1 /* $NetBSD: rtutil.c,v 1.8 2016/04/04 07:37:07 ozaki-r Exp $ */ 2 /* $OpenBSD: show.c,v 1.1 2006/05/27 19:16:37 claudio Exp $ */ 3 4 /* 5 * Copyright (c) 1983, 1988, 1993 6 * The Regents of the University of California. All rights reserved. 7 * 8 * Redistribution and use in source and binary forms, with or without 9 * modification, are permitted provided that the following conditions 10 * are met: 11 * 1. Redistributions of source code must retain the above copyright 12 * notice, this list of conditions and the following disclaimer. 13 * 2. Redistributions in binary form must reproduce the above copyright 14 * notice, this list of conditions and the following disclaimer in the 15 * documentation and/or other materials provided with the distribution. 16 * 3. Neither the name of the University nor the names of its contributors 17 * may be used to endorse or promote products derived from this software 18 * without specific prior written permission. 19 * 20 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 21 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 22 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 23 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 24 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 25 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 26 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 27 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 28 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 29 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 30 * SUCH DAMAGE. 31 */ 32 33 #include <sys/param.h> 34 #include <sys/protosw.h> 35 #include <sys/socket.h> 36 #include <sys/sysctl.h> 37 38 #include <net/if.h> 39 #include <net/if_dl.h> 40 #include <net/if_types.h> 41 #include <net/pfvar.h> 42 #include <net/pfkeyv2.h> 43 #include <net/route.h> 44 #include <netinet/in.h> 45 #include <netinet/if_ether.h> 46 #include <netatalk/at.h> 47 #include <netmpls/mpls.h> 48 #include <arpa/inet.h> 49 50 #include <err.h> 51 #include <errno.h> 52 #include <netdb.h> 53 #include <stdio.h> 54 #include <stddef.h> 55 #include <stdlib.h> 56 #include <string.h> 57 #include <unistd.h> 58 59 #include "prog_ops.h" 60 #include "rtutil.h" 61 62 63 #define PLEN (LONG_BIT / 4 + 2) 64 #define PFKEYV2_CHUNK sizeof(u_int64_t) 65 static char *link_print(const struct sockaddr *); 66 67 /* 68 * Definitions for showing gateway flags. 69 */ 70 struct bits { 71 int b_mask; 72 char b_val; 73 }; 74 static const struct bits bits[] = { 75 { RTF_UP, 'U' }, 76 { RTF_GATEWAY, 'G' }, 77 { RTF_HOST, 'H' }, 78 { RTF_REJECT, 'R' }, 79 { RTF_BLACKHOLE, 'B' }, 80 { RTF_DYNAMIC, 'D' }, 81 { RTF_MODIFIED, 'M' }, 82 { RTF_DONE, 'd' }, /* Completed -- for routing messages only */ 83 { RTF_MASK, 'm' }, /* Mask Present -- for routing messages only */ 84 /* { RTF_CLONING, 'C' }, */ 85 { RTF_CONNECTED, 'C' }, 86 /* { RTF_XRESOLVE, 'X' }, */ 87 /* { RTF_LLINFO, 'L' }, */ 88 { RTF_STATIC, 'S' }, 89 { RTF_PROTO1, '1' }, 90 { RTF_PROTO2, '2' }, 91 /* { RTF_PROTO3, '3' }, */ 92 /* { RTF_CLONED, 'c' }, */ 93 /* { RTF_JUMBO, 'J' }, */ 94 { RTF_ANNOUNCE, 'p' }, 95 { RTF_LOCAL, 'l'}, 96 { RTF_BROADCAST, 'b'}, 97 { 0, 0 } 98 }; 99 100 #ifndef SMALL 101 static void p_tag(const struct sockaddr *sa); 102 #endif 103 static void p_rtentry(struct rt_msghdr *, int, int); 104 105 /* 106 * Print routing tables. 107 */ 108 void 109 p_rttables(int paf, int flags, int pflags, int interesting) 110 { 111 struct rt_msghdr *rtm; 112 char *buf = NULL, *next, *lim = NULL; 113 size_t needed; 114 int mib[6]; 115 struct sockaddr *sa; 116 117 mib[0] = CTL_NET; 118 mib[1] = PF_ROUTE; 119 mib[2] = 0; 120 mib[3] = paf; 121 mib[4] = NET_RT_DUMP; 122 mib[5] = 0; 123 if (prog_sysctl(mib, 6, NULL, &needed, NULL, 0) < 0) 124 err(1, "route-sysctl-estimate"); 125 if (needed > 0) { 126 if ((buf = malloc(needed)) == 0) 127 err(1, NULL); 128 if (prog_sysctl(mib, 6, buf, &needed, NULL, 0) < 0) 129 err(1, "sysctl of routing table"); 130 lim = buf + needed; 131 } 132 133 printf("Routing tables\n"); 134 135 if (buf) { 136 for (next = buf; next < lim; next += rtm->rtm_msglen) { 137 rtm = (struct rt_msghdr *)next; 138 sa = (struct sockaddr *)(rtm + 1); 139 if ((rtm->rtm_flags & pflags) != pflags) 140 continue; 141 if (paf != AF_UNSPEC && sa->sa_family != paf) 142 continue; 143 p_rtentry(rtm, flags, interesting); 144 } 145 free(buf); 146 buf = NULL; 147 } 148 149 if (paf != 0 && paf != PF_KEY) 150 return; 151 152 #if 0 /* XXX-elad */ 153 mib[0] = CTL_NET; 154 mib[1] = PF_KEY; 155 mib[2] = PF_KEY_V2; 156 mib[3] = NET_KEY_SPD_DUMP; 157 mib[4] = mib[5] = 0; 158 159 if (prog_sysctl(mib, 4, NULL, &needed, NULL, 0) == -1) { 160 if (errno == ENOPROTOOPT) 161 return; 162 err(1, "spd-sysctl-estimate"); 163 } 164 if (needed > 0) { 165 if ((buf = malloc(needed)) == 0) 166 err(1, NULL); 167 if (prog_sysctl(mib, 4, buf, &needed, NULL, 0) == -1) 168 err(1,"sysctl of spd"); 169 lim = buf + needed; 170 } 171 172 if (buf) { 173 printf("\nEncap:\n"); 174 175 for (next = buf; next < lim; next += msg->sadb_msg_len * 176 PFKEYV2_CHUNK) { 177 msg = (struct sadb_msg *)next; 178 if (msg->sadb_msg_len == 0) 179 break; 180 p_pfkentry(msg); 181 } 182 free(buf); 183 buf = NULL; 184 } 185 #endif /* 0 */ 186 } 187 188 /* 189 * column widths; each followed by one space 190 * width of destination/gateway column 191 * strlen("fe80::aaaa:bbbb:cccc:dddd@gif0") == 30, strlen("/128") == 4 = 34 192 * strlen("aaaa:bbbb:cccc:dddd:eeee:ffff:gggg:hhhh") == 39 193 */ 194 #ifndef INET6 195 #define WID_DST(af) 18 /* width of destination column */ 196 #define WID_GW(af) 18 /* width of gateway column */ 197 #else 198 #define WID_DST(af) ((af) == AF_INET6 ? ((flags & RT_NFLAG) ? 39 : 18) : 18) 199 #define WID_GW(af) ((af) == AF_INET6 ? ((flags & RT_NFLAG) ? 