hostname -s strips of domain
[unix-history] / usr / src / sbin / route / route.c
CommitLineData
5ff67f98 1/*
7b3729cc 2 * Copyright (c) 1983, 1989 The Regents of the University of California.
fca7493d
KB
3 * All rights reserved.
4 *
70ab3c27 5 * %sccs.include.redist.c%
5ff67f98
DF
6 */
7
8#ifndef lint
9char copyright[] =
7d5f817b 10"@(#) Copyright (c) 1983 The Regents of the University of California.\n\
5ff67f98 11 All rights reserved.\n";
fca7493d 12#endif /* not lint */
5ff67f98 13
4bec325f 14#ifndef lint
039256d2 15static char sccsid[] = "@(#)route.c 5.28 (Berkeley) %G%";
fca7493d 16#endif /* not lint */
4bec325f 17
a2280e64 18#include <sys/param.h>
4bec325f
BJ
19#include <sys/socket.h>
20#include <sys/ioctl.h>
5c7868a2 21#include <sys/file.h>
63c817da 22#include <sys/mbuf.h>
9eb5d442 23#include <sys/kinfo.h>
94a2d2a7 24
4bec325f 25#include <net/route.h>
31bd2db6 26#include <net/if_dl.h>
94a2d2a7 27#include <netinet/in.h>
eac76d14 28#include <netns/ns.h>
7d5f817b 29#include <netiso/iso.h>
94a2d2a7 30
5c7868a2 31#include <netdb.h>
94a2d2a7 32#include <stdio.h>
4bec325f
BJ
33#include <errno.h>
34#include <ctype.h>
505837c5 35#include <paths.h>
4bec325f 36
31bd2db6
KS
37struct keytab {
38 char *kt_cp;
39 int kt_i;
40} keywords[] = {
41#include "keywords.h"
42{0, 0}
43};
44
57cacc90 45struct ortentry route;
31bd2db6 46union sockunion {
7d5f817b
KS
47 struct sockaddr sa;
48 struct sockaddr_in sin;
49 struct sockaddr_ns sns;
50 struct sockaddr_iso siso;
31bd2db6
KS
51 struct sockaddr_dl sdl;
52} so_dst, so_gate, so_mask, so_genmask, so_ifa, so_ifp, *so_addrs[] =
53{ &so_dst, &so_gate, &so_mask, &so_genmask, &so_ifa, &so_ifp, 0};
54typedef union sockunion *sup;
55int pid, rtm_addrs;
4bec325f 56int s;
31bd2db6 57int forcehost, forcenet, doflush, nflag, af, qflag, Cflag, keyword();
eb03b231 58int iflag, verbose, aflen = sizeof (struct sockaddr_in);
7cd60aa5 59int locking, lockrest, debugonly;
b268b889 60struct sockaddr_in sin = { sizeof(sin), AF_INET };
7cd60aa5 61struct rt_metrics rt_metrics;
7d8dd943 62u_long rtm_inits;
379dcc38 63struct in_addr inet_makeaddr();
31bd2db6
KS
64char *malloc(), *routename(), *netname();
65extern char *iso_ntoa(), *link_ntoa();
b268b889
MK
66#define kget(p, d) \
67 (lseek(kmem, (off_t)(p), 0), read(kmem, (char *)&(d), sizeof (d)))
4bec325f 68
31bd2db6
KS
69usage(cp)
70char *cp;
71{
72 fprintf(stderr,
73 "usage: route [ -nqCv ] cmd [[ -<qualifers> ] args ]\n");
74 if (cp) fprintf(stderr, "(botched keyword: %s)\n", cp);
75
76 exit(1);
77}
7d8dd943 78
4bec325f
BJ
79main(argc, argv)
80 int argc;
81 char *argv[];
82{
83
b268b889 84 char *argvp;
4bec325f 85 if (argc < 2)
31bd2db6 86 usage((char *)0);
4bec325f 87 argc--, argv++;
b3933da8 88 for (; argc > 0 && argv[0][0] == '-'; argc--, argv++) {
b268b889 89 for (argvp = argv[0]++; *argvp; argvp++)
b3933da8 90 switch (*argv[0]) {
b3933da8 91 case 'n':
a2280e64 92 nflag++;
b3933da8 93 break;
ae578a19
KS
94 case 'q':
95 qflag++;
96 break;
5c7868a2
KS
97 case 'C':
98 Cflag++; /* Use old ioctls */
57cacc90 99 break;
7d5f817b
KS
100 case 'v':
101 verbose++;
b3933da8
MK
102 }
103 }
5c7868a2
KS
104 pid = getpid();
105 if (Cflag)
57cacc90 106 s = socket(AF_INET, SOCK_RAW, 0);
5c7868a2
KS
107 else
108 s = socket(PF_ROUTE, SOCK_RAW, 0);
57cacc90
KS
109 if (s < 0) {
110 perror("route: socket");
111 exit(1);
112 }
31bd2db6
KS
113 if (argc > 0) switch (keyword(*argv)) {
114 case K_ADD:
115 case K_CHANGE:
116 case K_DELETE:
63c817da 117 newroute(argc, argv);
31bd2db6 118 case K_MONITOR:
5c7868a2 119 monitor();
31bd2db6
KS
120 case K_FLUSH:
121 flushroutes(argc, argv);
122 }
123 usage(*argv);
63c817da
SL
124}
125
126/*
127 * Purge all entries in the routing tables not
128 * associated with network interfaces.
