/*
 * CDDL HEADER START
 *
 * The contents of this file are subject to the terms of the
 * Common Development and Distribution License (the "License").
 * You may not use this file except in compliance with the License.
 *
 * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
 * or http://www.opensolaris.org/os/licensing.
 * See the License for the specific language governing permissions
 * and limitations under the License.
 *
 * When distributing Covered Code, include this CDDL HEADER in each
 * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
 * If applicable, add the following below this CDDL HEADER, with the
 * fields enclosed by brackets "[]" replaced with your own identifying
 * information: Portions Copyright [yyyy] [name of copyright owner]
 *
 * CDDL HEADER END
 */
/*
 * Copyright 2006 Sun Microsystems, Inc.  All rights reserved.
 * Use is subject to license terms.
 */

#pragma ident	"%Z%%M%	%I%	%E% SMI"

#include <stdio.h>
#include <string.h>
#include <stdlib.h>
#include <unistd.h>
#include <limits.h>
#include <ctype.h>
#include <stropts.h>
#include <errno.h>
#include <libintl.h>
#include <locale.h>
#include <fcntl.h>
#include <sys/types.h>
#include <sys/stat.h>
#include <sys/socket.h>
#include <sys/sockio.h>
#include <inet/ip.h>
#include <inet/nd.h>
#include <net/if.h>
#include <libscf.h>
#include <libscf_priv.h>
#include <libuutil.h>

/*
 * This program moves routing management under SMF.  We do this by giving
 * routeadm options that allow interaction with SMF services.  These include:
 * - setting the routing services routeadm will enable
 *	# routeadm -s routing-svcs="fmri [fmri...]"
 * where each fmri is an SMF routing service.
 * - changing properties of routing services
 *	# routeadm -m fmri key=value [key=value...]
 * - listing routing daemon properties
 *	# routeadm -l fmri
 * where all properties in the "routing" property group are listed.
 *
 * By providing legacy routing services (legacy-routing:ipv4 and ipv6), we
 * can also support running of routing daemons with no SMF service under SMF.
 * Specifying a routing daemon with no SMF counterpart results in the
 * daemon, it`s arguments and stop command being set in the appropriate instance
 * to be picked up by start/stop methods.
 *
 * Internally, routeadm keeps track of routing services by setting the
 * "current-routing-svc" property to "true" in the services it manages.
 * So for example, running
 *	# routeadm -s routing-svcs="route:default ripng:default"
 * sets this variable in each instance specified. If the user specifies a
 * non-SMF routing daemon via
 * 	# routeadm -s ipv4-routing-daemon=/usr/sbin/mydaemon
 * the variable will be set for the legacy-routing:ipv4 instance.
 *
 * In order to ensure that the SMF versions of routing daemons are used
 * where possible, routeadm will check the daemons specified in
 * ipv4-routing-daemon/ipv6-routing-daemon to determine if there is an
 * SMF counterpart.  If so, rather than running the legacy service
 * we move configuration, specifically the associated daemon arguments
 * to the SMF counterpart.  From there,  when the daemon is enabled,  it
 * will pick up the daemon arguments setting,  transfer the argument string
 * to the appropriate properties and run the service.
 *
 * To support the semantics of routeadm -e (enable at next boot) through SMF,
 * we make use of temporary state changes,  which last only until reboot.
 * For example, if a service is disabled,  and it is to be enabled via
 * routeadm -e,  we simply change the disable to a temporary disable,
 * and set the persistent enabled value to true.  This ensures the daemon
 * will run at next boot,  but not now.  The reverse is true for disabling
 * enabled instances  (and if the daemon is enabled when we issue the enable,
 * we do nothing since it is already in the desired state).
 *
 * Since the code is quite involved,  we provide a guide to the more complex
 * actions taken in response to user commands.
 *
 * routeadm -e[d] ipv4[6]-routing[forwarding]
 *
 * 	In this case,  the goal is to prepare the configured routing daemons
 * 	(specified through routeadm -s routing-svcs="...") or forwarding
 *	services to switch on (-e) or of (-d) at next boot.
 *
 *	Since this operation must be applied to multiple services in the
 *	routing daemon case (as opposed to the single ipv4[6]-forwarding
 *	service),  we make use of the scf_walk_fmri() function,  which
 *	applies a callback function to all matching functions.  In the case
 *	of the routing daemons,  we pass in a NULL signifying that all
 *	instances should be walked  (we then weed out the relevant routing
 *	services through presence of the routeadm/protocol property).  In
 *	the case of enable, a routing service is enabled IFF it has the
 *	previously-mentioned property - with an appropriate value (i.e. ipv4
 *	for "routeadm -e ipv4-routing") - and it has routeadm/curr-routing-svc
 *	property set to true  (this is set by other operations such as
 *	routeadm -s routing-svcs="...").  Then,  smf_enable_instance() or
 *	smf_disable_instance() is called,  setting the temporary state to
 *	the current state of the service.  This then allows setting of
 *	general/enabled value to next-boot value.  In the case of disabling
 *	ipv4[6]-routing,  all valid ipv4[6] routing daemons are prepared
 *	for next-boot disable, not just those specified via routing-svcs (this
 *	means that if the user enables routing daemons with "svcadm enable",
 *	disabling global routing does really switch off all routing daemons).
 *
 *	This is implemented through the ra_get_set_opt_common_cb() function,
 *	called by the ra_set_persistent_opt_cb() function.  The same
 *	function can be used for both routing and forwarding options,  in the
 *	latter case we simply provide the specific FMRI of the forwarding
 *	service in question (ipv4-forwarding or ipv6-forwarding),  and dispense
 *	with the eligibility tests we need to weed out the routing services
 *	from the rest.
 *
 *	Before we initiate the "enable" however, we must check routing daemons
 *	specified via the legacy variables (ipv4-routing-daemon etc).
 *	If they map to SMF routing services,  we wish to transfer their
 *	configuration to the corresponding services and use them instead of
 *	the legacy services.  To do this,  we need to match the daemon program
 *	against the routeadm/daemon property of each routing daemon (we use
 *	scf_walk_fmri() and the routeadm/protocol property again to identify
 *	daemons).  If a match is found,  the daemon arguments are transferred
 *	to the appropriate service`s daemon-args property, to be picked up
 *	by it`s start method and converted into appropriate property values.
 *	This is accomplished by ra_check_legacy_daemons(), and the callback
 *	operation is carried out by ra_upgrade_legacy_daemons_cb().  If the
 *	daemon was not upgraded,  we need to mark the legacy-routing:ipv4[6]
 *	instance to be enabled (by routeadm -e),  since it now must run the
 *	un-upgradeable legacy daemon.
 *
 * routeadm -l fmri
 *
 *	Lists all properties and values in the routing property group associated
 *	with instance fmri.  We simply walk through the composed property
 *	group, displaying all values.  See ra_list_props_cb().
 *
 * routeadm -m fmri key=value ...
 *
 *	Modify property values in the routing property group.  If the same
 *	key is used more than once,  multiple property values are set for that
 *	property.  Properties must exist in the composed property group,  but
 *	will only ever be set at the instance level to prevent multiple
 *	instances inheriting the property in error.  See ra_modify_props_cb().
 *
 * routeadm -s var=value
 *
 *	In all cases bar the routing-svcs variable,  this simply involves
 *	setting the appropriate SMF property value for the variable.  The
 *	routing-svcs case is more complex,  since we would like operations
 *	like the following to have intuitive effects:
 *		# routeadm -s routing-svcs=route -e ipv4-routing -u
 *		# routeadm -s routing-svcs=rdisc -u
 *	i.e., in the end, rdisc is the only routing service running.  To
 *	accomplish this switchover,  we need to disable the old routing-svcs
 *	and enable the new, marking the latter with the curr-routing-svc
 *	property so that routeadm -e will pick them up.  This is carried
 *	out by the ra_update_routing_svcs() function.
 *
 * routeadm -R alt_root ...
 *
 *	Used to support use of routeadm in Custom Jumpstart scripts,  this
 *	option causes all subsequent commands to be appended to the
 *	/var/svc/profile/upgrade file,  which is run on the subsequent boot.
 *	This is done because the SMF repository is not available to make
 *	the modifications to property values required in routeadm operations.
 *
 * routeadm -u
 *
 *	Update applies the "next boot" state to the current system.  Here
 *	we simply take the persistent state (general/enabled value) and
 *	make it the current state through smf_enable_instance() or
 *	smf_disable_instance() as appropriate (these calls,  without the
 *	temporary flag set,  delete the general_ovr/enabled property).
 */

#define	RA_OPT_IPV4_ROUTING	"ipv4-routing"
#define	RA_OPT_IPV6_ROUTING	"ipv6-routing"
#define	RA_OPT_IPV4_FORWARDING	"ipv4-forwarding"
#define	RA_OPT_IPV6_FORWARDING	"ipv6-forwarding"

#define	IS_ROUTING_OPT(opt)	(strcmp(opt, RA_OPT_IPV4_ROUTING) == 0 || \
				strcmp(opt, RA_OPT_IPV6_ROUTING) == 0)

#define	RA_VAR_IPV4_ROUTING_DAEMON	"ipv4-routing-daemon"
#define	RA_VAR_IPV4_ROUTING_DAEMON_ARGS	"ipv4-routing-daemon-args"
#define	RA_VAR_IPV4_ROUTING_STOP_CMD	"ipv4-routing-stop-cmd"
#define	RA_VAR_IPV6_ROUTING_DAEMON	"ipv6-routing-daemon"
#define	RA_VAR_IPV6_ROUTING_DAEMON_ARGS	"ipv6-routing-daemon-args"
#define	RA_VAR_IPV6_ROUTING_STOP_CMD	"ipv6-routing-stop-cmd"
#define	RA_VAR_ROUTING_SVCS		"routing-svcs"


#define	RA_INSTANCE_ALL			NULL
#define	RA_INSTANCE_ROUTING_SETUP	"svc:/network/routing-setup:default"
#define	RA_INSTANCE_IPV4_FORWARDING	"svc:/network/ipv4-forwarding:default"
#define	RA_INSTANCE_IPV6_FORWARDING	"svc:/network/ipv6-forwarding:default"
#define	RA_INSTANCE_LEGACY_ROUTING_IPV4 \
	"svc:/network/routing/legacy-routing:ipv4"
#define	RA_INSTANCE_LEGACY_ROUTING_IPV6 \
	"svc:/network/routing/legacy-routing:ipv6"
#define	RA_INSTANCE_NDP			"svc:/network/routing/ndp:default"

#define	RA_PG_ROUTEADM			"routeadm"
#define	RA_PROP_CURR_ROUTING_SVC	"current-routing-svc"
#define	RA_PROP_ROUTING_SVCS		"routing-svcs"
#define	RA_PROP_DEFAULT_ROUTING_SVCS	"default-routing-svcs"
#define	RA_PROP_PROTO			"protocol"
#define	RA_PROP_DAEMON			"daemon"
#define	RA_PROP_DEFAULT_DAEMON		"default-daemon"
#define	RA_PROP_DAEMON_ARGS		"daemon-args"
#define	RA_PROP_DEFAULT_DAEMON_ARGS	"default-daemon-args"
#define	RA_PROP_DAEMON_STOP_CMD		"daemon-stop-cmd"
#define	RA_PROP_DEFAULT_STOP_CMD	"default-daemon"
#define	RA_PROP_LEGACY_DAEMON		"legacy-daemon"
#define	RA_PROP_DEFAULT_IPV4_ROUTING	"default-ipv4-routing"
#define	RA_PROP_DEFAULT_IPV6_ROUTING	"default-ipv6-routing"
#define	RA_PROP_DEFAULT_IPV4_FORWARDING	"default-ipv4-forwarding"
#define	RA_PROP_DEFAULT_IPV6_FORWARDING	"default-ipv6-forwarding"
#define	RA_PROP_IPV4_ROUTING_SET	"ipv4-routing-set"
#define	RA_PROP_IPV6_ROUTING_SET	"ipv6-routing-set"
#define	RA_PROP_ROUTING_CONF_READ	"routing-conf-read"

#define	RA_PG_ROUTING			"routing"

#define	RA_PROPVAL_BOOLEAN_TRUE		"true"
#define	RA_PROPVAL_BOOLEAN_FALSE	"false"
#define	RA_PROPVAL_PROTO_IPV4		"ipv4"
#define	RA_PROPVAL_PROTO_IPV6		"ipv6"

#define	RA_SVC_FLAG_NONE		0x0
#define	RA_SVC_FLAG_IPV4_ROUTING	0x1
#define	RA_SVC_FLAG_IPV6_ROUTING	0x2

#define	RA_SMF_UPGRADE_FILE		"/var/svc/profile/upgrade"
#define	RA_SMF_UPGRADE_MSG		" # added by routeadm(1M)"
#define	RA_CONF_FILE			"/etc/inet/routing.conf"
#define	RA_CONF_FILE_OLD		"/etc/inet/routing.conf.old"
#define	RA_MAX_CONF_LINE		256