30 : 18) : 18) 200 #endif 201 202 /* 203 * Print header for routing table columns. 204 */ 205 void 206 p_rthdr(int paf, int flags) 207 { 208 #ifndef SMALL 209 if (flags & RT_AFLAG) 210 printf("%-*.*s ", PLEN, PLEN, "Address"); 211 if (paf == PF_KEY) { 212 printf("%-18s %-5s %-18s %-5s %-5s %-22s\n", 213 "Source", "Port", "Destination", 214 "Port", "Proto", "SA(Address/Proto/Type/Direction)"); 215 return; 216 } 217 if (flags & RT_TFLAG) { 218 printf("%-*.*s %-*.*s %-6.6s %6.6s %8.8s %6.6s %7.7s" 219 " %s\n", WID_DST(paf), WID_DST(paf), "Destination", 220 WID_GW(paf), WID_GW(paf), "Gateway", 221 "Flags", "Refs", "Use", "Mtu", "Tag", "Interface"); 222 return; 223 } 224 #endif 225 #ifndef SMALL 226 printf("%-*.*s %-*.*s %-6.6s %6.6s %8.8s %6.6s %s\n", 227 WID_DST(paf), WID_DST(paf), "Destination", 228 WID_GW(paf), WID_GW(paf), "Gateway", 229 "Flags", "Refs", "Use", "Mtu", "Interface"); 230 #else 231 printf("%-*.*s %-*.*s %-6.6s\n", 232 WID_DST(paf), WID_DST(paf), "Destination", 233 WID_GW(paf), WID_GW(paf), "Gateway", 234 "Flags"); 235 #endif 236 } 237 238 static void 239 get_rtaddrs(int addrs, struct sockaddr *sa, struct sockaddr **rti_info) 240 { 241 int i; 242 243 for (i = 0; i < RTAX_MAX; i++) { 244 if (addrs & (1 << i)) { 245 rti_info[i] = sa; 246 sa = (struct sockaddr *)((char *)(sa) + 247 RT_ROUNDUP(sa->sa_len)); 248 } else 249 rti_info[i] = NULL; 250 } 251 } 252 253 /* 254 * Print a routing table entry. 255 */ 256 static void 257 p_rtentry(struct rt_msghdr *rtm, int flags, int interesting) 258 { 259 static int old_af = -1; 260 struct sockaddr *sa = (struct sockaddr *)(rtm + 1); 261 struct sockaddr *mask, *rti_info[RTAX_MAX]; 262 #ifndef SMALL 263 char ifbuf[IF_NAMESIZE]; 264 #endif 265 266 if (old_af != sa->sa_family) { 267 old_af = sa->sa_family; 268 p_family(sa->sa_family); 269 p_rthdr(sa->sa_family, flags); 270 } 271 get_rtaddrs(rtm->rtm_addrs, sa, rti_info); 272 273 mask = rti_info[RTAX_NETMASK]; 274 if ((sa = rti_info[RTAX_DST]) == NULL) 275 return; 276 277 p_sockaddr(sa, mask, rtm->rtm_flags, WID_DST(sa->sa_family), flags); 278 p_sockaddr(rti_info[RTAX_GATEWAY], NULL, RTF_HOST, 279 WID_GW(sa->sa_family), flags); 280 p_flags(rtm->rtm_flags & interesting); 281 #if 0 /* XXX-elad */ 282 printf("%6d %8"PRId64" ", (int)rtm->rtm_rmx.rmx_refcnt, 283 rtm->rtm_rmx.rmx_pksent); 284 #else 285 printf("%6s %8s ", "-", "-"); 286 #endif 287 #ifndef SMALL 288 if (rtm->rtm_rmx.rmx_mtu) 289 printf("%6"PRId64, rtm->rtm_rmx.rmx_mtu); 290 else 291 printf("%6s", "-"); 292 putchar((rtm->rtm_rmx.rmx_locks & RTV_MTU) ? 'L' : ' '); 293 if (flags & RT_TFLAG) 294 p_tag(rti_info[RTAX_TAG]); 295 printf(" %.16s", if_indextoname(rtm->rtm_index, ifbuf)); 296 putchar('\n'); 297 if (flags & RT_VFLAG) 298 p_rtrmx(&rtm->rtm_rmx); 299 #endif 300 } 301 302 /* 303 * Print address family header before a section of the routing table. 