From c4d6f9da4b13e7a02f3d606bdb0411528603e9f0 Mon Sep 17 00:00:00 2001 From: jow Date: Thu, 19 Jul 2012 16:17:23 +0000 Subject: [PATCH] [package] add owipcalc - a small ipv4 & ipv6 calculation utility git-svn-id: svn://svn.openwrt.org/openwrt/trunk@32778 3c298f89-4303-0410-b956-a3cf2f4a3e73 --- package/owipcalc/Makefile | 49 +++ package/owipcalc/src/owipcalc | Bin 0 -> 17138 bytes package/owipcalc/src/owipcalc.c | 754 ++++++++++++++++++++++++++++++++ 3 files changed, 803 insertions(+) create mode 100644 package/owipcalc/Makefile create mode 100755 package/owipcalc/src/owipcalc create mode 100644 package/owipcalc/src/owipcalc.c diff --git a/package/owipcalc/Makefile b/package/owipcalc/Makefile new file mode 100644 index 000000000..9ff9b24c2 --- /dev/null +++ b/package/owipcalc/Makefile @@ -0,0 +1,49 @@ +# +# Copyright (C) 2012 Jo-Philipp Wich +# +# This is free software, licensed under the Apache 2 license. +# + +include $(TOPDIR)/rules.mk + +PKG_NAME:=owipcalc +PKG_RELEASE:=1 + +include $(INCLUDE_DIR)/package.mk + + +define Package/owipcalc + SECTION:=utils + CATEGORY:=Utilities + TITLE:=Simple IPv4/IPv6 address calculator + MAINTAINER:=Jo-Philipp Wich +endef + +define Package/owipcalc/description + The owipcalc utility supports a number of calculations and tests to work + with ip-address ranges, this is useful for scripts that e.g. need to + partition ipv6-prefixes into small subnets or to calculate address ranges + for dhcp pools. +endef + + +define Build/Prepare + $(INSTALL_DIR) $(PKG_BUILD_DIR) + $(CP) ./src/* $(PKG_BUILD_DIR)/ +endef + +define Build/Configure +endef + +define Build/Compile + $(TARGET_CC) $(TARGET_CFLAGS) \ + -o $(PKG_BUILD_DIR)/owipcalc $(PKG_BUILD_DIR)/owipcalc.c +endef + + +define Package/owipcalc/install + $(INSTALL_DIR) $(1)/usr/bin + $(INSTALL_BIN) $(PKG_BUILD_DIR)/owipcalc $(1)/usr/bin/owipcalc +endef + +$(eval $(call BuildPackage,owipcalc)) diff --git a/package/owipcalc/src/owipcalc b/package/owipcalc/src/owipcalc new file mode 100755 index 0000000000000000000000000000000000000000..650d9f03633ccf139cee203cd08b6aa51b486a80 GIT binary patch literal 17138 zcmeHOe|S{IxtWSgs-!_^!X>7O z4~Y+oe?k_^8oEG(ASyVI#^B&IM**8F@3vhjkGST_OYn>x(K?UNK9E ziXS;$3=ftG@hAf2vK&dFp2Tl_>r?kxk#O6rNML3p980frr{Zqdh-FYsmS25CD^f~N@~lK)c{KuU!}5w3e*DUh z*L~$L-@o;VM%bbnI!`2>b?JBM(i z@LjVUxq)!Zmrex(BDgNBi;y0VMMO9j)O|5Mo)C$&o&pC{Zol2v9=hGv;SWcc+aB^K z6VL`qLaf-w;dMpHqZQF}DOOg)~Ch^RjjiMIm=g2|-lSep#%K^C@$fD*}YOz)5o zReV0`XDA!>hhqY2gd!ppGw3>!!JxQ$*)@xse6!sR#gqrFE;Gg`|~6|;bM&P3dZP=D#n;7 z)r>KTY8Yc8PGpRUtue-=t7VJ{H;pkIzzoKih#tn!sDUvi=v>B_^a~h6>4l6jS(_PS zaxG;H=dg@%wGb;9!