xref: /freebsd/sbin/route/route.c (revision a316b26e50bbed7cf655fbba726ab87d8ab7599d)
1 /*
2  *
3  * Copyright (c) 1983, 1989, 1991, 1993
4  *	The Regents of the University of California.  All rights reserved.
5  *
6  * Redistribution and use in source and binary forms, with or without
7  * modification, are permitted provided that the following conditions
8  * are met:
9  * 1. Redistributions of source code must retain the above copyright
10  *    notice, this list of conditions and the following disclaimer.
11  * 2. Redistributions in binary form must reproduce the above copyright
12  *    notice, this list of conditions and the following disclaimer in the
13  *    documentation and/or other materials provided with the distribution.
14  * 3. All advertising materials mentioning features or use of this software
15  *    must display the following acknowledgement:
16  *	This product includes software developed by the University of
17  *	California, Berkeley and its contributors.
18  * 4. Neither the name of the University nor the names of its contributors
19  *    may be used to endorse or promote products derived from this software
20  *    without specific prior written permission.
21  *
22  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
23  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
24  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
25  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
26  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
27  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
28  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
29  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
30  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
31  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
32  * SUCH DAMAGE.
33  */
34 
35 #ifndef lint
36 static char copyright[] =
37 "@(#) Copyright (c) 1983, 1989, 1991, 1993\n\
38 	The Regents of the University of California.  All rights reserved.\n";
39 #endif /* not lint */
40 
41 #ifndef lint
42 static char sccsid[] = "@(#)route.c	8.3 (Berkeley) 3/19/94";
43 #endif /* not lint */
44 
45 #include <sys/param.h>
46 #include <sys/file.h>
47 #include <sys/socket.h>
48 #include <sys/ioctl.h>
49 #include <sys/mbuf.h>
50 #include <sys/sysctl.h>
51 
52 #include <net/if.h>
53 #include <net/route.h>
54 #include <net/if_dl.h>
55 #include <netinet/in.h>
56 #include <netns/ns.h>
57 #include <netiso/iso.h>
58 #include <netccitt/x25.h>
59 #include <arpa/inet.h>
60 #include <netdb.h>
61 
62 #include <errno.h>
63 #include <unistd.h>
64 #include <stdio.h>
65 #include <ctype.h>
66 #include <stdlib.h>
67 #include <string.h>
68 #include <paths.h>
69 
70 struct keytab {
71 	char	*kt_cp;
72 	int	kt_i;
73 } keywords[] = {
74 #include "keywords.h"
75 	{0, 0}
76 };
77 
78 struct	ortentry route;
79 union	sockunion {
80 	struct	sockaddr sa;
81 	struct	sockaddr_in sin;
82 	struct	sockaddr_ns sns;
83 	struct	sockaddr_iso siso;
84 	struct	sockaddr_dl sdl;
85 	struct	sockaddr_x25 sx25;
86 } so_dst, so_gate, so_mask, so_genmask, so_ifa, so_ifp;
87 
88 typedef union sockunion *sup;
89 int	pid, rtm_addrs, uid;
90 int	s;
91 int	forcehost, forcenet, doflush, nflag, af, qflag, tflag, keyword();
92 int	iflag, verbose, aflen = sizeof (struct sockaddr_in);
93 int	locking, lockrest, debugonly;
94 struct	rt_metrics rt_metrics;
95 u_long  rtm_inits;
96 struct	in_addr inet_makeaddr();
97 char	*routename(), *netname();
98 void	flushroutes(), newroute(), monitor(), sockaddr(), sodump(), bprintf();
99 void	print_getmsg(), print_rtmsg(), pmsg_common(), pmsg_addrs(), mask_addr();
100 int	getaddr(), rtmsg(), x25_makemask();
101 extern	char *inet_ntoa(), *iso_ntoa(), *link_ntoa();
102 
103 __dead void
104 usage(cp)
105 	char *cp;
106 {
107 	if (cp)
108 		(void) fprintf(stderr, "route: botched keyword: %s\n", cp);
109 	(void) fprintf(stderr,
110 	    "usage: route [ -nqv ] cmd [[ -<qualifers> ] args ]\n");
111 	exit(1);
112 	/* NOTREACHED */
113 }
114 
115 void
116 quit(s)
117 	char *s;
118 {
119 	int sverrno = errno;
120 
121 	(void) fprintf(stderr, "route: ");
122 	if (s)
123 		(void) fprintf(stderr, "%s: ", s);
124 	(void) fprintf(stderr, "%s\n", strerror(sverrno));
125 	exit(1);
126 	/* NOTREACHED */
127 }
128 
129 #define ROUNDUP(a) \
130 	((a) > 0 ? (1 + (((a) - 1) | (sizeof(long) - 1))) : sizeof(long))
131 #define ADVANCE(x, n) (x += ROUNDUP((n)->sa_len))
132 
133 int
134 main(argc, argv)
135 	int argc;
136 	char **argv;
137 {
138 	extern int optind;
139 	int ch;
140 
141 	if (argc < 2)
142 		usage((char *)NULL);
143 
144 	while ((ch = getopt(argc, argv, "nqdtv")) != EOF)
145 		switch(ch) {
146 		case 'n':
147 			nflag = 1;
148 			break;
149 		case 'q':
150 			qflag = 1;
151 			break;
152 		case 'v':
153 			verbose = 1;
154 			break;
155 		case 't':
156 			tflag = 1;
157 			break;
158 		case 'd':
159 			debugonly = 1;
160 			break;
161 		case '?':
162 		default:
163 			usage((char *)NULL);
164 		}
165 	argc -= optind;
166 	argv += optind;
167 
168 	pid = getpid();
169 	uid = getuid();
170 	if (tflag)
171 		s = open("/dev/null", O_WRONLY, 0);
172 	else
173 		s = socket(PF_ROUTE, SOCK_RAW, 0);
174 	if (s < 0)
175 		quit("socket");
176 	if (*argv)
177 		switch (keyword(*argv)) {
178 		case K_GET:
179 			uid = 0;
180 			/* FALLTHROUGH */
181 
182 		case K_CHANGE:
183 		case K_ADD:
184 		case K_DELETE:
185 			newroute(argc, argv);
186 			exit(0);
187 			/* NOTREACHED */
188 
189 		case K_MONITOR:
190 			monitor();
191 			/* NOTREACHED */
192 
193 		case K_FLUSH:
194 			flushroutes(argc, argv);
195 			exit(0);
196 			/* NOTREACHED */
197 		}
198 	usage(*argv);
199 	/* NOTREACHED */
200 }
201 
202 /*
203  * Purge all entries in the routing tables not
204  * associated with network interfaces.
