1/*-
2 * SPDX-License-Identifier: BSD-2-Clause
3 *
4 * Copyright (c) 2007-2009 Bruce Simpson.
5 * Copyright (c) 2000 Wilbert De Graaf.
6 * All rights reserved.
7 *
8 * Redistribution and use in source and binary forms, with or without
9 * modification, are permitted provided that the following conditions
10 * are met:
11 * 1. Redistributions of source code must retain the above copyright
12 *    notice, this list of conditions and the following disclaimer.
13 * 2. Redistributions in binary form must reproduce the above copyright
14 *    notice, this list of conditions and the following disclaimer in the
15 *    documentation and/or other materials provided with the distribution.
16 *
17 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
18 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
19 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
20 * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
21 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
22 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
23 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
24 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
25 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
26 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
27 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
30 * SUCH DAMAGE.
31 */
32
33/*
34 * Diagnostic and test utility for multicast sockets.
35 * XXX: This file currently assumes INET support in the base system.
36 * TODO: Support embedded KAME Scope ID in IPv6 group addresses.
37 * TODO: Use IPv4 link-local address when source address selection
38 * is implemented; use MCAST_JOIN_SOURCE for IPv4.
39 */
40
41#include <sys/types.h>
42#include <sys/param.h>
43#include <sys/errno.h>
44#include <sys/socket.h>
45#include <sys/time.h>
46#include <sys/ioctl.h>
47
48#include <net/if.h>
49#include <net/if_dl.h>
50#include <net/ethernet.h>
51#ifdef INET
52#include <netinet/in.h>
53#include <netinet/in_systm.h>
54#include <netinet/ip.h>
55#include <netinet/ip_var.h>
56#endif
57#ifdef INET6
58#include <netinet/in.h>
59#include <netinet/ip6.h>
60#endif
61
62#include <assert.h>
63#include <stdlib.h>
64#include <stdio.h>
65#include <string.h>
66#include <ctype.h>
67#include <errno.h>
68#include <err.h>
69#include <unistd.h>
70
71#include <arpa/inet.h>
72#include <netdb.h>
73#include <ifaddrs.h>
74
75union sockunion {
76	struct sockaddr_storage	ss;
77	struct sockaddr		sa;
78	struct sockaddr_dl	sdl;
79#ifdef INET
80	struct sockaddr_in	sin;
81#endif
82#ifdef INET6
83	struct sockaddr_in6	sin6;
84#endif
85};
86typedef union sockunion sockunion_t;
87
88union mrequnion {
89#ifdef INET
90	struct ip_mreq	 	 mr;
91	struct ip_mreq_source	 mrs;
92#endif
93#ifdef INET6
94	struct ipv6_mreq	 mr6;
95	struct group_source_req	 gr;
96#endif
97};
98typedef union mrequnion mrequnion_t;
99
100#define	MAX_ADDRS	20
101#define	STR_SIZE	20
102#define	LINE_LENGTH	80
103
104#ifdef INET
105static int	__ifindex_to_primary_ip(const uint32_t, struct in_addr *);
106#endif
107static uint32_t	parse_cmd_args(sockunion_t *, sockunion_t *,
108		    const char *, const char *, const char *);
109static void	process_file(char *, int, int);
110static void	process_cmd(char*, int, int, FILE *);
111static int	su_cmp(const void *, const void *);
112static void	usage(void);
113
114/*
115 * Ordering predicate for qsort().
116 */
117static int
118su_cmp(const void *a, const void *b)
119{
120	const sockunion_t	*sua = (const sockunion_t *)a;
121	const sockunion_t	*sub = (const sockunion_t *)b;
122
123	assert(sua->sa.sa_family == sub->sa.sa_family);
124
125	switch (sua->sa.sa_family) {
126#ifdef INET
127	case AF_INET:
128		return ((int)(sua->sin.sin_addr.s_addr -
129		    sub->sin.sin_addr.s_addr));
130		break;
131#endif
132#ifdef INET6
133	case AF_INET6:
134		return (memcmp(&sua->sin6.sin6_addr, &sub->sin6.sin6_addr,
135		    sizeof(struct in6_addr)));
136		break;
137#endif
138	default:
139		break;
140	}
141
142	assert(sua->sa.sa_len == sub->sa.sa_len);
143	return (memcmp(sua, sub, sua->sa.sa_len));
144}
145
146#ifdef INET
147/*
148 * Internal: Map an interface index to primary IPv4 address.