-=#ohQnyhzHwuw-&tT=R&DI;sXz_5}ar|eU;X1ZB#N^>as5V^3mWNn&c)!H7K#1l%oR^rE2+>l9 zpOTms32DSzC8lLU(};T{riDTt;x374snA^Fgv7L1Xd&@!64P>_rNk>FrUgSQh!;vs zONKs9?2(uj4c$hpNleRz*r3Bz64Sz=1hJ5qmJY2W9(WHKb+mY>i};Ylw0vj_@qUTf z1EC(`yu|E@&_l#eNz5JzZ6)3+F?%NTIB^d!Vp0F6)!ElFzZ+Q5vN9wvuR~S%_tBd| z2fpHT6LH!8|0+-sh}k z-thjP^!7-aY5Tl`EJOi2r0^r?n)Mbk8w#Rw)18 zUAfjm_q8>-R#&#Awj$eH>)O{`>zoW8*^1i24v^=(g}tH-|1wIYX1Doe#mh_juWbKNh^F0rI}-n%FX*_jl#Z# za@Fj+7$S2Eow?Tj%MFqO3TMvS|9m0q?MJ*hpMJIP8Zd=87gx;g)&VegQe+%V z(X#AfR2Z1&9n|kYT)ACr%BK^GFRZXO*jEk!ftnJX$zOPdcQCCXGn1zwq+@4mP%az2 z4->Yp4&~h|T#~BB-kdi;f##%H+;>q=pQDGJpnm|6ifu=+?8cw;s*Xd)r=;zM$z#m_*4uHSMK95I4tShsj;O}=1$q@UuJi``1|a@&_S~J z6_tK@@@~*(*@G^l^JSwmd#YBgzLouQ+FUaQ2ibN>wr8IXTMVw#RrXSFoqW(35~tU` zp}(ps1AE8*8$AjK6DJKVGjDftI%dli-huSw%I#yHM0sYwu_>=tU@E?aE-5^L+R_qz zlTIKQB*7LEz`i20M>9+X`!~~?-UGpHSoH+dtU6b!5I+&~rf2p%<2- z#M;rOTe7Wo&r22iGaLG`6ph2IhY*gF^~ld0n^Af1J7Bg`u6EvjEMvLrUD;(=?a)%X zo|z~m`Ewx0y0TZm(UOd1=4$utqeUy|*I^bJE8Xa;&zm5|x;3);+yz&rR-YtTV`^O4 z1(|C7>4ysh4S6i4rCm~;&dhVR+W$Bw|I|`q;h-fQ0{tEnmAr1QKNc%S?kg6 zigUqiO9gm&k8JTC?boWVbc3GH~Z4G=TE=Ar&=?=15YM9)!yEZ$%SmM_ifR40d#wNC*EJg zbS_hSo2&3^koRr$QR~~l7?VHfLSgo&(|fZAcNNB9wfJw9zf!$DdE%mpz7>&&cI?2y4I}vd4xFPTnucwzSl!Er(ovebQ^Q zo5113p~yu=Y9rToXt@RBPl{66P$zp3qSVS?Ty8Lypyg1p^&GHOQ@lrw9xCQ@=&F2k zk+7|wtH9>Sd~6X{Vr*9G|6Js%Iz77!vmR3&&V?H=>D*f1;^y~cEAHiQqvvRsldZVt zlK|ydag8yI7lPvAj=8zewcx$<uy--$07om|M=(wMx3suiyP^eGmv_j)LA~ZBWFCHk%0Th?lD|~`$-l_A zIBd2hOv!Caf8RL5`^7#G|MW^ciK!Yk=7pa#su<*+c1O@^8FG?=@+nv#9QwWZTH zbq*@ZeQX{~`Y?z`HpkXChFvedzGE8nFsJZhP@mAtd*ue&AtzGNY3*!z6mRv^UTrao zEGAKF^@@J@JiPW|$C};m$UFA$Iy5HNbsv6+fRDJSH1|Q7Te&IAJ{W~wKfg3r(WfsN zEf;T$PeC=T56>XV?nVdv42j(JgV|@H#_S~Q@QDn;|(*Aig+A=$B*B04ydjor9ZhA%uU&DC%!qQx24E<8`o%k38 zvqhYk^dcPGay`PdO#TTi`FkMl+jGm<>sI*HNoxMNZ`K62=`|4!<`!3HtYW z3m}C57%2LatMF5)IU=VZUD|whEcPbm49G*;=6vPmBY)@6eNH+pII*ir*sF1K^J7K} zt;^-nK2GVXeex$_xd+PNLwNn1_HLBEgqe<;DrNR(G zNu4C6!iI92U6JLF4D$WSJ|@)U)irbdO20!G$`l3ayQ%a=vP%D&Kji8lMP_I&ok=FN}XPure zm_MOqid(YZ4P^Q?xD&%{st5)MJA~&(Nw}-!t!z((s@mxD| zY*;_{X{I`QGJVeB{kbv7N)Kk_kM2cU=_qkNvkcl4CPMp9;4Fr2f#+3qDG^^2Om;-# zYqdZchi9GIRDU2awOpiQIA1HtPo>+CUoSjjR$W?z6KfjyuTl7QJs3^snjY7t)}^Lu zbt!FaSPwAaseO~1p=Bs*_n<8W3ob(V!7K`f|4l`q&!IDxDim#3OW9xVJai-WlC1+~=R4v?LF=JRyoyb;;C$*^_NeT7eM+gp1 z*Z6VZYL{WvQwvjywsJ{R{k;0QXql{{r4s)3;NK+-Ur5}JvtECsv^}H9s&AaHmQ6Po={+|GqJuz~D%ww0K&_S@{eN2kaf`h}MBt>cJGoQ6iZ1>*07zTN?@{gBU?U z4HeQ6j72}DMi9Nxfy44(K$8=R1mhZm939vWJ4y{P9Aj~g!4XCnA2E!}kUxxv*P2;4%QQS$7HA~IE4H7ljPziz5 zpbq|v3I1p7#&42LElRM#{g0{iV zR(RL>VfG-~rZpL6hC|hwmo}}?lJrB;jmP#zNp}_x=O9y zEO5pGr?vpz z+2uEPW=v}Q$Rxi9<#*7>H#=S95I>A#0sh*5-$tkF$a}-_1)s+EpTGkdd=HBFHehaY z_~MSwH)VZ(yUmC1?SpvZ$8ULp=SloTgrAr2qoZZu&-4Ps{5G2B?EJRdg@DiA;uXk; zZgJ{_bB6fAP3k*Lz`yI^H}htN#rHT}D-qfdk_ewhxF6wb2;W86jqn1(>j-Zll;K{$ z1cWIFvk?