xref: /freebsd/sbin/route/route.c (revision afe61c15161c324a7af299a9b8457aba5afc92db)
1 /*
2  *
3  * Copyright (c) 1983, 1989, 1991, 1993
4  *	The Regents of the University of California.  All rights reserved.
5  *
6  * Redistribution and use in source and binary forms, with or without
7  * modification, are permitted provided that the following conditions
8  * are met:
9  * 1. Redistributions of source code must retain the above copyright
10  *    notice, this list of conditions and the following disclaimer.
11  * 2. Redistributions in binary form must reproduce the above copyright
12  *    notice, this list of conditions and the following disclaimer in the
13  *    documentation and/or other materials provided with the distribution.
14  * 3. All advertising materials mentioning features or use of this software
15  *    must display the following acknowledgement:
16  *	This product includes software developed by the University of
17  *	California, Berkeley and its contributors.
18  * 4. Neither the name of the University nor the names of its contributors
19  *    may be used to endorse or promote products derived from this software
20  *    without specific prior written permission.
21  *
22  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
23  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
24  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
25  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
26  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
27  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
28  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
29  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
30  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
31  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
32  * SUCH DAMAGE.
33  */
34 
35 #ifndef lint
36 static char copyright[] =
37 "@(#) Copyright (c) 1983, 1989, 1991, 1993\n\
38 	The Regents of the University of California.  All rights reserved.\n";
39 #endif /* not lint */
40 
41 #ifndef lint
42 static char sccsid[] = "@(#)route.c	8.3 (Berkeley) 3/19/94";
43 #endif /* not lint */
44 
45 #include <sys/param.h>
46 #include <sys/file.h>
47 #include <sys/socket.h>
48 #include <sys/ioctl.h>
49 #include <sys/mbuf.h>
50 #include <sys/sysctl.h>
51 
52 #include <net/if.h>
53 #include <net/route.h>
54 #include <net/if_dl.h>
55 #include <netinet/in.h>
56 #include <netns/ns.h>
57 #include <netiso/iso.h>
58 #include <netccitt/x25.h>
59 #include <arpa/inet.h>
60 #include <netdb.h>
61 
62 #include <errno.h>
63 #include <unistd.h>
64 #include <stdio.h>
65 #include <ctype.h>
66 #include <stdlib.h>
67 #include <string.h>
68 #include <paths.h>
69 
70 struct keytab {
71 	char	*kt_cp;
72 	int	kt_i;
73 } keywords[] = {
74 #include "keywords.h"
75 	{0, 0}
76 };
77 
78 struct	ortentry route;
79 union	sockunion {
80 	struct	sockaddr sa;
81 	struct	sockaddr_in sin;
82 	struct	sockaddr_ns sns;
83 	struct	sockaddr_iso siso;
84 	struct	sockaddr_dl sdl;
85 	struct	sockaddr_x25 sx25;
86 } so_dst, so_gate, so_mask, so_genmask, so_ifa, so_ifp;
87 
88 typedef union sockunion *sup;
89 int	pid, rtm_addrs, uid;
90 int	s;
91 int	forcehost, forcenet, doflush, nflag, af, qflag, tflag, keyword();
92 int	iflag, verbose, aflen = sizeof (struct sockaddr_in);
93 int	locking, lockrest, debugonly;
94 struct	rt_metrics rt_metrics;
95 u_long  rtm_inits;
96 struct	in_addr inet_makeaddr();
97 char	*routename(), *netname();
98 void	flushroutes(), newroute(), monitor(), sockaddr(), sodump(), bprintf();
99 void	print_getmsg(), print_rtmsg(), pmsg_common(), pmsg_addrs(), mask_addr();
100 int	getaddr(), rtmsg(), x25_makemask();
101 extern	char *inet_ntoa(), *iso_ntoa(), *link_ntoa();
102 
103 __dead void
104 usage(cp)
105 	char *cp;
106 {
107 	if (cp)
108 		(void) fprintf(stderr, "route: botched keyword: %s\n", cp);
109 	(void) fprintf(stderr,
110 	    "usage: route [ -nqv ] cmd [[ -<qualifers> ] args ]\n");
111 	exit(1);
112 	/* NOTREACHED */
113 }
114 
115 void
116 quit(s)
117 	char *s;
118 {
119 	int sverrno = errno;
120 
121 	(void) fprintf(stderr, "route: ");
122 	if (s)
123 		(void) fprintf(stderr, "%s: ", s);
124 	(void) fprintf(stderr, "%s\n", strerror(sverrno));
125 	exit(1);
126 	/* NOTREACHED */
127 }
128 
129 #define ROUNDUP(a) \
130 	((a) > 0 ? (1 + (((a) - 1) | (sizeof(long) - 1))) : sizeof(long))
131 #define ADVANCE(x, n) (x += ROUNDUP((n)->sa_len))
132 
133 int
134 main(argc, argv)
135 	int argc;
136 	char **argv;
137 {
138 	extern int optind;
139 	int ch;
140 
141 	if (argc < 2)
142 		usage((char *)NULL);
143 
144 	while ((ch = getopt(argc, argv, "nqdtv")) != EOF)
145 		switch(ch) {
146 		case 'n':
147 			nflag = 1;
148 			break;
149 		case 'q':
150 			qflag = 1;
151 			break;
152 		case 'v':
153 			verbose = 1;
154 			break;
155 		case 't':
156 			tflag = 1;
157 			break;
158 		case 'd':
159 			debugonly = 1;
160 			break;
161 		case '?':
162 		default:
163 			usage((char *)NULL);
164 		}
165 	argc -= optind;
166 	argv += optind;
167 
168 	pid = getpid();
169 	uid = getuid();
170 	if (tflag)
171 		s = open("/dev/null", O_WRONLY, 0);
172 	else
173 		s = socket(PF_ROUTE, SOCK_RAW, 0);
174 	if (s < 0)
175 		quit("socket");
176 	if (*argv)
177 		switch (keyword(*argv)) {
178 		case K_GET:
179 			uid = 0;
180 			/* FALLTHROUGH */
181 
182 		case K_CHANGE:
183 		case K_ADD:
184 		case K_DELETE:
185 			newroute(argc, argv);
186 			exit(0);
187 			/* NOTREACHED */
188 
189 		case K_MONITOR:
190 			monitor();
191 			/* NOTREACHED */
192 
193 		case K_FLUSH:
194 			flushroutes(argc, argv);
195 			exit(0);
196 			/* NOTREACHED */
197 		}
198 	usage(*argv);
199 	/* NOTREACHED */
200 }
201 
202 /*
203  * Purge all entries in the routing tables not
204  * associated with network interfaces.
