xref: /netbsd-src/usr.sbin/bootp/bootptest/bootptest.c (revision e1541cea4e64ffc10ae79e04611fba7c833738cd)
1*e1541ceaSandvar /*	$NetBSD: bootptest.c,v 1.22 2022/12/24 15:23:03 andvar Exp $	*/
23fe138c1Sperry 
35e9d01f2Sgwr /*
45e9d01f2Sgwr  * bootptest.c - Test out a bootp server.
55e9d01f2Sgwr  *
65e9d01f2Sgwr  * This simple program was put together from pieces taken from
75e9d01f2Sgwr  * various places, including the CMU BOOTP client and server.
85e9d01f2Sgwr  * The packet printing routine is from the Berkeley "tcpdump"
95e9d01f2Sgwr  * program with some enhancements I added.  The print-bootp.c
10bcb13babSgwr  * file was shared with my copy of "tcpdump" and therefore uses
115e9d01f2Sgwr  * some unusual utility routines that would normally be provided
12bcb13babSgwr  * by various parts of the tcpdump program.  Gordon W. Ross
135e9d01f2Sgwr  *
145e9d01f2Sgwr  * Boilerplate:
155e9d01f2Sgwr  *
165e9d01f2Sgwr  * This program includes software developed by the University of
175e9d01f2Sgwr  * California, Lawrence Berkeley Laboratory and its contributors.
185e9d01f2Sgwr  * (See the copyright notice in print-bootp.c)
195e9d01f2Sgwr  *
205e9d01f2Sgwr  * The remainder of this program is public domain.  You may do
215e9d01f2Sgwr  * whatever you like with it except claim that you wrote it.
225e9d01f2Sgwr  *
235e9d01f2Sgwr  * THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR IMPLIED
245e9d01f2Sgwr  * WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF
255e9d01f2Sgwr  * MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
265e9d01f2Sgwr  *
275e9d01f2Sgwr  * HISTORY:
285e9d01f2Sgwr  *
295e9d01f2Sgwr  * 12/02/93 Released version 1.4 (with bootp-2.3.2)
305e9d01f2Sgwr  * 11/05/93 Released version 1.3
315e9d01f2Sgwr  * 10/14/93 Released version 1.2
325e9d01f2Sgwr  * 10/11/93 Released version 1.1
335e9d01f2Sgwr  * 09/28/93 Released version 1.0
345e9d01f2Sgwr  * 09/93 Original developed by Gordon W. Ross <gwr@mc.com>
355e9d01f2Sgwr  */
365e9d01f2Sgwr 
379493bb79Slukem #include <sys/cdefs.h>
389493bb79Slukem #ifndef lint
39*e1541ceaSandvar __RCSID("$NetBSD: bootptest.c,v 1.22 2022/12/24 15:23:03 andvar Exp $");
409493bb79Slukem #endif
419493bb79Slukem 
4293bbed15Schristos static const char usage[] =
4393bbed15Schristos     "Usage: %s [-f bootfile] [-h] [-m magic_number] server-name\n"
4493bbed15Schristos     "\t[vendor-data-template-file]\n";
455e9d01f2Sgwr 
4699c164ddSkleink #include <sys/param.h>
475e9d01f2Sgwr #include <sys/socket.h>
485e9d01f2Sgwr #include <sys/ioctl.h>
495e9d01f2Sgwr #include <sys/file.h>
505e9d01f2Sgwr #include <sys/time.h>
515e9d01f2Sgwr #include <sys/stat.h>
52c563d4c7Smycroft #include <sys/poll.h>
535e9d01f2Sgwr 