{}tVC!-NFsb1;eG^@|NF%=wmMxN1k#QBjEcK^oUZGU*J9*<%gEpGd8cbV z@-`tX&nepI{VM(z@^&D6!^k(~zJ|Phg#Gs^Ix~OTHpoRFzU50J@qNg9$jCo#@Tz^l z>3S1+#}Q)PrF>R@4c}xUI6tfM7d@!r*N|60Fy(#6$Y1?+rz?Q)tRd5kUqfC2VU5A( z{4c1wS2s1y$LnVser`x>4ekc_WiuPn63v;eun_Ll`l#-2LyRx1WgIe7@;xmf+}K42 z-HR4qGgJ3>8mKdtcDJR&xW^C<2scs4p9%?gV0{eyRIDde34UQp;q|lx_)wM%Mo6y` ziHI)T;TS#}ck97*_}>A5qIkfs`-M9g@^vKr(V%d*>+xg?0#x+Lb}#}He>B_<0dZ8s zKeyzjYPO|7-5!tfHz(7crxSk=M4T&}Yw|7%0OynWu#C@#5%3wdq?30>P@n;ukNnUD zpdP`b3vEQdgRa&jLTu74MVkJAa_J-P10Cl&eFGoTF*GCKhsikU=tCADQH!*l?gr%1 zkC2YO~TllDz0EZbG1cAsv0u06+n0^C2yt)d=(>q@xcx2xVp?ZOUan1AjE5 z-(i}*rvi=gAZ?WkDDFVOXX~;Keb)leQ6G~Z+scWMK``m)>z0Aev@FaYj zFH6)vQ|?y{I@)Ci=yrf^GL2$9Cf#Ge545SuD6W}lf);Bw3-80unVEJ0u!s0YWgm0!z8 zg!n28jmP9?Vrxu)M67Pxsk>?lE6MaP3M&cpBMK`4^cMbiFnFeg?=fI9`4)A`%9%Zn{b-?mA z1!4zo_}z?{cP`kI#396cFBx#(3{e?3>VUbg`l3;O88G)#Ndq?lb6-S1ME=Wx7k|#_x(+e%D#Y9~ z4jAP@VD1%7%ndX5iS(bO-vG=#-NlHBxju8>mN3d62IhV(XyC_yxgRs-e;4?5;5!hr z{(m9n9x`Ik^BV*1>o~Gm{tMujfHz`l6Tbp{^OsQ{Q=9lTVERjt3rE=nVhGqAZ=!61 z;LCy)e-PN*!#m2(6TG!zj&DuWh*`kq!`akKjPXEEF#+;gY~>xm=KN)O)KadY&RsU# z1I+o%@yk1gU$T@_-V?xFKaqsIO7ZWu^4&Ikz=q$n;WF6CdZ%%`#pzPsWE*Y-HtkUb zdo%%a{ZRT|C|YgwAsc4D1Pp&MzN|*v3(Ol-Y|r?zbH#(eyoSYjOnW_QtH0fbpS9sv zfT<7pRbf8xeEB@^!)&NJpdV zO*!5hnx&W}D;Hhw^_hrb%=Cy9`5Gdn#Mg!sJmZ4C>cmc-pWq~`Jse2-68>Z=*r3ul zcra2p>o!uxIkka`C(s5q4|PX~dHQT1$l+nEfr_W4Bc(CjOjC)*q7p_5N*F0a2?Loz z4OnDsV4UR{DcMjnO%Y0hdD<=8uS}BWnVv|dW4H$FyL#F3#fz5tmM>XyqqoJ^vS{%# zFFThne?EUQ>0j>)#sZ}o^1`w3HGkrUMb}@`B=}~h?)Bm*$hcm-aG`mV*Mqw9=5Ko{ z?US#O>JD)Ug~74(KC|!IHNKU>&TtCnlT8tSDiy?q<&K0ewAQ#{T*5-KHm)yQ3)IDB zYt9Kbk*$UDQnEF}c9)vBl&!_G#k?qO&Gh*!Hc^+Ot;Kw!$L(ob7H(NvbHF1N_wjRt zNDwBJlg%9XMSIFublLG8*1GB^H+l${IvGfsWv);2rXj z0*|_5Zq4uo + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +#include +#include +#include +#include + +#include +#include + +#include + + +struct cidr { + uint8_t family; + uint32_t prefix; + union { + struct in_addr v4; + struct in6_addr v6; + } addr; + union { + char v4[sizeof("255.255.255.255/255.255.255.255 ")]; + char v6[sizeof("FFFF:FFFF:FFFF:FFFF:FFFF:FFFF:FFFF:FFFF/128 ")]; + } buf; +}; + +struct op { + const char *name; + const char *desc; + struct { + bool (*a1)(struct cidr *a); + bool (*a2)(struct cidr *a, struct cidr *b); + } f4; + struct { + bool (*a1)(struct cidr *a); + bool (*a2)(struct cidr *a, struct cidr *b); + } f6; +}; + + +static bool quiet = false; +static bool printed = false; + + +static struct cidr * cidr_parse4(const char *s) +{ + char *p = NULL, *r; + struct in_addr mask; + struct cidr *addr = malloc(sizeof(struct cidr)); + + if (!addr || (strlen(s) >= sizeof(addr->buf.v4))) + goto