xref: /netbsd-src/usr.bin/netstat/route.c (revision 17dd36da8292193180754d5047c0926dbb56818c)
1 /*	$NetBSD: route.c,v 1.54 2001/03/08 03:47:04 enami Exp $	*/
2 
3 /*
4  * Copyright (c) 1983, 1988, 1993
5  *	The Regents of the University of California.  All rights reserved.
6  *
7  * Redistribution and use in source and binary forms, with or without
8  * modification, are permitted provided that the following conditions
9  * are met:
10  * 1. Redistributions of source code must retain the above copyright
11  *    notice, this list of conditions and the following disclaimer.
12  * 2. Redistributions in binary form must reproduce the above copyright
13  *    notice, this list of conditions and the following disclaimer in the
14  *    documentation and/or other materials provided with the distribution.
15  * 3. All advertising materials mentioning features or use of this software
16  *    must display the following acknowledgement:
17  *	This product includes software developed by the University of
18  *	California, Berkeley and its contributors.
19  * 4. Neither the name of the University nor the names of its contributors
20  *    may be used to endorse or promote products derived from this software
21  *    without specific prior written permission.
22  *
23  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
24  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
25  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
26  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
27  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
28  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
29  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
30  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
31  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
32  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
33  * SUCH DAMAGE.
34  */
35 
36 #include <sys/cdefs.h>
37 #ifndef lint
38 #if 0
39 static char sccsid[] = "from: @(#)route.c	8.3 (Berkeley) 3/9/94";
40 #else
41 __RCSID("$NetBSD: route.c,v 1.54 2001/03/08 03:47:04 enami Exp $");
42 #endif
43 #endif /* not lint */
44 
45 #include <sys/param.h>
46 #include <sys/protosw.h>
47 #include <sys/socket.h>
48 #include <sys/mbuf.h>
49 #include <sys/un.h>
50 
51 #include <net/if.h>
52 #include <net/if_dl.h>
53 #include <net/if_types.h>
54 #define _KERNEL
55 #include <net/route.h>
56 #undef _KERNEL
57 #include <netinet/in.h>
58 #include <netatalk/at.h>
59 #include <netiso/iso.h>
60 
61 #include <netns/ns.h>
62 
63 #include <sys/sysctl.h>
64 
65 #include <arpa/inet.h>
66 
67 #include <err.h>
68 #include <netdb.h>
69 #include <stdio.h>
70 #include <stdlib.h>
71 #include <string.h>
72 #include <unistd.h>
73 
74 #include "netstat.h"
75 
76 #define kget(p, d) (kread((u_long)(p), (char *)&(d), sizeof (d)))
77 
78 /* alignment constraint for routing socket */
79 #define ROUNDUP(a) \
80 	((a) > 0 ? (1 + (((a) - 1) | (sizeof(long) - 1))) : sizeof(long))
81 #define ADVANCE(x, n) (x += ROUNDUP((n)->sa_len))
82 
83 /*
84  * Definitions for showing gateway flags.
85  */
86 struct bits {
87 	short	b_mask;
88 	char	b_val;
89 } bits[] = {
90 	{ RTF_UP,	'U' },
91 	{ RTF_GATEWAY,	'G' },
92 	{ RTF_HOST,	'H' },
93 	{ RTF_REJECT,	'R' },
94 	{ RTF_DYNAMIC,	'D' },
95 	{ RTF_MODIFIED,	'M' },
96 	{ RTF_DONE,	'd' }, /* Completed -- for routing messages only */
97 	{ RTF_MASK,	'm' }, /* Mask Present -- for routing messages only */
98 	{ RTF_CLONING,	'C' },
99 	{ RTF_XRESOLVE,	'X' },
100 	{ RTF_LLINFO,	'L' },
101 	{ RTF_STATIC,	'S' },
102 	{ RTF_BLACKHOLE,'B' },
103 	{ RTF_CLONED,	'c' },
104 	{ RTF_PROTO1,	'1' },
105 	{ RTF_PROTO2,	'2' },
106 	{ 0 }
107 };
108 
109 /*
110  * XXX we put all of the sockaddr types in here to force the alignment
111  * to be correct.