/*
 * Option value.  Each option requires an FMRI identifying which services
 * to run the get_current/persistent scf_walk_fmri() function with,  and
 * associated flags (to ensure that in the case that multiple services
 * match, we select the correct ones). In addition, we specify the FMRI
 * and property used to set default option value.  The opt_enabled field
 * is used to hold retrieved state from get_*_opt_() callbacks and to specify
 * desired state for set_*_opt() operations.
 */

typedef struct raopt {
	const char	*opt_name;
	const char	*opt_fmri;
	int		opt_flags;
	boolean_t	opt_enabled;
	const char	*opt_default_fmri;
	const char	*opt_default_prop;
	boolean_t	opt_default_enabled;
} raopt_t;


raopt_t ra_opts[] = {
	{ RA_OPT_IPV4_ROUTING, RA_INSTANCE_ALL, RA_SVC_FLAG_IPV4_ROUTING,
	B_FALSE, RA_INSTANCE_ROUTING_SETUP, RA_PROP_DEFAULT_IPV4_ROUTING,
	B_FALSE },
	{ RA_OPT_IPV6_ROUTING, RA_INSTANCE_ALL, RA_SVC_FLAG_IPV6_ROUTING,
	B_FALSE, RA_INSTANCE_ROUTING_SETUP, RA_PROP_DEFAULT_IPV6_ROUTING,
	B_FALSE },
	{ RA_OPT_IPV4_FORWARDING, RA_INSTANCE_IPV4_FORWARDING, RA_SVC_FLAG_NONE,
	B_FALSE, RA_INSTANCE_IPV4_FORWARDING, RA_PROP_DEFAULT_IPV4_FORWARDING,
	B_FALSE },
	{ RA_OPT_IPV6_FORWARDING, RA_INSTANCE_IPV6_FORWARDING, RA_SVC_FLAG_NONE,
	B_FALSE, RA_INSTANCE_IPV6_FORWARDING, RA_PROP_DEFAULT_IPV6_FORWARDING,
	B_FALSE },
	{ NULL, NULL, RA_SVC_FLAG_NONE, B_FALSE, NULL, NULL, B_FALSE }
};

typedef enum option_values {
	OPT_INVALID, OPT_ENABLED, OPT_DISABLED, OPT_DEFAULT, OPT_UNKNOWN
} oval_t;

typedef struct ra_var {
	const char	*var_name;
	const char	*var_fmri;
	const char	*var_prop;
	char		*var_value;
	const char	*var_default_fmri;
	const char	*var_default_prop;
	char		*var_default_value;
} ravar_t;

ravar_t ra_vars[] = {
	{ RA_VAR_IPV4_ROUTING_DAEMON, RA_INSTANCE_LEGACY_ROUTING_IPV4,
	RA_PROP_DAEMON, NULL, RA_INSTANCE_LEGACY_ROUTING_IPV4,
	RA_PROP_DEFAULT_DAEMON, NULL},
	{ RA_VAR_IPV4_ROUTING_DAEMON_ARGS, RA_INSTANCE_LEGACY_ROUTING_IPV4,
	RA_PROP_DAEMON_ARGS, NULL, RA_INSTANCE_LEGACY_ROUTING_IPV4,
	RA_PROP_DEFAULT_DAEMON_ARGS, NULL },
	{ RA_VAR_IPV4_ROUTING_STOP_CMD, RA_INSTANCE_LEGACY_ROUTING_IPV4,
	RA_PROP_DAEMON_STOP_CMD, NULL, RA_INSTANCE_LEGACY_ROUTING_IPV4,
	RA_PROP_DEFAULT_STOP_CMD, NULL },
	{ RA_VAR_IPV6_ROUTING_DAEMON, RA_INSTANCE_LEGACY_ROUTING_IPV6,
	RA_PROP_DAEMON, NULL, RA_INSTANCE_LEGACY_ROUTING_IPV6,
	RA_PROP_DEFAULT_DAEMON, NULL },
	{ RA_VAR_IPV6_ROUTING_DAEMON_ARGS, RA_INSTANCE_LEGACY_ROUTING_IPV6,
	RA_PROP_DAEMON_ARGS, NULL, RA_INSTANCE_LEGACY_ROUTING_IPV6,
	RA_PROP_DEFAULT_DAEMON_ARGS, NULL },
	{ RA_VAR_IPV6_ROUTING_STOP_CMD, RA_INSTANCE_LEGACY_ROUTING_IPV6,
	RA_PROP_DAEMON_STOP_CMD, NULL, RA_INSTANCE_LEGACY_ROUTING_IPV6,
	RA_PROP_DEFAULT_STOP_CMD, NULL },
	{ RA_VAR_ROUTING_SVCS, RA_INSTANCE_ROUTING_SETUP,
	RA_PROP_ROUTING_SVCS, NULL, RA_INSTANCE_ROUTING_SETUP,
	RA_PROP_DEFAULT_ROUTING_SVCS, NULL },
	{ NULL, NULL, NULL, NULL, NULL, NULL, NULL }
};

char *v_opt[] = {
#define	IPV4_ROUTING_DAEMON			0
	RA_VAR_IPV4_ROUTING_DAEMON,
#define	IPV4_ROUTING_DAEMON_ARGS		1
	RA_VAR_IPV4_ROUTING_DAEMON_ARGS,
#define	IPV4_ROUTING_STOP_CMD			2
	RA_VAR_IPV4_ROUTING_STOP_CMD,
#define	IPV6_ROUTING_DAEMON			3
	RA_VAR_IPV6_ROUTING_DAEMON,
#define	IPV6_ROUTING_DAEMON_ARGS		4
	RA_VAR_IPV6_ROUTING_DAEMON_ARGS,
#define	IPV6_ROUTING_STOP_CMD			5
	RA_VAR_IPV6_ROUTING_STOP_CMD,
#define	ROUTING_SVCS				6
	RA_VAR_ROUTING_SVCS,
	NULL
};

#define	IS_IPV4_VAR(varname)	(strncmp(varname, "ipv4", 4) == 0)
#define	IS_IPV6_VAR(varname)	(strncmp(varname, "ipv6", 4) == 0)
#define	VAR_PROTO_MATCH(varname, proto)	(strncmp(varname, proto, 4) == 0)
#define	IPV4_VARS_UNSET \
	(strtok(ra_vars[IPV4_ROUTING_DAEMON].var_value, " \t") == NULL && \
	strtok(ra_vars[IPV4_ROUTING_DAEMON_ARGS].var_value, " \t") == NULL && \
	strtok(ra_vars[IPV4_ROUTING_STOP_CMD].var_value, " \t") == NULL)

#define	IPV6_VARS_UNSET	\
	(strtok(ra_vars[IPV6_ROUTING_DAEMON].var_value, " \t") == NULL && \
	strtok(ra_vars[IPV6_ROUTING_DAEMON_ARGS].var_value, " \t") == NULL && \
	strtok(ra_vars[IPV6_ROUTING_STOP_CMD].var_value, " \t") == NULL)

/*
 * Structure used in modify operations to tie property name and multiple values
 * together.
 */
typedef struct ra_prop {
	char	*prop_name;
	char	**prop_values;
	int	prop_numvalues;
} ra_prop_t;

typedef int (*ra_smf_cb_t)(void *, scf_walkinfo_t *);

/* Used to store program name */
static const char	*myname;

static void usage(void);

static int ra_check_legacy_daemons(void);
static int ra_upgrade_legacy_daemons(void);
static int ra_upgrade_cmd(char, int, char **);
static int ra_update(void);
static int ra_update_routing_svcs(char *);
static int ra_report(boolean_t, const char *);
static int ra_smf_cb(ra_smf_cb_t, const char *, void *);
static int ra_upgrade_from_legacy_conf(void);
static int ra_numv6intfs(void);
static int ra_parseconf(void);
static int ra_parseopt(char *, int, raopt_t *);
static int ra_parsevar(char *, ravar_t *);
static oval_t ra_str2oval(const char *);
static raopt_t *ra_str2opt(const char *);
static void ra_resetopts(void);
static ravar_t *ra_str2var(const char *);
static void ra_resetvars(const char *);
static char *ra_intloptname(const char *);

/* Callback for upgrade of legacy daemons */
static int ra_upgrade_legacy_daemons_cb(void *, scf_walkinfo_t *);

/* Callbacks used to set/retieve routing options */
static int ra_set_current_opt_cb(void *, scf_walkinfo_t *);
static int ra_set_persistent_opt_cb(void *, scf_walkinfo_t *);
static int ra_set_default_opt_cb(void *, scf_walkinfo_t *);
static int ra_get_current_opt_cb(void *, scf_walkinfo_t *);
static int ra_get_persistent_opt_cb(void *, scf_walkinfo_t *);
static int ra_get_default_opt_cb(void *, scf_walkinfo_t *);
static int ra_get_set_opt_common_cb(raopt_t *, scf_walkinfo_t *, boolean_t,
    boolean_t);
static int ra_routing_opt_set_cb(void *, scf_walkinfo_t *);
static int ra_routing_opt_unset_cb(void *, scf_walkinfo_t *);
static int ra_routing_opt_set_unset_cb(raopt_t *, scf_walkinfo_t *, boolean_t);

/* Callbacks used to set/retrieve routing variables */
static int ra_set_persistent_var_cb(void *, scf_walkinfo_t *);
static int ra_get_persistent_var_cb(void *, scf_walkinfo_t *);
static int ra_get_default_var_cb(void *, scf_walkinfo_t *);
static int ra_mark_routing_svcs_cb(void *, scf_walkinfo_t *);

/* Callbacks used to list/set daemon properties and list daemons and states. */
static int ra_list_props_cb(void *, scf_walkinfo_t *);
static int ra_modify_props_cb(void *, scf_walkinfo_t *);
static int ra_print_state_cb(void *, scf_walkinfo_t *);

/* Utility functions for SMF operations */
static int ra_get_pg(scf_handle_t *, scf_instance_t *, const char *,
    boolean_t, boolean_t, scf_propertygroup_t **);
static int ra_get_boolean_prop(scf_handle_t *, scf_instance_t *,
    const char *, const char *,  boolean_t, boolean_t, boolean_t *);
static int ra_get_single_prop_as_string(scf_handle_t *, scf_instance_t *,
    const char *, const char *, boolean_t, boolean_t, scf_type_t *, char **);
static int ra_get_prop_as_string(scf_handle_t *, scf_instance_t *,
    const char *, const char *, boolean_t, boolean_t, scf_type_t *, int *,
    char ***);
static void ra_free_prop_values(int, char **);
static int ra_set_boolean_prop(scf_handle_t *, scf_instance_t *,
    const char *, const char *, boolean_t, boolean_t);
static int ra_set_prop_from_string(scf_handle_t *, scf_instance_t *,
    const char *, const char *, scf_type_t, boolean_t, int,
    const char **);

static void
usage(void)
{
	(void) fprintf(stderr, gettext(
	    "usage: %1$s [-p] [-R <root-dir>]\n"
	    "       %1$s [-e <option>] [-d <option>] [-r <option>]\n"
	    "           [-l <FMRI>] [-m <FMRI> key=value [...]]\n"
	    "           [-s <var>=<val>] [-R <root-dir>]\n"
	    "       %1$s -u\n\n"
	    "       <option> is one of:\n"
	    "       ipv4-forwarding\n"
	    "       ipv4-routing\n"
	    "       ipv6-forwarding\n"
	    "       ipv6-routing\n\n"
	    "       <var> is one of:\n"
	    "       ipv4-routing-daemon\n"
	    "       ipv4-routing-daemon-args\n"
	    "       ipv4-routing-stop-cmd\n"
	    "       ipv6-routing-daemon\n"
	    "       ipv6-routing-daemon-args\n"
	    "       ipv6-routing-stop-cmd\n"
	    "       routing-svcs\n"), myname);
}

int
main(int argc, char *argv[])
{
	int		opt, opt_index, numargs, status = 0;
	int		numvalues, i;
	ssize_t		keylen;
	boolean_t	modify = B_FALSE, report = B_TRUE, update = B_FALSE;
	boolean_t	booting = B_FALSE, alt_root_set = B_FALSE;
	boolean_t	parseable = B_FALSE;
	char		*key, *nk, *keyend, *val, **vals, *options, *fmri;
	char		*parseopt = NULL;
	raopt_t		*raopt;
	ravar_t		*ravar;
	ra_prop_t	raprop;

	myname = argv[0];

	(void) setlocale(LC_ALL, "");

#if	!defined(TEXT_DOMAIN)	/* Should be defined by cc -D */
#define	TEXT_DOMAIN	"SYS_TEST"
#endif

	(void) textdomain(TEXT_DOMAIN);

