xref: /netbsd-src/usr.bin/netstat/route.c (revision 481fca6e59249d8ffcf24fef7cfbe7b131bfb080)
1 /*	$NetBSD: route.c,v 1.49 2000/07/06 12:40:19 itojun Exp $	*/
2 
3 /*
4  * Copyright (c) 1983, 1988, 1993
5  *	The Regents of the University of California.  All rights reserved.
6  *
7  * Redistribution and use in source and binary forms, with or without
8  * modification, are permitted provided that the following conditions
9  * are met:
10  * 1. Redistributions of source code must retain the above copyright
11  *    notice, this list of conditions and the following disclaimer.
12  * 2. Redistributions in binary form must reproduce the above copyright
13  *    notice, this list of conditions and the following disclaimer in the
14  *    documentation and/or other materials provided with the distribution.
15  * 3. All advertising materials mentioning features or use of this software
16  *    must display the following acknowledgement:
17  *	This product includes software developed by the University of
18  *	California, Berkeley and its contributors.
19  * 4. Neither the name of the University nor the names of its contributors
20  *    may be used to endorse or promote products derived from this software
21  *    without specific prior written permission.
22  *
23  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
24  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
25  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
26  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
27  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
28  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
29  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
30  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
31  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
32  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
33  * SUCH DAMAGE.
34  */
35 
36 #include <sys/cdefs.h>
37 #ifndef lint
38 #if 0
39 static char sccsid[] = "from: @(#)route.c	8.3 (Berkeley) 3/9/94";
40 #else
41 __RCSID("$NetBSD: route.c,v 1.49 2000/07/06 12:40:19 itojun Exp $");
42 #endif
43 #endif /* not lint */
44 
45 #include <sys/param.h>
46 #include <sys/protosw.h>
47 #include <sys/socket.h>
48 #include <sys/mbuf.h>
49 #include <sys/un.h>
50 
51 #include <net/if.h>
52 #include <net/if_dl.h>
53 #include <net/if_types.h>
54 #define _KERNEL
55 #include <net/route.h>
56 #undef _KERNEL
57 #include <netinet/in.h>
58 #include <netatalk/at.h>
59 #include <netiso/iso.h>
60 
61 #include <netns/ns.h>
62 
63 #include <sys/sysctl.h>
64 
65 #include <arpa/inet.h>
66 
67 #include <err.h>
68 #include <netdb.h>
69 #include <stdio.h>
70 #include <stdlib.h>
71 #include <string.h>
72 #include <unistd.h>
73 
74 #include "netstat.h"
75 
76 #define kget(p, d) (kread((u_long)(p), (char *)&(d), sizeof (d)))
77 
78 /* alignment constraint for routing socket */
79 #define ROUNDUP(a) \
80 	((a) > 0 ? (1 + (((a) - 1) | (sizeof(long) - 1))) : sizeof(long))
81 #define ADVANCE(x, n) (x += ROUNDUP((n)->sa_len))
82 
83 /*
84  * Definitions for showing gateway flags.
85  */
86 struct bits {
87 	short	b_mask;
88 	char	b_val;
89 } bits[] = {
90 	{ RTF_UP,	'U' },
91 	{ RTF_GATEWAY,	'G' },
92 	{ RTF_HOST,	'H' },
93 	{ RTF_REJECT,	'R' },
94 	{ RTF_BLACKHOLE,'B' },
95 	{ RTF_DYNAMIC,	'D' },
96 	{ RTF_MODIFIED,	'M' },
97 	{ RTF_DONE,	'd' }, /* Completed -- for routing messages only */
98 	{ RTF_MASK,	'm' }, /* Mask Present -- for routing messages only */
99 	{ RTF_CLONING,	'C' },
100 	{ RTF_XRESOLVE,	'X' },
101 	{ RTF_LLINFO,	'L' },
102 	{ RTF_STATIC,	'S' },
103 	{ RTF_PROTO1,	'1' },
104 	{ RTF_PROTO2,	'2' },
105 	{ 0 }
106 };
107 
108 /*
109  * XXX we put all of the sockaddr types in here to force the alignment
110  * to be correct.