112  */
113 static union sockaddr_union {
114 	struct	sockaddr u_sa;
115 	struct	sockaddr_in u_in;
116 	struct	sockaddr_un u_un;
117 	struct	sockaddr_iso u_iso;
118 	struct	sockaddr_at u_at;
119 	struct	sockaddr_dl u_dl;
120 	struct	sockaddr_ns u_ns;
121 	u_short	u_data[128];
122 	int u_dummy;		/* force word-alignment */
123 } pt_u;
124 
125 int	do_rtent = 0;
126 struct	rtentry rtentry;
127 struct	radix_node rnode;
128 struct	radix_mask rmask;
129 
130 int	NewTree = 0;
131 
132 static struct sockaddr *kgetsa __P((struct sockaddr *));
133 static void p_tree __P((struct radix_node *));
134 static void p_rtnode __P((void));
135 static void ntreestuff __P((void));
136 static void np_rtentry __P((struct rt_msghdr *));
137 static void p_sockaddr __P((const struct sockaddr *,
138 			    const struct sockaddr *, int, int));
139 static void p_flags __P((int));
140 static void p_rtentry __P((struct rtentry *));
141 static void ntreestuff __P((void));
142 static u_long forgemask __P((u_long));
143 static void domask __P((char *, size_t, u_long, u_long));
144 
145 /*
146  * Print routing tables.
147  */
148 void
149 routepr(rtree)
150 	u_long rtree;
151 {
152 	struct radix_node_head *rnh, head;
153 	int i;
154 
155 	printf("Routing tables\n");
156 
157 	if (Aflag == 0 && NewTree)
158 		ntreestuff();
159 	else {
160 		if (rtree == 0) {
161 			printf("rt_tables: symbol not in namelist\n");
162 			return;
163 		}
164 
165 		kget(rtree, rt_tables);
166 		for (i = 0; i <= AF_MAX; i++) {
167 			if ((rnh = rt_tables[i]) == 0)
168 				continue;
169 			kget(rnh, head);
170 			if (i == AF_UNSPEC) {
171 				if (Aflag && af == 0) {
172 					printf("Netmasks:\n");
173 					p_tree(head.rnh_treetop);
174 				}
175 			} else if (af == AF_UNSPEC || af == i) {
176 				pr_family(i);
177 				do_rtent = 1;
178 				pr_rthdr(i);
179 				p_tree(head.rnh_treetop);
180 			}
181 		}
182 	}
183 }
184 
185 /*
186  * Print address family header before a section of the routing table.
187  */
188 void
189 pr_family(af)
190 	int af;
191 {
192 	char *afname;
193 
194 	switch (af) {
195 	case AF_INET:
196 		afname = "Internet";
197 		break;
198 #ifdef INET6
199 	case AF_INET6:
200 		afname = "Internet6";
201 		break;
202 #endif
203 	case AF_NS:
204 		afname = "XNS";
205 		break;
206 	case AF_ISO:
207 		afname = "ISO";
208 		break;
209 	case AF_APPLETALK:
210 		afname = "AppleTalk";
211 		break;
212 	case AF_CCITT:
213 		afname = "X.25";
214 		break;
215 	default:
216 		afname = NULL;
217 		break;
218 	}
219 	if (afname)
220 		printf("\n%s:\n", afname);
221 	else
222 		printf("\nProtocol Family %d:\n", af);
223 }
224 
225 /* column widths; each followed by one space */
226 #ifndef INET6
227 #define	WID_DST(af)	18	/* width of destination column */
228 #define	WID_GW(af)	18	/* width of gateway column */
229 #else
230 /* width of destination/gateway column */
231 #ifdef KAME_SCOPEID
232 /* strlen("fe80::aaaa:bbbb:cccc:dddd@gif0") == 30, strlen("/128") == 4 */
233 #define	WID_DST(af)	((af) == AF_INET6 ? (nflag ? 34 : 18) : 18)
234 #define	WID_GW(af)	((af) == AF_INET6 ? (nflag ? 30 : 18) : 18)
235 #else
236 /* strlen("fe80::aaaa:bbbb:cccc:dddd") == 25, strlen("/128") == 4 */
237 #define	WID_DST(af)	((af) == AF_INET6 ? (nflag ? 29 : 18) : 18)
238 #define	WID_GW(af)	((af) == AF_INET6 ? (nflag ? 25 : 18) : 18)
239 #endif
240 #endif /* INET6 */
241 
242 /*
243  * Print header for routing table columns.
