]>
git.saurik.com Git - apple/network_cmds.git/blob - route.tproj/route.c
de7ea9774a1ee6fd65b1285065b5d863432b8dd6
2 * Copyright (c) 1999 Apple Computer, Inc. All rights reserved.
4 * @APPLE_LICENSE_HEADER_START@
6 * This file contains Original Code and/or Modifications of Original Code
7 * as defined in and that are subject to the Apple Public Source License
8 * Version 2.0 (the 'License'). You may not use this file except in
9 * compliance with the License. Please obtain a copy of the License at
10 * http://www.opensource.apple.com/apsl/ and read it before using this
13 * The Original Code and all software distributed under the License are
14 * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER
15 * EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES,
16 * INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY,
17 * FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT.
18 * Please see the License for the specific language governing rights and
19 * limitations under the License.
21 * @APPLE_LICENSE_HEADER_END@
24 * Copyright (c) 1983, 1989, 1991, 1993
25 * The Regents of the University of California. All rights reserved.
27 * Redistribution and use in source and binary forms, with or without
28 * modification, are permitted provided that the following conditions
30 * 1. Redistributions of source code must retain the above copyright
31 * notice, this list of conditions and the following disclaimer.
32 * 2. Redistributions in binary form must reproduce the above copyright
33 * notice, this list of conditions and the following disclaimer in the
34 * documentation and/or other materials provided with the distribution.
35 * 3. All advertising materials mentioning features or use of this software
36 * must display the following acknowledgement:
37 * This product includes software developed by the University of
38 * California, Berkeley and its contributors.
39 * 4. Neither the name of the University nor the names of its contributors
40 * may be used to endorse or promote products derived from this software
41 * without specific prior written permission.
43 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
44 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
45 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
46 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
47 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
48 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
49 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
50 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
51 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
52 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
57 static const char copyright
[] =
58 "@(#) Copyright (c) 1983, 1989, 1991, 1993\n\
59 The Regents of the University of California. All rights reserved.\n";
64 static char sccsid
[] = "@(#)route.c 8.3 (Berkeley) 3/19/94";
66 static const char rcsid
[] =
67 "$Id: route.c,v 1.3 2003/01/07 21:03:05 bbraun Exp $";
70 #include <sys/param.h>
72 #include <sys/socket.h>
73 #include <sys/ioctl.h>
74 #include <sys/sysctl.h>
75 #include <sys/types.h>
78 #include <net/route.h>
79 #include <net/if_dl.h>
80 #include <netinet/in.h>
82 #include <netatalk/at.h>
87 #include <arpa/inet.h>
105 #include "keywords.h"
109 struct ortentry route
;
112 struct sockaddr_in sin
;
114 struct sockaddr_in6 sin6
;
117 struct sockaddr_at sat
;
120 struct sockaddr_ns sns
;
122 struct sockaddr_dl sdl
;
123 struct sockaddr_storage ss
; /* added to avoid memory overrun */
124 } so_dst
, so_gate
, so_mask
, so_genmask
, so_ifa
, so_ifp
;
126 typedef union sockunion
*sup
;
127 int pid
, rtm_addrs
, uid
;
129 int forcehost
, forcenet
, doflush
, nflag
, af
, qflag
, tflag
, keyword();
130 int iflag
, verbose
, aflen
= sizeof (struct sockaddr_in
);
131 int locking
, lockrest
, debugonly
;
132 struct rt_metrics rt_metrics
;
135 int atalk_aton
__P((const char *, struct at_addr
*));
136 char *atalk_ntoa
__P((struct at_addr
));
138 const char *routename(), *netname();
139 void flushroutes(), newroute(), monitor(), sockaddr(), sodump(), bprintf();
140 void print_getmsg(), print_rtmsg(), pmsg_common(), pmsg_addrs(), mask_addr();
141 int getaddr(), rtmsg(), x25_makemask();
143 extern char *iso_ntoa();
145 void usage
__P((const char *));
152 warnx("bad keyword: %s", cp
);
153 (void) fprintf(stderr
,
154 "usage: route [-dnqtv] command [[modifiers] args]\n");
160 ((a) > 0 ? (1 + (((a) - 1) | (sizeof(long) - 1))) : sizeof(long))
161 #define ADVANCE(x, n) (x += ROUNDUP((n)->sa_len))
173 while ((ch
= getopt(argc
, argv
, "nqdtv")) != -1)
200 s
= open(_PATH_DEVNULL
, O_WRONLY
, 0);
202 s
= socket(PF_ROUTE
, SOCK_RAW
, 0);
204 err(EX_OSERR
, "socket");
207 switch (keyword(*argv
)) {
215 newroute(argc
, argv
);
224 flushroutes(argc
, argv
);
233 * Purge all entries in the routing tables not
234 * associated with network interfaces.