545e9d01f2Sgwr #include <net/if.h>
555e9d01f2Sgwr #include <netinet/in.h>
565e9d01f2Sgwr #include <arpa/inet.h>			/* inet_ntoa */
575e9d01f2Sgwr 
585e9d01f2Sgwr #include <stdlib.h>
595e9d01f2Sgwr #include <signal.h>
605e9d01f2Sgwr #include <stdio.h>
615e9d01f2Sgwr #include <string.h>
62be45f4d0Stls #include <strings.h>
635e9d01f2Sgwr #include <errno.h>
645e9d01f2Sgwr #include <ctype.h>
655e9d01f2Sgwr #include <netdb.h>
665e9d01f2Sgwr #include <assert.h>
679493bb79Slukem #include <unistd.h>
685e9d01f2Sgwr 
695e9d01f2Sgwr #include "bootp.h"
705e9d01f2Sgwr #include "bootptest.h"
715e9d01f2Sgwr #include "getif.h"
729493bb79Slukem #include "report.h"
735e9d01f2Sgwr #include "patchlevel.h"
745e9d01f2Sgwr 
755e9d01f2Sgwr #define LOG_ERR 1
765e9d01f2Sgwr #define BUFLEN 1024
775e9d01f2Sgwr #define WAITSECS 1
785e9d01f2Sgwr #define MAXWAIT  10
795e9d01f2Sgwr 
805e9d01f2Sgwr int vflag = 1;
815e9d01f2Sgwr int tflag = 0;
825e9d01f2Sgwr int thiszone;
835e9d01f2Sgwr char *progname;
845e9d01f2Sgwr unsigned char *packetp;
855e9d01f2Sgwr unsigned char *snapend;
865e9d01f2Sgwr int snaplen;
875e9d01f2Sgwr 
885e9d01f2Sgwr 
895e9d01f2Sgwr /*
905e9d01f2Sgwr  * IP port numbers for client and server obtained from /etc/services
915e9d01f2Sgwr  */
925e9d01f2Sgwr 
935e9d01f2Sgwr u_short bootps_port, bootpc_port;
945e9d01f2Sgwr 
955e9d01f2Sgwr 
965e9d01f2Sgwr /*
975e9d01f2Sgwr  * Internet socket and interface config structures
985e9d01f2Sgwr  */
995e9d01f2Sgwr 
1005e9d01f2Sgwr struct sockaddr_in sin_server;	/* where to send requests */
1015e9d01f2Sgwr struct sockaddr_in sin_client;	/* for bind and listen */
1025e9d01f2Sgwr struct sockaddr_in sin_from;	/* Packet source */
1035e9d01f2Sgwr u_char eaddr[16];				/* Ethernet address */
1045e9d01f2Sgwr 
1055e9d01f2Sgwr /*
1065e9d01f2Sgwr  * General
1075e9d01f2Sgwr  */
1085e9d01f2Sgwr 
1095e9d01f2Sgwr int debug = 1;					/* Debugging flag (level) */
11032f51971Smrg char hostname[MAXHOSTNAMELEN + 1];
1115e9d01f2Sgwr char *sndbuf;					/* Send packet buffer */
1125e9d01f2Sgwr char *rcvbuf;					/* Receive packet buffer */
1135e9d01f2Sgwr 
1145e9d01f2Sgwr /*
1155e9d01f2Sgwr  * Vendor magic cookies for CMU and RFC1048
1165e9d01f2Sgwr  */
1175e9d01f2Sgwr 
1185e9d01f2Sgwr unsigned char vm_cmu[4] = VM_CMU;
1195e9d01f2Sgwr unsigned char vm_rfc1048[4] = VM_RFC1048;
1205e9d01f2Sgwr short secs;						/* How long client has waited */
1215e9d01f2Sgwr 
1229493bb79Slukem 
123131109e4Swiz extern int getether(char *, char *);
124131109e4Swiz void send_request(int);
1255e9d01f2Sgwr 
1265e9d01f2Sgwr /*
1275e9d01f2Sgwr  * Initialization such as command-line processing is done, then
1285e9d01f2Sgwr  * the receiver loop is started.  Die when interrupted.