244  */
245 void
246 pr_rthdr(af)
247 	int af;
248 {
249 
250 	if (Aflag)
251 		printf("%-8.8s ","Address");
252 	printf("%-*.*s %-*.*s %-6.6s  %6.6s%8.8s %6.6s  %s\n",
253 		WID_DST(af), WID_DST(af), "Destination",
254 		WID_GW(af), WID_GW(af), "Gateway",
255 		"Flags", "Refs", "Use", "Mtu", "Interface");
256 }
257 
258 static struct sockaddr *
259 kgetsa(dst)
260 	struct sockaddr *dst;
261 {
262 
263 	kget(dst, pt_u.u_sa);
264 	if (pt_u.u_sa.sa_len > sizeof (pt_u.u_sa))
265 		kread((u_long)dst, (char *)pt_u.u_data, pt_u.u_sa.sa_len);
266 	return (&pt_u.u_sa);
267 }
268 
269 static void
270 p_tree(rn)
271 	struct radix_node *rn;
272 {
273 
274 again:
275 	kget(rn, rnode);
276 	if (rnode.rn_b < 0) {
277 		if (Aflag)
278 			printf("%-8.8lx ", (u_long) rn);
279 		if (rnode.rn_flags & RNF_ROOT) {
280 			if (Aflag)
281 				printf("(root node)%s",
282 				    rnode.rn_dupedkey ? " =>\n" : "\n");
283 		} else if (do_rtent) {
284 			kget(rn, rtentry);
285 			p_rtentry(&rtentry);
286 			if (Aflag)
287 				p_rtnode();
288 		} else {
289 			p_sockaddr(kgetsa((struct sockaddr *)rnode.rn_key),
290 			    NULL, 0, 44);
291 			putchar('\n');
292 		}
293 		if ((rn = rnode.rn_dupedkey) != NULL)
294 			goto again;
295 	} else {
296 		if (Aflag && do_rtent) {
297 			printf("%-8.8lx ", (u_long) rn);
298 			p_rtnode();
299 		}
300 		rn = rnode.rn_r;
301 		p_tree(rnode.rn_l);
302 		p_tree(rn);
303 	}
304 }
305 
306 static void
307 p_rtnode()
308 {
309 	struct radix_mask *rm = rnode.rn_mklist;
310 	char	nbuf[20];
311 
312 	if (rnode.rn_b < 0) {
313 		if (rnode.rn_mask) {
314 			printf("\t  mask ");
315 			p_sockaddr(kgetsa((struct sockaddr *)rnode.rn_mask),
316 				    NULL, 0, -1);
317 		} else if (rm == 0)
318 			return;
319 	} else {
320 		(void)snprintf(nbuf, sizeof nbuf, "(%d)", rnode.rn_b);
321 		printf("%6.6s %8.8lx : %8.8lx", nbuf, (u_long) rnode.rn_l,
322 		    (u_long) rnode.rn_r);
323 	}
324 	while (rm) {
325 		kget(rm, rmask);
326 		(void)snprintf(nbuf, sizeof nbuf, " %d refs, ", rmask.rm_refs);
327 		printf(" mk = %8.8lx {(%d),%s", (u_long) rm,
328 		    -1 - rmask.rm_b, rmask.rm_refs ? nbuf : " ");
329 		if (rmask.rm_flags & RNF_NORMAL) {
330 			struct radix_node rnode_aux;
331 			printf(" <normal>, ");
332 			kget(rmask.rm_leaf, rnode_aux);
333 			p_sockaddr(kgetsa((struct sockaddr *)rnode_aux.rn_mask),
334 				    NULL, 0, -1);
335 		} else
336 			p_sockaddr(kgetsa((struct sockaddr *)rmask.rm_mask),
337 			    NULL, 0, -1);
338 		putchar('}');
339 		if ((rm = rmask.rm_mklist) != NULL)
340 			printf(" ->");
341 	}
342 	putchar('\n');
343 }
344 
345 static void
346 ntreestuff()
347 {
348 	size_t needed;
349 	int mib[6];
350 	char *buf, *next, *lim;
351 	struct rt_msghdr *rtm;
352 
353 	mib[0] = CTL_NET;
354 	mib[1] = PF_ROUTE;
355 	mib[2] = 0;
356 	mib[3] = 0;
357 	mib[4] = NET_RT_DUMP;
358 	mib[5] = 0;
359 	if (sysctl(mib, 6, NULL, &needed, NULL, 0) < 0)
360 		err(1, "route sysctl estimate");
361 	if ((buf = malloc(needed)) == 0)
362 		errx(1, "out of space");
363 	if (sysctl(mib, 6, buf, &needed, NULL, 0) < 0)
364 		err(1, "sysctl of routing table");
365 	lim  = buf + needed;
366 	for (next = buf; next < lim; next += rtm->rtm_msglen) {
367 		rtm = (struct rt_msghdr *)next;
368 		np_rtentry(rtm);
369 	}
370 }
371 
372 static void
373 np_rtentry(rtm)
374 	struct rt_msghdr *rtm;
375 {
376 	struct sockaddr *sa = (struct sockaddr *)(rtm + 1);
377 #ifdef notdef
378 	static int masks_done, banner_printed;
379 #endif
380 	static int old_af;
381 	int af = 0, interesting = RTF_UP | RTF_GATEWAY | RTF_HOST;
382 
383 	if (Lflag && (rtm->rtm_flags & RTF_LLINFO))
384 		return;
385 #ifdef notdef
386 	/* for the moment, netmasks are skipped over */