237 flushroutes(argc
, argv
)
242 int mib
[6], rlen
, seqno
;
243 char *buf
, *next
, *lim
;
244 register struct rt_msghdr
*rtm
;
247 errx(EX_NOPERM
, "must be root to alter routing table");
249 shutdown(s
, 0); /* Don't want to read back our messages */
252 if (argc
== 2 && **argv
== '-')
253 switch (keyword(*argv
+ 1)) {
282 mib
[2] = 0; /* protocol */
283 mib
[3] = 0; /* wildcard address family */
284 mib
[4] = NET_RT_DUMP
;
285 mib
[5] = 0; /* no flags */
286 if (sysctl(mib
, 6, NULL
, &needed
, NULL
, 0) < 0)
287 err(EX_OSERR
, "route-sysctl-estimate");
288 if ((buf
= malloc(needed
)) == NULL
)
289 errx(EX_OSERR
, "malloc failed");
290 if (sysctl(mib
, 6, buf
, &needed
, NULL
, 0) < 0)
291 err(EX_OSERR
, "route-sysctl-get");
294 (void) printf("Examining routing table from sysctl\n");
296 for (next
= buf
; next
< lim
; next
+= rtm
->rtm_msglen
) {
297 rtm
= (struct rt_msghdr
*)next
;
299 print_rtmsg(rtm
, rtm
->rtm_msglen
);
300 if ((rtm
->rtm_flags
& RTF_GATEWAY
) == 0)
303 struct sockaddr
*sa
= (struct sockaddr
*)(rtm
+ 1);
305 if (sa
->sa_family
!= af
)
310 rtm
->rtm_type
= RTM_DELETE
;
311 rtm
->rtm_seq
= seqno
;
312 rlen
= write(s
, next
, rtm
->rtm_msglen
);
313 if (rlen
< (int)rtm
->rtm_msglen
) {
314 warn("write to routing socket");
315 (void) printf("got only %d for rlen\n", rlen
);
322 print_rtmsg(rtm
, rlen
);
324 struct sockaddr
*sa
= (struct sockaddr
*)(rtm
+ 1);
325 (void) printf("%-20.20s ", rtm
->rtm_flags
& RTF_HOST
?
326 routename(sa
) : netname(sa
));
327 sa
= (struct sockaddr
*)(ROUNDUP(sa
->sa_len
) + (char *)sa
);
328 (void) printf("%-20.20s ", routename(sa
));
329 (void) printf("done\n");
339 static char line
[MAXHOSTNAMELEN
+ 1];
341 static char domain
[MAXHOSTNAMELEN
+ 1];
342 static int first
= 1;
349 if (gethostname(domain
, MAXHOSTNAMELEN
) == 0 &&
350 (cp
= index(domain
, '.'))) {
351 domain
[MAXHOSTNAMELEN
] = '\0';
352 (void) strcpy(domain
, cp
+ 1);
358 strcpy(line
, "default");
359 else switch (sa
->sa_family
) {
363 in
= ((struct sockaddr_in
*)sa
)->sin_addr
;
366 if (in
.s_addr
== INADDR_ANY
|| sa
->sa_len
< 4)
368 if (cp
== 0 && !nflag
) {
369 hp
= gethostbyaddr((char *)&in
, sizeof (struct in_addr
),
372 if ((cp
= index(hp
->h_name
, '.')) &&
373 !strcmp(cp
+ 1, domain
))
379 strncpy(line
, cp
, sizeof(line
) - 1);
380 line
[sizeof(line
) - 1] = '\0';
382 /* XXX - why not inet_ntoa()? */
383 #define C(x) (unsigned)((x) & 0xff)
384 in
.s_addr
= ntohl(in
.s_addr
);
385 (void) sprintf(line
, "%u.%u.%u.%u", C(in
.s_addr
>> 24),
386 C(in
.s_addr
>> 16), C(in
.s_addr
>> 8), C(in
.s_addr
));
394 struct sockaddr_in6 sin6
; /* use static var for safety */
396 #ifdef NI_WITHSCOPEID
397 niflags
= NI_WITHSCOPEID
;
400 memset(&sin6
, 0, sizeof(sin6
));
401 memcpy(&sin6
, sa
, sa
->sa_len
);
402 sin6
.sin6_len
= sizeof(struct sockaddr_in6
);
403 sin6
.sin6_family
= AF_INET6
;
405 if (sa
->sa_len
== sizeof(struct sockaddr_in6
) &&
406 (IN6_IS_ADDR_LINKLOCAL(&sin6
.sin6_addr
) ||
407 IN6_IS_ADDR_MC_LINKLOCAL(&sin6
.sin6_addr
)) &&
408 sin6
.sin6_scope_id
== 0) {
410 ntohs(*(u_int16_t
*)&sin6
.sin6_addr
.s6_addr
[2]);
411 sin6
.sin6_addr
.s6_addr
[2] = 0;
412 sin6
.sin6_addr
.s6_addr
[3] = 0;
416 niflags
|= NI_NUMERICHOST
;
417 if (getnameinfo((struct sockaddr
*)&sin6
, sin6
.sin6_len
,
418 line
, sizeof(line
), NULL
, 0, niflags
) != 0)
419 strncpy(line
, "invalid", sizeof(line
));
426 (void) snprintf(line
, sizeof(line
), "atalk %s",
427 atalk_ntoa(((struct sockaddr_at
*)sa
)->sat_addr
));
433 return (ns_print((struct sockaddr_ns
*)sa
));
437 return (link_ntoa((struct sockaddr_dl
*)sa
));
440 { u_short
*s
= (u_short
*)sa
;
441 u_short
*slim
= s
+ ((sa
->sa_len
+ 1) >> 1);
442 char *cp
= line
+ sprintf(line
, "(%d)", sa
->sa_family
);
443 char *cpe
= line
+ sizeof(line
);
445 while (++s
< slim
&& cp
< cpe
) /* start with sa->sa_data */
446 cp
+= snprintf(cp
, cpe
- cp
, " %x", *s
);
454 * Return the name of the network whose address is given.
455 * The address is assumed to be that of a net or subnet, not a host.