111  */
112 static union sockaddr_union {
113 	struct	sockaddr u_sa;
114 	struct	sockaddr_in u_in;
115 	struct	sockaddr_un u_un;
116 	struct	sockaddr_iso u_iso;
117 	struct	sockaddr_at u_at;
118 	struct	sockaddr_dl u_dl;
119 	struct	sockaddr_ns u_ns;
120 	u_short	u_data[128];
121 	int u_dummy;		/* force word-alignment */
122 } pt_u;
123 
124 int	do_rtent = 0;
125 struct	rtentry rtentry;
126 struct	radix_node rnode;
127 struct	radix_mask rmask;
128 
129 int	NewTree = 0;
130 
131 static struct sockaddr *kgetsa __P((struct sockaddr *));
132 static void p_tree __P((struct radix_node *));
133 static void p_rtnode __P((void));
134 static void ntreestuff __P((void));
135 static void np_rtentry __P((struct rt_msghdr *));
136 static void p_sockaddr __P((const struct sockaddr *,
137 			    const struct sockaddr *, int, int));
138 static void p_flags __P((int, char *));
139 static void p_rtentry __P((struct rtentry *));
140 static void ntreestuff __P((void));
141 static u_long forgemask __P((u_long));
142 static void domask __P((char *, size_t, u_long, u_long));
143 
144 /*
145  * Print routing tables.
146  */
147 void
148 routepr(rtree)
149 	u_long rtree;
150 {
151 	struct radix_node_head *rnh, head;
152 	int i;
153 
154 	printf("Routing tables\n");
155 
156 	if (Aflag == 0 && NewTree)
157 		ntreestuff();
158 	else {
159 		if (rtree == 0) {
160 			printf("rt_tables: symbol not in namelist\n");
161 			return;
162 		}
163 
164 		kget(rtree, rt_tables);
165 		for (i = 0; i <= AF_MAX; i++) {
166 			if ((rnh = rt_tables[i]) == 0)
167 				continue;
168 			kget(rnh, head);
169 			if (i == AF_UNSPEC) {
170 				if (Aflag && af == 0) {
171 					printf("Netmasks:\n");
172 					p_tree(head.rnh_treetop);
173 				}
174 			} else if (af == AF_UNSPEC || af == i) {
175 				pr_family(i);
176 				do_rtent = 1;
177 				pr_rthdr(i);
178 				p_tree(head.rnh_treetop);
179 			}
180 		}
181 	}
182 }
183 
184 /*
185  * Print address family header before a section of the routing table.
186  */
187 void
188 pr_family(af)
189 	int af;
190 {
191 	char *afname;
192 
193 	switch (af) {
194 	case AF_INET:
195 		afname = "Internet";
196 		break;
197 #ifdef INET6
198 	case AF_INET6:
199 		afname = "Internet6";
200 		break;
201 #endif
202 	case AF_NS:
203 		afname = "XNS";
204 		break;
205 	case AF_ISO:
206 		afname = "ISO";
207 		break;
208 	case AF_APPLETALK:
209 		afname = "AppleTalk";
210 		break;
211 	case AF_CCITT:
212 		afname = "X.25";
213 		break;
214 	default:
215 		afname = NULL;
216 		break;
217 	}
218 	if (afname)
219 		printf("\n%s:\n", afname);
220 	else
221 		printf("\nProtocol Family %d:\n", af);
222 }
223 
224 /* column widths; each followed by one space */
225 #ifndef INET6
226 #define	WID_DST(af)	18	/* width of destination column */
227 #define	WID_GW(af)	18	/* width of gateway column */
228 #else
229 /* width of destination/gateway column */
230 #ifdef KAME_SCOPEID
231 /* strlen("fe80::aaaa:bbbb:cccc:dddd@gif0") == 30, strlen("/128") == 4 */
232 #define	WID_DST(af)	((af) == AF_INET6 ? (nflag ? 34 : 18) : 18)
233 #define	WID_GW(af)	((af) == AF_INET6 ? (nflag ? 30 : 18) : 18)
234 #else
235 /* strlen("fe80::aaaa:bbbb:cccc:dddd") == 25, strlen("/128") == 4 */
236 #define	WID_DST(af)	((af) == AF_INET6 ? (nflag ? 29 : 18) : 18)
237 #define	WID_GW(af)	((af) == AF_INET6 ? (nflag ? 25 : 18) : 18)
238 #endif
239 #endif /* INET6 */
240 
241 /*
242  * Print header for routing table columns.