129 */
31bd2db6
KS
130flushroutes(argc, argv)
131char *argv[];
b268b889 132{
9eb5d442
KS
133 int bufsize, needed, seqno, rlen;
134 char *buf, *next, *lim;
135 register struct rt_msghdr *rtm;
9eb5d442 136
104e26d6 137 shutdown(s, 0); /* Don't want to read back our messages */
31bd2db6
KS
138 if (argc > 1) {
139 argv++;
eb03b231
KS
140 if (argc == 2 && **argv == '-') switch (keyword(1 + *argv)) {
141 case K_INET: af = AF_INET; break;
142 case K_XNS: af = AF_NS; break;
143 case K_LINK: af = AF_LINK; break;
144 case K_ISO: case K_OSI: af = AF_ISO; break;
31bd2db6
KS
145 default: goto bad;
146 } else
147 bad: usage(*argv);
148 }
9eb5d442
KS
149 if ((needed = getkerninfo(KINFO_RT_DUMP, 0, 0, 0)) < 0)
150 { perror("route-getkerninfo-estimate"); exit(1);}
151 if ((buf = malloc(needed)) == 0)
152 { printf("out of space\n");; exit(1);}
153 if ((rlen = getkerninfo(KINFO_RT_DUMP, buf, &needed, 0)) < 0)
154 { perror("actual retrieval of routing table"); exit(1);}
155 lim = buf + rlen;
156 for (next = buf; next < lim; next += rtm->rtm_msglen) {
157 rtm = (struct rt_msghdr *)next;
eb03b231 158 if ((rtm->rtm_flags & RTF_GATEWAY) == 0)
9eb5d442 159 continue;
31bd2db6
KS
160 if (af) {
161 struct sockaddr *sa = (struct sockaddr *)(rtm + 1);
162 if (sa->sa_family != af)
163 continue;
164 }
9eb5d442
KS
165 rtm->rtm_type = RTM_DELETE;
166 rtm->rtm_seq = seqno;
167 if ((rlen = write(s, next, rtm->rtm_msglen)) < 0) {
168 perror("writing to routing socket");
169 printf("got only %d for rlen\n", rlen);
31bd2db6 170 break;
b268b889 171 }
9eb5d442
KS
172 seqno++;
173 if (qflag)
174 continue;
175 if (verbose) {
31bd2db6 176 print_rtmsg(rtm, rlen);
9eb5d442 177 } else {
039256d2 178 struct sockaddr *sa = (struct sockaddr *)(rtm + 1);
9eb5d442
KS
179 printf("%-20.20s ", (rtm->rtm_flags & RTF_HOST) ?
180 routename(sa) : netname(sa));
181 sa = (struct sockaddr *)(sa->sa_len + (char *)sa);
182 printf("%-20.20s ", routename(sa));
183 printf("done\n");
57cacc90
KS
184 }
185 }
31bd2db6 186 exit(0);
57cacc90 187}
9eb5d442 188
63c817da 189char *
eac76d14
MK
190routename(sa)
191 struct sockaddr *sa;
63c817da 192{
a2280e64 193 register char *cp;
63c817da 194 static char line[50];
6edb1941 195 struct hostent *hp;
a2280e64
MK
196 static char domain[MAXHOSTNAMELEN + 1];
197 static int first = 1;
198 char *index();
eac76d14 199 char *ns_print();
63c817da 200
a2280e64
MK
201 if (first) {
202 first = 0;
203 if (gethostname(domain, MAXHOSTNAMELEN) == 0 &&
204 (cp = index(domain, '.')))