149 * This is somewhat inefficient. This is a useful enough operation
150 * that it probably belongs in the C library.
151 * Return zero if found, -1 on error, 1 on not found.
152 */
153static int
154__ifindex_to_primary_ip(const uint32_t ifindex, struct in_addr *pina)
155{
156	char		 ifname[IFNAMSIZ];
157	struct ifaddrs	*ifa;
158	struct ifaddrs	*ifaddrs;
159	sockunion_t	*psu;
160	int		 retval;
161
162	assert(ifindex != 0);
163
164	retval = -1;
165	if (if_indextoname(ifindex, ifname) == NULL)
166		return (retval);
167	if (getifaddrs(&ifaddrs) < 0)
168		return (retval);
169
170	/*
171	 * Find the ifaddr entry corresponding to the interface name,
172	 * and return the first matching IPv4 address.
173	 */
174	retval = 1;
175	for (ifa = ifaddrs; ifa != NULL; ifa = ifa->ifa_next) {
176		if (strcmp(ifa->ifa_name, ifname) != 0)
177			continue;
178		psu = (sockunion_t *)ifa->ifa_addr;
179		if (psu && psu->sa.sa_family == AF_INET) {
180			retval = 0;
181			memcpy(pina, &psu->sin.sin_addr,
182			    sizeof(struct in_addr));
183			break;
184		}
185	}
186
187	if (retval != 0)
188		errno = EADDRNOTAVAIL;	/* XXX */
189
190	freeifaddrs(ifaddrs);
191	return (retval);
192}
193#endif /* INET */
194
195int
196main(int argc, char **argv)
197{
198	char	 line[LINE_LENGTH];
199	char	*p;
200	int	 i, s, s6;
201
202	s = -1;
203	s6 = -1;
204#ifdef INET
205	s = socket(AF_INET, SOCK_DGRAM, IPPROTO_UDP);
206	if (s == -1 && errno != EAFNOSUPPORT)
207		err(1, "can't open IPv4 socket");
208#endif
209#ifdef INET6
210	s6 = socket(AF_INET6, SOCK_DGRAM, IPPROTO_UDP);
211	if (s6 == -1 && errno != EAFNOSUPPORT)
212		err(1, "can't open IPv6 socket");
213#endif
214	if (s == -1 && s6 == -1)
215		errc(1, EPROTONOSUPPORT, "can't open socket");
216
217	if (argc < 2) {
218		if (isatty(STDIN_FILENO)) {
219			printf("multicast membership test program; "
220			    "enter ? for list of commands\n");
221		}
222		do {
223			if (fgets(line, sizeof(line), stdin) != NULL) {
224				if (line[0] != 'f')
225					process_cmd(line, s, s6, stdin);
226				else {
227					/* Get the filename */
228					for (i = 1; isblank(line[i]); i++);
229					if ((p = (char*)strchr(line, '\n'))
230					    != NULL)
231						*p = '\0';
232					process_file(&line[i], s, s6);
233				}
234			}
235		} while (!feof(stdin));
236	} else {
237		for (i = 1; i < argc; i++) {
238			process_file(argv[i], s, s6);
239		}
240	}
241
242	if (s != -1)
243		close(s);
244	if (s6 != -1)
245		close(s6);
246
247	exit (0);
248}
249
250static void
251process_file(char *fname, int s, int s6)
252{
253	char line[80];
254	FILE *fp;
255	char *lineptr;
256
257	fp = fopen(fname, "r");
258	if (fp == NULL) {
259		warn("fopen");
260		return;
261	}
262
263	/* Skip comments and empty lines. */
264	while (fgets(line, sizeof(line), fp) != NULL) {
265		lineptr = line;
266		while (isblank(*lineptr))
267			lineptr++;
268		if (*lineptr != '#' && *lineptr != '\n')
269			process_cmd(lineptr, s, s6, fp);
270	}
271
272	fclose(fp);
273}
274
275/*
276 * Parse join/leave/allow/block arguments, given:
277 *  str1: group (as AF_INET or AF_INET6 printable)
278 *  str2: ifname
279 *  str3: optional source address (may be NULL).