205  */
206 void
207 flushroutes(argc, argv)
208 	int argc;
209 	char *argv[];
210 {
211 	size_t needed;
212 	int mib[6], rlen, seqno;
213 	char *buf, *next, *lim;
214 	register struct rt_msghdr *rtm;
215 
216 	if (uid) {
217 		errno = EACCES;
218 		quit("must be root to alter routing table");
219 	}
220 	shutdown(s, 0); /* Don't want to read back our messages */
221 	if (argc > 1) {
222 		argv++;
223 		if (argc == 2 && **argv == '-')
224 		    switch (keyword(*argv + 1)) {
225 			case K_INET:
226 				af = AF_INET;
227 				break;
228 			case K_XNS:
229 				af = AF_NS;
230 				break;
231 			case K_LINK:
232 				af = AF_LINK;
233 				break;
234 			case K_ISO:
235 			case K_OSI:
236 				af = AF_ISO;
237 				break;
238 			case K_X25:
239 				af = AF_CCITT;
240 			default:
241 				goto bad;
242 		} else
243 bad:			usage(*argv);
244 	}
245 	mib[0] = CTL_NET;
246 	mib[1] = PF_ROUTE;
247 	mib[2] = 0;		/* protocol */
248 	mib[3] = 0;		/* wildcard address family */
249 	mib[4] = NET_RT_DUMP;
250 	mib[5] = 0;		/* no flags */
251 	if (sysctl(mib, 6, NULL, &needed, NULL, 0) < 0)
252 		quit("route-sysctl-estimate");
253 	if ((buf = malloc(needed)) == NULL)
254 		quit("malloc");
255 	if (sysctl(mib, 6, buf, &needed, NULL, 0) < 0)
256 		quit("actual retrieval of routing table");
257 	lim = buf + needed;
258 	if (verbose)
259 		(void) printf("Examining routing table from sysctl\n");
260 	seqno = 0;		/* ??? */
261 	for (next = buf; next < lim; next += rtm->rtm_msglen) {
262 		rtm = (struct rt_msghdr *)next;
263 		if (verbose)
264 			print_rtmsg(rtm, rtm->rtm_msglen);
265 		if ((rtm->rtm_flags & RTF_GATEWAY) == 0)
266 			continue;
267 		if (af) {
268 			struct sockaddr *sa = (struct sockaddr *)(rtm + 1);
269 
270 			if (sa->sa_family != af)
271 				continue;
272 		}
273 		if (debugonly)
274 			continue;
275 		rtm->rtm_type = RTM_DELETE;
276 		rtm->rtm_seq = seqno;
277 		rlen = write(s, next, rtm->rtm_msglen);
278 		if (rlen < (int)rtm->rtm_msglen) {
279 			(void) fprintf(stderr,
280 			    "route: write to routing socket: %s\n",
281 			    strerror(errno));
282 			(void) printf("got only %d for rlen\n", rlen);
283 			break;
284 		}
285 		seqno++;
286 		if (qflag)
287 			continue;
288 		if (verbose)
289 			print_rtmsg(rtm, rlen);
290 		else {
291 			struct sockaddr *sa = (struct sockaddr *)(rtm + 1);
292 			(void) printf("%-20.20s ", rtm->rtm_flags & RTF_HOST ?
293 			    routename(sa) : netname(sa));
294 			sa = (struct sockaddr *)(sa->sa_len + (char *)sa);
295 			(void) printf("%-20.20s ", routename(sa));
296 			(void) printf("done\n");
297 		}
298 	}
299 }
300 
301 char *
302 routename(sa)
303 	struct sockaddr *sa;
304 {
305 	register char *cp;
306 	static char line[50];
307 	struct hostent *hp;
308 	static char domain[MAXHOSTNAMELEN + 1];
309 	static int first = 1;
310 	char *ns_print();
311 
312 	if (first) {
313 		first = 0;
314 		if (gethostname(domain, MAXHOSTNAMELEN) == 0 &&
315 		    (cp = index(domain, '.')))
316 			(void) strcpy(domain, cp + 1);
317 		else
318 			domain[0] = 0;
319 	}
320 
321 	if (sa->sa_len == 0)
322 		strcpy(line, "default");
323 	else switch (sa->sa_family) {
324 
325 	case AF_INET:
326 	    {	struct in_addr in;
327 		in = ((struct sockaddr_in *)sa)->sin_addr;
328 
329 		cp = 0;
330 		if (in.s_addr == INADDR_ANY || sa->sa_len < 4)
331 			cp = "default";
332 		if (cp == 0 && !nflag) {
333 			hp = gethostbyaddr((char *)&in, sizeof (struct in_addr),
334 				AF_INET);
335 			if (hp) {
336 				if ((cp = index(hp->h_name, '.')) &&
337 				    !strcmp(cp + 1, domain))
338 					*cp = 0;
339 				cp = hp->h_name;
340 			}
341 		}
342 		if (cp)
343 			strcpy(line, cp);
344 		else {
345 #define C(x)	((x) & 0xff)
346 			in.s_addr = ntohl(in.s_addr);
347 			(void) sprintf(line, "%u.%u.%u.%u", C(in.s_addr >> 24),
348 			   C(in.s_addr >> 16), C(in.s_addr >> 8), C(in.s_addr));
349 		}
350 		break;
351 	    }
352 
353 	case AF_NS:
354 		return (ns_print((struct sockaddr_ns *)sa));
355 
356 	case AF_LINK:
357 		return (link_ntoa((struct sockaddr_dl *)sa));
358 
359 	case AF_ISO:
360 		(void) sprintf(line, "iso %s",
361 		    iso_ntoa(&((struct sockaddr_iso *)sa)->siso_addr));
362 		break;
363 
364 	default:
365 	    {	u_short *s = (u_short *)sa;
366 		u_short *slim = s + ((sa->sa_len + 1) >> 1);
367 		char *cp = line + sprintf(line, "(%d)", sa->sa_family);
368 
369 		while (++s < slim) /* start with sa->sa_data */
370 			cp += sprintf(cp, " %x", *s);
371 		break;
372 	    }
373 	}
374 	return (line);
375 }
376 
377 /*
378  * Return the name of the network whose address is given.
379  * The address is assumed to be that of a net or subnet, not a host.