462 static char line
[MAXHOSTNAMELEN
+ 1];
463 struct netent
*np
= 0;
471 switch (sa
->sa_family
) {
475 in
= ((struct sockaddr_in
*)sa
)->sin_addr
;
477 i
= in
.s_addr
= ntohl(in
.s_addr
);
482 mask
= IN_CLASSA_NET
;
484 } else if (IN_CLASSB(i
)) {
485 mask
= IN_CLASSB_NET
;
488 mask
= IN_CLASSC_NET
;
492 * If there are more bits than the standard mask
493 * would suggest, subnets must be in use.
494 * Guess at the subnet mask, assuming reasonable
495 * width subnet fields.
497 while (in
.s_addr
&~ mask
)
498 mask
= (long)mask
>> subnetshift
;
499 net
= in
.s_addr
& mask
;
500 while ((mask
& 1) == 0)
501 mask
>>= 1, net
>>= 1;
502 np
= getnetbyaddr(net
, AF_INET
);
507 strncpy(line
, cp
, sizeof(line
));
508 else if ((in
.s_addr
& 0xffffff) == 0)
509 (void) sprintf(line
, "%u", C(in
.s_addr
>> 24));
510 else if ((in
.s_addr
& 0xffff) == 0)
511 (void) sprintf(line
, "%u.%u", C(in
.s_addr
>> 24),
513 else if ((in
.s_addr
& 0xff) == 0)
514 (void) sprintf(line
, "%u.%u.%u", C(in
.s_addr
>> 24),
515 C(in
.s_addr
>> 16), C(in
.s_addr
>> 8));
517 (void) sprintf(line
, "%u.%u.%u.%u", C(in
.s_addr
>> 24),
518 C(in
.s_addr
>> 16), C(in
.s_addr
>> 8),
526 struct sockaddr_in6 sin6
; /* use static var for safety */
528 #ifdef NI_WITHSCOPEID
529 niflags
= NI_WITHSCOPEID
;
532 memset(&sin6
, 0, sizeof(sin6
));
533 memcpy(&sin6
, sa
, sa
->sa_len
);
534 sin6
.sin6_len
= sizeof(struct sockaddr_in6
);
535 sin6
.sin6_family
= AF_INET6
;
537 if (sa
->sa_len
== sizeof(struct sockaddr_in6
) &&
538 (IN6_IS_ADDR_LINKLOCAL(&sin6
.sin6_addr
) ||
539 IN6_IS_ADDR_MC_LINKLOCAL(&sin6
.sin6_addr
)) &&
540 sin6
.sin6_scope_id
== 0) {
542 ntohs(*(u_int16_t
*)&sin6
.sin6_addr
.s6_addr
[2]);
543 sin6
.sin6_addr
.s6_addr
[2] = 0;
544 sin6
.sin6_addr
.s6_addr
[3] = 0;
548 niflags
|= NI_NUMERICHOST
;
549 if (getnameinfo((struct sockaddr
*)&sin6
, sin6
.sin6_len
,
550 line
, sizeof(line
), NULL
, 0, niflags
) != 0)
551 strncpy(line
, "invalid", sizeof(line
));
559 (void) snprintf(line
, sizeof(line
), "atalk %s",
560 atalk_ntoa(((struct sockaddr_at
*)sa
)->sat_addr
));
566 return (ns_print((struct sockaddr_ns
*)sa
));
571 return (link_ntoa((struct sockaddr_dl
*)sa
));
575 { u_short
*s
= (u_short
*)sa
->sa_data
;
576 u_short
*slim
= s
+ ((sa
->sa_len
+ 1)>>1);
577 char *cp
= line
+ sprintf(line
, "af %d:", sa
->sa_family
);
578 char *cpe
= line
+ sizeof(line
);
580 while (s
< slim
&& cp
< cpe
)
581 cp
+= snprintf(cp
, cpe
- cp
, " %x", *s
++);
589 set_metric(value
, key
)
594 u_long noval
, *valp
= &noval
;
597 #define caseof(x, y, z) case x: valp = &rt_metrics.z; flag = y; break
598 caseof(K_MTU
, RTV_MTU
, rmx_mtu
);
599 caseof(K_HOPCOUNT
, RTV_HOPCOUNT
, rmx_hopcount
);
600 caseof(K_EXPIRE
, RTV_EXPIRE
, rmx_expire
);
601 caseof(K_RECVPIPE
, RTV_RPIPE
, rmx_recvpipe
);
602 caseof(K_SENDPIPE
, RTV_SPIPE
, rmx_sendpipe
);
603 caseof(K_SSTHRESH
, RTV_SSTHRESH
, rmx_ssthresh
);
604 caseof(K_RTT
, RTV_RTT
, rmx_rtt
);
605 caseof(K_RTTVAR
, RTV_RTTVAR
, rmx_rttvar
);
608 if (lockrest
|| locking
)
609 rt_metrics
.rmx_locks
|= flag
;
618 register char **argv
;
620 char *cmd
, *dest
= "", *gateway
= "", *err
;
621 int ishost
= 0, ret
, attempts
, oerrno
, flags
= RTF_STATIC
;
623 struct hostent
*hp
= 0;
626 errx(EX_NOPERM
, "must be root to alter routing table");
630 shutdown(s
, 0); /* Don't want to read back our messages */
632 if (**(++argv
)== '-') {
633 switch (key
= keyword(1 + *argv
)) {
636 aflen
= sizeof(struct sockaddr_dl
);
640 aflen
= sizeof(struct sockaddr_in
);
645 aflen
= sizeof(struct sockaddr_in6
);
651 aflen
= sizeof(struct sockaddr_at