280 *   This argument must have the same parsed address family as str1.
281 * Return the ifindex of ifname, or 0 if any parse element failed.
282 */
283static uint32_t
284parse_cmd_args(sockunion_t *psu, sockunion_t *psu2,
285    const char *str1, const char *str2, const char *str3)
286{
287	struct addrinfo		 hints;
288	struct addrinfo		*res;
289	uint32_t		 ifindex;
290	int			 af, error;
291
292	assert(psu != NULL);
293	assert(str1 != NULL);
294	assert(str2 != NULL);
295
296	af = AF_UNSPEC;
297
298	ifindex = if_nametoindex(str2);
299	if (ifindex == 0)
300		return (0);
301
302	memset(&hints, 0, sizeof(struct addrinfo));
303	hints.ai_flags = AI_NUMERICHOST;
304	hints.ai_family = PF_UNSPEC;
305	hints.ai_socktype = SOCK_DGRAM;
306
307	memset(psu, 0, sizeof(sockunion_t));
308	psu->sa.sa_family = AF_UNSPEC;
309
310	error = getaddrinfo(str1, "0", &hints, &res);
311	if (error) {
312		warnx("getaddrinfo: %s", gai_strerror(error));
313		return (0);
314	}
315	assert(res != NULL);
316	af = res->ai_family;
317	memcpy(psu, res->ai_addr, res->ai_addrlen);
318	freeaddrinfo(res);
319
320	/* sscanf() may pass the empty string. */
321	if (psu2 != NULL && str3 != NULL && *str3 != '\0') {
322		memset(psu2, 0, sizeof(sockunion_t));
323		psu2->sa.sa_family = AF_UNSPEC;
324
325		/* look for following address family; str3 is *optional*. */
326		hints.ai_family = af;
327		error = getaddrinfo(str3, "0", &hints, &res);
328		if (error) {
329			warnx("getaddrinfo: %s", gai_strerror(error));
330			ifindex = 0;
331		} else {
332			if (af != res->ai_family) {
333				errno = EINVAL; /* XXX */
334				ifindex = 0;
335			}
336			memcpy(psu2, res->ai_addr, res->ai_addrlen);
337			freeaddrinfo(res);
338		}
339	}
340
341	return (ifindex);
342}
343
344static __inline int
345af2sock(const int af, int s, int s6)
346{
347
348#ifdef INET
349	if (af == AF_INET)
350		return (s);
351#endif
352#ifdef INET6
353	if (af == AF_INET6)
354		return (s6);
355#endif
356	return (-1);
357}
358
359static __inline int
360af2socklen(const int af)
361{
362
363#ifdef INET
364	if (af == AF_INET)
365		return (sizeof(struct sockaddr_in));
366#endif
367#ifdef INET6
368	if (af == AF_INET6)
369		return (sizeof(struct sockaddr_in6));
370#endif
371	return (-1);
372}
373
374static void
375process_cmd(char *cmd, int s, int s6, FILE *fp __unused)
376{
377	char			 str1[STR_SIZE];
378	char			 str2[STR_SIZE];
379	char			 str3[STR_SIZE];
380	mrequnion_t		 mr;
381	sockunion_t		 su, su2;
382	struct ifreq		 ifr;
383	char			*line;
384	char			*toptname;
385	void			*optval;
386	uint32_t		 fmode, ifindex;
387	socklen_t		 optlen;
388	size_t			 j;
389	int			 af, error, f, flags, i, level, n, optname;
390
391	af = AF_UNSPEC;
392	su.sa.sa_family = AF_UNSPEC;
393	su2.sa.sa_family = AF_UNSPEC;
394
395	line = cmd;
396	while (isblank(*++line))
397		;	/* Skip whitespace. */
398
399	n = 0;
400	switch (*cmd) {
401	case '?':
402		usage();
403		break;
404
405	case 'q':
406		close(s);
407		exit(0);
408
409	case 's':
410		if ((sscanf(line, "%d", &n) != 1) || (n < 1)) {
411			printf("-1\n");
412			break;
413		}
414		sleep(n);
415		printf("ok\n");
416		break;
417
418	case 'j':
419	case 'l':
420		str3[0] = '\0';
421		toptname = "";
422		sscanf(line, "%s %s %s", str1, str2, str3);
423		ifindex = parse_cmd_args(&su, &su2, str1, str2, str3);
424		if (ifindex == 0) {
425			printf("-1\n");
426			break;
427		}
428		af = su.sa.sa_family;
429#ifdef INET
430		if (af == AF_INET) {
431			struct in_addr ina;
432
433			error = __ifindex_to_primary_ip(ifindex, &ina);
434			if (error != 0) {
435				warn("primary_ip_lookup %s", str2);
436				printf("-1\n");
437				break;
438			}
439			level = IPPROTO_IP;
440
441			if (su2.sa.sa_family != AF_UNSPEC) {
442				mr.mrs.imr_multiaddr = su.sin.sin_addr;
443				mr.mrs.imr_sourceaddr = su2.sin.sin_addr;
444				mr.mrs.imr_interface = ina;
445				optname = (*cmd == 'j') ?
