Not worth getting right, don't want to see the errors either
[unix-history] / usr / src / sbin / ifconfig / ifconfig.c
CommitLineData
0fd5cf4f
MK
1/*
2 * Copyright (c) 1983 Regents of the University of California.
40c992d9
KB
3 * All rights reserved.
4 *
70ab3c27 5 * %sccs.include.redist.c%
0fd5cf4f
MK
6 */
7
b3eab9f9 8#ifndef lint
0fd5cf4f
MK
9char copyright[] =
10"@(#) Copyright (c) 1983 Regents of the University of California.\n\
11 All rights reserved.\n";
40c992d9 12#endif /* not lint */
0fd5cf4f
MK
13
14#ifndef lint
777e2fd1 15static char sccsid[] = "@(#)ifconfig.c 4.30 (Berkeley) %G%";
40c992d9 16#endif /* not lint */
0fd5cf4f 17
b3eab9f9
SL
18#include <sys/types.h>
19#include <sys/socket.h>
20#include <sys/ioctl.h>
21
b3eab9f9 22#include <net/if.h>
62e9bc4a
KS
23#include <netinet/in.h>
24
25#define NSIP
26#include <netns/ns.h>
27#include <netns/ns_if.h>
b3eab9f9 28
22b2b267 29#define EON
59c3b7d8
KS
30#include <netiso/iso.h>
31#include <netiso/iso_var.h>
22b2b267 32#include <sys/protosw.h>
59c3b7d8 33
b3eab9f9
SL
34#include <stdio.h>
35#include <errno.h>
36#include <ctype.h>
37#include <netdb.h>
38
62e9bc4a 39extern int errno;
59c3b7d8
KS
40struct ifreq ifr, ridreq;
41struct ifaliasreq addreq;
42struct iso_ifreq iso_ridreq;
ffdba101 43struct iso_aliasreq iso_addreq;
59c3b7d8
KS
44struct sockaddr_in netmask;
45
b3eab9f9 46char name[30];
0fd5cf4f 47int flags;
f5f09b9d 48int metric;
ffdba101 49int nsellength = 1;
dea973a0 50int setaddr;
62e9bc4a 51int setipdst;
59c3b7d8 52int doalias;
22b2b267 53int clearaddr;
59c3b7d8 54int newaddr = 1;
b3eab9f9 55int s;
0fd5cf4f
MK
56extern int errno;
57
58int setifflags(), setifaddr(), setifdstaddr(), setifnetmask();
f5f09b9d 59int setifmetric(), setifbroadaddr(), setifipdst();
42f9d80e 60int notealias(), setsnpaoffset(), setnsellength();
b3eab9f9 61
0fd5cf4f 62#define NEXTARG 0xffffff
b3eab9f9
SL
63
64struct cmd {
65 char *c_name;
0fd5cf4f 66 int c_parameter; /* NEXTARG means next argv */
b3eab9f9
SL
67 int (*c_func)();
68} cmds[] = {
69 { "up", IFF_UP, setifflags } ,
70 { "down", -IFF_UP, setifflags },
71 { "trailers", -IFF_NOTRAILERS,setifflags },
72 { "-trailers", IFF_NOTRAILERS, setifflags },
1095926d
MK
73 { "arp", -IFF_NOARP, setifflags },
74 { "-arp", IFF_NOARP, setifflags },
717eb130
CL
75 { "debug", IFF_DEBUG, setifflags },
76 { "-debug", -IFF_DEBUG, setifflags },
59c3b7d8
KS
77 { "alias", IFF_UP, notealias },
78 { "-alias", -IFF_UP, notealias },
79 { "delete", -IFF_UP, notealias },
a390ced5 80#ifdef notdef
0fd5cf4f 81#define EN_SWABIPS 0x1000
a390ced5
SL
82 { "swabips", EN_SWABIPS, setifflags },
83 { "-swabips", -EN_SWABIPS, setifflags },
84#endif
0fd5cf4f 85 { "netmask", NEXTARG, setifnetmask },
f5f09b9d 86 { "metric", NEXTARG, setifmetric },
0fd5cf4f 87 { "broadcast", NEXTARG, setifbroadaddr },
62e9bc4a 88 { "ipdst", NEXTARG, setifipdst },
42f9d80e
KS
89 { "snpaoffset", NEXTARG, setsnpaoffset },
90 { "nsellength", NEXTARG, setnsellength },
b3eab9f9 91 { 0, 0, setifaddr },
40a42b7f 92 { 0, 0, setifdstaddr },
b3eab9f9
SL
93};
94
62e9bc4a
KS
95/*
96 * XNS support liberally adapted from
97 * code written at the University of Maryland
98 * principally by James O'Toole and Chris Torek.
