123172Smckusick /* 223172Smckusick * Copyright (c) 1982 Regents of the University of California. 323172Smckusick * All rights reserved. The Berkeley software License Agreement 423172Smckusick * specifies the terms and conditions for redistribution. 523172Smckusick * 6*26147Skarels * @(#)if_ether.c 6.15 (Berkeley) 02/12/86 723172Smckusick */ 811570Ssam 911570Ssam /* 1011570Ssam * Ethernet address resolution protocol. 1111570Ssam */ 1211570Ssam 1317057Sbloom #include "param.h" 1417057Sbloom #include "systm.h" 1517057Sbloom #include "mbuf.h" 1617057Sbloom #include "socket.h" 1717057Sbloom #include "time.h" 1817057Sbloom #include "kernel.h" 1917057Sbloom #include "errno.h" 2017057Sbloom #include "ioctl.h" 2125890Skarels #include "syslog.h" 2211570Ssam 2311570Ssam #include "../net/if.h" 2417057Sbloom #include "in.h" 2517057Sbloom #include "in_systm.h" 2617057Sbloom #include "ip.h" 2717057Sbloom #include "if_ether.h" 2811570Ssam 2924803Skarels #define ARPTAB_BSIZ 9 /* bucket size */ 3011570Ssam #define ARPTAB_NB 19 /* number of buckets */ 3111570Ssam #define ARPTAB_SIZE (ARPTAB_BSIZ * ARPTAB_NB) 3211570Ssam struct arptab arptab[ARPTAB_SIZE]; 3316221Skarels int arptab_size = ARPTAB_SIZE; /* for arp command */ 3411570Ssam 3525890Skarels /* 3625890Skarels * ARP trailer negotiation. Trailer protocol is not IP specific, 3725890Skarels * but ARP request/response use IP addresses. 3825890Skarels */ 3925890Skarels #define ETHERTYPE_IPTRAILERS ETHERTYPE_TRAIL 4025890Skarels 4111570Ssam #define ARPTAB_HASH(a) \ 4225890Skarels ((u_long)(a) % ARPTAB_NB) 4311570Ssam 4411570Ssam #define ARPTAB_LOOK(at,addr) { \ 4511570Ssam register n; \ 4611570Ssam at = &arptab[ARPTAB_HASH(addr) * ARPTAB_BSIZ]; \ 4711570Ssam for (n = 0 ; n < ARPTAB_BSIZ ; n++,at++) \ 4811570Ssam if (at->at_iaddr.s_addr == addr) \ 4911570Ssam break; \ 5011570Ssam if (n >= ARPTAB_BSIZ) \ 5125890Skarels at = 0; \ 5225890Skarels } 5311570Ssam 5411570Ssam /* timer values */ 5511570Ssam #define ARPT_AGE (60*1) /* aging timer, 1 min. */ 5611570Ssam #define ARPT_KILLC 20 /* kill completed entry in 20 mins. */ 5711570Ssam #define ARPT_KILLI 3 /* kill incomplete entry in 3 minutes */ 5811570Ssam 5918640Skarels u_char etherbroadcastaddr[6] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff }; 6011570Ssam extern struct ifnet loif; 6111570Ssam 6214867Ssam /* 6311570Ssam * Timeout routine. Age arp_tab entries once a minute. 6411570Ssam */ 6511570Ssam arptimer() 6611570Ssam { 6711570Ssam register struct arptab *at; 6811570Ssam register i; 6911570Ssam 7025890Skarels timeout(arptimer, (caddr_t)0, ARPT_AGE * hz); 7125890Skarels at = &arptab[0]; 7225890Skarels for (i = 0; i < ARPTAB_SIZE; i++, at++) { 7325890Skarels if (at->at_flags == 0 || (at->at_flags & ATF_PERM)) 7425890Skarels continue; 7525890Skarels if (++at->at_timer < ((at->at_flags&ATF_COM) ? 