	/*
	 * Before processing any options, we parse /etc/inet/routing.conf
	 * (if present) and transfer values to SMF.
	 */
	if (ra_upgrade_from_legacy_conf() == -1)
		exit(EXIT_FAILURE);
	while ((opt = getopt(argc, argv, ":bd:e:l:m:p:R:r:s:u")) != EOF) {
		switch (opt) {
		case 'b':
			/*
			 * Project-private option that tells us enable/disable
			 * operations should not set ipv4(6)-routing-set
			 * property.  Used in routing-setup service method
			 * to change default routing state, and, if
			 * no explicit enable/disable operations have been
			 * carried out, change current ipv4 routing state.
			 */
			booting = B_TRUE;
			break;
		case 'd':
		case 'e':
		case 'r':
			if (alt_root_set) {
				if (ra_upgrade_cmd(opt, 1, &optarg) != 0)
					exit(EXIT_FAILURE);
				modify = B_TRUE;
				break;
			}
			if ((raopt = ra_str2opt(optarg)) != NULL) {
				/* Set current value appropriately */
				switch (opt) {
				case 'd':
					raopt->opt_enabled = B_FALSE;
					break;
				case 'e':
					/*
					 * Check legacy daemons, mark
					 * routing-svcs.
					 */
					if (IS_ROUTING_OPT(optarg) &&
					    ra_check_legacy_daemons() == -1)
						exit(EXIT_FAILURE);
					raopt->opt_enabled = B_TRUE;
					break;
				case 'r':
					/*
					 * This callback sets opt_enabled to
					 * the default value.
					 */
					ra_resetopts();
					if (ra_smf_cb(ra_get_default_opt_cb,
					    raopt->opt_default_fmri, raopt)
					    == -1)
						exit(EXIT_FAILURE);
					if (raopt->opt_enabled &&
					    IS_ROUTING_OPT(optarg) &&
					    ra_check_legacy_daemons() == -1)
						exit(EXIT_FAILURE);
					/* set value to default */
					raopt->opt_enabled =
					    raopt->opt_default_enabled;
					break;
				}
				if (ra_smf_cb(ra_set_persistent_opt_cb,
				    raopt->opt_fmri, raopt) == -1)
					exit(EXIT_FAILURE);
				/*
				 * ipv4(6)-routing explicitly enabled/disabled,
				 * need to set ipv4(6)-routing-set property
				 * for routing-setup service.  Once this
				 * is set, routing-setup will not override
				 * administrator action and will not enable
				 * ipv4-routing in the case that no default
				 * route can be determined.  If ipv4(6)-routing
				 * is reverted to its default value,  set
				 * ipv4(6)-routing-set back to false.
				 */
				if (!booting && (raopt->opt_flags &
				    (RA_SVC_FLAG_IPV4_ROUTING |
				    RA_SVC_FLAG_IPV6_ROUTING))) {
					if (ra_smf_cb(opt == 'r' ?
					    ra_routing_opt_unset_cb :
					    ra_routing_opt_set_cb,
					    raopt->opt_default_fmri, raopt)
					    == -1)
						exit(EXIT_FAILURE);
				}
			} else if ((ravar = ra_str2var(optarg)) != NULL) {
				if (opt != 'r') {
					usage();
					exit(EXIT_FAILURE);
				}
				/* set current value to default */
				ra_resetopts();
				if (ra_smf_cb(ra_get_default_var_cb,
				    ravar->var_default_fmri, ravar) == -1)
					exit(EXIT_FAILURE);
				/* Need special case for routing-svcs var */
				if (strcmp(ravar->var_name, RA_VAR_ROUTING_SVCS)
				    == 0) {
					if (ra_update_routing_svcs(
					    ravar->var_default_value) == -1)
						exit(EXIT_FAILURE);
				} else if (ra_smf_cb(ra_set_persistent_var_cb,
				    ravar->var_fmri, ravar) == -1)
					exit(EXIT_FAILURE);
			} else {
				(void) fprintf(stderr, gettext(
				    "%1$s: invalid option: %2$s\n"), myname,
				    optarg);
				usage();
				exit(EXIT_FAILURE);
			}
			modify = B_TRUE;
			break;
		case 'l':
			if (ra_smf_cb(ra_list_props_cb, optarg, NULL) == -1)
				exit(EXIT_FAILURE);
			report = B_FALSE;
			break;
		case 'm':
			fmri = optarg;
			modify = B_TRUE;
			/*
			 * Argument list of key=value pairs, we need to
			 * collate all matching keys to set multiple values.
			 */
			numargs = 1;
			i = optind;
			for (numargs = 1; argv[i] != NULL && argv[i][0] != '-';
			    numargs++)
				i++;
			if (numargs == 1) {
				(void) fprintf(stderr, gettext(
				    "%s: key=value required for "
				    "property change\n"), myname);
				usage();
				exit(EXIT_FAILURE);
			}
			if (alt_root_set) {
				if (ra_upgrade_cmd(opt, numargs,
				    &argv[optind - 1]) == -1)
					exit(EXIT_FAILURE);
				optind += numargs - 1;
				break;
			}
			/*
			 * Collect all key=value pairs which use same key
			 * so we can add multiple property values.
			 */
			for (key = argv[optind]; key != NULL && key[0] != '-';
			    key = argv[++optind]) {
				if (key[0] == '\0')
					continue;
				vals = malloc(sizeof (char *));
				if ((vals[0] = strchr(key, '=')) == NULL) {
					(void) fprintf(stderr, gettext(
					    "%s: Malformed name=value "
					    "pair %s\n"), myname, key);
					exit(EXIT_FAILURE);
				}
				numvalues = 1;
				*(vals[0]) = '\0';
				(vals[0])++;
				i = optind + 1;
				for (nk = argv[i];
				    nk != NULL && nk[0] != '-';
				    nk = argv[++i]) {
					if (nk[0] == '\0')
						continue;
					if ((keyend = strchr(nk, '='))
					    == NULL) {
						(void) fprintf(stderr, gettext(
						    "%s: Malformed name=value "
						    " pair %s\n"), myname, nk);
						exit(EXIT_FAILURE);
					}
					if ((keylen = keyend - nk) !=
					    strlen(key))
						continue;
					if (strncmp(key, nk, keylen) == 0) {
						vals = realloc(vals, ++numvalues
						    * sizeof (char *));
						vals[numvalues - 1] = ++keyend;
						nk[0] = '\0';
						optind++;
					}
				}
				raprop.prop_name = key;
				raprop.prop_values = vals;
				raprop.prop_numvalues = numvalues;
				if (ra_smf_cb(ra_modify_props_cb, fmri,
				    &raprop) == -1)
					exit(EXIT_FAILURE);
			}
			break;
		case 'p':
			parseable = B_TRUE;
			parseopt = optarg;
			break;
		case 'R':
			if (chroot(optarg) == -1) {
				(void) fprintf(stderr, gettext(
				    "%1$s: failed to chroot to %2$s: %3$s\n"),
				    myname, optarg, strerror(errno));
				exit(EXIT_FAILURE);
			}
			alt_root_set = B_TRUE;
			report = B_FALSE;
			break;
		case 's':
			if (alt_root_set) {
				if (ra_upgrade_cmd(opt, 1, &optarg) == -1)
					exit(EXIT_FAILURE);
				modify = B_TRUE;
				break;
			}
			options = optarg;
			while (*options != '\0') {
				opt_index = getsubopt(&options, v_opt, &val);
				if (val == NULL) {
					usage();
					exit(EXIT_FAILURE);
				}
				if (opt_index == -1) {
					(void) fprintf(stderr, gettext(
					    "%1$s: invalid variable: %2$s\n"),
					    myname, optarg);
					usage();
					exit(EXIT_FAILURE);
				}
				ravar = &ra_vars[opt_index];
				/* Need special case for routing-svcs var */
				if (strcmp(ravar->var_name, RA_VAR_ROUTING_SVCS)
				    == 0) {
					if (ra_update_routing_svcs(val) == -1)
						return (-1);
				} else {
					ravar->var_value = strdup(val);
					if (ra_smf_cb(ra_set_persistent_var_cb,
					    ravar->var_fmri, ravar) == -1)
						exit(EXIT_FAILURE);
				}
			}
			modify = B_TRUE;
			break;
		case 'u':
			update = B_TRUE;
			break;
		case ':':
			/* if not 'p', usage failure */
			if (strcmp(argv[optind - 1], "-p") != 0) {
				(void) fprintf(stderr, gettext(
				    "%s: option requires an argument -%s\n"),
				    myname, argv[optind - 1]);
				usage();
				exit(EXIT_FAILURE);
			}
			parseable = B_TRUE;
			break;
		case '?':
			usage();
			exit(EXIT_FAILURE);
		}
	}

	if (argc > optind) {
		/* There shouldn't be any extra args. */
		usage();
		exit(EXIT_FAILURE);
	}

	if (parseable && (update || modify)) {
		(void) fprintf(stderr, gettext("%s: the -p option cannot be "
		    "used with any of -demrsu\n"), myname);
		usage();
		exit(EXIT_FAILURE);
	}

	if (update && ! alt_root_set)
		status = ra_update();

	if (report && !modify && !update)
		status = ra_report(parseable, parseopt);

	return (status == 0 ? EXIT_SUCCESS : EXIT_FAILURE);
}

/*
 * Upgrade legacy daemons,  mark to-be-enabled routing services.
 */
static int
ra_check_legacy_daemons(void)
{
	ravar_t		*routing_svcs = ra_str2var(RA_VAR_ROUTING_SVCS);
	ravar_t		*v4d = ra_str2var(RA_VAR_IPV4_ROUTING_DAEMON);
	ravar_t		*v6d = ra_str2var(RA_VAR_IPV6_ROUTING_DAEMON);
	char		*fmri, *nextfmri;
	boolean_t	mark = B_FALSE;

	if (ra_smf_cb(ra_get_persistent_var_cb, routing_svcs->var_fmri,
	    routing_svcs) == -1)
		return (-1);

	/* First unmark all services */
	if (ra_smf_cb(ra_mark_routing_svcs_cb, NULL, &mark) == -1)
		return (-1);

	mark = B_TRUE;
	if (routing_svcs->var_value != NULL) {
		/*
		 * For routing-svcs variable, mark each named
		 * service as a current-routing-svc.
		 */
		if ((fmri = strdup(routing_svcs->var_value)) == NULL) {
			(void) fprintf(stderr, gettext(
			    "%s: out of memory\n"), myname);
			return (-1);
		}
		/* Now, mark each service named in routing-svcs. */
		for (nextfmri = strtok(fmri, " \t");
		    nextfmri != NULL;
		    nextfmri = strtok(NULL, " \t")) {
			if (ra_smf_cb(ra_mark_routing_svcs_cb, nextfmri,
			    &mark) == -1) {
				free(fmri);
				return (-1);
			}
		}
		free(fmri);
	}

	/*
	 * Now check if legacy variables (if specified) map to SMF routing
	 * daemons.  If so, transfer associated daemon arguments.
	 */
	if (ra_upgrade_legacy_daemons() == -1)
		return (-1);

	ra_resetvars(NULL);
	/*
	 * At this point, if the legacy services still have ipv4/ipv6
	 * routing daemons specified, we know they weren`t upgraded, so
	 * we mark them also.
	 */
	if (ra_smf_cb(ra_get_persistent_var_cb, v4d->var_fmri, v4d) == -1 ||
	    ra_smf_cb(ra_get_persistent_var_cb, v6d->var_fmri, v6d) == -1)
		return (-1);

	if (v4d->var_value != NULL && strtok(v4d->var_value, " \t") != NULL &&
	    ra_smf_cb(ra_mark_routing_svcs_cb, RA_INSTANCE_LEGACY_ROUTING_IPV4,
	    &mark) == -1)
		return (-1);
	if (v6d->var_value != NULL && strtok(v6d->var_value, " \t") != NULL &&
	    ra_smf_cb(ra_mark_routing_svcs_cb, RA_INSTANCE_LEGACY_ROUTING_IPV6,
	    &mark) == -1)
		return (-1);

	return (0);
}

/*
 * Retrieve legacy daemon variables,  and check if any SMF routing daemons
 * run the daemons specified.  If so, the legacy configuration (arguments
 * to the daemon) is transferred to the routeadm/daemon-args property
 * of the corresponding instance.  From there,  the instance picks up the
 * value and will transfer the daemon arguments to individiual properties
 * when enabled.
 */
static int
ra_upgrade_legacy_daemons(void)
{
	ravar_t	*v4d = ra_str2var(RA_VAR_IPV4_ROUTING_DAEMON);
	ravar_t	*v6d = ra_str2var(RA_VAR_IPV6_ROUTING_DAEMON);
	ravar_t	*v4args = ra_str2var(RA_VAR_IPV4_ROUTING_DAEMON_ARGS);
	ravar_t	*v6args = ra_str2var(RA_VAR_IPV6_ROUTING_DAEMON_ARGS);
	ravar_t	*v4stop = ra_str2var(RA_VAR_IPV4_ROUTING_STOP_CMD);
	ravar_t	*v6stop = ra_str2var(RA_VAR_IPV6_ROUTING_STOP_CMD);

	if (ra_smf_cb(ra_get_persistent_var_cb, v4d->var_fmri, v4d) == -1 ||
	    ra_smf_cb(ra_get_persistent_var_cb, v6d->var_fmri, v6d) == -1 ||
	    ra_smf_cb(ra_get_persistent_var_cb, v4args->var_fmri, v4args)
	    == -1 ||
	    ra_smf_cb(ra_get_persistent_var_cb, v6args->var_fmri, v6args)
	    == -1 ||
	    ra_smf_cb(ra_get_persistent_var_cb, v4stop->var_fmri, v4stop)
	    == -1 ||
	    ra_smf_cb(ra_get_persistent_var_cb, v6stop->var_fmri, v6stop)
	    == -1)
		return (-1);

	return (ra_smf_cb(ra_upgrade_legacy_daemons_cb, NULL, NULL));
}

/*
 * Determine if service runs the same daemon as that which is specified
 * in ipv4-routing-daemon or ipv6-routing-daemon.  If so, the associated
 * daemon arguments are transferred to the service.
 */