1295e9d01f2Sgwr  */
1305e9d01f2Sgwr 
1319493bb79Slukem int
main(int argc,char ** argv)132131109e4Swiz main(int argc, char **argv)
1335e9d01f2Sgwr {
1345e9d01f2Sgwr 	struct bootp *bp;
1355e9d01f2Sgwr 	struct servent *sep;
1365e9d01f2Sgwr 	struct hostent *hep;
1375e9d01f2Sgwr 
1385e9d01f2Sgwr 	char *servername = NULL;
1395e9d01f2Sgwr 	char *vendor_file = NULL;
1405e9d01f2Sgwr 	char *bp_file = NULL;
1410c37c63eSmrg 	socklen_t fromlen;
1425e9d01f2Sgwr 	int s;				/* Socket file descriptor */
1430c37c63eSmrg 	int n, recvcnt;
1445e9d01f2Sgwr 	int use_hwa = 0;
145bcb13babSgwr 	int32 vend_magic;
1465e9d01f2Sgwr 	int32 xid;
147ab637af3Smycroft 	struct pollfd set[1];
1485e9d01f2Sgwr 
1495e9d01f2Sgwr 	progname = strrchr(argv[0], '/');
1505e9d01f2Sgwr 	if (progname)
1515e9d01f2Sgwr 		progname++;
1525e9d01f2Sgwr 	else
1535e9d01f2Sgwr 		progname = argv[0];
1545e9d01f2Sgwr 	argc--;
1555e9d01f2Sgwr 	argv++;
1565e9d01f2Sgwr 
1575e9d01f2Sgwr 	if (debug)
1585e9d01f2Sgwr 		printf("%s: version %s.%d\n", progname, VERSION, PATCHLEVEL);
1595e9d01f2Sgwr 
160bcb13babSgwr 	/*
161bcb13babSgwr 	 * Verify that "struct bootp" has the correct official size.
162bcb13babSgwr 	 * (Catch evil compilers that do struct padding.)
163bcb13babSgwr 	 */
1645e9d01f2Sgwr 	assert(sizeof(struct bootp) == BP_MINPKTSZ);
1655e9d01f2Sgwr 
1665e9d01f2Sgwr 	sndbuf = malloc(BUFLEN);
1675e9d01f2Sgwr 	rcvbuf = malloc(BUFLEN);
1685e9d01f2Sgwr 	if (!sndbuf || !rcvbuf) {
1695e9d01f2Sgwr 		printf("malloc failed\n");
1705e9d01f2Sgwr 		exit(1);
1715e9d01f2Sgwr 	}
172bcb13babSgwr 
173bcb13babSgwr 	/* default magic number */
174bcb13babSgwr 	bcopy(vm_rfc1048, (char*)&vend_magic, 4);
175bcb13babSgwr 
1765e9d01f2Sgwr 	/* Handle option switches. */
1775e9d01f2Sgwr 	while (argc > 0) {
1785e9d01f2Sgwr 		if (argv[0][0] != '-')
1795e9d01f2Sgwr 			break;
1805e9d01f2Sgwr 		switch (argv[0][1]) {
1815e9d01f2Sgwr 
182*e1541ceaSandvar 		case 'f':				/* File name to request. */
1835e9d01f2Sgwr 			if (argc < 2)
1845e9d01f2Sgwr 				goto error;
1855e9d01f2Sgwr 			argc--; argv++;
1865e9d01f2Sgwr 			bp_file = *argv;
1875e9d01f2Sgwr 			break;
1885e9d01f2Sgwr 
1895e9d01f2Sgwr 		case 'h':				/* Use hardware address. */
1905e9d01f2Sgwr 			use_hwa = 1;
1915e9d01f2Sgwr 			break;
1925e9d01f2Sgwr 
193bcb13babSgwr 		case 'm':				/* Magic number value. */
194bcb13babSgwr 			if (argc < 2)
195bcb13babSgwr 				goto error;
196bcb13babSgwr 			argc--; argv++;
197bcb13babSgwr 			vend_magic = inet_addr(*argv);
198bcb13babSgwr 			break;