);
656 aflen
= sizeof(union sockunion
);
661 aflen
= sizeof(struct sockaddr_ns
);
669 flags
&= ~RTF_STATIC
;
687 flags
|= RTF_BLACKHOLE
;
696 flags
|= RTF_CLONING
;
699 flags
|= RTF_XRESOLVE
;
707 (void) getaddr(RTA_IFA
, *++argv
, 0);
712 (void) getaddr(RTA_IFP
, *++argv
, 0);
717 (void) getaddr(RTA_GENMASK
, *++argv
, 0);
722 (void) getaddr(RTA_GATEWAY
, *++argv
, 0);
727 ishost
= getaddr(RTA_DST
, *++argv
, &hp
);
733 (void) getaddr(RTA_NETMASK
, *++argv
, 0);
741 if (prefixlen(*++argv
) == -1) {
759 set_metric(*++argv
, key
);
765 if ((rtm_addrs
& RTA_DST
) == 0) {
767 ishost
= getaddr(RTA_DST
, *argv
, &hp
);
768 } else if ((rtm_addrs
& RTA_GATEWAY
) == 0) {
770 (void) getaddr(RTA_GATEWAY
, *argv
, &hp
);
772 (void) getaddr(RTA_NETMASK
, *argv
, 0);
779 if (af
== AF_INET6
) {
780 rtm_addrs
&= ~RTA_NETMASK
;
781 memset((void *)&so_mask
, 0, sizeof(so_mask
));
791 flags
|= RTF_GATEWAY
;
792 if (so_mask
.sin
.sin_family
== AF_INET
) {
793 // make sure the mask is contiguous
795 for (i
= 0; i
< 32; i
++)
796 if (((so_mask
.sin
.sin_addr
.s_addr
) & ntohl((1 << i
))) != 0)
799 if (((so_mask
.sin
.sin_addr
.s_addr
) & ntohl((1 << i
))) == 0)
800 errx(EX_NOHOST
, "invalid mask: %s", inet_ntoa(so_mask
.sin
.sin_addr
));
802 for (attempts
= 1; ; attempts
++) {
804 if ((ret
= rtmsg(*cmd
, flags
)) == 0)
806 if (errno
!= ENETUNREACH
&& errno
!= ESRCH
)
808 if (af
== AF_INET
&& *gateway
&& hp
&& hp
->h_addr_list
[1]) {
810 bcopy(hp
->h_addr_list
[0], &so_gate
.sin
.sin_addr
,
811 MIN(hp
->h_length
, sizeof(so_gate
.sin
.sin_addr
)));
818 (void) printf("%s %s %s", cmd
, ishost
? "host" : "net", dest
);
820 (void) printf(": gateway %s", gateway
);
821 if (attempts
> 1 && ret
== 0 && af
== AF_INET
)
822 (void) printf(" (%s)",
823 inet_ntoa(((struct sockaddr_in
*)&route
.rt_gateway
)->sin_addr
));
830 err
= "not in table";
833 err
= "entry in use";
836 err
= "routing table overflow";
839 err
= strerror(oerrno
);
842 (void) printf(": %s\n", err
);
847 inet_makenetandmask(net
, sin
, bits
)
849 register struct sockaddr_in
*sin
;
851 u_long addr
, mask
= 0;
854 rtm_addrs
|= RTA_NETMASK
;
857 mask
= 0xffffffff << (32 - bits
);
860 else if (net
< 128) {
861 addr
= net
<< IN_CLASSA_NSHIFT
;
862 mask
= IN_CLASSA_NET
;
863 } else if (net
< 65536) {
864 addr
= net
<< IN_CLASSB_NSHIFT
;
865 mask
= IN_CLASSB_NET
;
866 } else if (net
< 16777216L) {
867 addr
= net
<< IN_CLASSC_NSHIFT
;
868 mask
= IN_CLASSC_NET
;
871 if ((addr
& IN_CLASSA_HOST
) == 0)
872 mask
= IN_CLASSA_NET
;
873 else if ((addr
& IN_CLASSB_HOST
) == 0)
874 mask
= IN_CLASSB_NET
;
875 else if ((addr
& IN_CLASSC_HOST
) == 0)
876 mask
= IN_CLASSC_NET
;
880 sin
->sin_addr
.s_addr
= htonl(addr
);
882 sin
->sin_addr
.s_addr
= htonl(mask
);
885 cp
= (char *)(&sin
->sin_addr
+ 1);
886 while (*--cp
== 0 && cp
> (char *)sin
)
888 sin
->sin_len
= 1 + cp
- (char *)sin
;
892 * Interpret an argument as a network address of some kind,
893 * returning 1 if a host address, 0 if a network address.
896 getaddr(which
, s
, hpp
)
899 struct hostent
**hpp
;
906 int afamily
; /* local copy of af so we can change it */
910 aflen
= sizeof(struct sockaddr_in
);
921 struct ifaddrs
*ifap
, *ifa
;
922 struct sockaddr_dl
*sdl
= NULL
;
924 if (getifaddrs(&ifap
))
925 err(1, "getifaddrs");
927 for (ifa
= ifap
; ifa
; ifa
= ifa
->ifa_next
) {
928 if (ifa
->ifa_addr
->sa_family
!= AF_LINK
)
931 if (strcmp(s
, ifa
->ifa_name
))
934 sdl
= (struct sockaddr_dl
*)ifa
->ifa_addr
;
936 /* If we found it, then use it */
939 * Copy is safe since we have a
940 * sockaddr_storage member in sockunion{}.
