1 /* $OpenBSD: show.c,v 1.91 2012/03/17 10:16:40 dlg Exp $ */ 2 /* $NetBSD: show.c,v 1.1 1996/11/15 18:01:41 gwr Exp $ */ 3 4 /* 5 * Copyright (c) 1983, 1988, 1993 6 * The Regents of the University of California. All rights reserved. 7 * 8 * Redistribution and use in source and binary forms, with or without 9 * modification, are permitted provided that the following conditions 10 * are met: 11 * 1. Redistributions of source code must retain the above copyright 12 * notice, this list of conditions and the following disclaimer. 13 * 2. Redistributions in binary form must reproduce the above copyright 14 * notice, this list of conditions and the following disclaimer in the 15 * documentation and/or other materials provided with the distribution. 16 * 3. Neither the name of the University nor the names of its contributors 17 * may be used to endorse or promote products derived from this software 18 * without specific prior written permission. 19 * 20 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 21 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 22 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 23 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 24 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 25 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 26 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 27 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 28 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 29 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 30 * SUCH DAMAGE. 31 */ 32 33 #include <sys/param.h> 34 #include <sys/socket.h> 35 #include <sys/mbuf.h> 36 #include <sys/sysctl.h> 37 38 #include <net/if.h> 39 #include <net/if_dl.h> 40 #include <net/if_types.h> 41 #include <net/pfkeyv2.h> 42 #include <net/route.h> 43 #include <netinet/in.h> 44 #include <netinet/if_ether.h> 45 #include <netinet/ip_ipsp.h> 46 #include <netmpls/mpls.h> 47 #include <arpa/inet.h> 48 49 #include <err.h> 50 #include <errno.h> 51 #include <netdb.h> 52 #include <stdio.h> 53 #include <stddef.h> 54 #include <stdlib.h> 55 #include <string.h> 56 #include <unistd.h> 57 58 #include "show.h" 59 60 char *any_ntoa(const struct sockaddr *); 61 char *link_print(struct sockaddr *); 62 char *label_print(struct sockaddr *); 63 64 extern int nflag; 65 extern int Fflag; 66 extern int verbose; 67 extern union sockunion so_label; 68 69 #define PLEN (LONG_BIT / 4 + 2) /* XXX this is also defined in netstat.h */ 70 71 #define ROUNDUP(a) \ 72 ((a) > 0 ? (1 + (((a) - 1) | (sizeof(long) - 1))) : sizeof(long)) 73 #define ADVANCE(x, n) (x += ROUNDUP((n)->sa_len)) 74 75 #define PFKEYV2_CHUNK sizeof(u_int64_t) 76 77 /* 78 * Definitions for showing gateway flags. 