99 */
62e9bc4a
KS
100int in_status(), in_getaddr();
101int xns_status(), xns_getaddr();
59c3b7d8 102int iso_status(), iso_getaddr();
62e9bc4a
KS
103
104/* Known address families */
105struct afswtch {
106 char *af_name;
107 short af_af;
108 int (*af_status)();
109 int (*af_getaddr)();
59c3b7d8
KS
110 int af_difaddr;
111 int af_aifaddr;
112 caddr_t af_ridreq;
113 caddr_t af_addreq;
62e9bc4a 114} afs[] = {
59c3b7d8
KS
115#define C(x) ((caddr_t) &x)
116 { "inet", AF_INET, in_status, in_getaddr,
117 SIOCDIFADDR, SIOCAIFADDR, C(ridreq), C(addreq) },
118 { "ns", AF_NS, xns_status, xns_getaddr,
119 SIOCDIFADDR, SIOCAIFADDR, C(ridreq), C(addreq) },
120 { "iso", AF_ISO, iso_status, iso_getaddr,
121 SIOCDIFADDR_ISO, SIOCAIFADDR_ISO, C(iso_ridreq), C(iso_addreq) },
122 { 0, 0, 0, 0 }
62e9bc4a
KS
123};
124
125struct afswtch *afp; /*the address family being set or asked about*/
126
b3eab9f9
SL
127main(argc, argv)
128 int argc;
129 char *argv[];
130{
62e9bc4a 131 int af = AF_INET;
59c3b7d8 132 register struct afswtch *rafp;
37d62ab6 133
b3eab9f9 134 if (argc < 2) {
30078595 135 fprintf(stderr, "usage: ifconfig interface\n%s%s%s%s%s",
f5f09b9d
MK
136 "\t[ af [ address [ dest_addr ] ] [ up ] [ down ]",
137 "[ netmask mask ] ]\n",
138 "\t[ metric n ]\n",
139 "\t[ trailers | -trailers ]\n",
140 "\t[ arp | -arp ]\n");
b3eab9f9
SL
141 exit(1);
142 }
62e9bc4a 143 argc--, argv++;
63f46c0f 144 strncpy(name, *argv, sizeof(name));
62e9bc4a
KS
145 strncpy(ifr.ifr_name, name, sizeof(ifr.ifr_name));
146 argc--, argv++;
147 if (argc > 0) {
59c3b7d8
KS
148 for (afp = rafp = afs; rafp->af_name; rafp++)
149 if (strcmp(rafp->af_name, *argv) == 0) {
150 afp = rafp; argc--; argv++;
62e9bc4a
KS
151 break;
152 }
59c3b7d8
KS
153 rafp = afp;
154 af = ifr.ifr_addr.sa_family = rafp->af_af;
62e9bc4a
KS
155 }
156 s = socket(af, SOCK_DGRAM, 0);
b3eab9f9
SL
157 if (s < 0) {
158 perror("ifconfig: socket");
159 exit(1);
160 }
b3eab9f9
SL
161 if (ioctl(s, SIOCGIFFLAGS, (caddr_t)&ifr) < 0) {
162 Perror("ioctl (SIOCGIFFLAGS)");
163 exit(1);
164 }
62e9bc4a 165 strncpy(ifr.ifr_name, name, sizeof ifr.ifr_name);
0fd5cf4f 166 flags = ifr.ifr_flags;
f5f09b9d
MK
167 if (ioctl(s, SIOCGIFMETRIC, (caddr_t)&ifr) < 0)
168 perror("ioctl (SIOCGIFMETRIC)");
169 else
170 metric = ifr.ifr_metric;
b3eab9f9
SL
171 if (argc == 0) {
172 status();
173 exit(0);
174 }
175 while (argc > 0) {
176 register struct cmd *p;
177
178 for (p = cmds; p->c_name; p++)
179 if (strcmp(*argv, p->c_name) == 0)
180 break;
40a42b7f
TF
181 if (p->c_name == 0 && setaddr)
182 p++; /* got src, do dst */
0fd5cf4f
MK
183 if (p->c_func) {
184 if (p->c_parameter == NEXTARG) {