380  */
381 char *
382 netname(sa)
383 	struct sockaddr *sa;
384 {
385 	char *cp = 0;
386 	static char line[50];
387 	struct netent *np = 0;
388 	u_long net, mask;
389 	register u_long i;
390 	int subnetshift;
391 	char *ns_print();
392 
393 	switch (sa->sa_family) {
394 
395 	case AF_INET:
396 	    {	struct in_addr in;
397 		in = ((struct sockaddr_in *)sa)->sin_addr;
398 
399 		i = in.s_addr = ntohl(in.s_addr);
400 		if (in.s_addr == 0)
401 			cp = "default";
402 		else if (!nflag) {
403 			if (IN_CLASSA(i)) {
404 				mask = IN_CLASSA_NET;
405 				subnetshift = 8;
406 			} else if (IN_CLASSB(i)) {
407 				mask = IN_CLASSB_NET;
408 				subnetshift = 8;
409 			} else {
410 				mask = IN_CLASSC_NET;
411 				subnetshift = 4;
412 			}
413 			/*
414 			 * If there are more bits than the standard mask
415 			 * would suggest, subnets must be in use.
416 			 * Guess at the subnet mask, assuming reasonable
417 			 * width subnet fields.
418 			 */
419 			while (in.s_addr &~ mask)
420 				mask = (long)mask >> subnetshift;
421 			net = in.s_addr & mask;
422 			while ((mask & 1) == 0)
423 				mask >>= 1, net >>= 1;
424 			np = getnetbyaddr(net, AF_INET);
425 			if (np)
426 				cp = np->n_name;
427 		}
428 		if (cp)
429 			strcpy(line, cp);
430 		else if ((in.s_addr & 0xffffff) == 0)
431 			(void) sprintf(line, "%u", C(in.s_addr >> 24));
432 		else if ((in.s_addr & 0xffff) == 0)
433 			(void) sprintf(line, "%u.%u", C(in.s_addr >> 24),
434 			    C(in.s_addr >> 16));
435 		else if ((in.s_addr & 0xff) == 0)
436 			(void) sprintf(line, "%u.%u.%u", C(in.s_addr >> 24),
437 			    C(in.s_addr >> 16), C(in.s_addr >> 8));
438 		else
439 			(void) sprintf(line, "%u.%u.%u.%u", C(in.s_addr >> 24),
440 			    C(in.s_addr >> 16), C(in.s_addr >> 8),
441 			    C(in.s_addr));
442 		break;
443 	    }
444 
445 	case AF_NS:
446 		return (ns_print((struct sockaddr_ns *)sa));
447 		break;
448 
449 	case AF_LINK:
450 		return (link_ntoa((struct sockaddr_dl *)sa));
451 
452 	case AF_ISO:
453 		(void) sprintf(line, "iso %s",
454 		    iso_ntoa(&((struct sockaddr_iso *)sa)->siso_addr));
455 		break;
456 
457 	default:
458 	    {	u_short *s = (u_short *)sa->sa_data;
459 		u_short *slim = s + ((sa->sa_len + 1)>>1);
460 		char *cp = line + sprintf(line, "af %d:", sa->sa_family);
461 
462 		while (s < slim)
463 			cp += sprintf(cp, " %x", *s++);
464 		break;
465 	    }
466 	}
467 	return (line);
468 }
469 
470 void
471 set_metric(value, key)
472 	char *value;
473 	int key;
474 {
475 	int flag = 0;
476 	u_long noval, *valp = &noval;
477 
478 	switch (key) {
479 #define caseof(x, y, z)	case x: valp = &rt_metrics.z; flag = y; break
480 	caseof(K_MTU, RTV_MTU, rmx_mtu);
481 	caseof(K_HOPCOUNT, RTV_HOPCOUNT, rmx_hopcount);
482 	caseof(K_EXPIRE, RTV_EXPIRE, rmx_expire);
483 	caseof(K_RECVPIPE, RTV_RPIPE, rmx_recvpipe);
484 	caseof(K_SENDPIPE, RTV_SPIPE, rmx_sendpipe);
485 	caseof(K_SSTHRESH, RTV_SSTHRESH, rmx_ssthresh);
486 	caseof(K_RTT, RTV_RTT, rmx_rtt);
487 	caseof(K_RTTVAR, RTV_RTTVAR, rmx_rttvar);
488 	}
489 	rtm_inits |= flag;
490 	if (lockrest || locking)
491 		rt_metrics.rmx_locks |= flag;
492 	if (locking)
493 		locking = 0;
494 	*valp = atoi(value);
495 }
496 
497 void
498 newroute(argc, argv)
499 	int argc;
500 	register char **argv;
501 {
502 	char *cmd, *dest = "", *gateway = "", *err;
503 	int ishost = 0, ret, attempts, oerrno, flags = RTF_STATIC;
504 	int key;
505 	struct hostent *hp = 0;
506 
507 	if (uid) {
508 		errno = EACCES;
509 		quit("must be root to alter routing table");
510 	}
511 	cmd = argv[0];
512 	if (*cmd != 'g')
513 		shutdown(s, 0); /* Don't want to read back our messages */
514 	while (--argc > 0) {
515 		if (**(++argv)== '-') {
516 			switch (key = keyword(1 + *argv)) {
517 			case K_LINK:
518 				af = AF_LINK;
519 				aflen = sizeof(struct sockaddr_dl);
520 				break;
521 			case K_OSI:
522 			case K_ISO:
523 				af = AF_ISO;
524 				aflen = sizeof(struct sockaddr_iso);
525 				break;
526 			case K_INET:
527 				af = AF_INET;
528 				aflen = sizeof(struct sockaddr_in);
529 				break;
530 			case K_X25:
531 				af = AF_CCITT;
532 				aflen = sizeof(struct sockaddr_x25);
533 				break;
534 			case K_SA:
535 				af = PF_ROUTE;
536 				aflen = sizeof(union sockunion);
537 				break;
538 			case K_XNS:
539 				af = AF_NS;
540 				aflen = sizeof(struct sockaddr_ns);
541 				break;
542 			case K_IFACE:
543 			case K_INTERFACE:
544 				iflag++;
545 				break;
546 			case K_NOSTATIC:
547 				flags &= ~RTF_STATIC;
548 				break;
549 			case K_LOCK:
550 				locking = 1;
551 				break;
552 			case K_LOCKREST:
553 				lockrest = 1;
554 				break;
555 			case K_HOST:
556 				forcehost++;
557 				break;
558 			case K_REJECT:
559 				flags |= RTF_REJECT;
560 				break;
561 			case K_BLACKHOLE:
562 				flags |= RTF_BLACKHOLE;
563 				break;
564 			case K_PROTO1:
565 				flags |= RTF_PROTO1;
566 				break;
567 			case K_PROTO2:
568 				flags |= RTF_PROTO2;
569 				break;
570 			case K_CLONING:
571 				flags |= RTF_CLONING;
572 				break;
573 			case K_XRESOLVE:
574 				flags |= RTF_XRESOLVE;
575 				break;
576 			case K_STATIC:
577 				flags |= RTF_STATIC;
578 				break;
579 			case K_IFA:
580 				argc--;
581 				(void) getaddr(RTA_IFA, *++argv, 0);
582 				break;
583 			case K_IFP:
584 				argc--;
585 				(void) getaddr(RTA_IFP, *++argv, 0);
586 				break;
587 			case K_GENMASK:
588 				argc--;
589 				(void) getaddr(RTA_GENMASK, *++argv, 0);
590 				break;
591 			case K_GATEWAY:
592 				argc--;
593 				(void) getaddr(RTA_GATEWAY, *++argv, 0);
594 				break;
595 			case K_DST:
596 				argc--;
597 				ishost = getaddr(RTA_DST, *++argv, &hp);
598 				dest = *argv;
599 				break;
600 			case K_NETMASK:
601 				argc--;
602 				(void) getaddr(RTA_NETMASK, *++argv, 0);
603 				/* FALLTHROUGH */
604 			case K_NET:
605 				forcenet++;
606 				break;
607 			case K_MTU:
608 			case K_HOPCOUNT:
609 			case K_EXPIRE:
610 			case K_RECVPIPE:
611 			case K_SENDPIPE:
612 			case K_SSTHRESH:
613 			case K_RTT:
614 			case K_RTTVAR:
615 				argc--;
616 				set_metric(*++argv, key);
617 				break;
618 			default:
619 				usage(1+*argv);
620 			}
621 		} else {
622 			if ((rtm_addrs & RTA_DST) == 0) {
623 				dest = *argv;
624 				ishost = getaddr(RTA_DST, *argv, &hp);
625 			} else if ((rtm_addrs & RTA_GATEWAY) == 0) {
626 				gateway = *argv;
627 				(void) getaddr(RTA_GATEWAY, *argv, &hp);
628 			} else {
629 				int ret = atoi(*argv);
630 
631 				if (ret == 0) {
632 				    if (strcmp(*argv, "0") == 0)
633 				        printf("%s,%s",
634 					    "old usage of trailing 0",
635 					    "assuming route to if\n");
636 				    else
637 					usage((char *)NULL);
638 				    iflag = 1;
639 				    continue;
640 				} else if (ret > 0 && ret < 10) {
641 				    printf("old usage of trailing digit, ");
642 				    printf("assuming route via gateway\n");
643 				    iflag = 0;
644 				    continue;
645 				}
646 				(void) getaddr(RTA_NETMASK, *argv, 0);
647 			}
648 		}
649 	}
650 	if (forcehost)
651 		ishost = 1;
652 	if (forcenet)
653 		ishost = 0;
654 	flags |= RTF_UP;
655 	if (ishost)
656 		flags |= RTF_HOST;
657 	if (iflag == 0)
658 		flags |= RTF_GATEWAY;
659 	for (attempts = 1; ; attempts++) {
660 		errno = 0;
661 		if ((ret = rtmsg(*cmd, flags)) == 0)
662 			break;
663 		if (errno != ENETUNREACH && errno != ESRCH)
664 			break;
665 		if (af == AF_INET && *gateway && hp && hp->h_addr_list[1]) {
666 			hp->h_addr_list++;
667 			bcopy(hp->h_addr_list[0], &so_gate.sin.sin_addr,
668 			    hp->h_length);
669 		} else
670 			break;
671 	}
672 	if (*cmd == 'g')
673 		exit(0);
674 	oerrno = errno;
675 	(void) printf("%s %s %s", cmd, ishost? "host" : "net", dest);
676 	if (*gateway) {
677 		(void) printf(": gateway %s", gateway);
678 		if (attempts > 1 && ret == 0 && af == AF_INET)
679 		    (void) printf(" (%s)",
680 			inet_ntoa(((struct sockaddr_in *)&route.rt_gateway)->sin_addr));
681 	}
682 	if (ret == 0)
683 		(void) printf("\n");
684 	else {
685 		switch (oerrno) {
686 		case ESRCH:
687 			err = "not in table";
688 			break;
689 		case EBUSY:
690 			err = "entry in use";
691 			break;
692 		case ENOBUFS:
693 			err = "routing table overflow";
694 			break;
695 		default:
696 			err = strerror(oerrno);
697 			break;
698 		}
699 		(void) printf(": %s\n", err);
700 	}
701 }
702 
703 void
704 inet_makenetandmask(net, sin)
705 	u_long net;
706 	register struct sockaddr_in *sin;
707 {
708 	u_long addr, mask = 0;
709 	register char *cp;
710 
711 	rtm_addrs |= RTA_NETMASK;
712 	if (net == 0)
713 		mask = addr = 0;
714 	else if (net < 128) {
715 		addr = net << IN_CLASSA_NSHIFT;
716 		mask = IN_CLASSA_NET;
717 	} else if (net < 65536) {
718 		addr = net << IN_CLASSB_NSHIFT;
719 		mask = IN_CLASSB_NET;
720 	} else if (net < 16777216L) {
721 		addr = net << IN_CLASSC_NSHIFT;
722 		mask = IN_CLASSC_NET;
723 	} else {
724 		addr = net;
725 		if ((addr & IN_CLASSA_HOST) == 0)
726 			mask =  IN_CLASSA_NET;
727 		else if ((addr & IN_CLASSB_HOST) == 0)
728 			mask =  IN_CLASSB_NET;
729 		else if ((addr & IN_CLASSC_HOST) == 0)
730 			mask =  IN_CLASSC_NET;
731 		else
732 			mask = -1;
733 	}
734 	sin->sin_addr.s_addr = htonl(addr);
735 	sin = &so_mask.sin;
736 	sin->sin_addr.s_addr = htonl(mask);
737 	sin->sin_len = 0;
738 	sin->sin_family = 0;
739 	cp = (char *)(&sin->sin_addr + 1);
740 	while (*--cp == 0 && cp > (char *)sin)
741 		;
742 	sin->sin_len = 1 + cp - (char *)sin;
743 }
744 
745 /*
746  * Interpret an argument as a network address of some kind,
747  * returning 1 if a host address, 0 if a network address.