err; + + snprintf(addr->buf.v4, sizeof(addr->buf.v4), "%s", s); + + addr->family = AF_INET; + + if ((p = strchr(addr->buf.v4, '/')) != NULL) + { + *p++ = 0; + + if (strchr(p, '.') != NULL) + { + if (inet_pton(AF_INET, p, &mask) != 1) + goto err; + + for (addr->prefix = 0; mask.s_addr; mask.s_addr >>= 1) + addr->prefix += (mask.s_addr & 1); + } + else + { + addr->prefix = strtoul(p, &r, 10); + + if ((p == r) || (*r != 0) || (addr->prefix > 32)) + goto err; + } + } + else + { + addr->prefix = 32; + } + + if (p == addr->buf.v4+1) + memset(&addr->addr.v4, 0, sizeof(addr->addr.v4)); + else if (inet_pton(AF_INET, addr->buf.v4, &addr->addr.v4) != 1) + goto err; + + return addr; + +err: + if (addr) + free(addr); + + return NULL; +} + +static bool cidr_add4(struct cidr *a, struct cidr *b) +{ + uint32_t x = ntohl(a->addr.v4.s_addr); + uint32_t y = ntohl(b->addr.v4.s_addr); + + if ((a->family != AF_INET) || (b->family != AF_INET)) + return false; + + if ((uint32_t)(x + y) < x) + { + fprintf(stderr, "overflow during 'add'\n"); + return false; + } + + a->addr.v4.s_addr = htonl(x + y); + return true; +} + +static bool cidr_sub4(struct cidr *a, struct cidr *b) +{ + uint32_t x = ntohl(a->addr.v4.s_addr); + uint32_t y = ntohl(b->addr.v4.s_addr); + + if ((a->family != AF_INET) || (b->family != AF_INET)) + return false; + + if ((uint32_t)(x - y) > x) + { + fprintf(stderr, "underflow during 'sub'\n"); + return false; + } + + a->addr.v4.s_addr = htonl(x - y); + return true; +} + +static bool cidr_network4(struct cidr *a) +{ + a->addr.v4.s_addr &= htonl(~((1 << (32 - a->prefix)) - 1)); + a->prefix = 32; + return true; +} + +static bool cidr_broadcast4(struct cidr *a) +{ + a->addr.v4.s_addr |= htonl(((1 << (32 - a->prefix)) - 1)); + a->prefix = 32; + return true; +} + +static bool cidr_contains4(struct cidr *a, struct cidr *b) +{ + uint32_t net1 = a->addr.v4.s_addr & htonl(~((1 << (32 - a->prefix)) - 1)); + uint32_t net2 = b->addr.v4.s_addr & htonl(~((1 << (32 - a->prefix)) - 1)); + + printed = true; + + if ((b->prefix >= a->prefix) && (net1 == net2)) + { + if (!quiet) printf("1\n"); + return true; + } + else + { + if (!quiet) printf("0\n"); + return false; + } +} + +static bool cidr_netmask4(struct cidr *a) +{ + struct in_addr mask; + char buf[sizeof("255.255.255.255 ")]; + + mask.s_addr = htonl(~((1 << (32 - a->prefix)) - 1)); + + if (!quiet) + printf("%s\n", inet_ntop(AF_INET, &mask, buf, sizeof(buf))); + + printed = true; + + return true; +} + +static bool cidr_private4(struct cidr *a) +{ + uint32_t x = ntohl(a->addr.v4.s_addr); + + printed = true; + + if (((x >= 0x0A000000) && (x <= 0x0AFFFFFF)) || + ((x >= 0xAC100000) && (x <= 0xAC1FFFFF)) || + ((x >= 0xC0A80000) && (x <= 0xC0A8FFFF))) + { + if (!quiet) printf("1\n"); + return true; + } + else + { + if (!quiet) printf("0\n"); + return false; + } +} + +static bool cidr_linklocal4(struct cidr *a) +{ + uint32_t x = ntohl(a->addr.v4.s_addr); + + printed = true; + + if ((x >= 0xA9FE0000) && (x <= 0xA9FEFFFF)) + { + if (!quiet) printf("1\n"); + return true; + } + else + { + if (!quiet) printf("0\n"); + return false; + } +} + +static bool cidr_print4(struct cidr *a) +{ + char *p; + + if (a->family != AF_INET) + return false; + + if (!(p = (char *)inet_ntop(AF_INET, &a->addr.v4, a->buf.v4, sizeof(a->buf.v4)))) + return false; + + if (!quiet) + printf("%s", p); + + if (!quiet && (a->prefix < 32)) + printf("/%u", a->prefix); + + if (!quiet) + printf("\n"); + + printed = true; + + return true; +} + + +static struct cidr * cidr_parse6(const char *s) +{ + char *p = NULL, *r; + struct cidr *addr = malloc(sizeof(struct cidr)); + + if (!addr || (strlen(s) >= sizeof(addr->buf.v6))) + goto err; + + snprintf(addr->buf.v6, sizeof(addr->buf.v6), "%s", s); + + addr->family = AF_INET6; + + if ((p = strchr(addr->buf.v6, '/')) != NULL) + { + *p++ = 0; + + addr->prefix = strtoul(p, &r, 10); + + if ((p == r) || (*r != 0) || (addr->prefix > 128)) + goto err; + } + else + { + addr->prefix = 128; + } + + if (p == addr->buf.v6+1) + memset(&addr->addr.v6, 0, sizeof(addr->addr.v6)); + else if (inet_pton(AF_INET6, addr->buf.v6, &addr->addr.v6) != 1) + goto err; + + return addr; + +err: + if (addr) + free(addr); + + return NULL; +} + +static bool cidr_add6(struct cidr *a, struct cidr *b) +{ + uint8_t idx = 15, carry = 0, overflow = 0; + + struct in6_addr *x = &a->addr.v6; + struct in6_addr *y = &b->addr.v6; + + if ((a->family != AF_INET6) || (b->family != AF_INET6)) + return false; + + do { + overflow = !!((x->s6_addr[idx] + y->s6_addr[idx] + carry) >= 256); + x->s6_addr[idx] += y->s6_addr[idx] + carry; + carry = overflow; + } + while (idx-- > 0); + + if (carry) + { + fprintf(stderr, "overflow during 'add'\n"); + return false; + } + + return true; +} + +static bool cidr_sub6(struct cidr *a, struct cidr *b) +{ + uint8_t idx = 15, carry = 0, underflow = 0; + + struct in6_addr *x = &a->addr.v6; + struct in6_addr *y = &b->addr.v6; + + if ((a->family != AF_INET6) || (b->family != AF_INET6)) + return false; + + do { + underflow = !!