205  */
206 void
207 flushroutes(argc, argv)
208 	int argc;
209 	char *argv[];
210 {
211 	size_t needed;
212 	int mib[6], rlen, seqno;
213 	char *buf, *next, *lim;
214 	register struct rt_msghdr *rtm;
215 
216 	if (uid) {
217 		errno = EACCES;
218 		quit("must be root to alter routing table");
219 	}
220 	shutdown(s, 0); /* Don't want to read back our messages */
221 	if (argc > 1) {
222 		argv++;
223 		if (argc == 2 && **argv == '-')
224 		    switch (keyword(*argv + 1)) {
225 			case K_INET:
226 				af = AF_INET;
227 				break;
228 			case K_XNS:
229 				af = AF_NS;
230 				break;
231 			case K_LINK:
232 				af = AF_LINK;
233 				break;
234 			case K_ISO:
235 			case K_OSI:
236 				af = AF_ISO;
237 				break;
238 			case K_X25:
239 				af = AF_CCITT;
240 			default:
241 				goto bad;
242 		} else
243 bad:			usage(*argv);
244 	}
245 	mib[0] = CTL_NET;
246 	mib[1] = PF_ROUTE;
247 	mib[2] = 0;		/* protocol */
248 	mib[3] = 0;		/* wildcard address family */
249 	mib[4] = NET_RT_DUMP;
250 	mib[5] = 0;		/* no flags */
251 	if (sysctl(mib, 6, NULL, &needed, NULL, 0) < 0)
252 		quit("route-sysctl-estimate");
253 	if ((buf = malloc(needed)) == NULL)
254 		quit("malloc");
255 	if (sysctl(mib, 6, buf, &needed, NULL, 0) < 0)
256 		quit("actual retrieval of routing table");
257 	lim = buf + needed;
258 	if (verbose)
259 		(void) printf("Examining routing table from sysctl\n");
260 	seqno = 0;		/* ??? */
261 	for (next = buf; next < lim; next += rtm->rtm_msglen) {
262 		rtm = (struct rt_msghdr *)next;
263 		if (verbose)
264 			print_rtmsg(rtm, rtm->rtm_msglen);
265 		if ((rtm->rtm_flags & RTF_GATEWAY) == 0)
266 			continue;
267 		if (af) {
268 			struct sockaddr *sa = (struct sockaddr *)(rtm + 1);
269 
270 			if (sa->sa_family != af)
271 				continue;
272 		}
273 		if (debugonly)
274 			continue;
275 		rtm->rtm_type = RTM_DELETE;
276 		rtm->rtm_seq = seqno;
277 		rlen = write(s, next, rtm->rtm_msglen);
278 		if (rlen < (int)rtm->rtm_msglen) {
279 			(void) fprintf(stderr,
280 			    "route: write to routing socket: %s\n",
281 			    strerror(errno));
282 			(void) printf("got only %d for rlen\n", rlen);
283 			break;
284 		}
285 		seqno++;
286 		if (qflag)
287 			continue;
288 		if (verbose)
289 			print_rtmsg(rtm, rlen);
290 		else {
291 			struct sockaddr *sa = (struct sockaddr *)(rtm + 1);
292 			(void) printf("%-20.20s ", rtm->rtm_flags & RTF_HOST ?
293 			    routename(sa) : netname(sa));
294 			sa = (struct sockaddr *)(sa->sa_len + (char *)sa);
295 			(void) printf("%-20.20s ", routename(sa));
296 			(void) printf("done\n");
297 		}
298 	}
299 }
300 
301 char *
302 routename(sa)
303 	struct sockaddr *sa;
304 {
305 	register char *cp;
306 	static char line[50];
307 	struct hostent *hp;
308 	static char domain[MAXHOSTNAMELEN + 1];
309 	static int first = 1;
310 	char *ns_print();
311 
312 	if (first) {
313 		first = 0;
314 		if (gethostname(domain, MAXHOSTNAMELEN) == 0 &&
315 		    (cp = index(domain, '.')))
316 			(void) strcpy(domain, cp + 1);
317 		else
318 			domain[0] = 0;
319 	}
320 
321 	if (sa->sa_len == 0)
322 		strcpy(line, "default");
323 	else switch (sa->sa_family) {
324 
325 	case AF_INET:
326 	    {	struct in_addr in;
327 		in = ((struct sockaddr_in *)sa)->sin_addr;
328 
329 		cp = 0;
330 		if (in.s_addr == INADDR_ANY || sa->sa_len < 4)
331 			cp = "default";
332 		if (cp == 0 && !nflag) {
333 			hp = gethostbyaddr((char *)&in, sizeof (struct in_addr),
334 				AF_INET);
335 			if (hp) {
336 				if ((cp = index(hp->h_name, '.')) &&
337 				    !strcmp(cp + 1, domain))
338 					*cp = 0;
339 				cp = hp->h_name;
340 			}
341 		}
342 		if (cp)
343 			strcpy(line, cp);
344 		else {
345 #define C(x)	((x) & 0xff)
346 			in.s_addr = ntohl(in.s_addr);
347 			(void) sprintf(line, "%u.%u.%u.%u", C(in.s_addr >> 24),
348 			   C(in.s_addr >> 16), C(in.s_addr >> 8), C(in.s_addr));
349 		}
350 		break;
351 	    }
352 
353 	case AF_NS:
354 		return (ns_print((struct sockaddr_ns *)sa));
355 
356 	case AF_LINK:
357 		return (link_ntoa((struct sockaddr_dl *)sa));
358 
359 	case AF_ISO:
360 		(void) sprintf(line, "iso %s",
361 		    iso_ntoa(&((struct sockaddr_iso *)sa)->siso_addr));
362 		break;
363 
364 	default:
365 	    {	u_short *s = (u_short *)sa;
366 		u_short *slim = s + ((sa->sa_len + 1) >> 1);
367 		char *cp = line + sprintf(line, "(%d)", sa->sa_family);
368 
369 		while (++s < slim) /* start with sa->sa_data */
370 			cp += sprintf(cp, " %x", *s);
371 		break;
372 	    }
373 	}
374 	return (line);
375 }
376 
377 /*
378  * Return the name of the network whose address is given.
379  * The address is assumed to be that of a net or subnet, not a host.