243  */
244 void
245 pr_rthdr(af)
246 	int af;
247 {
248 
249 	if (Aflag)
250 		printf("%-8.8s ","Address");
251 	printf("%-*.*s %-*.*s %-6.6s  %6.6s%8.8s %6.6s  %s\n",
252 		WID_DST(af), WID_DST(af), "Destination",
253 		WID_GW(af), WID_GW(af), "Gateway",
254 		"Flags", "Refs", "Use", "Mtu", "Interface");
255 }
256 
257 static struct sockaddr *
258 kgetsa(dst)
259 	struct sockaddr *dst;
260 {
261 
262 	kget(dst, pt_u.u_sa);
263 	if (pt_u.u_sa.sa_len > sizeof (pt_u.u_sa))
264 		kread((u_long)dst, (char *)pt_u.u_data, pt_u.u_sa.sa_len);
265 	return (&pt_u.u_sa);
266 }
267 
268 static void
269 p_tree(rn)
270 	struct radix_node *rn;
271 {
272 
273 again:
274 	kget(rn, rnode);
275 	if (rnode.rn_b < 0) {
276 		if (Aflag)
277 			printf("%-8.8lx ", (u_long) rn);
278 		if (rnode.rn_flags & RNF_ROOT) {
279 			if (Aflag)
280 				printf("(root node)%s",
281 				    rnode.rn_dupedkey ? " =>\n" : "\n");
282 		} else if (do_rtent) {
283 			kget(rn, rtentry);
284 			p_rtentry(&rtentry);
285 			if (Aflag)
286 				p_rtnode();
287 		} else {
288 			p_sockaddr(kgetsa((struct sockaddr *)rnode.rn_key),
289 			    NULL, 0, 44);
290 			putchar('\n');
291 		}
292 		if ((rn = rnode.rn_dupedkey) != NULL)
293 			goto again;
294 	} else {
295 		if (Aflag && do_rtent) {
296 			printf("%-8.8lx ", (u_long) rn);
297 			p_rtnode();
298 		}
299 		rn = rnode.rn_r;
300 		p_tree(rnode.rn_l);
301 		p_tree(rn);
302 	}
303 }
304 
305 static void
306 p_rtnode()
307 {
308 	struct radix_mask *rm = rnode.rn_mklist;
309 	char	nbuf[20];
310 
311 	if (rnode.rn_b < 0) {
312 		if (rnode.rn_mask) {
313 			printf("\t  mask ");
314 			p_sockaddr(kgetsa((struct sockaddr *)rnode.rn_mask),
315 				    NULL, 0, -1);
316 		} else if (rm == 0)
317 			return;
318 	} else {
319 		(void)snprintf(nbuf, sizeof nbuf, "(%d)", rnode.rn_b);
320 		printf("%6.6s %8.8lx : %8.8lx", nbuf, (u_long) rnode.rn_l,
321 		    (u_long) rnode.rn_r);
322 	}
323 	while (rm) {
324 		kget(rm, rmask);
325 		(void)snprintf(nbuf, sizeof nbuf, " %d refs, ", rmask.rm_refs);
326 		printf(" mk = %8.8lx {(%d),%s", (u_long) rm,
327 		    -1 - rmask.rm_b, rmask.rm_refs ? nbuf : " ");
328 		if (rmask.rm_flags & RNF_NORMAL) {
329 			struct radix_node rnode_aux;
330 			printf(" <normal>, ");
331 			kget(rmask.rm_leaf, rnode_aux);
332 			p_sockaddr(kgetsa((struct sockaddr *)rnode_aux.rn_mask),
333 				    NULL, 0, -1);
334 		} else
335 			p_sockaddr(kgetsa((struct sockaddr *)rmask.rm_mask),
336 			    NULL, 0, -1);
337 		putchar('}');
338 		if ((rm = rmask.rm_mklist) != NULL)
339 			printf(" ->");
340 	}
341 	putchar('\n');
342 }
343 
344 static void
345 ntreestuff()
346 {
347 	size_t needed;
348 	int mib[6];
349 	char *buf, *next, *lim;
350 	struct rt_msghdr *rtm;
351 
352 	mib[0] = CTL_NET;
353 	mib[1] = PF_ROUTE;
354 	mib[2] = 0;
355 	mib[3] = 0;
356 	mib[4] = NET_RT_DUMP;
357 	mib[5] = 0;
358 	if (sysctl(mib, 6, NULL, &needed, NULL, 0) < 0)
359 		err(1, "route sysctl estimate");
360 	if ((buf = malloc(needed)) == 0)
361 		errx(1, "out of space");
362 	if (sysctl(mib, 6, buf, &needed, NULL, 0) < 0)
363 		err(1, "sysctl of routing table");
364 	lim  = buf + needed;
365 	for (next = buf; next < lim; next += rtm->rtm_msglen) {
366 		rtm = (struct rt_msghdr *)next;
367 		np_rtentry(rtm);
368 	}
369 }
370 
371 static void
372 np_rtentry(rtm)
373 	struct rt_msghdr *rtm;
374 {
375 	struct sockaddr *sa = (struct sockaddr *)(rtm + 1);
376 #ifdef notdef
377 	static int masks_done, banner_printed;
378 #endif
379 	static int old_af;
380 	int af = 0, interesting = RTF_UP | RTF_GATEWAY | RTF_HOST;
381 
382 	if (Lflag && (rtm->rtm_flags & RTF_LLINFO))
383 		return;
384 #ifdef notdef