941 * Note that we need to copy before calling
944 memcpy(&su
->sdl
, sdl
, sdl
->sdl_len
);
965 usage("internal error");
968 su
->sa
.sa_len
= aflen
;
969 su
->sa
.sa_family
= afamily
; /* cases that don't want it have left already */
970 if (strcmp(s
, "default") == 0) {
972 * Default is net 0.0.0.0/0
977 /* bzero(su, sizeof(*su)); *//* for readability */
978 (void) getaddr(RTA_NETMASK
, s
, 0);
982 /* bzero(su, sizeof(*su)); *//* for readability */
991 struct addrinfo hints
, *res
;
993 memset(&hints
, 0, sizeof(hints
));
994 hints
.ai_family
= afamily
; /*AF_INET6*/
995 hints
.ai_flags
= AI_NUMERICHOST
;
996 hints
.ai_socktype
= SOCK_DGRAM
; /*dummy*/
997 if (getaddrinfo(s
, "0", &hints
, &res
) != 0 ||
998 res
->ai_family
!= AF_INET6
||
999 res
->ai_addrlen
!= sizeof(su
->sin6
)) {
1000 (void) fprintf(stderr
, "%s: bad value\n", s
);
1003 memcpy(&su
->sin6
, res
->ai_addr
, sizeof(su
->sin6
));
1005 if ((IN6_IS_ADDR_LINKLOCAL(&su
->sin6
.sin6_addr
) ||
1006 IN6_IS_ADDR_LINKLOCAL(&su
->sin6
.sin6_addr
)) &&
1007 su
->sin6
.sin6_scope_id
) {
1008 *(u_int16_t
*)&su
->sin6
.sin6_addr
.s6_addr
[2] =
1009 htons(su
->sin6
.sin6_scope_id
);
1010 su
->sin6
.sin6_scope_id
= 0;
1020 if (which
== RTA_DST
) {
1021 extern short ns_bh
[3];
1022 struct sockaddr_ns
*sms
= &(so_mask
.sns
);
1023 bzero((char *)sms
, sizeof(*sms
));
1024 sms
->sns_family
= 0;
1026 sms
->sns_addr
.x_net
= *(union ns_net
*)ns_bh
;
1027 rtm_addrs
|= RTA_NETMASK
;
1029 su
->sns
.sns_addr
= ns_addr(s
);
1030 return (!ns_nullhost(su
->sns
.sns_addr
));
1036 if (!atalk_aton(s
, &su
->sat
.sat_addr
))
1037 errx(EX_NOHOST
, "bad address: %s", s
);
1038 rtm_addrs
|= RTA_NETMASK
;
1039 return(forcehost
|| su
->sat
.sat_addr
.s_node
!= 0);
1043 link_addr(s
, &su
->sdl
);
1048 su
->sa
.sa_len
= sizeof(*su
);
1049 sockaddr(s
, &su
->sa
);
1062 if (q
&& which
== RTA_DST
) {
1064 if ((val
= inet_addr(s
)) != INADDR_NONE
) {
1065 inet_makenetandmask(
1066 ntohl(val
), &su
->sin
, strtoul(q
+1, 0, 0));
1071 if ((which
!= RTA_DST
|| forcenet
== 0) &&
1072 (val
= inet_addr(s
)) != INADDR_NONE
) {
1073 su
->sin
.sin_addr
.s_addr
= val
;
1074 if (which
!= RTA_DST
||
1075 inet_lnaof(su
->sin
.sin_addr
) != INADDR_ANY
)
1082 if (which
== RTA_DST
&& forcehost
== 0 &&
1083 ((val
= inet_network(s
)) != INADDR_NONE
||
1084 ((np
= getnetbyname(s
)) != NULL
&& (val
= np
->n_net
) != 0))) {
1086 inet_makenetandmask(val
, &su
->sin
, 0);
1089 hp
= gethostbyname(s
);
1092 su
->sin
.sin_family
= hp
->h_addrtype
;
1093 bcopy(hp
->h_addr
, (char *)&su
->sin
.sin_addr
,
1094 MIN(hp
->h_length
, sizeof(su
->sin
.sin_addr
)));
1097 errx(EX_NOHOST
, "bad address: %s", s
);
1104 int len
= atoi(s
), q
, r
;
1108 rtm_addrs
|= RTA_NETMASK
;
1113 p
= (char *)&so_mask
.sin6
.sin6_addr
;
1118 p
= (char *)&so_mask
.sin
.sin_addr
;
1121 (void) fprintf(stderr
, "prefixlen not supported in this af\n");
1126 if (len
< 0 || max
< len
) {
1127 (void) fprintf(stderr
, "%s: bad value\n", s
);
1133 so_mask
.sa
.sa_family
= af
;
1134 so_mask
.sa
.sa_len
= aflen
;
1135 memset((void *)p
, 0, max
/ 8);
1137 memset((void *)p
, 0xff, q
);
1139 *((u_char
*)p
+ q
) = (0xff00 >> r
) & 0xff;
1147 short ns_nullh
[] = {0,0,0};
1148 short ns_bh
[] = {-1,-1,-1};
1152 struct sockaddr_ns
*sns
;
1154 struct ns_addr work
;
1155 union { union ns_net net_e
; u_long long_e
; } net
;
1157 static char mybuf
[50+MAXHOSTNAMELEN
], cport
[10], chost
[25];
1162 work
= sns
->sns_addr
;
1163 port
= ntohs(work
.x_port
);
1165 net
.net_e
= work
.x_net
;
1166 if (ns_nullhost(work
) && net
.long_e