205 (void) strcpy(domain, cp + 1);
206 else
207 domain[0] = 0;
208 }
eac76d14
MK
209 switch (sa->sa_family) {
210
211 case AF_INET:
212 { struct in_addr in;
213 in = ((struct sockaddr_in *)sa)->sin_addr;
214
215 cp = 0;
216 if (in.s_addr == INADDR_ANY)
217 cp = "default";
218 if (cp == 0 && !nflag) {
219 hp = gethostbyaddr(&in, sizeof (struct in_addr),
220 AF_INET);
221 if (hp) {
222 if ((cp = index(hp->h_name, '.')) &&
223 !strcmp(cp + 1, domain))
224 *cp = 0;
225 cp = hp->h_name;
226 }
a2280e64 227 }
eac76d14
MK
228 if (cp)
229 strcpy(line, cp);
230 else {
a2280e64 231#define C(x) ((x) & 0xff)
eac76d14 232 in.s_addr = ntohl(in.s_addr);
9bd38ba8 233 (void)sprintf(line, "%u.%u.%u.%u", C(in.s_addr >> 24),
eac76d14
MK
234 C(in.s_addr >> 16), C(in.s_addr >> 8), C(in.s_addr));
235 }
236 break;
237 }
238
239 case AF_NS:
240 return (ns_print((struct sockaddr_ns *)sa));
241
31bd2db6
KS
242 case AF_LINK:
243 return (link_ntoa((struct sockaddr_dl *)sa));
244
245 case AF_ISO:
246 (void) sprintf(line, "iso %s",
247 iso_ntoa(&((struct sockaddr_iso *)sa)->siso_addr));
248 break;
249
eac76d14
MK
250 default:
251 { u_short *s = (u_short *)sa->sa_data;
31bd2db6
KS
252 u_short *slim = s + ((sa->sa_len + 1)>>1);
253 char *cp = line + sprintf(line, "(%d)", sa->sa_family);
254 int n;
eac76d14 255
31bd2db6
KS
256 while (s < slim) {
257 n = sprintf(cp, " %x", *s);
258 s++; cp += n;
259 }
eac76d14
MK
260 break;
261 }
a2280e64
MK
262 }
263 return (line);
264}
265
266/*
267 * Return the name of the network whose address is given.
268 * The address is assumed to be that of a net or subnet, not a host.
269 */
270char *
eac76d14
MK
271netname(sa)
272 struct sockaddr *sa;
a2280e64
MK
273{
274 char *cp = 0;
275 static char line[50];
276 struct netent *np = 0;
277 u_long net, mask;
e2fe1192 278 register u_long i;
a2280e64 279 int subnetshift;
a48a48cc 280 char *ns_print();
a2280e64 281
eac76d14
MK
282 switch (sa->sa_family) {
283
284 case AF_INET:
285 { struct in_addr in;
286 in = ((struct sockaddr_in *)sa)->sin_addr;
287
e2fe1192 288 i = in.s_addr = ntohl(in.s_addr);
eac76d14
MK
289 if (in.s_addr == 0)
290 cp = "default";
291 else if (!nflag) {
292 if (IN_CLASSA(i)) {
293 mask = IN_CLASSA_NET;
294 subnetshift = 8;
295 } else if (IN_CLASSB(i)) {
296 mask = IN_CLASSB_NET;
297 subnetshift = 8;
298 } else {
299 mask = IN_CLASSC_NET;
300 subnetshift = 4;
301 }
302 /*
303 * If there are more bits than the standard mask
304 * would suggest, subnets must be in use.
305 * Guess at the subnet mask, assuming reasonable
306 * width subnet fields.
307 */
308 while (in.s_addr &~ mask)
309 mask = (long)mask >> subnetshift;
310 net = in.s_addr & mask;
311 while ((mask & 1) == 0)
312 mask >>= 1, net >>= 1;
313 np = getnetbyaddr(net, AF_INET);
314 if (np)
315 cp = np->n_name;
a2280e64 316 }
eac76d14
MK
317 if (cp)
318 strcpy(line, cp);
319 else if ((in.s_addr & 0xffffff) == 0)
9bd38ba8 320 (void)sprintf(line, "%u", C(in.s_addr >> 24));
eac76d14 321 else if ((in.s_addr & 0xffff) == 0)
9bd38ba8 322 (void)sprintf(line, "%u.%u", C(in.s_addr >> 24),
eac76d14
MK
323 C(in.s_addr >> 16));
324 else if ((in.s_addr & 0xff) == 0)
9bd38ba8 325 (void)sprintf(line, "%u.%u.%u", C(in.s_addr >> 24),
eac76d14
MK
326 C(in.s_addr >> 16), C(in.s_addr >> 8));
327 else
9bd38ba8 328 (void)sprintf(line, "%u.%u.%u.%u", C(in.s_addr >> 24),
eac76d14
MK
329 C(in.s_addr >> 16), C(in.s_addr >> 8),
330 C(in.s_addr));
331 break;
332 }
333
334 case AF_NS:
335 return (ns_print((struct sockaddr_ns *)sa));
336 break;
337
31bd2db6
KS
338 case AF_LINK:
339 return (link_ntoa((struct sockaddr_dl *)sa));
340
341 case AF_ISO:
342 (void) sprintf(line, "iso %s",
343 iso_ntoa(&((struct sockaddr_iso *)sa)->siso_addr));