748  */
749 int
750 getaddr(which, s, hpp)
751 	int which;
752 	char *s;
753 	struct hostent **hpp;
754 {
755 	register sup su;
756 	struct ns_addr ns_addr();
757 	struct iso_addr *iso_addr();
758 	struct hostent *hp;
759 	struct netent *np;
760 	u_long val;
761 
762 	if (af == 0) {
763 		af = AF_INET;
764 		aflen = sizeof(struct sockaddr_in);
765 	}
766 	rtm_addrs |= which;
767 	switch (which) {
768 	case RTA_DST:
769 		su = &so_dst;
770 		su->sa.sa_family = af;
771 		break;
772 	case RTA_GATEWAY:
773 		su = &so_gate;
774 		su->sa.sa_family = af;
775 		break;
776 	case RTA_NETMASK:
777 		su = &so_mask;
778 		break;
779 	case RTA_GENMASK:
780 		su = &so_genmask;
781 		break;
782 	case RTA_IFP:
783 		su = &so_ifp;
784 		su->sa.sa_family = af;
785 		break;
786 	case RTA_IFA:
787 		su = &so_ifa;
788 		su->sa.sa_family = af;
789 		break;
790 	default:
791 		usage("Internal Error");
792 		/*NOTREACHED*/
793 	}
794 	su->sa.sa_len = aflen;
795 	if (strcmp(s, "default") == 0) {
796 		switch (which) {
797 		case RTA_DST:
798 			forcenet++;
799 			(void) getaddr(RTA_NETMASK, s, 0);
800 			break;
801 		case RTA_NETMASK:
802 		case RTA_GENMASK:
803 			su->sa.sa_len = 0;
804 		}
805 		return (0);
806 	}
807 	switch (af) {
808 	case AF_NS:
809 		if (which == RTA_DST) {
810 			extern short ns_bh[3];
811 			struct sockaddr_ns *sms = &(so_mask.sns);
812 			bzero((char *)sms, sizeof(*sms));
813 			sms->sns_family = 0;
814 			sms->sns_len = 6;
815 			sms->sns_addr.x_net = *(union ns_net *)ns_bh;
816 			rtm_addrs |= RTA_NETMASK;
817 		}
818 		su->sns.sns_addr = ns_addr(s);
819 		return (!ns_nullhost(su->sns.sns_addr));
820 
821 	case AF_OSI:
822 		su->siso.siso_addr = *iso_addr(s);
823 		if (which == RTA_NETMASK || which == RTA_GENMASK) {
824 			register char *cp = (char *)TSEL(&su->siso);
825 			su->siso.siso_nlen = 0;
826 			do {--cp ;} while ((cp > (char *)su) && (*cp == 0));
827 			su->siso.siso_len = 1 + cp - (char *)su;
828 		}
829 		return (1);
830 
831 	case AF_LINK:
832 		link_addr(s, &su->sdl);
833 		return (1);
834 
835 	case AF_CCITT:
836 		ccitt_addr(s, &su->sx25);
837 		return (which == RTA_DST ? x25_makemask() : 1);
838 
839 	case PF_ROUTE:
840 		su->sa.sa_len = sizeof(*su);
841 		sockaddr(s, &su->sa);
842 		return (1);
843 
844 	case AF_INET:
845 	default:
846 		break;
847 	}
848 
849 	if (hpp == NULL)
850 		hpp = &hp;
851 	*hpp = NULL;
852 	if (((val = inet_addr(s)) != -1) &&
853 	    (which != RTA_DST || forcenet == 0)) {
854 		su->sin.sin_addr.s_addr = val;
855 		if (inet_lnaof(su->sin.sin_addr) != INADDR_ANY)
856 			return (1);
857 		else {
858 			val = ntohl(val);
859 			goto netdone;
860 		}
861 	}
862 	if ((val = inet_network(s)) != -1 ||
863 	    ((np = getnetbyname(s)) != NULL && (val = np->n_net) != 0)) {
864 netdone:
865 		if (which == RTA_DST)
866 			inet_makenetandmask(val, &su->sin);
867 		return (0);
868 	}
869 	hp = gethostbyname(s);
870 	if (hp) {
871 		*hpp = hp;
872 		su->sin.sin_family = hp->h_addrtype;
873 		bcopy(hp->h_addr, (char *)&su->sin.sin_addr, hp->h_length);
874 		return (1);
875 	}
876 	(void) fprintf(stderr, "%s: bad value\n", s);
877 	exit(1);
878 }
879 
880 int
881 x25_makemask()
882 {
883 	register char *cp;
884 
885 	if ((rtm_addrs & RTA_NETMASK) == 0) {
886 		rtm_addrs |= RTA_NETMASK;
887 		for (cp = (char *)&so_mask.sx25.x25_net;
888 		     cp < &so_mask.sx25.x25_opts.op_flags; cp++)
889 			*cp = -1;
890 		so_mask.sx25.x25_len = (u_char)&(((sup)0)->sx25.x25_opts);
891 	}
892 	return 0;
893 }
894 
895 short ns_nullh[] = {0,0,0};
896 short ns_bh[] = {-1,-1,-1};
897 
898 char *
899 ns_print(sns)
900 	struct sockaddr_ns *sns;
901 {
902 	struct ns_addr work;
903 	union { union ns_net net_e; u_long long_e; } net;
904 	u_short port;
905 	static char mybuf[50], cport[10], chost[25];
906 	char *host = "";
907 	register char *p;
908 	register u_char *q;
909 
910 	work = sns->sns_addr;
911 	port = ntohs(work.x_port);
912 	work.x_port = 0;
913 	net.net_e  = work.x_net;
914 	if (ns_nullhost(work) && net.long_e == 0) {
915 		if (!port)
916 			return ("*.*");
917 		(void) sprintf(mybuf, "*.%XH", port);
918 		return (mybuf);
919 	}
920 
921 	if (bcmp((char *)ns_bh, (char *)work.x_host.c_host, 6) == 0)
922 		host = "any";
923 	else if (bcmp((char *)ns_nullh, (char *)work.x_host.c_host, 6) == 0)
924 		host = "*";
925 	else {
926 		q = work.x_host.c_host;
927 		(void) sprintf(chost, "%02X%02X%02X%02X%02X%02XH",
928 			q[0], q[1], q[2], q[3], q[4], q[5]);
929 		for (p = chost; *p == '0' && p < chost + 12; p++)
930 			/* void */;
931 		host = p;
932 	}
933 	if (port)