== 0) {
1169 (void) sprintf(mybuf
, "*.%XH", port
);
1173 if (bcmp((char *)ns_bh
, (char *)work
.x_host
.c_host
, 6) == 0)
1175 else if (bcmp((char *)ns_nullh
, (char *)work
.x_host
.c_host
, 6) == 0)
1178 q
= work
.x_host
.c_host
;
1179 (void) sprintf(chost
, "%02X%02X%02X%02X%02X%02XH",
1180 q
[0], q
[1], q
[2], q
[3], q
[4], q
[5]);
1181 for (p
= chost
; *p
== '0' && p
< chost
+ 12; p
++)
1186 (void) sprintf(cport
, ".%XH", htons(port
));
1190 (void) snprintf(mybuf
, sizeof(mybuf
), "%lxH.%s%s",
1191 (unsigned long)ntohl(net
.long_e
),
1202 char *buf
, *lim
, *next
;
1203 register struct rt_msghdr
*rtm
;
1207 mib
[2] = 0; /* protocol */
1208 mib
[3] = 0; /* wildcard address family */
1209 mib
[4] = NET_RT_IFLIST
;
1210 mib
[5] = 0; /* no flags */
1211 if (sysctl(mib
, 6, NULL
, &needed
, NULL
, 0) < 0)
1212 err(EX_OSERR
, "route-sysctl-estimate");
1213 if ((buf
= malloc(needed
)) == NULL
)
1214 errx(EX_OSERR
, "malloc failed");
1215 if (sysctl(mib
, 6, buf
, &needed
, NULL
, 0) < 0)
1216 err(EX_OSERR
, "actual retrieval of interface table");
1218 for (next
= buf
; next
< lim
; next
+= rtm
->rtm_msglen
) {
1219 rtm
= (struct rt_msghdr
*)next
;
1220 print_rtmsg(rtm
, rtm
->rtm_msglen
);
1237 n
= read(s
, msg
, 2048);
1239 (void) printf("\ngot message of size %d on %s", n
, ctime(&now
));
1240 print_rtmsg((struct rt_msghdr
*)msg
, n
);
1245 struct rt_msghdr m_rtm
;
1255 register char *cp
= m_rtmsg
.m_space
;
1258 #define NEXTADDR(w, u) \
1259 if (rtm_addrs & (w)) {\
1260 l = ROUNDUP(u.sa.sa_len); bcopy((char *)&(u), cp, l); cp += l;\
1261 if (verbose) sodump(&(u),"u");\
1265 bzero((char *)&m_rtmsg
, sizeof(m_rtmsg
));
1268 else if (cmd
== 'c')
1270 else if (cmd
== 'g') {
1272 if (so_ifp
.sa
.sa_family
== 0) {
1273 so_ifp
.sa
.sa_family
= AF_LINK
;
1274 so_ifp
.sa
.sa_len
= sizeof(struct sockaddr_dl
);
1275 rtm_addrs
|= RTA_IFP
;
1279 #define rtm m_rtmsg.m_rtm
1281 rtm
.rtm_flags
= flags
;
1282 rtm
.rtm_version
= RTM_VERSION
;
1283 rtm
.rtm_seq
= ++seq
;
1284 rtm
.rtm_addrs
= rtm_addrs
;
1285 rtm
.rtm_rmx
= rt_metrics
;
1286 rtm
.rtm_inits
= rtm_inits
;
1288 if (rtm_addrs
& RTA_NETMASK
)
1290 NEXTADDR(RTA_DST
, so_dst
);
1291 NEXTADDR(RTA_GATEWAY
, so_gate
);
1292 NEXTADDR(RTA_NETMASK
, so_mask
);
1293 NEXTADDR(RTA_GENMASK
, so_genmask
);
1294 NEXTADDR(RTA_IFP
, so_ifp
);
1295 NEXTADDR(RTA_IFA
, so_ifa
);
1296 rtm
.rtm_msglen
= l
= cp
- (char *)&m_rtmsg
;
1298 print_rtmsg(&rtm
, l
);
1301 if ((rlen
= write(s
, (char *)&m_rtmsg
, l
)) < 0) {
1302 warn("writing to routing socket");
1305 if (cmd
== RTM_GET
) {
1307 l
= read(s
, (char *)&m_rtmsg
, sizeof(m_rtmsg
));
1308 } while (l
> 0 && (rtm
.rtm_seq
!= seq
|| rtm
.rtm_pid
!= pid
));
1310 warn("read from routing socket");
1312 print_getmsg(&rtm
, l
);
1321 int olen
= so_mask
.sa
.sa_len
;
1322 register char *cp1
= olen
+ (char *)&so_mask
, *cp2
;
1324 for (so_mask
.sa
.sa_len
= 0; cp1
> (char *)&so_mask
; )
1326 so_mask
.sa
.sa_len
= 1 + cp1
- (char *)&so_mask
;
1329 if ((rtm_addrs
& RTA_DST
) == 0)
1331 switch (so_dst
.sa
.sa_family
) {
1343 cp1
= so_mask
.sa
.sa_len
+ 1 + (char *)&so_dst
;
1344 cp2
= so_dst
.sa
.sa_len
+ 1 + (char *)&so_dst
;
1347 cp2
= so_mask
.sa
.sa_len
+ 1 + (char *)&so_mask
;
1348 while (cp1
> so_dst
.sa
.sa_data
)
1352 char *msgtypes
[] = {
1354 "RTM_ADD: Add Route",
1355 "RTM_DELETE: Delete Route",
1356 "RTM_CHANGE: Change Metrics or flags",
1357 "RTM_GET: Report Metrics",
1358 "RTM_LOSING: Kernel Suspects Partitioning",
1359 "RTM_REDIRECT: Told to use different route",
1360 "RTM_MISS: Lookup failed on this address",