387 	if (!banner_printed) {
388 		printf("Netmasks:\n");
389 		banner_printed = 1;
390 	}
391 	if (masks_done == 0) {
392 		if (rtm->rtm_addrs != RTA_DST ) {
393 			masks_done = 1;
394 			af = sa->sa_family;
395 		}
396 	} else
397 #endif
398 		af = sa->sa_family;
399 	if (af != old_af) {
400 		pr_family(af);
401 		old_af = af;
402 	}
403 	if (rtm->rtm_addrs == RTA_DST)
404 		p_sockaddr(sa, NULL, 0, 36);
405 	else {
406 		p_sockaddr(sa, NULL, rtm->rtm_flags, 16);
407 #if 0
408 		if (sa->sa_len == 0)
409 			sa->sa_len = sizeof(long);
410 #endif
411 		sa = (struct sockaddr *)(ROUNDUP(sa->sa_len) + (char *)sa);
412 		p_sockaddr(sa, NULL, 0, 18);
413 	}
414 	p_flags(rtm->rtm_flags & interesting);
415 	putchar('\n');
416 }
417 
418 static void
419 p_sockaddr(sa, mask, flags, width)
420 	const struct sockaddr *sa, *mask;
421 	int flags, width;
422 {
423 	char workbuf[128], *cplim;
424 	char *cp = workbuf;
425 
426 	switch(sa->sa_family) {
427 	case AF_INET:
428 	    {
429 		struct sockaddr_in *sin = (struct sockaddr_in *)sa;
430 
431 		if ((sin->sin_addr.s_addr == INADDR_ANY) &&
432 		    (mask != NULL) &&
433 		    (((struct sockaddr_in *)mask)->sin_addr.s_addr == 0))
434 			cp = "default";
435 		else if (flags & RTF_HOST)
436 			cp = routename(sin->sin_addr.s_addr);
437 		else if (mask)
438 			cp = netname(sin->sin_addr.s_addr,
439 			    ((struct sockaddr_in *)mask)->sin_addr.s_addr);
440 		else
441 			cp = netname(sin->sin_addr.s_addr, INADDR_ANY);
442 		break;
443 	    }
444 
445 #ifdef INET6
446 	case AF_INET6:
447 	    {
448 		struct sockaddr_in6 *sa6 = (struct sockaddr_in6 *)sa;
449 #ifdef KAME_SCOPEID
450 		struct in6_addr *in6 = &sa6->sin6_addr;
451 
452 		/*
453 		 * XXX: This is a special workaround for KAME kernels.
454 		 * sin6_scope_id field of SA should be set in the future.
455 		 */
456 		if (IN6_IS_ADDR_LINKLOCAL(in6) ||
457 		    IN6_IS_ADDR_MC_LINKLOCAL(in6)) {
458 		    /* XXX: override is ok? */
459 		    sa6->sin6_scope_id = (u_int32_t)ntohs(*(u_short *)&in6->s6_addr[2]);
460 		    *(u_short *)&in6->s6_addr[2] = 0;
461 		}
462 #endif
463 
464 		if (flags & RTF_HOST)
465 			cp = routename6(sa6);
466 		else if (mask) {
467 			cp = netname6(sa6,
468 				      &((struct sockaddr_in6 *)mask)->sin6_addr);
469 		} else
470 			cp = netname6(sa6, NULL);
471 		break;
472 	    }
473 #endif
474 
475 #ifndef SMALL
476 	case AF_APPLETALK:
477 	case 0:
478 	    {
479 		if (!(flags & RTF_HOST) && mask)
480 			cp = atalk_print2(sa,mask,11);
481 		else
482 			cp = atalk_print(sa,11);
483 		break;
484 	    }
485 	case AF_NS:
486 		cp = ns_print((struct sockaddr *)sa);
487 		break;
488 #endif
489 
490 	case AF_LINK:
491 	    {
492 		struct sockaddr_dl *sdl = (struct sockaddr_dl *)sa;
493 
494 		if (sdl->sdl_nlen == 0 && sdl->sdl_alen == 0 &&
495 		    sdl->sdl_slen == 0)
496 			(void)snprintf(workbuf, sizeof workbuf, "link#%d",
497 			    sdl->sdl_index);
498 		else switch (sdl->sdl_type) {
499 		case IFT_FDDI:
500 		case IFT_ETHER:
501 		case IFT_IEEE1394:
502 		    {
503 			int i, alen = sdl->sdl_alen;
504 			u_char *lla = (u_char *)sdl->sdl_data +
505 			    sdl->sdl_nlen;
506 
507 			if (sdl->sdl_type == IFT_IEEE1394 && alen > 8)
508 				alen = 8;
509 
510 			cplim = "";
511 			for (i = 0; i < alen; i++, lla++) {
512 				/* XXX */
513 				cp += sprintf(cp, "%s%02x", cplim, *lla);
514 				cplim = ":";
515 			}
516 			cp = workbuf;
517 			break;
518 		    }
519 		default:
520 			cp = link_ntoa(sdl);
521 			break;
522 		}
523 		break;
524 	    }
525 
526 	default:
527 	    {
528 		u_char *s = (u_char *)sa->sa_data, *slim;
529 
530 		slim =  sa->sa_len + (u_char *) sa;
531 		cplim = cp + sizeof(workbuf) - 6;
532 		cp += sprintf(cp, "(%d)", sa->sa_family);