446				    IP_ADD_SOURCE_MEMBERSHIP :
447				    IP_DROP_SOURCE_MEMBERSHIP;
448				toptname = (*cmd == 'j') ?
449				    "IP_ADD_SOURCE_MEMBERSHIP" :
450				    "IP_DROP_SOURCE_MEMBERSHIP";
451				optval = (void *)&mr.mrs;
452				optlen = sizeof(mr.mrs);
453			} else {
454				mr.mr.imr_multiaddr = su.sin.sin_addr;
455				mr.mr.imr_interface = ina;
456				optname = (*cmd == 'j') ?
457				    IP_ADD_MEMBERSHIP : IP_DROP_MEMBERSHIP;
458				toptname = (*cmd == 'j') ?
459				    "IP_ADD_MEMBERSHIP" : "IP_DROP_MEMBERSHIP";
460				optval = (void *)&mr.mr;
461				optlen = sizeof(mr.mr);
462			}
463			if (s < 0) {
464				warnc(EPROTONOSUPPORT, "setsockopt %s",
465				    toptname);
466			} else if (setsockopt(s, level, optname, optval,
467			    optlen) == 0) {
468				printf("ok\n");
469				break;
470			} else {
471				warn("setsockopt %s", toptname);
472			}
473		}
474#ifdef INET6
475		else
476#endif /* INET with INET6 */
477#endif /* INET */
478#ifdef INET6
479		if (af == AF_INET6) {
480			level = IPPROTO_IPV6;
481			if (su2.sa.sa_family != AF_UNSPEC) {
482				mr.gr.gsr_interface = ifindex;
483				mr.gr.gsr_group = su.ss;
484				mr.gr.gsr_source = su2.ss;
485				optname = (*cmd == 'j') ?
486				    MCAST_JOIN_SOURCE_GROUP:
487				    MCAST_LEAVE_SOURCE_GROUP;
488				toptname = (*cmd == 'j') ?
489				    "MCAST_JOIN_SOURCE_GROUP":
490				    "MCAST_LEAVE_SOURCE_GROUP";
491				optval = (void *)&mr.gr;
492				optlen = sizeof(mr.gr);
493			} else {
494				mr.mr6.ipv6mr_multiaddr = su.sin6.sin6_addr;
495				mr.mr6.ipv6mr_interface = ifindex;
496				optname = (*cmd == 'j') ?
497				    IPV6_JOIN_GROUP :
498				    IPV6_LEAVE_GROUP;
499				toptname = (*cmd == 'j') ?
500				    "IPV6_JOIN_GROUP" :
501				    "IPV6_LEAVE_GROUP";
502				optval = (void *)&mr.mr6;
503				optlen = sizeof(mr.mr6);
504			}
505			if (s6 < 0) {
506				warnc(EPROTONOSUPPORT, "setsockopt %s",
507				    toptname);
508			} else if (setsockopt(s6, level, optname, optval,
509			    optlen) == 0) {
510				printf("ok\n");
511				break;
512			} else {
513				warn("setsockopt %s", toptname);
514			}
515		}
516#endif /* INET6 */
517		/* FALLTHROUGH */
518		printf("-1\n");
519		break;
520
521	/*
522	 * Set the socket to include or exclude filter mode, and
523	 * add some sources to the filterlist, using the full-state API.