385 	/* for the moment, netmasks are skipped over */
386 	if (!banner_printed) {
387 		printf("Netmasks:\n");
388 		banner_printed = 1;
389 	}
390 	if (masks_done == 0) {
391 		if (rtm->rtm_addrs != RTA_DST ) {
392 			masks_done = 1;
393 			af = sa->sa_family;
394 		}
395 	} else
396 #endif
397 		af = sa->sa_family;
398 	if (af != old_af) {
399 		pr_family(af);
400 		old_af = af;
401 	}
402 	if (rtm->rtm_addrs == RTA_DST)
403 		p_sockaddr(sa, NULL, 0, 36);
404 	else {
405 		p_sockaddr(sa, NULL, rtm->rtm_flags, 16);
406 #if 0
407 		if (sa->sa_len == 0)
408 			sa->sa_len = sizeof(long);
409 #endif
410 		sa = (struct sockaddr *)(ROUNDUP(sa->sa_len) + (char *)sa);
411 		p_sockaddr(sa, NULL, 0, 18);
412 	}
413 	p_flags(rtm->rtm_flags & interesting, "%-6.6s ");
414 	putchar('\n');
415 }
416 
417 static void
418 p_sockaddr(sa, mask, flags, width)
419 	const struct sockaddr *sa, *mask;
420 	int flags, width;
421 {
422 	char workbuf[128], *cplim;
423 	char *cp = workbuf;
424 
425 	switch(sa->sa_family) {
426 	case AF_INET:
427 	    {
428 		struct sockaddr_in *sin = (struct sockaddr_in *)sa;
429 
430 		if ((sin->sin_addr.s_addr == INADDR_ANY) &&
431 		    (mask != NULL) &&
432 		    (((struct sockaddr_in *)mask)->sin_addr.s_addr == 0))
433 			cp = "default";
434 		else if (flags & RTF_HOST)
435 			cp = routename(sin->sin_addr.s_addr);
436 		else if (mask)
437 			cp = netname(sin->sin_addr.s_addr,
438 			    ((struct sockaddr_in *)mask)->sin_addr.s_addr);
439 		else
440 			cp = netname(sin->sin_addr.s_addr, INADDR_ANY);
441 		break;
442 	    }
443 
444 #ifdef INET6
445 	case AF_INET6:
446 	    {
447 		struct sockaddr_in6 *sa6 = (struct sockaddr_in6 *)sa;
448 #ifdef KAME_SCOPEID
449 		struct in6_addr *in6 = &sa6->sin6_addr;
450 
451 		/*
452 		 * XXX: This is a special workaround for KAME kernels.
453 		 * sin6_scope_id field of SA should be set in the future.
454 		 */
455 		if (IN6_IS_ADDR_LINKLOCAL(in6) ||
456 		    IN6_IS_ADDR_MC_LINKLOCAL(in6)) {
457 		    /* XXX: override is ok? */
458 		    sa6->sin6_scope_id = (u_int32_t)ntohs(*(u_short *)&in6->s6_addr[2]);
459 		    *(u_short *)&in6->s6_addr[2] = 0;
460 		}
461 #endif
462 
463 		if (flags & RTF_HOST)
464 			cp = routename6(sa6);
465 		else if (mask) {
466 			cp = netname6(sa6,
467 				      &((struct sockaddr_in6 *)mask)->sin6_addr);
468 		} else
469 			cp = netname6(sa6, NULL);
470 		break;
471 	    }
472 #endif
473 
474 #ifndef SMALL
475 	case AF_APPLETALK:
476 	case 0:
477 	    {
478 		if (!(flags & RTF_HOST) && mask)
479 			cp = atalk_print2(sa,mask,11);
480 		else
481 			cp = atalk_print(sa,11);
482 		break;
483 	    }
484 	case AF_NS:
485 		cp = ns_print((struct sockaddr *)sa);
486 		break;
487 #endif
488 
489 	case AF_LINK:
490 	    {
491 		struct sockaddr_dl *sdl = (struct sockaddr_dl *)sa;
492 
493 		if (sdl->sdl_nlen == 0 && sdl->sdl_alen == 0 &&
494 		    sdl->sdl_slen == 0)
495 			(void)snprintf(workbuf, sizeof workbuf, "link#%d",
496 			    sdl->sdl_index);
497 		else switch (sdl->sdl_type) {
498 		case IFT_FDDI:
499 		case IFT_ETHER:
500 		    {
501 			int i;
502 			u_char *lla = (u_char *)sdl->sdl_data +
503 			    sdl->sdl_nlen;
504 
505 			cplim = "";
506 			for (i = 0; i < sdl->sdl_alen; i++, lla++) {
507 				/* XXX */
508 				cp += sprintf(cp, "%s%02x", cplim, *lla);
509 				cplim = ":";
510 			}
511 			cp = workbuf;
512 			break;
513 		    }
514 		default:
515 			cp = link_ntoa(sdl);
516 			break;
517 		}
518 		break;
519 	    }
520 
521 	default:
522 	    {
523 		u_char *s = (u_char *)sa->sa_data, *slim;
524 
525 		slim =  sa->sa_len + (u_char *) sa;
526 		cplim = cp + sizeof(workbuf) - 6;
