xref: /freebsd/usr.sbin/traceroute/traceroute.c (revision db33c6f3ae9d1231087710068ee4ea5398aacca7)
1 /*
2  * Copyright (c) 1988, 1989, 1991, 1994, 1995, 1996, 1997, 1998, 1999, 2000
3  *	The Regents of the University of California.  All rights reserved.
4  *
5  * Redistribution and use in source and binary forms, with or without
6  * modification, are permitted provided that: (1) source code distributions
7  * retain the above copyright notice and this paragraph in its entirety, (2)
8  * distributions including binary code include the above copyright notice and
9  * this paragraph in its entirety in the documentation or other materials
10  * provided with the distribution, and (3) all advertising materials mentioning
11  * features or use of this software display the following acknowledgement:
12  * ``This product includes software developed by the University of California,
13  * Lawrence Berkeley Laboratory and its contributors.'' Neither the name of
14  * the University nor the names of its contributors may be used to endorse
15  * or promote products derived from this software without specific prior
16  * written permission.
17  * THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR IMPLIED
18  * WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF
19  * MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
20  */
21 
22 /*
23  * traceroute host  - trace the route ip packets follow going to "host".
24  *
25  * Attempt to trace the route an ip packet would follow to some
26  * internet host.  We find out intermediate hops by launching probe
27  * packets with a small ttl (time to live) then listening for an
28  * icmp "time exceeded" reply from a gateway.  We start our probes
29  * with a ttl of one and increase by one until we get an icmp "port
30  * unreachable" (which means we got to "host") or hit a max (which
31  * defaults to net.inet.ip.ttl hops & can be changed with the -m flag).
32  * Three probes (change with -q flag) are sent at each ttl setting and
33  * a line is printed showing the ttl, address of the gateway and
34  * round trip time of each probe.  If the probe answers come from
35  * different gateways, the address of each responding system will
36  * be printed.  If there is no response within a 5 sec. timeout
37  * interval (changed with the -w flag), a "*" is printed for that
38  * probe.
39  *
40  * Probe packets are UDP format.  We don't want the destination
41  * host to process them so the destination port is set to an
42  * unlikely value (if some clod on the destination is using that
43  * value, it can be changed with the -p flag).
44  *
45  * A sample use might be:
46  *
47  *     [yak 71]% traceroute nis.nsf.net.
48  *     traceroute to nis.nsf.net (35.1.1.48), 64 hops max, 40 byte packets
49  *      1  helios.ee.lbl.gov (128.3.112.1)  19 ms  19 ms  0 ms
50  *      2  lilac-dmc.Berkeley.EDU (128.32.216.1)  39 ms  39 ms  19 ms
51  *      3  lilac-dmc.Berkeley.EDU (128.32.216.1)  39 ms  39 ms  19 ms
52  *      4  ccngw-ner-cc.Berkeley.EDU (128.32.136.23)  39 ms  40 ms  39 ms
53  *      5  ccn-nerif22.Berkeley.EDU (128.32.168.22)  39 ms  39 ms  39 ms
54  *      6  128.32.197.4 (128.32.197.4)  40 ms  59 ms  59 ms
55  *      7  131.119.2.5 (131.119.2.5)  59 ms  59 ms  59 ms
56  *      8  129.140.70.13 (129.140.70.13)  99 ms  99 ms  80 ms
57  *      9  129.140.71.6 (129.140.71.6)  139 ms  239 ms  319 ms
58  *     10  129.140.81.7 (129.140.81.7)  220 ms  199 ms  199 ms
59  *     11  nic.merit.edu (35.1.1.48)  239 ms  239 ms  239 ms
60  *
61  * Note that lines 2 & 3 are the same.  This is due to a buggy
62  * kernel on the 2nd hop system -- lbl-csam.arpa -- that forwards
63  * packets with a zero ttl.
64  *
65  * A more interesting example is:
66  *
67  *     [yak 72]% traceroute allspice.lcs.mit.edu.
68  *     traceroute to allspice.lcs.mit.edu (18.26.0.115), 64 hops max, 40 byte packets
69  *      1  helios.ee.lbl.gov (128.3.112.1)  0 ms  0 ms  0 ms
70  *      2  lilac-dmc.Berkeley.EDU (128.32.216.1)  19 ms  19 ms  19 ms
71  *      3  lilac-dmc.Berkeley.EDU (128.32.216.1)  39 ms  19 ms  19 ms
72  *      4  ccngw-ner-cc.Berkeley.EDU (128.32.136.23)  19 ms  39 ms  39 ms
73  *      5  ccn-nerif22.Berkeley.EDU (128.32.168.22)  20 ms  39 ms  39 ms
74  *      6  128.32.197.4 (128.32.197.4)  59 ms  119 ms  39 ms
75  *      7  131.119.2.5 (131.119.2.5)  59 ms  59 ms  39 ms
76  *      8  129.140.70.13 (129.140.70.13)  80 ms  79 ms  99 ms
77  *      9  129.140.71.6 (129.140.71.6)  139 ms  139 ms  159 ms
78  *     10  129.140.81.7 (129.140.81.7)  199 ms  180 ms  300 ms
79  *     11  129.140.72.17 (129.140.72.17)  300 ms  239 ms  239 ms
80  *     12  * * *
81  *     13  128.121.54.72 (128.121.54.72)  259 ms  499 ms  279 ms
82  *     14  * * *
83  *     15  * * *
84  *     16  * * *
85  *     17  * * *
86  *     18  ALLSPICE.LCS.MIT.EDU (18.26.0.115)  339 ms  279 ms  279 ms
87  *
88  * (I start to see why I'm having so much trouble with mail to
89  * MIT.)  Note that the gateways 12, 14, 15, 16 & 17 hops away
90  * either don't send ICMP "time exceeded" messages or send them
91  * with a ttl too small to reach us.  14 - 17 are running the
92  * MIT C Gateway code that doesn't send "time exceeded"s.  God
93  * only knows what's going on with 12.
94  *
95  * The silent gateway 12 in the above may be the result of a bug in
96  * the 4.[23]BSD network code (and its derivatives):  4.x (x <= 3)
97  * sends an unreachable message using whatever ttl remains in the
98  * original datagram.  Since, for gateways, the remaining ttl is
99  * zero, the icmp "time exceeded" is guaranteed to not make it back
100  * to us.  The behavior of this bug is slightly more interesting
101  * when it appears on the destination system:
102  *
103  *      1  helios.ee.lbl.gov (128.3.112.1)  0 ms  0 ms  0 ms
104  *      2  lilac-dmc.Berkeley.EDU (128.32.216.1)  39 ms  19 ms  39 ms
105  *      3  lilac-dmc.Berkeley.EDU (128.32.216.1)  19 ms  39 ms  19 ms
106  *      4  ccngw-ner-cc.Berkeley.EDU (128.32.136.23)  39 ms  40 ms  19 ms
107  *      5  ccn-nerif35.Berkeley.EDU (128.32.168.35)  39 ms  39 ms  39 ms
108  *      6  csgw.Berkeley.EDU (128.32.133.254)  39 ms  59 ms  39 ms
109  *      7  * * *
110  *      8  * * *
111  *      9  * * *
112  *     10  * * *
113  *     11  * * *
114  *     12  * * *
115  *     13  rip.Berkeley.EDU (128.32.131.22)  59 ms !  39 ms !  39 ms !
116  *
117  * Notice that there are 12 "gateways" (13 is the final
118  * destination) and exactly the last half of them are "missing".
119  * What's really happening is that rip (a Sun-3 running Sun OS3.5)
120  * is using the ttl from our arriving datagram as the ttl in its
121  * icmp reply.  So, the reply will time out on the return path
122  * (with no notice sent to anyone since icmp's aren't sent for
123  * icmp's) until we probe with a ttl that's at least twice the path
124  * length.  I.e., rip is really only 7 hops away.  A reply that
125  * returns with a ttl of 1 is a clue this problem exists.
126  * Traceroute prints a "!" after the time if the ttl is <= 1.
127  * Since vendors ship a lot of obsolete (DEC's Ultrix, Sun 3.x) or
128  * non-standard (HPUX) software, expect to see this problem
129  * frequently and/or take care picking the target host of your
130  * probes.
131  *
132  * Other possible annotations after the time are !H, !N, !P (got a host,
133  * network or protocol unreachable, respectively), !S or !F (source
134  * route failed or fragmentation needed -- neither of these should
135  * ever occur and the associated gateway is busted if you see one).  If
136  * almost all the probes result in some kind of unreachable, traceroute
137  * will give up and exit.
138  *
139  * Notes
140  * -----
141  * This program must be run by root or be setuid.  (I suggest that
142  * you *don't* make it setuid -- casual use could result in a lot
143  * of unnecessary traffic on our poor, congested nets.)
144  *
145  * This program requires a kernel mod that does not appear in any
146  * system available from Berkeley:  A raw ip socket using proto
147  * IPPROTO_RAW must interpret the data sent as an ip datagram (as
148  * opposed to data to be wrapped in an ip datagram).  See the README
149  * file that came with the source to this program for a description
150  * of the mods I made to /sys/netinet/raw_ip.c.  Your mileage may
151  * vary.  But, again, ANY 4.x (x < 4) BSD KERNEL WILL HAVE TO BE
152  * MODIFIED TO RUN THIS PROGRAM.
153  *
154  * The udp port usage may appear bizarre (well, ok, it is bizarre).
155  * The problem is that an icmp message only contains 8 bytes of
156  * data from the original datagram.  8 bytes is the size of a udp
157  * header so, if we want to associate replies with the original
158  * datagram, the necessary information must be encoded into the
159  * udp header (the ip id could be used but there's no way to
160  * interlock with the kernel's assignment of ip id's and, anyway,
161  * it would have taken a lot more kernel hacking to allow this
162  * code to set the ip id).  So, to allow two or more users to
163  * use traceroute simultaneously, we use this task's pid as the
164  * source port (the high bit is set to move the port number out
165  * of the "likely" range).  To keep track of which probe is being
166  * replied to (so times and/or hop counts don't get confused by a
167  * reply that was delayed in transit), we increment the destination
168  * port number before each probe.
169  *
170  * Don't use this as a coding example.  I was trying to find a
171  * routing problem and this code sort-of popped out after 48 hours
172  * without sleep.  I was amazed it ever compiled, much less ran.
173  *
174  * I stole the idea for this program from Steve Deering.  Since
175  * the first release, I've learned that had I attended the right
176  * IETF working group meetings, I also could have stolen it from Guy
177  * Almes or Matt Mathis.  I don't know (or care) who came up with
178  * the idea first.  I envy the originators' perspicacity and I'm
179  * glad they didn't keep the idea a secret.