185 (*p->c_func)(argv[1]);
186 argc--, argv++;
187 } else
188 (*p->c_func)(*argv, p->c_parameter);
189 }
b3eab9f9
SL
190 argc--, argv++;
191 }
ffdba101
KS
192 if (af == AF_ISO)
193 adjust_nsellength();
62e9bc4a
KS
194 if (setipdst && af==AF_NS) {
195 struct nsip_req rq;
196 int size = sizeof(rq);
197
59c3b7d8
KS
198 rq.rq_ns = addreq.ifra_addr;
199 rq.rq_ip = addreq.ifra_dstaddr;
62e9bc4a
KS
200
201 if (setsockopt(s, 0, SO_NSIP_ROUTE, &rq, size) < 0)
202 Perror("Encapsulation Routing");
22b2b267 203 }
22b2b267
KS
204 if (clearaddr) {
205 int ret;
206 strncpy(rafp->af_ridreq, name, sizeof ifr.ifr_name);
207 if ((ret = ioctl(s, rafp->af_difaddr, rafp->af_ridreq)) < 0) {
208 if (errno == EADDRNOTAVAIL && (doalias >= 0)) {
209 /* means no previous address for interface */
210 } else
211 Perror("ioctl (SIOCDIFADDR)");
212 }
62e9bc4a 213 }
59c3b7d8
KS
214 if (newaddr) {
215 strncpy(rafp->af_addreq, name, sizeof ifr.ifr_name);
216 if (ioctl(s, rafp->af_aifaddr, rafp->af_addreq) < 0)
217 Perror("ioctl (SIOCAIFADDR)");
0fd5cf4f 218 }
b3eab9f9
SL
219 exit(0);
220}
59c3b7d8
KS
221#define RIDADDR 0
222#define ADDR 1
223#define MASK 2
224#define DSTADDR 3
b3eab9f9
SL
225
226/*ARGSUSED*/
227setifaddr(addr, param)
228 char *addr;
62e9bc4a 229 short param;
b3eab9f9 230{
dea973a0
MK
231 /*
232 * Delay the ioctl to set the interface addr until flags are all set.
233 * The address interpretation may depend on the flags,
234 * and the flags may change when the address is set.
a9575a9a 235 */
dea973a0 236 setaddr++;
b95f7094 237 if (doalias == 0)
22b2b267 238 clearaddr = 1;
59c3b7d8 239 (*afp->af_getaddr)(addr, (doalias >= 0 ? ADDR : RIDADDR));
b3eab9f9
SL
240}
241
0fd5cf4f
MK
242setifnetmask(addr)
243 char *addr;
244{
59c3b7d8 245 (*afp->af_getaddr)(addr, MASK);
0fd5cf4f
MK
246}
247
248setifbroadaddr(addr)
249 char *addr;
250{
59c3b7d8 251 (*afp->af_getaddr)(addr, DSTADDR);
0fd5cf4f
MK
252}
253
62e9bc4a
KS
254setifipdst(addr)
255 char *addr;
256{
59c3b7d8 257 in_getaddr(addr, DSTADDR);
62e9bc4a 258 setipdst++;
22b2b267
KS
259 clearaddr = 0;
260 newaddr = 0;
62e9bc4a 261}
22b2b267 262#define rqtosa(x) (&(((struct ifreq *)(afp->x))->ifr_addr))
59c3b7d8
KS
263/*ARGSUSED*/
264notealias(addr, param)
265 char *addr;
266{
22b2b267
KS
267 if (setaddr && doalias == 0 && param < 0)
268 bcopy((caddr_t)rqtosa(af_addreq),
269 (caddr_t)rqtosa(af_ridreq),
270 rqtosa(af_addreq)->sa_len);
59c3b7d8 271 doalias = param;
22b2b267
KS
272 if (param < 0) {
273 clearaddr = 1;
59c3b7d8 274 newaddr = 0;
22b2b267
KS
275 } else
276 clearaddr = 0;
59c3b7d8
KS
277}
278
40a42b7f
TF
279/*ARGSUSED*/
280setifdstaddr(addr, param)
281 char *addr;