7625890Skarels ARPT_KILLC : ARPT_KILLI)) 7725890Skarels continue; 7825890Skarels /* timer has expired, clear entry */ 7925890Skarels arptfree(at); 8011570Ssam } 8111570Ssam } 8211570Ssam 8311570Ssam /* 8411570Ssam * Broadcast an ARP packet, asking who has addr on interface ac. 8511570Ssam */ 8611570Ssam arpwhohas(ac, addr) 8711570Ssam register struct arpcom *ac; 8811570Ssam struct in_addr *addr; 8911570Ssam { 9011570Ssam register struct mbuf *m; 9111570Ssam register struct ether_header *eh; 9211570Ssam register struct ether_arp *ea; 9311570Ssam struct sockaddr sa; 9411570Ssam 9511570Ssam if ((m = m_get(M_DONTWAIT, MT_DATA)) == NULL) 9616221Skarels return (1); 9715718Skarels m->m_len = sizeof *ea; 9811570Ssam m->m_off = MMAXOFF - m->m_len; 9911570Ssam ea = mtod(m, struct ether_arp *); 10011570Ssam eh = (struct ether_header *)sa.sa_data; 10112763Ssam bzero((caddr_t)ea, sizeof (*ea)); 10218640Skarels bcopy((caddr_t)etherbroadcastaddr, (caddr_t)eh->ether_dhost, 10318640Skarels sizeof(eh->ether_dhost)); 10418378Skarels eh->ether_type = ETHERTYPE_ARP; /* if_output will swap */ 10511570Ssam ea->arp_hrd = htons(ARPHRD_ETHER); 10618378Skarels ea->arp_pro = htons(ETHERTYPE_IP); 10718640Skarels ea->arp_hln = sizeof(ea->arp_sha); /* hardware address length */ 10818640Skarels ea->arp_pln = sizeof(ea->arp_spa); /* protocol address length */ 10911570Ssam ea->arp_op = htons(ARPOP_REQUEST); 11018640Skarels bcopy((caddr_t)ac->ac_enaddr, (caddr_t)ea->arp_sha, 11118640Skarels sizeof(ea->arp_sha)); 11218640Skarels bcopy((caddr_t)&ac->ac_ipaddr, (caddr_t)ea->arp_spa, 11318640Skarels sizeof(ea->arp_spa)); 11418640Skarels bcopy((caddr_t)addr, (caddr_t)ea->arp_tpa, sizeof(ea->arp_tpa)); 11511570Ssam sa.sa_family = AF_UNSPEC; 11616221Skarels return ((*ac->ac_if.if_output)(&ac->ac_if, m, &sa)); 11711570Ssam } 11811570Ssam 11911570Ssam /* 12011570Ssam * Resolve an IP address into an ethernet address. If success, 12125890Skarels * desten is filled in. If there is no entry in arptab, 12225890Skarels * set one up and broadcast a request for the IP address. 12325890Skarels * Hold onto this mbuf and resend it once the address 12425890Skarels * is finally resolved. A return value of 1 indicates 12525890Skarels * that desten has been filled in and the packet should be sent 12625890Skarels * normally; a 0 return indicates that the packet has been 12725890Skarels * taken over here, either now or for later transmission. 12811570Ssam * 12911570Ssam * We do some (conservative) locking here at splimp, since 13011570Ssam * arptab is also altered from input interrupt service (ecintr/ilintr 13118378Skarels * calls arpinput when ETHERTYPE_ARP packets come in). 