380  */
381 char *
382 netname(sa)
383 	struct sockaddr *sa;
384 {
385 	char *cp = 0;
386 	static char line[50];
387 	struct netent *np = 0;
388 	u_long net, mask;
389 	register u_long i;
390 	int subnetshift;
391 	char *ns_print();
392 
393 	switch (sa->sa_family) {
394 
395 	case AF_INET:
396 	    {	struct in_addr in;
397 		in = ((struct sockaddr_in *)sa)->sin_addr;
398 
399 		i = in.s_addr = ntohl(in.s_addr);
400 		if (in.s_addr == 0)
401 			cp = "default";
402 		else if (!nflag) {
403 			if (IN_CLASSA(i)) {
404 				mask = IN_CLASSA_NET;
405 				subnetshift = 8;
406 			} else if (IN_CLASSB(i)) {
407 				mask = IN_CLASSB_NET;
408 				subnetshift = 8;
409 			} else {
410 				mask = IN_CLASSC_NET;
411 				subnetshift = 4;
412 			}
413 			/*
414 			 * If there are more bits than the standard mask
415 			 * would suggest, subnets must be in use.
416 			 * Guess at the subnet mask, assuming reasonable
417 			 * width subnet fields.
418 			 */
419 			while (in.s_addr &~ mask)
420 				mask = (long)mask >> subnetshift;
421 			net = in.s_addr & mask;
422 			while ((mask & 1) == 0)
423 				mask >>= 1, net >>= 1;
424 			np = getnetbyaddr(net, AF_INET);
425 			if (np)
426 				cp = np->n_name;
427 		}
428 		if (cp)
429 			strcpy(line, cp);
430 		else if ((in.s_addr & 0xffffff) == 0)
431 			(void) sprintf(line, "%u", C(in.s_addr >> 24));
432 		else if ((in.s_addr & 0xffff) == 0)
433 			(void) sprintf(line, "%u.%u", C(in.s_addr >> 24),
434 			    C(in.s_addr >> 16));
435 		else if ((in.s_addr & 0xff) == 0)
436 			(void) sprintf(line, "%u.%u.%u", C(in.s_addr >> 24),
437 			    C(in.s_addr >> 16), C(in.s_addr >> 8));
438 		else
439 			(void) sprintf(line, "%u.%u.%u.%u", C(in.s_addr >> 24),
440 			    C(in.s_addr >> 16), C(in.s_addr >> 8),
441 			    C(in.s_addr));
442 		break;
443 	    }
444 
445 	case AF_NS:
446 		return (ns_print((struct sockaddr_ns *)sa));
447 		break;
448 
449 	case AF_LINK:
450 		return (link_ntoa((struct sockaddr_dl *)sa));
451 
452 	case AF_ISO:
453 		(void) sprintf(line, "iso %s",
454 		    iso_ntoa(&((struct sockaddr_iso *)sa)->siso_addr));
455 		break;
456 
457 	default:
458 	    {	u_short *s = (u_short *)sa->sa_data;
459 		u_short *slim = s + ((sa->sa_len + 1)>>1);
460 		char *cp = line + sprintf(line, "af %d:", sa->sa_family);
461 
462 		while (s < slim)
463 			cp += sprintf(cp, " %x", *s++);
464 		break;
465 	    }
466 	}
467 	return (line);
468 }
469 
470 void
471 set_metric(value, key)
472 	char *value;
473 	int key;
474 {
475 	int flag = 0;
476 	u_long noval, *valp = &noval;
477 
478 	switch (key) {
479 #define caseof(x, y, z)	case x: valp = &rt_metrics.z; flag = y; break
480 	caseof(K_MTU, RTV_MTU, rmx_mtu);
481 	caseof(K_HOPCOUNT, RTV_HOPCOUNT, rmx_hopcount);
482 	caseof(K_EXPIRE, RTV_EXPIRE, rmx_expire);
483 	caseof(K_RECVPIPE, RTV_RPIPE, rmx_recvpipe);
484 	caseof(K_SENDPIPE, RTV_SPIPE, rmx_sendpipe);
485 	caseof(K_SSTHRESH, RTV_SSTHRESH, rmx_ssthresh);
486 	caseof(K_RTT, RTV_RTT, rmx_rtt);
487 	caseof(K_RTTVAR, RTV_RTTVAR, rmx_rttvar);
488 	}
489 	rtm_inits |= flag;
490 	if (lockrest || locking)
491 		rt_metrics.rmx_locks |= flag;
492 	if (locking)
493 		locking = 0;
494 	*valp = atoi(value);
495 }
496 
497 void
498 newroute(argc, argv)
499 	int argc;
500 	register char **argv;
501 {
502 	char *cmd, *dest = "", *gateway = "", *err;
503 	int ishost = 0, ret, attempts, oerrno, flags = RTF_STATIC;
504 	int key;
505 	struct hostent *hp = 0;
506 
507 	if (uid) {
508 		errno = EACCES;
509 		quit("must be root to alter routing table");
510 	}
511 	cmd = argv[0];
512 	if (*cmd != 'g')
513 		shutdown(s, 0); /* Don't want to read back our messages */
514 	while (--argc > 0) {
515 		if (**(++argv)== '-') {
516 			switch (key = keyword(1 + *argv)) {
517 			case K_LINK:
518 				af = AF_LINK;
519 				aflen = sizeof(struct sockaddr_dl);
520 				break;
521 			case K_OSI:
522 			case K_ISO:
523 				af = AF_ISO;
524 				aflen = sizeof(struct sockaddr_iso);
525 				break;
526 			case K_INET:
527 				af = AF_INET;
528 				aflen = sizeof(struct sockaddr_in);
529 				break;
530 			case K_X25:
531 				af = AF_CCITT;
532 				aflen = sizeof(struct sockaddr_x25);
533 				break;
534 			case K_SA:
535 				af = PF_ROUTE;
536 				aflen = sizeof(union sockunion);
537 				break;
538 			case K_XNS:
539 				af = AF_NS;
540 				aflen = sizeof(struct sockaddr_ns);
541 				break;
542 			case K_IFACE:
543 			case K_INTERFACE:
544 				iflag++;
545 			case K_NOSTATIC:
546 				flags &= ~RTF_STATIC;
547 				break;
548 			case K_LOCK:
549 				locking = 1;
550 				break;
551 			case K_LOCKREST:
552 				lockrest = 1;
553 				break;
554 			case K_HOST:
555 				forcehost++;
556 				break;
557 			case K_REJECT:
558 				flags |= RTF_REJECT;
559 				break;
560 			case K_BLACKHOLE:
561 				flags |= RTF_BLACKHOLE;