282 int param;
283{
59c3b7d8 284 (*afp->af_getaddr)(addr, DSTADDR);
40a42b7f
TF
285}
286
2c4ef00e
SL
287setifflags(vname, value)
288 char *vname;
62e9bc4a 289 short value;
b3eab9f9 290{
62e9bc4a
KS
291 if (ioctl(s, SIOCGIFFLAGS, (caddr_t)&ifr) < 0) {
292 Perror("ioctl (SIOCGIFFLAGS)");
293 exit(1);
294 }
295 strncpy(ifr.ifr_name, name, sizeof (ifr.ifr_name));
296 flags = ifr.ifr_flags;
b3eab9f9
SL
297
298 if (value < 0) {
299 value = -value;
0fd5cf4f 300 flags &= ~value;
b3eab9f9 301 } else
0fd5cf4f 302 flags |= value;
0fd5cf4f 303 ifr.ifr_flags = flags;
b3eab9f9 304 if (ioctl(s, SIOCSIFFLAGS, (caddr_t)&ifr) < 0)
2c4ef00e 305 Perror(vname);
b3eab9f9
SL
306}
307
f5f09b9d
MK
308setifmetric(val)
309 char *val;
310{
311 strncpy(ifr.ifr_name, name, sizeof (ifr.ifr_name));
312 ifr.ifr_metric = atoi(val);
313 if (ioctl(s, SIOCSIFMETRIC, (caddr_t)&ifr) < 0)
314 perror("ioctl (set metric)");
315}
316
59c3b7d8
KS
317setsnpaoffset(val)
318 char *val;
319{
320 iso_addreq.ifra_snpaoffset = atoi(val);
321}
322
f5f09b9d
MK
323#define IFFBITS \
324"\020\1UP\2BROADCAST\3DEBUG\4LOOPBACK\5POINTOPOINT\6NOTRAILERS\7RUNNING\10NOARP\
325"
326
62e9bc4a
KS
327/*
328 * Print the status of the interface. If an address family was
329 * specified, show it and it only; otherwise, show them all.
330 */
b3eab9f9 331status()
62e9bc4a
KS
332{
333 register struct afswtch *p = afp;
334 short af = ifr.ifr_addr.sa_family;
335
f5f09b9d
MK
336 printf("%s: ", name);
337 printb("flags", flags, IFFBITS);
338 if (metric)
339 printf(" metric %d", metric);
340 putchar('\n');
62e9bc4a 341 if ((p = afp) != NULL) {
b14b214d
MK
342 (*p->af_status)(1);
343 } else for (p = afs; p->af_name; p++) {
62e9bc4a 344 ifr.ifr_addr.sa_family = p->af_af;
b14b214d 345 (*p->af_status)(0);
62e9bc4a
KS
346 }
347}
348
b14b214d
MK
349in_status(force)
350 int force;
b3eab9f9
SL
351{
352 struct sockaddr_in *sin;
62e9bc4a 353 char *inet_ntoa();
b3eab9f9 354
37d62ab6 355 strncpy(ifr.ifr_name, name, sizeof (ifr.ifr_name));
0fd5cf4f 356 if (ioctl(s, SIOCGIFADDR, (caddr_t)&ifr) < 0) {
b14b214d
MK
357 if (errno == EADDRNOTAVAIL || errno == EAFNOSUPPORT) {
358 if (!force)
359 return;
0fd5cf4f 360 bzero((char *)&ifr.ifr_addr, sizeof(ifr.ifr_addr));
b14b214d
MK
361 } else
362 perror("ioctl (SIOCGIFADDR)");
0fd5cf4f 363 }
b3eab9f9 364 sin = (struct sockaddr_in *)&ifr.ifr_addr;
5868d993 365 printf("\tinet %s ", inet_ntoa(sin->sin_addr));
b14b214d
MK
366 strncpy(ifr.ifr_name, name, sizeof (ifr.ifr_name));
367 if (ioctl(s, SIOCGIFNETMASK, (caddr_t)&ifr) < 0) {
368 if (errno != EADDRNOTAVAIL)
369 perror("ioctl (SIOCGIFNETMASK)");
370 bzero((char *)&ifr.ifr_addr, sizeof(ifr.ifr_addr));