180  *
181  * Tim Seaver, Ken Adelman and C. Philip Wood provided bug fixes and/or
182  * enhancements to the original distribution.
183  *
184  * I've hacked up a round-trip-route version of this that works by
185  * sending a loose-source-routed udp datagram through the destination
186  * back to yourself.  Unfortunately, SO many gateways botch source
187  * routing, the thing is almost worthless.  Maybe one day...
188  *
189  *  -- Van Jacobson (van@ee.lbl.gov)
190  *     Tue Dec 20 03:50:13 PST 1988
191  */
192 
193 #include <sys/param.h>
194 #include <sys/capsicum.h>
195 #include <sys/file.h>
196 #include <sys/ioctl.h>
197 #include <sys/select.h>
198 #include <sys/socket.h>
199 #include <sys/sysctl.h>
200 #include <sys/time.h>
201 
202 #include <netinet/in_systm.h>
203 #include <netinet/in.h>
204 #include <netinet/ip.h>
205 #include <netinet/ip_var.h>
206 #include <netinet/ip_icmp.h>
207 #include <netinet/sctp.h>
208 #include <netinet/sctp_header.h>
209 #include <netinet/udp.h>
210 #include <netinet/tcp.h>
211 #include <netinet/tcpip.h>
212 
213 #include <arpa/inet.h>
214 
215 #ifdef WITH_CASPER
216 #include <libcasper.h>
217 #include <casper/cap_dns.h>
218 #endif
219 
220 #ifdef	IPSEC
221 #include <net/route.h>
222 #include <netipsec/ipsec.h>	/* XXX */
223 #endif	/* IPSEC */
224 
225 #include <ctype.h>
226 #include <capsicum_helpers.h>
227 #include <err.h>
228 #include <errno.h>
229 #include <fcntl.h>
230 #include <malloc.h>
231 #include <memory.h>
232 #include <netdb.h>
233 #include <stdio.h>
234 #include <stdlib.h>
235 #include <string.h>
236 #include <unistd.h>
237 
238 /* rfc1716 */
239 #ifndef ICMP_UNREACH_FILTER_PROHIB
240 #define ICMP_UNREACH_FILTER_PROHIB	13	/* admin prohibited filter */
241 #endif
242 #ifndef ICMP_UNREACH_HOST_PRECEDENCE
243 #define ICMP_UNREACH_HOST_PRECEDENCE	14	/* host precedence violation */
244 #endif
245 #ifndef ICMP_UNREACH_PRECEDENCE_CUTOFF
246 #define ICMP_UNREACH_PRECEDENCE_CUTOFF	15	/* precedence cutoff */
247 #endif
248 
249 #include "findsaddr.h"
250 #include "ifaddrlist.h"
251 #include "as.h"
252 #include "traceroute.h"
253 
254 /* Maximum number of gateways (include room for one noop) */
255 #define NGATEWAYS ((int)((MAX_IPOPTLEN - IPOPT_MINOFF - 1) / sizeof(u_int32_t)))
256 
257 #ifndef MAXHOSTNAMELEN
258 #define MAXHOSTNAMELEN	64
259 #endif
260 
261 #define Fprintf (void)fprintf
262 #define Printf (void)printf
263 
264 /* What a GRE packet header looks like */
265 struct grehdr {
266 	u_int16_t   flags;
267 	u_int16_t   proto;
268 	u_int16_t   length;	/* PPTP version of these fields */
269 	u_int16_t   callId;
270 };
271 #ifndef IPPROTO_GRE
272 #define IPPROTO_GRE	47
273 #endif
274 
275 /* For GRE, we prepare what looks like a PPTP packet */
276 #define GRE_PPTP_PROTO	0x880b
277 
278 /* Host name and address list */
279 struct hostinfo {
280 	char *name;
281 	int n;
282 	u_int32_t *addrs;
283 };
284 
285 /* Data section of the probe packet */
286 struct outdata {
287 	u_char seq;		/* sequence number of this packet */
288 	u_char ttl;		/* ttl packet left with */
289 	struct timeval tv;	/* time packet left */
290 };
291 
292 u_char	packet[512];		/* last inbound (icmp) packet */
293 
294 struct ip *outip;		/* last output ip packet */
295 u_char *outp;		/* last output inner protocol packet */
296 
297 struct ip *hip = NULL;		/* Quoted IP header */
298 int hiplen = 0;
299 
300 /* loose source route gateway list (including room for final destination) */
301 u_int32_t gwlist[NGATEWAYS + 1];
302 
303 int s;				/* receive (icmp) socket file descriptor */
304 int sndsock;			/* send (udp) socket file descriptor */
305 
306 struct sockaddr whereto;	/* Who to try to reach */
307 struct sockaddr wherefrom;	/* Who we are */
308 int packlen;			/* total length of packet */
309 int protlen;			/* length of protocol part of packet */
310 int minpacket;			/* min ip packet size */
311 int maxpacket = 32 * 1024;	/* max ip packet size */
312 int pmtu;			/* Path MTU Discovery (RFC1191) */
313 u_int pausemsecs;
314 
315 char *prog;
316 char *source;
317 char *hostname;
318 char *device;
319 static const char devnull[] = "/dev/null";
320 
321 int nprobes = -1;
322 int max_ttl;
323 int first_ttl = 1;
324 u_short ident;
325 u_short port;			/* protocol specific base "port" */
326 
327 int options;			/* socket options */
328 int verbose;
329 int waittime = 5;		/* time to wait for response (in seconds) */
330 int nflag;			/* print addresses numerically */
331 int as_path;			/* print as numbers for each hop */
332 char *as_server = NULL;
333 void *asn;
334 #ifdef CANT_HACK_IPCKSUM
335 int doipcksum = 0;		/* don't calculate ip checksums by default */
336 #else
337 int doipcksum = 1;		/* calculate ip checksums by default */
338 #endif
339 int optlen;			/* length of ip options */
340 int fixedPort = 0;		/* Use fixed destination port for TCP and UDP */
341 int printdiff = 0;		/* Print the difference between sent and quoted */
342 int ecnflag = 0;		/* ECN bleaching detection flag */
343 
344 extern int optind;
345 extern int opterr;
346 extern char *optarg;
347 
348 #ifdef WITH_CASPER
349 static cap_channel_t *capdns;
350 #endif
351 
352 /* Forwards */
353 double	deltaT(struct timeval *, struct timeval *);
354 void	freehostinfo(struct hostinfo *);
355 void	getaddr(u_int32_t *, char *);
356 struct	hostinfo *gethostinfo(char *);
357 u_short	in_cksum(u_short *, int);
358 u_int32_t sctp_crc32c(const void *, u_int32_t);
359 char	*inetname(struct in_addr);
360 int	main(int, char **);
361 u_short p_cksum(struct ip *, u_short *, int, int);
362 int	packet_ok(u_char *, int, struct sockaddr_in *, int);
363 char	*pr_type(u_char);
364 void	print(u_char *, int, struct sockaddr_in *);
365 #ifdef	IPSEC
366 int	setpolicy(int so, char *policy);
367 #endif
368 void	send_probe(int, int);
369 struct outproto *setproto(char *);
370 int	str2val(const char *, const char *, int, int);
371 void	tvsub(struct timeval *, struct timeval *);
372 void usage(void);
373 int	wait_for_reply(int, struct sockaddr_in *, const struct timeval *);
374 void pkt_compare(const u_char *, int, const u_char *, int);
375 
376 void	udp_prep(struct outdata *);
377 int	udp_check(const u_char *, int);
378 void	udplite_prep(struct outdata *);
379 int	udplite_check(const u_char *, int);
380 void	tcp_prep(struct outdata *);
381 int	tcp_check(const u_char *, int);
382 void	sctp_prep(struct outdata *);
383 int	sctp_check(const u_char *, int);
384 void	gre_prep(struct outdata *);
385 int	gre_check(const u_char *, int);
386 void	gen_prep(struct outdata *);
387 int	gen_check(const u_char *, int);
388 void	icmp_prep(struct outdata *);
389 int	icmp_check(const u_char *, int);
390 
391 /* Descriptor structure for each outgoing protocol we support */
392 struct outproto {
393 	char	*name;		/* name of protocol */
394 	const char *key;	/* An ascii key for the bytes of the header */
395 	u_char	num;		/* IP protocol number */
396 	u_short	hdrlen;		/* max size of protocol header */
397 	u_short	port;		/* default base protocol-specific "port" */
398 	void	(*prepare)(struct outdata *);
399 				/* finish preparing an outgoing packet */
400 	int	(*check)(const u_char *, int);
401 				/* check an incoming packet */
402 };
403 
404 /* List of supported protocols. The first one is the default. The last
405    one is the handler for generic protocols not explicitly listed. */
406 struct	outproto protos[] = {
407 	{
408 		"udp",
409 		"spt dpt len sum",
410 		IPPROTO_UDP,
411 		sizeof(struct udphdr),
412 		32768 + 666,
413 		udp_prep,
414 		udp_check
415 	},
416 	{
417 		"udplite",
418 		"spt dpt cov sum",
419 		IPPROTO_UDPLITE,
420 		sizeof(struct udphdr),
421 		32768 + 666,
422 		udplite_prep,
423 		udplite_check
424 	},
425 	{
426 		"tcp",
427 		"spt dpt seq     ack     xxflwin sum urp",
428 		IPPROTO_TCP,
429 		sizeof(struct tcphdr),
430 		32768 + 666,
431 		tcp_prep,
432 		tcp_check
433 	},
434 	{
435 		"sctp",
436 		"spt dpt vtag    crc     tyfllen tyfllen ",
437 		IPPROTO_SCTP,
438 		sizeof(struct sctphdr),
439 		32768 + 666,
440 		sctp_prep,
441 		sctp_check
442 	},
443 	{
444 		"gre",
445 		"flg pro len clid",
446 		IPPROTO_GRE,
447 		sizeof(struct grehdr),
448 		GRE_PPTP_PROTO,
449 		gre_prep,
450 		gre_check
451 	},
452 	{
453 		"icmp",
454 		"typ cod sum ",
455 		IPPROTO_ICMP,
456 		sizeof(struct icmp),
457 		0,
458 		icmp_prep,
459 		icmp_check
460 	},
461 	{
462 		NULL,
463 		"",
464 		0,
465 		2 * sizeof(u_short),
466 		0,
467 		gen_prep,
468 		gen_check
469 	},
470 };
471 struct	outproto *proto = &protos[0];
472 
473 const char *ip_hdr_key = "vhtslen id  off tlprsum srcip   dstip   opts";
474 
475 int
476 main(int argc, char **argv)
477 {
478 	register int op, code, n;
479 	register char *cp;
480 	register const char *err;
481 	register u_int32_t *ap;
482 	register struct sockaddr_in *from = (struct sockaddr_in *)&wherefrom;
483 	register struct sockaddr_in *to = (struct sockaddr_in *)&whereto;
484 	register struct hostinfo *hi;
485 	int on = 1;
486 	register struct protoent *pe;
487 	register int ttl, probe, i;
488 	register int seq = 0;
489 	int tos = 0, settos = 0;
490 	register int lsrr = 0;
491 	register u_short off = 0;
492 	struct ifaddrlist *al;
493 	char errbuf[132];
494 	int requestPort = -1;
495 	int sump = 0;
496 	int sockerrno;
497 #ifdef WITH_CASPER
498 	const char *types[] = { "NAME2ADDR", "ADDR2NAME" };
499 	int families[1];
500 	cap_channel_t *casper;
501 #endif
502 	cap_rights_t rights;
503 	bool cansandbox;
504 
505 	/* Insure the socket fds won't be 0, 1 or 2 */
506 	if (open(devnull, O_RDONLY) < 0 ||
507 	    open(devnull, O_RDONLY) < 0 ||
508 	    open(devnull, O_RDONLY) < 0) {
509 		Fprintf(stderr, "%s: open \"%s\": %s\n",
510 		    prog, devnull, strerror(errno));
511 		exit(1);
512 	}
513 	/*
514 	 * Do the setuid-required stuff first, then lose privileges ASAP.