13211570Ssam */ 13325890Skarels arpresolve(ac, m, destip, desten, usetrailers) 13411570Ssam register struct arpcom *ac; 13511570Ssam struct mbuf *m; 13611570Ssam register struct in_addr *destip; 13718640Skarels register u_char *desten; 13825890Skarels int *usetrailers; 13911570Ssam { 14011570Ssam register struct arptab *at; 14114867Ssam register struct ifnet *ifp; 14211570Ssam struct sockaddr_in sin; 14311570Ssam int s, lna; 14411570Ssam 14525890Skarels *usetrailers = 0; 14618378Skarels if (in_broadcast(*destip)) { /* broadcast address */ 14718640Skarels bcopy((caddr_t)etherbroadcastaddr, (caddr_t)desten, 14818640Skarels sizeof(etherbroadcastaddr)); 14911570Ssam return (1); 15011570Ssam } 15118378Skarels lna = in_lnaof(*destip); 15214867Ssam ifp = &ac->ac_if; 15314867Ssam /* if for us, then use software loopback driver */ 15418378Skarels if (destip->s_addr == ac->ac_ipaddr.s_addr && 15516221Skarels (loif.if_flags & IFF_UP)) { 15611570Ssam sin.sin_family = AF_INET; 15711570Ssam sin.sin_addr = *destip; 15816685Ssam (void) looutput(&loif, m, (struct sockaddr *)&sin); 15916685Ssam /* 16025890Skarels * The packet has already been sent and freed. 16116685Ssam */ 16216685Ssam return (0); 16311570Ssam } 16411570Ssam s = splimp(); 16511570Ssam ARPTAB_LOOK(at, destip->s_addr); 16611570Ssam if (at == 0) { /* not found */ 16724383Swalsh if (ifp->if_flags & IFF_NOARP) { 16818640Skarels bcopy((caddr_t)ac->ac_enaddr, (caddr_t)desten, 3); 16918640Skarels desten[3] = (lna >> 16) & 0x7f; 17018640Skarels desten[4] = (lna >> 8) & 0xff; 17118640Skarels desten[5] = lna & 0xff; 17216221Skarels splx(s); 17316221Skarels return (1); 17416221Skarels } else { 17516221Skarels at = arptnew(destip); 17616221Skarels at->at_hold = m; 17716221Skarels arpwhohas(ac, destip); 17816221Skarels splx(s); 17916221Skarels return (0); 18016221Skarels } 18111570Ssam } 18211570Ssam at->at_timer = 0; /* restart the timer */ 18311570Ssam if (at->at_flags & ATF_COM) { /* entry IS complete */ 18418640Skarels bcopy((caddr_t)at->at_enaddr, (caddr_t)desten, 18518640Skarels sizeof(at->at_enaddr)); 18625890Skarels if (at->at_flags & ATF_USETRAILERS) 18725890Skarels *usetrailers = 1; 18811570Ssam splx(s); 18911570Ssam return (1); 19011570Ssam } 19111570Ssam /* 19211570Ssam * There is an arptab entry, but no ethernet address 19311570Ssam * response yet. Replace the held mbuf with this 19411570Ssam * latest one. 19511570Ssam */ 19611570Ssam if (at->at_hold) 19711570Ssam m_freem(at->at_hold); 19811570Ssam at->at_hold = m; 19911570Ssam arpwhohas(ac, destip); /* ask again */ 20011570Ssam splx(s); 20111570Ssam return (0); 20211570Ssam } 20311570Ssam 20411570Ssam /* 20518378Skarels * Called from 10 Mb/s Ethernet interrupt handlers 20618378Skarels * when ether packet type ETHERTYPE_ARP 20725890Skarels * is received. Common length and type checks are done here, 20825890Skarels * then the protocol-specific routine is called. 