371 } else
372 netmask.sin_addr =
373 ((struct sockaddr_in *)&ifr.ifr_addr)->sin_addr;
40a42b7f 374 if (flags & IFF_POINTOPOINT) {
0fd5cf4f
MK
375 if (ioctl(s, SIOCGIFDSTADDR, (caddr_t)&ifr) < 0) {
376 if (errno == EADDRNOTAVAIL)
377 bzero((char *)&ifr.ifr_addr, sizeof(ifr.ifr_addr));
378 else
b14b214d 379 perror("ioctl (SIOCGIFDSTADDR)");
0fd5cf4f 380 }
62e9bc4a 381 strncpy(ifr.ifr_name, name, sizeof (ifr.ifr_name));
40a42b7f
TF
382 sin = (struct sockaddr_in *)&ifr.ifr_dstaddr;
383 printf("--> %s ", inet_ntoa(sin->sin_addr));
384 }
0fd5cf4f 385 printf("netmask %x ", ntohl(netmask.sin_addr.s_addr));
0fd5cf4f 386 if (flags & IFF_BROADCAST) {
0fd5cf4f
MK
387 if (ioctl(s, SIOCGIFBRDADDR, (caddr_t)&ifr) < 0) {
388 if (errno == EADDRNOTAVAIL)
b14b214d
MK
389 bzero((char *)&ifr.ifr_addr, sizeof(ifr.ifr_addr));
390 else
391 perror("ioctl (SIOCGIFADDR)");
0fd5cf4f 392 }
62e9bc4a 393 strncpy(ifr.ifr_name, name, sizeof (ifr.ifr_name));
0fd5cf4f 394 sin = (struct sockaddr_in *)&ifr.ifr_addr;
b14b214d
MK
395 if (sin->sin_addr.s_addr != 0)
396 printf("broadcast %s", inet_ntoa(sin->sin_addr));
0fd5cf4f 397 }
f5f09b9d 398 putchar('\n');
b3eab9f9
SL
399}
400
62e9bc4a 401
b14b214d
MK
402xns_status(force)
403 int force;
62e9bc4a
KS
404{
405 struct sockaddr_ns *sns;
62e9bc4a
KS
406
407 close(s);
408 s = socket(AF_NS, SOCK_DGRAM, 0);
409 if (s < 0) {
cd2e8e25 410 if (errno == EPROTONOSUPPORT)
63f46c0f 411 return;
62e9bc4a
KS
412 perror("ifconfig: socket");
413 exit(1);
414 }
415 if (ioctl(s, SIOCGIFADDR, (caddr_t)&ifr) < 0) {
b14b214d
MK
416 if (errno == EADDRNOTAVAIL || errno == EAFNOSUPPORT) {
417 if (!force)
418 return;
419 bzero((char *)&ifr.ifr_addr, sizeof(ifr.ifr_addr));
420 } else
421 perror("ioctl (SIOCGIFADDR)");
62e9bc4a
KS
422 }
423 strncpy(ifr.ifr_name, name, sizeof ifr.ifr_name);
424 sns = (struct sockaddr_ns *)&ifr.ifr_addr;
f5f09b9d 425 printf("\tns %s ", ns_ntoa(sns->sns_addr));
90a22cbc
KS
426 if (flags & IFF_POINTOPOINT) { /* by W. Nesheim@Cornell */
427 if (ioctl(s, SIOCGIFDSTADDR, (caddr_t)&ifr) < 0) {
428 if (errno == EADDRNOTAVAIL)
429 bzero((char *)&ifr.ifr_addr, sizeof(ifr.ifr_addr));
430 else
431 Perror("ioctl (SIOCGIFDSTADDR)");
432 }
433 strncpy(ifr.ifr_name, name, sizeof (ifr.ifr_name));
434 sns = (struct sockaddr_ns *)&ifr.ifr_dstaddr;
435 printf("--> %s ", ns_ntoa(sns->sns_addr));
436 }
62e9bc4a
KS
437 putchar('\n');
438}
439
59c3b7d8
KS
440iso_status(force)
441 int force;
442{
443 struct sockaddr_iso *siso;
444 struct iso_ifreq ifr;
445
446 close(s);
447 s = socket(AF_ISO, SOCK_DGRAM, 0);
448 if (s < 0) {
449 if (errno == EPROTONOSUPPORT)
450 return;
