2 * bootptest.c - Test out a bootp server.
4 * This simple program was put together from pieces taken from
5 * various places, including the CMU BOOTP client and server.
6 * The packet printing routine is from the Berkeley "tcpdump"
7 * program with some enhancements I added. The print-bootp.c
8 * file was shared with my copy of "tcpdump" and therefore uses
9 * some unusual utility routines that would normally be provided
10 * by various parts of the tcpdump program. Gordon W. Ross
14 * This program includes software developed by the University of
15 * California, Lawrence Berkeley Laboratory and its contributors.
16 * (See the copyright notice in print-bootp.c)
18 * The remainder of this program is public domain. You may do
19 * whatever you like with it except claim that you wrote it.
21 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR IMPLIED
22 * WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF
23 * MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
27 * 12/02/93 Released version 1.4 (with bootp-2.3.2)
28 * 11/05/93 Released version 1.3
29 * 10/14/93 Released version 1.2
30 * 10/11/93 Released version 1.1
31 * 09/28/93 Released version 1.0
32 * 09/93 Original developed by Gordon W. Ross <gwr@mc.com>
36 #include <sys/cdefs.h>
37 __FBSDID("$FreeBSD$");
39 char *usage = "bootptest [-h] server-name [vendor-data-template-file]";
41 #include <sys/types.h>
42 #include <sys/socket.h>
43 #include <sys/ioctl.h>
47 #include <sys/utsname.h>
50 #include <netinet/in.h>
51 #include <arpa/inet.h> /* inet_ntoa */
68 #include "bootptest.h"
72 #include "patchlevel.h"
74 static void send_request(int s);
85 unsigned char *packetp;
86 unsigned char *snapend;
91 * IP port numbers for client and server obtained from /etc/services
94 u_short bootps_port, bootpc_port;
98 * Internet socket and interface config structures
101 struct sockaddr_in sin_server; /* where to send requests */
102 struct sockaddr_in sin_client; /* for bind and listen */
103 struct sockaddr_in sin_from; /* Packet source */
104 u_char eaddr[16]; /* Ethernet address */
110 int debug = 1; /* Debugging flag (level) */
111 char *sndbuf; /* Send packet buffer */
112 char *rcvbuf; /* Receive packet buffer */
114 struct utsname my_uname;
118 * Vendor magic cookies for CMU and RFC1048
121 unsigned char vm_cmu[4] = VM_CMU;
122 unsigned char vm_rfc1048[4] = VM_RFC1048;
123 short secs; /* How long client has waited */
126 * Initialization such as command-line processing is done, then
127 * the receiver loop is started. Die when interrupted.
139 char *servername = NULL;
140 char *vendor_file = NULL;
141 char *bp_file = NULL;
142 int32 server_addr; /* inet addr, network order */
143 int s; /* Socket file descriptor */
144 int n, fromlen, recvcnt;
149 progname = strrchr(argv[0], '/');
158 printf("%s: version %s.%d\n", progname, VERSION, PATCHLEVEL);
161 * Verify that "struct bootp" has the correct official size.
162 * (Catch evil compilers that do struct padding.)
164 assert(sizeof(struct bootp) == BP_MINPKTSZ);
166 if (uname(&my_uname) < 0)
167 errx(1, "can't get hostname");
168 hostname = my_uname.nodename;
170 sndbuf = malloc(BUFLEN);
171 rcvbuf = malloc(BUFLEN);
172 if (!sndbuf || !rcvbuf) {
173 printf("malloc failed\n");
177 /* default magic number */
178 bcopy(vm_rfc1048, (char*)&vend_magic, 4);
180 /* Handle option switches. */
182 if (argv[0][0] != '-')
184 switch (argv[0][1]) {
186 case 'f': /* File name to request. */
193 case 'h': /* Use hardware address. */
197 case 'm': /* Magic number value. */
201 vend_magic = inet_addr(*argv);
214 /* Get server name (or address) for query. */
220 /* Get optional vendor-data-template-file. */
227 printf("missing server name.\n");
234 if ((s = socket(AF_INET, SOCK_DGRAM, 0)) < 0) {
239 * Get server's listening port number
241 sep = getservbyname("bootps", "udp");
243 bootps_port = ntohs((u_short) sep->s_port);
245 warnx("bootps/udp: unknown service -- using port %d",
247 bootps_port = (u_short) IPPORT_BOOTPS;
251 * Set up server socket address (for send)
254 if (isdigit(servername[0]))
255 server_addr = inet_addr(servername);
257 hep = gethostbyname(servername);
259 errx(1, "%s: unknown host", servername);
260 bcopy(hep->h_addr, &server_addr, sizeof(server_addr));
263 /* Get broadcast address */
265 server_addr = INADDR_ANY;
267 sin_server.sin_family = AF_INET;
268 sin_server.sin_port = htons(bootps_port);
269 sin_server.sin_addr.s_addr = server_addr;
272 * Get client's listening port number
274 sep = getservbyname("bootpc", "udp");
276 bootpc_port = ntohs(sep->s_port);
278 warnx("bootpc/udp: unknown service -- using port %d",
280 bootpc_port = (u_short) IPPORT_BOOTPC;
284 * Set up client socket address (for listen)
286 sin_client.sin_family = AF_INET;
287 sin_client.sin_port = htons(bootpc_port);
288 sin_client.sin_addr.s_addr = INADDR_ANY;
291 * Bind client socket to BOOTPC port.