533 		while (s < slim && cp < cplim) {
534 			cp += sprintf(cp, " %02x", *s++);
535 			if (s < slim)
536 			    cp += sprintf(cp, "%02x", *s++);
537 		}
538 		cp = workbuf;
539 	    }
540 	}
541 	if (width < 0 )
542 		printf("%s ", cp);
543 	else {
544 		if (nflag)
545 			printf("%-*s ", width, cp);
546 		else
547 			printf("%-*.*s ", width, width, cp);
548 	}
549 }
550 
551 static void
552 p_flags(f)
553 	int f;
554 {
555 	char name[33], *flags;
556 	struct bits *p = bits;
557 
558 	for (flags = name; p->b_mask && flags - name < sizeof(name); p++)
559 		if (p->b_mask & f)
560 			*flags++ = p->b_val;
561 	*flags = '\0';
562 	printf("%-6.6s ", name);
563 }
564 
565 static struct sockaddr *sockcopy __P((struct sockaddr *,
566     union sockaddr_union *));
567 
568 /*
569  * copy a sockaddr into an allocated region, allocate at least sockaddr
570  * bytes and zero unused
571  */
572 static struct sockaddr *
573 sockcopy(sp, dp)
574 	struct sockaddr *sp;
575 	union sockaddr_union *dp;
576 {
577 	int len;
578 
579 	if (sp == 0 || sp->sa_len == 0)
580 		(void)memset(dp, 0, sizeof (*sp));
581 	else {
582 		len = (sp->sa_len >= sizeof (*sp)) ? sp->sa_len : sizeof (*sp);
583 		(void)memcpy(dp, sp, len);
584 	}
585 	return ((struct sockaddr *)dp);
586 }
587 
588 static void
589 p_rtentry(rt)
590 	struct rtentry *rt;
591 {
592 	static struct ifnet ifnet, *lastif;
593 	union sockaddr_union addr_un, mask_un;
594 	struct sockaddr *addr, *mask;
595 	int af;
596 
597 	if (Lflag && (rt->rt_flags & RTF_LLINFO))
598 		return;
599 
600 	memset(&addr_un, 0, sizeof(addr_un));
601 	memset(&mask_un, 0, sizeof(mask_un));
602 	addr = sockcopy(kgetsa(rt_key(rt)), &addr_un);
603 	af = addr->sa_family;
604 	if (rt_mask(rt))
605 		mask = sockcopy(kgetsa(rt_mask(rt)), &mask_un);
606 	else
607 		mask = sockcopy(NULL, &mask_un);
608 	p_sockaddr(addr, mask, rt->rt_flags, WID_DST(af));
609 	p_sockaddr(kgetsa(rt->rt_gateway), NULL, RTF_HOST, WID_GW(af));
610 	p_flags(rt->rt_flags);
611 	printf("%6d %8lu ", rt->rt_refcnt, rt->rt_use);
612 	if (rt->rt_rmx.rmx_mtu)
613 		printf("%6lu", rt->rt_rmx.rmx_mtu);
614 	else
615 		printf("%6s", "-");
616 	putchar((rt->rt_rmx.rmx_locks & RTV_MTU) ? 'L' : ' ');
617 	if (rt->rt_ifp) {
618 		if (rt->rt_ifp != lastif) {
619 			kget(rt->rt_ifp, ifnet);
620 			lastif = rt->rt_ifp;
621 		}
622 		printf(" %.16s%s", ifnet.if_xname,
623 			rt->rt_nodes[0].rn_dupedkey ? " =>" : "");
624 	}
625 	putchar('\n');
626  	if (vflag) {
627  		printf("\texpire   %10lu%c  recvpipe %10ld%c  "
628 		       "sendpipe %10ld%c\n",
629  			rt->rt_rmx.rmx_expire,
630  			(rt->rt_rmx.rmx_locks & RTV_EXPIRE) ? 'L' : ' ',
631  			rt->rt_rmx.rmx_recvpipe,
632  			(rt->rt_rmx.rmx_locks & RTV_RPIPE) ? 'L' : ' ',
633  			rt->rt_rmx.rmx_sendpipe,
634  			(rt->rt_rmx.rmx_locks & RTV_SPIPE) ? 'L' : ' ');
635  		printf("\tssthresh %10lu%c  rtt      %10ld%c  "
636 		       "rttvar   %10ld%c\n",
637  			rt->rt_rmx.rmx_ssthresh,
638  			(rt->rt_rmx.rmx_locks & RTV_SSTHRESH) ? 'L' : ' ',
639  			rt->rt_rmx.rmx_rtt,
640  			(rt->rt_rmx.rmx_locks & RTV_RTT) ? 'L' : ' ',
641  			rt->rt_rmx.rmx_rttvar,
642 			(rt->rt_rmx.rmx_locks & RTV_RTTVAR) ? 'L' : ' ');
643  		printf("\thopcount %10lu%c\n",
644  			rt->rt_rmx.rmx_hopcount,
645 			(rt->rt_rmx.rmx_locks & RTV_HOPCOUNT) ? 'L' : ' ');
646  	}
647 }
648 
649 char *
650 routename(in)
651 	u_int32_t in;
652 {
653 	char *cp;
654 	static char line[MAXHOSTNAMELEN + 1];
655 	struct hostent *hp;
656 	static char domain[MAXHOSTNAMELEN + 1];
657 	static int first = 1;
658 
659 	if (first) {
660 		first = 0;
661 		if (gethostname(domain, MAXHOSTNAMELEN) == 0) {
662 			domain[sizeof(domain) - 1] = '\0';
663 			if ((cp = strchr(domain, '.')))