934 		(void) sprintf(cport, ".%XH", htons(port));
935 	else
936 		*cport = 0;
937 
938 	(void) sprintf(mybuf,"%XH.%s%s", ntohl(net.long_e), host, cport);
939 	return (mybuf);
940 }
941 
942 void
943 interfaces()
944 {
945 	size_t needed;
946 	int mib[6];
947 	char *buf, *lim, *next;
948 	register struct rt_msghdr *rtm;
949 
950 	mib[0] = CTL_NET;
951 	mib[1] = PF_ROUTE;
952 	mib[2] = 0;		/* protocol */
953 	mib[3] = 0;		/* wildcard address family */
954 	mib[4] = NET_RT_IFLIST;
955 	mib[5] = 0;		/* no flags */
956 	if (sysctl(mib, 6, NULL, &needed, NULL, 0) < 0)
957 		quit("route-sysctl-estimate");
958 	if ((buf = malloc(needed)) == NULL)
959 		quit("malloc");
960 	if (sysctl(mib, 6, buf, &needed, NULL, 0) < 0)
961 		quit("actual retrieval of interface table");
962 	lim = buf + needed;
963 	for (next = buf; next < lim; next += rtm->rtm_msglen) {
964 		rtm = (struct rt_msghdr *)next;
965 		print_rtmsg(rtm, rtm->rtm_msglen);
966 	}
967 }
968 
969 void
970 monitor()
971 {
972 	int n;
973 	char msg[2048];
974 
975 	verbose = 1;
976 	if (debugonly) {
977 		interfaces();
978 		exit(0);
979 	}
980 	for(;;) {
981 		n = read(s, msg, 2048);
982 		(void) printf("got message of size %d\n", n);
983 		print_rtmsg((struct rt_msghdr *)msg, n);
984 	}
985 }
986 
987 struct {
988 	struct	rt_msghdr m_rtm;
989 	char	m_space[512];
990 } m_rtmsg;
991 
992 int
993 rtmsg(cmd, flags)
994 	int cmd, flags;
995 {
996 	static int seq;
997 	int rlen;
998 	register char *cp = m_rtmsg.m_space;
999 	register int l;
1000 
1001 #define NEXTADDR(w, u) \
1002 	if (rtm_addrs & (w)) {\
1003 	    l = ROUNDUP(u.sa.sa_len); bcopy((char *)&(u), cp, l); cp += l;\
1004 	    if (verbose) sodump(&(u),"u");\
1005 	}
1006 
1007 	errno = 0;
1008 	bzero((char *)&m_rtmsg, sizeof(m_rtmsg));
1009 	if (cmd == 'a')
1010 		cmd = RTM_ADD;
1011 	else if (cmd == 'c')
1012 		cmd = RTM_CHANGE;
1013 	else if (cmd == 'g') {
1014 		cmd = RTM_GET;
1015 		if (so_ifp.sa.sa_family == 0) {
1016 			so_ifp.sa.sa_family == AF_LINK;
1017 			so_ifp.sa.sa_len == sizeof(struct sockaddr_dl);
1018 			rtm_addrs |= RTA_IFP;
1019 		}
1020 	} else
1021 		cmd = RTM_DELETE;
1022 #define rtm m_rtmsg.m_rtm
1023 	rtm.rtm_type = cmd;
1024 	rtm.rtm_flags = flags;
1025 	rtm.rtm_version = RTM_VERSION;
1026 	rtm.rtm_seq = ++seq;
1027 	rtm.rtm_addrs = rtm_addrs;
1028 	rtm.rtm_rmx = rt_metrics;
1029 	rtm.rtm_inits = rtm_inits;
1030 
1031 	if (rtm_addrs & RTA_NETMASK)
1032 		mask_addr();
1033 	NEXTADDR(RTA_DST, so_dst);
1034 	NEXTADDR(RTA_GATEWAY, so_gate);
1035 	NEXTADDR(RTA_NETMASK, so_mask);
1036 	NEXTADDR(RTA_GENMASK, so_genmask);
1037 	NEXTADDR(RTA_IFP, so_ifp);
1038 	NEXTADDR(RTA_IFA, so_ifa);
1039 	rtm.rtm_msglen = l = cp - (char *)&m_rtmsg;
1040 	if (verbose)
1041 		print_rtmsg(&rtm, l);
1042 	if (debugonly)
1043 		return (0);
1044 	if ((rlen = write(s, (char *)&m_rtmsg, l)) < 0) {
1045 		perror("writing to routing socket");
1046 		return (-1);
1047 	}
1048 	if (cmd == RTM_GET) {
1049 		do {
1050 			l = read(s, (char *)&m_rtmsg, sizeof(m_rtmsg));
1051 		} while (l > 0 && (rtm.rtm_seq != seq || rtm.rtm_pid != pid));
1052 		if (l < 0)
1053 			(void) fprintf(stderr,
1054 			    "route: read from routing socket: %s\n",
1055 			    strerror(errno));
1056 		else
1057 			print_getmsg(&rtm, l);
1058 	}
1059 #undef rtm
1060 	return (0);
1061 }
1062 
1063 void
1064 mask_addr()
1065 {
1066 	int olen = so_mask.sa.sa_len;
1067 	register char *cp1 = olen + (char *)&so_mask, *cp2;
1068 
1069 	for (so_mask.sa.sa_len = 0; cp1 > (char *)&so_mask; )
1070 		if (*--cp1 != 0) {
1071 			so_mask.sa.sa_len = 1 + cp1 - (char *)&so_mask;
1072 			break;
1073 		}
1074 	if ((rtm_addrs & RTA_DST) == 0)
1075 		return;
1076 	switch (so_dst.sa.sa_family) {
1077 	case AF_NS:
1078 	case AF_INET:
1079 	case AF_CCITT:
1080 	case 0:
1081 		return;
1082 	case AF_ISO:
1083 		olen = MIN(so_dst.siso.siso_nlen,
1084 			   MAX(so_mask.sa.sa_len - 6, 0));
1085 		break;
1086 	}
1087 	cp1 = so_mask.sa.sa_len + 1 + (char *)&so_dst;
1088 	cp2 = so_dst.sa.sa_len + 1 + (char *)&so_dst;
1089 	while (cp2 > cp1)
1090 		*--cp2 = 0;
1091 	cp2 = so_mask.sa.sa_len + 1 + (char *)&so_mask;
1092 	while (cp1 > so_dst.sa.sa_data)
1093 		*--cp1 &= *--cp2;
1094 	switch (so_dst.sa.sa_family) {
1095 	case AF_ISO:
1096 		so_dst.siso.siso_nlen = olen;
1097 		break;
1098 	}
1099 }
1100 
1101 char *msgtypes[] = {
1102 	"",
1103 	"RTM_ADD: Add Route",
1104 	"RTM_DELETE: Delete Route",
1105 	"RTM_CHANGE: Change Metrics or flags",
1106 	"RTM_GET: Report Metrics",
1107 	"RTM_LOSING: Kernel Suspects Partitioning",
1108 	"RTM_REDIRECT: Told to use different route",