515 	 * Do error checking for these two calls where they appeared in
516 	 * the original code.
517 	 */
518 	cp = "icmp";
519 	pe = getprotobyname(cp);
520 	if (pe) {
521 		if ((s = socket(AF_INET, SOCK_RAW, pe->p_proto)) < 0)
522 			sockerrno = errno;
523 		else if ((sndsock = socket(AF_INET, SOCK_RAW, IPPROTO_RAW)) < 0)
524 			sockerrno = errno;
525 	}
526 
527 	if (setuid(getuid()) != 0) {
528 		perror("setuid()");
529 		exit(1);
530 	}
531 
532 #ifdef WITH_CASPER
533 	casper = cap_init();
534 	if (casper == NULL)
535 		errx(1, "unable to create casper process");
536 	capdns = cap_service_open(casper, "system.dns");
537 	if (capdns == NULL)
538 		errx(1, "unable to open system.dns service");
539 	if (cap_dns_type_limit(capdns, types, 2) < 0)
540 		errx(1, "unable to limit access to system.dns service");
541 	families[0] = AF_INET;
542 	if (cap_dns_family_limit(capdns, families, 1) < 0)
543 		errx(1, "unable to limit access to system.dns service");
544 #endif /* WITH_CASPER */
545 
546 #ifdef IPCTL_DEFTTL
547 	{
548 		int mib[4] = { CTL_NET, PF_INET, IPPROTO_IP, IPCTL_DEFTTL };
549 		size_t sz = sizeof(max_ttl);
550 
551 		if (sysctl(mib, 4, &max_ttl, &sz, NULL, 0) == -1) {
552 			perror("sysctl(net.inet.ip.ttl)");
553 			exit(1);
554 		}
555 	}
556 #else /* !IPCTL_DEFTTL */
557 	max_ttl = 30;
558 #endif
559 
560 #ifdef WITH_CASPER
561 	cap_close(casper);
562 #endif
563 
564 	if (argv[0] == NULL)
565 		prog = "traceroute";
566 	else if ((cp = strrchr(argv[0], '/')) != NULL)
567 		prog = cp + 1;
568 	else
569 		prog = argv[0];
570 
571 	opterr = 0;
572 	while ((op = getopt(argc, argv, "aA:eEdDFInrSvxf:g:i:M:m:P:p:q:s:t:w:z:")) != EOF)
573 		switch (op) {
574 		case 'a':
575 			as_path = 1;
576 			break;
577 
578 		case 'A':
579 			as_path = 1;
580 			as_server = optarg;
581 			break;
582 
583 		case 'd':
584 			options |= SO_DEBUG;
585 			break;
586 
587 		case 'D':
588 			printdiff = 1;
589 			break;
590 
591 		case 'e':
592 			fixedPort = 1;
593 			break;
594 
595 		case 'E':
596 			ecnflag = 1;
597 			break;
598 
599 		case 'f':
600 		case 'M':	/* FreeBSD compat. */
601 			first_ttl = str2val(optarg, "first ttl", 1, 255);
602 			break;
603 
604 		case 'F':
605 			off = IP_DF;
606 			break;
607 
608 		case 'g':
609 			if (lsrr >= NGATEWAYS) {
610 				Fprintf(stderr,
611 				    "%s: No more than %d gateways\n",
612 				    prog, NGATEWAYS);
613 				exit(1);
614 			}
615 			getaddr(gwlist + lsrr, optarg);
616 			++lsrr;
617 			break;
618 
619 		case 'i':
620 			device = optarg;
621 			break;
622 
623 		case 'I':
624 			proto = setproto("icmp");
625 			break;
626 
627 		case 'm':
628 			max_ttl = str2val(optarg, "max ttl", 1, 255);
629 			break;
630 
631 		case 'n':
632 			++nflag;
633 			break;
634 
635 		case 'P':
636 			proto = setproto(optarg);
637 			break;
638 
639 		case 'p':
640 			requestPort = (u_short)str2val(optarg, "port",
641 			    1, (1 << 16) - 1);
642 			break;
643 
644 		case 'q':
645 			nprobes = str2val(optarg, "nprobes", 1, -1);
646 			break;
647 
648 		case 'r':
649 			options |= SO_DONTROUTE;
650 			break;
651 
652 		case 's':
653 			/*
654 			 * set the ip source address of the outbound
655 			 * probe (e.g., on a multi-homed host).
656 			 */
657 			source = optarg;
658 			break;
659 
660 		case 'S':
661 			sump = 1;
662 			break;
663 
664 		case 't':
665 			tos = str2val(optarg, "tos", 0, 255);
666 			++settos;
667 			break;
668 
669 		case 'v':
670 			++verbose;
671 			break;
672 
673 		case 'x':
674 			doipcksum = (doipcksum == 0);
675 			break;
676 
677 		case 'w':
678 			waittime = str2val(optarg, "wait time",
679 			    1, 24 * 60 * 60);
680 			break;
681 
682 		case 'z':
683 			pausemsecs = str2val(optarg, "pause msecs",
684 			    0, 60 * 60 * 1000);
685 			break;
686 
687 		default:
688 			usage();
689 		}
690 
691 	/* Set requested port, if any, else default for this protocol */
692 	port = (requestPort != -1) ? requestPort : proto->port;
693 
694 	if (nprobes == -1)
695 		nprobes = printdiff ? 1 : 3;
696 
697 	if (first_ttl > max_ttl) {
698 		Fprintf(stderr,
699 		    "%s: first ttl (%d) may not be greater than max ttl (%d)\n",
700 		    prog, first_ttl, max_ttl);
701 		exit(1);
702 	}
703 
704 	if (!doipcksum)
705 		Fprintf(stderr, "%s: Warning: ip checksums disabled\n", prog);
706 
707 	if (lsrr > 0)
708 		optlen = (lsrr + 1) * sizeof(gwlist[0]);
709 	minpacket = sizeof(*outip) + proto->hdrlen + optlen;
710 	if (minpacket > 40)
711 		packlen = minpacket;
712 	else
713 		packlen = 40;
714 
715 	/* Process destination and optional packet size */
716 	switch (argc - optind) {
717 
718 	case 2:
719 		packlen = str2val(argv[optind + 1],
720 		    "packet length", minpacket, maxpacket);
721 		/* Fall through */
722 
723 	case 1:
724 		hostname = argv[optind];
725 		hi = gethostinfo(hostname);
726 		setsin(to, hi->addrs[0]);
727 		if (hi->n > 1)
728 			Fprintf(stderr,
729 		    "%s: Warning: %s has multiple addresses; using %s\n",
730 				prog, hostname, inet_ntoa(to->sin_addr));
731 		hostname = hi->name;
732 		hi->name = NULL;
733 		freehostinfo(hi);
734 		break;
735 
736 	default:
737 		usage();
738 	}
739 
740 	setlinebuf(stdout);
741 
742 	protlen = packlen - sizeof(*outip) - optlen;
743 	if ((proto->num == IPPROTO_SCTP) && (packlen & 3)) {
744 		Fprintf(stderr, "%s: packet length must be a multiple of 4\n",
745 		    prog);
746 		exit(1);
747 	}
748 
749 	outip = (struct ip *)malloc((unsigned)packlen);
750 	if (outip == NULL) {
751 		Fprintf(stderr, "%s: malloc: %s\n", prog, strerror(errno));
752 		exit(1);
753 	}
754 	memset((char *)outip, 0, packlen);
755 
756 	outip->ip_v = IPVERSION;
757 	if (settos)
758 		outip->ip_tos = tos;
759 	if (ecnflag) {
760 		outip->ip_tos &= ~IPTOS_ECN_MASK;
761 		outip->ip_tos |= IPTOS_ECN_ECT1;
762 	}
763 	outip->ip_len = htons(packlen);
764 	outip->ip_off = htons(off);
765 	outip->ip_p = proto->num;
766 	outp = (u_char *)(outip + 1);
767 	if (lsrr > 0) {
768 		register u_char *optlist;
769 
770 		optlist = outp;
771 		outp += optlen;
772 
773 		/* final hop */
774 		gwlist[lsrr] = to->sin_addr.s_addr;
775 
776 		outip->ip_dst.s_addr = gwlist[0];
777 
778 		/* force 4 byte alignment */
779 		optlist[0] = IPOPT_NOP;
780 		/* loose source route option */
781 		optlist[1] = IPOPT_LSRR;
782 		i = lsrr * sizeof(gwlist[0]);
783 		optlist[2] = i + 3;
784 		/* Pointer to LSRR addresses */
785 		optlist[3] = IPOPT_MINOFF;
786 		memcpy(optlist + 4, gwlist + 1, i);
787 	} else
788 		outip->ip_dst = to->sin_addr;
789 
790 	outip->ip_hl = (outp - (u_char *)outip) >> 2;
791 	ident = (getpid() & 0xffff) | 0x8000;
792 
793 	if (pe == NULL) {
794 		Fprintf(stderr, "%s: unknown protocol %s\n", prog, cp);
795 		exit(1);
796 	}
797 	if (s < 0) {
798 		errno = sockerrno;
799 		Fprintf(stderr, "%s: icmp socket: %s\n", prog, strerror(errno));
800 		exit(1);
801 	}
802 	if (options & SO_DEBUG)
803 		(void)setsockopt(s, SOL_SOCKET, SO_DEBUG, (char *)&on,
804 		    sizeof(on));
805 	if (options & SO_DONTROUTE)
806 		(void)setsockopt(s, SOL_SOCKET, SO_DONTROUTE, (char *)&on,