199bcb13babSgwr 
2005e9d01f2Sgwr 		error:
2015e9d01f2Sgwr 		default:
202c79d0a54Shira 			(void)fprintf(stderr, usage, getprogname());
2035e9d01f2Sgwr 			exit(1);
2045e9d01f2Sgwr 
2055e9d01f2Sgwr 		}
2065e9d01f2Sgwr 		argc--;
2075e9d01f2Sgwr 		argv++;
2085e9d01f2Sgwr 	}
2095e9d01f2Sgwr 
2105e9d01f2Sgwr 	/* Get server name (or address) for query. */
2115e9d01f2Sgwr 	if (argc > 0) {
2125e9d01f2Sgwr 		servername = *argv;
2135e9d01f2Sgwr 		argc--;
2145e9d01f2Sgwr 		argv++;
2155e9d01f2Sgwr 	}
2165e9d01f2Sgwr 	/* Get optional vendor-data-template-file. */
2175e9d01f2Sgwr 	if (argc > 0) {
2185e9d01f2Sgwr 		vendor_file = *argv;
2195e9d01f2Sgwr 		argc--;
2205e9d01f2Sgwr 		argv++;
2215e9d01f2Sgwr 	}
2225e9d01f2Sgwr 	if (!servername) {
2235e9d01f2Sgwr 		printf("missing server name.\n");
224c79d0a54Shira 		(void)fprintf(stderr, usage, getprogname());
2255e9d01f2Sgwr 		exit(1);
2265e9d01f2Sgwr 	}
2275e9d01f2Sgwr 	/*
2285e9d01f2Sgwr 	 * Create a socket.
2295e9d01f2Sgwr 	 */
2305e9d01f2Sgwr 	if ((s = socket(AF_INET, SOCK_DGRAM, 0)) < 0) {
2315e9d01f2Sgwr 		perror("socket");
2325e9d01f2Sgwr 		exit(1);
2335e9d01f2Sgwr 	}
2345e9d01f2Sgwr 	/*
2355e9d01f2Sgwr 	 * Get server's listening port number
2365e9d01f2Sgwr 	 */
2375e9d01f2Sgwr 	sep = getservbyname("bootps", "udp");
2385e9d01f2Sgwr 	if (sep) {
2395e9d01f2Sgwr 		bootps_port = ntohs((u_short) sep->s_port);
2405e9d01f2Sgwr 	} else {
2415e9d01f2Sgwr 		fprintf(stderr, "udp/bootps: unknown service -- using port %d\n",
2425e9d01f2Sgwr 				IPPORT_BOOTPS);
2435e9d01f2Sgwr 		bootps_port = (u_short) IPPORT_BOOTPS;
2445e9d01f2Sgwr 	}
2455e9d01f2Sgwr 
2465e9d01f2Sgwr 	/*
2475e9d01f2Sgwr 	 * Set up server socket address (for send)
2485e9d01f2Sgwr 	 */
2495e9d01f2Sgwr 	if (servername) {
25076a31995Smycroft 		if (inet_aton(servername, &sin_server.sin_addr) == 0) {
2515e9d01f2Sgwr 			hep = gethostbyname(servername);
2525e9d01f2Sgwr 			if (!hep) {
2535e9d01f2Sgwr 				fprintf(stderr, "%s: unknown host\n", servername);
2545e9d01f2Sgwr 				exit(1);
2555e9d01f2Sgwr 			}
25676a31995Smycroft 			memcpy(&sin_server.sin_addr, hep->h_addr,
25776a31995Smycroft 			    sizeof(sin_server.sin_addr));
2585e9d01f2Sgwr 		}
2595e9d01f2Sgwr 	} else {
2605e9d01f2Sgwr 		/* Get broadcast address */
2615e9d01f2Sgwr 		/* XXX - not yet */
26276a31995Smycroft 		sin_server.sin_addr.s_addr = INADDR_ANY;
2635e9d01f2Sgwr 	}
2645e9d01f2Sgwr 	sin_server.sin_family = AF_INET;
2655e9d01f2Sgwr 	sin_server.sin_port = htons(bootps_port);
2665e9d01f2Sgwr 
2675e9d01f2Sgwr 	/*