1361 "RTM_LOCK: fix specified metrics",
1362 "RTM_OLDADD: caused by SIOCADDRT",
1363 "RTM_OLDDEL: caused by SIOCDELRT",
1364 "RTM_RESOLVE: Route created by cloning",
1365 "RTM_NEWADDR: address being added to iface",
1366 "RTM_DELADDR: address being removed from iface",
1367 "RTM_IFINFO: iface status change",
1368 "RTM_NEWMADDR: new multicast group membership on iface",
1369 "RTM_DELMADDR: multicast group membership removed from iface",
1373 char metricnames
[] =
1374 "\011pksent\010rttvar\7rtt\6ssthresh\5sendpipe\4recvpipe\3expire\2hopcount"
1377 "\1UP\2GATEWAY\3HOST\4REJECT\5DYNAMIC\6MODIFIED\7DONE\010MASK_PRESENT"
1378 "\011CLONING\012XRESOLVE\013LLINFO\014STATIC\015BLACKHOLE\016b016"
1379 "\017PROTO2\020PROTO1\021PRCLONING\022WASCLONED\023PROTO3\024CHAINDELETE"
1380 "\025PINNED\026LOCAL\027BROADCAST\030MULTICAST";
1382 "\1UP\2BROADCAST\3DEBUG\4LOOPBACK\5PTP\6b6\7RUNNING\010NOARP"
1383 "\011PPROMISC\012ALLMULTI\013OACTIVE\014SIMPLEX\015LINK0\016LINK1"
1384 "\017LINK2\020MULTICAST";
1386 "\1DST\2GATEWAY\3NETMASK\4GENMASK\5IFP\6IFA\7AUTHOR\010BRD";
1389 print_rtmsg(rtm
, msglen
)
1390 register struct rt_msghdr
*rtm
;
1393 struct if_msghdr
*ifm
;
1394 struct ifa_msghdr
*ifam
;
1396 struct ifma_msghdr
*ifmam
;
1401 if (rtm
->rtm_version
!= RTM_VERSION
) {
1402 (void) printf("routing message version %d not understood\n",
1406 (void)printf("%s: len %d, ", msgtypes
[rtm
->rtm_type
], rtm
->rtm_msglen
);
1407 switch (rtm
->rtm_type
) {
1409 ifm
= (struct if_msghdr
*)rtm
;
1410 (void) printf("if# %d, flags:", ifm
->ifm_index
);
1411 bprintf(stdout
, ifm
->ifm_flags
, ifnetflags
);
1412 pmsg_addrs((char *)(ifm
+ 1), ifm
->ifm_addrs
);
1416 ifam
= (struct ifa_msghdr
*)rtm
;
1417 (void) printf("metric %d, flags:", ifam
->ifam_metric
);
1418 bprintf(stdout
, ifam
->ifam_flags
, routeflags
);
1419 pmsg_addrs((char *)(ifam
+ 1), ifam
->ifam_addrs
);
1424 ifmam
= (struct ifma_msghdr
*)rtm
;
1425 pmsg_addrs((char *)(ifmam
+ 1), ifmam
->ifmam_addrs
);
1429 (void) printf("pid: %ld, seq %d, errno %d, flags:",
1430 (long)rtm
->rtm_pid
, rtm
->rtm_seq
, rtm
->rtm_errno
);
1431 bprintf(stdout
, rtm
->rtm_flags
, routeflags
);
1437 print_getmsg(rtm
, msglen
)
1438 register struct rt_msghdr
*rtm
;
1441 struct sockaddr
*dst
= NULL
, *gate
= NULL
, *mask
= NULL
;
1442 struct sockaddr_dl
*ifp
= NULL
;
1443 register struct sockaddr
*sa
;
1447 (void) printf(" route to: %s\n", routename(&so_dst
));
1448 if (rtm
->rtm_version
!= RTM_VERSION
) {
1449 warnx("routing message version %d not understood",
1453 if (rtm
->rtm_msglen
> msglen
) {
1454 warnx("message length mismatch, in packet %d, returned %d",
1455 rtm
->rtm_msglen
, msglen
);
1457 if (rtm
->rtm_errno
) {
1458 errno
= rtm
->rtm_errno
;
1459 warn("message indicates error %d", errno
);
1462 cp
= ((char *)(rtm
+ 1));
1464 for (i
= 1; i
; i
<<= 1)
1465 if (i
& rtm
->rtm_addrs
) {
1466 sa
= (struct sockaddr
*)cp
;
1478 if (sa
->sa_family
== AF_LINK
&&
1479 ((struct sockaddr_dl
*)sa
)->sdl_nlen
)
1480 ifp
= (struct sockaddr_dl
*)sa
;
1486 mask
->sa_family
= dst
->sa_family
; /* XXX */
1488 (void)printf("destination: %s\n", routename(dst
));
1490 int savenflag
= nflag
;
1493 (void)printf(" mask: %s\n", routename(mask
));
1496 if (gate
&& rtm
->rtm_flags
& RTF_GATEWAY
)
1497 (void)printf(" gateway: %s\n", routename(gate
));
1499 (void)printf(" interface: %.*s\n",
1500 ifp
->sdl_nlen
, ifp
->sdl_data
);
1501 (void)printf(" flags: ");
1502 bprintf(stdout
, rtm
->rtm_flags
, routeflags
);
1504 #define lock(f) ((rtm->rtm_rmx.rmx_locks & __CONCAT(RTV_,f)) ? 'L' : ' ')