807 		    sizeof(on));
808 
809 #if	defined(IPSEC) && defined(IPSEC_POLICY_IPSEC)
810 	if (setpolicy(s, "in bypass") < 0)
811 		errx(1, "%s", ipsec_strerror());
812 
813 	if (setpolicy(s, "out bypass") < 0)
814 		errx(1, "%s", ipsec_strerror());
815 #endif	/* defined(IPSEC) && defined(IPSEC_POLICY_IPSEC) */
816 
817 	if (sndsock < 0) {
818 		errno = sockerrno;
819 		Fprintf(stderr, "%s: raw socket: %s\n", prog, strerror(errno));
820 		exit(1);
821 	}
822 
823 #ifdef SO_SNDBUF
824 	if (setsockopt(sndsock, SOL_SOCKET, SO_SNDBUF, (char *)&packlen,
825 	    sizeof(packlen)) < 0) {
826 		Fprintf(stderr, "%s: SO_SNDBUF: %s\n", prog, strerror(errno));
827 		exit(1);
828 	}
829 #endif
830 #ifdef IP_HDRINCL
831 	if (setsockopt(sndsock, IPPROTO_IP, IP_HDRINCL, (char *)&on,
832 	    sizeof(on)) < 0) {
833 		Fprintf(stderr, "%s: IP_HDRINCL: %s\n", prog, strerror(errno));
834 		exit(1);
835 	}
836 #else
837 #ifdef IP_TOS
838 	if (settos && setsockopt(sndsock, IPPROTO_IP, IP_TOS,
839 	    (char *)&tos, sizeof(tos)) < 0) {
840 		Fprintf(stderr, "%s: setsockopt tos %d: %s\n",
841 		    prog, tos, strerror(errno));
842 		exit(1);
843 	}
844 #endif
845 #endif
846 	if (options & SO_DEBUG)
847 		(void)setsockopt(sndsock, SOL_SOCKET, SO_DEBUG, (char *)&on,
848 		    sizeof(on));
849 	if (options & SO_DONTROUTE)
850 		(void)setsockopt(sndsock, SOL_SOCKET, SO_DONTROUTE, (char *)&on,
851 		    sizeof(on));
852 
853 	/* Get the interface address list */
854 	n = ifaddrlist(&al, errbuf);
855 	if (n < 0) {
856 		Fprintf(stderr, "%s: ifaddrlist: %s\n", prog, errbuf);
857 		exit(1);
858 	}
859 	if (n == 0) {
860 		Fprintf(stderr,
861 		    "%s: Can't find any network interfaces\n", prog);
862 		exit(1);
863 	}
864 
865 	/* Look for a specific device */
866 	if (device != NULL) {
867 		for (i = n; i > 0; --i, ++al)
868 			if (strcmp(device, al->device) == 0)
869 				break;
870 		if (i <= 0) {
871 			Fprintf(stderr, "%s: Can't find interface %.32s\n",
872 			    prog, device);
873 			exit(1);
874 		}
875 	}
876 
877 	/* Determine our source address */
878 	if (source == NULL) {
879 		/*
880 		 * If a device was specified, use the interface address.
881 		 * Otherwise, try to determine our source address.
882 		 */
883 		if (device != NULL)
884 			setsin(from, al->addr);
885 		else if ((err = findsaddr(to, from)) != NULL) {
886 			Fprintf(stderr, "%s: findsaddr: %s\n",
887 			    prog, err);
888 			exit(1);
889 		}
890 	} else {
891 		hi = gethostinfo(source);
892 		source = hi->name;
893 		hi->name = NULL;
894 		/*
895 		 * If the device was specified make sure it
896 		 * corresponds to the source address specified.
897 		 * Otherwise, use the first address (and warn if
898 		 * there are more than one).
899 		 */
900 		if (device != NULL) {
901 			for (i = hi->n, ap = hi->addrs; i > 0; --i, ++ap)
902 				if (*ap == al->addr)
903 					break;
904 			if (i <= 0) {
905 				Fprintf(stderr,
906 				    "%s: %s is not on interface %.32s\n",
907 				    prog, source, device);
908 				exit(1);
909 			}
910 			setsin(from, *ap);
911 		} else {
912 			setsin(from, hi->addrs[0]);
913 			if (hi->n > 1)
914 				Fprintf(stderr,
915 			"%s: Warning: %s has multiple addresses; using %s\n",
916 				    prog, source, inet_ntoa(from->sin_addr));
917 		}
918 		freehostinfo(hi);
919 	}
920 
921 	outip->ip_src = from->sin_addr;
922 
923 	/* Check the source address (-s), if any, is valid */
924 	if (bind(sndsock, (struct sockaddr *)from, sizeof(*from)) < 0) {
925 		Fprintf(stderr, "%s: bind: %s\n",
926 		    prog, strerror(errno));
927 		exit(1);
928 	}
929 
930 	if (as_path) {
931 		asn = as_setup(as_server);
932 		if (asn == NULL) {
933 			Fprintf(stderr, "%s: as_setup failed, AS# lookups"
934 			    " disabled\n", prog);
935 			(void)fflush(stderr);
936 			as_path = 0;
937 		}
938 	}
939 
940 	if (connect(sndsock, (struct sockaddr *)&whereto,
941 	    sizeof(whereto)) != 0) {
942 		Fprintf(stderr, "%s: connect: %s\n", prog, strerror(errno));
943 		exit(1);
944 	}
945 
946 #ifdef WITH_CASPER
947 	cansandbox = true;
948 #else
949 	if (nflag)
950 		cansandbox = true;
951 	else
952 		cansandbox = false;
953 #endif
954 
955 	caph_cache_catpages();
956 
957 	/*
958 	 * Here we enter capability mode. Further down access to global
959 	 * namespaces (e.g filesystem) is restricted (see capsicum(4)).
960 	 * We must connect(2) our socket before this point.
961 	 */
962 	if (cansandbox && cap_enter() < 0) {
963 		if (errno != ENOSYS) {
964 			Fprintf(stderr, "%s: cap_enter: %s\n", prog,
965 			    strerror(errno));
966 			exit(1);
967 		} else {
968 			cansandbox = false;
969 		}
970 	}
971 
972 	cap_rights_init(&rights, CAP_SEND, CAP_SETSOCKOPT);
973 	if (cansandbox && cap_rights_limit(sndsock, &rights) < 0) {
974 		Fprintf(stderr, "%s: cap_rights_limit sndsock: %s\n", prog,
975 		    strerror(errno));
976 		exit(1);
977 	}
978 
979 	cap_rights_init(&rights, CAP_RECV, CAP_EVENT);
980 	if (cansandbox && cap_rights_limit(s, &rights) < 0) {
981 		Fprintf(stderr, "%s: cap_rights_limit s: %s\n", prog,
982 		    strerror(errno));
983 		exit(1);
984 	}
985 
986 #if	defined(IPSEC) && defined(IPSEC_POLICY_IPSEC)
987 	if (setpolicy(sndsock, "in bypass") < 0)
988 		errx(1, "%s", ipsec_strerror());
989 
990 	if (setpolicy(sndsock, "out bypass") < 0)
991 		errx(1, "%s", ipsec_strerror());
992 #endif	/* defined(IPSEC) && defined(IPSEC_POLICY_IPSEC) */
993 
994 	Fprintf(stderr, "%s to %s (%s)",
995 	    prog, hostname, inet_ntoa(to->sin_addr));
996 	if (source)
997 		Fprintf(stderr, " from %s", source);
998 	Fprintf(stderr, ", %d hops max, %d byte packets\n", max_ttl, packlen);
999 	(void)fflush(stderr);
1000 
1001 	for (ttl = first_ttl; ttl <= max_ttl; ++ttl) {
1002 		u_int32_t lastaddr = 0;
1003 		int gotlastaddr = 0;
1004 		int got_there = 0;
1005 		int unreachable = 0;
1006 		int sentfirst = 0;
1007 		int loss;
1008 
1009 		Printf("%2d ", ttl);
1010 		for (probe = 0, loss = 0; probe < nprobes; ++probe) {
1011 			register int cc;
1012 			struct timeval t1, t2;
1013 			register struct ip *ip;
1014 			struct outdata outdata;
1015 
1016 			if (sentfirst && pausemsecs > 0)
1017 				usleep(pausemsecs * 1000);
1018 			/* Prepare outgoing data */
1019 			outdata.seq = ++seq;
1020 			outdata.ttl = ttl;
1021 
1022 			/* Avoid alignment problems by copying bytewise: */
1023 			(void)gettimeofday(&t1, NULL);
1024 			memcpy(&outdata.tv, &t1, sizeof(outdata.tv));
1025 
1026 			/* Finalize and send packet */
1027 			(*proto->prepare)(&outdata);
1028 			send_probe(seq, ttl);
1029 			++sentfirst;
1030 
1031 			/* Wait for a reply */
1032 			while ((cc = wait_for_reply(s, from, &t1)) != 0) {
1033 				double T;
1034 				int precis;
1035 
1036 				(void)gettimeofday(&t2, NULL);
1037 				i = packet_ok(packet, cc, from, seq);
1038 				/* Skip short packet */
1039 				if (i == 0)
1040 					continue;
1041 				if (!gotlastaddr ||
1042 				    from->sin_addr.s_addr != lastaddr) {
1043 					if (gotlastaddr)
1044 						printf("\n   ");
1045 					print(packet, cc, from);
1046 					lastaddr = from->sin_addr.s_addr;