/* ARGSUSED0 */
static int
ra_upgrade_legacy_daemons_cb(void *data, scf_walkinfo_t *wip)
{
	const char	*inst_fmri = wip->fmri;
	scf_instance_t	*inst = wip->inst;
	scf_handle_t	*h = scf_instance_handle(inst);
	char		*daemon, *l_daemon = NULL;
	ravar_t		*v4d = ra_str2var(RA_VAR_IPV4_ROUTING_DAEMON);
	ravar_t		*v6d = ra_str2var(RA_VAR_IPV6_ROUTING_DAEMON);
	ravar_t		*v4args = ra_str2var(RA_VAR_IPV4_ROUTING_DAEMON_ARGS);
	ravar_t		*v6args = ra_str2var(RA_VAR_IPV6_ROUTING_DAEMON_ARGS);
	ravar_t		*v4stop = ra_str2var(RA_VAR_IPV4_ROUTING_STOP_CMD);
	ravar_t		*v6stop = ra_str2var(RA_VAR_IPV6_ROUTING_STOP_CMD);
	ravar_t		*routing_svcs = ra_str2var(RA_VAR_ROUTING_SVCS);
	boolean_t	mark, marked;
	char		*new_routing_svcs;

	/*
	 * Ensure instance is a routing service, and not one of the
	 * legacy instances - if it is, the daemon property is already
	 * set to the legacy daemon.
	 */
	if (ra_get_single_prop_as_string(h, inst, RA_PG_ROUTEADM,
	    RA_PROP_DAEMON, B_TRUE, B_FALSE, NULL, &daemon) == -1 ||
	    strcmp(RA_INSTANCE_LEGACY_ROUTING_IPV4, inst_fmri) == 0 ||
	    strcmp(RA_INSTANCE_LEGACY_ROUTING_IPV6, inst_fmri) == 0)
		return (0);

	/* A legacy daemon may be defined */
	(void) ra_get_single_prop_as_string(h, inst, RA_PG_ROUTEADM,
	    RA_PROP_LEGACY_DAEMON, B_TRUE, B_FALSE, NULL, &l_daemon);

	/*
	 * If we match daemon/legacy_daemon with ipv4-routing-daemon or
	 * ipv6-routing-daemon values, transfer daemon-args value
	 * to the matching service.
	 */
	if (v4d->var_value != NULL && (strcmp(v4d->var_value, daemon) == 0 ||
	    (l_daemon != NULL && strcmp(v4d->var_value, l_daemon) == 0))) {
		(void) printf(gettext("%s: migrating daemon configuration "
		    "for %s to %s\n"), myname, l_daemon != NULL ?
		    l_daemon : daemon, inst_fmri);
		/* Transfer daemon-args value, clear legacy v4 values */
		if (ra_set_prop_from_string(h, inst, RA_PG_ROUTEADM,
		    RA_PROP_DAEMON_ARGS, SCF_TYPE_ASTRING, B_TRUE, 1,
		    (const char **)&(v4args->var_value)) == -1)
			return (-1);
		ra_resetvars(RA_PROPVAL_PROTO_IPV4);
		if (ra_smf_cb(ra_set_persistent_var_cb,
		    RA_INSTANCE_LEGACY_ROUTING_IPV4, v4d) == -1 ||
		    ra_smf_cb(ra_set_persistent_var_cb,
		    RA_INSTANCE_LEGACY_ROUTING_IPV4, v4args) == -1 ||
		    ra_smf_cb(ra_set_persistent_var_cb,
		    RA_INSTANCE_LEGACY_ROUTING_IPV4, v4stop) == -1)
			return (-1);
	} else if (v6d->var_value != NULL && (strcmp(v6d->var_value, daemon)
	    == 0 ||
	    (l_daemon != NULL && strcmp(v6d->var_value, l_daemon) == 0))) {
		(void) printf(gettext("%s: migrating daemon configuration "
		    "for %s to %s\n"), myname, l_daemon != NULL ?
		    l_daemon : daemon, inst_fmri);
		/* Transfer daemon-args value, clear legacy v6 values */
		if (ra_set_prop_from_string(h, inst, RA_PG_ROUTEADM,
		    RA_PROP_DAEMON_ARGS, SCF_TYPE_ASTRING, B_TRUE, 1,
		    (const char **)&(v6args->var_value)) == -1)
			return (-1);
		ra_resetvars(RA_PROPVAL_PROTO_IPV6);
		if (ra_smf_cb(ra_set_persistent_var_cb,
		    RA_INSTANCE_LEGACY_ROUTING_IPV6, v6d) == -1 ||
		    ra_smf_cb(ra_set_persistent_var_cb,
		    RA_INSTANCE_LEGACY_ROUTING_IPV6, v6args) == -1 ||
		    ra_smf_cb(ra_set_persistent_var_cb,
		    RA_INSTANCE_LEGACY_ROUTING_IPV6, v6stop) == -1)
			return (-1);
	} else
		return (0);

	/*
	 * If service is unmarked at this point, add it to routing-svcs and
	 * mark it.
	 */
	if (ra_get_boolean_prop(h, inst, RA_PG_ROUTEADM,
	    RA_PROP_CURR_ROUTING_SVC, B_FALSE, B_FALSE, &marked) == -1 ||
	    marked == B_FALSE) {
		mark = B_TRUE;
		if (ra_smf_cb(ra_mark_routing_svcs_cb, inst_fmri, &mark)
		    == -1 ||
		    ra_smf_cb(ra_get_persistent_var_cb, routing_svcs->var_fmri,
		    routing_svcs) == -1)
			return (-1);
		if ((new_routing_svcs =
		    malloc(strlen(routing_svcs->var_value) +
		    strlen(inst_fmri) + 2)) == NULL) {
			(void) fprintf(stderr, gettext(
			    "%s: out of memory"), myname);
			return (-1);
		}
		if (strlen(routing_svcs->var_value) == 0)
			(void) snprintf(new_routing_svcs,
			    strlen(inst_fmri) + 1, "%s", inst_fmri);
		else
			(void) snprintf(new_routing_svcs,
			    strlen(routing_svcs->var_value) +
			    strlen(inst_fmri) + 2, "%s %s",
			    routing_svcs->var_value, inst_fmri);
		free(routing_svcs->var_value);
		routing_svcs->var_value = new_routing_svcs;
		(void) smf_refresh_instance(inst_fmri);
		return (ra_smf_cb(ra_set_persistent_var_cb,
		    routing_svcs->var_fmri, routing_svcs));
	}
	(void) smf_refresh_instance(inst_fmri);
	return (0);
}

/*
 * If we are upgrading,  append operation to <alt_root>/var/svc/profile/upgrade.
 */
static int
ra_upgrade_cmd(char opt, int argc, char **argv)
{
	FILE	*fp;
	int	i;

	if ((fp = fopen(RA_SMF_UPGRADE_FILE, "a+")) == NULL) {
		(void) fprintf(stderr, gettext(
		    "%1$s: failed to open %2$s: %3$s\n"),
		    myname, RA_SMF_UPGRADE_FILE, strerror(errno));
		return (-1);
	}
	(void) fprintf(fp, "/sbin/routeadm -%c ", opt);
	if (argv != NULL) {
		for (i = 0; i < argc; i++)
			(void) fprintf(fp, "%s ", argv[i]);
	}
	(void) fprintf(fp, "%s\n", RA_SMF_UPGRADE_MSG);
	(void) fclose(fp);
	return (0);
}

/*
 * Set current state to "next boot" state, i.e. if general/enabled
 * value is overlaid by a general_ovr/enabled value, set the current state
 * to the value of the latter.  Doing this applies "next boot" changes to
 * the current setup.  If any IPv6 interfaces are present, also start in.ndpd.
 */
static int
ra_update(void)
{
	int	i;

	if (ra_check_legacy_daemons() == -1)
		return (-1);
	for (i = 0; ra_opts[i].opt_name != NULL; i++) {
		if (ra_smf_cb(ra_set_current_opt_cb, ra_opts[i].opt_fmri,
		    &ra_opts[i]) == -1) {
			return (-1);
		}
	}
	/*
	 * If in.ndpd isn't already running, then we start it here, regardless
	 * of global IPv6 routing status (provided there are IPv6 interfaces
	 * present).
	 */
	if (ra_numv6intfs() > 0)
		return (smf_enable_instance(RA_INSTANCE_NDP, SMF_TEMPORARY));
	return (0);
}

/*
 * Here we catch the special case where ipv4/ipv6 routing was enabled,
 * and the user updates the routing-svcs list.  The problem is that
 * the enabled state is the result of services on the old routing-svcs list
 * being enabled, and we want to support users doing something like this:
 *
 * # routeadm -s routing-svcs=route -e ipv4-routing -u
 *
 * followed by
 *
 * # routeadm -s routing-svcs=rdisc -u
 *
 * To do this, we need to:
 *	- cache the old ipv4-routing/ipv6-routing values.
 *	- persistently disable the old routing-svcs list.
 *	- if ipv4-routing was enabled, mark and persistently enable all the new
 *	v4 routing-svcs
 *	- if ipv6-routing was enabled, mark and persistently enable all the new
 *	v6 routing-svcs.
 * This will result in the next "-u" switching on the new routing-svcs, and
 * switching off the old ones,  as the user would expect.
 */
static int
ra_update_routing_svcs(char *routing_svcs_new)
{
	raopt_t		*v4opt = ra_str2opt(RA_OPT_IPV4_ROUTING);
	raopt_t		*v6opt = ra_str2opt(RA_OPT_IPV6_ROUTING);
	ravar_t		*routing_svcs = ra_str2var(RA_VAR_ROUTING_SVCS);
	char		*routing_svcs_old, *fmri;
	boolean_t	v4_old, v6_old, mark = B_FALSE;

	ra_resetopts();
	if (ra_smf_cb(ra_get_persistent_opt_cb, v4opt->opt_fmri, v4opt) == -1 ||
	    ra_smf_cb(ra_get_persistent_opt_cb, v6opt->opt_fmri, v6opt) == -1 ||
	    ra_smf_cb(ra_get_persistent_var_cb, routing_svcs->var_fmri,
	    routing_svcs) == -1)
		return (-1);
	v4_old = v4opt->opt_enabled;
	v6_old = v6opt->opt_enabled;
	routing_svcs_old = routing_svcs->var_value;
	routing_svcs->var_value = routing_svcs_new;

	if (ra_smf_cb(ra_set_persistent_var_cb, routing_svcs->var_fmri,
	    routing_svcs) == -1) {
		free(routing_svcs_old);
		return (-1);
	}

	if (!v4_old && !v6_old) {
		/* We don`t need to do anything, since services were disabled */
		free(routing_svcs_old);
		return (0);
	}
	v4opt->opt_enabled = B_FALSE;
	v6opt->opt_enabled = B_FALSE;

	/* Persistently disable each old v4/v6 "routing-svc" */
	for (fmri = strtok(routing_svcs_old, " \t"); fmri != NULL;
	    fmri = strtok(NULL, " \t")) {
		if (ra_smf_cb(ra_mark_routing_svcs_cb, fmri, &mark) == -1) {
			free(routing_svcs_old);
			return (-1);
		}
		if (v4_old &&
		    ra_smf_cb(ra_set_persistent_opt_cb, fmri, v4opt) == -1) {
			free(routing_svcs_old);
			return (-1);
		}
		if (v6_old &&
		    ra_smf_cb(ra_set_persistent_opt_cb, fmri, v6opt) == -1) {
			free(routing_svcs_old);
			return (-1);
		}
	}
	free(routing_svcs_old);
	v4opt->opt_enabled = v4_old;
	v6opt->opt_enabled = v6_old;

	/* Persistently enable each new v4/v6 "routing-svc" */
	mark = B_TRUE;
	for (fmri = strtok(routing_svcs_new, " \t"); fmri != NULL;
	    fmri = strtok(NULL, " \t")) {
		if (ra_smf_cb(ra_mark_routing_svcs_cb, fmri, &mark) == -1)
			return (-1);
		if (v4_old &&
		    ra_smf_cb(ra_set_persistent_opt_cb, fmri, v4opt) == -1)
			return (-1);
		if (v6_old &&
		    ra_smf_cb(ra_set_persistent_opt_cb, fmri, v6opt) == -1)
			return (-1);
	}
	return (0);
}

