and/or Modifications of Original Code
7 * as defined in and that are subject to the Apple Public Source License
8 * Version 2.0 (the 'License'). You may not use this file except in
9 * compliance with the License. The rights granted to you under the License
10 * may not be used to create, or enable the creation or redistribution of,
11 * unlawful or unlicensed copies of an Apple operating system, or to
12 * circumvent, violate, or enable the circumvention or violation of, any
13 * terms of an Apple operating system software license agreement.
14 *
15 * Please obtain a copy of the License at
16 * http://www.opensource.apple.com/apsl/ and read it before using this file.
17 *
18 * The Original Code and all software distributed under the License are
19 * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER
20 * EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES,
21 * INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY,
22 * FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT.
23 * Please see the License for the specific language governing rights and
24 * limitations under the License.
25 *
26 * @APPLE_OSREFERENCE_LICENSE_HEADER_END@
27 */
28 /*
29 * Copyright (c) 1983, 1989, 1991, 1993
30 * The Regents of the University of California. All rights reserved.
31 *
32 * Redistribution and use in source and binary forms, with or without
33 * modification, are permitted provided that the following conditions
34 * are met:
35 * 1. Redistributions of source code must retain the above copyright
36 * notice, this list of conditions and the following disclaimer.
37 * 2. Redistributions in binary form must reproduce the above copyright
38 * notice, this list of conditions and the following disclaimer in the
39 * documentation and/or other materials provided with the distribution.
40 * 3. All advertising materials mentioning features or use of this software
41 * must display the following acknowledgement:
42 * This product includes software developed by the University of
43 * California, Berkeley and its contributors.
44 * 4. Neither the name of the University nor the names of its contributors
45 * may be used to endorse or promote products derived from this software
46 * without specific prior written permission.
47 *
48 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
49 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
50 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
51 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
52 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
53 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
54 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
55 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
56 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
57 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
58 * SUCH DAMAGE.
59 */
60
61 #include <sys/cdefs.h>
62
63 #ifndef lint
64 __unused static const char copyright[] =
65 "@(#) Copyright (c) 1983, 1989, 1991, 1993\n\
66 The Regents of the University of California. All rights reserved.\n";
67 #endif /* not lint */
68
69 #include <sys/param.h>
70 #include <sys/file.h>
71 #include <sys/socket.h>
72 #include <sys/ioctl.h>
73 #include <sys/sysctl.h>
74 #include <sys/types.h>
75
76 #include <net/if.h>
77 #include <net/route.h>
78 #include <net/if_dl.h>
79 #include <netinet/in.h>
80 #include <arpa/inet.h>
81 #include <netdb.h>
82
83 #include <ctype.h>
84 #include <err.h>
85 #include <errno.h>
86 #include <paths.h>
87 #include <stdio.h>
88 #include <stdlib.h>
89 #include <string.h>
90 #include <sysexits.h>
91 #include <unistd.h>
92 #include <ifaddrs.h>
93
94 struct keytab {
95 char *kt_cp;
96 int kt_i;
97 } keywords[] = {
98 #include "keywords.h"
99 {0, 0}
100 };
101
102 union sockunion {
103 struct sockaddr sa;
104 struct sockaddr_in sin;
105 #ifdef INET6
106 struct sockaddr_in6 sin6;
107 #endif
108 struct sockaddr_dl sdl;
109 struct sockaddr_storage ss; /* added to avoid memory overrun */
110 } so_dst, so_gate, so_mask, so_genmask, so_ifa, so_ifp;
111
112 typedef union sockunion *sup;
113 int pid, rtm_addrs, uid;
114 int s;
115 int forcehost, forcenet, doflush, nflag, af, qflag, tflag, keyword();
116 int iflag, verbose, aflen = sizeof (struct sockaddr_in);
117 int locking, lockrest, debugonly;
118 struct rt_metrics rt_metrics;
119 u_long rtm_inits;
120 unsigned int ifscope;
121
122 static const char *route_strerror(int);
123 const char *routename(), *netname();
124 void flushroutes(), newroute(), monitor(), sockaddr(), sodump(), bprintf();
125 void print_getmsg(), print_rtmsg(), pmsg_common(), pmsg_addrs(), mask_addr();
126 int getaddr(), rtmsg(), x25_makemask();
127 int prefixlen();
128 extern char *iso_ntoa();
129
130 static void
131 inet_makenetandmask(in_addr_t net, struct sockaddr_in *sin,
132 struct sockaddr_in *sin_mask, in_addr_t bits);
133
134 void usage __P((const char *)) __dead2;
135
136 void
137 usage(cp)
138 const char *cp;
139 {
140 if (cp)
141 warnx("bad keyword: %s", cp);
142 (void) fprintf(stderr,
143 "usage: route [-dnqtv] command [[modifiers] args]\n");
144 exit(EX_USAGE);
145 /* NOTREACHED */
146 }
147
148 #define ROUNDUP(a) \
149 ((a) > 0 ? (1 + (((a) - 1) | (sizeof(uint32_t) - 1))) : sizeof(uint32_t))
150 #define ADVANCE(x, n) (x += ROUNDUP((n)->sa_len))
151
152 int
153 main(argc, argv)
154 int argc;
155 char **argv;
156 {
157 int ch;
158
159 if (argc < 2)
160 usage((char *)NULL);
161
162 while ((ch = getopt(argc, argv, "nqdtv")) != -1)
163 switch(ch) {
164 case 'n':
165 nflag = 1;
166 break;
167 case 'q':
168 qflag = 1;
169 break;
170 case 'v':
171 verbose = 1;
172 break;
173 case 't':
174 tflag = 1;
175 break;
176 case 'd':
177 debugonly = 1;
178 break;
179 case '?':
180 default:
181 usage((char *)NULL);
182 }
183 argc -= optind;
184 argv += optind;
185
186 pid = getpid();
187 uid = geteuid();
188 if (tflag)
189 s = open(_PATH_DEVNULL, O_WRONLY, 0);
190 else
191 s = socket(PF_ROUTE, SOCK_RAW, 0);
192 if (s < 0)
193 err(EX_OSERR, "socket");
194 setuid(uid);
195 if (*argv)
196 switch (keyword(*argv)) {
197 case K_GET:
198 uid = 0;
199 /* FALLTHROUGH */
200
201 case K_CHANGE:
202 case K_ADD:
203 case K_DELETE:
204 newroute(argc, argv);
205 exit(0);
206 /* NOTREACHED */
207
208 case K_MONITOR:
209 monitor();
210 /* NOTREACHED */
211
212 case K_FLUSH:
213 flushroutes(argc, argv);
214 exit(0);
215 /* NOTREACHED */
216 }
217 usage(*argv);
218 /* NOTREACHED */
219 }
220
221 /*
222 * Purge all entries in the routing tables not
223 * associated with network interfaces.