1047 					++gotlastaddr;
1048 				}
1049 				T = deltaT(&t1, &t2);
1050 #ifdef SANE_PRECISION
1051 				if (T >= 1000.0)
1052 					precis = 0;
1053 				else if (T >= 100.0)
1054 					precis = 1;
1055 				else if (T >= 10.0)
1056 					precis = 2;
1057 				else
1058 #endif
1059 					precis = 3;
1060 				Printf("  %.*f ms", precis, T);
1061 				if (ecnflag) {
1062 					u_char ecn = hip->ip_tos & IPTOS_ECN_MASK;
1063 					switch (ecn) {
1064 					case IPTOS_ECN_ECT1:
1065 						Printf(" (ecn=passed)");
1066 						break;
1067 					case IPTOS_ECN_NOTECT:
1068 						Printf(" (ecn=bleached)");
1069 						break;
1070 					case IPTOS_ECN_CE:
1071 						Printf(" (ecn=congested)");
1072 						break;
1073 					default:
1074 						Printf(" (ecn=mangled)");
1075 						break;
1076 					}
1077 				}
1078 				if (printdiff) {
1079 					Printf("\n");
1080 					Printf("%*.*s%s\n",
1081 					    -(outip->ip_hl << 3),
1082 					    outip->ip_hl << 3,
1083 					    ip_hdr_key,
1084 					    proto->key);
1085 					pkt_compare((void *)outip, packlen,
1086 					    (void *)hip, hiplen);
1087 				}
1088 				if (i == -2) {
1089 #ifndef ARCHAIC
1090 					ip = (struct ip *)packet;
1091 					if (ip->ip_ttl <= 1)
1092 						Printf(" !");
1093 #endif
1094 					++got_there;
1095 					break;
1096 				}
1097 				/* time exceeded in transit */
1098 				if (i == -1)
1099 					break;
1100 				code = i - 1;
1101 				switch (code) {
1102 
1103 				case ICMP_UNREACH_PORT:
1104 #ifndef ARCHAIC
1105 					ip = (struct ip *)packet;
1106 					if (ip->ip_ttl <= 1)
1107 						Printf(" !");
1108 #endif
1109 					++got_there;
1110 					break;
1111 
1112 				case ICMP_UNREACH_NET:
1113 					++unreachable;
1114 					Printf(" !N");
1115 					break;
1116 
1117 				case ICMP_UNREACH_HOST:
1118 					++unreachable;
1119 					Printf(" !H");
1120 					break;
1121 
1122 				case ICMP_UNREACH_PROTOCOL:
1123 					++got_there;
1124 					Printf(" !P");
1125 					break;
1126 
1127 				case ICMP_UNREACH_NEEDFRAG:
1128 					++unreachable;
1129 					Printf(" !F-%d", pmtu);
1130 					break;
1131 
1132 				case ICMP_UNREACH_SRCFAIL:
1133 					++unreachable;
1134 					Printf(" !S");
1135 					break;
1136 
1137 				case ICMP_UNREACH_NET_UNKNOWN:
1138 					++unreachable;
1139 					Printf(" !U");
1140 					break;
1141 
1142 				case ICMP_UNREACH_HOST_UNKNOWN:
1143 					++unreachable;
1144 					Printf(" !W");
1145 					break;
1146 
1147 				case ICMP_UNREACH_ISOLATED:
1148 					++unreachable;
1149 					Printf(" !I");
1150 					break;
1151 
1152 				case ICMP_UNREACH_NET_PROHIB:
1153 					++unreachable;
1154 					Printf(" !A");
1155 					break;
1156 
1157 				case ICMP_UNREACH_HOST_PROHIB:
1158 					++unreachable;
1159 					Printf(" !Z");
1160 					break;
1161 
1162 				case ICMP_UNREACH_TOSNET:
1163 					++unreachable;
1164 					Printf(" !Q");
1165 					break;
1166 
1167 				case ICMP_UNREACH_TOSHOST:
1168 					++unreachable;
1169 					Printf(" !T");
1170 					break;
1171 
1172 				case ICMP_UNREACH_FILTER_PROHIB:
1173 					++unreachable;
1174 					Printf(" !X");
1175 					break;
1176 
1177 				case ICMP_UNREACH_HOST_PRECEDENCE:
1178 					++unreachable;
1179 					Printf(" !V");
1180 					break;
1181 
1182 				case ICMP_UNREACH_PRECEDENCE_CUTOFF:
1183 					++unreachable;
1184 					Printf(" !C");
1185 					break;
1186 
1187 				default:
1188 					++unreachable;
1189 					Printf(" !<%d>", code);
1190 					break;
1191 				}
1192 				break;
1193 			}
1194 			if (cc == 0) {
1195 				loss++;
1196 				Printf(" *");
1197 			}
1198 			(void)fflush(stdout);
1199 		}
1200 		if (sump) {
1201 			Printf(" (%d%% loss)", (loss * 100) / nprobes);
1202 		}
1203 		putchar('\n');
1204 		if (got_there ||
1205 		    (unreachable > 0 && unreachable >= nprobes - 1))
1206 			break;
1207 	}
1208 	if (as_path)
1209 		as_shutdown(asn);
1210 	exit(0);
1211 }
1212 
1213 int
1214 wait_for_reply(register int sock, register struct sockaddr_in *fromp,
1215     register const struct timeval *tp)
1216 {
1217 	fd_set *fdsp;
1218 	size_t nfds;
1219 	struct timeval now, wait;
1220 	register int cc = 0;
1221 	register int error;
1222 	int fromlen = sizeof(*fromp);
1223 
1224 	nfds = howmany(sock + 1, NFDBITS);
1225 	if ((fdsp = malloc(nfds * sizeof(fd_mask))) == NULL)
1226 		err(1, "malloc");
1227 	memset(fdsp, 0, nfds * sizeof(fd_mask));
1228 	FD_SET(sock, fdsp);
1229 
1230 	wait.tv_sec = tp->tv_sec + waittime;
1231 	wait.tv_usec = tp->tv_usec;
1232 	(void)gettimeofday(&now, NULL);
1233 	tvsub(&wait, &now);
1234 	if (wait.tv_sec < 0) {
1235 		wait.tv_sec = 0;
1236 		wait.tv_usec = 1;
1237 	}
1238 
1239 	error = select(sock + 1, fdsp, NULL, NULL, &wait);
1240 	if (error == -1 && errno == EINVAL) {
1241 		Fprintf(stderr, "%s: botched select() args\n", prog);
1242 		exit(1);
1243 	}
1244 	if (error > 0)
1245 		cc = recvfrom(sock, (char *)packet, sizeof(packet), 0,
1246 			    (struct sockaddr *)fromp, &fromlen);
1247 
1248 	free(fdsp);
1249 	return (cc);
1250 }
1251 
1252 void
1253 send_probe(int seq, int ttl)
1254 {
1255 	register int cc;
1256 
1257 	outip->ip_ttl = ttl;
1258 	outip->ip_id = htons(ident + seq);
1259 
1260 	/* XXX undocumented debugging hack */
1261 	if (verbose > 1) {
1262 		register const u_short *sp;
1263 		register int nshorts, i;
1264 
1265 		sp = (u_short *)outip;
1266 		nshorts = (u_int)packlen / sizeof(u_short);
1267 		i = 0;
1268 		Printf("[ %d bytes", packlen);
1269 		while (--nshorts >= 0) {
1270 			if ((i++ % 8) == 0)
1271 				Printf("\n\t");
1272 			Printf(" %04x", ntohs(*sp++));
1273 		}
1274 		if (packlen & 1) {
1275 			if ((i % 8) == 0)
1276 				Printf("\n\t");
1277 			Printf(" %02x", *(u_char *)sp);
1278 		}
1279 		Printf("]\n");
1280 	}
1281 
1282 #if !defined(IP_HDRINCL) && defined(IP_TTL)
1283 	if (setsockopt(sndsock, IPPROTO_IP, IP_TTL,
1284 	    (char *)&ttl, sizeof(ttl)) < 0) {
1285 		Fprintf(stderr, "%s: setsockopt ttl %d: %s\n",
1286 		    prog, ttl, strerror(errno));
1287 		exit(1);
1288 	}
1289 #endif
1290 
1291 	cc = send(sndsock, (char *)outip, packlen, 0);
1292 	if (cc < 0 || cc != packlen)  {
1293 		if (cc < 0)
1294 			Fprintf(stderr, "%s: sendto: %s\n",
1295 			    prog, strerror(errno));
1296 		Printf("%s: wrote %s %d chars, ret=%d\n",
1297 		    prog, hostname, packlen, cc);
1298 		(void)fflush(stdout);
1299 	}
1300 }
1301 
1302 #if	defined(IPSEC) && defined(IPSEC_POLICY_IPSEC)
1303 int
1304 setpolicy(int so, char *policy)
1305 {
1306 	char *buf;
1307 
1308 	buf = ipsec_set_policy(policy, strlen(policy));
1309 	if (buf == NULL) {
1310 		warnx("%s", ipsec_strerror());
1311 		return (-1);
1312 	}
1313 	(void)setsockopt(so, IPPROTO_IP, IP_IPSEC_POLICY,
1314 		buf, ipsec_get_policylen(buf));
1315 
1316 	free(buf);
1317 
1318 	return (0);
1319 }
1320 #endif
1321 
1322 double
1323 deltaT(struct timeval *t1p, struct timeval *t2p)
1324 {
1325 	register double dt;
1326 
1327 	dt = (double)(t2p->tv_sec - t1p->tv_sec) * 1000.0 +
1328 	     (double)(t2p->tv_usec - t1p->tv_usec) / 1000.0;
1329 	return (dt);
1330 }
1331 
1332 /*
1333  * Convert an ICMP "type" field to a printable string.