562 				break;
563 			case K_PROTO1:
564 				flags |= RTF_PROTO1;
565 				break;
566 			case K_PROTO2:
567 				flags |= RTF_PROTO2;
568 				break;
569 			case K_CLONING:
570 				flags |= RTF_CLONING;
571 				break;
572 			case K_XRESOLVE:
573 				flags |= RTF_XRESOLVE;
574 				break;
575 			case K_STATIC:
576 				flags |= RTF_STATIC;
577 				break;
578 			case K_IFA:
579 				argc--;
580 				(void) getaddr(RTA_IFA, *++argv, 0);
581 				break;
582 			case K_IFP:
583 				argc--;
584 				(void) getaddr(RTA_IFP, *++argv, 0);
585 				break;
586 			case K_GENMASK:
587 				argc--;
588 				(void) getaddr(RTA_GENMASK, *++argv, 0);
589 				break;
590 			case K_GATEWAY:
591 				argc--;
592 				(void) getaddr(RTA_GATEWAY, *++argv, 0);
593 				break;
594 			case K_DST:
595 				argc--;
596 				ishost = getaddr(RTA_DST, *++argv, &hp);
597 				dest = *argv;
598 				break;
599 			case K_NETMASK:
600 				argc--;
601 				(void) getaddr(RTA_NETMASK, *++argv, 0);
602 				/* FALLTHROUGH */
603 			case K_NET:
604 				forcenet++;
605 				break;
606 			case K_MTU:
607 			case K_HOPCOUNT:
608 			case K_EXPIRE:
609 			case K_RECVPIPE:
610 			case K_SENDPIPE:
611 			case K_SSTHRESH:
612 			case K_RTT:
613 			case K_RTTVAR:
614 				argc--;
615 				set_metric(*++argv, key);
616 				break;
617 			default:
618 				usage(1+*argv);
619 			}
620 		} else {
621 			if ((rtm_addrs & RTA_DST) == 0) {
622 				dest = *argv;
623 				ishost = getaddr(RTA_DST, *argv, &hp);
624 			} else if ((rtm_addrs & RTA_GATEWAY) == 0) {
625 				gateway = *argv;
626 				(void) getaddr(RTA_GATEWAY, *argv, &hp);
627 			} else {
628 				int ret = atoi(*argv);
629 
630 				if (ret == 0) {
631 				    if (strcmp(*argv, "0") == 0)
632 				        printf("%s,%s",
633 					    "old usage of trailing 0",
634 					    "assuming route to if\n");
635 				    else
636 					usage((char *)NULL);
637 				    iflag = 1;
638 				    continue;
639 				} else if (ret > 0 && ret < 10) {
640 				    printf("old usage of trailing digit, ");
641 				    printf("assuming route via gateway\n");
642 				    iflag = 0;
643 				    continue;
644 				}
645 				(void) getaddr(RTA_NETMASK, *argv, 0);
646 			}
647 		}
648 	}
649 	if (forcehost)
650 		ishost = 1;
651 	if (forcenet)
652 		ishost = 0;
653 	flags |= RTF_UP;
654 	if (ishost)
655 		flags |= RTF_HOST;
656 	if (iflag == 0)
657 		flags |= RTF_GATEWAY;
658 	for (attempts = 1; ; attempts++) {
659 		errno = 0;
660 		if ((ret = rtmsg(*cmd, flags)) == 0)
661 			break;
662 		if (errno != ENETUNREACH && errno != ESRCH)
663 			break;
664 		if (af == AF_INET && *gateway && hp && hp->h_addr_list[1]) {
665 			hp->h_addr_list++;
666 			bcopy(hp->h_addr_list[0], &so_gate.sin.sin_addr,
667 			    hp->h_length);
668 		} else
669 			break;
670 	}
671 	if (*cmd == 'g')
672 		exit(0);
673 	oerrno = errno;
674 	(void) printf("%s %s %s", cmd, ishost? "host" : "net", dest);
675 	if (*gateway) {
676 		(void) printf(": gateway %s", gateway);
677 		if (attempts > 1 && ret == 0 && af == AF_INET)
678 		    (void) printf(" (%s)",
679 			inet_ntoa(((struct sockaddr_in *)&route.rt_gateway)->sin_addr));
680 	}
681 	if (ret == 0)
682 		(void) printf("\n");
683 	else {
684 		switch (oerrno) {
685 		case ESRCH:
686 			err = "not in table";
687 			break;
688 		case EBUSY:
689 			err = "entry in use";
690 			break;
691 		case ENOBUFS:
692 			err = "routing table overflow";
693 			break;
694 		default:
695 			err = strerror(oerrno);
696 			break;
697 		}
698 		(void) printf(": %s\n", err);
699 	}
700 }
701 
702 void
703 inet_makenetandmask(net, sin)
704 	u_long net;
705 	register struct sockaddr_in *sin;
706 {
707 	u_long addr, mask = 0;
708 	register char *cp;
709 
710 	rtm_addrs |= RTA_NETMASK;
711 	if (net == 0)
712 		mask = addr = 0;
713 	else if (net < 128) {
714 		addr = net << IN_CLASSA_NSHIFT;
715 		mask = IN_CLASSA_NET;
716 	} else if (net < 65536) {
717 		addr = net << IN_CLASSB_NSHIFT;
718 		mask = IN_CLASSB_NET;
719 	} else if (net < 16777216L) {
720 		addr = net << IN_CLASSC_NSHIFT;
721 		mask = IN_CLASSC_NET;
722 	} else {
723 		addr = net;
724 		if ((addr & IN_CLASSA_HOST) == 0)
725 			mask =  IN_CLASSA_NET;
726 		else if ((addr & IN_CLASSB_HOST) == 0)
727 			mask =  IN_CLASSB_NET;
728 		else if ((addr & IN_CLASSC_HOST) == 0)
729 			mask =  IN_CLASSC_NET;
730 		else
731 			mask = -1;
732 	}
733 	sin->sin_addr.s_addr = htonl(addr);
734 	sin = &so_mask.sin;
735 	sin->sin_addr.s_addr = htonl(mask);
736 	sin->sin_len = 0;
737 	sin->sin_family = 0;
738 	cp = (char *)(&sin->sin_addr + 1);
739 	while (*--cp == 0 && cp > (char *)sin)
740 		;
741 	sin->sin_len = 1 + cp - (char *)sin;
742 }
743 
744 /*
745  * Interpret an argument as a network address of some kind,
746  * returning 1 if a host address, 0 if a network address.