2685e9d01f2Sgwr 	 * Get client's listening port number
2695e9d01f2Sgwr 	 */
2705e9d01f2Sgwr 	sep = getservbyname("bootpc", "udp");
2715e9d01f2Sgwr 	if (sep) {
2725e9d01f2Sgwr 		bootpc_port = ntohs(sep->s_port);
2735e9d01f2Sgwr 	} else {
2745e9d01f2Sgwr 		fprintf(stderr, "udp/bootpc: unknown service -- using port %d\n",
2755e9d01f2Sgwr 				IPPORT_BOOTPC);
2765e9d01f2Sgwr 		bootpc_port = (u_short) IPPORT_BOOTPC;
2775e9d01f2Sgwr 	}
2785e9d01f2Sgwr 
2795e9d01f2Sgwr 	/*
2805e9d01f2Sgwr 	 * Set up client socket address (for listen)
2815e9d01f2Sgwr 	 */
2825e9d01f2Sgwr 	sin_client.sin_family = AF_INET;
2835e9d01f2Sgwr 	sin_client.sin_port = htons(bootpc_port);
2845e9d01f2Sgwr 	sin_client.sin_addr.s_addr = INADDR_ANY;
2855e9d01f2Sgwr 
2865e9d01f2Sgwr 	/*
2875e9d01f2Sgwr 	 * Bind client socket to BOOTPC port.
2885e9d01f2Sgwr 	 */
2895e9d01f2Sgwr 	if (bind(s, (struct sockaddr *) &sin_client, sizeof(sin_client)) < 0) {
2905e9d01f2Sgwr 		perror("bind BOOTPC port");
2915e9d01f2Sgwr 		if (errno == EACCES)
2925e9d01f2Sgwr 			fprintf(stderr, "You need to run this as root\n");
2935e9d01f2Sgwr 		exit(1);
2945e9d01f2Sgwr 	}
2955e9d01f2Sgwr 	/*
2965e9d01f2Sgwr 	 * Build a request.
2975e9d01f2Sgwr 	 */
2985e9d01f2Sgwr 	bp = (struct bootp *) sndbuf;
2995e9d01f2Sgwr 	bzero(bp, sizeof(*bp));
3005e9d01f2Sgwr 	bp->bp_op = BOOTREQUEST;
3015e9d01f2Sgwr 	xid = (int32) getpid();
3025e9d01f2Sgwr 	bp->bp_xid = (u_int32) htonl(xid);
3035e9d01f2Sgwr 	if (bp_file)
30489bf339aSitojun 		strlcpy(bp->bp_file, bp_file, sizeof(bp->bp_file));
3055e9d01f2Sgwr 
3065e9d01f2Sgwr 	/*
3075e9d01f2Sgwr 	 * Fill in the hardware address (or client IP address)
3085e9d01f2Sgwr 	 */
3095e9d01f2Sgwr 	if (use_hwa) {
3105e9d01f2Sgwr 		struct ifreq *ifr;
3115e9d01f2Sgwr 
3125e9d01f2Sgwr 		ifr = getif(s, &sin_server.sin_addr);
3135e9d01f2Sgwr 		if (!ifr) {
3145e9d01f2Sgwr 			printf("No interface for %s\n", servername);
3155e9d01f2Sgwr 			exit(1);
3165e9d01f2Sgwr 		}
3170c37c63eSmrg 		if (getether(ifr->ifr_name, (char *)eaddr)) {
3185e9d01f2Sgwr 			printf("Can not get ether addr for %s\n", ifr->ifr_name);
3195e9d01f2Sgwr 			exit(1);
3205e9d01f2Sgwr 		}
3215e9d01f2Sgwr 		/* Copy Ethernet address into request packet. */
3225e9d01f2Sgwr 		bp->bp_htype = 1;
3235e9d01f2Sgwr 		bp->bp_hlen = 6;
3245e9d01f2Sgwr 		bcopy(eaddr, bp->bp_chaddr, bp->bp_hlen);
3255e9d01f2Sgwr 	} else {
3265e9d01f2Sgwr 		/* Fill in the client IP address. */
3275e9d01f2Sgwr 		gethostname(hostname, sizeof(hostname));