664 				(void)strcpy(domain, cp + 1);
665 			else
666 				domain[0] = 0;
667 		} else
668 			domain[0] = 0;
669 	}
670 	cp = 0;
671 	if (!nflag) {
672 		hp = gethostbyaddr((char *)&in, sizeof (struct in_addr),
673 			AF_INET);
674 		if (hp) {
675 			if ((cp = strchr(hp->h_name, '.')) &&
676 			    !strcmp(cp + 1, domain))
677 				*cp = 0;
678 			cp = hp->h_name;
679 		}
680 	}
681 	if (cp) {
682 		strncpy(line, cp, sizeof(line) - 1);
683 		line[sizeof(line) - 1] = '\0';
684 	} else {
685 #define C(x)	((x) & 0xff)
686 		in = ntohl(in);
687 		snprintf(line, sizeof line, "%u.%u.%u.%u",
688 		    C(in >> 24), C(in >> 16), C(in >> 8), C(in));
689 	}
690 	return (line);
691 }
692 
693 static u_long
694 forgemask(a)
695 	u_long a;
696 {
697 	u_long m;
698 
699 	if (IN_CLASSA(a))
700 		m = IN_CLASSA_NET;
701 	else if (IN_CLASSB(a))
702 		m = IN_CLASSB_NET;
703 	else
704 		m = IN_CLASSC_NET;
705 	return (m);
706 }
707 
708 static void
709 domask(dst, dlen, addr, mask)
710 	char *dst;
711 	size_t dlen;
712 	u_long addr, mask;
713 {
714 	int b, i;
715 
716 	if (!mask || (forgemask(addr) == mask)) {
717 		*dst = '\0';
718 		return;
719 	}
720 	i = 0;
721 	for (b = 0; b < 32; b++)
722 		if (mask & (1 << b)) {
723 			int bb;
724 
725 			i = b;
726 			for (bb = b+1; bb < 32; bb++)
727 				if (!(mask & (1 << bb))) {
728 					i = -1;	/* noncontig */
729 					break;
730 				}
731 			break;
732 		}
733 	if (i == -1)
734 		(void)snprintf(dst, dlen, "&0x%lx", mask);
735 	else
736 		(void)snprintf(dst, dlen, "/%d", 32-i);
737 }
738 
739 /*
740  * Return the name of the network whose address is given.
741  * The address is assumed to be that of a net or subnet, not a host.
742  */
743 char *
744 netname(in, mask)
745 	u_int32_t in, mask;
746 {
747 	char *cp = 0;
748 	static char line[MAXHOSTNAMELEN + 4];
749 	struct netent *np = 0;
750 	u_int32_t net, omask;
751 	u_int32_t i;
752 	int subnetshift;
753 
754 	i = ntohl(in);
755 	omask = mask = ntohl(mask);
756 	if (!nflag && i != INADDR_ANY) {
757 		if (mask == INADDR_ANY) {
758 			switch (mask = forgemask(i)) {
759 			case IN_CLASSA_NET:
760 				subnetshift = 8;
761 				break;
762 			case IN_CLASSB_NET:
763 				subnetshift = 8;
764 				break;
765 			case IN_CLASSC_NET:
766 				subnetshift = 4;
767 				break;
768 			default:
769 				abort();
770 			}
771 			/*
772 			 * If there are more bits than the standard mask
773 			 * would suggest, subnets must be in use.
774 			 * Guess at the subnet mask, assuming reasonable
775 			 * width subnet fields.