1109 	"RTM_MISS: Lookup failed on this address",
1110 	"RTM_LOCK: fix specified metrics",
1111 	"RTM_OLDADD: caused by SIOCADDRT",
1112 	"RTM_OLDDEL: caused by SIOCDELRT",
1113 	"RTM_RESOLVE: Route created by cloning",
1114 	"RTM_NEWADDR: address being added to iface",
1115 	"RTM_DELADDR: address being removed from iface",
1116 	"RTM_IFINFO: iface status change",
1117 	0,
1118 };
1119 
1120 char metricnames[] =
1121 "\011pksent\010rttvar\7rtt\6ssthresh\5sendpipe\4recvpipe\3expire\2hopcount\1mtu";
1122 char routeflags[] =
1123 "\1UP\2GATEWAY\3HOST\4REJECT\5DYNAMIC\6MODIFIED\7DONE\010MASK_PRESENT\011CLONING\012XRESOLVE\013LLINFO\014STATIC\017PROTO2\020PROTO1";
1124 char ifnetflags[] =
1125 "\1UP\2BROADCAST\3DEBUG\4LOOPBACK\5PTP\6NOTRAILERS\7RUNNING\010NOARP\011PPROMISC\012ALLMULTI\013OACTIVE\014SIMPLEX\015LINK0\016LINK1\017LINK2\020MULTICAST";
1126 char addrnames[] =
1127 "\1DST\2GATEWAY\3NETMASK\4GENMASK\5IFP\6IFA\7AUTHOR\010BRD";
1128 
1129 void
1130 print_rtmsg(rtm, msglen)
1131 	register struct rt_msghdr *rtm;
1132 	int msglen;
1133 {
1134 	struct if_msghdr *ifm;
1135 	struct ifa_msghdr *ifam;
1136 
1137 	if (verbose == 0)
1138 		return;
1139 	if (rtm->rtm_version != RTM_VERSION) {
1140 		(void) printf("routing message version %d not understood\n",
1141 		    rtm->rtm_version);
1142 		return;
1143 	}
1144 	(void)printf("%s: len %d, ", msgtypes[rtm->rtm_type], rtm->rtm_msglen);
1145 	switch (rtm->rtm_type) {
1146 	case RTM_IFINFO:
1147 		ifm = (struct if_msghdr *)rtm;
1148 		(void) printf("if# %d, flags:", ifm->ifm_index);
1149 		bprintf(stdout, ifm->ifm_flags, ifnetflags);
1150 		pmsg_addrs((char *)(ifm + 1), ifm->ifm_addrs);
1151 		break;
1152 	case RTM_NEWADDR:
1153 	case RTM_DELADDR:
1154 		ifam = (struct ifa_msghdr *)rtm;
1155 		(void) printf("metric %d, flags:", ifam->ifam_metric);
1156 		bprintf(stdout, ifam->ifam_flags, routeflags);
1157 		pmsg_addrs((char *)(ifam + 1), ifam->ifam_addrs);
1158 		break;
1159 	default:
1160 		(void) printf("pid: %d, seq %d, errno %d, flags:",
1161 			rtm->rtm_pid, rtm->rtm_seq, rtm->rtm_errno);
1162 		bprintf(stdout, rtm->rtm_flags, routeflags);
1163 		pmsg_common(rtm);
1164 	}
1165 }
1166 
1167 void
1168 print_getmsg(rtm, msglen)
1169 	register struct rt_msghdr *rtm;
1170 	int msglen;
1171 {
1172 	struct sockaddr *dst = NULL, *gate = NULL, *mask = NULL;
1173 	struct sockaddr_dl *ifp = NULL;
1174 	register struct sockaddr *sa;
1175 	register char *cp;
1176 	register int i;
1177 
1178 	(void) printf("   route to: %s\n", routename(&so_dst));
1179 	if (rtm->rtm_version != RTM_VERSION) {
1180 		(void)fprintf(stderr,
1181 		    "routing message version %d not understood\n",
1182 		    rtm->rtm_version);
1183 		return;
1184 	}
1185 	if (rtm->rtm_msglen > msglen) {
1186 		(void)fprintf(stderr,
1187 		    "message length mismatch, in packet %d, returned %d\n",
1188 		    rtm->rtm_msglen, msglen);
1189 	}
1190 	if (rtm->rtm_errno)  {
1191 		(void) fprintf(stderr, "RTM_GET: %s (errno %d)\n",
1192 		    strerror(rtm->rtm_errno), rtm->rtm_errno);
1193 		return;
1194 	}
1195 	cp = ((char *)(rtm + 1));
1196 	if (rtm->rtm_addrs)
1197 		for (i = 1; i; i <<= 1)
1198 			if (i & rtm->rtm_addrs) {
1199 				sa = (struct sockaddr *)cp;
1200 				switch (i) {
1201 				case RTA_DST:
1202 					dst = sa;
1203 					break;
1204 				case RTA_GATEWAY:
1205 					gate = sa;
1206 					break;
1207 				case RTA_NETMASK:
1208 					mask = sa;
1209 					break;
1210 				case RTA_IFP:
1211 					if (sa->sa_family == AF_LINK &&
1212 					   ((struct sockaddr_dl *)sa)->sdl_nlen)
1213 						ifp = (struct sockaddr_dl *)sa;
1214 					break;
1215 				}
1216 				ADVANCE(cp, sa);
1217 			}
1218 	if (dst && mask)
1219 		mask->sa_family = dst->sa_family;	/* XXX */
1220 	if (dst)
1221 		(void)printf("destination: %s\n", routename(dst));
1222 	if (mask) {
1223 		int savenflag = nflag;
1224 
1225 		nflag = 1;
1226 		(void)printf("       mask: %s\n", routename(mask));
1227 		nflag = savenflag;
1228 	}
1229 	if (gate && rtm->rtm_flags & RTF_GATEWAY)
1230 		(void)printf("    gateway: %s\n", routename(gate));
1231 	if (ifp)
1232 		(void)printf("  interface: %.*s\n",
1233 		    ifp->sdl_nlen, ifp->sdl_data);
1234 	(void)printf("      flags: ");
1235 	bprintf(stdout, rtm->rtm_flags, routeflags);
1236 
1237 #define lock(f)	((rtm->rtm_rmx.rmx_locks & __CONCAT(RTV_,f)) ? 'L' : ' ')
1238 #define msec(u)	(((u) + 500) / 1000)		/* usec to msec */
1239 
1240 	(void) printf("\n%s\n", "\
1241  recvpipe  sendpipe  ssthresh  rtt,msec    rttvar  hopcount      mtu     expire");