20925890Skarels */ 21025890Skarels arpinput(ac, m) 21125890Skarels struct arpcom *ac; 21225890Skarels struct mbuf *m; 21325890Skarels { 21425890Skarels register struct arphdr *ar; 21525890Skarels 21625890Skarels if (ac->ac_if.if_flags & IFF_NOARP) 21725890Skarels goto out; 21825890Skarels IF_ADJ(m); 21925890Skarels if (m->m_len < sizeof(struct arphdr)) 22025890Skarels goto out; 22125890Skarels ar = mtod(m, struct arphdr *); 22225890Skarels if (ntohs(ar->ar_hrd) != ARPHRD_ETHER) 22325890Skarels goto out; 22425890Skarels if (m->m_len < sizeof(struct arphdr) + 2 * ar->ar_hln + 2 * ar->ar_pln) 22525890Skarels goto out; 22625890Skarels 22725890Skarels switch (ntohs(ar->ar_pro)) { 22825890Skarels 22925890Skarels case ETHERTYPE_IP: 23025890Skarels case ETHERTYPE_IPTRAILERS: 23125890Skarels in_arpinput(ac, m); 23225890Skarels return; 23325890Skarels 23425890Skarels default: 23525890Skarels break; 23625890Skarels } 23725890Skarels out: 23825890Skarels m_freem(m); 23925890Skarels } 24025890Skarels 24125890Skarels /* 24225890Skarels * ARP for Internet protocols on 10 Mb/s Ethernet. 24325890Skarels * Algorithm is that given in RFC 826. 24411570Ssam * In addition, a sanity check is performed on the sender 24511570Ssam * protocol address, to catch impersonators. 24625890Skarels * We also handle negotiations for use of trailer protocol: 24725890Skarels * ARP replies for protocol type ETHERTYPE_TRAIL are sent 24825890Skarels * along with IP replies if we want trailers sent to us, 24925890Skarels * and also send them in response to IP replies. 25025890Skarels * This allows either end to announce the desire to receive 25125890Skarels * trailer packets. 25225890Skarels * We reply to requests for ETHERTYPE_TRAIL protocol as well, 25325890Skarels * but don't normally send requests. 25411570Ssam */ 25525890Skarels in_arpinput(ac, m) 25611570Ssam register struct arpcom *ac; 25711570Ssam struct mbuf *m; 25811570Ssam { 25911570Ssam register struct ether_arp *ea; 26011570Ssam struct ether_header *eh; 26124803Skarels register struct arptab *at; /* same as "merge" flag */ 26225890Skarels struct mbuf *mcopy = 0; 26311570Ssam struct sockaddr_in sin; 26411570Ssam struct sockaddr sa; 26525890Skarels struct in_addr isaddr, itaddr, myaddr; 26625890Skarels int proto, op; 26711570Ssam 26818378Skarels myaddr = ac->ac_ipaddr; 26911570Ssam ea = mtod(m, struct ether_arp *); 27025890Skarels proto = ntohs(ea->arp_pro); 27125890Skarels op = ntohs(ea->arp_op); 27218640Skarels isaddr.s_addr = ((struct in_addr *)ea->arp_spa)->s_addr; 27318640Skarels itaddr.s_addr = ((struct in_addr *)ea->arp_tpa)->s_addr; 27418640Skarels if (!bcmp((caddr_t)ea->arp_sha, (caddr_t)ac->ac_enaddr, 27518640Skarels sizeof (ea->arp_sha))) 27611570Ssam goto out; /* it's from me, ignore it. */ 27725890Skarels if (!bcmp((caddr_t)ea->arp_sha, (caddr_t)etherbroadcastaddr, 27825890Skarels sizeof (ea->arp_sha))) { 27925890Skarels log(LOG_ERR, 28025890Skarels "arp: ether address is broadcast for IP address %x!