747  */
748 int
749 getaddr(which, s, hpp)
750 	int which;
751 	char *s;
752 	struct hostent **hpp;
753 {
754 	register sup su;
755 	struct ns_addr ns_addr();
756 	struct iso_addr *iso_addr();
757 	struct hostent *hp;
758 	struct netent *np;
759 	u_long val;
760 
761 	if (af == 0) {
762 		af = AF_INET;
763 		aflen = sizeof(struct sockaddr_in);
764 	}
765 	rtm_addrs |= which;
766 	switch (which) {
767 	case RTA_DST:
768 		su = &so_dst;
769 		su->sa.sa_family = af;
770 		break;
771 	case RTA_GATEWAY:
772 		su = &so_gate;
773 		su->sa.sa_family = af;
774 		break;
775 	case RTA_NETMASK:
776 		su = &so_mask;
777 		break;
778 	case RTA_GENMASK:
779 		su = &so_genmask;
780 		break;
781 	case RTA_IFP:
782 		su = &so_ifp;
783 		su->sa.sa_family = af;
784 		break;
785 	case RTA_IFA:
786 		su = &so_ifa;
787 		su->sa.sa_family = af;
788 		break;
789 	default:
790 		usage("Internal Error");
791 		/*NOTREACHED*/
792 	}
793 	su->sa.sa_len = aflen;
794 	if (strcmp(s, "default") == 0) {
795 		switch (which) {
796 		case RTA_DST:
797 			forcenet++;
798 			(void) getaddr(RTA_NETMASK, s, 0);
799 			break;
800 		case RTA_NETMASK:
801 		case RTA_GENMASK:
802 			su->sa.sa_len = 0;
803 		}
804 		return (0);
805 	}
806 	switch (af) {
807 	case AF_NS:
808 		if (which == RTA_DST) {
809 			extern short ns_bh[3];
810 			struct sockaddr_ns *sms = &(so_mask.sns);
811 			bzero((char *)sms, sizeof(*sms));
812 			sms->sns_family = 0;
813 			sms->sns_len = 6;
814 			sms->sns_addr.x_net = *(union ns_net *)ns_bh;
815 			rtm_addrs |= RTA_NETMASK;
816 		}
817 		su->sns.sns_addr = ns_addr(s);
818 		return (!ns_nullhost(su->sns.sns_addr));
819 
820 	case AF_OSI:
821 		su->siso.siso_addr = *iso_addr(s);
822 		if (which == RTA_NETMASK || which == RTA_GENMASK) {
823 			register char *cp = (char *)TSEL(&su->siso);
824 			su->siso.siso_nlen = 0;
825 			do {--cp ;} while ((cp > (char *)su) && (*cp == 0));
826 			su->siso.siso_len = 1 + cp - (char *)su;
827 		}
828 		return (1);
829 
830 	case AF_LINK:
831 		link_addr(s, &su->sdl);
832 		return (1);
833 
834 	case AF_CCITT:
835 		ccitt_addr(s, &su->sx25);
836 		return (which == RTA_DST ? x25_makemask() : 1);
837 
838 	case PF_ROUTE:
839 		su->sa.sa_len = sizeof(*su);
840 		sockaddr(s, &su->sa);
841 		return (1);
842 
843 	case AF_INET:
844 	default:
845 		break;
846 	}
847 
848 	if (hpp == NULL)
849 		hpp = &hp;
850 	*hpp = NULL;
851 	if (((val = inet_addr(s)) != -1) &&
852 	    (which != RTA_DST || forcenet == 0)) {
853 		su->sin.sin_addr.s_addr = val;
854 		if (inet_lnaof(su->sin.sin_addr) != INADDR_ANY)
855 			return (1);
856 		else {
857 			val = ntohl(val);
858 			goto netdone;
859 		}
860 	}
861 	if ((val = inet_network(s)) != -1 ||
862 	    ((np = getnetbyname(s)) != NULL && (val = np->n_net) != 0)) {
863 netdone:
864 		if (which == RTA_DST)
865 			inet_makenetandmask(val, &su->sin);
866 		return (0);
867 	}
868 	hp = gethostbyname(s);
869 	if (hp) {
870 		*hpp = hp;
871 		su->sin.sin_family = hp->h_addrtype;
872 		bcopy(hp->h_addr, (char *)&su->sin.sin_addr, hp->h_length);
873 		return (1);
874 	}
875 	(void) fprintf(stderr, "%s: bad value\n", s);
876 	exit(1);
877 }
878 
879 int
880 x25_makemask()
881 {
882 	register char *cp;
883 
884 	if ((rtm_addrs & RTA_NETMASK) == 0) {
885 		rtm_addrs |= RTA_NETMASK;
886 		for (cp = (char *)&so_mask.sx25.x25_net;
887 		     cp < &so_mask.sx25.x25_opts.op_flags; cp++)
888 			*cp = -1;
889 		so_mask.sx25.x25_len = (u_char)&(((sup)0)->sx25.x25_opts);
890 	}
891 	return 0;
892 }
893 
894 short ns_nullh[] = {0,0,0};
895 short ns_bh[] = {-1,-1,-1};
896 
897 char *
898 ns_print(sns)
899 	struct sockaddr_ns *sns;
900 {
901 	struct ns_addr work;
902 	union { union ns_net net_e; u_long long_e; } net;
903 	u_short port;
904 	static char mybuf[50], cport[10], chost[25];
905 	char *host = "";
906 	register char *p;
907 	register u_char *q;
908 
909 	work = sns->sns_addr;
910 	port = ntohs(work.x_port);
911 	work.x_port = 0;
912 	net.net_e  = work.x_net;
913 	if (ns_nullhost(work) && net.long_e == 0) {
914 		if (!port)
915 			return ("*.*");
916 		(void) sprintf(mybuf, "*.%XH", port);
917 		return (mybuf);
918 	}
919 
920 	if (bcmp((char *)ns_bh, (char *)work.x_host.c_host, 6) == 0)
921 		host = "any";
922 	else if (bcmp((char *)ns_nullh, (char *)work.x_host.c_host, 6) == 0)
923 		host = "*";
924 	else {
925 		q = work.x_host.c_host;
926 		(void) sprintf(chost, "%02X%02X%02X%02X%02X%02XH",
927 			q[0], q[1], q[2], q[3], q[4], q[5]);
928 		for (p = chost; *p == '0' && p < chost + 12; p++)
929 			/* void */;
930 		host = p;
931 	}
932 	if (port)