304 */ 305 void 306 p_family(int paf) 307 { 308 const char *afname; 309 310 switch (paf) { 311 case AF_INET: 312 afname = "Internet"; 313 break; 314 #ifdef INET6 315 case AF_INET6: 316 afname = "Internet6"; 317 break; 318 #endif 319 case PF_KEY: 320 afname = "Encap"; 321 break; 322 case AF_APPLETALK: 323 afname = "AppleTalk"; 324 break; 325 #ifndef SMALL 326 case AF_MPLS: 327 afname = "MPLS"; 328 break; 329 #endif 330 default: 331 afname = NULL; 332 break; 333 } 334 if (afname) 335 printf("\n%s:\n", afname); 336 else 337 printf("\nProtocol Family %d:\n", paf); 338 } 339 340 void 341 p_sockaddr(const struct sockaddr *sa, const struct sockaddr *mask, int rflags, 342 int width, int flags) 343 { 344 char *cp; 345 346 switch (sa->sa_family) { 347 #ifdef INET6 348 case AF_INET6: 349 { 350 struct sockaddr_in6 sa6 = *(const struct sockaddr_in6 *)sa; 351 352 inet6_getscopeid(&sa6, INET6_IS_ADDR_LINKLOCAL| 353 INET6_IS_ADDR_MC_LINKLOCAL); 354 if (rflags & RTF_HOST) 355 cp = routename((const struct sockaddr *)&sa6, flags); 356 else 357 cp = netname((const struct sockaddr *)&sa6, mask, flags); 358 break; 359 } 360 #endif 361 default: 362 if ((rflags & RTF_HOST) || mask == NULL) 363 cp = routename(sa, flags); 364 else 365 cp = netname(sa, mask, flags); 366 break; 367 } 368 if (width < 0) 369 printf("%s", cp); 370 else { 371 if (flags & RT_NFLAG) 372 printf("%-*s ", width, cp); 373 else 374 printf("%-*.*s ", width, width, cp); 375 } 376 } 377 378 void 379 p_flags(int f) 380 { 381 char name[33], *flags; 382 const struct bits *p = bits; 383 384 for (flags = name; p->b_mask && flags < &name[sizeof(name) - 2]; p++) 385 if (p->b_mask & f) 386 *flags++ = p->b_val; 387 *flags = '\0'; 388 printf("%-6.6s ", name); 389 } 390 391 #ifndef SMALL 392 void 393 p_rtrmx(const struct rt_metrics *rmx) 394 { 395 printf("\texpire %10"PRId64"%c recvpipe %10"PRIu64"%c " 396 "sendpipe %10"PRIu64"%c\n", 397 (int64_t)rmx->rmx_expire, 398 (rmx->rmx_locks & RTV_EXPIRE) ? 'L' : ' ', rmx->rmx_recvpipe, 399 (rmx->rmx_locks & RTV_RPIPE) ? 'L' : ' ', rmx->rmx_sendpipe, 400 (rmx->rmx_locks & RTV_SPIPE) ? 'L' : ' '); 401 printf("\tssthresh %10"PRIu64"%c rtt %10"PRIu64"%c " 402 "rttvar %10"PRIu64"%c\n", rmx->rmx_ssthresh, 403 (rmx->rmx_locks & RTV_SSTHRESH) ? 'L' : ' ', 404 rmx->rmx_rtt, (rmx->rmx_locks & RTV_RTT) ? 'L' : ' ', 405 rmx->rmx_rttvar, (rmx->rmx_locks & RTV_RTTVAR) ? 'L' : ' '); 406 printf("\thopcount %10"PRIu64"%c\n", 407 rmx->rmx_hopcount, (rmx->rmx_locks & RTV_HOPCOUNT) ? 'L' : ' '); 408 } 409 410 static void 411 p_tag(const struct sockaddr *sa) 412 { 413 char *line; 414 415 if (sa == NULL || sa->sa_family != AF_MPLS) { 416 printf("%7s", "-"); 417 return; 418 } 419 line = mpls_ntoa(sa); 420 if (strlen(line) < 7) 421 printf("%7s", line); 422 else 423 printf("%s", line); 424 } 425 #endif 426 427 static char line[MAXHOSTNAMELEN]; 428 static char domain[MAXHOSTNAMELEN]; 429 430 char * 431 routename(const struct sockaddr *sa, int flags) 432 { 433 char *cp = NULL; 434 static int first = 1; 435 436 if (first) { 437 first = 0; 438 if (gethostname(domain, sizeof(domain)) == 0 && 439 (cp = strchr(domain, '.'))) 