527 		cp += sprintf(cp, "(%d)", sa->sa_family);
528 		while (s < slim && cp < cplim) {
529 			cp += sprintf(cp, " %02x", *s++);
530 			if (s < slim)
531 			    cp += sprintf(cp, "%02x", *s++);
532 		}
533 		cp = workbuf;
534 	    }
535 	}
536 	if (width < 0 )
537 		printf("%s ", cp);
538 	else {
539 		if (nflag)
540 			printf("%-*s ", width, cp);
541 		else
542 			printf("%-*.*s ", width, width, cp);
543 	}
544 }
545 
546 static void
547 p_flags(f, format)
548 	int f;
549 	char *format;
550 {
551 	char name[33], *flags;
552 	struct bits *p = bits;
553 
554 	for (flags = name; p->b_mask && flags - name < sizeof(name); p++)
555 		if (p->b_mask & f)
556 			*flags++ = p->b_val;
557 	*flags = '\0';
558 	printf(format, name);
559 }
560 
561 static struct sockaddr *sockcopy __P((struct sockaddr *,
562     union sockaddr_union *));
563 
564 /*
565  * copy a sockaddr into an allocated region, allocate at least sockaddr
566  * bytes and zero unused
567  */
568 static struct sockaddr *
569 sockcopy(sp, dp)
570 	struct sockaddr *sp;
571 	union sockaddr_union *dp;
572 {
573 	int len;
574 
575 	if (sp == 0 || sp->sa_len == 0)
576 		(void)memset(dp, 0, sizeof (*sp));
577 	else {
578 		len = (sp->sa_len >= sizeof (*sp)) ? sp->sa_len : sizeof (*sp);
579 		(void)memcpy(dp, sp, len);
580 	}
581 	return ((struct sockaddr *)dp);
582 }
583 
584 static void
585 p_rtentry(rt)
586 	struct rtentry *rt;
587 {
588 	static struct ifnet ifnet, *lastif;
589 	union sockaddr_union addr_un, mask_un;
590 	struct sockaddr *addr, *mask;
591 	int af;
592 
593 	if (Lflag && (rt->rt_flags & RTF_LLINFO))
594 		return;
595 
596 	memset(&addr_un, 0, sizeof(addr_un));
597 	memset(&mask_un, 0, sizeof(mask_un));
598 	addr = sockcopy(kgetsa(rt_key(rt)), &addr_un);
599 	af = addr->sa_family;
600 	if (rt_mask(rt))
601 		mask = sockcopy(kgetsa(rt_mask(rt)), &mask_un);
602 	else
603 		mask = sockcopy(NULL, &mask_un);
604 	p_sockaddr(addr, mask, rt->rt_flags, WID_DST(af));
605 	p_sockaddr(kgetsa(rt->rt_gateway), NULL, RTF_HOST, WID_GW(af));
606 	p_flags(rt->rt_flags, "%-6.6s ");
607 	printf("%6d %8lu ", rt->rt_refcnt, rt->rt_use);
608 	if (rt->rt_rmx.rmx_mtu)
609 		printf("%6lu", rt->rt_rmx.rmx_mtu);
610 	else
611 		printf("%6s", "-");
612 	putchar((rt->rt_rmx.rmx_locks & RTV_MTU) ? 'L' : ' ');
613 	if (rt->rt_ifp) {
614 		if (rt->rt_ifp != lastif) {
615 			kget(rt->rt_ifp, ifnet);
616 			lastif = rt->rt_ifp;
617 		}
618 		printf(" %.16s%s", ifnet.if_xname,
619 			rt->rt_nodes[0].rn_dupedkey ? " =>" : "");
620 	}
621 	putchar('\n');
622  	if (vflag) {
623  		printf("\texpire   %10lu%c  recvpipe %10ld%c  "
624 		       "sendpipe %10ld%c\n",
625  			rt->rt_rmx.rmx_expire,
626  			(rt->rt_rmx.rmx_locks & RTV_EXPIRE) ? 'L' : ' ',
627  			rt->rt_rmx.rmx_recvpipe,
628  			(rt->rt_rmx.rmx_locks & RTV_RPIPE) ? 'L' : ' ',
629  			rt->rt_rmx.rmx_sendpipe,
630  			(rt->rt_rmx.rmx_locks & RTV_SPIPE) ? 'L' : ' ');
631  		printf("\tssthresh %10lu%c  rtt      %10ld%c  "
632 		       "rttvar   %10ld%c\n",
633  			rt->rt_rmx.rmx_ssthresh,
634  			(rt->rt_rmx.rmx_locks & RTV_SSTHRESH) ? 'L' : ' ',
635  			rt->rt_rmx.rmx_rtt,
636  			(rt->rt_rmx.rmx_locks & RTV_RTT) ? 'L' : ' ',
637  			rt->rt_rmx.rmx_rttvar,
638 			(rt->rt_rmx.rmx_locks & RTV_RTTVAR) ? 'L' : ' ');
639  	}
640 
641 }
642 
643 char *
644 routename(in)
645 	u_int32_t in;
646 {
647 	char *cp;
648 	static char line[MAXHOSTNAMELEN + 1];
649 	struct hostent *hp;
650 	static char domain[MAXHOSTNAMELEN + 1];
651 	static int first = 1;
652 
653 	if (first) {
654 		first = 0;
655 		if (gethostname(domain, MAXHOSTNAMELEN) == 0) {
656 			domain[sizeof(domain) - 1] = '\0';
657 			if ((cp = strchr(domain, '.')))