224 */
225 void
226 flushroutes(argc, argv)
227 int argc;
228 char *argv[];
229 {
230 size_t needed;
231 int mib[6], rlen, seqno;
232 char *buf, *next, *lim;
233 register struct rt_msghdr *rtm;
234
235 if (uid) {
236 errx(EX_NOPERM, "must be root to alter routing table");
237 }
238 shutdown(s, 0); /* Don't want to read back our messages */
239 if (argc > 1) {
240 argv++;
241 if (argc == 2 && **argv == '-')
242 switch (keyword(*argv + 1)) {
243 case K_INET:
244 af = AF_INET;
245 break;
246 #ifdef INET6
247 case K_INET6:
248 af = AF_INET6;
249 break;
250 #endif
251 case K_LINK:
252 af = AF_LINK;
253 break;
254 default:
255 goto bad;
256 } else
257 bad: usage(*argv);
258 }
259 mib[0] = CTL_NET;
260 mib[1] = PF_ROUTE;
261 mib[2] = 0; /* protocol */
262 mib[3] = 0; /* wildcard address family */
263 mib[4] = NET_RT_DUMP;
264 mib[5] = 0; /* no flags */
265 if (sysctl(mib, 6, NULL, &needed, NULL, 0) < 0)
266 err(EX_OSERR, "route-sysctl-estimate");
267 if ((buf = malloc(needed)) == NULL)
268 errx(EX_OSERR, "malloc failed");
269 if (sysctl(mib, 6, buf, &needed, NULL, 0) < 0)
270 err(EX_OSERR, "route-sysctl-get");
271 lim = buf + needed;
272 if (verbose)
273 (void) printf("Examining routing table from sysctl\n");
274 seqno = 0; /* ??? */
275 for (next = buf; next < lim; next += rtm->rtm_msglen) {
276 rtm = (struct rt_msghdr *)next;
277 if (verbose)
278 print_rtmsg(rtm, rtm->rtm_msglen);
279 if ((rtm->rtm_flags & RTF_GATEWAY) == 0)
280 continue;
281 if (af) {
282 struct sockaddr *sa = (struct sockaddr *)(rtm + 1);
283
284 if (sa->sa_family != af)
285 continue;
286 }
287 if (debugonly)
288 continue;
289 rtm->rtm_type = RTM_DELETE;
290 rtm->rtm_seq = seqno;
291 rlen = write(s, next, rtm->rtm_msglen);
292 if (rlen < (int)rtm->rtm_msglen) {
293 warn("write to routing socket");
294 (void) printf("got only %d for rlen\n", rlen);
295 break;
296 }
297 seqno++;
298 if (qflag)
299 continue;
300 if (verbose)
301 print_rtmsg(rtm, rlen);
302 else {
303 struct sockaddr *sa = (struct sockaddr *)(rtm + 1);
304 (void) printf("%-20.20s ", rtm->rtm_flags & RTF_HOST ?
305 routename(sa) : netname(sa));
306 sa = (struct sockaddr *)(ROUNDUP(sa->sa_len) + (char *)sa);
307 (void) printf("%-20.20s ", routename(sa));
308 (void) printf("done\n");
309 }
310 }
311 }
312
313 const char *
314 routename(sa)
315 struct sockaddr *sa;
316 {
317 register char *cp;
318 static char line[MAXHOSTNAMELEN + 1];
319 struct hostent *hp;
320 static char domain[MAXHOSTNAMELEN + 1];
321 static int first = 1;
322
323 if (first) {
324 first = 0;
325 if (gethostname(domain, MAXHOSTNAMELEN) == 0 &&
326 (cp = index(domain, '.'))) {
327 domain[MAXHOSTNAMELEN] = '\0';
328 (void) memmove(domain, cp + 1, strlen(cp + 1) + 1);
329 } else
330 domain[0] = 0;
331 }
332
333 if (sa->sa_len == 0)
334 strlcpy(line, "default", sizeof(line));
335 else switch (sa->sa_family) {
336
337 case AF_INET:
338 { struct in_addr in;
339 in = ((struct sockaddr_in *)sa)->sin_addr;
340
341 cp = 0;
342 if (in.s_addr == INADDR_ANY || sa->sa_len < 4)
343 cp = "default";
344 if (cp == 0 && !nflag) {
345 hp = gethostbyaddr((char *)&in, sizeof (struct in_addr),
346 AF_INET);
347 if (hp) {
348 if ((cp = index(hp->h_name, '.')) &&
349 !strcmp(cp + 1, domain))
350 *cp = 0;
351 cp = hp->h_name;
352 }
353 }
354 if (cp) {
355 strncpy(line, cp, sizeof(line) - 1);
356 line[sizeof(line) - 1] = '\0';
357 } else {
358 /* XXX - why not inet_ntoa()? */
359 #define C(x) (unsigned)((x) & 0xff)
360 in.s_addr = ntohl(in.s_addr);
361 (void) snprintf(line, sizeof(line), "%u.%u.%u.%u", C(in.s_addr >> 24),
362 C(in.s_addr >> 16), C(in.s_addr >> 8), C(in.s_addr));
363 }
364 break;
365 }
366
367 #ifdef INET6
368 case AF_INET6:
369 {
370 struct sockaddr_in6 sin6; /* use static var for safety */
371 int niflags = 0;
372 #ifdef NI_WITHSCOPEID
373 niflags = NI_WITHSCOPEID;
374 #endif
375
376 memset(&sin6, 0, sizeof(sin6));
377 memcpy(&sin6, sa, sa->sa_len);
378 sin6.sin6_len = sizeof(struct sockaddr_in6);
379 sin6.sin6_family = AF_INET6;
380 #ifdef __KAME__
381 if (sa->sa_len == sizeof(struct sockaddr_in6) &&
382 (IN6_IS_ADDR_LINKLOCAL(&sin6.sin6_addr) ||
383 IN6_IS_ADDR_MC_NODELOCAL(&sin6.sin6_addr) ||
384 IN6_IS_ADDR_MC_LINKLOCAL(&sin6.sin6_addr)) &&
385 sin6.sin6_scope_id == 0) {
386 sin6.sin6_scope_id =
387 ntohs(*(u_int16_t *)&sin6.sin6_addr.s6_addr[2]);
388 sin6.sin6_addr.s6_addr[2] = 0;
389 sin6.sin6_addr.s6_addr[3] = 0;
390 }
391 #endif
392 if (nflag)
393 niflags |= NI_NUMERICHOST;
394 if (getnameinfo((struct sockaddr *)&sin6, sin6.sin6_len,
395 line, sizeof(line), NULL, 0, niflags) != 0)
396 strncpy(line, "invalid", sizeof(line));
397
398 return(line);
399 }
400 #endif
401
402 case AF_LINK:
403 return (link_ntoa((struct sockaddr_dl *)sa));
404
405 default:
406 { u_short *s = (u_short *)sa;
407 u_short *slim = s + ((sa->sa_len + 1) >> 1);
408 char *cp = line + snprintf(line, sizeof(line), "(%d)", sa->sa_family);
409 char *cpe = line + sizeof(line);
410
411 while (++s < slim && cp < cpe) /* start with sa->sa_data */
412 cp += snprintf(cp, cpe - cp, " %x", *s);
413 break;
414 }
415 }
416 return (line);
417 }
418
419 /*
420 * Return the name of the network whose address is given.
421 * The address is assumed to be that of a net, not a host.