32832f51971Smrg 		hostname[sizeof(hostname) - 1] = '\0';
3295e9d01f2Sgwr 		hep = gethostbyname(hostname);
3305e9d01f2Sgwr 		if (!hep) {
3315e9d01f2Sgwr 			printf("Can not get my IP address\n");
3325e9d01f2Sgwr 			exit(1);
3335e9d01f2Sgwr 		}
3345e9d01f2Sgwr 		bcopy(hep->h_addr, &bp->bp_ciaddr, hep->h_length);
3355e9d01f2Sgwr 	}
3365e9d01f2Sgwr 
3375e9d01f2Sgwr 	/*
3385e9d01f2Sgwr 	 * Copy in the default vendor data.
3395e9d01f2Sgwr 	 */
340bcb13babSgwr 	bcopy((char*)&vend_magic, bp->bp_vend, 4);
341bcb13babSgwr 	if (vend_magic)
3425e9d01f2Sgwr 		bp->bp_vend[4] = TAG_END;
3435e9d01f2Sgwr 
3445e9d01f2Sgwr 	/*
3455e9d01f2Sgwr 	 * Read in the "options" part of the request.
3465e9d01f2Sgwr 	 * This also determines the size of the packet.
3475e9d01f2Sgwr 	 */
3485e9d01f2Sgwr 	snaplen = sizeof(*bp);
3495e9d01f2Sgwr 	if (vendor_file) {
3505e9d01f2Sgwr 		int fd = open(vendor_file, 0);
3515e9d01f2Sgwr 		if (fd < 0) {
3525e9d01f2Sgwr 			perror(vendor_file);
3535e9d01f2Sgwr 			exit(1);
3545e9d01f2Sgwr 		}
3555e9d01f2Sgwr 		/* Compute actual space for options. */
3565e9d01f2Sgwr 		n = BUFLEN - sizeof(*bp) + BP_VEND_LEN;
3575e9d01f2Sgwr 		n = read(fd, bp->bp_vend, n);
3585e9d01f2Sgwr 		close(fd);
3595e9d01f2Sgwr 		if (n < 0) {
3605e9d01f2Sgwr 			perror(vendor_file);
3615e9d01f2Sgwr 			exit(1);
3625e9d01f2Sgwr 		}
3635e9d01f2Sgwr 		printf("read %d bytes of vendor template\n", n);
3645e9d01f2Sgwr 		if (n > BP_VEND_LEN) {
3655e9d01f2Sgwr 			printf("warning: extended options in use (len > %d)\n",
3665e9d01f2Sgwr 				   BP_VEND_LEN);
3675e9d01f2Sgwr 			snaplen += (n - BP_VEND_LEN);
3685e9d01f2Sgwr 		}
3695e9d01f2Sgwr 	}
3705e9d01f2Sgwr 	/*
3715e9d01f2Sgwr 	 * Set globals needed by print_bootp
3725e9d01f2Sgwr 	 * (called by send_request)
3735e9d01f2Sgwr 	 */
3745e9d01f2Sgwr 	packetp = (unsigned char *) eaddr;
3755e9d01f2Sgwr 	snapend = (unsigned char *) sndbuf + snaplen;
3765e9d01f2Sgwr 
3775e9d01f2Sgwr 	/* Send a request once per second while waiting for replies. */
3785e9d01f2Sgwr 	recvcnt = 0;
3795e9d01f2Sgwr 	bp->bp_secs = secs = 0;
3805e9d01f2Sgwr 	send_request(s);
381c563d4c7Smycroft 	set[0].fd = s;
382c563d4c7Smycroft 	set[0].events = POLLIN;
383ab637af3Smycroft 	while (1) {
384c563d4c7Smycroft 		n = poll(set, 1, WAITSECS * 1000);
3855e9d01f2Sgwr 		if (n < 0) {
386c563d4c7Smycroft 			perror("poll");
3875e9d01f2Sgwr 			break;
3885e9d01f2Sgwr 		}
3895e9d01f2Sgwr 		if (n == 0) {
3905e9d01f2Sgwr 			/*
391bcb13babSgwr 			 * We have not received a response in the last second.