344 break;
345
eac76d14
MK
346 default:
347 { u_short *s = (u_short *)sa->sa_data;
31bd2db6
KS
348 u_short *slim = s + ((sa->sa_len + 1)>>1);
349 char *cp = line + sprintf(line, "af %d:", sa->sa_family);
350 int n;
eac76d14 351
31bd2db6
KS
352 while (s < slim) {
353 n = sprintf(cp, " %x", *s);
354 s++; cp += n;
355 }
eac76d14
MK
356 break;
357 }
63c817da
SL
358 }
359 return (line);
4bec325f
BJ
360}
361
7cd60aa5
KS
362set_metric(value, key)
363char *value;
364{
365 int flag = 0;
366 u_long noval, *valp = &noval;
367
368 switch (key) {
369#define caseof(x, y, z) case x: valp = &rt_metrics.z; flag = y; break
370 caseof(K_MTU, RTV_MTU, rmx_mtu);
371 caseof(K_HOPCOUNT, RTV_HOPCOUNT, rmx_hopcount);
372 caseof(K_EXPIRE, RTV_EXPIRE, rmx_expire);
373 caseof(K_RECVPIPE, RTV_RPIPE, rmx_recvpipe);
374 caseof(K_SENDPIPE, RTV_SPIPE, rmx_sendpipe);
375 caseof(K_SSTHRESH, RTV_SSTHRESH, rmx_ssthresh);
376 caseof(K_RTT, RTV_RTT, rmx_rtt);
377 caseof(K_RTTVAR, RTV_RTTVAR, rmx_rttvar);
378 }
7d8dd943 379 rtm_inits |= flag;
7cd60aa5
KS
380 if (lockrest || locking)
381 rt_metrics.rmx_locks |= flag;
382 if (locking)
383 locking = 0;
384 *valp = atoi(value);
385}
386
4bec325f
BJ
387newroute(argc, argv)
388 int argc;
31bd2db6 389 register char **argv;
4bec325f
BJ
390{
391 struct sockaddr_in *sin;
57cacc90 392 char *cmd, *dest, *gateway, *mask;
31bd2db6 393 int ishost, metric = 0, ret, attempts, oerrno, flags = 0, next;
7cd60aa5 394 int key;
31bd2db6 395 struct hostent *hp = 0;
792b0612 396 extern int errno;
4bec325f 397
104e26d6 398 shutdown(s, 0); /* Don't want to read back our messages */
183ef13b 399 cmd = argv[0];
31bd2db6
KS
400 while (--argc > 0) {
401 if (**(++argv)== '-') {
7cd60aa5 402 switch(key = keyword(1 + *argv)) {
31bd2db6
KS
403 case K_LINK:
404 af = AF_LINK;
eb03b231 405 aflen = sizeof(struct sockaddr_dl);
31bd2db6
KS
406 break;
407 case K_OSI:
eb03b231 408 case K_ISO:
31bd2db6 409 af = AF_ISO;
eb03b231 410 aflen = sizeof(struct sockaddr_iso);
31bd2db6
KS
411 break;
412 case K_INET:
413 af = AF_INET;
eb03b231 414 aflen = sizeof(struct sockaddr_in);
31bd2db6
KS
415 break;
416 case K_XNS:
417 af = AF_NS;
eb03b231 418 aflen = sizeof(struct sockaddr_ns);
31bd2db6
KS
419 break;
420 case K_IFACE:
7cd60aa5 421 case K_INTERFACE:
31bd2db6
KS
422 iflag++;
423 break;
7cd60aa5
KS
424 case K_LOCK:
425 locking = 1;
426 break;
427 case K_LOCKREST:
428 lockrest = 1;
429 break;
31bd2db6
KS
430 case K_HOST:
431 forcehost++;
432 break;
31bd2db6
KS
433 case K_NETMASK:
434 argc--;
435 (void) getaddr(RTA_NETMASK, *++argv, 0);
eb03b231
KS
436 /* FALLTHROUGH */
437 case K_NET:
438 forcenet++;
31bd2db6 439 break;
039256d2
KS
440 case K_REJECT:
441 flags |= RTF_REJECT;
442 break;
7cd60aa5
KS
443 case K_CLONING:
444 flags |= RTF_CLONING;
445 break;
446 case K_XRESOLVE:
447 flags |= RTF_XRESOLVE;
448 break;
31bd2db6
KS
449 case K_GENMASK:
450 argc--;
451 (void) getaddr(RTA_GENMASK, *++argv, 0);
452 break;
7cd60aa5
KS
453 case K_MTU:
454 case K_HOPCOUNT:
455 case K_EXPIRE:
456 case K_RECVPIPE:
457 case K_SENDPIPE:
458 case K_SSTHRESH:
459 case K_RTT:
460 case K_RTTVAR:
461 argc--;
462 set_metric(*++argv, key);
463 break;
31bd2db6
KS
464 default:
465 usage(1+*argv);
466 }
467 } else {
468 if ((rtm_addrs & RTA_DST) == 0) {
469 dest = *argv;
470 ishost = getaddr(RTA_DST, *argv, &hp);
471 } else if ((rtm_addrs & RTA_GATEWAY) == 0) {
472 gateway = *argv;
473 (void) getaddr(RTA_GATEWAY, *argv, &hp);
474 } else {
475 int ret = atoi(*argv);
476 if (ret == 0) {
477 printf("%s,%s", "old usage of trailing 0",
478 "assuming route to if\n");
479 iflag = 1;
480 continue;
481 } else if (ret > 0 && ret < 10) {
482 printf("old usage of trailing digit, ");