422 */
423 const char *
424 netname(sa)
425 struct sockaddr *sa;
426 {
427 char *cp = NULL;
428 static char line[MAXHOSTNAMELEN + 1];
429 struct netent *np = NULL;
430 register in_addr_t i;
431
432 switch (sa->sa_family) {
433
434 case AF_INET:
435 { struct in_addr in;
436 in = ((struct sockaddr_in *)sa)->sin_addr;
437
438 i = in.s_addr = ntohl(in.s_addr);
439 if (in.s_addr == 0)
440 cp = "default";
441 else if (!nflag) {
442 np = getnetbyaddr(i, AF_INET);
443 if (np != NULL)
444 cp = np->n_name;
445 }
446 #define C(x) (unsigned)((x) & 0xff)
447 if (cp != NULL)
448 strncpy(line, cp, sizeof(line));
449 else if ((in.s_addr & 0xffffff) == 0)
450 (void) sprintf(line, "%u", C(in.s_addr >> 24));
451 else if ((in.s_addr & 0xffff) == 0)
452 (void) sprintf(line, "%u.%u", C(in.s_addr >> 24),
453 C(in.s_addr >> 16));
454 else if ((in.s_addr & 0xff) == 0)
455 (void) sprintf(line, "%u.%u.%u", C(in.s_addr >> 24),
456 C(in.s_addr >> 16), C(in.s_addr >> 8));
457 else
458 (void) sprintf(line, "%u.%u.%u.%u", C(in.s_addr >> 24),
459 C(in.s_addr >> 16), C(in.s_addr >> 8),
460 C(in.s_addr));
461 #undef C
462 break;
463 }
464 #ifdef INET6
465 case AF_INET6:
466 {
467 struct sockaddr_in6 sin6; /* use static var for safety */
468 int niflags = 0;
469 #ifdef NI_WITHSCOPEID
470 niflags = NI_WITHSCOPEID;
471 #endif
472
473 memset(&sin6, 0, sizeof(sin6));
474 memcpy(&sin6, sa, sa->sa_len);
475 sin6.sin6_len = sizeof(struct sockaddr_in6);
476 sin6.sin6_family = AF_INET6;
477 #ifdef __KAME__
478 if (sa->sa_len == sizeof(struct sockaddr_in6) &&
479 (IN6_IS_ADDR_LINKLOCAL(&sin6.sin6_addr) ||
480 IN6_IS_ADDR_MC_NODELOCAL(&sin6.sin6_addr) ||
481 IN6_IS_ADDR_MC_LINKLOCAL(&sin6.sin6_addr)) &&
482 sin6.sin6_scope_id == 0) {
483 sin6.sin6_scope_id =
484 ntohs(*(u_int16_t *)&sin6.sin6_addr.s6_addr[2]);
485 sin6.sin6_addr.s6_addr[2] = 0;
486 sin6.sin6_addr.s6_addr[3] = 0;
487 }
488 #endif
489 if (nflag)
490 niflags |= NI_NUMERICHOST;
491 if (getnameinfo((struct sockaddr *)&sin6, sin6.sin6_len,
492 line, sizeof(line), NULL, 0, niflags) != 0)
493 strncpy(line, "invalid", sizeof(line));
494
495 return(line);
496 }
497 #endif
498
499 case AF_LINK:
500 return (link_ntoa((struct sockaddr_dl *)sa));
501
502
503 default:
504 { u_short *s = (u_short *)sa->sa_data;
505 u_short *slim = s + ((sa->sa_len + 1)>>1);
506 char *cp = line + snprintf(line, sizeof(line), "af %d:", sa->sa_family);
507 char *cpe = line + sizeof(line);
508
509 while (s < slim && cp < cpe)
510 cp += snprintf(cp, cpe - cp, " %x", *s++);
511 break;
512 }
513 }
514 return (line);
515 }
516
517 static const char *
518 route_strerror(int error)
519 {
520
521 switch (error) {
522 case ESRCH:
523 return "not in table";
524 case EBUSY:
525 return "entry in use";
526 case ENOBUFS:
527 return "routing table overflow";
528 default:
529 return (strerror(error));
530 }
531 }
532
533 void
534 set_metric(value, key)
535 char *value;
536 int key;
537 {
538 int flag = 0;
539 u_int noval, *valp = &noval;
540
541 switch (key) {
542 #define caseof(x, y, z) case x: valp = (u_int *)&rt_metrics.z; flag = y; break
543 caseof(K_MTU, RTV_MTU, rmx_mtu);
544 caseof(K_HOPCOUNT, RTV_HOPCOUNT, rmx_hopcount);
545 caseof(K_EXPIRE, RTV_EXPIRE, rmx_expire);
546 caseof(K_RECVPIPE, RTV_RPIPE, rmx_recvpipe);
547 caseof(K_SENDPIPE, RTV_SPIPE, rmx_sendpipe);
548 caseof(K_SSTHRESH, RTV_SSTHRESH, rmx_ssthresh);
549 caseof(K_RTT, RTV_RTT, rmx_rtt);
550 caseof(K_RTTVAR, RTV_RTTVAR, rmx_rttvar);
551 }
552 rtm_inits |= flag;
553 if (lockrest || locking)
554 rt_metrics.rmx_locks |= flag;
555 if (locking)
556 locking = 0;
557 *valp = atoi(value);
558 }
559
560 void
561 newroute(argc, argv)
562 int argc;
563 register char **argv;
564 {
565 char *cmd, *dest = "", *gateway = "";
566 int ishost = 0, ret, attempts, oerrno, flags = RTF_STATIC;
567 int key;
568 struct hostent *hp = 0;
569
570 if (uid) {
571 errx(EX_NOPERM, "must be root to alter routing table");
572 }
573 cmd = argv[0];
574 if (*cmd != 'g')
575 shutdown(s, 0); /* Don't want to read back our messages */
576 while (--argc > 0) {
577 if (**(++argv)== '-') {
578 switch (key = keyword(1 + *argv)) {
579 case K_LINK:
580 af = AF_LINK;
581 aflen = sizeof(struct sockaddr_dl);
582 break;
583 case K_INET:
584 af = AF_INET;
585 aflen = sizeof(struct sockaddr_in);
586 break;
587 #ifdef INET6
588 case K_INET6:
589 af = AF_INET6;
590 aflen = sizeof(struct sockaddr_in6);
591 break;
592 #endif
593 case K_SA:
594 af = PF_ROUTE;
595 aflen = sizeof(union sockunion);
596 break;
597 case K_IFACE:
598 case K_INTERFACE:
599 iflag++;
600 break;
601 case K_NOSTATIC:
602 flags &= ~RTF_STATIC;
603 break;
604 case K_LLINFO:
605 flags |= RTF_LLINFO;
606 break;
607 case K_LOCK:
608 locking = 1;
609 break;
610 case K_LOCKREST:
611 lockrest = 1;
612 break;
613 case K_HOST:
614 forcehost++;
615 break;
616 case K_REJECT:
617 flags |= RTF_REJECT;
618 break;
619 case K_BLACKHOLE:
620 flags |= RTF_BLACKHOLE;
621 break;
622 case K_PROTO1:
623 flags |= RTF_PROTO1;
624 break;
625 case K_PROTO2:
626 flags |= RTF_PROTO2;
627 break;
628 case K_CLONING:
629 flags |= RTF_CLONING;
630 break;