1334  */
1335 char *
1336 pr_type(register u_char t)
1337 {
1338 	static char *ttab[] = {
1339 	"Echo Reply",	"ICMP 1",	"ICMP 2",	"Dest Unreachable",
1340 	"Source Quench", "Redirect",	"ICMP 6",	"ICMP 7",
1341 	"Echo",		"ICMP 9",	"ICMP 10",	"Time Exceeded",
1342 	"Param Problem", "Timestamp",	"Timestamp Reply", "Info Request",
1343 	"Info Reply"
1344 	};
1345 
1346 	if (t > 16)
1347 		return ("OUT-OF-RANGE");
1348 
1349 	return (ttab[t]);
1350 }
1351 
1352 int
1353 packet_ok(register u_char *buf, int cc, register struct sockaddr_in *from,
1354     register int seq)
1355 {
1356 	register struct icmp *icp;
1357 	register u_char type, code;
1358 	register int hlen;
1359 #ifndef ARCHAIC
1360 	register struct ip *ip;
1361 
1362 	ip = (struct ip *) buf;
1363 	hlen = ip->ip_hl << 2;
1364 	if (cc < hlen + ICMP_MINLEN) {
1365 		if (verbose)
1366 			Printf("packet too short (%d bytes) from %s\n", cc,
1367 				inet_ntoa(from->sin_addr));
1368 		return (0);
1369 	}
1370 	cc -= hlen;
1371 	icp = (struct icmp *)(buf + hlen);
1372 #else
1373 	icp = (struct icmp *)buf;
1374 #endif
1375 	type = icp->icmp_type;
1376 	code = icp->icmp_code;
1377 	/* Path MTU Discovery (RFC1191) */
1378 	if (code != ICMP_UNREACH_NEEDFRAG)
1379 		pmtu = 0;
1380 	else {
1381 		pmtu = ntohs(icp->icmp_nextmtu);
1382 	}
1383 	if (type == ICMP_ECHOREPLY
1384 	    && proto->num == IPPROTO_ICMP
1385 	    && (*proto->check)((u_char *)icp, (u_char)seq))
1386 		return (-2);
1387 	if ((type == ICMP_TIMXCEED && code == ICMP_TIMXCEED_INTRANS) ||
1388 	    type == ICMP_UNREACH) {
1389 		u_char *inner;
1390 
1391 		hip = &icp->icmp_ip;
1392 		hiplen = ((u_char *)icp + cc) - (u_char *)hip;
1393 		hlen = hip->ip_hl << 2;
1394 		inner = (u_char *)((u_char *)hip + hlen);
1395 		if (hlen + 16 <= cc
1396 		    && hip->ip_p == proto->num
1397 		    && (*proto->check)(inner, (u_char)seq))
1398 			return (type == ICMP_TIMXCEED ? -1 : code + 1);
1399 	}
1400 #ifndef ARCHAIC
1401 	if (verbose) {
1402 		register int i;
1403 		u_int32_t *lp = (u_int32_t *)&icp->icmp_ip;
1404 
1405 		Printf("\n%d bytes from %s to ", cc, inet_ntoa(from->sin_addr));
1406 		Printf("%s: icmp type %d (%s) code %d\n",
1407 		    inet_ntoa(ip->ip_dst), type, pr_type(type), icp->icmp_code);
1408 		for (i = 4; i <= cc - ICMP_MINLEN; i += sizeof(*lp))
1409 			Printf("%2d: %8.8x\n", i, ntohl(*lp++));
1410 	}
1411 #endif
1412 	return (0);
1413 }
1414 
1415 void
1416 icmp_prep(struct outdata *outdata)
1417 {
1418 	struct icmp *const icmpheader = (struct icmp *) outp;
1419 
1420 	icmpheader->icmp_type = ICMP_ECHO;
1421 	icmpheader->icmp_id = htons(ident);
1422 	icmpheader->icmp_seq = htons(outdata->seq);
1423 	icmpheader->icmp_cksum = 0;
1424 	icmpheader->icmp_cksum = in_cksum((u_short *)icmpheader, protlen);
1425 	if (icmpheader->icmp_cksum == 0)
1426 		icmpheader->icmp_cksum = 0xffff;
1427 }
1428 
1429 int
1430 icmp_check(const u_char *data, int seq)
1431 {
1432 	struct icmp *const icmpheader = (struct icmp *) data;
1433 
1434 	return (icmpheader->icmp_id == htons(ident)
1435 	    && icmpheader->icmp_seq == htons(seq));
1436 }
1437 
1438 void
1439 udp_prep(struct outdata *outdata)
1440 {
1441 	struct udphdr *const outudp = (struct udphdr *) outp;
1442 
1443 	outudp->uh_sport = htons(ident + (fixedPort ? outdata->seq : 0));
1444 	outudp->uh_dport = htons(port + (fixedPort ? 0 : outdata->seq));
1445 	outudp->uh_ulen = htons((u_short)protlen);
1446 	outudp->uh_sum = 0;
1447 	if (doipcksum) {
1448 	    u_short sum = p_cksum(outip, (u_short *)outudp, protlen, protlen);
1449 	    outudp->uh_sum = (sum) ? sum : 0xffff;
1450 	}
1451 
1452 	return;
1453 }
1454 
1455 int
1456 udp_check(const u_char *data, int seq)
1457 {
1458 	struct udphdr *const udp = (struct udphdr *) data;
1459 
1460 	return (ntohs(udp->uh_sport) == ident + (fixedPort ? seq : 0) &&
1461 	    ntohs(udp->uh_dport) == port + (fixedPort ? 0 : seq));
1462 }
1463 
1464 void
1465 udplite_prep(struct outdata *outdata)
1466 {
1467 	struct udphdr *const outudp = (struct udphdr *) outp;
1468 
1469 	outudp->uh_sport = htons(ident + (fixedPort ? outdata->seq : 0));
1470 	outudp->uh_dport = htons(port + (fixedPort ? 0 : outdata->seq));
1471 	outudp->uh_ulen = htons(8);
1472 	outudp->uh_sum = 0;
1473 	if (doipcksum) {
1474 	    u_short sum = p_cksum(outip, (u_short *)outudp, protlen, 8);
1475 	    outudp->uh_sum = (sum) ? sum : 0xffff;
1476 	}
1477 
1478 	return;
1479 }
1480 
1481 int
1482 udplite_check(const u_char *data, int seq)
1483 {
1484 	struct udphdr *const udp = (struct udphdr *) data;
1485 
1486 	return (ntohs(udp->uh_sport) == ident + (fixedPort ? seq : 0) &&
1487 	    ntohs(udp->uh_dport) == port + (fixedPort ? 0 : seq));
1488 }
1489 
1490 void
1491 tcp_prep(struct outdata *outdata)
1492 {
1493 	struct tcphdr *const tcp = (struct tcphdr *) outp;
1494 
1495 	tcp->th_sport = htons(ident);
1496 	tcp->th_dport = htons(port + (fixedPort ? 0 : outdata->seq));
1497 	tcp->th_seq = (tcp->th_sport << 16) | tcp->th_dport;
1498 	tcp->th_ack = 0;
1499 	tcp->th_off = 5;
1500 	__tcp_set_flags(tcp, TH_SYN);
1501 	tcp->th_sum = 0;
1502 
1503 	if (doipcksum)
1504 	    tcp->th_sum = p_cksum(outip, (u_short *)tcp, protlen, protlen);
1505 }
1506 
1507 int
1508 tcp_check(const u_char *data, int seq)
1509 {
1510 	struct tcphdr *const tcp = (struct tcphdr *) data;
1511 
1512 	return (ntohs(tcp->th_sport) == ident
1513 	    && ntohs(tcp->th_dport) == port + (fixedPort ? 0 : seq)
1514 	    && tcp->th_seq == (tcp_seq)((tcp->th_sport << 16) | tcp->th_dport));
1515 }
1516 
1517 void
1518 sctp_prep(struct outdata *outdata)
1519 {
1520 	struct sctphdr *const sctp = (struct sctphdr *) outp;
1521 	struct sctp_chunkhdr *chk;
1522 	struct sctp_init_chunk *init;
1523 	struct sctp_paramhdr *param;
1524 
1525 	sctp->src_port = htons(ident);
1526 	sctp->dest_port = htons(port + (fixedPort ? 0 : outdata->seq));
1527 	if (protlen >= (int)(sizeof(struct sctphdr) +
1528 	    sizeof(struct sctp_init_chunk))) {
1529 		sctp->v_tag = 0;
1530 	} else {
1531 		sctp->v_tag = (sctp->src_port << 16) | sctp->dest_port;
1532 	}
1533 	sctp->checksum = htonl(0);
1534 	if (protlen >= (int)(sizeof(struct sctphdr) +
1535 	    sizeof(struct sctp_init_chunk))) {
1536 		/*
1537 		 * Send a packet containing an INIT chunk. This works
1538 		 * better in case of firewalls on the path, but
1539 		 * results in a probe packet containing at least
1540 		 * 32 bytes of payload. For shorter payloads, use
1541 		 * SHUTDOWN-ACK chunks.
1542 		 */
1543 		init = (struct sctp_init_chunk *)(sctp + 1);
1544 		init->ch.chunk_type = SCTP_INITIATION;
1545 		init->ch.chunk_flags = 0;
1546 		init->ch.chunk_length = htons((u_int16_t)(protlen -
1547 		    sizeof(struct sctphdr)));
1548 		init->init.initiate_tag = (sctp->src_port << 16) |
1549 		    sctp->dest_port;
1550 		init->init.a_rwnd = htonl(1500);
1551 		init->init.num_outbound_streams = htons(1);
1552 		init->init.num_inbound_streams = htons(1);
1553 		init->init.initial_tsn = htonl(0);
1554 		if (protlen >= (int)(sizeof(struct sctphdr) +
1555 		    sizeof(struct sctp_init_chunk) +
1556 		    sizeof(struct sctp_paramhdr))) {
1557 			param = (struct sctp_paramhdr *)(init + 1);
1558 			param->param_type = htons(SCTP_PAD);
1559 			param->param_length =
1560 			    htons((u_int16_t)(protlen -
1561 			    sizeof(struct sctphdr) -
1562 			    sizeof(struct sctp_init_chunk)));
1563 		}
1564 	} else {
1565 		/*
1566 		 * Send a packet containing a SHUTDOWN-ACK chunk,
1567 		 * possibly followed by a PAD chunk.
1568 		 */
1569 		if (protlen >=
1570 		    (int)(sizeof(struct sctphdr) +
1571 		    sizeof(struct sctp_chunkhdr))) {
1572 			chk = (struct sctp_chunkhdr *)(sctp + 1);
1573 			chk->chunk_type = SCTP_SHUTDOWN_ACK;
1574 			chk->chunk_flags = 0;
1575 			chk->chunk_length = htons(4);
1576 		}
1577 		if (protlen >=
1578 		    (int)(sizeof(struct sctphdr) +
1579 		    2 * sizeof(struct sctp_chunkhdr))) {
1580 			chk = chk + 1;
1581 			chk->chunk_type = SCTP_PAD_CHUNK;
1582 			chk->chunk_flags = 0;
1583 			chk->chunk_length = htons(protlen -
1584 			    (sizeof(struct sctphdr) + sizeof(struct sctp_chunkhdr)));
1585 		}
1586 	}
1587 	if (doipcksum) {
1588 		sctp->checksum = sctp_crc32c(sctp, protlen);
1589 	}
1590 }
1591 
1592 int
1593 sctp_check(const u_char *data, int seq)
1594 {
1595 	struct sctphdr *const sctp = (struct sctphdr *) data;
1596 
1597 	if (ntohs(sctp->src_port) != ident ||
1598 	    ntohs(sctp->dest_port) != port + (fixedPort ? 0 : seq))
1599 		return (0);
1600 	if (protlen < (int)(sizeof(struct sctphdr) +
1601 	    sizeof(struct sctp_init_chunk))) {
1602 		return (sctp->v_tag ==
1603 		    (u_int32_t)((sctp->src_port << 16) | sctp->dest_port));
1604 	} else {
1605 		/*
1606 		 * Don't verify the initiate_tag, since it is not available,
1607 		 * most of the time.