79 */ 80 struct bits { 81 int b_mask; 82 char b_val; 83 }; 84 static const struct bits bits[] = { 85 { RTF_UP, 'U' }, 86 { RTF_GATEWAY, 'G' }, 87 { RTF_HOST, 'H' }, 88 { RTF_REJECT, 'R' }, 89 { RTF_BLACKHOLE, 'B' }, 90 { RTF_DYNAMIC, 'D' }, 91 { RTF_MODIFIED, 'M' }, 92 { RTF_DONE, 'd' }, /* Completed -- for routing messages only */ 93 { RTF_MASK, 'm' }, /* Mask Present -- for routing messages only */ 94 { RTF_CLONING, 'C' }, 95 { RTF_XRESOLVE, 'X' }, 96 { RTF_LLINFO, 'L' }, 97 { RTF_STATIC, 'S' }, 98 { RTF_PROTO1, '1' }, 99 { RTF_PROTO2, '2' }, 100 { RTF_PROTO3, '3' }, 101 { RTF_CLONED, 'c' }, 102 { RTF_MPATH, 'P' }, 103 { RTF_MPLS, 'T' }, 104 { 0 } 105 }; 106 107 void pr_rthdr(int); 108 void p_rtentry(struct rt_msghdr *); 109 void p_pfkentry(struct sadb_msg *); 110 void pr_family(int); 111 void p_encap(struct sockaddr *, struct sockaddr *, int); 112 void p_protocol(struct sadb_protocol *, struct sockaddr *, struct 113 sadb_protocol *, int); 114 void p_sockaddr(struct sockaddr *, struct sockaddr *, int, int); 115 void p_sockaddr_mpls(struct sockaddr *, struct sockaddr *, int, int); 116 void p_flags(int, char *); 117 char *routename4(in_addr_t); 118 char *routename6(struct sockaddr_in6 *); 119 void index_pfk(struct sadb_msg *, void **); 120 121 /* 122 * Print routing tables. 123 */ 124 void 125 p_rttables(int af, u_int tableid, int hastable) 126 { 127 struct rt_msghdr *rtm; 128 struct sadb_msg *msg; 129 char *buf = NULL, *next, *lim = NULL; 130 size_t needed; 131 int mib[7], mcnt; 132 struct sockaddr *sa; 133 134 mib[0] = CTL_NET; 135 mib[1] = PF_ROUTE; 136 mib[2] = 0; 137 mib[3] = af; 138 mib[4] = NET_RT_DUMP; 139 mib[5] = 0; 140 if (hastable) { 141 mib[6] = tableid; 142 mcnt = 7; 143 } else 144 mcnt = 6; 145 146 if (sysctl(mib, mcnt, NULL, &needed, NULL, 0) < 0) 147 err(1, "route-sysctl-estimate"); 148 if (needed > 0) { 149 if ((buf = malloc(needed)) == 0) 150 err(1, NULL); 151 if (sysctl(mib, mcnt, buf, &needed, NULL, 0) < 0) 152 err(1, "sysctl of routing table"); 153 lim = buf + needed; 154 } 155 156 printf("Routing tables\n"); 157 158 if (buf) { 159 for (next = buf; next < lim; next += rtm->rtm_msglen) { 160 rtm = (struct rt_msghdr *)next; 161 if (rtm->rtm_version != RTM_VERSION) 162 continue; 163 sa = (struct sockaddr *)(next + rtm->rtm_hdrlen); 164 if (af != AF_UNSPEC && sa->sa_family != af) 165 continue; 166 p_rtentry(rtm); 167 } 168 free(buf); 169 buf = NULL; 170 } 171 172 if (af != 0 && af != PF_KEY) 173 return; 174 175 mib[0] = CTL_NET; 176 mib[1] = PF_KEY; 177 mib[2] = PF_KEY_V2; 178 mib[3] = NET_KEY_SPD_DUMP; 179 mib[4] = mib[5] = 0; 180 181 if (sysctl(mib, 4, NULL, &needed, NULL, 0) == -1) { 182 if (errno == ENOPROTOOPT) 183 return; 184 err(1, "spd-sysctl-estimate"); 185 } 186 if (needed > 0) { 187 if ((buf = malloc(needed)) == 0) 188 err(1, NULL); 189 if (sysctl(mib, 4, buf, &needed, NULL, 0) == -1) 190 err(1,"sysctl of spd"); 191 lim = buf + needed; 192 } 193 194 if (buf) { 195 printf("\nEncap:\n"); 196 197 for (next = buf; next < lim; next += msg->sadb_msg_len * 198 PFKEYV2_CHUNK) { 199 msg = (struct sadb_msg *)next; 200 if (msg->sadb_msg_len == 0) 201 break; 202 p_pfkentry(msg); 203 } 204 free(buf); 205 buf = NULL; 206 } 207 } 208 209 /* 210 * column widths; each followed by one space 211 * width of destination/gateway column 212 * strlen("fe80::aaaa:bbbb:cccc:dddd@gif0") == 30, strlen("/128") == 4 213 */ 214 #define WID_GW(af) ((af) == AF_INET6 ? (nflag ? 