631 case K_XRESOLVE:
632 flags |= RTF_XRESOLVE;
633 break;
634 case K_STATIC:
635 flags |= RTF_STATIC;
636 break;
637 case K_IFA:
638 if (!--argc)
639 usage((char *)NULL);
640 (void) getaddr(RTA_IFA, *++argv, 0);
641 break;
642 case K_IFP:
643 if (!--argc)
644 usage((char *)NULL);
645 (void) getaddr(RTA_IFP, *++argv, 0);
646 break;
647 case K_GENMASK:
648 if (!--argc)
649 usage((char *)NULL);
650 (void) getaddr(RTA_GENMASK, *++argv, 0);
651 break;
652 case K_GATEWAY:
653 if (!--argc)
654 usage((char *)NULL);
655 (void) getaddr(RTA_GATEWAY, *++argv, 0);
656 break;
657 case K_DST:
658 if (!--argc)
659 usage((char *)NULL);
660 ishost = getaddr(RTA_DST, *++argv, &hp);
661 dest = *argv;
662 break;
663 case K_NETMASK:
664 if (!--argc)
665 usage((char *)NULL);
666 (void) getaddr(RTA_NETMASK, *++argv, 0);
667 /* FALLTHROUGH */
668 case K_NET:
669 forcenet++;
670 break;
671 case K_PREFIXLEN:
672 if (!--argc)
673 usage((char *)NULL);
674 if (prefixlen(*++argv) == -1) {
675 forcenet = 0;
676 ishost = 1;
677 } else {
678 forcenet = 1;
679 ishost = 0;
680 }
681 break;
682 case K_MTU:
683 case K_HOPCOUNT:
684 case K_EXPIRE:
685 case K_RECVPIPE:
686 case K_SENDPIPE:
687 case K_SSTHRESH:
688 case K_RTT:
689 case K_RTTVAR:
690 if (!--argc)
691 usage((char *)NULL);
692 set_metric(*++argv, key);
693 break;
694 case K_IFSCOPE:
695 if (!--argc)
696 usage((char *)NULL);
697 if ((ifscope = if_nametoindex(*++argv)) != 0)
698 flags |= RTF_IFSCOPE;
699 else
700 errx(1, "bad interface name");
701 break;
702 default:
703 usage(1+*argv);
704 }
705 } else {
706 if ((rtm_addrs & RTA_DST) == 0) {
707 dest = *argv;
708 ishost = getaddr(RTA_DST, *argv, &hp);
709 } else if ((rtm_addrs & RTA_GATEWAY) == 0) {
710 gateway = *argv;
711 (void) getaddr(RTA_GATEWAY, *argv, &hp);
712 } else {
713 (void) getaddr(RTA_NETMASK, *argv, 0);
714 }
715 }
716 }
717 if (forcehost) {
718 ishost = 1;
719 #ifdef INET6
720 if (af == AF_INET6) {
721 rtm_addrs &= ~RTA_NETMASK;
722 memset((void *)&so_mask, 0, sizeof(so_mask));
723 }
724 #endif
725 }
726 if (forcenet)
727 ishost = 0;
728 flags |= RTF_UP;
729 if (ishost)
730 flags |= RTF_HOST;
731 if (iflag == 0)
732 flags |= RTF_GATEWAY;
733 if (so_mask.sin.sin_family == AF_INET) {
734 // make sure the mask is contiguous
735 long i;
736 for (i = 0; i < 32; i++)
737 if (((so_mask.sin.sin_addr.s_addr) & ntohl((1 << i))) != 0)
738 break;
739 for (; i < 32; i++)
740 if (((so_mask.sin.sin_addr.s_addr) & ntohl((1 << i))) == 0)
741 errx(EX_NOHOST, "invalid mask: %s", inet_ntoa(so_mask.sin.sin_addr));
742 }
743 for (attempts = 1; ; attempts++) {
744 errno = 0;
745 if ((ret = rtmsg(*cmd, flags)) == 0)
746 break;
747 if (errno != ENETUNREACH && errno != ESRCH)
748 break;
749 if (af == AF_INET && *gateway && hp && hp->h_addr_list[1]) {
750 hp->h_addr_list++;
751 bcopy(hp->h_addr_list[0], &so_gate.sin.sin_addr,
752 MIN(hp->h_length, sizeof(so_gate.sin.sin_addr)));
753 } else
754 break;
755 }
756 if (*cmd == 'g')
757 exit(0);
758 oerrno = errno;
759 (void) printf("%s %s %s", cmd, ishost? "host" : "net", dest);
760 if (*gateway) {
761 (void) printf(": gateway %s", gateway);
762 if (attempts > 1 && ret == 0 && af == AF_INET)
763 (void) printf(" (%s)", inet_ntoa(so_gate.sin.sin_addr));
764 }
765 if (ret == 0)
766 (void) printf("\n");
767 else {
768 (void)printf(": %s\n", route_strerror(oerrno));
769 }
770 }
771
772 static void
773 inet_makenetandmask(in_addr_t net, struct sockaddr_in *sin,
774 struct sockaddr_in *sin_mask, in_addr_t bits)
775 {
776 in_addr_t mask = 0;
777
778 rtm_addrs |= RTA_NETMASK;
779 /*
780 * MSB of net should be meaningful. 0/0 is exception.
781 */
782 if (net > 0)
783 while ((net & 0xff000000) == 0)
784 net <<= 8;
785
786 /*
787 * If no /xx was specified we must calculate the
788 * CIDR address.
789 */
790 if ((bits == 0) && (net != 0)) {
791 u_long i, j;
792
793 for(i = 0, j = 0xff; i < 4; i++) {
794 if (net & j) {
795 break;
796 }
797 j <<= 8;
798 }
799 /* i holds the first non zero bit */
800 bits = 32 - (i*8);
801 }
802 if (bits != 0)
803 mask = 0xffffffff << (32 - bits);
804
805 sin->sin_addr.s_addr = htonl(net);
806 sin_mask->sin_addr.s_addr = htonl(mask);
807 sin_mask->sin_len = sizeof(struct sockaddr_in);
808 sin_mask->sin_family = AF_INET;
809 }
810
811 #ifdef INET6
812 /*
813 * XXX the function may need more improvement...
814 */
815 static int
816 inet6_makenetandmask(struct sockaddr_in6 *sin6, const char *plen)
817 {
818 struct in6_addr in6;
819
820 if (plen == NULL) {
821 if (IN6_IS_ADDR_UNSPECIFIED(&sin6->sin6_addr) &&
822 sin6->sin6_scope_id == 0) {
823 plen = "0";
824 } else if ((sin6->sin6_addr.s6_addr[0] & 0xe0) == 0x20) {
825 /* aggregatable global unicast - RFC2374 */
826 memset(&in6, 0, sizeof(in6));
827 if (!memcmp(&sin6->sin6_addr.s6_addr[8],
828 &in6.s6_addr[8], 8))
829 plen = "64";
830 }
831 }
832
833 if (plen == NULL || strcmp(plen, "128") == 0)
834 return (1);
835 rtm_addrs |= RTA_NETMASK;
836 prefixlen(plen);
837 return (0);
838 }
839 #endif
840
841 /*
842 * Interpret an argument as a network address of some kind,
843 * returning 1 if a host address, 0 if a network address.