524	 */
525	case 'i':
526	case 'e': {
527		sockunion_t	 sources[MAX_ADDRS];
528		struct addrinfo	 hints;
529		struct addrinfo	*res;
530		char		*cp;
531		int		 af1;
532
533		n = 0;
534		fmode = (*cmd == 'i') ? MCAST_INCLUDE : MCAST_EXCLUDE;
535		if ((sscanf(line, "%s %s %d", str1, str2, &n)) != 3) {
536			printf("-1\n");
537			break;
538		}
539
540		ifindex = parse_cmd_args(&su, NULL, str1, str2, NULL);
541		if (ifindex == 0 || n < 0 || n > MAX_ADDRS) {
542			printf("-1\n");
543			break;
544		}
545		af = su.sa.sa_family;
546		if (af2sock(af, s, s6) == -1) {
547			warnc(EPROTONOSUPPORT, "setsourcefilter");
548			break;
549		}
550
551		memset(&hints, 0, sizeof(struct addrinfo));
552		hints.ai_flags = AI_NUMERICHOST;
553		hints.ai_family = af;
554		hints.ai_socktype = SOCK_DGRAM;
555
556		for (i = 0; i < n; i++) {
557			sockunion_t *psu = (sockunion_t *)&sources[i];
558			/*
559			 * Trim trailing whitespace, as getaddrinfo()
560			 * can't cope with it.
561			 */
562			fgets(str1, sizeof(str1), fp);
563			cp = strchr(str1, '\n');
564			if (cp != NULL)
565				*cp = '\0';
566
567			res = NULL;
568			error = getaddrinfo(str1, "0", &hints, &res);
569			if (error)
570				break;
571			assert(res != NULL);
572
573			memset(psu, 0, sizeof(sockunion_t));
574			af1 = res->ai_family;
575			if (af1 == af)
576				memcpy(psu, res->ai_addr, res->ai_addrlen);
577			freeaddrinfo(res);
578			if (af1 != af)
579				break;
580		}
581		if (i < n) {
582			if (error)
583				warnx("getaddrinfo: %s", gai_strerror(error));
584			printf("-1\n");
585			break;
586		}
587		if (setsourcefilter(af2sock(af, s, s6), ifindex,
588		    &su.sa, su.sa.sa_len, fmode, n, &sources[0].ss) != 0)
589			warn("setsourcefilter");
590		else
591			printf("ok\n");
592	} break;
593
594	/*
595	 * Allow or block traffic from a source, using the
596	 * delta based api.
597	 */
598	case 't':
599	case 'b': {
600		str3[0] = '\0';
601		toptname = "";
602		sscanf(line, "%s %s %s", str1, str2, str3);
603		ifindex = parse_cmd_args(&su, &su2, str1, str2, str3);
604		if (ifindex == 0 || su2.sa.sa_family == AF_UNSPEC) {
605			printf("-1\n");
606			break;
607		}
608		af = su.sa.sa_family;
609		if (af2sock(af, s, s6) == -1) {
610			warnc(EPROTONOSUPPORT, "getsourcefilter");
611			break;
612		}
613
614		/* First determine our current filter mode. */
615		if (getsourcefilter(af2sock(af, s, s6), ifindex,
616		    &su.sa, su.sa.sa_len, &fmode, &n, NULL) != 0) {
617			warn("getsourcefilter");
618			break;
619		}
620#ifdef INET
621		if (af == AF_INET) {
622			struct in_addr ina;
623
624			error = __ifindex_to_primary_ip(ifindex, &ina);
625			if (error != 0) {
626				warn("primary_ip_lookup %s", str2);
627				printf("-1\n");
628				break;
629			}
630			level = IPPROTO_IP;
631			optval = (void *)&mr.mrs;
632			optlen = sizeof(mr.mrs);
633			mr.mrs.imr_multiaddr = su.sin.sin_addr;
634			mr.mrs.imr_sourceaddr = su2.sin.sin_addr;
635			mr.mrs.imr_interface = ina;
636			if (fmode == MCAST_EXCLUDE) {
637				/* Any-source mode socket membership. */
638				optname = (*cmd == 't') ?