933 		(void) sprintf(cport, ".%XH", htons(port));
934 	else
935 		*cport = 0;
936 
937 	(void) sprintf(mybuf,"%XH.%s%s", ntohl(net.long_e), host, cport);
938 	return (mybuf);
939 }
940 
941 void
942 interfaces()
943 {
944 	size_t needed;
945 	int mib[6];
946 	char *buf, *lim, *next;
947 	register struct rt_msghdr *rtm;
948 
949 	mib[0] = CTL_NET;
950 	mib[1] = PF_ROUTE;
951 	mib[2] = 0;		/* protocol */
952 	mib[3] = 0;		/* wildcard address family */
953 	mib[4] = NET_RT_IFLIST;
954 	mib[5] = 0;		/* no flags */
955 	if (sysctl(mib, 6, NULL, &needed, NULL, 0) < 0)
956 		quit("route-sysctl-estimate");
957 	if ((buf = malloc(needed)) == NULL)
958 		quit("malloc");
959 	if (sysctl(mib, 6, buf, &needed, NULL, 0) < 0)
960 		quit("actual retrieval of interface table");
961 	lim = buf + needed;
962 	for (next = buf; next < lim; next += rtm->rtm_msglen) {
963 		rtm = (struct rt_msghdr *)next;
964 		print_rtmsg(rtm, rtm->rtm_msglen);
965 	}
966 }
967 
968 void
969 monitor()
970 {
971 	int n;
972 	char msg[2048];
973 
974 	verbose = 1;
975 	if (debugonly) {
976 		interfaces();
977 		exit(0);
978 	}
979 	for(;;) {
980 		n = read(s, msg, 2048);
981 		(void) printf("got message of size %d\n", n);
982 		print_rtmsg((struct rt_msghdr *)msg, n);
983 	}
984 }
985 
986 struct {
987 	struct	rt_msghdr m_rtm;
988 	char	m_space[512];
989 } m_rtmsg;
990 
991 int
992 rtmsg(cmd, flags)
993 	int cmd, flags;
994 {
995 	static int seq;
996 	int rlen;
997 	register char *cp = m_rtmsg.m_space;
998 	register int l;
999 
1000 #define NEXTADDR(w, u) \
1001 	if (rtm_addrs & (w)) {\
1002 	    l = ROUNDUP(u.sa.sa_len); bcopy((char *)&(u), cp, l); cp += l;\
1003 	    if (verbose) sodump(&(u),"u");\
1004 	}
1005 
1006 	errno = 0;
1007 	bzero((char *)&m_rtmsg, sizeof(m_rtmsg));
1008 	if (cmd == 'a')
1009 		cmd = RTM_ADD;
1010 	else if (cmd == 'c')
1011 		cmd = RTM_CHANGE;
1012 	else if (cmd == 'g') {
1013 		cmd = RTM_GET;
1014 		if (so_ifp.sa.sa_family == 0) {
1015 			so_ifp.sa.sa_family == AF_LINK;
1016 			so_ifp.sa.sa_len == sizeof(struct sockaddr_dl);
1017 			rtm_addrs |= RTA_IFP;
1018 		}
1019 	} else
1020 		cmd = RTM_DELETE;
1021 #define rtm m_rtmsg.m_rtm
1022 	rtm.rtm_type = cmd;
1023 	rtm.rtm_flags = flags;
1024 	rtm.rtm_version = RTM_VERSION;
1025 	rtm.rtm_seq = ++seq;
1026 	rtm.rtm_addrs = rtm_addrs;
1027 	rtm.rtm_rmx = rt_metrics;
1028 	rtm.rtm_inits = rtm_inits;
1029 
1030 	if (rtm_addrs & RTA_NETMASK)
1031 		mask_addr();
1032 	NEXTADDR(RTA_DST, so_dst);
1033 	NEXTADDR(RTA_GATEWAY, so_gate);
1034 	NEXTADDR(RTA_NETMASK, so_mask);
1035 	NEXTADDR(RTA_GENMASK, so_genmask);
1036 	NEXTADDR(RTA_IFP, so_ifp);
1037 	NEXTADDR(RTA_IFA, so_ifa);
1038 	rtm.rtm_msglen = l = cp - (char *)&m_rtmsg;
1039 	if (verbose)
1040 		print_rtmsg(&rtm, l);
1041 	if (debugonly)
1042 		return (0);
1043 	if ((rlen = write(s, (char *)&m_rtmsg, l)) < 0) {
1044 		perror("writing to routing socket");
1045 		return (-1);
1046 	}
1047 	if (cmd == RTM_GET) {
1048 		do {
1049 			l = read(s, (char *)&m_rtmsg, sizeof(m_rtmsg));
1050 		} while (l > 0 && (rtm.rtm_seq != seq || rtm.rtm_pid != pid));
1051 		if (l < 0)
1052 			(void) fprintf(stderr,
1053 			    "route: read from routing socket: %s\n",
1054 			    strerror(errno));
1055 		else
1056 			print_getmsg(&rtm, l);
1057 	}
1058 #undef rtm
1059 	return (0);
1060 }
1061 
1062 void
1063 mask_addr()
1064 {
1065 	int olen = so_mask.sa.sa_len;
1066 	register char *cp1 = olen + (char *)&so_mask, *cp2;
1067 
1068 	for (so_mask.sa.sa_len = 0; cp1 > (char *)&so_mask; )
1069 		if (*--cp1 != 0) {
1070 			so_mask.sa.sa_len = 1 + cp1 - (char *)&so_mask;
1071 			break;
1072 		}
1073 	if ((rtm_addrs & RTA_DST) == 0)
1074 		return;
1075 	switch (so_dst.sa.sa_family) {
1076 	case AF_NS:
1077 	case AF_INET:
1078 	case AF_CCITT:
1079 	case 0:
1080 		return;
1081 	case AF_ISO:
1082 		olen = MIN(so_dst.siso.siso_nlen,
1083 			   MAX(so_mask.sa.sa_len - 6, 0));
1084 		break;
1085 	}
1086 	cp1 = so_mask.sa.sa_len + 1 + (char *)&so_dst;
1087 	cp2 = so_dst.sa.sa_len + 1 + (char *)&so_dst;
1088 	while (cp2 > cp1)
1089 		*--cp2 = 0;
1090 	cp2 = so_mask.sa.sa_len + 1 + (char *)&so_mask;
1091 	while (cp1 > so_dst.sa.sa_data)
1092 		*--cp1 &= *--cp2;
1093 	switch (so_dst.sa.sa_family) {
1094 	case AF_ISO:
1095 		so_dst.siso.siso_nlen = olen;
1096 		break;
1097 	}
1098 }
1099 
1100 char *msgtypes[] = {
1101 	"",
1102 	"RTM_ADD: Add Route",
1103 	"RTM_DELETE: Delete Route",
1104 	"RTM_CHANGE: Change Metrics or flags",
1105 	"RTM_GET: Report Metrics",
1106 	"RTM_LOSING: Kernel Suspects Partitioning",
1107 	"RTM_REDIRECT: Told to use different route",