3925e9d01f2Sgwr 			 * If we have ever received any responses, exit now.
3935e9d01f2Sgwr 			 * Otherwise, bump the "wait time" field and re-send.
3945e9d01f2Sgwr 			 */
3955e9d01f2Sgwr 			if (recvcnt > 0)
3965e9d01f2Sgwr 				exit(0);
3975e9d01f2Sgwr 			secs += WAITSECS;
3985e9d01f2Sgwr 			if (secs > MAXWAIT)
3995e9d01f2Sgwr 				break;
4005e9d01f2Sgwr 			bp->bp_secs = htons(secs);
4015e9d01f2Sgwr 			send_request(s);
4025e9d01f2Sgwr 			continue;
4035e9d01f2Sgwr 		}
4045e9d01f2Sgwr 		fromlen = sizeof(sin_from);
4055e9d01f2Sgwr 		n = recvfrom(s, rcvbuf, BUFLEN, 0,
4065e9d01f2Sgwr 					 (struct sockaddr *) &sin_from, &fromlen);
4075e9d01f2Sgwr 		if (n <= 0) {
4085e9d01f2Sgwr 			continue;
4095e9d01f2Sgwr 		}
4107affd655Slukem 		if (n < (int)sizeof(struct bootp)) {
4115e9d01f2Sgwr 			printf("received short packet\n");
4125e9d01f2Sgwr 			continue;
4135e9d01f2Sgwr 		}
4145e9d01f2Sgwr 		recvcnt++;
4155e9d01f2Sgwr 
4165e9d01f2Sgwr 		/* Print the received packet. */
4175e9d01f2Sgwr 		printf("Recvd from %s", inet_ntoa(sin_from.sin_addr));
4185e9d01f2Sgwr 		/* set globals needed by bootp_print() */
4195e9d01f2Sgwr 		snaplen = n;
4205e9d01f2Sgwr 		snapend = (unsigned char *) rcvbuf + snaplen;
4219493bb79Slukem 		bootp_print((struct bootp *)rcvbuf, n, sin_from.sin_port, 0);
4225e9d01f2Sgwr 		putchar('\n');
4235e9d01f2Sgwr 		/*
4245e9d01f2Sgwr 		 * This no longer exits immediately after receiving
4255e9d01f2Sgwr 		 * one response because it is useful to know if the
4265e9d01f2Sgwr 		 * client might get multiple responses.  This code
4275e9d01f2Sgwr 		 * will now listen for one second after a response.