440 (void)strlcpy(domain, cp + 1, sizeof(domain)); 441 else 442 domain[0] = '\0'; 443 cp = NULL; 444 } 445 446 if (sa->sa_len == 0) { 447 (void)strlcpy(line, "default", sizeof(line)); 448 return (line); 449 } 450 451 switch (sa->sa_family) { 452 case AF_INET: 453 return routename4( 454 ((const struct sockaddr_in *)sa)->sin_addr.s_addr, 455 flags); 456 #ifdef INET6 457 case AF_INET6: 458 { 459 struct sockaddr_in6 sin6; 460 461 memset(&sin6, 0, sizeof(sin6)); 462 memcpy(&sin6, sa, sa->sa_len); 463 sin6.sin6_len = sizeof(struct sockaddr_in6); 464 sin6.sin6_family = AF_INET6; 465 if (sa->sa_len == sizeof(struct sockaddr_in6)) 466 inet6_getscopeid(&sin6, INET6_IS_ADDR_LINKLOCAL| 467 INET6_IS_ADDR_MC_LINKLOCAL); 468 return routename6(&sin6, flags); 469 } 470 #endif 471 case AF_LINK: 472 return link_print(sa); 473 474 #ifndef SMALL 475 case AF_MPLS: 476 return mpls_ntoa(sa); 477 478 case AF_APPLETALK: 479 (void)snprintf(line, sizeof(line), "atalk %d.%d", 480 ((const struct sockaddr_at *)sa)->sat_addr.s_net, 481 ((const struct sockaddr_at *)sa)->sat_addr.s_node); 482 break; 483 #endif 484 485 #if 0 /* XXX-elad */ 486 case AF_UNSPEC: 487 if (sa->sa_len == sizeof(struct sockaddr_rtlabel)) { 488 static char name[RTLABEL_LEN]; 489 struct sockaddr_rtlabel *sr; 490 491 sr = (struct sockaddr_rtlabel *)sa; 492 strlcpy(name, sr->sr_label, sizeof(name)); 493 return (name); 494 } 495 /* FALLTHROUGH */ 496 #endif 497 default: 498 (void)snprintf(line, sizeof(line), "(%d) %s", 499 sa->sa_family, any_ntoa(sa)); 500 break; 501 } 502 return (line); 503 } 504 505 char * 506 routename4(in_addr_t in, int flags) 507 { 508 const char *cp = NULL; 509 struct in_addr ina; 510 struct hostent *hp; 511 512 if (in == INADDR_ANY) 513 cp = "default"; 514 if (!cp && (flags & RT_NFLAG) == 0) { 515 if ((hp = gethostbyaddr((char *)&in, 516 sizeof(in), AF_INET)) != NULL) { 517 char *p; 518 if ((p = strchr(hp->h_name, '.')) && 519 !strcmp(p + 1, domain)) 520 *p = '\0'; 521 cp = hp->h_name; 522 } 523 } 524 ina.s_addr = in; 525 strlcpy(line, cp ? cp : inet_ntoa(ina), sizeof(line)); 526 527 return (line); 528 } 529 530 #ifdef INET6 531 char * 532 routename6(const struct sockaddr_in6 *sin6, int flags) 533 { 534 int niflags = 0; 535 536 if ((flags & RT_NFLAG)) 537 niflags |= NI_NUMERICHOST; 538 else 539 niflags |= NI_NOFQDN; 540 541 if (getnameinfo((const struct sockaddr *)sin6, sin6->sin6_len, 542 line, sizeof(line), NULL, 0, niflags) != 0) 543 strncpy(line, "invalid", sizeof(line)); 544 545 return (line); 546 } 547 #endif 548 549 /* 550 * Return the name of the network whose address is given. 