451 perror("ifconfig: socket");
452 exit(1);
453 }
42f9d80e
KS
454 bzero((caddr_t)&ifr, sizeof(ifr));
455 strncpy(ifr.ifr_name, name, sizeof(ifr.ifr_name));
456 if (ioctl(s, SIOCGIFADDR_ISO, (caddr_t)&ifr) < 0) {
59c3b7d8
KS
457 if (errno == EADDRNOTAVAIL || errno == EAFNOSUPPORT) {
458 if (!force)
459 return;
460 bzero((char *)&ifr.ifr_Addr, sizeof(ifr.ifr_Addr));
42f9d80e
KS
461 } else {
462 perror("ioctl (SIOCGIFADDR_ISO)");
463 exit(1);
464 }
59c3b7d8
KS
465 }
466 strncpy(ifr.ifr_name, name, sizeof ifr.ifr_name);
467 siso = &ifr.ifr_Addr;
42f9d80e
KS
468 printf("\tiso %s ", iso_ntoa(&siso->siso_addr));
469 if (ioctl(s, SIOCGIFNETMASK_ISO, (caddr_t)&ifr) < 0) {
59c3b7d8 470 if (errno != EADDRNOTAVAIL)
42f9d80e 471 perror("ioctl (SIOCGIFNETMASK_ISO)");
59c3b7d8 472 } else {
42f9d80e 473 printf(" netmask %s ", iso_ntoa(&siso->siso_addr));
59c3b7d8
KS
474 }
475 if (flags & IFF_POINTOPOINT) {
42f9d80e 476 if (ioctl(s, SIOCGIFDSTADDR_ISO, (caddr_t)&ifr) < 0) {
59c3b7d8
KS
477 if (errno == EADDRNOTAVAIL)
478 bzero((char *)&ifr.ifr_Addr, sizeof(ifr.ifr_Addr));
479 else
42f9d80e 480 Perror("ioctl (SIOCGIFDSTADDR_ISO)");
59c3b7d8
KS
481 }
482 strncpy(ifr.ifr_name, name, sizeof (ifr.ifr_name));
483 siso = &ifr.ifr_Addr;
42f9d80e 484 printf("--> %s ", iso_ntoa(&siso->siso_addr));
59c3b7d8
KS
485 }
486 putchar('\n');
487}
488
b3eab9f9
SL
489Perror(cmd)
490 char *cmd;
491{
492 extern int errno;
493
494 fprintf(stderr, "ifconfig: ");
495 switch (errno) {
496
497 case ENXIO:
62e9bc4a 498 fprintf(stderr, "%s: no such interface\n", cmd);
b3eab9f9
SL
499 break;
500
501 case EPERM:
9f1b5d96 502 fprintf(stderr, "%s: permission denied\n", cmd);
b3eab9f9
SL
503 break;
504
505 default:
506 perror(cmd);
507 }
508 exit(1);
509}
510
511struct in_addr inet_makeaddr();
512
59c3b7d8
KS
513#define SIN(x) ((struct sockaddr_in *) &(x))
514struct sockaddr_in *sintab[] = {
515SIN(ridreq.ifr_addr), SIN(addreq.ifra_addr),
516SIN(addreq.ifra_mask), SIN(addreq.ifra_broadaddr)};
517
518in_getaddr(s, which)
b3eab9f9 519 char *s;
b3eab9f9 520{
59c3b7d8 521 register struct sockaddr_in *sin = sintab[which];
b3eab9f9
SL
522 struct hostent *hp;
523 struct netent *np;
524 int val;
525
84ce95b5
KS
526 sin->sin_len = sizeof(*sin);
527 if (which != MASK)
59c3b7d8 528 sin->sin_family = AF_INET;
84ce95b5
KS
529
530 if ((val = inet_addr(s)) != -1)
0fd5cf4f 531 sin->sin_addr.s_addr = val;
84ce95b5 532 else if (hp = gethostbyname(s))
b3eab9f9 533 bcopy(hp->h_addr, (char *)&sin->sin_addr, hp->h_length);
84ce95b5 534 else if (np = getnetbyname(s))
b3eab9f9 535 sin->sin_addr = inet_makeaddr(np->n_net, INADDR_ANY);
84ce95b5
KS
536 else {