639				    IP_UNBLOCK_SOURCE :
640				    IP_BLOCK_SOURCE;
641				toptname = (*cmd == 't') ?
642				    "IP_UNBLOCK_SOURCE" :
643				    "IP_BLOCK_SOURCE";
644			} else {
645				/* Source-specific mode socket membership. */
646				optname = (*cmd == 't') ?
647				    IP_ADD_SOURCE_MEMBERSHIP :
648				    IP_DROP_SOURCE_MEMBERSHIP;
649				toptname = (*cmd == 't') ?
650				    "IP_ADD_SOURCE_MEMBERSHIP" :
651				    "IP_DROP_SOURCE_MEMBERSHIP";
652			}
653			if (setsockopt(s, level, optname, optval,
654			    optlen) == 0) {
655				printf("ok\n");
656				break;
657			} else {
658				warn("setsockopt %s", toptname);
659			}
660		}
661#ifdef INET6
662		else
663#endif /* INET with INET6 */
664#endif /* INET */
665#ifdef INET6
666		if (af == AF_INET6) {
667			level = IPPROTO_IPV6;
668			mr.gr.gsr_interface = ifindex;
669			mr.gr.gsr_group = su.ss;
670			mr.gr.gsr_source = su2.ss;
671			if (fmode == MCAST_EXCLUDE) {
672				/* Any-source mode socket membership. */
673				optname = (*cmd == 't') ?
674				    MCAST_UNBLOCK_SOURCE :
675				    MCAST_BLOCK_SOURCE;
676				toptname = (*cmd == 't') ?
677				    "MCAST_UNBLOCK_SOURCE" :
678				    "MCAST_BLOCK_SOURCE";
679			} else {
680				/* Source-specific mode socket membership. */
681				optname = (*cmd == 't') ?
682				    MCAST_JOIN_SOURCE_GROUP :
683				    MCAST_LEAVE_SOURCE_GROUP;
684				toptname = (*cmd == 't') ?
685				    "MCAST_JOIN_SOURCE_GROUP":
686				    "MCAST_LEAVE_SOURCE_GROUP";
687			}
688			optval = (void *)&mr.gr;
689			optlen = sizeof(mr.gr);
690			if (setsockopt(s6, level, optname, optval,
691			    optlen) == 0) {
692				printf("ok\n");
693				break;
694			} else {
695				warn("setsockopt %s", toptname);
696			}
697		}
698#endif /* INET6 */
699		/* FALLTHROUGH */
700		printf("-1\n");
701	} break;
702
703	case 'g': {
704		sockunion_t	 sources[MAX_ADDRS];
705		char		 addrbuf[NI_MAXHOST];
706		int		 nreqsrc, nsrc;
707
708		if ((sscanf(line, "%s %s %d", str1, str2, &nreqsrc)) != 3) {
709			printf("-1\n");
710			break;
711		}
712		ifindex = parse_cmd_args(&su, NULL, str1, str2, NULL);
713		if (ifindex == 0 || (n < 0 || n > MAX_ADDRS)) {
714			printf("-1\n");
715			break;
716		}
717
718		af = su.sa.sa_family;
719		if (af2sock(af, s, s6) == -1) {
720			warnc(EPROTONOSUPPORT, "getsourcefilter");
721			break;
722		}
723		nsrc = nreqsrc;
724		if (getsourcefilter(af2sock(af, s, s6), ifindex, &su.sa,
725		    su.sa.sa_len, &fmode, &nsrc, &sources[0].ss) != 0) {
726			warn("getsourcefilter");
727			printf("-1\n");
728			break;
729		}
730		printf("%s\n", (fmode == MCAST_INCLUDE) ? "include" :
731		    "exclude");
732		printf("%d\n", nsrc);
733
734		nsrc = MIN(nreqsrc, nsrc);
735		fprintf(stderr, "hexdump of sources:\n");
736		uint8_t *bp = (uint8_t *)&sources[0];
737		for (j = 0; j < (nsrc * sizeof(sources[0])); j++) {
738			fprintf(stderr, "%02x", bp[j]);
739		}
740		fprintf(stderr, "\nend hexdump\n");
741
742		qsort(sources, nsrc, af2socklen(af), su_cmp);
743		for (i = 0; i < nsrc; i++) {
744			sockunion_t *psu = (sockunion_t *)&sources[i];
745			addrbuf[0] = '\0';
746			error = getnameinfo(&psu->sa, psu->sa.sa_len,