1108 	"RTM_MISS: Lookup failed on this address",
1109 	"RTM_LOCK: fix specified metrics",
1110 	"RTM_OLDADD: caused by SIOCADDRT",
1111 	"RTM_OLDDEL: caused by SIOCDELRT",
1112 	"RTM_RESOLVE: Route created by cloning",
1113 	"RTM_NEWADDR: address being added to iface",
1114 	"RTM_DELADDR: address being removed from iface",
1115 	"RTM_IFINFO: iface status change",
1116 	0,
1117 };
1118 
1119 char metricnames[] =
1120 "\011pksent\010rttvar\7rtt\6ssthresh\5sendpipe\4recvpipe\3expire\2hopcount\1mtu";
1121 char routeflags[] =
1122 "\1UP\2GATEWAY\3HOST\4REJECT\5DYNAMIC\6MODIFIED\7DONE\010MASK_PRESENT\011CLONING\012XRESOLVE\013LLINFO\014STATIC\017PROTO2\020PROTO1";
1123 char ifnetflags[] =
1124 "\1UP\2BROADCAST\3DEBUG\4LOOPBACK\5PTP\6NOTRAILERS\7RUNNING\010NOARP\011PPROMISC\012ALLMULTI\013OACTIVE\014SIMPLEX\015LINK0\016LINK1\017LINK2\020MULTICAST";
1125 char addrnames[] =
1126 "\1DST\2GATEWAY\3NETMASK\4GENMASK\5IFP\6IFA\7AUTHOR\010BRD";
1127 
1128 void
1129 print_rtmsg(rtm, msglen)
1130 	register struct rt_msghdr *rtm;
1131 	int msglen;
1132 {
1133 	struct if_msghdr *ifm;
1134 	struct ifa_msghdr *ifam;
1135 
1136 	if (verbose == 0)
1137 		return;
1138 	if (rtm->rtm_version != RTM_VERSION) {
1139 		(void) printf("routing message version %d not understood\n",
1140 		    rtm->rtm_version);
1141 		return;
1142 	}
1143 	(void)printf("%s: len %d, ", msgtypes[rtm->rtm_type], rtm->rtm_msglen);
1144 	switch (rtm->rtm_type) {
1145 	case RTM_IFINFO:
1146 		ifm = (struct if_msghdr *)rtm;
1147 		(void) printf("if# %d, flags:", ifm->ifm_index);
1148 		bprintf(stdout, ifm->ifm_flags, ifnetflags);
1149 		pmsg_addrs((char *)(ifm + 1), ifm->ifm_addrs);
1150 		break;
1151 	case RTM_NEWADDR:
1152 	case RTM_DELADDR:
1153 		ifam = (struct ifa_msghdr *)rtm;
1154 		(void) printf("metric %d, flags:", ifam->ifam_metric);
1155 		bprintf(stdout, ifam->ifam_flags, routeflags);
1156 		pmsg_addrs((char *)(ifam + 1), ifam->ifam_addrs);
1157 		break;
1158 	default:
1159 		(void) printf("pid: %d, seq %d, errno %d, flags:",
1160 			rtm->rtm_pid, rtm->rtm_seq, rtm->rtm_errno);
1161 		bprintf(stdout, rtm->rtm_flags, routeflags);
1162 		pmsg_common(rtm);
1163 	}
1164 }
1165 
1166 void
1167 print_getmsg(rtm, msglen)
1168 	register struct rt_msghdr *rtm;
1169 	int msglen;
1170 {
1171 	struct sockaddr *dst = NULL, *gate = NULL, *mask = NULL;
1172 	struct sockaddr_dl *ifp = NULL;
1173 	register struct sockaddr *sa;
1174 	register char *cp;
1175 	register int i;
1176 
1177 	(void) printf("   route to: %s\n", routename(&so_dst));
1178 	if (rtm->rtm_version != RTM_VERSION) {
1179 		(void)fprintf(stderr,
1180 		    "routing message version %d not understood\n",
1181 		    rtm->rtm_version);
1182 		return;
1183 	}
1184 	if (rtm->rtm_msglen > msglen) {
1185 		(void)fprintf(stderr,
1186 		    "message length mismatch, in packet %d, returned %d\n",
1187 		    rtm->rtm_msglen, msglen);
1188 	}
1189 	if (rtm->rtm_errno)  {
1190 		(void) fprintf(stderr, "RTM_GET: %s (errno %d)\n",
1191 		    strerror(rtm->rtm_errno), rtm->rtm_errno);
1192 		return;
1193 	}
1194 	cp = ((char *)(rtm + 1));
1195 	if (rtm->rtm_addrs)
1196 		for (i = 1; i; i <<= 1)
1197 			if (i & rtm->rtm_addrs) {
1198 				sa = (struct sockaddr *)cp;
1199 				switch (i) {
1200 				case RTA_DST:
1201 					dst = sa;
1202 					break;
1203 				case RTA_GATEWAY:
1204 					gate = sa;
1205 					break;
1206 				case RTA_NETMASK:
1207 					mask = sa;
1208 					break;
1209 				case RTA_IFP:
1210 					if (sa->sa_family == AF_LINK &&
1211 					   ((struct sockaddr_dl *)sa)->sdl_nlen)
1212 						ifp = (struct sockaddr_dl *)sa;
1213 					break;
1214 				}
1215 				ADVANCE(cp, sa);
1216 			}
1217 	if (dst && mask)
1218 		mask->sa_family = dst->sa_family;	/* XXX */
1219 	if (dst)
1220 		(void)printf("destination: %s\n", routename(dst));
1221 	if (mask) {
1222 		int savenflag = nflag;
1223 
1224 		nflag = 1;
1225 		(void)printf("       mask: %s\n", routename(mask));
1226 		nflag = savenflag;
1227 	}
1228 	if (gate && rtm->rtm_flags & RTF_GATEWAY)
1229 		(void)printf("    gateway: %s\n", routename(gate));
1230 	if (ifp)
1231 		(void)printf("  interface: %.*s\n",
1232 		    ifp->sdl_nlen, ifp->sdl_data);
1233 	(void)printf("      flags: ");
1234 	bprintf(stdout, rtm->rtm_flags, routeflags);
1235 
1236 #define lock(f)	((rtm->rtm_rmx.rmx_locks & __CONCAT(RTV_,f)) ? 'L' : ' ')
1237 #define msec(u)	(((u) + 500) / 1000)		/* usec to msec */
1238 
1239 	(void) printf("\n%s\n", "\
1240  recvpipe  sendpipe  ssthresh  rtt,msec    rttvar  hopcount      mtu     expire");