1608 		 */
1609 		return (sctp->v_tag == 0);
1610 	}
1611 }
1612 
1613 void
1614 gre_prep(struct outdata *outdata)
1615 {
1616 	struct grehdr *const gre = (struct grehdr *) outp;
1617 
1618 	gre->flags = htons(0x2001);
1619 	gre->proto = htons(port);
1620 	gre->length = 0;
1621 	gre->callId = htons(ident + outdata->seq);
1622 }
1623 
1624 int
1625 gre_check(const u_char *data, int seq)
1626 {
1627 	struct grehdr *const gre = (struct grehdr *) data;
1628 
1629 	return (ntohs(gre->proto) == port
1630 	    && ntohs(gre->callId) == ident + seq);
1631 }
1632 
1633 void
1634 gen_prep(struct outdata *outdata)
1635 {
1636 	u_int16_t *const ptr = (u_int16_t *) outp;
1637 
1638 	ptr[0] = htons(ident);
1639 	ptr[1] = htons(port + outdata->seq);
1640 }
1641 
1642 int
1643 gen_check(const u_char *data, int seq)
1644 {
1645 	u_int16_t *const ptr = (u_int16_t *) data;
1646 
1647 	return (ntohs(ptr[0]) == ident
1648 	    && ntohs(ptr[1]) == port + seq);
1649 }
1650 
1651 void
1652 print(register u_char *buf, register int cc, register struct sockaddr_in *from)
1653 {
1654 	register struct ip *ip;
1655 	register int hlen;
1656 	char addr[INET_ADDRSTRLEN];
1657 
1658 	ip = (struct ip *) buf;
1659 	hlen = ip->ip_hl << 2;
1660 	cc -= hlen;
1661 
1662 	strlcpy(addr, inet_ntoa(from->sin_addr), sizeof(addr));
1663 
1664 	if (as_path)
1665 		Printf(" [AS%u]", as_lookup(asn, addr, AF_INET));
1666 
1667 	if (nflag)
1668 		Printf(" %s", addr);
1669 	else
1670 		Printf(" %s (%s)", inetname(from->sin_addr), addr);
1671 
1672 	if (verbose)
1673 		Printf(" %d bytes to %s", cc, inet_ntoa(ip->ip_dst));
1674 }
1675 
1676 /*
1677  * Checksum routine for UDP and TCP headers.
1678  */
1679 u_short
1680 p_cksum(struct ip *ip, u_short *data, int len, int cov)
1681 {
1682 	static struct ipovly ipo;
1683 	u_short sum[2];
1684 
1685 	ipo.ih_pr = ip->ip_p;
1686 	ipo.ih_len = htons(len);
1687 	ipo.ih_src = ip->ip_src;
1688 	ipo.ih_dst = ip->ip_dst;
1689 
1690 	sum[1] = in_cksum((u_short *)&ipo, sizeof(ipo)); /* pseudo ip hdr cksum */
1691 	sum[0] = in_cksum(data, cov);                    /* payload data cksum */
1692 
1693 	return (~in_cksum(sum, sizeof(sum)));
1694 }
1695 
1696 /*
1697  * Checksum routine for Internet Protocol family headers (C Version)
1698  */
1699 u_short
1700 in_cksum(register u_short *addr, register int len)
1701 {
1702 	register int nleft = len;
1703 	register u_short *w = addr;
1704 	register u_short answer;
1705 	register int sum = 0;
1706 
1707 	/*
1708 	 *  Our algorithm is simple, using a 32 bit accumulator (sum),
1709 	 *  we add sequential 16 bit words to it, and at the end, fold
1710 	 *  back all the carry bits from the top 16 bits into the lower
1711 	 *  16 bits.
1712 	 */
1713 	while (nleft > 1)  {
1714 		sum += *w++;
1715 		nleft -= 2;
1716 	}
1717 
1718 	/* mop up an odd byte, if necessary */
1719 	if (nleft == 1)
1720 		sum += *(u_char *)w;
1721 
1722 	/*
1723 	 * add back carry outs from top 16 bits to low 16 bits
1724 	 */
1725 	sum = (sum >> 16) + (sum & 0xffff);	/* add hi 16 to low 16 */
1726 	sum += (sum >> 16);			/* add carry */
1727 	answer = ~sum;				/* truncate to 16 bits */
1728 	return (answer);
1729 }
1730 
1731 /*
1732  * CRC32C routine for the Stream Control Transmission Protocol
1733  */
1734 
1735 #define CRC32C(c, d) (c = (c >> 8) ^ crc_c[(c ^ (d)) & 0xFF])
1736 
1737 static u_int32_t crc_c[256] = {
1738 	0x00000000, 0xF26B8303, 0xE13B70F7, 0x1350F3F4,
1739 	0xC79A971F, 0x35F1141C, 0x26A1E7E8, 0xD4CA64EB,
1740 	0x8AD958CF, 0x78B2DBCC, 0x6BE22838, 0x9989AB3B,
1741 	0x4D43CFD0, 0xBF284CD3, 0xAC78BF27, 0x5E133C24,
1742 	0x105EC76F, 0xE235446C, 0xF165B798, 0x030E349B,
1743 	0xD7C45070, 0x25AFD373, 0x36FF2087, 0xC494A384,
1744 	0x9A879FA0, 0x68EC1CA3, 0x7BBCEF57, 0x89D76C54,
1745 	0x5D1D08BF, 0xAF768BBC, 0xBC267848, 0x4E4DFB4B,
1746 	0x20BD8EDE, 0xD2D60DDD, 0xC186FE29, 0x33ED7D2A,
1747 	0xE72719C1, 0x154C9AC2, 0x061C6936, 0xF477EA35,
1748 	0xAA64D611, 0x580F5512, 0x4B5FA6E6, 0xB93425E5,
1749 	0x6DFE410E, 0x9F95C20D, 0x8CC531F9, 0x7EAEB2FA,
1750 	0x30E349B1, 0xC288CAB2, 0xD1D83946, 0x23B3BA45,
1751 	0xF779DEAE, 0x05125DAD, 0x1642AE59, 0xE4292D5A,
1752 	0xBA3A117E, 0x4851927D, 0x5B016189, 0xA96AE28A,
1753 	0x7DA08661, 0x8FCB0562, 0x9C9BF696, 0x6EF07595,
1754 	0x417B1DBC, 0xB3109EBF, 0xA0406D4B, 0x522BEE48,
1755 	0x86E18AA3, 0x748A09A0, 0x67DAFA54, 0x95B17957,
1756 	0xCBA24573, 0x39C9C670, 0x2A993584, 0xD8F2B687,
1757 	0x0C38D26C, 0xFE53516F, 0xED03A29B, 0x1F682198,
1758 	0x5125DAD3, 0xA34E59D0, 0xB01EAA24, 0x42752927,
1759 	0x96BF4DCC, 0x64D4CECF, 0x77843D3B, 0x85EFBE38,
1760 	0xDBFC821C, 0x2997011F, 0x3AC7F2EB, 0xC8AC71E8,
1761 	0x1C661503, 0xEE0D9600, 0xFD5D65F4, 0x0F36E6F7,
1762 	0x61C69362, 0x93AD1061, 0x80FDE395, 0x72966096,
1763 	0xA65C047D, 0x5437877E, 0x4767748A, 0xB50CF789,
1764 	0xEB1FCBAD, 0x197448AE, 0x0A24BB5A, 0xF84F3859,
1765 	0x2C855CB2, 0xDEEEDFB1, 0xCDBE2C45, 0x3FD5AF46,
1766 	0x7198540D, 0x83F3D70E, 0x90A324FA, 0x62C8A7F9,
1767 	0xB602C312, 0x44694011, 0x5739B3E5, 0xA55230E6,
1768 	0xFB410CC2, 0x092A8FC1, 0x1A7A7C35, 0xE811FF36,
1769 	0x3CDB9BDD, 0xCEB018DE, 0xDDE0EB2A, 0x2F8B6829,
1770 	0x82F63B78, 0x709DB87B, 0x63CD4B8F, 0x91A6C88C,
1771 	0x456CAC67, 0xB7072F64, 0xA457DC90, 0x563C5F93,
1772 	0x082F63B7, 0xFA44E0B4, 0xE9141340, 0x1B7F9043,
1773 	0xCFB5F4A8, 0x3DDE77AB, 0x2E8E845F, 0xDCE5075C,
1774 	0x92A8FC17, 0x60C37F14, 0x73938CE0, 0x81F80FE3,
1775 	0x55326B08, 0xA759E80B, 0xB4091BFF, 0x466298FC,
1776 	0x1871A4D8, 0xEA1A27DB, 0xF94AD42F, 0x0B21572C,
1777 	0xDFEB33C7, 0x2D80B0C4, 0x3ED04330, 0xCCBBC033,
1778 	0xA24BB5A6, 0x502036A5, 0x4370C551, 0xB11B4652,
1779 	0x65D122B9, 0x97BAA1BA, 0x84EA524E, 0x7681D14D,
1780 	0x2892ED69, 0xDAF96E6A, 0xC9A99D9E, 0x3BC21E9D,
1781 	0xEF087A76, 0x1D63F975, 0x0E330A81, 0xFC588982,
1782 	0xB21572C9, 0x407EF1CA, 0x532E023E, 0xA145813D,
1783 	0x758FE5D6, 0x87E466D5, 0x94B49521, 0x66DF1622,
1784 	0x38CC2A06, 0xCAA7A905, 0xD9F75AF1, 0x2B9CD9F2,
1785 	0xFF56BD19, 0x0D3D3E1A, 0x1E6DCDEE, 0xEC064EED,
1786 	0xC38D26C4, 0x31E6A5C7, 0x22B65633, 0xD0DDD530,
1787 	0x0417B1DB, 0xF67C32D8, 0xE52CC12C, 0x1747422F,
1788 	0x49547E0B, 0xBB3FFD08, 0xA86F0EFC, 0x5A048DFF,
1789 	0x8ECEE914, 0x7CA56A17, 0x6FF599E3, 0x9D9E1AE0,
1790 	0xD3D3E1AB, 0x21B862A8, 0x32E8915C, 0xC083125F,
1791 	0x144976B4, 0xE622F5B7, 0xF5720643, 0x07198540,
1792 	0x590AB964, 0xAB613A67, 0xB831C993, 0x4A5A4A90,
1793 	0x9E902E7B, 0x6CFBAD78, 0x7FAB5E8C, 0x8DC0DD8F,
1794 	0xE330A81A, 0x115B2B19, 0x020BD8ED, 0xF0605BEE,
1795 	0x24AA3F05, 0xD6C1BC06, 0xC5914FF2, 0x37FACCF1,
1796 	0x69E9F0D5, 0x9B8273D6, 0x88D28022, 0x7AB90321,
1797 	0xAE7367CA, 0x5C18E4C9, 0x4F48173D, 0xBD23943E,
1798 	0xF36E6F75, 0x0105EC76, 0x12551F82, 0xE03E9C81,
1799 	0x34F4F86A, 0xC69F7B69, 0xD5CF889D, 0x27A40B9E,
1800 	0x79B737BA, 0x8BDCB4B9, 0x988C474D, 0x6AE7C44E,
1801 	0xBE2DA0A5, 0x4C4623A6, 0x5F16D052, 0xAD7D5351
1802 };
1803 
1804 u_int32_t
1805 sctp_crc32c(const void *packet, u_int32_t len)
1806 {
1807 	u_int32_t i, crc32c;
1808 	u_int8_t byte0, byte1, byte2, byte3;
1809 	const u_int8_t *buf = (const u_int8_t *)packet;
1810 
1811 	crc32c = ~0;
1812 	for (i = 0; i < len; i++)
1813 		CRC32C(crc32c, buf[i]);
1814 	crc32c = ~crc32c;
1815 	byte0  = crc32c & 0xff;
1816 	byte1  = (crc32c >> 8) & 0xff;
1817 	byte2  = (crc32c >> 16) & 0xff;
1818 	byte3  = (crc32c >> 24) & 0xff;
1819 	crc32c = ((byte0 << 24) | (byte1 << 16) | (byte2 << 8) | byte3);
1820 	return (htonl(crc32c));
1821 }
1822 
1823 /*
1824  * Subtract 2 timeval structs:  out = out - in.