747			    addrbuf, sizeof(addrbuf), NULL, 0,
748			    NI_NUMERICHOST);
749			if (error)
750				warnx("getnameinfo: %s", gai_strerror(error));
751			else
752				printf("%s\n", addrbuf);
753		}
754		printf("ok\n");
755	} break;
756
757	/* link-layer stuff follows. */
758
759	case 'a':
760	case 'd': {
761		struct sockaddr_dl	*dlp;
762		struct ether_addr	*ep;
763
764		memset(&ifr, 0, sizeof(struct ifreq));
765		dlp = (struct sockaddr_dl *)&ifr.ifr_addr;
766		dlp->sdl_len = sizeof(struct sockaddr_dl);
767		dlp->sdl_family = AF_LINK;
768		dlp->sdl_index = 0;
769		dlp->sdl_nlen = 0;
770		dlp->sdl_alen = ETHER_ADDR_LEN;
771		dlp->sdl_slen = 0;
772		if (sscanf(line, "%s %s", str1, str2) != 2) {
773			warnc(EINVAL, "sscanf");
774			break;
775		}
776		ep = ether_aton(str2);
777		if (ep == NULL) {
778			warnc(EINVAL, "ether_aton");
779			break;
780		}
781		strlcpy(ifr.ifr_name, str1, IF_NAMESIZE);
782		memcpy(LLADDR(dlp), ep, ETHER_ADDR_LEN);
783		if (ioctl(s, (*cmd == 'a') ? SIOCADDMULTI : SIOCDELMULTI,
784		    &ifr) == -1) {
785			warn("ioctl SIOCADDMULTI/SIOCDELMULTI");
786			printf("-1\n");
787		} else
788			printf("ok\n");
789		break;
790	}
791
792	case 'm':
793		fprintf(stderr,
794		    "warning: IFF_ALLMULTI cannot be set from userland "
795		    "in FreeBSD; command ignored.\n");
796		printf("-1\n");
797		break;
798
799	case 'p':
800		if (sscanf(line, "%s %u", ifr.ifr_name, &f) != 2) {
801			printf("-1\n");
802			break;
803		}
804		if (ioctl(s, SIOCGIFFLAGS, &ifr) == -1) {
805			warn("ioctl SIOCGIFFLAGS");
806			break;
807		}
808		flags = (ifr.ifr_flags & 0xffff) | (ifr.ifr_flagshigh << 16);
809		if (f == 0) {
810			flags &= ~IFF_PPROMISC;
811		} else {
812			flags |= IFF_PPROMISC;
813		}
814		ifr.ifr_flags = flags & 0xffff;
815		ifr.ifr_flagshigh = flags >> 16;
816		if (ioctl(s, SIOCSIFFLAGS, &ifr) == -1)
817			warn("ioctl SIOCGIFFLAGS");
818		else
819			printf( "changed to 0x%08x\n", flags );
820		break;
821
822	case '\n':
823		break;
824	default:
825		printf("invalid command\n");
826		break;
827	}
828}
829
830static void
831usage(void)
832{
833
834	printf("j mcast-addr ifname [src-addr] - join IP multicast group\n");
835	printf("l mcast-addr ifname [src-addr] - leave IP multicast group\n");
836	printf(
837"i mcast-addr ifname n          - set n include mode src filter\n");
838	printf(
839"e mcast-addr ifname n          - set n exclude mode src filter\n");
840	printf("t mcast-addr ifname src-addr  - allow traffic from src\n");
841	printf("b mcast-addr ifname src-addr  - block traffic from src\n");
842	printf("g mcast-addr ifname n        - get and show n src filters\n");
843	printf("a ifname mac-addr          - add link multicast filter\n");
844	printf("d ifname mac-addr          - delete link multicast filter\n");
845	printf("m ifname 1/0               - set/clear ether allmulti flag\n");
846	printf("p ifname 1/0               - set/clear ether promisc flag\n");
847	printf("f filename                 - read command(s) from file\n");
848	printf("s seconds                  - sleep for some time\n");
849	printf("q                          - quit\n");
850}
851
852