/*
 * Display status,  in parseable form if required.  If param is
 * specified,  only the named option/variable is displayed  (this option is
 * for parseable display only).
 */
static int
ra_report(boolean_t parseable, const char *param)
{
	int		i;
	char		*c_state, *d_state, *p_state, *p_var, *d_var;
	char		*enabled = "enabled";
	char		*disabled = "disabled";
	boolean_t	param_found = B_FALSE;

	if (!parseable) {
		(void) printf(gettext(
		    "              Configuration   Current              "
		    "Current\n"
		    "                     Option   Configuration        "
		    "System State\n"
		    "---------------------------------------------------"
		    "------------\n"));
	}
	for (i = 0; ra_opts[i].opt_name != NULL; i++) {
		if (param != NULL) {
			if (strcmp(ra_opts[i].opt_name, param) == 0)
				param_found = B_TRUE;
			else
				continue;
		}
		if (ra_smf_cb(ra_get_current_opt_cb,
		    ra_opts[i].opt_fmri, &ra_opts[i]) == -1)
			return (-1);
		c_state = ra_opts[i].opt_enabled ? enabled : disabled;
		ra_resetopts();
		if (ra_smf_cb(ra_get_persistent_opt_cb,
		    ra_opts[i].opt_fmri, &ra_opts[i]) == -1)
			return (-1);
		p_state = ra_opts[i].opt_enabled ? enabled : disabled;
		ra_resetopts();
		if (ra_smf_cb(ra_get_default_opt_cb,
		    ra_opts[i].opt_default_fmri, &ra_opts[i]) == -1)
			return (-1);
		d_state = ra_opts[i].opt_default_enabled ? enabled : disabled;
		ra_resetopts();
		if (parseable) {
			if (param == NULL)
				(void) printf("%s ", ra_opts[i].opt_name);
			(void) printf("persistent=%s default=%s "
			    "current=%s\n", p_state, d_state, c_state);
		} else {
			(void) printf(gettext("%1$27s   %2$-21s%3$s\n"),
			    ra_intloptname(ra_opts[i].opt_name),
			    p_state, c_state);
		}
	}
	if (!parseable)
		(void) printf("\n");

	ra_resetvars(NULL);

	/* Gather persistent/default variable values */
	for (i = 0; ra_vars[i].var_name != NULL; i++) {
		if (ra_smf_cb(ra_get_persistent_var_cb,
		    ra_vars[i].var_fmri, &ra_vars[i]) == -1 ||
		    ra_smf_cb(ra_get_default_var_cb,
		    ra_vars[i].var_default_fmri, &ra_vars[i]) == -1)
			return (-1);

	}
	for (i = 0; ra_vars[i].var_name != NULL; i++) {
		if (param != NULL) {
			if (strcmp(ra_vars[i].var_name, param) == 0)
				param_found = B_TRUE;
			else
				continue;
		}
		p_var = ra_vars[i].var_value == NULL ? "":
		    ra_vars[i].var_value;
		d_var = ra_vars[i].var_default_value == NULL ?
		    "": ra_vars[i].var_default_value;
		if (parseable) {
			if (param == NULL)
				(void) printf("%s ", ra_vars[i].var_name);
			(void) printf("persistent=\"%s\" "
			    "default=\"%s\" \n", p_var, d_var);
		} else {
			/* If daemon variables are not set, do not display. */
			if ((IS_IPV4_VAR(ra_vars[i].var_name) &&
			    IPV4_VARS_UNSET) ||
			    (IS_IPV6_VAR(ra_vars[i].var_name) &&
			    IPV6_VARS_UNSET))
				continue;
			(void) printf(gettext("%1$27s   \"%2$s\"\n"),
			    ra_intloptname(ra_vars[i].var_name), p_var);
		}
	}

	if (param != NULL && !param_found) {
		(void) fprintf(stderr, gettext(
		    "%s: no such option/variable %s\n"), myname, param);
		return (-1);
	}
	if (parseable)
		return (0);
	(void) printf(gettext("\nRouting daemons:\n"));
	(void) printf("\n                      %s   %s\n", "STATE", "FMRI");
	if (ra_smf_cb(ra_print_state_cb, NULL, NULL) == -1)
		return (-1);
	return (0);
}

/*
 * Call scf_walk_fmri() with appropriate function, fmri, and data.
 * A NULL fmri causes scf_walk_fmri() to run on all instances.  We make
 * use of this many times in applying changes to the routing services.
 */
static int
ra_smf_cb(ra_smf_cb_t cbfunc, const char *fmri, void *data)
{
	scf_handle_t	*h;
	int		exit_status = 0;

	if ((h = scf_handle_create(SCF_VERSION)) == NULL ||
	    scf_handle_bind(h) == -1) {
		(void) fprintf(stderr, gettext(
		    "%s: cannot connect to SMF repository\n"), myname);
		return (-1);
	}
	return (scf_walk_fmri(h, fmri == NULL ? 0 : 1,
	    fmri == NULL ? NULL : (char **)&fmri, 0,
	    cbfunc, data, &exit_status, uu_die));
}

/*
 * Applies persistent configuration settings to current setup.
 */
static int
ra_set_current_opt_cb(void *data, scf_walkinfo_t *wip)
{
	return (ra_get_set_opt_common_cb(data, wip, B_FALSE, B_FALSE));
}

/*
 * Sets persistent value for option,  to be applied on next boot
 * or by "routeadm -u".
 */
static int
ra_set_persistent_opt_cb(void *data, scf_walkinfo_t *wip)
{
	return (ra_get_set_opt_common_cb(data, wip, B_TRUE, B_FALSE));
}

static int
ra_get_current_opt_cb(void *data, scf_walkinfo_t *wip)
{
	return (ra_get_set_opt_common_cb(data, wip, B_FALSE, B_TRUE));
}

static int
ra_get_persistent_opt_cb(void *data, scf_walkinfo_t *wip)
{
	return (ra_get_set_opt_common_cb(data, wip, B_TRUE, B_TRUE));
}

static int
ra_routing_opt_set_cb(void *data, scf_walkinfo_t *wip)
{
	return (ra_routing_opt_set_unset_cb(data, wip, B_TRUE));
}

static int
ra_routing_opt_unset_cb(void *data, scf_walkinfo_t *wip)
{
	return (ra_routing_opt_set_unset_cb(data, wip, B_FALSE));
}

/*
 * Notify network/routing-setup service that administrator has explicitly
 * set/reset ipv4(6)-routing value.  If no explicit setting of this value is
 * done,  ipv4-routing can be enabled in the situation when no default route can
 * be determined.
 */
static int
ra_routing_opt_set_unset_cb(raopt_t *raopt, scf_walkinfo_t *wip, boolean_t set)
{
	scf_instance_t	*inst = wip->inst;
	scf_handle_t	*h = scf_instance_handle(inst);

	return (ra_set_boolean_prop(h, inst, RA_PG_ROUTEADM,
	    raopt->opt_flags & RA_SVC_FLAG_IPV4_ROUTING ?
	    RA_PROP_IPV4_ROUTING_SET : RA_PROP_IPV6_ROUTING_SET,
	    B_FALSE, set));
}

/*
 * Shared function that either sets or determines persistent or current
 * state. Setting persistent state (for next boot) involves setting
 * the general_ovr/enabled value to the current service state, and
 * the general/enabled value to the desired (next-boot) state.
 * Setting current state involves removing the temporary state
 * setting so the persistent state has effect.
 *
 * Persistent state is reported as being enabled if any of the
 * candidate services have a general/enabled value set to true,
 * while current state is reported as being enabled if any of the
 * candidate services has a general_ovr/enabled or general/enabled
 * value set to true.
 */
static int
ra_get_set_opt_common_cb(raopt_t *raopt, scf_walkinfo_t *wip,
    boolean_t persistent, boolean_t get)
{
	const char		*inst_fmri = wip->fmri;
	scf_instance_t		*inst = wip->inst;
	scf_handle_t		*h = scf_instance_handle(inst);
	scf_propertygroup_t	*routeadm_pg;
	boolean_t		persistent_state_enabled;
	boolean_t		temporary_state_enabled;
	boolean_t		current_state_enabled;
	boolean_t		curr_svc = B_TRUE;
	boolean_t		found_proto;
	char			**protolist = NULL;
	int			i, ret, numvalues = 0;

	/*
	 * Ensure we are dealing with a routeadm-managed service.  If
	 * the FMRI used for walking instances is NULL,  it is reasonable
	 * that a service not have a routeadm property group as we will
	 * check all services in this case.
	 */
	if (ra_get_pg(h, inst, RA_PG_ROUTEADM, B_TRUE, raopt->opt_fmri != NULL,
	    &routeadm_pg) == -1) {
			/* Not a routing service, not an error. */
			if (scf_error() == SCF_ERROR_NOT_FOUND &&
			    raopt->opt_fmri == NULL)
				return (0);
			return (-1);
	}
	scf_pg_destroy(routeadm_pg);

	/* Services with no "protocol" property are not routing daemons */
	if (raopt->opt_fmri == NULL && ra_get_prop_as_string(h, inst,
	    RA_PG_ROUTEADM, RA_PROP_PROTO, B_TRUE, B_FALSE, NULL, &numvalues,
	    &protolist) == -1) {
		if (scf_error() == SCF_ERROR_NOT_FOUND)
			return (0);
		return (-1);
	}

	/*
	 * Skip invalid services based on flag settings.  Flags are used when
	 * we run callback functions on all instances to identify
	 * the correct instances to operate on.
	 */
	if (raopt->opt_flags & RA_SVC_FLAG_IPV4_ROUTING) {
		found_proto = B_FALSE;
		if (protolist != NULL) {
			/* Check if protolist contains "ipv4" */
			for (i = 0; i < numvalues; i++) {
				if (protolist[i] != NULL && strcmp(
				    protolist[i], RA_PROPVAL_PROTO_IPV4) == 0)
					found_proto = B_TRUE;
			}
		}
		/* If not an ipv4 routing service, skip. */
		if (protolist == NULL || !found_proto) {
			ra_free_prop_values(numvalues, protolist);
			return (0);
		}
	}
	if (raopt->opt_flags & RA_SVC_FLAG_IPV6_ROUTING) {
		found_proto = B_FALSE;
		if (protolist != NULL) {
			/* Check if protolist contains "ipv6" */
			for (i = 0; i < numvalues; i++) {
				if (protolist[i] != NULL && strcmp(
				    protolist[i], RA_PROPVAL_PROTO_IPV6) == 0)
					found_proto = B_TRUE;
			}
		}
		/* If not an ipv6 routing service, skip. */
		if (protolist == NULL || !found_proto) {
			ra_free_prop_values(numvalues, protolist);
			return (0);
		}
		/*
		 * If no IPv6 interfaces are configured, do not apply
		 * the "enable" state change to this IPv6 routing service.
		 */
		if (raopt->opt_enabled && ra_numv6intfs() < 1)
			return (0);
	}
	ra_free_prop_values(numvalues, protolist);

	/* If enabling routing services, select only current routing services */
	if (raopt->opt_fmri == NULL && !get && raopt->opt_enabled) {
		if (ra_get_boolean_prop(h, inst, RA_PG_ROUTEADM,
		    RA_PROP_CURR_ROUTING_SVC, B_FALSE, B_FALSE,
		    &curr_svc) == -1)
			return (0);
		else if (!curr_svc && persistent) {
			/*
			 * We apply "current" routing changes to all routing
			 * daemons, whether current or not, so bail if
			 * we are trying to make a persistent update to a
			 * non-"routing-svc".
			 */
			return (0);
		}
	}
	if (ra_get_boolean_prop(h, inst, SCF_PG_GENERAL, SCF_PROPERTY_ENABLED,
	    B_FALSE, B_TRUE, &persistent_state_enabled) == -1)
		return (-1);

	current_state_enabled = persistent_state_enabled;

	if (ra_get_boolean_prop(h, inst, SCF_PG_GENERAL_OVR,
	    SCF_PROPERTY_ENABLED, B_FALSE, B_FALSE, &temporary_state_enabled)
	    == 0)
		current_state_enabled = temporary_state_enabled;