30 : 18) : 18) 215 216 int 217 WID_DST(int af) 218 { 219 220 if (nflag) 221 switch (af) { 222 case AF_MPLS: 223 return 9; 224 case AF_INET6: 225 return 34; 226 default: 227 return 18; 228 } 229 else 230 switch (af) { 231 case AF_MPLS: 232 return 9; 233 default: 234 return 18; 235 } 236 } 237 238 /* 239 * Print header for routing table columns. 240 */ 241 void 242 pr_rthdr(int af) 243 { 244 switch (af) { 245 case PF_KEY: 246 printf("%-18s %-5s %-18s %-5s %-5s %-22s\n", 247 "Source", "Port", "Destination", 248 "Port", "Proto", "SA(Address/Proto/Type/Direction)"); 249 break; 250 case PF_MPLS: 251 printf("%-9s %-9s %-6s %-18s %-6.6s %5.5s %8.8s %5.5s %4.4s %s\n", 252 "In label", "Out label", "Op", "Gateway", 253 "Flags", "Refs", "Use", "Mtu", "Prio", "Interface"); 254 break; 255 default: 256 printf("%-*.*s %-*.*s %-6.6s %5.5s %8.8s %5.5s %4.4s %s", 257 WID_DST(af), WID_DST(af), "Destination", 258 WID_GW(af), WID_GW(af), "Gateway", 259 "Flags", "Refs", "Use", "Mtu", "Prio", "Iface"); 260 if (verbose) 261 printf(" %s", "Label"); 262 putchar('\n'); 263 break; 264 } 265 } 266 267 static void 268 get_rtaddrs(int addrs, struct sockaddr *sa, struct sockaddr **rti_info) 269 { 270 int i; 271 272 for (i = 0; i < RTAX_MAX; i++) { 273 if (addrs & (1 << i)) { 274 rti_info[i] = sa; 275 sa = (struct sockaddr *)((char *)(sa) + 276 ROUNDUP(sa->sa_len)); 277 } else 278 rti_info[i] = NULL; 279 } 280 } 281 282 /* 283 * Print a routing table entry. 284 */ 285 void 286 p_rtentry(struct rt_msghdr *rtm) 287 { 288 static int old_af = -1; 289 struct sockaddr *sa = (struct sockaddr *)((char *)rtm + rtm->rtm_hdrlen); 290 struct sockaddr *mask, *rti_info[RTAX_MAX]; 291 char ifbuf[IF_NAMESIZE]; 292 char *label; 293 294 if (sa->sa_family == AF_KEY) 295 return; 296 297 get_rtaddrs(rtm->rtm_addrs, sa, rti_info); 298 299 if (Fflag && rti_info[RTAX_GATEWAY]->sa_family != sa->sa_family) { 300 return; 301 } 302 303 if (strlen(so_label.rtlabel.sr_label)) { 304 if (!rti_info[RTAX_LABEL]) 305 return; 306 label = ((struct sockaddr_rtlabel *)rti_info[RTAX_LABEL])-> 307 sr_label; 308 if (strcmp(label, so_label.rtlabel.sr_label)) 309 return; 310 } 311 312 if (old_af != sa->sa_family) { 313 old_af = sa->sa_family; 314 pr_family(sa->sa_family); 315 pr_rthdr(sa->sa_family); 316 } 317 318 mask = rti_info[RTAX_NETMASK]; 319 if ((sa = rti_info[RTAX_DST]) == NULL) 320 return; 321 322 p_sockaddr(sa, mask, rtm->rtm_flags, WID_DST(sa->sa_family)); 323 p_sockaddr_mpls(sa, rti_info[RTAX_SRC], rtm->rtm_mpls, 324 WID_DST(sa->sa_family)); 325 326 p_sockaddr(rti_info[RTAX_GATEWAY], NULL, RTF_HOST, 327 WID_GW(sa->sa_family)); 328 329 p_flags(rtm->rtm_flags, "%-6.6s "); 330 printf("%5u %8llu ", rtm->rtm_rmx.rmx_refcnt, 331 rtm->rtm_rmx.rmx_pksent); 332 if (rtm->rtm_rmx.rmx_mtu) 333 printf("%5u ", rtm->rtm_rmx.rmx_mtu); 334 else 335 printf("%5s ", "-"); 336 putchar((rtm->rtm_rmx.rmx_locks & RTV_MTU) ? 'L' : ' '); 337 printf(" %2d %-5.16s", rtm->rtm_priority, 338 if_indextoname(rtm->rtm_index, ifbuf)); 339 if (verbose && rti_info[RTAX_LABEL]) 340 printf(" %s", ((struct sockaddr_rtlabel *) 341 rti_info[RTAX_LABEL])->sr_label); 342 putchar('\n'); 343 } 344 345 /* 346 * Print a pfkey/encap entry. 