293 if (bind(s, (struct sockaddr *) &sin_client, sizeof(sin_client)) < 0) {
294 if (errno == EACCES) {
295 warn("bind BOOTPC port");
296 errx(1, "you need to run this as root");
299 err(1, "bind BOOTPC port");
304 bp = (struct bootp *) sndbuf;
305 bzero(bp, sizeof(*bp));
306 bp->bp_op = BOOTREQUEST;
307 xid = (int32) getpid();
308 bp->bp_xid = (u_int32) htonl(xid);
310 strncpy(bp->bp_file, bp_file, BP_FILE_LEN);
313 * Fill in the hardware address (or client IP address)
318 ifr = getif(s, &sin_server.sin_addr);
320 printf("No interface for %s\n", servername);
323 if (getether(ifr->ifr_name, (char*)eaddr)) {
324 printf("Can not get ether addr for %s\n", ifr->ifr_name);
327 /* Copy Ethernet address into request packet. */
330 bcopy(eaddr, bp->bp_chaddr, bp->bp_hlen);
332 /* Fill in the client IP address. */
333 hep = gethostbyname(hostname);
335 printf("Can not get my IP address\n");
338 bcopy(hep->h_addr, &bp->bp_ciaddr, hep->h_length);
342 * Copy in the default vendor data.
344 bcopy((char*)&vend_magic, bp->bp_vend, 4);
346 bp->bp_vend[4] = TAG_END;
349 * Read in the "options" part of the request.
350 * This also determines the size of the packet.
352 snaplen = sizeof(*bp);
354 int fd = open(vendor_file, 0);
359 /* Compute actual space for options. */
360 n = BUFLEN - sizeof(*bp) + BP_VEND_LEN;
361 n = read(fd, bp->bp_vend, n);
367 printf("read %d bytes of vendor template\n", n);
368 if (n > BP_VEND_LEN) {
369 printf("warning: extended options in use (len > %d)\n",
371 snaplen += (n - BP_VEND_LEN);
375 * Set globals needed by print_bootp
376 * (called by send_request)
378 packetp = (unsigned char *) eaddr;
379 snapend = (unsigned char *) sndbuf + snaplen;
381 /* Send a request once per second while waiting for replies. */
383 bp->bp_secs = secs = 0;
389 tv.tv_sec = WAITSECS;
392 n = select(s + 1, (fd_set *) & readfds, NULL, NULL, &tv);
399 * We have not received a response in the last second.
400 * If we have ever received any responses, exit now.
401 * Otherwise, bump the "wait time" field and re-send.
408 bp->bp_secs = htons(secs);
412 fromlen = sizeof(sin_from);
413 n = recvfrom(s, rcvbuf, BUFLEN, 0,
414 (struct sockaddr *) &sin_from, &fromlen);
418 if (n < sizeof(struct bootp)) {
419 printf("received short packet\n");
424 /* Print the received packet. */
425 printf("Recvd from %s", inet_ntoa(sin_from.sin_addr));
426 /* set globals needed by bootp_print() */
428 snapend = (unsigned char *) rcvbuf + snaplen;
429 bootp_print((struct bootp *)rcvbuf, n, sin_from.sin_port, 0);
432 * This no longer exits immediately after receiving
433 * one response because it is useful to know if the
434 * client might get multiple responses. This code
435 * will now listen for one second after a response.
438 errx(1, "no response from %s", servername);
445 /* Print the request packet. */
446 printf("Sending to %s", inet_ntoa(sin_server.sin_addr));
447 bootp_print((struct bootp *)sndbuf, snaplen, sin_from.sin_port, 0);
450 /* Send the request packet. */
451 if (sendto(s, sndbuf, snaplen, 0,
452 (struct sockaddr *) &sin_server,
453 sizeof(sin_server)) < 0)
455 perror("sendto server");
461 * Print out a filename (or other ascii string).
462 * Return true if truncated.
471 while ((c = *s++) != '\0') {
482 c ^= 0x40; /* DEL to ?, others to alpha */
492 * Convert an IP addr to a string.
493 * (like inet_ntoa, but ina is a pointer)
503 snprintf(b, sizeof(b), "%d.%d.%d.%d", p[0], p[1], p[2], p[3]);
511 * c-argdecl-indent: 4
512 * c-continued-statement-offset: 4
513 * c-continued-brace-offset: -4