844 */
845 int
846 getaddr(which, s, hpp)
847 int which;
848 char *s;
849 struct hostent **hpp;
850 {
851 register sup su = NULL;
852 struct hostent *hp;
853 struct netent *np;
854 in_addr_t val;
855 char *q;
856 int afamily; /* local copy of af so we can change it */
857
858 if (af == 0) {
859 af = AF_INET;
860 aflen = sizeof(struct sockaddr_in);
861 }
862 afamily = af;
863 rtm_addrs |= which;
864 switch (which) {
865 case RTA_DST:
866 su = &so_dst;
867 break;
868 case RTA_GATEWAY:
869 su = &so_gate;
870 if (iflag) {
871 struct ifaddrs *ifap, *ifa;
872 struct sockaddr_dl *sdl = NULL;
873
874 if (getifaddrs(&ifap))
875 err(1, "getifaddrs");
876
877 for (ifa = ifap; ifa; ifa = ifa->ifa_next) {
878 if (ifa->ifa_addr->sa_family != AF_LINK)
879 continue;
880
881 if (strcmp(s, ifa->ifa_name))
882 continue;
883
884 sdl = (struct sockaddr_dl *)ifa->ifa_addr;
885 }
886 /* If we found it, then use it */
887 if (sdl) {
888 /*
889 * Copy is safe since we have a
890 * sockaddr_storage member in sockunion{}.
891 * Note that we need to copy before calling
892 * freeifaddrs().
893 */
894 memcpy(&su->sdl, sdl, sdl->sdl_len);
895 }
896 freeifaddrs(ifap);
897 if (sdl)
898 return(1);
899 }
900 break;
901 case RTA_NETMASK:
902 su = &so_mask;
903 break;
904 case RTA_GENMASK:
905 su = &so_genmask;
906 break;
907 case RTA_IFP:
908 su = &so_ifp;
909 afamily = AF_LINK;
910 break;
911 case RTA_IFA:
912 su = &so_ifa;
913 break;
914 default:
915 usage("internal error");
916 /*NOTREACHED*/
917 }
918 su->sa.sa_len = aflen;
919 su->sa.sa_family = afamily; /* cases that don't want it have left already */
920 if (strcmp(s, "default") == 0) {
921 /*
922 * Default is net 0.0.0.0/0
923 */
924 switch (which) {
925 case RTA_DST:
926 forcenet++;
927 /* bzero(su, sizeof(*su)); *//* for readability */
928 (void) getaddr(RTA_NETMASK, s, 0);
929 break;
930 case RTA_NETMASK:
931 case RTA_GENMASK:
932 /* bzero(su, sizeof(*su)); *//* for readability */
933 su->sa.sa_len = 0;
934 break;
935 }
936 return (0);
937 }
938 switch (afamily) {
939 #ifdef INET6
940 case AF_INET6:
941 {
942 struct addrinfo hints, *res;
943 int ecode;
944
945 q = NULL;
946 if (which == RTA_DST && (q = strchr(s, '/')) != NULL)
947 *q = '\0';
948 memset(&hints, 0, sizeof(hints));
949 hints.ai_family = afamily; /*AF_INET6*/
950 hints.ai_flags = AI_NUMERICHOST;
951 hints.ai_socktype = SOCK_DGRAM; /*dummy*/
952 ecode = getaddrinfo(s, NULL, &hints, &res);
953 if (ecode != 0 || res->ai_family != AF_INET6 ||
954 res->ai_addrlen != sizeof(su->sin6)) {
955 (void) fprintf(stderr, "%s: %s\n", s,
956 gai_strerror(ecode));
957 exit(1);
958 }
959 memcpy(&su->sin6, res->ai_addr, sizeof(su->sin6));
960 #ifdef __KAME__
961 if ((IN6_IS_ADDR_LINKLOCAL(&su->sin6.sin6_addr) ||
962 IN6_IS_ADDR_MC_NODELOCAL(&su->sin6.sin6_addr) ||
963 IN6_IS_ADDR_MC_LINKLOCAL(&su->sin6.sin6_addr)) &&
964 su->sin6.sin6_scope_id) {
965 *(u_int16_t *)&su->sin6.sin6_addr.s6_addr[2] =
966 htons(su->sin6.sin6_scope_id);
967 su->sin6.sin6_scope_id = 0;
968 }
969 #endif
970 freeaddrinfo(res);
971 if (hints.ai_flags == AI_NUMERICHOST) {
972 if (q != NULL)
973 *q++ = '/';
974 if (which == RTA_DST)
975 return (inet6_makenetandmask(&su->sin6, q));
976 return (0);
977 } else {
978 return (1);
979 }
980 }
981 #endif /* INET6 */
982
983 case AF_LINK:
984 link_addr(s, &su->sdl);
985 return (1);
986
987
988 case PF_ROUTE:
989 su->sa.sa_len = sizeof(*su);
990 sockaddr(s, &su->sa);
991 return (1);
992
993 case AF_INET:
994 default:
995 break;
996 }
997
998 if (hpp == NULL)
999 hpp = &hp;
1000 *hpp = NULL;
1001
1002 q = strchr(s,'/');
1003 if (q && which == RTA_DST) {
1004 *q = '\0';
1005 if ((val = inet_network(s)) != INADDR_NONE) {
1006 inet_makenetandmask(
1007 val, &su->sin, (struct sockaddr_in *)&so_mask,
1008 strtoul(q+1, 0, 0));
1009 return (0);
1010 }
1011 *q = '/';
1012 }
1013 if ((which != RTA_DST || forcenet == 0) &&
1014 inet_aton(s, &su->sin.sin_addr)) {
1015 val = su->sin.sin_addr.s_addr;
1016 if (which != RTA_DST || forcehost ||
1017 inet_lnaof(su->sin.sin_addr) != INADDR_ANY)
1018 return (1);
1019 else {
1020 val = ntohl(val);
1021 goto netdone;
1022 }
1023 }
1024 if (which == RTA_DST && forcehost == 0 &&
1025 ((val = inet_network(s)) != INADDR_NONE ||
1026 ((np = getnetbyname(s)) != NULL && (val = np->n_net) != 0))) {
1027 netdone:
1028 inet_makenetandmask(val, &su->sin, (struct sockaddr_in *)&so_mask, 0);
1029 return (0);
1030 }
1031 hp = gethostbyname(s);
1032 if (hp) {
1033 *hpp = hp;
1034 su->sin.sin_family = hp->h_addrtype;
1035 bcopy(hp->h_addr, (char *)&su->sin.sin_addr,
1036 MIN(hp->h_length, sizeof(su->sin.sin_addr)));
1037 return (1);
1038 }
1039 errx(EX_NOHOST, "bad address: %s", s);
1040 }
1041
1042 int
1043 prefixlen(s)
1044 char *s;
1045 {