\n", 28125890Skarels ntohl(isaddr.s_addr)); 28225890Skarels goto out; 28325890Skarels } 28411570Ssam if (isaddr.s_addr == myaddr.s_addr) { 28525890Skarels log(LOG_ERR, "%s: %s\n", 28625890Skarels "duplicate IP address!! sent from ethernet address", 28725890Skarels ether_sprintf(ea->arp_sha)); 28816221Skarels itaddr = myaddr; 28925890Skarels if (op == ARPOP_REQUEST) 29011570Ssam goto reply; 29111570Ssam goto out; 29211570Ssam } 29311570Ssam ARPTAB_LOOK(at, isaddr.s_addr); 294*26147Skarels if (at) { 29518640Skarels bcopy((caddr_t)ea->arp_sha, (caddr_t)at->at_enaddr, 29618640Skarels sizeof(ea->arp_sha)); 29711570Ssam at->at_flags |= ATF_COM; 29811570Ssam if (at->at_hold) { 29911570Ssam sin.sin_family = AF_INET; 30011570Ssam sin.sin_addr = isaddr; 30111570Ssam (*ac->ac_if.if_output)(&ac->ac_if, 30218759Skarels at->at_hold, (struct sockaddr *)&sin); 30318759Skarels at->at_hold = 0; 30411570Ssam } 30518759Skarels } 30618759Skarels if (at == 0 && itaddr.s_addr == myaddr.s_addr) { 30716221Skarels /* ensure we have a table entry */ 30811570Ssam at = arptnew(&isaddr); 30918640Skarels bcopy((caddr_t)ea->arp_sha, (caddr_t)at->at_enaddr, 31018640Skarels sizeof(ea->arp_sha)); 31111570Ssam at->at_flags |= ATF_COM; 31211570Ssam } 31311570Ssam reply: 31425890Skarels switch (proto) { 31525890Skarels 31625890Skarels case ETHERTYPE_IPTRAILERS: 31725890Skarels /* partner says trailers are OK */ 31825890Skarels if (at) 31925890Skarels at->at_flags |= ATF_USETRAILERS; 32025890Skarels /* 32125890Skarels * Reply to request iff we want trailers. 32225890Skarels */ 32325890Skarels if (op != ARPOP_REQUEST || ac->ac_if.if_flags & IFF_NOTRAILERS) 32425890Skarels goto out; 32525890Skarels break; 32625890Skarels 32725890Skarels case ETHERTYPE_IP: 32825890Skarels /* 32925890Skarels * Reply if this is an IP request, or if we want to send 33025890Skarels * a trailer response. 33125890Skarels */ 33225890Skarels if (op != ARPOP_REQUEST && ac->ac_if.if_flags & IFF_NOTRAILERS) 33325890Skarels goto out; 33425890Skarels } 33525890Skarels if (itaddr.s_addr == myaddr.s_addr) { 33625890Skarels /* I am the target */ 33725890Skarels bcopy((caddr_t)ea->arp_sha, (caddr_t)ea->arp_tha, 33825890Skarels sizeof(ea->arp_sha)); 33925890Skarels bcopy((caddr_t)ac->ac_enaddr, (caddr_t)ea->arp_sha, 34025890Skarels sizeof(ea->arp_sha)); 34125890Skarels } else { 34225890Skarels ARPTAB_LOOK(at, itaddr.s_addr); 34325890Skarels if (at == NULL || (at->at_flags & ATF_PUBL) == 0) 34425890Skarels goto out; 34525890Skarels bcopy((caddr_t)ea->arp_sha, (caddr_t)ea->arp_tha, 34625890Skarels sizeof(ea->arp_sha)); 34725890Skarels bcopy((caddr_t)at->at_enaddr, (caddr_t)ea->arp_sha, 34825890Skarels sizeof(ea->arp_sha)); 34925890Skarels } 35025890Skarels 35118640Skarels bcopy((caddr_t)ea->arp_spa, (caddr_t)ea->arp_tpa, 35218640Skarels sizeof(ea->arp_spa)); 35318640Skarels bcopy((caddr_t)&itaddr, (caddr_t)ea->arp_spa, 35418640Skarels sizeof(ea->arp_spa)); 35525890Skarels ea->arp_op = htons(ARPOP_REPLY); 35625890Skarels /* 35725890Skarels * If incoming packet was an IP reply, 35825890Skarels * we are sending a reply for type IPTRAILERS. 