1505 #define msec(u) (((u) + 500) / 1000) /* usec to msec */
1507 (void) printf("\n%s\n", "\
1508 recvpipe sendpipe ssthresh rtt,msec rttvar hopcount mtu expire");
1509 printf("%8ld%c ", rtm
->rtm_rmx
.rmx_recvpipe
, lock(RPIPE
));
1510 printf("%8ld%c ", rtm
->rtm_rmx
.rmx_sendpipe
, lock(SPIPE
));
1511 printf("%8ld%c ", rtm
->rtm_rmx
.rmx_ssthresh
, lock(SSTHRESH
));
1512 printf("%8ld%c ", msec(rtm
->rtm_rmx
.rmx_rtt
), lock(RTT
));
1513 printf("%8ld%c ", msec(rtm
->rtm_rmx
.rmx_rttvar
), lock(RTTVAR
));
1514 printf("%8ld%c ", rtm
->rtm_rmx
.rmx_hopcount
, lock(HOPCOUNT
));
1515 printf("%8ld%c ", rtm
->rtm_rmx
.rmx_mtu
, lock(MTU
));
1516 if (rtm
->rtm_rmx
.rmx_expire
)
1517 rtm
->rtm_rmx
.rmx_expire
-= time(0);
1518 printf("%8ld%c\n", rtm
->rtm_rmx
.rmx_expire
, lock(EXPIRE
));
1521 #define RTA_IGN (RTA_DST|RTA_GATEWAY|RTA_NETMASK|RTA_IFP|RTA_IFA|RTA_BRD)
1524 else if (rtm
->rtm_addrs
&~ RTA_IGN
) {
1525 (void) printf("sockaddrs: ");
1526 bprintf(stdout
, rtm
->rtm_addrs
, addrnames
);
1534 register struct rt_msghdr
*rtm
;
1536 (void) printf("\nlocks: ");
1537 bprintf(stdout
, rtm
->rtm_rmx
.rmx_locks
, metricnames
);
1538 (void) printf(" inits: ");
1539 bprintf(stdout
, rtm
->rtm_inits
, metricnames
);
1540 pmsg_addrs(((char *)(rtm
+ 1)), rtm
->rtm_addrs
);
1544 pmsg_addrs(cp
, addrs
)
1548 register struct sockaddr
*sa
;
1552 (void) putchar('\n');
1555 (void) printf("\nsockaddrs: ");
1556 bprintf(stdout
, addrs
, addrnames
);
1557 (void) putchar('\n');
1558 for (i
= 1; i
; i
<<= 1)
1560 sa
= (struct sockaddr
*)cp
;
1561 (void) printf(" %s", routename(sa
));
1564 (void) putchar('\n');
1565 (void) fflush(stdout
);
1579 while ((i
= *s
++) != 0) {
1580 if (b
& (1 << (i
-1))) {
1587 for (; (i
= *s
) > 32; s
++)
1594 (void) putc('>', fp
);
1601 register struct keytab
*kt
= keywords
;
1603 while (kt
->kt_cp
&& strcmp(kt
->kt_cp
, cp
))
1613 switch (su
->sa
.sa_family
) {
1615 (void) printf("%s: link %s; ",
1616 which
, link_ntoa(&su
->sdl
));
1619 (void) printf("%s: inet %s; ",
1620 which
, inet_ntoa(su
->sin
.sin_addr
));
1624 (void) printf("%s: atalk %s; ",
1625 which
, atalk_ntoa(su
->sat
.sat_addr
));
1630 (void) printf("%s: xns %s; ",
1631 which
, ns_ntoa(su
->sns
.sns_addr
));
1635 (void) fflush(stdout
);
1649 register char *addr
;
1650 register struct sockaddr
*sa
;
1652 register char *cp
= (char *)sa
;
1653 int size
= sa
->sa_len
;
1654 char *cplim
= cp
+ size
;
1655 register int byte
= 0, state
= VIRGIN
, new = 0 /* foil gcc */;
1660 if ((*addr
>= '0') && (*addr
<= '9')) {
1662 } else if ((*addr
>= 'a') && (*addr
<= 'f')) {
1663 new = *addr
- 'a' + 10;
1664 } else if ((*addr
>= 'A') && (*addr
<= 'F')) {
1665 new = *addr
- 'A' + 10;
1666 } else if (*addr
== 0)
1671 switch (state
/* | INPUT */) {
1672 case GOTTWO
| DIGIT
:
1673 *cp
++ = byte
; /*FALLTHROUGH*/
1674 case VIRGIN
| DIGIT
:
1675 state
= GOTONE
; byte
= new; continue;
1676 case GOTONE
| DIGIT
:
1677 state
= GOTTWO
; byte
= new + (byte
<< 4); continue;
1678 default: /* | DELIM */
1679 state
= VIRGIN
; *cp
++ = byte
; byte
= 0; continue;
1682 *cp
++ = byte
; /* FALLTHROUGH */
1687 } while (cp
< cplim
);
1688 sa
->sa_len
= cp
- (char *)sa
;
1693 atalk_aton(const char *text
, struct at_addr
*addr
)
1697 if (sscanf(text
, "%u.%u", &net
, &node
) != 2
1698 || net
> 0xffff || node
> 0xff)
1700 addr
->s_net
= htons(net
);
1701 addr
->s_node
= node
;
1706 atalk_ntoa(struct at_addr at
)
1708 static char buf
[20];
1710 (void) snprintf(buf
, sizeof(buf
), "%u.%u", ntohs(at
.s_net
), at
.s_node
);