483 printf("assuming route via gateway\n");
484 iflag = 0;
485 continue;
486 }
487 (void) getaddr(RTA_NETMASK, *argv, 0);
488 }
489 }
490 }
b3933da8
MK
491 if (forcehost)
492 ishost = 1;
493 if (forcenet)
494 ishost = 0;
7cd60aa5 495 flags |= RTF_UP;
6edb1941 496 if (ishost)
7d5f817b 497 flags |= RTF_HOST;
57cacc90 498 if (iflag == 0)
7d5f817b 499 flags |= RTF_GATEWAY;
792b0612
MK
500 for (attempts = 1; ; attempts++) {
501 errno = 0;
31bd2db6 502 if (Cflag && (af == AF_INET || af == AF_NS)) {
7d5f817b
KS
503 route.rt_flags = flags;
504 route.rt_dst = so_dst.sa;
505 route.rt_gateway = so_gate.sa;
57cacc90
KS
506 if ((ret = ioctl(s, *cmd == 'a' ? SIOCADDRT : SIOCDELRT,
507 (caddr_t)&route)) == 0)
508 break;
509 } else {
31bd2db6 510 if ((ret = rtmsg(*cmd, flags)) == 0);
57cacc90
KS
511 break;
512 }
792b0612
MK
513 if (errno != ENETUNREACH && errno != ESRCH)
514 break;
515 if (hp && hp->h_addr_list[1]) {
516 hp->h_addr_list++;
7d5f817b 517 bcopy(hp->h_addr_list[0], (caddr_t)&so_dst.sin.sin_addr,
792b0612
MK
518 hp->h_length);
519 } else
520 break;
521 }
522 oerrno = errno;
523 printf("%s %s %s: gateway %s", cmd, ishost? "host" : "net",
524 dest, gateway);
525 if (attempts > 1 && ret == 0)
526 printf(" (%s)",
527 inet_ntoa(((struct sockaddr_in *)&route.rt_gateway)->sin_addr));
528 if (ret == 0)
529 printf("\n");
530 else {
531 printf(": ");
532 fflush(stdout);
533 errno = oerrno;
31bd2db6 534 error("");
792b0612 535 }
31bd2db6 536 exit(0);
4bec325f
BJ
537}
538
539error(cmd)
540 char *cmd;
541{
a48a48cc 542 extern int errno;
4bec325f 543
a48a48cc
KB
544 switch(errno) {
545 case ESRCH:
ae578a19 546 printf("not in table\n");
a48a48cc
KB
547 break;
548 case EBUSY:
ae578a19 549 printf("entry in use\n");
a48a48cc
KB
550 break;
551 case ENOBUFS:
ae578a19 552 printf("routing table overflow\n");
a48a48cc
KB
553 break;
554 default:
57cacc90 555 printf("ioctl returns %d\n", errno);
4bec325f 556 perror(cmd);
a48a48cc 557 }
ae578a19
KS
558 fflush(stdout);
559 errno = 0;
4bec325f
BJ
560}
561
55e026df
MK
562char *
563savestr(s)
564 char *s;
565{
566 char *sav;
567
568 sav = malloc(strlen(s) + 1);
569 if (sav == NULL) {
570 fprintf("route: out of memory\n");
571 exit(1);
572 }
573 strcpy(sav, s);
574 return (sav);
575}
576
31bd2db6 577inet_makenetandmask(net, sin)
5c7868a2 578u_long net;
31bd2db6 579register struct sockaddr_in *sin;
57cacc90
KS
580{
581 u_long addr;
5c7868a2 582 u_long mask = 0;
31bd2db6 583 register char *cp;
57cacc90 584
31bd2db6 585 rtm_addrs |= RTA_NETMASK;
57cacc90 586 if (net == 0)
5c7868a2 587 mask = addr = 0;
57cacc90
KS
588 else if (net < 128) {
589 addr = net << IN_CLASSA_NSHIFT;
5c7868a2 590 mask = IN_CLASSA_NET;
57cacc90
KS
591 } else if (net < 65536) {
592 addr = net << IN_CLASSB_NSHIFT;
5c7868a2 593 mask = IN_CLASSB_NET;
57cacc90
KS
594 } else if (net < 16777216L) {
595 addr = net << IN_CLASSC_NSHIFT;
5c7868a2 596 mask = IN_CLASSC_NET;
57cacc90
KS
597 } else {
598 addr = net;
599 if ((addr & IN_CLASSA_HOST) == 0)
5c7868a2 600 mask = IN_CLASSA_NET;
57cacc90 601 else if ((addr & IN_CLASSB_HOST) == 0)
5c7868a2 602 mask = IN_CLASSB_NET;
57cacc90 603 else if ((addr & IN_CLASSC_HOST) == 0)
5c7868a2 604 mask = IN_CLASSC_NET;
57cacc90 605 else
5c7868a2
KS
606 mask = -1;
607 }
31bd2db6
KS
608 sin->sin_addr.s_addr = htonl(addr);
609 sin = &so_mask.sin;
610 sin->sin_addr.s_addr = htonl(mask);
611 sin->sin_len = 0;
612 sin->sin_family = 0;
613 cp = (char *)(1 + &(sin->sin_addr));
614 while (*--cp == 0 && cp > (char *)sin)
615 ;
616 sin->sin_len = 1 + cp - (char *)sin;
57cacc90
KS
617}
618
6edb1941
MK
619/*
620 * Interpret an argument as a network address of some kind,
621 * returning 1 if a host address, 0 if a network address.