((x->s6_addr[idx] - y->s6_addr[idx] - carry) < 0); + x->s6_addr[idx] -= y->s6_addr[idx] + carry; + carry = underflow; + } + while (idx-- > 0); + + if (carry) + { + fprintf(stderr, "underflow during 'sub'\n"); + return false; + } + + return true; +} + +static bool cidr_network6(struct cidr *a) +{ + uint8_t i; + + for (i = 0; i < (128 - a->prefix) / 8; i++) + a->addr.v6.s6_addr[15-i] = 0; + + if ((128 - a->prefix) % 8) + a->addr.v6.s6_addr[15-i] &= ~((1 << ((128 - a->prefix) % 8)) - 1); + + return true; +} + +static bool cidr_contains6(struct cidr *a, struct cidr *b) +{ + struct in6_addr *x = &a->addr.v6; + struct in6_addr *y = &b->addr.v6; + + uint8_t i = (128 - a->prefix) / 8; + uint8_t m = ~((1 << ((128 - a->prefix) % 8)) - 1); + uint8_t net1 = x->s6_addr[15-i] & m; + uint8_t net2 = y->s6_addr[15-i] & m; + + printed = true; + + if ((b->prefix >= a->prefix) && (net1 == net2) && + ((i == 15) || !memcmp(&x->s6_addr, &y->s6_addr, 15-i))) + { + if (!quiet) printf("1\n"); + return true; + } + else + { + if (!quiet) printf("0\n"); + return false; + } +} + +static bool cidr_linklocal6(struct cidr *a) +{ + printed = true; + + if ((a->addr.v6.s6_addr[0] == 0xFE) && + (a->addr.v6.s6_addr[1] >= 0x80) && + (a->addr.v6.s6_addr[1] <= 0xBF)) + { + if (!quiet) printf("1\n"); + return true; + } + else + { + if (!quiet) printf("0\n"); + return false; + } +} + +static bool cidr_ula6(struct cidr *a) +{ + printed = true; + + if ((a->addr.v6.s6_addr[0] >= 0xFC) && + (a->addr.v6.s6_addr[0] <= 0xFD)) + { + if (!quiet) printf("1\n"); + return true; + } + else + { + if (!quiet) printf("0\n"); + return false; + } +} + +static bool cidr_print6(struct cidr *a) +{ + char *p; + + if (a->family != AF_INET6) + return NULL; + + if (!(p = (char *)inet_ntop(AF_INET6, &a->addr.v6, a->buf.v6, sizeof(a->buf.v6)))) + return false; + + if (!quiet) + printf("%s", p); + + if (!quiet && (a->prefix < 128)) + printf("/%u", a->prefix); + + if (!quiet) + printf("\n"); + + printed = true; + + return true; +} + + +static struct cidr * cidr_parse(const char *op, const char *s, int af_hint) +{ + char *r; + struct cidr *a; + + uint8_t i; + uint32_t sum = strtoul(s, &r, 0); + + if ((r > s) && (*r == 0)) + { + a = malloc(sizeof(struct cidr)); + + if (!a) + return NULL; + + if (af_hint == AF_INET) + { + a->family = AF_INET; + a->prefix = 32; + a->addr.v4.s_addr = htonl(sum); + } + else + { + a->family = AF_INET6; + a->prefix = 128; + + for (i = 0; i <= 15; i++) + { + a->addr.v6.s6_addr[15-i] = sum % 256; + sum >>= 8; + } + } + + return a; + } + + if (strchr(s, ':')) + a = cidr_parse6(s); + else + a = cidr_parse4(s); + + if (!a) + return NULL; + + if (a->family != af_hint) + { + fprintf(stderr, "attempt to '%s' %s with %s address\n", + op, + (af_hint == AF_INET) ? "ipv4" : "ipv6", + (af_hint != AF_INET) ? "ipv4" : "ipv6"); + exit(4); + } + + return a; +} + +static bool cidr_howmany(struct cidr *a, struct cidr *b) +{ + if (!quiet) + { + if (b->prefix < a->prefix) + printf("0\n"); + else + printf("%u\n", 1 << (b->prefix - a->prefix)); + } + + printed = true; + + return true; +} + +static bool cidr_quiet(struct cidr *a) +{ + quiet = true; + return true; +} + + +struct op ops[] = { + { .name = "add", + .desc = "Add argument to base address", + .f4.a2 = cidr_add4, + .f6.a2 = cidr_add6 }, + + { .name = "sub", + .desc = "Substract argument from base address", + .f4.a2 = cidr_sub4, + .f6.a2 = cidr_sub6 }, + + { .name = "network", + .desc = "Turn base address into network address", + .f4.a1 = cidr_network4, + .f6.a1 = cidr_network6 }, + + { .name = "broadcast", + .desc = "Turn base address into broadcast address", + .f4.a1 = cidr_broadcast4 }, + + { .name = "netmask", + .desc = "Print netmask of base address, does not change base address", + .f4.a1 = cidr_netmask4 }, + + { .name = "howmany", + .desc = "Print amount of righ-hand prefixes that fit into base address, " + "does not change base address", + .f4.a2 = cidr_howmany, + .f6.a2 = cidr_howmany }, + + { .name = "contains", + .desc = "Print '1' if argument fits into base address or '0' " + "if not, does not change base address", + .f4.a2 = cidr_contains4, + .f6.a2 = cidr_contains6 }, + + { .name = "private", + .desc = "Print '1' if base address is in RFC1918 private space or '0' " + "if not, does not change base address", + .f4.a1 = cidr_private4 }, + + { .name = "linklocal", + .desc = "Print '1' if base address is in 169.254.0.0/16 or FE80::/10 " + "link local space or '0' if not, does not change base address", + .f4.a1 = cidr_linklocal4, + .f6.a1 = cidr_linklocal6 }, + + { .name = "ula", + .desc = "Print '1' if base address is in FC00::/7 unique local address " + "(ULA) space or '0' if not, does not change base address", + .f6.a1 = cidr_ula6 }, + + { .name = "quiet", + .desc = "Suppress output, useful for test operation where the result can " + "be inferred from the exit code, does not change base address", + .f4.a1 = cidr_quiet, + .f6.a1 = cidr_quiet }, + + { .name = "print", + .desc = "Print intermediate result, invoked implicitely at the end of " + "calculation if no intermediate prints happened", + .f4.a1 = cidr_print4, + .f6.a1 = cidr_print6 }, +}; + +static void usage(const char *prog) +{ + int i; + + fprintf(stderr, + "\n" + "Usage:\n\n" + " %s {base address} operation [argument] " + "[operation [argument] ...]\n\n" + "Operations:\n\n", + prog); + + for (i = 0; i < sizeof(ops) / sizeof(ops[0]); i++) + { + if (ops[i].f4.a2 || ops[i].f6.a2) + { + fprintf(stderr, " %s %s\n", + ops[i].name, + (ops[i].f4.a2 && ops[i].f6.a2) ? "{ipv4/ipv6/amount}" : + (ops[i].f6.a2 ? "{ipv6/amount}" : "{ipv4/amount}")); + } + else + { + fprintf(stderr, " %s\n", ops[i].name); + } + + fprintf(stderr, " %s.