347 */ 348 void 349 p_pfkentry(struct sadb_msg *msg) 350 { 351 static int old = 0; 352 struct sadb_address *saddr; 353 struct sadb_protocol *sap, *saft; 354 struct sockaddr *sa, *mask; 355 void *headers[SADB_EXT_MAX + 1]; 356 357 if (!old) { 358 pr_rthdr(PF_KEY); 359 old++; 360 } 361 362 bzero(headers, sizeof(headers)); 363 index_pfk(msg, headers); 364 365 /* These are always set */ 366 saddr = headers[SADB_X_EXT_SRC_FLOW]; 367 sa = (struct sockaddr *)(saddr + 1); 368 saddr = headers[SADB_X_EXT_SRC_MASK]; 369 mask = (struct sockaddr *)(saddr + 1); 370 p_encap(sa, mask, WID_DST(sa->sa_family)); 371 372 /* These are always set, too. */ 373 saddr = headers[SADB_X_EXT_DST_FLOW]; 374 sa = (struct sockaddr *)(saddr + 1); 375 saddr = headers[SADB_X_EXT_DST_MASK]; 376 mask = (struct sockaddr *)(saddr + 1); 377 p_encap(sa, mask, WID_DST(sa->sa_family)); 378 379 /* Bypass and deny flows do not set SADB_EXT_ADDRESS_DST! */ 380 sap = headers[SADB_X_EXT_PROTOCOL]; 381 saft = headers[SADB_X_EXT_FLOW_TYPE]; 382 saddr = headers[SADB_EXT_ADDRESS_DST]; 383 if (saddr) 384 sa = (struct sockaddr *)(saddr + 1); 385 else 386 sa = NULL; 387 p_protocol(sap, sa, saft, msg->sadb_msg_satype); 388 389 printf("\n"); 390 } 391 392 /* 393 * Print address family header before a section of the routing table. 394 */ 395 void 396 pr_family(int af) 397 { 398 char *afname; 399 400 switch (af) { 401 case AF_INET: 402 afname = "Internet"; 403 break; 404 case AF_INET6: 405 afname = "Internet6"; 406 break; 407 case PF_KEY: 408 afname = "Encap"; 409 break; 410 case AF_MPLS: 411 afname = "MPLS"; 412 break; 413 default: 414 afname = NULL; 415 break; 416 } 417 if (afname) 418 printf("\n%s:\n", afname); 419 else 420 printf("\nProtocol Family %d:\n", af); 421 } 422 423 void 424 p_encap(struct sockaddr *sa, struct sockaddr *mask, int width) 425 { 426 char *cp; 427 unsigned short port = 0; 428 429 if (mask) 430 cp = netname(sa, mask); 431 else 432 cp = routename(sa); 433 switch (sa->sa_family) { 434 case AF_INET: 435 port = ntohs(((struct sockaddr_in *)sa)->sin_port); 436 break; 437 case AF_INET6: 438 port = ntohs(((struct sockaddr_in6 *)sa)->sin6_port); 439 break; 440 } 441 if (width < 0) 442 printf("%s", cp); 443 else { 444 if (nflag) 445 printf("%-*s %-5u ", width, cp, port); 446 else 447 printf("%-*.*s %-5u ", width, width, cp, port); 448 } 449 } 450 451 void 452 p_protocol(struct sadb_protocol *sap, struct sockaddr *sa, struct sadb_protocol 453 *saft, int proto) 454 { 455 printf("%-6u", sap->sadb_protocol_proto); 456 457 if (sa) 458 p_sockaddr(sa, NULL, 0, -1); 459 else 460 printf("none"); 461 462 switch (proto) { 463 case SADB_SATYPE_ESP: 464 printf("/esp"); 465 break; 466 case SADB_SATYPE_AH: 467 printf("/ah"); 468 break; 469 case SADB_X_SATYPE_IPCOMP: 470 printf("/ipcomp"); 471 break; 472 case SADB_X_SATYPE_IPIP: 473 printf("/ipip"); 474 break; 475 default: 476 printf("/<unknown>"); 477 } 478 479 switch(saft->sadb_protocol_proto) { 480 case SADB_X_FLOW_TYPE_USE: 481 printf("/use"); 