658 				(void)strcpy(domain, cp + 1);
659 			else
660 				domain[0] = 0;
661 		} else
662 			domain[0] = 0;
663 	}
664 	cp = 0;
665 	if (!nflag) {
666 		hp = gethostbyaddr((char *)&in, sizeof (struct in_addr),
667 			AF_INET);
668 		if (hp) {
669 			if ((cp = strchr(hp->h_name, '.')) &&
670 			    !strcmp(cp + 1, domain))
671 				*cp = 0;
672 			cp = hp->h_name;
673 		}
674 	}
675 	if (cp) {
676 		strncpy(line, cp, sizeof(line) - 1);
677 		line[sizeof(line) - 1] = '\0';
678 	} else {
679 #define C(x)	((x) & 0xff)
680 		in = ntohl(in);
681 		snprintf(line, sizeof line, "%u.%u.%u.%u",
682 		    C(in >> 24), C(in >> 16), C(in >> 8), C(in));
683 	}
684 	return (line);
685 }
686 
687 static u_long
688 forgemask(a)
689 	u_long a;
690 {
691 	u_long m;
692 
693 	if (IN_CLASSA(a))
694 		m = IN_CLASSA_NET;
695 	else if (IN_CLASSB(a))
696 		m = IN_CLASSB_NET;
697 	else
698 		m = IN_CLASSC_NET;
699 	return (m);
700 }
701 
702 static void
703 domask(dst, dlen, addr, mask)
704 	char *dst;
705 	size_t dlen;
706 	u_long addr, mask;
707 {
708 	int b, i;
709 
710 	if (!mask || (forgemask(addr) == mask)) {
711 		*dst = '\0';
712 		return;
713 	}
714 	i = 0;
715 	for (b = 0; b < 32; b++)
716 		if (mask & (1 << b)) {
717 			int bb;
718 
719 			i = b;
720 			for (bb = b+1; bb < 32; bb++)
721 				if (!(mask & (1 << bb))) {
722 					i = -1;	/* noncontig */
723 					break;
724 				}
725 			break;
726 		}
727 	if (i == -1)
728 		(void)snprintf(dst, dlen, "&0x%lx", mask);
729 	else
730 		(void)snprintf(dst, dlen, "/%d", 32-i);
731 }
732 
733 /*
734  * Return the name of the network whose address is given.
735  * The address is assumed to be that of a net or subnet, not a host.
736  */
737 char *
738 netname(in, mask)
739 	u_int32_t in, mask;
740 {
741 	char *cp = 0;
742 	static char line[MAXHOSTNAMELEN + 4];
743 	struct netent *np = 0;
744 	u_int32_t net, omask;
745 	u_int32_t i;
746 	int subnetshift;
747 
748 	i = ntohl(in);
749 	omask = mask = ntohl(mask);
750 	if (!nflag && i != INADDR_ANY) {
751 		if (mask == INADDR_ANY) {
752 			switch (mask = forgemask(i)) {
753 			case IN_CLASSA_NET:
754 				subnetshift = 8;
755 				break;
756 			case IN_CLASSB_NET:
757 				subnetshift = 8;
758 				break;
759 			case IN_CLASSC_NET:
760 				subnetshift = 4;
761 				break;
762 			default:
763 				abort();
764 			}
765 			/*
766 			 * If there are more bits than the standard mask
767 			 * would suggest, subnets must be in use.
768 			 * Guess at the subnet mask, assuming reasonable
769 			 * width subnet fields.