776 			 */
777 			while (i &~ mask)
778 				mask = (long)mask >> subnetshift;
779 		}
780 		net = i & mask;
781 		/*
782 		 * Note: shift the hosts bits out in octet units, since
783 		 * not all versions of getnetbyaddr() do this for us (e.g.
784 		 * the current `etc/networks' parser).
785 		 */
786 		while ((mask & 0xff) == 0)
787 			mask >>= 8, net >>= 8;
788 		np = getnetbyaddr(net, AF_INET);
789 		if (np)
790 			cp = np->n_name;
791 	}
792 	if (cp)
793 		strncpy(line, cp, sizeof(line) - 1);
794 	else if ((i & 0xffffff) == 0)
795 		(void)snprintf(line, sizeof line, "%u", C(i >> 24));
796 	else if ((i & 0xffff) == 0)
797 		(void)snprintf(line, sizeof line, "%u.%u", C(i >> 24)
798 		    , C(i >> 16));
799 	else if ((i & 0xff) == 0)
800 		(void)snprintf(line, sizeof line, "%u.%u.%u", C(i >> 24),
801 		    C(i >> 16), C(i >> 8));
802 	else
803 		(void)snprintf(line, sizeof line, "%u.%u.%u.%u", C(i >> 24),
804 			C(i >> 16), C(i >> 8), C(i));
805 	domask(line + strlen(line), sizeof(line) - strlen(line), i, omask);
806 	return (line);
807 }
808 
809 #ifdef INET6
810 char *
811 netname6(sa6, mask)
812 	struct sockaddr_in6 *sa6;
813 	struct in6_addr *mask;
814 {
815 	static char line[NI_MAXHOST];
816 	u_char *p, *q;
817 	u_char *lim;
818 	int masklen, final = 0, illegal = 0;
819 #ifdef KAME_SCOPEID
820 	int flag = NI_WITHSCOPEID;
821 #else
822 	int flag = 0;
823 #endif
824 	int error;
825 	struct sockaddr_in6 sin6;
826 
827 	sin6 = *sa6;
828 	if (mask) {
829 		masklen = 0;
830 		lim = (u_char *)(mask + 1);
831 		for (p = (u_char *)mask, q = (u_char *)&sin6.sin6_addr;
832 		     p < lim;
833 		     p++, q++) {
834 			if (final && *p) {
835 				illegal++;
836 				*q = 0;
837 				continue;
838 			}
839 
840 			switch (*p & 0xff) {
841 			 case 0xff:
842 				 masklen += 8;
843 				 break;
844 			 case 0xfe:
845 				 masklen += 7;
846 				 final++;
847 				 break;
848 			 case 0xfc:
849 				 masklen += 6;
850 				 final++;
851 				 break;
852 			 case 0xf8:
853 				 masklen += 5;
854 				 final++;
855 				 break;
856 			 case 0xf0:
857 				 masklen += 4;
858 				 final++;
859 				 break;
860 			 case 0xe0:
861 				 masklen += 3;
862 				 final++;
863 				 break;
864 			 case 0xc0:
865 				 masklen += 2;
866 				 final++;
867 				 break;
868 			 case 0x80:
869 				 masklen += 1;
870 				 final++;
871 				 break;
872 			 case 0x00:
873 				 final++;
874 				 break;
875 			 default:
876 				 final++;
877 				 illegal++;
878 				 break;
879 			}
880 
881 			if (!illegal)
882 				*q &= *p;
883 			else
884 				*q = 0;
885 		}
886 	} else
887 		masklen = 128;
888 
889 	if (masklen == 0 && IN6_IS_ADDR_UNSPECIFIED(&sa6->sin6_addr))
890 		return("default");
891 
892 	if (nflag)
893 		flag |= NI_NUMERICHOST;
894 	error = getnameinfo((struct sockaddr *)&sin6, sin6.sin6_len,
895 			line, sizeof(line), NULL, 0, flag);
896 	if (error)
897 		strcpy(line, "invalid");
898 
899 	if (nflag)
900 		sprintf(&line[strlen(line)], "/%d", masklen);
901 
902 	return line;
903 }
904 
905 char *
906 routename6(sa6)
907 	struct sockaddr_in6 *sa6;
908 {
909 	static char line[NI_MAXHOST];
910 #ifdef KAME_SCOPEID
911 	int flag = NI_WITHSCOPEID;
912 #else
913 	int flag = 0;
914 #endif
915 	/* use local variable for safety */
916 	struct sockaddr_in6 sa6_local;
917 	int error;
918 
919 	memset(&sa6_local, 0, sizeof(sa6_local));
920 	sa6_local.sin6_family = AF_INET6;
921 	sa6_local.sin6_len = sizeof(struct sockaddr_in6);
922 	sa6_local.sin6_addr = sa6->sin6_addr;