	if (get) {
		/*
		 * Persistent state is enabled if any services are
		 * persistently enabled, i.e. general/enabled == true).
		 * current state is enabled if any services
		 * services are currently enabled, i.e. if defined,
		 * general_ovr/enabled == true, if not, general/enabled == true.
		 */
		if (persistent)
			raopt->opt_enabled = raopt->opt_enabled ||
			    persistent_state_enabled;
		else
			raopt->opt_enabled = raopt->opt_enabled ||
			    current_state_enabled;
	} else {
		if (persistent) {
			/*
			 * For peristent state changes, from -e/-d,
			 * we set the general_ovr/enabled value to the
			 * current state (to ensure it is preserved),
			 * while setting the general/enabled value to
			 * the desired value.  This has the effect of
			 * the desired value coming into effect on next boot.
			 */
			ret = current_state_enabled ?
			    smf_enable_instance(inst_fmri, SMF_TEMPORARY) :
			    smf_disable_instance(inst_fmri, SMF_TEMPORARY);
			if (ret != 0) {
				(void) fprintf(stderr, gettext(
				    "%s: unexpected libscf error: %s\n"),
				    myname, scf_strerror(scf_error()));
				return (-1);
			}
			/*
			 * Refresh here so general_ovr/enabled state overrides
			 * general/enabled state.
			 */
			(void) smf_refresh_instance(inst_fmri);
			/*
			 * Now we can safely set the general/enabled value
			 * to the value we require on next boot (or
			 * "routeadm -u").
			 */
			ret = ra_set_boolean_prop(h, inst, SCF_PG_GENERAL,
			    SCF_PROPERTY_ENABLED, B_FALSE, raopt->opt_enabled);
			if (ret != 0)
				return (-1);
			/*
			 * Refresh here so general/enabled value is set.
			 */
			(void) smf_refresh_instance(inst_fmri);
			if (raopt->opt_fmri != NULL)
				return (0);
			(void) smf_refresh_instance(RA_INSTANCE_ROUTING_SETUP);
		} else {
			/*
			 * Refresh here to get latest property values prior
			 * to starting daemon.
			 */
			(void) smf_refresh_instance(inst_fmri);
			/*
			 * For current changes (result of -u), we
			 * enable/disable depending on persistent value
			 * stored in general/enabled.  Here we disable
			 * old routing-svcs (identified by a current-routing-svc
			 * value of false) also.
			 */
			ret = persistent_state_enabled && curr_svc ?
			    smf_enable_instance(inst_fmri, 0) :
			    smf_disable_instance(inst_fmri, 0);
			if (ret != 0) {
				(void) fprintf(stderr, gettext(
				    "%s: unexpected libscf error: %s\n"),
				    myname, scf_strerror(scf_error()));
				return (-1);
			}
			if (current_state_enabled && persistent_state_enabled) {
				/*
				 * Instance was already enabled, so we restart
				 * to get latest property values.  This covers
				 * the case where users update properties
				 * via routeadm -m, and issue an update.  The
				 * daemon should be running with the latest
				 * property values.
				 */
				(void) smf_restart_instance(inst_fmri);
			}
		}
	}
	return (0);
}

static int
ra_set_default_opt_cb(void *data, scf_walkinfo_t *wip)
{
	scf_instance_t		*inst = wip->inst;
	scf_handle_t		*h = scf_instance_handle(inst);
	raopt_t			*raopt = data;

	return (ra_set_boolean_prop(h, inst, RA_PG_ROUTEADM,
	    raopt->opt_default_prop, B_FALSE, raopt->opt_default_enabled));
}

static int
ra_get_default_opt_cb(void *data, scf_walkinfo_t *wip)
{
	scf_instance_t		*inst = wip->inst;
	scf_handle_t		*h = scf_instance_handle(inst);
	raopt_t			*raopt = data;

	return (ra_get_boolean_prop(h, inst, RA_PG_ROUTEADM,
	    raopt->opt_default_prop, B_TRUE, B_TRUE,
	    &(raopt->opt_default_enabled)));
}

/*
 * Callbacks to set/retrieve persistent/default routing variable values.
 * The set functions use the value stored in the var_value/var_default_value
 * field of the associated ra_var_t, while the retrieval functions store
 * the value retrieved in that field.
 */
static int
ra_get_persistent_var_cb(void *data, scf_walkinfo_t *wip)
{
	scf_instance_t		*inst = wip->inst;
	scf_handle_t		*h = scf_instance_handle(inst);
	ravar_t			*ravar = data;

	return (ra_get_single_prop_as_string(h, inst, RA_PG_ROUTEADM,
	    ravar->var_prop, B_TRUE, B_TRUE, NULL, &ravar->var_value));
}

static int
ra_set_persistent_var_cb(void *data, scf_walkinfo_t *wip)
{
	scf_instance_t		*inst = wip->inst;
	scf_handle_t		*h = scf_instance_handle(inst);
	ravar_t			*ravar = data;

	return (ra_set_prop_from_string(h, inst, RA_PG_ROUTEADM,
	    ravar->var_prop, SCF_TYPE_INVALID, B_FALSE, 1,
	    (const char **)&ravar->var_value));
}

static int
ra_get_default_var_cb(void *data, scf_walkinfo_t *wip)
{
	scf_instance_t		*inst = wip->inst;
	scf_handle_t		*h = scf_instance_handle(inst);
	ravar_t			*ravar = data;

	return (ra_get_single_prop_as_string(h, inst, RA_PG_ROUTEADM,
	    ravar->var_default_prop, B_TRUE, B_TRUE, NULL,
	    &ravar->var_default_value));
}

/*
 * Depending on the value of the boolean_t * passed in,  this callback
 * either marks the relevant service(s) as current-routing-svcs (or unmarking)
 * by setting that property to true or false.  When routing services
 * are to be enabled,  the a current-routing-svc value of true flags the
 * service as one to be enabled.
 */
static int
ra_mark_routing_svcs_cb(void *data, scf_walkinfo_t *wip)
{
	scf_instance_t		*inst = wip->inst;
	scf_handle_t		*h = scf_instance_handle(inst);
	boolean_t		*mark = data;
	boolean_t		marked;
	int			numvalues = 0;
	char			**protolist = NULL;

	/* Check we are dealing with a routing daemon service */
	if (ra_get_prop_as_string(h, inst, RA_PG_ROUTEADM, RA_PROP_PROTO,
	    B_TRUE, B_FALSE, NULL, &numvalues, &protolist) == -1)
		return (0);
	ra_free_prop_values(numvalues, protolist);
	if (*mark)
		return (ra_set_boolean_prop(h, inst, RA_PG_ROUTEADM,
		    RA_PROP_CURR_ROUTING_SVC, B_TRUE, B_TRUE));
	/* Unmark service. */
	if (ra_get_boolean_prop(h, inst, RA_PG_ROUTEADM,
	    RA_PROP_CURR_ROUTING_SVC, B_TRUE, B_FALSE, &marked) == 0 && marked)
		return (ra_set_boolean_prop(h, inst, RA_PG_ROUTEADM,
		    RA_PROP_CURR_ROUTING_SVC, B_TRUE, B_FALSE));
	return (0);
}

/*
 * List property values for all properties in the "routing" property
 * group of the routing service instance.
 */

/* ARGSUSED0 */
static int
ra_list_props_cb(void *data, scf_walkinfo_t *wip)
{
	const char		*inst_fmri = wip->fmri;
	scf_instance_t		*inst = wip->inst;
	scf_handle_t		*h = scf_instance_handle(inst);
	scf_iter_t		*propiter, *valiter;
	scf_propertygroup_t	*pg;
	scf_property_t		*prop;
	scf_value_t		*val;
	char			**protolist = NULL, *pnamebuf, *valbuf;
	ssize_t			pnamelen, vallen;
	int			numvalues = 0;
	int			propiterret, valiterret, retval = 0;

	/* Services with no "protocol" property are not routing daemons */
	if (ra_get_prop_as_string(h, inst, RA_PG_ROUTEADM, RA_PROP_PROTO,
	    B_TRUE, B_FALSE, NULL, &numvalues, &protolist) == -1) {
		if (scf_error() == SCF_ERROR_NOT_FOUND)
			(void) fprintf(stderr,
			    gettext("%s: %s is not a routing daemon service\n"),
			    myname, inst_fmri);
		else
			(void) fprintf(stderr,
			    gettext("%s: unexpected libscf error: %s\n"),
			    myname, scf_strerror(scf_error()));
		ra_free_prop_values(numvalues, protolist);
		return (-1);
	}
	ra_free_prop_values(numvalues, protolist);

	if (ra_get_pg(h, inst, RA_PG_ROUTING, B_TRUE, B_FALSE, &pg) == -1) {
		if (scf_error() == SCF_ERROR_NOT_FOUND) {
			(void) printf("%s: no %s property group for %s\n",
			    myname, RA_PG_ROUTING, inst_fmri);
			return (0);
		}
		(void) fprintf(stderr,
		    gettext("%s: unexpected libscf error: %s\n"),
		    myname, scf_strerror(scf_error()));
		return (-1);
	}

	(void) printf("%s:\n", inst_fmri);

	/* Create an iterator to walk through all properties */
	if ((propiter = scf_iter_create(h)) == NULL ||
	    (prop = scf_property_create(h)) == NULL ||
	    scf_iter_pg_properties(propiter, pg) != 0) {
		(void) fprintf(stderr, gettext
		    ("%s: could not iterate through properties for %s: %s\n"),
		    myname, inst_fmri, scf_strerror(scf_error()));
	}
	while ((propiterret = scf_iter_next_property(propiter, prop)) == 1) {
		if ((pnamelen = scf_property_get_name(prop, NULL, 0) + 1)
		    == 0) {
			(void) fprintf(stderr, gettext("%s: could not retrieve "
			    "property name for instance %s: %s\n"), myname,
			    inst_fmri, scf_strerror(scf_error()));
			retval = -1;
			break;
		}
		if ((pnamebuf = malloc(pnamelen)) == NULL) {
			(void) fprintf(stderr,
			    gettext("%s: out of memory\n"), myname);
			retval = -1;
			break;
		}
		(void) scf_property_get_name(prop, pnamebuf,
		    pnamelen);
		(void) printf("\t%s = ", pnamebuf);
		if ((valiter = scf_iter_create(h)) == NULL ||
		    (val = scf_value_create(h)) == NULL ||
		    scf_iter_property_values(valiter, prop)
		    != 0) {
			(void) fprintf(stderr, gettext
			    ("%s: could not iterate through "
			    "properties for %s: %s\n"), myname, inst_fmri,
			    scf_strerror(scf_error()));
			scf_value_destroy(val);
			scf_iter_destroy(valiter);
			free(pnamebuf);
			retval = -1;
			break;
		}
		while ((valiterret = scf_iter_next_value(valiter, val)) == 1) {
			if ((vallen = scf_value_get_as_string
			    (val, NULL, 0) + 1) == 0) {
				(void) fprintf(stderr, gettext
				    ("%s: could not retrieve "
				    "property value for instance %s, "
				    "property %s: %s\n"), myname, inst_fmri,
				    pnamebuf, scf_strerror(scf_error()));
				retval = -1;
			} else if ((valbuf = malloc(vallen)) == NULL) {
				(void) fprintf(stderr,
				    gettext("%s: out of memory\n"), myname);
				retval = -1;
			}
			if (retval == -1) {
				scf_iter_destroy(valiter);
				scf_value_destroy(val);
				free(pnamebuf);
				goto out;
			}
			(void) scf_value_get_as_string(val, valbuf, vallen);
			(void) printf("%s ", valbuf);
			free(valbuf);
		}
		(void) printf("\n");
		scf_iter_destroy(valiter);
		scf_value_destroy(val);
		free(pnamebuf);
		if (valiterret == -1) {
			(void) fprintf(stderr,
			    gettext("%s: could not iterate through"
			    "properties for %s: %s\n"), myname, inst_fmri,
			    scf_strerror(scf_error()));
			retval = -1;
			break;
		}
	}
out:
	scf_iter_destroy(propiter);
	scf_property_destroy(prop);
	scf_pg_destroy(pg);
	if (propiterret == -1)
		(void) fprintf(stderr, gettext
		    ("%s: could not iterate through properties for %s: %s\n"),
		    myname, inst_fmri, scf_strerror(scf_error()));
	return (retval);
}

/*
 * Modify property with name stored in passed-in ra_prop_t to have
 * the assocatied values.  Only works for existing properties in
 * the "routing" property group for routing daemon services,  so all
 * routing daemons should place configurable options in that group.
 */
static int
ra_modify_props_cb(void *data, scf_walkinfo_t *wip)
{
	const char		*inst_fmri = wip->fmri;
	scf_instance_t		*inst = wip->inst;
	scf_handle_t		*h = scf_instance_handle(inst);
	ra_prop_t		*raprop = data;
	int			numvalues = 0;
	char			**protolist = NULL;

	/* Services with no "protocol" property are not routing daemons */
	if (ra_get_prop_as_string(h, inst, RA_PG_ROUTEADM, RA_PROP_PROTO,
	    B_TRUE, B_FALSE, NULL, &numvalues, &protolist) == -1) {
		if (scf_error() == SCF_ERROR_NOT_FOUND)
			(void) fprintf(stderr,
			    gettext("%s: %s is not a routing daemon service\n"),
			    myname, inst_fmri);
		else
			(void) fprintf(stderr,
			    gettext("%s: unexpected libscf error: %s\n"),
			    myname, scf_strerror(scf_error()));
		ra_free_prop_values(numvalues, protolist);
		return (-1);
	}
	ra_free_prop_values(numvalues, protolist);

	if (ra_set_prop_from_string(h, inst, RA_PG_ROUTING, raprop->prop_name,
	    SCF_TYPE_INVALID, B_FALSE, raprop->prop_numvalues,
	    (const char **)raprop->prop_values) == -1)
		return (-1);

	(void) smf_refresh_instance(inst_fmri);
	return (0);
}

/*
 * Display FMRI, state for each routing daemon service.
 */

/* ARGSUSED0 */
static int
ra_print_state_cb(void *data, scf_walkinfo_t *wip)
{
	const char		*inst_fmri = wip->fmri;
	scf_instance_t		*inst = wip->inst;
	scf_handle_t		*h = scf_instance_handle(inst);
	char			*inst_state, **protolist = NULL;
	int			numvalues = 0;