1241 	printf("%8d%c ", rtm->rtm_rmx.rmx_recvpipe, lock(RPIPE));
1242 	printf("%8d%c ", rtm->rtm_rmx.rmx_sendpipe, lock(SPIPE));
1243 	printf("%8d%c ", rtm->rtm_rmx.rmx_ssthresh, lock(SSTHRESH));
1244 	printf("%8d%c ", msec(rtm->rtm_rmx.rmx_rtt), lock(RTT));
1245 	printf("%8d%c ", msec(rtm->rtm_rmx.rmx_rttvar), lock(RTTVAR));
1246 	printf("%8d%c ", rtm->rtm_rmx.rmx_hopcount, lock(HOPCOUNT));
1247 	printf("%8d%c ", rtm->rtm_rmx.rmx_mtu, lock(MTU));
1248 	if (rtm->rtm_rmx.rmx_expire)
1249 		rtm->rtm_rmx.rmx_expire -= time(0);
1250 	printf("%8d%c\n", rtm->rtm_rmx.rmx_expire, lock(EXPIRE));
1251 #undef lock
1252 #undef msec
1253 #define	RTA_IGN	(RTA_DST|RTA_GATEWAY|RTA_NETMASK|RTA_IFP|RTA_IFA|RTA_BRD)
1254 	if (verbose)
1255 		pmsg_common(rtm);
1256 	else if (rtm->rtm_addrs &~ RTA_IGN) {
1257 		(void) printf("sockaddrs: ");
1258 		bprintf(stdout, rtm->rtm_addrs, addrnames);
1259 		putchar('\n');
1260 	}
1261 #undef	RTA_IGN
1262 }
1263 
1264 void
1265 pmsg_common(rtm)
1266 	register struct rt_msghdr *rtm;
1267 {
1268 	(void) printf("\nlocks: ");
1269 	bprintf(stdout, rtm->rtm_rmx.rmx_locks, metricnames);
1270 	(void) printf(" inits: ");
1271 	bprintf(stdout, rtm->rtm_inits, metricnames);
1272 	pmsg_addrs(((char *)(rtm + 1)), rtm->rtm_addrs);
1273 }
1274 
1275 void
1276 pmsg_addrs(cp, addrs)
1277 	char	*cp;
1278 	int	addrs;
1279 {
1280 	register struct sockaddr *sa;
1281 	int i;
1282 
1283 	if (addrs == 0)
1284 		return;
1285 	(void) printf("\nsockaddrs: ");
1286 	bprintf(stdout, addrs, addrnames);
1287 	(void) putchar('\n');
1288 	for (i = 1; i; i <<= 1)
1289 		if (i & addrs) {
1290 			sa = (struct sockaddr *)cp;
1291 			(void) printf(" %s", routename(sa));
1292 			ADVANCE(cp, sa);
1293 		}
1294 	(void) putchar('\n');
1295 	(void) fflush(stdout);
1296 }
1297 
1298 void
1299 bprintf(fp, b, s)
1300 	register FILE *fp;
1301 	register int b;
1302 	register u_char *s;
1303 {
1304 	register int i;
1305 	int gotsome = 0;
1306 
1307 	if (b == 0)
1308 		return;
1309 	while (i = *s++) {
1310 		if (b & (1 << (i-1))) {
1311 			if (gotsome == 0)
1312 				i = '<';
1313 			else
1314 				i = ',';
1315 			(void) putc(i, fp);
1316 			gotsome = 1;
1317 			for (; (i = *s) > 32; s++)
1318 				(void) putc(i, fp);
1319 		} else
1320 			while (*s > 32)
1321 				s++;
1322 	}
1323 	if (gotsome)
1324 		(void) putc('>', fp);
1325 }
1326 
1327 int
1328 keyword(cp)
1329 	char *cp;
1330 {
1331 	register struct keytab *kt = keywords;
1332 
1333 	while (kt->kt_cp && strcmp(kt->kt_cp, cp))
1334 		kt++;
1335 	return kt->kt_i;
1336 }
1337 
1338 void
1339 sodump(su, which)
1340 	register sup su;
1341 	char *which;
1342 {
1343 	switch (su->sa.sa_family) {
1344 	case AF_LINK:
1345 		(void) printf("%s: link %s; ",
1346 		    which, link_ntoa(&su->sdl));
1347 		break;
1348 	case AF_ISO:
1349 		(void) printf("%s: iso %s; ",
1350 		    which, iso_ntoa(&su->siso.siso_addr));
1351 		break;
1352 	case AF_INET:
1353 		(void) printf("%s: inet %s; ",
1354 		    which, inet_ntoa(su->sin.sin_addr));
1355 		break;
1356 	case AF_NS:
1357 		(void) printf("%s: xns %s; ",
1358 		    which, ns_ntoa(su->sns.sns_addr));
1359 		break;
1360 	}
1361 	(void) fflush(stdout);
1362 }
1363 
1364 /* States*/
1365 #define VIRGIN	0
1366 #define GOTONE	1
1367 #define GOTTWO	2
1368 /* Inputs */
1369 #define	DIGIT	(4*0)
1370 #define	END	(4*1)
1371 #define DELIM	(4*2)
1372 
1373 void
1374 sockaddr(addr, sa)
1375 	register char *addr;
1376 	register struct sockaddr *sa;
1377 {
1378 	register char *cp = (char *)sa;
1379 	int size = sa->sa_len;
1380 	char *cplim = cp + size;
1381 	register int byte = 0, state = VIRGIN, new;
1382 
1383 	bzero(cp, size);
1384 	cp++;
1385 	do {
1386 		if ((*addr >= '0') && (*addr <= '9')) {
1387 			new = *addr - '0';
1388 		} else if ((*addr >= 'a') && (*addr <= 'f')) {
1389 			new = *addr - 'a' + 10;
1390 		} else if ((*addr >= 'A') && (*addr <= 'F')) {
1391 			new = *addr - 'A' + 10;
1392 		} else if (*addr == 0)
1393 			state |= END;
1394 		else
1395 			state |= DELIM;
1396 		addr++;
1397 		switch (state /* | INPUT */) {
1398 		case GOTTWO | DIGIT:
1399 			*cp++ = byte; /*FALLTHROUGH*/
1400 		case VIRGIN | DIGIT:
1401 			state = GOTONE; byte = new; continue;
1402 		case GOTONE | DIGIT:
1403 			state = GOTTWO; byte = new + (byte << 4); continue;
1404 		default: /* | DELIM */
1405 			state = VIRGIN; *cp++ = byte; byte = 0; continue;
1406 		case GOTONE | END:
1407 		case GOTTWO | END:
1408 			*cp++ = byte; /* FALLTHROUGH */
1409 		case VIRGIN | END:
1410 			break;
1411 		}
1412 		break;
1413 	} while (cp < cplim);
1414 	sa->sa_len = cp - (char *)sa;
1415 }
1416