923 	sa6_local.sin6_scope_id = sa6->sin6_scope_id;
924 
925 	if (nflag)
926 		flag |= NI_NUMERICHOST;
927 
928 	error = getnameinfo((struct sockaddr *)&sa6_local, sa6_local.sin6_len,
929 			line, sizeof(line), NULL, 0, flag);
930 	if (error)
931 		strcpy(line, "invalid");
932 
933 	return line;
934 }
935 #endif /*INET6*/
936 
937 /*
938  * Print routing statistics
939  */
940 void
941 rt_stats(off)
942 	u_long off;
943 {
944 	struct rtstat rtstat;
945 
946 	if (off == 0) {
947 		printf("rtstat: symbol not in namelist\n");
948 		return;
949 	}
950 	kread(off, (char *)&rtstat, sizeof (rtstat));
951 	printf("routing:\n");
952 	printf("\t%llu bad routing redirect%s\n",
953 		(unsigned long long)rtstat.rts_badredirect,
954 		plural(rtstat.rts_badredirect));
955 	printf("\t%llu dynamically created route%s\n",
956 		(unsigned long long)rtstat.rts_dynamic,
957 		plural(rtstat.rts_dynamic));
958 	printf("\t%llu new gateway%s due to redirects\n",
959 		(unsigned long long)rtstat.rts_newgateway,
960 		plural(rtstat.rts_newgateway));
961 	printf("\t%llu destination%s found unreachable\n",
962 		(unsigned long long)rtstat.rts_unreach,
963 		plural(rtstat.rts_unreach));
964 	printf("\t%llu use%s of a wildcard route\n",
965 		(unsigned long long)rtstat.rts_wildcard,
966 		plural(rtstat.rts_wildcard));
967 }
968 short ns_nullh[] = {0,0,0};
969 short ns_bh[] = {-1,-1,-1};
970 
971 char *
972 ns_print(sa)
973 	struct sockaddr *sa;
974 {
975 	struct sockaddr_ns *sns = (struct sockaddr_ns*)sa;
976 	struct ns_addr work;
977 	union {
978 		union	ns_net net_e;
979 		u_long	long_e;
980 	} net;
981 	u_short port;
982 	static char mybuf[50], cport[10], chost[25];
983 	char *host = "";
984 	char *p;
985 	u_char *q;
986 
987 	work = sns->sns_addr;
988 	port = ntohs(work.x_port);
989 	work.x_port = 0;
990 	net.net_e  = work.x_net;
991 	if (ns_nullhost(work) && net.long_e == 0) {
992 		if (port ) {
993 			(void)snprintf(mybuf, sizeof mybuf, "*.%xH", port);
994 			upHex(mybuf);
995 		} else
996 			(void)snprintf(mybuf, sizeof mybuf, "*.*");
997 		return (mybuf);
998 	}
999 
1000 	if (memcmp(ns_bh, work.x_host.c_host, 6) == 0) {
1001 		host = "any";
1002 	} else if (memcmp(ns_nullh, work.x_host.c_host, 6) == 0) {
1003 		host = "*";
1004 	} else {
1005 		q = work.x_host.c_host;
1006 		(void)snprintf(chost, sizeof chost, "%02x%02x%02x%02x%02x%02xH",
1007 			q[0], q[1], q[2], q[3], q[4], q[5]);
1008 		for (p = chost; *p == '0' && p < chost + 12; p++)
1009 			continue;
1010 		host = p;
1011 	}
1012 	if (port)
1013 		(void)snprintf(cport, sizeof cport, ".%xH", htons(port));
1014 	else
1015 		*cport = 0;
1016 
1017 	(void)snprintf(mybuf, sizeof mybuf, "%xH.%s%s", (int)ntohl(net.long_e),
1018 	    host, cport);
1019 	upHex(mybuf);
1020 	return (mybuf);
1021 }
1022 
1023 char *
1024 ns_phost(sa)
1025 	struct sockaddr *sa;
1026 {
1027 	struct sockaddr_ns *sns = (struct sockaddr_ns *)sa;
1028 	struct sockaddr_ns work;
1029 	static union ns_net ns_zeronet;
1030 	char *p;
1031 
1032 	work = *sns;
1033 	work.sns_addr.x_port = 0;
1034 	work.sns_addr.x_net = ns_zeronet;
1035 
1036 	p = ns_print((struct sockaddr *)&work);
1037 	if (strncmp("0H.", p, 3) == 0)
1038 		p += 3;
1039 	return (p);
1040 }
1041 
1042 void
1043 upHex(p0)
1044 	char *p0;
1045 {
1046 	char *p = p0;
1047 
1048 	for (; *p; p++)
1049 		switch (*p) {
1050 		case 'a':
1051 		case 'b':
1052 		case 'c':
1053 		case 'd':
1054 		case 'e':
1055 		case 'f':
1056 			*p += ('A' - 'a');
1057 		}
1058 }
1059