1046 int len = atoi(s), q, r;
1047 int max;
1048 char *p;
1049
1050 rtm_addrs |= RTA_NETMASK;
1051 switch (af) {
1052 #ifdef INET6
1053 case AF_INET6:
1054 max = 128;
1055 p = (char *)&so_mask.sin6.sin6_addr;
1056 break;
1057 #endif
1058 case AF_INET:
1059 max = 32;
1060 p = (char *)&so_mask.sin.sin_addr;
1061 break;
1062 default:
1063 (void) fprintf(stderr, "prefixlen not supported in this af\n");
1064 exit(1);
1065 /*NOTREACHED*/
1066 }
1067
1068 if (len < 0 || max < len) {
1069 (void) fprintf(stderr, "%s: bad value\n", s);
1070 exit(1);
1071 }
1072
1073 q = len >> 3;
1074 r = len & 7;
1075 so_mask.sa.sa_family = af;
1076 so_mask.sa.sa_len = aflen;
1077 memset((void *)p, 0, max / 8);
1078 if (q > 0)
1079 memset((void *)p, 0xff, q);
1080 if (r > 0)
1081 *((u_char *)p + q) = (0xff00 >> r) & 0xff;
1082 if (len == max)
1083 return -1;
1084 else
1085 return len;
1086 }
1087
1088 void
1089 interfaces()
1090 {
1091 size_t needed;
1092 int mib[6];
1093 char *buf, *lim, *next;
1094 register struct rt_msghdr *rtm;
1095
1096 mib[0] = CTL_NET;
1097 mib[1] = PF_ROUTE;
1098 mib[2] = 0; /* protocol */
1099 mib[3] = 0; /* wildcard address family */
1100 mib[4] = NET_RT_IFLIST;
1101 mib[5] = 0; /* no flags */
1102 if (sysctl(mib, 6, NULL, &needed, NULL, 0) < 0)
1103 err(EX_OSERR, "route-sysctl-estimate");
1104 if ((buf = malloc(needed)) == NULL)
1105 errx(EX_OSERR, "malloc failed");
1106 if (sysctl(mib, 6, buf, &needed, NULL, 0) < 0)
1107 err(EX_OSERR, "actual retrieval of interface table");
1108 lim = buf + needed;
1109 for (next = buf; next < lim; next += rtm->rtm_msglen) {
1110 rtm = (struct rt_msghdr *)next;
1111 print_rtmsg(rtm, rtm->rtm_msglen);
1112 }
1113 }
1114
1115 void
1116 monitor()
1117 {
1118 int n;
1119 char msg[2048];
1120
1121 verbose = 1;
1122 if (debugonly) {
1123 interfaces();
1124 exit(0);
1125 }
1126 for(;;) {
1127 time_t now;
1128 n = read(s, msg, 2048);
1129 now = time(NULL);
1130 (void) printf("\ngot message of size %d on %s", n, ctime(&now));
1131 print_rtmsg((struct rt_msghdr *)msg, n);
1132 }
1133 }
1134
1135 struct {
1136 struct rt_msghdr m_rtm;
1137 char m_space[512];
1138 } m_rtmsg;
1139
1140 int
1141 rtmsg(cmd, flags)
1142 int cmd, flags;
1143 {
1144 static int seq;
1145 int rlen;
1146 register char *cp = m_rtmsg.m_space;
1147 register int l;
1148
1149 #define NEXTADDR(w, u) \
1150 if (rtm_addrs & (w)) {\
1151 l = ROUNDUP(u.sa.sa_len); bcopy((char *)&(u), cp, l); cp += l;\
1152 if (verbose) sodump(&(u),"u");\
1153 }
1154
1155 errno = 0;
1156 bzero((char *)&m_rtmsg, sizeof(m_rtmsg));
1157 if (cmd == 'a')
1158 cmd = RTM_ADD;
1159 else if (cmd == 'c')
1160 cmd = RTM_CHANGE;
1161 else if (cmd == 'g') {
1162 cmd = RTM_GET;
1163 if (so_ifp.sa.sa_family == 0) {
1164 so_ifp.sa.sa_family = AF_LINK;
1165 so_ifp.sa.sa_len = sizeof(struct sockaddr_dl);
1166 rtm_addrs |= RTA_IFP;
1167 }
1168 } else
1169 cmd = RTM_DELETE;
1170 #define rtm m_rtmsg.m_rtm
1171 rtm.rtm_type = cmd;
1172 rtm.rtm_flags = flags;
1173 rtm.rtm_version = RTM_VERSION;
1174 rtm.rtm_seq = ++seq;
1175 rtm.rtm_addrs = rtm_addrs;
1176 rtm.rtm_rmx = rt_metrics;
1177 rtm.rtm_inits = rtm_inits;
1178 rtm.rtm_index = ifscope;
1179
1180 if (rtm_addrs & RTA_NETMASK)
1181 mask_addr();
1182 NEXTADDR(RTA_DST, so_dst);
1183 NEXTADDR(RTA_GATEWAY, so_gate);
1184 NEXTADDR(RTA_NETMASK, so_mask);
1185 NEXTADDR(RTA_GENMASK, so_genmask);
1186 NEXTADDR(RTA_IFP, so_ifp);
1187 NEXTADDR(RTA_IFA, so_ifa);
1188 rtm.rtm_msglen = l = cp - (char *)&m_rtmsg;
1189 if (verbose)
1190 print_rtmsg(&rtm, l);
1191 if (debugonly)
1192 return (0);
1193 if ((rlen = write(s, (char *)&m_rtmsg, l)) < 0) {
1194 warnx("writing to routing socket: %s", route_strerror(errno));
1195 return (-1);
1196 }
1197 if (cmd == RTM_GET) {
1198 do {
1199 l = read(s, (char *)&m_rtmsg, sizeof(m_rtmsg));
1200 } while (l > 0 && (rtm.rtm_seq != seq || rtm.rtm_pid != pid));
1201 if (l < 0)
1202 warn("read from routing socket");
1203 else
1204 print_getmsg(&rtm, l);
1205 }
1206 #undef rtm
1207 return (0);
1208 }
1209
1210 void
1211 mask_addr()
1212 {
1213 int olen = so_mask.sa.sa_len;
1214 register char *cp1 = olen + (char *)&so_mask, *cp2;
1215
1216 for (so_mask.sa.sa_len = 0; cp1 > (char *)&so_mask; )
1217 if (*--cp1 != 0) {
1218 so_mask.sa.sa_len = 1 + cp1 - (char *)&so_mask;
1219 break;
1220 }
1221 if ((rtm_addrs & RTA_DST) == 0)
1222 return;
1223 switch (so_dst.sa.sa_family) {
1224 case AF_INET:
1225 #ifdef INET6
1226 case AF_INET6:
1227 #endif
1228 case AF_APPLETALK:
1229 case 0:
1230 return;
1231 }
1232 cp1 = so_mask.sa.sa_len + 1 + (char *)&so_dst;
1233 cp2 = so_dst.sa.sa_len + 1 + (char *)&so_dst;
1234 while (cp2 > cp1)
1235 *--cp2 = 0;
1236 cp2 = so_mask.sa.sa_len + 1 + (char *)&so_mask;
1237 while (cp1 > so_dst.sa.sa_data)