	/* Ensure service is a routing daemon */
	if (ra_get_prop_as_string(h, inst, RA_PG_ROUTEADM, RA_PROP_PROTO,
	    B_TRUE, B_FALSE, NULL, &numvalues, &protolist) == -1)
		return (0);
	ra_free_prop_values(numvalues, protolist);

	if ((inst_state = smf_get_state(inst_fmri)) == NULL) {
		(void) fprintf(stderr,
		    gettext("%s: could not retrieve state for %s: %s\n"),
		    myname, inst_fmri, scf_strerror(scf_error()));
		return (-1);
	}
	(void) printf("%27s   %2s\n", inst_state, inst_fmri);
	free(inst_state);

	return (0);
}

static int
ra_get_pg(scf_handle_t *h, scf_instance_t *inst, const char *pgname,
    boolean_t composed, boolean_t required, scf_propertygroup_t **pg)
{
	/* Retrieve (possibly composed) property group for instance */
	if ((*pg = scf_pg_create(h)) == NULL || (composed &&
	    scf_instance_get_pg_composed(inst, NULL, pgname, *pg) != 0) ||
	    (!composed && scf_instance_get_pg(inst, pgname, *pg) != 0)) {
		if (scf_error() == SCF_ERROR_NOT_FOUND) {
			if (required)
				(void) fprintf(stderr, gettext(
				    "%s: no such property group %s\n"),
				    myname, pgname);
			return (-1);
		}
		if (required)
			(void) fprintf(stderr, gettext(
			    "%s: unexpected libscf error: %s\n"), myname,
			    scf_strerror(scf_error()));
		return (-1);
	}
	return (0);
}

static int
ra_get_boolean_prop(scf_handle_t *h, scf_instance_t *inst,
    const char *pgname, const char *propname, boolean_t composed,
    boolean_t required, boolean_t *val)
{
	char	*valstr;

	if (ra_get_single_prop_as_string(h, inst, pgname, propname,
	    composed, required, NULL, &valstr) != 0)
		return (-1);
	*val = strcmp(valstr, RA_PROPVAL_BOOLEAN_TRUE) == 0;
	free(valstr);
	return (0);
}

static int
ra_get_single_prop_as_string(scf_handle_t *h, scf_instance_t *inst,
    const char *pgname, const char *propname, boolean_t composed,
    boolean_t required, scf_type_t *type, char **value)
{
	char	**values;
	int	numvalues = 1;

	if (ra_get_prop_as_string(h, inst, pgname, propname, composed, required,
	    type, &numvalues, &values) == -1)
		return (-1);
	*value = values[0];
	free(values);
	return (0);
}

/*
 * Retrieve property named in propname,  possibly using the composed
 * property group view (union of instance and service-level properties,
 * where instance-level properties override service-level values).
 */
static int
ra_get_prop_as_string(scf_handle_t *h, scf_instance_t *inst,
    const char *pgname, const char *propname, boolean_t composed,
    boolean_t required, scf_type_t *type, int *numvalues, char ***values)
{
	scf_propertygroup_t	*pg = NULL;
	scf_property_t		*prop = NULL;
	scf_iter_t		*valiter = NULL;
	scf_value_t		*val = NULL;
	ssize_t			vallen = 0;
	int			valiterret, i, numvalues_retrieved, ret = 0;

	if (ra_get_pg(h, inst, pgname, composed, required, &pg) == -1)
		return (-1);

	*values = NULL;
	/*
	 * Retrieve values. All values routeadm needs to retrieve
	 * (bar those gathered by routeadm -l), are known to be single-valued.
	 */
	if ((prop = scf_property_create(h)) == NULL)
		goto error;
	if (scf_pg_get_property(pg, propname, prop) != 0) {
		*numvalues = 0;
		if (scf_error() == SCF_ERROR_NOT_FOUND) {
			if (required)
				(void) fprintf(stderr, gettext(
				    "%s: property %s/%s not found\n"),
				    myname, pgname, propname);
			ret = -1;
			goto out;
		}
		goto error;
	}
	if ((val = scf_value_create(h)) == NULL &&
	    scf_property_get_value(prop, val) != 0 ||
	    (valiter = scf_iter_create(h)) == NULL ||
	    scf_iter_property_values(valiter, prop) != 0)
		goto error;
	/* retrieve each value */
	for (numvalues_retrieved = 0;
	    (valiterret = scf_iter_next_value(valiter, val)) == 1;
	    numvalues_retrieved++) {
		if ((vallen = scf_value_get_as_string
		    (val, NULL, 0) + 1) == 0)
			goto error;
		if ((*values = realloc(*values,
		    sizeof (*values) + sizeof (char *))) == NULL ||
		    ((*values)[numvalues_retrieved] = malloc(vallen)) == NULL) {
			(void) fprintf(stderr, gettext(
			    "%s: out of memory\n"), myname);
			ret = -1;
			goto out;
		}
		(void) scf_value_get_as_string(val,
		    (*values)[numvalues_retrieved], vallen);
	}
	if (valiterret == -1)
		goto error;
	/*
	 * if *numvalues != 0, it holds expected number of values.  If a
	 * different number are found, it is an error.
	 */
	if (*numvalues != 0 && *numvalues != numvalues_retrieved) {
		(void) fprintf(stderr, gettext(
		    "%s: got %d values for property %s/%s, expected %d\n"),
		    myname, numvalues_retrieved, pgname, propname, *numvalues);
		ret = -1;
		goto out;
	}
	*numvalues = numvalues_retrieved;

	/* Retrieve property type if required. */
	if (type != NULL)
		(void) scf_property_type(prop, type);

	goto out;
error:
	if (scf_error() == SCF_ERROR_NOT_FOUND) {
		(void) fprintf(stderr, gettext(
		    "%s: property %s not found"), myname, propname);
	} else {
		(void) fprintf(stderr, gettext(
		    "%s: unexpected libscf error: %s, "), myname);
	}
	for (i = 0; i < numvalues_retrieved; i++)
		free((*values)[i]);
	if (*values != NULL)
		free(*values);

	ret = -1;
out:
	if (val != NULL)
		scf_value_destroy(val);
	if (valiter != NULL)
		scf_iter_destroy(valiter);
	if (prop != NULL)
		scf_property_destroy(prop);
	if (pg != NULL)
		scf_pg_destroy(pg);
	return (ret);
}

static void
ra_free_prop_values(int numvalues, char **values)
{
	int	i;
	if (values != NULL) {
		for (i = 0; i < numvalues; i++)
			free(values[i]);
		free(values);
	}
}

static int
ra_set_boolean_prop(scf_handle_t *h, scf_instance_t *inst, const char *pgname,
    const char *prop, boolean_t create, boolean_t propval)
{
	const char	*val = propval ? RA_PROPVAL_BOOLEAN_TRUE :
	    RA_PROPVAL_BOOLEAN_FALSE;

	return (ra_set_prop_from_string(h, inst, pgname, prop, SCF_TYPE_BOOLEAN,
	    create, 1, &val));
}

/*
 * Set the property named in propname to the values passed in in the propvals
 * array.  Only create a new property if "create" is true.
 */
static int
ra_set_prop_from_string(scf_handle_t *h, scf_instance_t *inst,
    const char *pgname, const char *propname, scf_type_t proptype,
    boolean_t create, int numpropvals, const char **propvals)
{
	scf_propertygroup_t	*instpg = NULL, *cpg = NULL;
	scf_type_t		oldproptype, newproptype = proptype;
	scf_property_t		*prop = NULL;
	scf_value_t		**values = NULL;
	scf_transaction_t	*tx = NULL;
	scf_transaction_entry_t	*ent = NULL;
	boolean_t		new = B_FALSE;
	int			i, retval, numvalues = 0, ret = 0;
	char			*pgtype = NULL, **ovalues;
	ssize_t			typelen;

	/* Firstly, does property exist? If not, and create is false, bail */
	if (ra_get_prop_as_string(h, inst, pgname, propname, B_TRUE,
	    B_FALSE, &oldproptype, &numvalues, &ovalues) == -1) {
		if (scf_error() != SCF_ERROR_NOT_FOUND)
			goto error;
		if (!create) {
			(void) fprintf(stderr, gettext(
			    "%s: no such property %s/%s\n"), myname, pgname,
			    propname);
			return (-1);
		}
	} else
		ra_free_prop_values(numvalues, ovalues);

	/* Use old property type */
	if (proptype == SCF_TYPE_INVALID)
		newproptype = oldproptype;

	/*
	 * Does property group exist at instance level?  If not, we need to
	 * create it,  since the composed view of the property group did
	 * contain the property.  We never modify properties at the service
	 * level,  as it`s possible that multiple instances will inherit those
	 * settings.
	 */
	if (ra_get_pg(h, inst, pgname, B_FALSE, B_FALSE, &instpg) == -1) {
		if (scf_error() != SCF_ERROR_NOT_FOUND)
			goto error;
		/* Ensure pg exists at service level, get composed pg */
		if (ra_get_pg(h, inst, pgname, B_TRUE, B_FALSE, &cpg) == -1)
			goto error;

		/* Create instance-level property group */
		if ((typelen = scf_pg_get_type(cpg, NULL, 0) + 1) == 0)
			goto error;
		if ((pgtype = malloc(typelen)) == NULL) {
			(void) fprintf(stderr, gettext(
			    "%s: out of memory\n"), myname);
			goto error;
		}
		(void) scf_pg_get_type(cpg, pgtype, typelen);
		if ((instpg = scf_pg_create(h)) == NULL ||
		    scf_instance_add_pg(inst, pgname, pgtype, 0, instpg)
		    == -1) {
			(void) fprintf(stderr, gettext(
			    "%s: could not create property group %s\n"),
			    myname, pgname);
			goto error;
		}
	}
	if ((prop = scf_property_create(h)) == NULL)
		goto error;
	if ((values = calloc(numpropvals, sizeof (scf_value_t *))) == NULL) {
		(void) fprintf(stderr, gettext("%s: out of memory"), myname);
		goto error;
	}
	if (scf_pg_get_property(instpg, propname, prop) != 0) {
		/* New property? */
		if (scf_error() == SCF_ERROR_NOT_FOUND)
			new = B_TRUE;
		else
			goto error;
	}
	if ((tx = scf_transaction_create(h)) == NULL ||
	    (ent = scf_entry_create(h)) == NULL)
		goto error;
retry:
	if (scf_transaction_start(tx, instpg) == -1)
		goto error;
	if (new) {
		if (scf_transaction_property_new(tx, ent, propname,
		    newproptype) == -1)
			goto error;
	} else if (scf_transaction_property_change(tx, ent, propname,
	    newproptype) == -1)
		goto error;
	for (i = 0; i < numpropvals; i++) {
		if ((values[i] = scf_value_create(h)) == NULL ||
		    scf_value_set_from_string(values[i], newproptype,
		    propvals[i] == NULL ? "": propvals[i]) == -1 ||
		    scf_entry_add_value(ent, values[i]) != 0)
			goto error;
	}
	retval = scf_transaction_commit(tx);
	if (retval == 0) {
		scf_transaction_reset(tx);
		if (scf_pg_update(instpg) == -1)
			goto error;
		goto retry;
	}
	if (retval == -1)
		goto error;
	goto out;
error:
	switch (scf_error()) {
	case SCF_ERROR_INVALID_ARGUMENT:
		(void) fprintf(stderr, gettext(
		    "%s: invalid value for property %s/%s\n"), myname,
		    pgname, propname);
		break;
	case SCF_ERROR_NOT_FOUND:
		(void) fprintf(stderr, gettext(
		    "%s: no such property %s/%s\n"), myname,
		    pgname, propname);
		break;
	default:
		(void) fprintf(stderr, gettext(
		    "%s: unexpected libscf error: %s\n"), myname,
		    scf_strerror(scf_error()));
		break;
	}
	ret = -1;
out:
	if (tx != NULL)
		scf_transaction_destroy(tx);
	if (ent != NULL)
		scf_entry_destroy(ent);
	if (values != NULL) {
		for (i = 0; i < numpropvals; i++) {
			if (values[i] != NULL)
				scf_value_destroy(values[i]);
		}
		free(values);
	}
	if (prop != NULL)
		scf_property_destroy(prop);
	if (cpg != NULL)
		scf_pg_destroy(cpg);
	if (instpg != NULL)
		scf_pg_destroy(instpg);
	if (pgtype != NULL)
		free(pgtype);
	return (ret);
}

/*
 * This function gathers configuration from the legacy /etc/inet/routing.conf,
 * if any, and sets the appropriate variable values accordingly.  Once
 * these are set,  the legacy daemons are checked to see if they have
 * SMF counterparts (ra_check_legacy_daemons()).  If they do, the
 * configuration is upgraded.  Finally,  the legacy option settings are
 * applied,  enabling/disabling the routing/forwarding services as
 * appropriate.
 */
static int
ra_upgrade_from_legacy_conf(void)
{
	scf_handle_t	*h = NULL;
	scf_instance_t	*inst = NULL;
	int		ret = 0, i, r;
	boolean_t	old_conf_read;
	ravar_t		*routing_svcs = ra_str2var(RA_VAR_ROUTING_SVCS);