1242 	printf("%8d%c ", rtm->rtm_rmx.rmx_recvpipe, lock(RPIPE));
1243 	printf("%8d%c ", rtm->rtm_rmx.rmx_sendpipe, lock(SPIPE));
1244 	printf("%8d%c ", rtm->rtm_rmx.rmx_ssthresh, lock(SSTHRESH));
1245 	printf("%8d%c ", msec(rtm->rtm_rmx.rmx_rtt), lock(RTT));
1246 	printf("%8d%c ", msec(rtm->rtm_rmx.rmx_rttvar), lock(RTTVAR));
1247 	printf("%8d%c ", rtm->rtm_rmx.rmx_hopcount, lock(HOPCOUNT));
1248 	printf("%8d%c ", rtm->rtm_rmx.rmx_mtu, lock(MTU));
1249 	if (rtm->rtm_rmx.rmx_expire)
1250 		rtm->rtm_rmx.rmx_expire -= time(0);
1251 	printf("%8d%c\n", rtm->rtm_rmx.rmx_expire, lock(EXPIRE));
1252 #undef lock
1253 #undef msec
1254 #define	RTA_IGN	(RTA_DST|RTA_GATEWAY|RTA_NETMASK|RTA_IFP|RTA_IFA|RTA_BRD)
1255 	if (verbose)
1256 		pmsg_common(rtm);
1257 	else if (rtm->rtm_addrs &~ RTA_IGN) {
1258 		(void) printf("sockaddrs: ");
1259 		bprintf(stdout, rtm->rtm_addrs, addrnames);
1260 		putchar('\n');
1261 	}
1262 #undef	RTA_IGN
1263 }
1264 
1265 void
1266 pmsg_common(rtm)
1267 	register struct rt_msghdr *rtm;
1268 {
1269 	(void) printf("\nlocks: ");
1270 	bprintf(stdout, rtm->rtm_rmx.rmx_locks, metricnames);
1271 	(void) printf(" inits: ");
1272 	bprintf(stdout, rtm->rtm_inits, metricnames);
1273 	pmsg_addrs(((char *)(rtm + 1)), rtm->rtm_addrs);
1274 }
1275 
1276 void
1277 pmsg_addrs(cp, addrs)
1278 	char	*cp;
1279 	int	addrs;
1280 {
1281 	register struct sockaddr *sa;
1282 	int i;
1283 
1284 	if (addrs == 0)
1285 		return;
1286 	(void) printf("\nsockaddrs: ");
1287 	bprintf(stdout, addrs, addrnames);
1288 	(void) putchar('\n');
1289 	for (i = 1; i; i <<= 1)
1290 		if (i & addrs) {
1291 			sa = (struct sockaddr *)cp;
1292 			(void) printf(" %s", routename(sa));
1293 			ADVANCE(cp, sa);
1294 		}
1295 	(void) putchar('\n');
1296 	(void) fflush(stdout);
1297 }
1298 
1299 void
1300 bprintf(fp, b, s)
1301 	register FILE *fp;
1302 	register int b;
1303 	register u_char *s;
1304 {
1305 	register int i;
1306 	int gotsome = 0;
1307 
1308 	if (b == 0)
1309 		return;
1310 	while (i = *s++) {
1311 		if (b & (1 << (i-1))) {
1312 			if (gotsome == 0)
1313 				i = '<';
1314 			else
1315 				i = ',';
1316 			(void) putc(i, fp);
1317 			gotsome = 1;
1318 			for (; (i = *s) > 32; s++)
1319 				(void) putc(i, fp);
1320 		} else
1321 			while (*s > 32)
1322 				s++;
1323 	}
1324 	if (gotsome)
1325 		(void) putc('>', fp);
1326 }
1327 
1328 int
1329 keyword(cp)
1330 	char *cp;
1331 {
1332 	register struct keytab *kt = keywords;
1333 
1334 	while (kt->kt_cp && strcmp(kt->kt_cp, cp))
1335 		kt++;
1336 	return kt->kt_i;
1337 }
1338 
1339 void
1340 sodump(su, which)
1341 	register sup su;
1342 	char *which;
1343 {
1344 	switch (su->sa.sa_family) {
1345 	case AF_LINK:
1346 		(void) printf("%s: link %s; ",
1347 		    which, link_ntoa(&su->sdl));
1348 		break;
1349 	case AF_ISO:
1350 		(void) printf("%s: iso %s; ",
1351 		    which, iso_ntoa(&su->siso.siso_addr));
1352 		break;
1353 	case AF_INET:
1354 		(void) printf("%s: inet %s; ",
1355 		    which, inet_ntoa(su->sin.sin_addr));
1356 		break;
1357 	case AF_NS:
1358 		(void) printf("%s: xns %s; ",
1359 		    which, ns_ntoa(su->sns.sns_addr));
1360 		break;
1361 	}
1362 	(void) fflush(stdout);
1363 }
1364 
1365 /* States*/
1366 #define VIRGIN	0
1367 #define GOTONE	1
1368 #define GOTTWO	2
1369 /* Inputs */
1370 #define	DIGIT	(4*0)
1371 #define	END	(4*1)
1372 #define DELIM	(4*2)
1373 
1374 void
1375 sockaddr(addr, sa)
1376 	register char *addr;
1377 	register struct sockaddr *sa;
1378 {
1379 	register char *cp = (char *)sa;
1380 	int size = sa->sa_len;
1381 	char *cplim = cp + size;
1382 	register int byte = 0, state = VIRGIN, new;
1383 
1384 	bzero(cp, size);
1385 	cp++;
1386 	do {
1387 		if ((*addr >= '0') && (*addr <= '9')) {
1388 			new = *addr - '0';
1389 		} else if ((*addr >= 'a') && (*addr <= 'f')) {
1390 			new = *addr - 'a' + 10;
1391 		} else if ((*addr >= 'A') && (*addr <= 'F')) {
1392 			new = *addr - 'A' + 10;
1393 		} else if (*addr == 0)
1394 			state |= END;
1395 		else
1396 			state |= DELIM;
1397 		addr++;
1398 		switch (state /* | INPUT */) {
1399 		case GOTTWO | DIGIT:
1400 			*cp++ = byte; /*FALLTHROUGH*/
1401 		case VIRGIN | DIGIT:
1402 			state = GOTONE; byte = new; continue;
1403 		case GOTONE | DIGIT:
1404 			state = GOTTWO; byte = new + (byte << 4); continue;
1405 		default: /* | DELIM */
1406 			state = VIRGIN; *cp++ = byte; byte = 0; continue;
1407 		case GOTONE | END:
1408 		case GOTTWO | END:
1409 			*cp++ = byte; /* FALLTHROUGH */
1410 		case VIRGIN | END:
1411 			break;
1412 		}
1413 		break;
1414 	} while (cp < cplim);
1415 	sa->sa_len = cp - (char *)sa;
1416 }
1417