1238 *--cp1 &= *--cp2;
1239 }
1240
1241 char *msgtypes[] = {
1242 "",
1243 "RTM_ADD: Add Route",
1244 "RTM_DELETE: Delete Route",
1245 "RTM_CHANGE: Change Metrics or flags",
1246 "RTM_GET: Report Metrics",
1247 "RTM_LOSING: Kernel Suspects Partitioning",
1248 "RTM_REDIRECT: Told to use different route",
1249 "RTM_MISS: Lookup failed on this address",
1250 "RTM_LOCK: fix specified metrics",
1251 "RTM_OLDADD: caused by SIOCADDRT",
1252 "RTM_OLDDEL: caused by SIOCDELRT",
1253 "RTM_RESOLVE: Route created by cloning",
1254 "RTM_NEWADDR: address being added to iface",
1255 "RTM_DELADDR: address being removed from iface",
1256 "RTM_IFINFO: iface status change",
1257 "RTM_NEWMADDR: new multicast group membership on iface",
1258 "RTM_DELMADDR: multicast group membership removed from iface",
1259 0,
1260 };
1261
1262 char metricnames[] =
1263 "\011pksent\010rttvar\7rtt\6ssthresh\5sendpipe\4recvpipe\3expire\2hopcount"
1264 "\1mtu";
1265 char routeflags[] =
1266 "\1UP\2GATEWAY\3HOST\4REJECT\5DYNAMIC\6MODIFIED\7DONE\010DELCLONE"
1267 "\011CLONING\012XRESOLVE\013LLINFO\014STATIC\015BLACKHOLE\016b016"
1268 "\017PROTO2\020PROTO1\021PRCLONING\022WASCLONED\023PROTO3\024b024"
1269 "\025PINNED\026LOCAL\027BROADCAST\030MULTICAST\031IFSCOPE\032CONDEMNED"
1270 "\033IFREF\034PROXY\035ROUTER";
1271 char ifnetflags[] =
1272 "\1UP\2BROADCAST\3DEBUG\4LOOPBACK\5PTP\6b6\7RUNNING\010NOARP"
1273 "\011PPROMISC\012ALLMULTI\013OACTIVE\014SIMPLEX\015LINK0\016LINK1"
1274 "\017LINK2\020MULTICAST";
1275 char addrnames[] =
1276 "\1DST\2GATEWAY\3NETMASK\4GENMASK\5IFP\6IFA\7AUTHOR\010BRD";
1277
1278 void
1279 print_rtmsg(rtm, msglen)
1280 register struct rt_msghdr *rtm;
1281 int msglen;
1282 {
1283 struct if_msghdr *ifm;
1284 struct ifa_msghdr *ifam;
1285 #ifdef RTM_NEWMADDR
1286 struct ifma_msghdr *ifmam;
1287 #endif
1288
1289 if (verbose == 0)
1290 return;
1291 if (rtm->rtm_version != RTM_VERSION) {
1292 (void) printf("routing message version %d not understood\n",
1293 rtm->rtm_version);
1294 return;
1295 }
1296 (void)printf("%s: len %d, ", msgtypes[rtm->rtm_type], rtm->rtm_msglen);
1297 switch (rtm->rtm_type) {
1298 case RTM_IFINFO:
1299 ifm = (struct if_msghdr *)rtm;
1300 (void) printf("if# %d, flags:", ifm->ifm_index);
1301 bprintf(stdout, ifm->ifm_flags, ifnetflags);
1302 pmsg_addrs((char *)(ifm + 1), ifm->ifm_addrs);
1303 break;
1304 case RTM_NEWADDR:
1305 case RTM_DELADDR:
1306 ifam = (struct ifa_msghdr *)rtm;
1307 (void) printf("metric %d, flags:", ifam->ifam_metric);
1308 bprintf(stdout, ifam->ifam_flags, routeflags);
1309 pmsg_addrs((char *)(ifam + 1), ifam->ifam_addrs);
1310 break;
1311 #ifdef RTM_NEWMADDR
1312 case RTM_NEWMADDR:
1313 case RTM_DELMADDR:
1314 ifmam = (struct ifma_msghdr *)rtm;
1315 pmsg_addrs((char *)(ifmam + 1), ifmam->ifmam_addrs);
1316 break;
1317 #endif
1318 default:
1319 (void) printf("pid: %ld, seq %d, errno %d, ",
1320 (long)rtm->rtm_pid, rtm->rtm_seq, rtm->rtm_errno);
1321 if (rtm->rtm_flags & RTF_IFSCOPE)
1322 (void) printf("ifscope %d, ", rtm->rtm_index);
1323 if (rtm->rtm_flags & RTF_IFREF)
1324 (void) printf("ifref, ");
1325 (void) printf("flags:");
1326 bprintf(stdout, rtm->rtm_flags, routeflags);
1327 pmsg_common(rtm);
1328 }
1329 }
1330
1331 void
1332 print_getmsg(rtm, msglen)
1333 register struct rt_msghdr *rtm;
1334 int msglen;
1335 {
1336 struct sockaddr *dst = NULL, *gate = NULL, *mask = NULL;
1337 struct sockaddr_dl *ifp = NULL;
1338 register struct sockaddr *sa;
1339 register char *cp;
1340 register int i;
1341
1342 (void) printf(" route to: %s\n", routename(&so_dst.sa));
1343 if (rtm->rtm_version != RTM_VERSION) {
1344 warnx("routing message version %d not understood",
1345 rtm->rtm_version);
1346 return;
1347 }
1348 if (rtm->rtm_msglen > msglen) {
1349 warnx("message length mismatch, in packet %d, returned %d",
1350 rtm->rtm_msglen, msglen);
1351 }
1352 if (rtm->rtm_errno) {
1353 errno = rtm->rtm_errno;
1354 warn("message indicates error %d", errno);
1355 return;
1356 }
1357 cp = ((char *)(rtm + 1));
1358 if (rtm->rtm_addrs)
1359 for (i = 1; i; i <<= 1)
1360 if (i & rtm->rtm_addrs) {
1361 sa = (struct sockaddr *)cp;
1362 switch (i) {
1363 case RTA_DST:
1364 dst = sa;
1365 break;
1366 case RTA_GATEWAY:
1367 gate = sa;
1368 break;
1369 case RTA_NETMASK:
1370 mask = sa;
1371 break;
1372 case RTA_IFP:
1373 if (sa->sa_family == AF_LINK &&
1374 ((struct sockaddr_dl *)sa)->sdl_nlen)
1375 ifp = (struct sockaddr_dl *)sa;
1376 break;
1377 }
1378 ADVANCE(cp, sa);
1379 }
1380 if (dst && mask)
1381 mask->sa_family = dst->sa_family; /* XXX */
1382 if (dst)
1383 (void)printf("destination: %s\n", routename(dst));
1384 if (mask) {
1385 int savenflag = nflag;
1386
1387 nflag = 1;
1388 (void)printf(" mask: %s\n", routename(mask));
1389 nflag = savenflag;