	/*
	 * First, determine if we have already upgraded - if "routing-conf-read"
	 * is true, we bail.  The use of a boolean property indicating if
	 * routing.conf has been read and applied might seem a lot more
	 * work than simply copying routing.conf aside,  but leaving the
	 * file in place allows users to downgrade and have their old
	 * routing configuration still in place.
	 */
	if ((h = scf_handle_create(SCF_VERSION)) == NULL ||
	    scf_handle_bind(h) == -1) {
		(void) fprintf(stderr, gettext(
		    "%s: cannot connect to SMF repository\n"), myname);
		ret = -1;
		goto out;
	}
	if ((inst = scf_instance_create(h)) == NULL ||
	    scf_handle_decode_fmri(h, RA_INSTANCE_ROUTING_SETUP,
	    NULL, NULL, inst, NULL, NULL, SCF_DECODE_FMRI_EXACT) == -1) {
		(void) fprintf(stderr, gettext(
		    "%s: unexpected libscf error: %s\n"), myname,
		    scf_strerror(scf_error()));
		ret = -1;
		goto out;
	}
	if (ra_get_boolean_prop(h, inst, RA_PG_ROUTEADM,
	    RA_PROP_ROUTING_CONF_READ, B_TRUE, B_TRUE, &old_conf_read) == -1) {
		ret = -1;
		goto out;
	}

	if (old_conf_read)
		goto out;

	/*
	 * Now set "routing-conf-read" to true so we don`t reimport legacy
	 * configuration again.
	 */
	if (ra_set_boolean_prop(h, inst, RA_PG_ROUTEADM,
	    RA_PROP_ROUTING_CONF_READ, B_FALSE, B_TRUE) == -1)
		return (-1);
	(void) smf_refresh_instance(RA_INSTANCE_ROUTING_SETUP);

	ra_resetvars(NULL);

	/* First, gather values from routing.conf */
	if ((r = ra_parseconf()) == -1) {
		ret = -1;
		goto out;
	}
	/* No routing.conf file found */
	if (r == 0)
		goto out;
	/*
	 * Now, set the options/variables gathered.  We set variables first,
	 * as we cannot enable routing before we determine the daemons
	 * to enable.
	 */

	for (i = 0; ra_vars[i].var_name != NULL; i++) {
		/* Skip routing-svcs var, not featured in legacy config */
		if (strcmp(ra_vars[i].var_name, RA_VAR_ROUTING_SVCS) == 0)
			continue;
		if (ra_smf_cb(ra_set_persistent_var_cb, ra_vars[i].var_fmri,
		    &(ra_vars[i])) == -1) {
			ret = -1;
			goto out;
		}
	}
	/* Clear routing-svcs value */
	if (ra_smf_cb(ra_set_persistent_var_cb, routing_svcs->var_fmri,
	    routing_svcs) == -1) {
		ret = -1;
		goto out;
	}

	if (ra_check_legacy_daemons() == -1) {
		ret = -1;
		goto out;
	}

	for (i = 0; ra_opts[i].opt_name != NULL; i++) {
		if (ra_smf_cb(ra_set_persistent_opt_cb, ra_opts[i].opt_fmri,
		    &(ra_opts[i])) == -1 ||
		    ra_smf_cb(ra_set_default_opt_cb,
		    ra_opts[i].opt_default_fmri, &(ra_opts[i])) == -1) {
			ret = -1;
			break;
		}
	}
out:
	if (inst != NULL)
		scf_instance_destroy(inst);
	if (h != NULL)
		scf_handle_destroy(h);

	return (ret);
}

/*
 *
 * Return the number of IPv6 addresses configured.  This answers the
 * generic question, "is IPv6 configured?".  We only start in.ndpd if IPv6
 * is configured, and we also only enable IPv6 routing daemons if IPv6 is
 * enabled.
 */
static int
ra_numv6intfs(void)
{
	static int	num = -1;
	int		ipsock;
	struct lifnum	lifn;

	if (num != -1)
		return (num);

	if ((ipsock = socket(PF_INET6, SOCK_DGRAM, 0)) == -1) {
		(void) fprintf(stderr,
		    gettext("%1$s: unable to open %2$s: %3$s\n"),
		    myname, IP_DEV_NAME, strerror(errno));
		return (0);
	}
	lifn.lifn_family = AF_INET6;
	lifn.lifn_flags = 0;

	if (ioctl(ipsock, SIOCGLIFNUM, &lifn) == -1) {
		(void) close(ipsock);
		return (0);
	}
	(void) close(ipsock);

	return (num = lifn.lifn_count);
}

/*
 * Parse the configuration file and fill the ra_opts array with opt_value
 * and opt_default_value values, and the ra_vars array with var_value and
 * var_default_value values.  Then copy aside routing.conf so it will not
 * be read by future invokations of routeadm.
 */
static int
ra_parseconf(void)
{
	FILE	*fp;
	uint_t	lineno;
	char	line[RA_MAX_CONF_LINE];
	char	*cp, *confstr;
	raopt_t	*raopt;
	ravar_t *ravar;

	if ((fp = fopen(RA_CONF_FILE, "r")) == NULL) {
		/*
		 * There's no config file, so we simply return as there
		 * is no work to do.
		 */
		return (0);
	}

	for (lineno = 1; fgets(line, sizeof (line), fp) != NULL; lineno++) {
		if (line[strlen(line) - 1] == '\n')
			line[strlen(line) - 1] = '\0';

		cp = line;

		/* Skip leading whitespace */
		while (isspace(*cp))
			cp++;

		/* Skip comment lines and empty lines */
		if (*cp == '#' || *cp == '\0')
			continue;

		/*
		 * Anything else must be of the form:
		 * <option> <value> <default_value>
		 */
		if ((confstr = strtok(cp, " ")) == NULL) {
			(void) fprintf(stderr,
			    gettext("%1$s: %2$s: invalid entry on line %3$d\n"),
			    myname, RA_CONF_FILE, lineno);
			continue;
		}

		if ((raopt = ra_str2opt(confstr)) != NULL) {
			if (ra_parseopt(confstr, lineno, raopt) != 0) {
				(void) fclose(fp);
				return (-1);
			}
		} else if ((ravar = ra_str2var(confstr)) != NULL) {
			if (ra_parsevar(confstr, ravar) != 0) {
				(void) fclose(fp);
				return (-1);
			}
		} else {
			(void) fprintf(stderr,
			    gettext("%1$s: %2$s: invalid option name on "
				"line %3$d\n"),
			    myname, RA_CONF_FILE, lineno);
			continue;
		}
	}

	(void) fclose(fp);

	return (1);
}

static int
ra_parseopt(char *confstr, int lineno, raopt_t *raopt)
{
	oval_t oval, d_oval;

	if ((confstr = strtok(NULL, " ")) == NULL) {
		(void) fprintf(stderr,
		    gettext("%1$s: %2$s: missing value on line %3$d\n"),
		    myname, RA_CONF_FILE, lineno);
		return (0);
	}
	if ((oval = ra_str2oval(confstr)) == OPT_INVALID) {
		(void) fprintf(stderr,
		    gettext("%1$s: %2$s: invalid option "
			"value on line %3$d\n"),
		    myname, RA_CONF_FILE, lineno);
		return (0);
	}
	if (oval != OPT_DEFAULT)
		raopt->opt_enabled = oval == OPT_ENABLED;

	if ((confstr = strtok(NULL, " ")) == NULL) {
		(void) fprintf(stderr,
		    gettext("%1$s: %2$s: missing revert "
			"value on line %3$d\n"),
		    myname, RA_CONF_FILE, lineno);
		return (0);
	}
	if ((d_oval = ra_str2oval(confstr)) == OPT_INVALID) {
		(void) fprintf(stderr,
		    gettext("%1$s: %2$s: invalid revert "
			"value on line %3$d\n"),
		    myname, RA_CONF_FILE, lineno, confstr);
		return (0);
	}
	raopt->opt_default_enabled = d_oval == OPT_ENABLED;
	if (oval == OPT_DEFAULT)
		raopt->opt_enabled = d_oval == OPT_ENABLED;

	/*
	 * Set ipv4(6)-routing-set property as appropriate on upgrading
	 * routing.conf.  If option was default, set this value to false,
	 * as this indicates the administrator has not explicitly enabled
	 * or disabled ipv4(6)-routing.  The ipv4-routing-set value is used
	 * in the routing-setup service, and if it is false, ipv4-routing
	 * is enabled in the case where no default route can be determined.
	 */
	if (raopt->opt_flags & (RA_SVC_FLAG_IPV4_ROUTING |
	    RA_SVC_FLAG_IPV6_ROUTING)) {
		if (ra_smf_cb(oval == OPT_DEFAULT ? ra_routing_opt_unset_cb :
		    ra_routing_opt_set_cb, raopt->opt_default_fmri, raopt)
		    == -1)
			return (-1);
	}
	return (0);
}

static int
ra_parsevar(char *confstr, ravar_t *ravar)
{
	confstr = strtok(NULL, "=");
	if (confstr == NULL) {
		/*
		 * This isn't an error condition, it simply means that the
		 * variable has no value.
		 */
		ravar->var_value = NULL;
		return (0);
	}

	if ((ravar->var_value = strdup(confstr)) == NULL) {
		(void) fprintf(stderr, gettext("%s: "
		    "unable to allocate memory\n"), myname);
		return (-1);
	}
	return (0);
}

/* Convert a string to an option value. */
static oval_t
ra_str2oval(const char *valstr)
{
	if (strcmp(valstr, "enabled") == 0)
		return (OPT_ENABLED);
	else if (strcmp(valstr, "disabled") == 0)
		return (OPT_DISABLED);
	else if (strcmp(valstr, "default") == 0)
		return (OPT_DEFAULT);
	return (OPT_INVALID);
}

static raopt_t *
ra_str2opt(const char *optnamestr)
{
	int	i;

	for (i = 0; ra_opts[i].opt_name != NULL; i++) {
		if (strcmp(optnamestr, ra_opts[i].opt_name) == 0)
			break;
	}
	if (ra_opts[i].opt_name == NULL)
		return (NULL);
	return (&ra_opts[i]);
}

/*
 * Reset all option values previously gathered to B_FALSE.
 */
static void
ra_resetopts(void)
{
	int	i;

	for (i = 0; ra_opts[i].opt_name != NULL; i++) {
		ra_opts[i].opt_enabled = B_FALSE;
		ra_opts[i].opt_default_enabled = B_FALSE;
	}
}

static ravar_t *
ra_str2var(const char *varnamestr)
{
	int	i;
	for (i = 0; ra_vars[i].var_name != NULL; i++) {
		if (strcmp(varnamestr, ra_vars[i].var_name) == 0)
			break;
	}
	if (ra_vars[i].var_name == NULL)
		return (NULL);
	return (&ra_vars[i]);
}

/*
 * Reset variable values previously gathered to NULL.
 */
static void
ra_resetvars(const char *proto)
{
	int	i;
	for (i = 0; ra_vars[i].var_name != NULL; i++) {
		if (proto != NULL &&
		    !VAR_PROTO_MATCH(ra_vars[i].var_name, proto))
			continue;
		if (ra_vars[i].var_value != NULL)
			free(ra_vars[i].var_value);
		ra_vars[i].var_value = NULL;
		if (ra_vars[i].var_default_value != NULL)
			free(ra_vars[i].var_default_value);
		ra_vars[i].var_default_value = NULL;
	}
}

/*
 * Given an option name, this function provides an internationalized, human
 * readable version of the option name.
 */
static char *
ra_intloptname(const char *optname)
{
	if (strcmp(optname, RA_OPT_IPV4_FORWARDING) == 0)
		return (gettext("IPv4 forwarding"));
	else if (strcmp(optname, RA_OPT_IPV4_ROUTING) == 0)
		return (gettext("IPv4 routing"));
	else if (strcmp(optname, RA_OPT_IPV6_FORWARDING) == 0)
		return (gettext("IPv6 forwarding"));
	else if (strcmp(optname, RA_OPT_IPV6_ROUTING) == 0)
		return (gettext("IPv6 routing"));
	else if (strcmp(optname, RA_VAR_IPV4_ROUTING_DAEMON) == 0)
		return (gettext("IPv4 routing daemon"));
	else if (strcmp(optname, RA_VAR_IPV4_ROUTING_DAEMON_ARGS) == 0)
		return (gettext("IPv4 routing daemon args"));
	else if (strcmp(optname, RA_VAR_IPV4_ROUTING_STOP_CMD) == 0)
		return (gettext("IPv4 routing daemon stop"));
	else if (strcmp(optname, RA_VAR_IPV6_ROUTING_DAEMON) == 0)
		return (gettext("IPv6 routing daemon"));
	else if (strcmp(optname, RA_VAR_IPV6_ROUTING_DAEMON_ARGS) == 0)
		return (gettext("IPv6 routing daemon args"));
	else if (strcmp(optname, RA_VAR_IPV6_ROUTING_STOP_CMD) == 0)
		return (gettext("IPv6 routing daemon stop"));
	else if (strcmp(optname, RA_VAR_ROUTING_SVCS) == 0)
		return (gettext("Routing services"));
	/*
	 * If we get here, there's a bug and someone should trip over this
	 * NULL pointer.
	 */
	return (NULL);
}