1825  * Out is assumed to be within about LONG_MAX seconds of in.
1826  */
1827 void
1828 tvsub(register struct timeval *out, register struct timeval *in)
1829 {
1830 
1831 	if ((out->tv_usec -= in->tv_usec) < 0)   {
1832 		--out->tv_sec;
1833 		out->tv_usec += 1000000;
1834 	}
1835 	out->tv_sec -= in->tv_sec;
1836 }
1837 
1838 /*
1839  * Construct an Internet address representation.
1840  * If the nflag has been supplied, give
1841  * numeric value, otherwise try for symbolic name.
1842  */
1843 char *
1844 inetname(struct in_addr in)
1845 {
1846 	register char *cp;
1847 	register struct hostent *hp;
1848 	static int first = 1;
1849 	static char domain[MAXHOSTNAMELEN + 1], line[MAXHOSTNAMELEN + 1];
1850 
1851 	if (first && !nflag) {
1852 		first = 0;
1853 		if (gethostname(domain, sizeof(domain) - 1) < 0)
1854 			domain[0] = '\0';
1855 		else {
1856 			cp = strchr(domain, '.');
1857 			if (cp == NULL) {
1858 #ifdef WITH_CASPER
1859 				if (capdns != NULL)
1860 					hp = cap_gethostbyname(capdns, domain);
1861 				else
1862 #endif
1863 					hp = gethostbyname(domain);
1864 				if (hp != NULL)
1865 					cp = strchr(hp->h_name, '.');
1866 			}
1867 			if (cp == NULL)
1868 				domain[0] = '\0';
1869 			else {
1870 				++cp;
1871 				(void)strncpy(domain, cp, sizeof(domain) - 1);
1872 				domain[sizeof(domain) - 1] = '\0';
1873 			}
1874 		}
1875 	}
1876 	if (!nflag && in.s_addr != INADDR_ANY) {
1877 #ifdef WITH_CASPER
1878 		if (capdns != NULL)
1879 			hp = cap_gethostbyaddr(capdns, (char *)&in, sizeof(in),
1880 			    AF_INET);
1881 		else
1882 #endif
1883 			hp = gethostbyaddr((char *)&in, sizeof(in), AF_INET);
1884 		if (hp != NULL) {
1885 			if ((cp = strchr(hp->h_name, '.')) != NULL &&
1886 			    strcmp(cp + 1, domain) == 0)
1887 				*cp = '\0';
1888 			(void)strncpy(line, hp->h_name, sizeof(line) - 1);
1889 			line[sizeof(line) - 1] = '\0';
1890 			return (line);
1891 		}
1892 	}
1893 	return (inet_ntoa(in));
1894 }
1895 
1896 struct hostinfo *
1897 gethostinfo(register char *hostname)
1898 {
1899 	register int n;
1900 	register struct hostent *hp;
1901 	register struct hostinfo *hi;
1902 	register char **p;
1903 	register u_int32_t addr, *ap;
1904 
1905 	if (strlen(hostname) >= MAXHOSTNAMELEN) {
1906 		Fprintf(stderr, "%s: hostname \"%.32s...\" is too long\n",
1907 		    prog, hostname);
1908 		exit(1);
1909 	}
1910 	hi = calloc(1, sizeof(*hi));
1911 	if (hi == NULL) {
1912 		Fprintf(stderr, "%s: calloc %s\n", prog, strerror(errno));
1913 		exit(1);
1914 	}
1915 	addr = inet_addr(hostname);
1916 	if ((int32_t)addr != -1) {
1917 		hi->name = strdup(hostname);
1918 		hi->n = 1;
1919 		hi->addrs = calloc(1, sizeof(hi->addrs[0]));
1920 		if (hi->addrs == NULL) {
1921 			Fprintf(stderr, "%s: calloc %s\n",
1922 			    prog, strerror(errno));
1923 			exit(1);
1924 		}
1925 		hi->addrs[0] = addr;
1926 		return (hi);
1927 	}
1928 
1929 #ifdef WITH_CASPER
1930 	if (capdns != NULL)
1931 		hp = cap_gethostbyname(capdns, hostname);
1932 	else
1933 #endif
1934 		hp = gethostbyname(hostname);
1935 	if (hp == NULL) {
1936 		Fprintf(stderr, "%s: unknown host %s\n", prog, hostname);
1937 		exit(1);
1938 	}
1939 	if (hp->h_addrtype != AF_INET || hp->h_length != 4) {
1940 		Fprintf(stderr, "%s: bad host %s\n", prog, hostname);
1941 		exit(1);
1942 	}
1943 	hi->name = strdup(hp->h_name);
1944 	for (n = 0, p = hp->h_addr_list; *p != NULL; ++n, ++p)
1945 		continue;
1946 	hi->n = n;
1947 	hi->addrs = calloc(n, sizeof(hi->addrs[0]));
1948 	if (hi->addrs == NULL) {
1949 		Fprintf(stderr, "%s: calloc %s\n", prog, strerror(errno));
1950 		exit(1);
1951 	}
1952 	for (ap = hi->addrs, p = hp->h_addr_list; *p != NULL; ++ap, ++p)
1953 		memcpy(ap, *p, sizeof(*ap));
1954 	return (hi);
1955 }
1956 
1957 void
1958 freehostinfo(register struct hostinfo *hi)
1959 {
1960 	if (hi->name != NULL) {
1961 		free(hi->name);
1962 		hi->name = NULL;
1963 	}
1964 	free((char *)hi->addrs);
1965 	free((char *)hi);
1966 }
1967 
1968 void
1969 getaddr(register u_int32_t *ap, register char *hostname)
1970 {
1971 	register struct hostinfo *hi;
1972 
1973 	hi = gethostinfo(hostname);
1974 	*ap = hi->addrs[0];
1975 	freehostinfo(hi);
1976 }
1977 
1978 void
1979 setsin(register struct sockaddr_in *sin, register u_int32_t addr)
1980 {
1981 
1982 	memset(sin, 0, sizeof(*sin));
1983 	sin->sin_len = sizeof(*sin);
1984 	sin->sin_family = AF_INET;
1985 	sin->sin_addr.s_addr = addr;
1986 }
1987 
1988 /* String to value with optional min and max. Handles decimal and hex. */
1989 int
1990 str2val(register const char *str, register const char *what,
1991     register int mi, register int ma)
1992 {
1993 	register const char *cp;
1994 	register int val;
1995 	char *ep;
1996 
1997 	if (str[0] == '0' && (str[1] == 'x' || str[1] == 'X')) {
1998 		cp = str + 2;
1999 		val = (int)strtol(cp, &ep, 16);
2000 	} else
2001 		val = (int)strtol(str, &ep, 10);
2002 	if (*ep != '\0') {
2003 		Fprintf(stderr, "%s: \"%s\" bad value for %s\n",
2004 		    prog, str, what);
2005 		exit(1);
2006 	}
2007 	if (val < mi && mi >= 0) {
2008 		if (mi == 0)
2009 			Fprintf(stderr, "%s: %s must be >= %d\n",
2010 			    prog, what, mi);
2011 		else
2012 			Fprintf(stderr, "%s: %s must be > %d\n",
2013 			    prog, what, mi - 1);
2014 		exit(1);
2015 	}
2016 	if (val > ma && ma >= 0) {
2017 		Fprintf(stderr, "%s: %s must be <= %d\n", prog, what, ma);
2018 		exit(1);
2019 	}
2020 	return (val);
2021 }
2022 
2023 struct outproto *
2024 setproto(char *pname)
2025 {
2026 	struct outproto *proto;
2027 	int i;
2028 
2029 	for (i = 0; protos[i].name != NULL; i++) {
2030 		if (strcasecmp(protos[i].name, pname) == 0) {
2031 			break;
2032 		}
2033 	}
2034 	proto = &protos[i];
2035 	if (proto->name == NULL) {	/* generic handler */
2036 		struct protoent *pe;
2037 		u_long pnum;
2038 
2039 		/* Determine the IP protocol number */
2040 		if ((pe = getprotobyname(pname)) != NULL)
2041 			pnum = pe->p_proto;
2042 		else
2043 			pnum = str2val(optarg, "proto number", 1, 255);
2044 		proto->num = pnum;
2045 	}
2046 	return (proto);
2047 }
2048 
2049 void
2050 pkt_compare(const u_char *a, int la, const u_char *b, int lb) {
2051 	int l;
2052 	int i;
2053 
2054 	for (i = 0; i < la; i++)
2055 		Printf("%02x", (unsigned int)a[i]);
2056 	Printf("\n");
2057 	l = (la <= lb) ? la : lb;
2058 	for (i = 0; i < l; i++)
2059 		if (a[i] == b[i])
2060 			Printf("__");
2061 		else
2062 			Printf("%02x", (unsigned int)b[i]);
2063 	for (; i < lb; i++)
2064 		Printf("%02x", (unsigned int)b[i]);
2065 	Printf("\n");
2066 }
2067 
2068 
2069 void
2070 usage(void)
2071 {
2072 	Fprintf(stderr,
2073 	    "Usage: %s [-adDeEFInrSvx] [-A as_server] [-f first_ttl] [-g gateway]\n"
2074 	    "\t[-i iface] [-m max_ttl] [-M first_ttl] [-p port] [-P proto]\n"
2075 	    "\t[-q nprobes] [-s src_addr] [-t tos] [-w waittime]\n"
2076 	    "\t[-z pausemsecs] host [packetlen]\n", prog);
2077 	exit(1);
2078 }
2079