1390 }
1391 if (gate && rtm->rtm_flags & RTF_GATEWAY)
1392 (void)printf(" gateway: %s\n", routename(gate));
1393 if (ifp)
1394 (void)printf(" interface: %.*s\n",
1395 ifp->sdl_nlen, ifp->sdl_data);
1396 (void)printf(" flags: ");
1397 bprintf(stdout, rtm->rtm_flags, routeflags);
1398
1399 #define lock(f) ((rtm->rtm_rmx.rmx_locks & __CONCAT(RTV_,f)) ? 'L' : ' ')
1400 #define msec(u) (((u) + 500) / 1000) /* usec to msec */
1401
1402 (void) printf("\n%s\n", "\
1403 recvpipe sendpipe ssthresh rtt,msec rttvar hopcount mtu expire");
1404 printf("%8u%c ", rtm->rtm_rmx.rmx_recvpipe, lock(RPIPE));
1405 printf("%8u%c ", rtm->rtm_rmx.rmx_sendpipe, lock(SPIPE));
1406 printf("%8u%c ", rtm->rtm_rmx.rmx_ssthresh, lock(SSTHRESH));
1407 printf("%8u%c ", msec(rtm->rtm_rmx.rmx_rtt), lock(RTT));
1408 printf("%8u%c ", msec(rtm->rtm_rmx.rmx_rttvar), lock(RTTVAR));
1409 printf("%8u%c ", rtm->rtm_rmx.rmx_hopcount, lock(HOPCOUNT));
1410 printf("%8u%c ", rtm->rtm_rmx.rmx_mtu, lock(MTU));
1411 if (rtm->rtm_rmx.rmx_expire)
1412 rtm->rtm_rmx.rmx_expire -= time(0);
1413 printf("%8d%c\n", rtm->rtm_rmx.rmx_expire, lock(EXPIRE));
1414 #undef lock
1415 #undef msec
1416 #define RTA_IGN (RTA_DST|RTA_GATEWAY|RTA_NETMASK|RTA_IFP|RTA_IFA|RTA_BRD)
1417 if (verbose)
1418 pmsg_common(rtm);
1419 else if (rtm->rtm_addrs &~ RTA_IGN) {
1420 (void) printf("sockaddrs: ");
1421 bprintf(stdout, rtm->rtm_addrs, addrnames);
1422 putchar('\n');
1423 }
1424 #undef RTA_IGN
1425 }
1426
1427 void
1428 pmsg_common(rtm)
1429 register struct rt_msghdr *rtm;
1430 {
1431 (void) printf("\nlocks: ");
1432 bprintf(stdout, rtm->rtm_rmx.rmx_locks, metricnames);
1433 (void) printf(" inits: ");
1434 bprintf(stdout, rtm->rtm_inits, metricnames);
1435 pmsg_addrs(((char *)(rtm + 1)), rtm->rtm_addrs);
1436 }
1437
1438 void
1439 pmsg_addrs(cp, addrs)
1440 char *cp;
1441 int addrs;
1442 {
1443 register struct sockaddr *sa;
1444 int i;
1445
1446 if (addrs == 0) {
1447 (void) putchar('\n');
1448 return;
1449 }
1450 (void) printf("\nsockaddrs: ");
1451 bprintf(stdout, addrs, addrnames);
1452 (void) putchar('\n');
1453 for (i = 1; i; i <<= 1)
1454 if (i & addrs) {
1455 sa = (struct sockaddr *)cp;
1456 (void) printf(" %s", routename(sa));
1457 ADVANCE(cp, sa);
1458 }
1459 (void) putchar('\n');
1460 (void) fflush(stdout);
1461 }
1462
1463 void
1464 bprintf(fp, b, s)
1465 register FILE *fp;
1466 register int b;
1467 register u_char *s;
1468 {
1469 register int i;
1470 int gotsome = 0;
1471
1472 if (b == 0)
1473 return;
1474 while ((i = *s++) != 0) {
1475 if (b & (1 << (i-1))) {
1476 if (gotsome == 0)
1477 i = '<';
1478 else
1479 i = ',';
1480 (void) putc(i, fp);
1481 gotsome = 1;
1482 for (; (i = *s) > 32; s++)
1483 (void) putc(i, fp);
1484 } else
1485 while (*s > 32)
1486 s++;
1487 }
1488 if (gotsome)
1489 (void) putc('>', fp);
1490 }
1491
1492 int
1493 keyword(cp)
1494 char *cp;
1495 {
1496 register struct keytab *kt = keywords;
1497
1498 while (kt->kt_cp && strcmp(kt->kt_cp, cp))
1499 kt++;
1500 return kt->kt_i;
1501 }
1502
1503 void
1504 sodump(su, which)
1505 register sup su;
1506 char *which;
1507 {
1508 switch (su->sa.sa_family) {
1509 case AF_LINK:
1510 (void) printf("%s: link %s; ",
1511 which, link_ntoa(&su->sdl));
1512 break;
1513 case AF_INET:
1514 (void) printf("%s: inet %s; ",
1515 which, inet_ntoa(su->sin.sin_addr));
1516 break;
1517 }
1518 (void) fflush(stdout);
1519 }
1520
1521 /* States*/
1522 #define VIRGIN 0
1523 #define GOTONE 1
1524 #define GOTTWO 2
1525 /* Inputs */
1526 #define DIGIT (4*0)
1527 #define END (4*1)
1528 #define DELIM (4*2)
1529
1530 void
1531 sockaddr(addr, sa)
1532 register char *addr;
1533 register struct sockaddr *sa;
1534 {
1535 register char *cp = (char *)sa;
1536 int size = sa->sa_len;
1537 char *cplim = cp + size;
1538 register int byte = 0, state = VIRGIN, new = 0 /* foil gcc */;
1539
1540 bzero(cp, size);
1541 cp++;
1542 do {
1543 if ((*addr >= '0') && (*addr <= '9')) {
1544 new = *addr - '0';
1545 } else if ((*addr >= 'a') && (*addr <= 'f')) {
1546 new = *addr - 'a' + 10;
1547 } else if ((*addr >= 'A') && (*addr <= 'F')) {
1548 new = *addr - 'A' + 10;
1549 } else if (*addr == 0)
1550 state |= END;
1551 else
1552 state |= DELIM;
1553 addr++;
1554 switch (state /* | INPUT */) {
1555 case GOTTWO | DIGIT:
1556 *cp++ = byte; /*FALLTHROUGH*/
1557 case VIRGIN | DIGIT:
1558 state = GOTONE; byte = new; continue;
1559 case GOTONE | DIGIT:
1560 state = GOTTWO; byte = new + (byte << 4); continue;
1561 default: /* | DELIM */
1562 state = VIRGIN; *cp++ = byte; byte = 0; continue;
1563 case GOTONE | END:
1564 case GOTTWO | END:
1565 *cp++ = byte; /* FALLTHROUGH */
1566 case VIRGIN | END:
1567 break;
1568 }
1569 break;
1570 } while (cp < cplim);
1571 sa->sa_len = cp - (char *)sa;
1572 }