551 * The address is assumed to be that of a net or subnet, not a host. 552 */ 553 char * 554 netname4(const struct sockaddr_in* sa4, const struct sockaddr_in *mask, int flags) 555 { 556 const char *cp = NULL; 557 struct netent *np = NULL; 558 int mbits; 559 in_addr_t in = sa4->sin_addr.s_addr; 560 561 if (mask) { 562 in_addr_t m = mask->sin_addr.s_addr ; 563 m = ntohl(m); 564 mbits = m ? 33 - ffs(m) : 0; 565 } else 566 mbits = 0; 567 568 in = ntohl(in); 569 if (in == INADDR_ANY && !mbits) 570 cp = "default"; 571 else if (!(flags & RT_NFLAG) && in != INADDR_ANY) { 572 if ((np = getnetbyaddr(in, AF_INET)) != NULL) 573 cp = np->n_name; 574 } 575 if (cp) 576 strlcpy(line, cp, sizeof(line)); 577 #define C(x) ((x) & 0xff) 578 else if (mbits < 9) 579 snprintf(line, sizeof(line), "%u/%d", C(in >> 24), mbits); 580 else if (mbits < 17) 581 snprintf(line, sizeof(line), "%u.%u/%d", 582 C(in >> 24) , C(in >> 16), mbits); 583 else if (mbits < 25) 584 snprintf(line, sizeof(line), "%u.%u.%u/%d", 585 C(in >> 24), C(in >> 16), C(in >> 8), mbits); 586 else 587 snprintf(line, sizeof(line), "%u.%u.%u.%u/%d", C(in >> 24), 588 C(in >> 16), C(in >> 8), C(in), mbits); 589 #undef C 590 return line; 591 } 592 593 #ifdef INET6 594 char * 595 netname6(const struct sockaddr_in6 *sa6, const struct sockaddr_in6 *mask, int flags) 596 { 597 struct sockaddr_in6 sin6; 598 const u_char *p; 599 int masklen, final = 0, illegal = 0; 600 int i, lim, flag, error; 601 char hbuf[NI_MAXHOST]; 602 603 sin6 = *sa6; 604 605 flag = 0; 606 masklen = 0; 607 if (mask) { 608 lim = mask->sin6_len - offsetof(struct sockaddr_in6, sin6_addr); 609 if (lim < 0) 610 lim = 0; 611 else if (lim > (int)sizeof(struct in6_addr)) 612 lim = sizeof(struct in6_addr); 613 for (p = (const u_char *)&mask->sin6_addr, i = 0; i < lim; p++) { 614 if (final && *p) { 615 illegal++; 616 sin6.sin6_addr.s6_addr[i++] = 0x00; 617 continue; 618 } 619 620 switch (*p & 0xff) { 621 case 0xff: 622 masklen += 8; 623 break; 624 case 0xfe: 625 masklen += 7; 626 final++; 627 break; 628 case 0xfc: 629 masklen += 6; 630 final++; 631 break; 632 case 0xf8: 633 masklen += 5; 634 final++; 635 break; 636 case 0xf0: 637 masklen += 4; 638 final++; 639 break; 640 case 0xe0: 641 masklen += 3; 642 final++; 643 break; 644 case 0xc0: 645 masklen += 2; 646 final++; 647 break; 648 case 0x80: 649 masklen += 1; 650 final++; 651 break; 652 case 0x00: 653 final++; 654 break; 655 default: 656 final++; 657 illegal++; 658 break; 659 } 660 661 if (!illegal) 662 sin6.sin6_addr.s6_addr[i++] &= *p; 663 else 664 sin6.sin6_addr.s6_addr[i++] = 0x00; 665 } 666 while (i < (int)sizeof(struct in6_addr)) 667 sin6.sin6_addr.s6_addr[i++] = 0x00; 668 } else 669 masklen = 128; 670 671 if (masklen == 0 && IN6_IS_ADDR_UNSPECIFIED(&sin6.sin6_addr)) { 672 snprintf(line, sizeof(line), "default"); 673 return (line); 674 } 675 676 if (illegal) 677 warnx("illegal prefixlen"); 678 679 if (flags & RT_NFLAG) 680 flag |= NI_NUMERICHOST; 681 error = getnameinfo((struct sockaddr *)&sin6, sin6.sin6_len, 682 hbuf, sizeof(hbuf), NULL, 0, flag); 683 if (error) 684 snprintf(hbuf, sizeof(hbuf), "invalid"); 685 686 snprintf(line, sizeof(line), "%s/%d", hbuf, masklen); 687 return (line); 688 } 689 #endif 690 691 /* 692 * Return the name of the network whose address is given. 