622 */
31bd2db6 623getaddr(which, s, hpp)
4bec325f 624 char *s;
792b0612 625 struct hostent **hpp;
4bec325f 626{
31bd2db6 627 register union sockunion *su;
b268b889 628 struct ns_addr ns_addr();
eb03b231 629 struct iso_addr *iso_addr();
accbc2e3 630 struct hostent *hp;
379dcc38 631 struct netent *np;
31bd2db6 632 u_long val;
accbc2e3 633
eb03b231 634 if (af == 0) {
31bd2db6 635 af = AF_INET;
eb03b231
KS
636 aflen = sizeof(struct sockaddr_in);
637 }
638 rtm_addrs |= which;
31bd2db6 639 switch (which) {
eb03b231
KS
640 case RTA_DST: su = so_addrs[0]; su->sa.sa_family = af; break;
641 case RTA_GATEWAY: su = so_addrs[1]; su->sa.sa_family = af; break;
642 case RTA_NETMASK: su = so_addrs[2]; break;
31bd2db6
KS
643 case RTA_GENMASK: su = so_addrs[3]; break;
644 default: usage("Internal Error"); /*NOTREACHED*/
645 }
eb03b231 646 su->sa.sa_len = aflen;
7d5f817b 647 if (strcmp(s, "default") == 0) {
eb03b231
KS
648 switch (which) {
649 case RTA_DST:
650 forcenet++;
31bd2db6 651 getaddr(RTA_NETMASK, s, 0);
eb03b231
KS
652 break;
653 case RTA_NETMASK:
654 case RTA_GENMASK:
655 su->sa.sa_len = 0;
656 }
31bd2db6 657 return 0;
7d5f817b 658 }
31bd2db6 659 if (af == AF_NS)
b268b889 660 goto do_xns;
31bd2db6 661 if (af == AF_OSI)
7d5f817b 662 goto do_osi;
31bd2db6
KS
663 if (af == AF_LINK)
664 goto do_link;
31bd2db6 665 if (hpp == 0) hpp = &hp;
7d5f817b 666 *hpp = 0;
85e467b1
KS
667 if (((val = inet_addr(s)) != -1) &&
668 (which != RTA_DST || forcenet == 0)) {
31bd2db6
KS
669 su->sin.sin_addr.s_addr = val;
670 if (inet_lnaof(su->sin.sin_addr) != INADDR_ANY)
671 return (1);
672 else {
673 val = ntohl(val);
674 out: if (which == RTA_DST)
675 inet_makenetandmask(val, &su->sin);
676 return (0);
a2280e64 677 }
792b0612
MK
678 }
679 val = inet_network(s);
680 if (val != -1) {
5c7868a2 681 goto out;
792b0612 682 }
379dcc38
SL
683 np = getnetbyname(s);
684 if (np) {
5c7868a2 685 val = np->n_net;
5c7868a2 686 goto out;
379dcc38 687 }
78160c55
MK
688 hp = gethostbyname(s);
689 if (hp) {
792b0612 690 *hpp = hp;
31bd2db6
KS
691 su->sin.sin_family = hp->h_addrtype;
692 bcopy(hp->h_addr, &su->sin.sin_addr, hp->h_length);
57cacc90 693 return (1);
78160c55 694 }
379dcc38
SL
695 fprintf(stderr, "%s: bad value\n", s);
696 exit(1);
b268b889 697do_xns:
7d5f817b
KS
698 if (val == 0)
699 return(0);
31bd2db6 700 if (which == RTA_DST) {
57cacc90 701 extern short ns_bh[3];
31bd2db6
KS
702 struct sockaddr_ns *sms = &(so_mask.sns);
703 bzero((char *)sms, sizeof(*sms));
57cacc90
KS
704 sms->sns_family = 0;
705 sms->sns_len = 6;
706 sms->sns_addr.x_net = *(union ns_net *)ns_bh;
31bd2db6 707 rtm_addrs |= RTA_NETMASK;
57cacc90 708 }
31bd2db6
KS
709 su->sns.sns_addr = ns_addr(s);
710 return (!ns_nullhost(su->sns.sns_addr));
7d5f817b 711do_osi:
eb03b231
KS
712 su->siso.siso_addr = *iso_addr(s);
713 if (which == RTA_NETMASK || which == RTA_GENMASK) {
714 register char *cp = (char *)TSEL(&su->siso);
715 su->siso.siso_nlen = 0;
716 do {--cp ;} while ((cp > (char *)su) && (*cp == 0));
717 su->siso.siso_len = 1 + cp - (char *)su;
718 }
31bd2db6
KS
719 return (1);
720do_link:
31bd2db6 721 link_addr(s, &su->sdl);
7d5f817b 722 return (1);
183ef13b 723}
eac76d14
MK
724
725short ns_nullh[] = {0,0,0};
726short ns_bh[] = {-1,-1,-1};
727