35925890Skarels * If we are sending a reply for type IP 36025890Skarels * and we want to receive trailers, 36125890Skarels * send a trailer reply as well. 36225890Skarels */ 36325890Skarels if (op == ARPOP_REPLY) 36425890Skarels ea->arp_pro = htons(ETHERTYPE_IPTRAILERS); 36525890Skarels else if (proto == ETHERTYPE_IP && 36625890Skarels (ac->ac_if.if_flags & IFF_NOTRAILERS) == 0) 36725890Skarels mcopy = m_copy(m, 0, M_COPYALL); 36811570Ssam eh = (struct ether_header *)sa.sa_data; 36918640Skarels bcopy((caddr_t)ea->arp_tha, (caddr_t)eh->ether_dhost, 37018640Skarels sizeof(eh->ether_dhost)); 37118378Skarels eh->ether_type = ETHERTYPE_ARP; 37211570Ssam sa.sa_family = AF_UNSPEC; 37311570Ssam (*ac->ac_if.if_output)(&ac->ac_if, m, &sa); 37425890Skarels if (mcopy) { 37525890Skarels ea = mtod(mcopy, struct ether_arp *); 37625890Skarels ea->arp_pro = htons(ETHERTYPE_IPTRAILERS); 37725890Skarels (*ac->ac_if.if_output)(&ac->ac_if, mcopy, &sa); 37825890Skarels } 37911570Ssam return; 38011570Ssam out: 38111570Ssam m_freem(m); 38211570Ssam return; 38311570Ssam } 38411570Ssam 38511570Ssam /* 38611570Ssam * Free an arptab entry. 38711570Ssam */ 38811570Ssam arptfree(at) 38911570Ssam register struct arptab *at; 39011570Ssam { 39111570Ssam int s = splimp(); 39211570Ssam 39311570Ssam if (at->at_hold) 39411570Ssam m_freem(at->at_hold); 39511570Ssam at->at_hold = 0; 39611570Ssam at->at_timer = at->at_flags = 0; 39711570Ssam at->at_iaddr.s_addr = 0; 39811570Ssam splx(s); 39911570Ssam } 40011570Ssam 40111570Ssam /* 40211570Ssam * Enter a new address in arptab, pushing out the oldest entry 40311570Ssam * from the bucket if there is no room. 40416221Skarels * This always succeeds since no bucket can be completely filled 40516221Skarels * with permanent entries (except from arpioctl when testing whether 40618640Skarels * another permanent entry will fit). 40711570Ssam */ 40811570Ssam struct arptab * 40911570Ssam arptnew(addr) 41011570Ssam struct in_addr *addr; 41111570Ssam { 41211570Ssam register n; 41324803Skarels int oldest = -1; 41416221Skarels register struct arptab *at, *ato = NULL; 41516221Skarels static int first = 1; 41611570Ssam 41716221Skarels if (first) { 41816221Skarels first = 0; 41916221Skarels timeout(arptimer, (caddr_t)0, hz); 42016221Skarels } 42116221Skarels at = &arptab[ARPTAB_HASH(addr->s_addr) * ARPTAB_BSIZ]; 42218640Skarels for (n = 0; n < ARPTAB_BSIZ; n++,at++) { 42311570Ssam if (at->at_flags == 0) 42411570Ssam goto out; /* found an empty entry */ 42516221Skarels if (at->at_flags & ATF_PERM) 42616221Skarels continue; 42711570Ssam if (at->at_timer > oldest) { 42811570Ssam oldest = at->at_timer; 42911570Ssam ato = at; 43011570Ssam } 43111570Ssam } 43216221Skarels if (ato == NULL) 43318640Skarels return (NULL); 43411570Ssam at = ato; 43511570Ssam arptfree(at); 43611570Ssam out: 43711570Ssam at->at_iaddr = *addr; 43811570Ssam at->at_flags = ATF_INUSE; 43911570Ssam return (at); 44011570Ssam } 44116221Skarels 44216221Skarels arpioctl(cmd, data) 44316221Skarels int cmd; 44416221Skarels