\n", ops[i].desc); + + if ((ops[i].f4.a1 && ops[i].f6.a1) || (ops[i].f4.a2 && ops[i].f6.a2)) + fprintf(stderr, " Applicable to ipv4- and ipv6-addresses.\n\n"); + else if (ops[i].f6.a2 || ops[i].f6.a1) + fprintf(stderr, " Only applicable to ipv6-addresses.\n\n"); + else + fprintf(stderr, " Only applicable to ipv4-addresses.\n\n"); + } + + fprintf(stderr, + "Examples:\n\n" + " Calculate a DHCP range:\n\n" + " $ %s 192.168.1.1/255.255.255.0 network add 100 print add 150 print\n" + " 192.168.1.100\n" + " 192.168.1.250\n\n" + " Count number of prefixes:\n\n" + " $ %s 2001:0DB8:FDEF::/48 howmany ::/64\n" + " 65536\n\n", + prog, prog); + + exit(1); +} + +static bool runop(struct cidr *a, char ***arg, int *status) +{ + int i; + char *arg1 = **arg; + char *arg2 = *(*arg+1); + struct cidr *b = NULL; + + if (!arg1) + return false; + + for (i = 0; i < sizeof(ops) / sizeof(ops[0]); i++) + { + if (!strcmp(ops[i].name, arg1)) + { + if (ops[i].f4.a2 || ops[i].f6.a2) + { + if (!arg2) + { + fprintf(stderr, "'%s' requires an argument\n", + ops[i].name); + + *status = 2; + return false; + } + + b = cidr_parse(ops[i].name, arg2, a->family); + + if (!b) + { + fprintf(stderr, "invalid address argument for '%s'\n", + ops[i].name); + + *status = 3; + return false; + } + + *arg += 2; + + if (((a->family == AF_INET) && !ops[i].f4.a2) || + ((a->family == AF_INET6) && !ops[i].f6.a2)) + { + fprintf(stderr, "'%s' not supported for %s addresses\n", + ops[i].name, + (a->family == AF_INET) ? "ipv4" : "ipv6"); + + *status = 5; + return false; + } + + *status = !((a->family == AF_INET) ? ops[i].f4.a2(a, b) + : ops[i].f6.a2(a, b)); + + return true; + } + else + { + *arg += 1; + + if (((a->family == AF_INET) && !ops[i].f4.a1) || + ((a->family == AF_INET6) && !ops[i].f6.a1)) + { + fprintf(stderr, "'%s' not supported for %s addresses\n", + ops[i].name, + (a->family == AF_INET) ? "ipv4" : "ipv6"); + + *status = 5; + return false; + } + + *status = !((a->family == AF_INET) ? ops[i].f4.a1(a) + : ops[i].f6.a1(a)); + + return true; + } + } + } + + return false; +} + +int main(int argc, char **argv) +{ + int status = 0; + char **arg = argv+2; + struct cidr *a; + + if (argc < 3) + usage(argv[0]); + + a = strchr(argv[1], ':') ? cidr_parse6(argv[1]) : cidr_parse4(argv[1]); + + if (!a) + usage(argv[0]); + + while (runop(a, &arg, &status)); + + if (*arg) + { + fprintf(stderr, "unknown operation '%s'\n", *arg); + exit(6); + } + + if (!printed && (status < 2)) + { + if (a->family == AF_INET) + cidr_print4(a); + else + cidr_print6(a); + } + + exit(status); +}