770 			 */
771 			while (i &~ mask)
772 				mask = (long)mask >> subnetshift;
773 		}
774 		net = i & mask;
775 		/*
776 		 * Note: shift the hosts bits out in octet units, since
777 		 * not all versions of getnetbyaddr() do this for us (e.g.
778 		 * the current `etc/networks' parser).
779 		 */
780 		while ((mask & 0xff) == 0)
781 			mask >>= 8, net >>= 8;
782 		np = getnetbyaddr(net, AF_INET);
783 		if (np)
784 			cp = np->n_name;
785 	}
786 	if (cp)
787 		strncpy(line, cp, sizeof(line) - 1);
788 	else if ((i & 0xffffff) == 0)
789 		(void)snprintf(line, sizeof line, "%u", C(i >> 24));
790 	else if ((i & 0xffff) == 0)
791 		(void)snprintf(line, sizeof line, "%u.%u", C(i >> 24)
792 		    , C(i >> 16));
793 	else if ((i & 0xff) == 0)
794 		(void)snprintf(line, sizeof line, "%u.%u.%u", C(i >> 24),
795 		    C(i >> 16), C(i >> 8));
796 	else
797 		(void)snprintf(line, sizeof line, "%u.%u.%u.%u", C(i >> 24),
798 			C(i >> 16), C(i >> 8), C(i));
799 	domask(line + strlen(line), sizeof(line) - strlen(line), i, omask);
800 	return (line);
801 }
802 
803 #ifdef INET6
804 char *
805 netname6(sa6, mask)
806 	struct sockaddr_in6 *sa6;
807 	struct in6_addr *mask;
808 {
809 	static char line[NI_MAXHOST];
810 	u_char *p, *q;
811 	u_char *lim;
812 	int masklen, final = 0, illegal = 0;
813 #ifdef KAME_SCOPEID
814 	int flag = NI_WITHSCOPEID;
815 #else
816 	int flag = 0;
817 #endif
818 	int error;
819 	struct sockaddr_in6 sin6;
820 
821 	sin6 = *sa6;
822 	if (mask) {
823 		masklen = 0;
824 		lim = (u_char *)(mask + 1);
825 		for (p = (u_char *)mask, q = (u_char *)&sin6.sin6_addr;
826 		     p < lim;
827 		     p++, q++) {
828 			if (final && *p) {
829 				illegal++;
830 				*q = 0;
831 				continue;
832 			}
833 
834 			switch (*p & 0xff) {
835 			 case 0xff:
836 				 masklen += 8;
837 				 break;
838 			 case 0xfe:
839 				 masklen += 7;
840 				 final++;
841 				 break;
842 			 case 0xfc:
843 				 masklen += 6;
844 				 final++;
845 				 break;
846 			 case 0xf8:
847 				 masklen += 5;
848 				 final++;
849 				 break;
850 			 case 0xf0:
851 				 masklen += 4;
852 				 final++;
853 				 break;
854 			 case 0xe0:
855 				 masklen += 3;
856 				 final++;
857 				 break;
858 			 case 0xc0:
859 				 masklen += 2;
860 				 final++;
861 				 break;
862 			 case 0x80:
863 				 masklen += 1;
864 				 final++;
865 				 break;
866 			 case 0x00:
867 				 final++;
868 				 break;
869 			 default:
870 				 final++;
871 				 illegal++;
872 				 break;
873 			}
874 
875 			if (!illegal)
876 				*q &= *p;
877 			else
878 				*q = 0;
879 		}
880 	} else
881 		masklen = 128;
882 
883 	if (masklen == 0 && IN6_IS_ADDR_UNSPECIFIED(&sa6->sin6_addr))
884 		return("default");
885 
886 	if (nflag)
887 		flag |= NI_NUMERICHOST;
888 	error = getnameinfo((struct sockaddr *)&sin6, sin6.sin6_len,
889 			line, sizeof(line), NULL, 0, flag);
890 	if (error)
891 		strcpy(line, "invalid");
892 
893 	if (nflag)
894 		sprintf(&line[strlen(line)], "/%d", masklen);
895 
896 	return line;
897 }
898 
899 char *
900 routename6(sa6)
901 	struct sockaddr_in6 *sa6;
902 {
903 	static char line[NI_MAXHOST];
904 #ifdef KAME_SCOPEID
905 	int flag = NI_WITHSCOPEID;
906 #else
907 	int flag = 0;
908 #endif
909 	/* use local variable for safety */
910 	struct sockaddr_in6 sa6_local;
911 	int error;
912 
913 	memset(&sa6_local, 0, sizeof(sa6_local));
914 	sa6_local.sin6_family = AF_INET6;