728char *
729ns_print(sns)
730struct sockaddr_ns *sns;
731{
732 struct ns_addr work;
733 union { union ns_net net_e; u_long long_e; } net;
734 u_short port;
735 static char mybuf[50], cport[10], chost[25];
736 char *host = "";
737 register char *p; register u_char *q; u_char *q_lim;
738
739 work = sns->sns_addr;
740 port = ntohs(work.x_port);
741 work.x_port = 0;
742 net.net_e = work.x_net;
743 if (ns_nullhost(work) && net.long_e == 0) {
744 if (port ) {
9bd38ba8 745 (void)sprintf(mybuf, "*.%xH", port);
eac76d14
MK
746 upHex(mybuf);
747 } else
9bd38ba8 748 (void)sprintf(mybuf, "*.*");
eac76d14
MK
749 return (mybuf);
750 }
751
752 if (bcmp(ns_bh, work.x_host.c_host, 6) == 0) {
753 host = "any";
754 } else if (bcmp(ns_nullh, work.x_host.c_host, 6) == 0) {
755 host = "*";
756 } else {
757 q = work.x_host.c_host;
9bd38ba8 758 (void)sprintf(chost, "%02x%02x%02x%02x%02x%02xH",
eac76d14
MK
759 q[0], q[1], q[2], q[3], q[4], q[5]);
760 for (p = chost; *p == '0' && p < chost + 12; p++);
761 host = p;
762 }
763 if (port)
9bd38ba8 764 (void)sprintf(cport, ".%xH", htons(port));
eac76d14
MK
765 else
766 *cport = 0;
767
9bd38ba8 768 (void)sprintf(mybuf,"%xH.%s%s", ntohl(net.long_e), host, cport);
eac76d14
MK
769 upHex(mybuf);
770 return(mybuf);
771}
772
773upHex(p0)
774char *p0;
775{
776 register char *p = p0;
777 for (; *p; p++) switch (*p) {
778
779 case 'a': case 'b': case 'c': case 'd': case 'e': case 'f':
780 *p += ('A' - 'a');
781 }
782}
57cacc90
KS
783
784monitor()
785{
786 int n;
787 char msg[2048];
9eb5d442 788 verbose = 1;
57cacc90
KS
789 for(;;) {
790 n = read(s, msg, 2048);
791 printf("got message of size %d\n", n);
31bd2db6 792 print_rtmsg((struct rt_msghdr *)msg);
57cacc90
KS
793 }
794}
795
796struct {
797 struct rt_msghdr m_rtm;
31bd2db6 798 char m_space[512];
57cacc90
KS
799} m_rtmsg;
800
31bd2db6 801rtmsg(cmd, flags)
57cacc90
KS
802{
803 static int seq;
85e467b1 804 int rlen;
57cacc90 805 extern int errno;
31bd2db6
KS
806 register char *cp = m_rtmsg.m_space;
807 register int l;
57cacc90
KS
808
809 errno = 0;
810 bzero((char *)&m_rtmsg, sizeof(m_rtmsg));
811 if (cmd == 'a')
812 cmd = RTM_ADD;
813 else if (cmd == 'c')
814 cmd = RTM_CHANGE;
815 else
816 cmd = RTM_DELETE;
817 m_rtmsg.m_rtm.rtm_flags = flags;
a387100b 818 m_rtmsg.m_rtm.rtm_version = RTM_VERSION;
57cacc90 819 m_rtmsg.m_rtm.rtm_seq = ++seq;
31bd2db6 820 m_rtmsg.m_rtm.rtm_addrs = rtm_addrs;
7cd60aa5 821 m_rtmsg.m_rtm.rtm_rmx = rt_metrics;
7d8dd943 822 m_rtmsg.m_rtm.rtm_inits = rtm_inits;
31bd2db6
KS
823
824#define ROUND(a) (1 + (((a) - 1) | (sizeof(long) - 1)))
825#define NEXTADDR(w, u) { if (rtm_addrs & (w)) {l = (u).sa.sa_len;\
826 if(verbose)sodump(&(u),"u");if(l == 0) l = sizeof(int); l = ROUND(l);\
827 bcopy((char *)&(u), cp, l); cp += l;}}
828
829 NEXTADDR(RTA_DST, so_dst);
830 NEXTADDR(RTA_GATEWAY, so_gate);
831 NEXTADDR(RTA_NETMASK, so_mask);
832 NEXTADDR(RTA_GENMASK, so_genmask);
85e467b1 833 m_rtmsg.m_rtm.rtm_msglen = l = cp - (char *)&m_rtmsg;
57cacc90 834 m_rtmsg.m_rtm.rtm_type = cmd;
31bd2db6 835 if (verbose)
85e467b1 836 print_rtmsg(&m_rtmsg.m_rtm, l);
7cd60aa5
KS
837 if (debugonly)
838 return 0;
85e467b1 839 if ((rlen = write(s, (char *)&m_rtmsg, l)) < 0) {
57cacc90
KS
840 perror("writing to routing socket");