4285e9d01f2Sgwr 		 */
4295e9d01f2Sgwr 	}
4305e9d01f2Sgwr 	fprintf(stderr, "no response from %s\n", servername);
4315e9d01f2Sgwr 	exit(1);
4325e9d01f2Sgwr }
4335e9d01f2Sgwr 
4349493bb79Slukem void
send_request(int s)435131109e4Swiz send_request(int s)
4365e9d01f2Sgwr {
4375e9d01f2Sgwr 	/* Print the request packet. */
4385e9d01f2Sgwr 	printf("Sending to %s", inet_ntoa(sin_server.sin_addr));
4399493bb79Slukem 	bootp_print((struct bootp *)sndbuf, snaplen, sin_from.sin_port, 0);
4405e9d01f2Sgwr 	putchar('\n');
4415e9d01f2Sgwr 
4425e9d01f2Sgwr 	/* Send the request packet. */
4435e9d01f2Sgwr 	if (sendto(s, sndbuf, snaplen, 0,
4445e9d01f2Sgwr 			   (struct sockaddr *) &sin_server,
4455e9d01f2Sgwr 			   sizeof(sin_server)) < 0)
4465e9d01f2Sgwr 	{
4475e9d01f2Sgwr 		perror("sendto server");
4485e9d01f2Sgwr 		exit(1);
4495e9d01f2Sgwr 	}
4505e9d01f2Sgwr }
4515e9d01f2Sgwr 
4525e9d01f2Sgwr /*
4535e9d01f2Sgwr  * Print out a filename (or other ascii string).
4545e9d01f2Sgwr  * Return true if truncated.
4555e9d01f2Sgwr  */
4565e9d01f2Sgwr int
printfn(u_char * s,u_char * ep)457aae9c2a0Swiz printfn(u_char *s, u_char *ep)
4585e9d01f2Sgwr {
459aae9c2a0Swiz 	u_char c;
4605e9d01f2Sgwr 
4615e9d01f2Sgwr 	putchar('"');
4629493bb79Slukem 	while ((c = *s++) != 0) {
4635e9d01f2Sgwr 		if (s > ep) {
4645e9d01f2Sgwr 			putchar('"');
4655e9d01f2Sgwr 			return (1);
4665e9d01f2Sgwr 		}
4675e9d01f2Sgwr 		if (!isascii(c)) {
4685e9d01f2Sgwr 			c = toascii(c);
4695e9d01f2Sgwr 			putchar('M');
4705e9d01f2Sgwr 			putchar('-');
4715e9d01f2Sgwr 		}
4725e9d01f2Sgwr 		if (!isprint(c)) {
4735e9d01f2Sgwr 			c ^= 0x40;			/* DEL to ?, others to alpha */
4745e9d01f2Sgwr 			putchar('^');
4755e9d01f2Sgwr 		}
4765e9d01f2Sgwr 		putchar(c);
4775e9d01f2Sgwr 	}
4785e9d01f2Sgwr 	putchar('"');
4795e9d01f2Sgwr 	return (0);
4805e9d01f2Sgwr }
4815e9d01f2Sgwr 
4825e9d01f2Sgwr /*
4835e9d01f2Sgwr  * Convert an IP addr to a string.
4845e9d01f2Sgwr  * (like inet_ntoa, but ina is a pointer)
4855e9d01f2Sgwr  */
4865e9d01f2Sgwr char *
ipaddr_string(struct in_addr * ina)487131109e4Swiz ipaddr_string(struct in_addr *ina)
4885e9d01f2Sgwr {
4895e9d01f2Sgwr 	static char b[24];
4905e9d01f2Sgwr 	u_char *p;
4915e9d01f2Sgwr 
4925e9d01f2Sgwr 	p = (u_char *) ina;
4935402d14cSitojun 	snprintf(b, sizeof(b), "%d.%d.%d.%d", p[0], p[1], p[2], p[3]);
4945e9d01f2Sgwr 	return (b);
4955e9d01f2Sgwr }
4965e9d01f2Sgwr 
4975e9d01f2Sgwr /*
4985e9d01f2Sgwr  * Local Variables:
4995e9d01f2Sgwr  * tab-width: 4
5005e9d01f2Sgwr  * c-indent-level: 4
5015e9d01f2Sgwr  * c-argdecl-indent: 4
5025e9d01f2Sgwr  * c-continued-statement-offset: 4
5035e9d01f2Sgwr  * c-continued-brace-offset: -4
5045e9d01f2Sgwr  * c-label-offset: -4
5055e9d01f2Sgwr  * c-brace-offset: 0
5065e9d01f2Sgwr  * End:
5075e9d01f2Sgwr  */
508