caddr_t data; 44516221Skarels { 44616221Skarels register struct arpreq *ar = (struct arpreq *)data; 44716221Skarels register struct arptab *at; 44816221Skarels register struct sockaddr_in *sin; 44916221Skarels int s; 45016221Skarels 45116221Skarels if (ar->arp_pa.sa_family != AF_INET || 45216221Skarels ar->arp_ha.sa_family != AF_UNSPEC) 45316221Skarels return (EAFNOSUPPORT); 45416221Skarels sin = (struct sockaddr_in *)&ar->arp_pa; 45516221Skarels s = splimp(); 45616221Skarels ARPTAB_LOOK(at, sin->sin_addr.s_addr); 45716221Skarels if (at == NULL) { /* not found */ 45816221Skarels if (cmd != SIOCSARP) { 45916221Skarels splx(s); 46016221Skarels return (ENXIO); 46116221Skarels } 46218378Skarels if (ifa_ifwithnet(&ar->arp_pa) == NULL) { 46316221Skarels splx(s); 46416221Skarels return (ENETUNREACH); 46516221Skarels } 46616221Skarels } 46716221Skarels switch (cmd) { 46816221Skarels 46916221Skarels case SIOCSARP: /* set entry */ 47016221Skarels if (at == NULL) { 47116221Skarels at = arptnew(&sin->sin_addr); 47216221Skarels if (ar->arp_flags & ATF_PERM) { 47316221Skarels /* never make all entries in a bucket permanent */ 47416221Skarels register struct arptab *tat; 47516221Skarels 47616221Skarels /* try to re-allocate */ 47716221Skarels tat = arptnew(&sin->sin_addr); 47816221Skarels if (tat == NULL) { 47916221Skarels arptfree(at); 48016221Skarels splx(s); 48116221Skarels return (EADDRNOTAVAIL); 48216221Skarels } 48316221Skarels arptfree(tat); 48416221Skarels } 48516221Skarels } 48618640Skarels bcopy((caddr_t)ar->arp_ha.sa_data, (caddr_t)at->at_enaddr, 48718640Skarels sizeof(at->at_enaddr)); 48816221Skarels at->at_flags = ATF_COM | ATF_INUSE | 48916221Skarels (ar->arp_flags & (ATF_PERM|ATF_PUBL)); 49016221Skarels at->at_timer = 0; 49116221Skarels break; 49216221Skarels 49316221Skarels case SIOCDARP: /* delete entry */ 49416221Skarels arptfree(at); 49516221Skarels break; 49616221Skarels 49716221Skarels case SIOCGARP: /* get entry */ 49818640Skarels bcopy((caddr_t)at->at_enaddr, (caddr_t)ar->arp_ha.sa_data, 49918640Skarels sizeof(at->at_enaddr)); 50016221Skarels ar->arp_flags = at->at_flags; 50116221Skarels break; 50216221Skarels } 50316221Skarels splx(s); 50416221Skarels return (0); 50516221Skarels } 50625890Skarels 50725890Skarels /* 50825890Skarels * Convert Ethernet address to printable (loggable) representation. 50925890Skarels */ 51025890Skarels char * 51125890Skarels ether_sprintf(ap) 51225890Skarels register u_char *ap; 51325890Skarels { 51425890Skarels register i; 51525890Skarels static char etherbuf[18]; 51625890Skarels register char *cp = etherbuf; 51725890Skarels static char digits[] = "0123456789abcdef"; 51825890Skarels 51925890Skarels for (i = 0; i < 6; i++) { 52025890Skarels *cp++ = digits[*ap >> 4]; 52125890Skarels *cp++ = digits[*ap++ & 0xf]; 52225890Skarels *cp++ = ':'; 52325890Skarels } 52425890Skarels *--cp = 0; 52525890Skarels return (etherbuf); 52625890Skarels } 527