537 fprintf(stderr, "%s: bad value\n", s);
538 exit(1);
b3eab9f9 539 }
b3eab9f9
SL
540}
541
542/*
543 * Print a value a la the %b format of the kernel's printf
544 */
545printb(s, v, bits)
546 char *s;
547 register char *bits;
548 register unsigned short v;
549{
550 register int i, any = 0;
551 register char c;
552
553 if (bits && *bits == 8)
554 printf("%s=%o", s, v);
555 else
556 printf("%s=%x", s, v);
557 bits++;
558 if (bits) {
559 putchar('<');
560 while (i = *bits++) {
561 if (v & (1 << (i-1))) {
562 if (any)
563 putchar(',');
564 any = 1;
565 for (; (c = *bits) > 32; bits++)
566 putchar(c);
567 } else
568 for (; *bits > 32; bits++)
569 ;
570 }
571 putchar('>');
572 }
573}
62e9bc4a 574
59c3b7d8
KS
575#define SNS(x) ((struct sockaddr_ns *) &(x))
576struct sockaddr_ns *snstab[] = {
577SNS(ridreq.ifr_addr), SNS(addreq.ifra_addr),
578SNS(addreq.ifra_mask), SNS(addreq.ifra_broadaddr)};
579
580xns_getaddr(addr, which)
62e9bc4a 581char *addr;
62e9bc4a 582{
59c3b7d8 583 struct sockaddr_ns *sns = snstab[which];
90a22cbc 584 struct ns_addr ns_addr();
59c3b7d8 585
62e9bc4a 586 sns->sns_family = AF_NS;
ac96969a 587 sns->sns_len = sizeof(*sns);
90a22cbc 588 sns->sns_addr = ns_addr(addr);
59c3b7d8
KS
589 if (which == MASK)
590 printf("Attempt to set XNS netmask will be ineffectual\n");
591}
592
593#define SISO(x) ((struct sockaddr_iso *) &(x))
594struct sockaddr_iso *sisotab[] = {
595SISO(iso_ridreq.ifr_Addr), SISO(iso_addreq.ifra_addr),
596SISO(iso_addreq.ifra_mask), SISO(iso_addreq.ifra_dstaddr)};
597
598iso_getaddr(addr, which)
599char *addr;
600{
ffdba101 601 register struct sockaddr_iso *siso = sisotab[which];
59c3b7d8
KS
602 struct iso_addr *iso_addr();
603 siso->siso_addr = *iso_addr(addr);
ffdba101 604
59c3b7d8 605 if (which == MASK) {
84ce95b5 606 siso->siso_len = TSEL(siso) - (caddr_t)(siso);
59c3b7d8
KS
607 siso->siso_nlen = 0;
608 } else {
ffdba101
KS
609 siso->siso_len = sizeof(*siso);
610 siso->siso_family = AF_ISO;
59c3b7d8 611 }
62e9bc4a 612}
42f9d80e
KS
613
614setnsellength(val)
615 char *val;
616{
ffdba101
KS
617 nsellength = atoi(val);
618 if (nsellength < 0) {
619 fprintf(stderr, "Negative NSEL length is absurd\n");
620 exit (1);
621 }
42f9d80e
KS
622 if (afp == 0 || afp->af_af != AF_ISO) {
623 fprintf(stderr, "Setting NSEL length valid only for iso\n");
624 exit (1);
625 }
ffdba101
KS
626}
627
628fixnsel(s)
629register struct sockaddr_iso *s;
630{
631 if (s->siso_family == 0)
632 return;
ffdba101
KS
633 s->siso_tlen = nsellength;
634}
635
636adjust_nsellength()
637{
638 fixnsel(sisotab[RIDADDR]);
639 fixnsel(sisotab[ADDR]);
640 fixnsel(sisotab[DSTADDR]);
42f9d80e 641}