693 * The address is assumed to be that of a net or subnet, not a host. 694 */ 695 char * 696 netname(const struct sockaddr *sa, const struct sockaddr *mask, int flags) 697 { 698 switch (sa->sa_family) { 699 700 case AF_INET: 701 return netname4((const struct sockaddr_in *)sa, 702 (const struct sockaddr_in *)mask, flags); 703 #ifdef INET6 704 case AF_INET6: 705 return netname6((const struct sockaddr_in6 *)sa, 706 (const struct sockaddr_in6 *)mask, flags); 707 #endif 708 case AF_LINK: 709 return link_print(sa); 710 default: 711 snprintf(line, sizeof(line), "af %d: %s", 712 sa->sa_family, any_ntoa(sa)); 713 break; 714 } 715 return (line); 716 } 717 718 static const char hexlist[] = "0123456789abcdef"; 719 720 char * 721 any_ntoa(const struct sockaddr *sa) 722 { 723 static char obuf[240]; 724 const char *in = sa->sa_data; 725 char *out = obuf; 726 int len = sa->sa_len - offsetof(struct sockaddr, sa_data); 727 728 *out++ = 'Q'; 729 do { 730 *out++ = hexlist[(*in >> 4) & 15]; 731 *out++ = hexlist[(*in++) & 15]; 732 *out++ = '.'; 733 } while (--len > 0 && (out + 3) < &obuf[sizeof(obuf) - 1]); 734 out[-1] = '\0'; 735 return (obuf); 736 } 737 738 static char * 739 link_print(const struct sockaddr *sa) 740 { 741 const struct sockaddr_dl *sdl = (const struct sockaddr_dl *)sa; 742 const u_char *lla = (const u_char *)sdl->sdl_data + sdl->sdl_nlen; 743 744 if (sdl->sdl_nlen == 0 && sdl->sdl_alen == 0 && 745 sdl->sdl_slen == 0) { 746 (void)snprintf(line, sizeof(line), "link#%d", sdl->sdl_index); 747 return (line); 748 } 749 switch (sdl->sdl_type) { 750 case IFT_ETHER: 751 case IFT_CARP: 752 return ether_ntoa((const struct ether_addr *)lla); 753 default: 754 return link_ntoa(sdl); 755 } 756 } 757 758 #ifndef SMALL 759 char * 760 mpls_ntoa(const struct sockaddr *sa) 761 { 762 static char obuf[16]; 763 size_t olen; 764 const union mpls_shim *pms; 765 union mpls_shim ms; 766 int psize = sizeof(struct sockaddr_mpls); 767 768 pms = &((const struct sockaddr_mpls*)sa)->smpls_addr; 769 ms.s_addr = ntohl(pms->s_addr); 770 771 snprintf(obuf, sizeof(obuf), "%u", ms.shim.label); 772 773 while(psize < sa->sa_len) { 774 pms++; 775 ms.s_addr = ntohl(pms->s_addr); 776 olen = strlen(obuf); 777 snprintf(obuf + olen, sizeof(obuf) - olen, ",%u", 778 ms.shim.label); 779 psize+=sizeof(ms); 780 } 781 return obuf; 782 } 783 #endif 784 785 void 786 p_addr(const struct sockaddr *sa, const struct sockaddr *mask, int rflags, int flags) 787 { 788 p_sockaddr(sa, mask, rflags, WID_DST(sa->sa_family), flags); 789 } 790 791 void 792 p_gwaddr(const struct sockaddr *sa, int gwaf, int flags) 793 { 794 p_sockaddr(sa, 0, RTF_HOST, WID_GW(gwaf), flags); 795 } 796