841 printf("got only %d for rlen\n", rlen);
7d5f817b 842 return (-1);
57cacc90 843 }
57cacc90
KS
844 return (0);
845}
846
847char *msgtypes[] = {
848"",
849"RTM_ADD: Add Route",
850"RTM_DELETE: Delete Route",
851"RTM_CHANGE: Change Metrics or flags",
852"RTM_GET: Report Metrics",
853"RTM_LOSING: Kernel Suspects Partitioning",
854"RTM_REDIRECT: Told to use different route",
855"RTM_MISS: Lookup failed on this address",
856"RTM_LOCK: fix specified metrics",
857"RTM_OLDADD: caused by SIOCADDRT",
858"RTM_OLDDEL: caused by SIOCDELRT",
8590, };
860
861char metricnames[] =
7cd60aa5
KS
862"\010rttvar\7rtt\6ssthresh\5sendpipe\4recvpipe\3expire\2hopcount\1mtu";
863char routeflags[] =
039256d2 864"\1UP\2GATEWAY\3HOST\4REJECT\5DYNAMIC\6MODIFIED\7DONE\010MASK_PRESENT\011CLONING\012XRESOLVE";
57cacc90
KS
865
866#define ROUNDUP(a) ((char *)(1 + (((((int)a)) - 1) | (sizeof(long) - 1))))
867
868print_rtmsg(rtm, n)
869register struct rt_msghdr *rtm;
870{
871 char *cp;
872 register struct sockaddr *sa;
a387100b 873 int i;
57cacc90 874
7d5f817b
KS
875 if (verbose == 0)
876 return;
a387100b 877 if (rtm->rtm_version != RTM_VERSION) {
5c7868a2 878 printf("routing message version %d not understood\n",
57cacc90 879 rtm->rtm_version);
5c7868a2
KS
880 } else {
881 printf("%s\npid: %d, len %d, seq %d, errno %d, flags:",
882 msgtypes[rtm->rtm_type], rtm->rtm_pid, rtm->rtm_msglen,
883 rtm->rtm_seq, rtm->rtm_errno);
7cd60aa5 884 bprintf(stdout, rtm->rtm_flags, routeflags);
a387100b 885 printf("\nlocks: "); bprintf(stdout, rtm->rtm_rmx.rmx_locks, metricnames);
5c7868a2 886 printf(" inits: "); bprintf(stdout, rtm->rtm_inits, metricnames);
31bd2db6 887 printf("\nsockaddrs: ");
a387100b
KS
888 bprintf(stdout, rtm->rtm_addrs,
889 "\1DST\2GATEWAY\3NETMASK\4GENMASK\5IFP\6IFA\7AUTHOR");
890 putchar('\n');
5c7868a2 891 cp = ((char *)(rtm + 1));
a387100b
KS
892 if (rtm->rtm_addrs)
893 for (i = 1; i; i <<= 1)
894 if (i & rtm->rtm_addrs) {
895 sa = (struct sockaddr *)cp;
896 printf(" %s", routename(sa));
897 cp = ROUNDUP(cp + sa->sa_len);
898 }
5c7868a2 899 putchar('\n');
57cacc90 900 }
57cacc90
KS
901 fflush(stdout);
902}
903
904bprintf(fp, b, s)
905register FILE *fp;
906register int b;
907register u_char *s;
908{
909 register int i;
910 int gotsome = 0;
911
912 if (b == 0)
913 return;
914 while (i = *s++) {
915 if (b & (1 << (i-1))) {
916 if (gotsome == 0) i = '<'; else i = ',';
917 putc(i, fp);
918 gotsome = 1;
919 for (; (i = *s) > 32; s++)
920 putc(i, fp);
921 } else
922 while (*s > 32)
923 s++;
924 }
925 if (gotsome)
926 putc('>', fp);
927}
31bd2db6
KS
928int
929keyword(cp)
930char *cp;
931{
932 register struct keytab *kt = keywords;
933 while (kt->kt_cp && strcmp(kt->kt_cp, cp))
934 kt++;
935 return kt->kt_i;
936}
937
938sodump(su, which)
939register union sockunion *su;
940char *which;
941{
942 switch (su->sa.sa_family) {
943 case AF_LINK:
944 printf("%s: link %s; ", which, link_ntoa(&su->sdl));
945 break;
946 case AF_ISO:
947 printf("%s: iso %s; ", which, iso_ntoa(&su->siso.siso_addr));
948 break;
949 case AF_INET:
950 printf("%s: inet %s; ", which, inet_ntoa(su->sin.sin_addr));
951 break;
952 case AF_NS:
953 printf("%s: xns %s; ", which, ns_ntoa(&su->sns.sns_addr));
954 break;
955 }
956 fflush(stdout);
957}