915 	sa6_local.sin6_len = sizeof(struct sockaddr_in6);
916 	sa6_local.sin6_addr = sa6->sin6_addr;
917 	sa6_local.sin6_scope_id = sa6->sin6_scope_id;
918 
919 	if (nflag)
920 		flag |= NI_NUMERICHOST;
921 
922 	error = getnameinfo((struct sockaddr *)&sa6_local, sa6_local.sin6_len,
923 			line, sizeof(line), NULL, 0, flag);
924 	if (error)
925 		strcpy(line, "invalid");
926 
927 	return line;
928 }
929 #endif /*INET6*/
930 
931 /*
932  * Print routing statistics
933  */
934 void
935 rt_stats(off)
936 	u_long off;
937 {
938 	struct rtstat rtstat;
939 
940 	if (off == 0) {
941 		printf("rtstat: symbol not in namelist\n");
942 		return;
943 	}
944 	kread(off, (char *)&rtstat, sizeof (rtstat));
945 	printf("routing:\n");
946 	printf("\t%u bad routing redirect%s\n",
947 		rtstat.rts_badredirect, plural(rtstat.rts_badredirect));
948 	printf("\t%u dynamically created route%s\n",
949 		rtstat.rts_dynamic, plural(rtstat.rts_dynamic));
950 	printf("\t%u new gateway%s due to redirects\n",
951 		rtstat.rts_newgateway, plural(rtstat.rts_newgateway));
952 	printf("\t%u destination%s found unreachable\n",
953 		rtstat.rts_unreach, plural(rtstat.rts_unreach));
954 	printf("\t%u use%s of a wildcard route\n",
955 		rtstat.rts_wildcard, plural(rtstat.rts_wildcard));
956 }
957 short ns_nullh[] = {0,0,0};
958 short ns_bh[] = {-1,-1,-1};
959 
960 char *
961 ns_print(sa)
962 	struct sockaddr *sa;
963 {
964 	struct sockaddr_ns *sns = (struct sockaddr_ns*)sa;
965 	struct ns_addr work;
966 	union {
967 		union	ns_net net_e;
968 		u_long	long_e;
969 	} net;
970 	u_short port;
971 	static char mybuf[50], cport[10], chost[25];
972 	char *host = "";
973 	char *p;
974 	u_char *q;
975 
976 	work = sns->sns_addr;
977 	port = ntohs(work.x_port);
978 	work.x_port = 0;
979 	net.net_e  = work.x_net;
980 	if (ns_nullhost(work) && net.long_e == 0) {
981 		if (port ) {
982 			(void)snprintf(mybuf, sizeof mybuf, "*.%xH", port);
983 			upHex(mybuf);
984 		} else
985 			(void)snprintf(mybuf, sizeof mybuf, "*.*");
986 		return (mybuf);
987 	}
988 
989 	if (memcmp(ns_bh, work.x_host.c_host, 6) == 0) {
990 		host = "any";
991 	} else if (memcmp(ns_nullh, work.x_host.c_host, 6) == 0) {
992 		host = "*";
993 	} else {
994 		q = work.x_host.c_host;
995 		(void)snprintf(chost, sizeof chost, "%02x%02x%02x%02x%02x%02xH",
996 			q[0], q[1], q[2], q[3], q[4], q[5]);
997 		for (p = chost; *p == '0' && p < chost + 12; p++)
998 			continue;
999 		host = p;
1000 	}
1001 	if (port)
1002 		(void)snprintf(cport, sizeof cport, ".%xH", htons(port));
1003 	else
1004 		*cport = 0;
1005 
1006 	(void)snprintf(mybuf, sizeof mybuf, "%xH.%s%s", (int)ntohl(net.long_e),
1007 	    host, cport);
1008 	upHex(mybuf);
1009 	return (mybuf);
1010 }
1011 
1012 char *
1013 ns_phost(sa)
1014 	struct sockaddr *sa;
1015 {
1016 	struct sockaddr_ns *sns = (struct sockaddr_ns *)sa;
1017 	struct sockaddr_ns work;
1018 	static union ns_net ns_zeronet;
1019 	char *p;
1020 
1021 	work = *sns;
1022 	work.sns_addr.x_port = 0;
1023 	work.sns_addr.x_net = ns_zeronet;
1024 
1025 	p = ns_print((struct sockaddr *)&work);
1026 	if (strncmp("0H.", p, 3) == 0)
1027 		p += 3;
1028 	return (p);
1029 }
1030 
1031 void
1032 upHex(p0)
1033 	char *p0;
1034 {
1035 	char *p = p0;
1036 
1037 	for (; *p; p++)
1038 		switch (*p) {
1039 		case 'a':
1040 		case 'b':
1041 		case 'c':
1042 		case 'd':
1043 		case 'e':
1044 		case 'f':
1045 			*p += ('A' - 'a');
1046 		}
1047 }
1048