482 break; 483 case SADB_X_FLOW_TYPE_REQUIRE: 484 printf("/require"); 485 break; 486 case SADB_X_FLOW_TYPE_ACQUIRE: 487 printf("/acquire"); 488 break; 489 case SADB_X_FLOW_TYPE_DENY: 490 printf("/deny"); 491 break; 492 case SADB_X_FLOW_TYPE_BYPASS: 493 printf("/bypass"); 494 break; 495 case SADB_X_FLOW_TYPE_DONTACQ: 496 printf("/dontacq"); 497 break; 498 default: 499 printf("/<unknown type>"); 500 } 501 502 switch(saft->sadb_protocol_direction) { 503 case IPSP_DIRECTION_IN: 504 printf("/in"); 505 break; 506 case IPSP_DIRECTION_OUT: 507 printf("/out"); 508 break; 509 default: 510 printf("/<unknown>"); 511 } 512 } 513 514 void 515 p_sockaddr(struct sockaddr *sa, struct sockaddr *mask, int flags, int width) 516 { 517 char *cp; 518 519 switch (sa->sa_family) { 520 case AF_INET6: 521 { 522 struct sockaddr_in6 *sa6 = (struct sockaddr_in6 *)sa; 523 struct in6_addr *in6 = &sa6->sin6_addr; 524 525 /* 526 * XXX: This is a special workaround for KAME kernels. 527 * sin6_scope_id field of SA should be set in the future. 528 */ 529 if (IN6_IS_ADDR_LINKLOCAL(in6) || 530 IN6_IS_ADDR_MC_LINKLOCAL(in6) || 531 IN6_IS_ADDR_MC_INTFACELOCAL(in6)) { 532 /* XXX: override is ok? */ 533 sa6->sin6_scope_id = (u_int32_t)ntohs(*(u_short *) 534 &in6->s6_addr[2]); 535 *(u_short *)&in6->s6_addr[2] = 0; 536 } 537 if (flags & RTF_HOST) 538 cp = routename((struct sockaddr *)sa6); 539 else 540 cp = netname((struct sockaddr *)sa6, mask); 541 break; 542 } 543 case AF_MPLS: 544 return; 545 default: 546 if ((flags & RTF_HOST) || mask == NULL) 547 cp = routename(sa); 548 else 549 cp = netname(sa, mask); 550 break; 551 } 552 if (width < 0) 553 printf("%s", cp); 554 else { 555 if (nflag) 556 printf("%-*s ", width, cp); 557 else 558 printf("%-*.*s ", width, width, cp); 559 } 560 } 561 562 static char line[MAXHOSTNAMELEN]; 563 static char domain[MAXHOSTNAMELEN]; 564 565 void 566 p_sockaddr_mpls(struct sockaddr *in, struct sockaddr *out, int flags, int width) 567 { 568 if (in->sa_family != AF_MPLS) 569 return; 570 571 if (flags & MPLS_OP_POP || flags == MPLS_OP_LOCAL) { 572 printf("%-*s ", width, label_print(in)); 573 printf("%-*s ", width, label_print(NULL)); 574 } else { 575 printf("%-*s ", width, label_print(in)); 576 printf("%-*s ", width, label_print(out)); 577 } 578 579 printf("%-6s ", mpls_op(flags)); 580 } 581 582 void 583 p_flags(int f, char *format) 584 { 585 char name[33], *flags; 586 const struct bits *p = bits; 587 588 for (flags = name; p->b_mask && flags < &name[sizeof(name) - 2]; p++) 589 if (p->b_mask & f) 590 *flags++ = p->b_val; 591 *flags = '\0'; 592 printf(format, name); 593 } 594 595 char * 596 routename(struct sockaddr *sa) 597 { 598 char *cp = NULL; 599 static int first = 1; 600 601 if (first) { 602 first = 0; 603 if (gethostname(domain, sizeof(domain)) == 0 && 604 (cp = strchr(domain, '.'))) 605 (void)strlcpy(domain, cp + 1, sizeof(domain)); 606 else 607 domain[0] = '\0'; 608 cp = NULL; 609 } 610 611 if (sa->sa_len == 0) { 612 (void)strlcpy(line, "default", sizeof(line)); 613 return (line); 614 } 615 616 switch (sa->sa_family) { 617 case AF_INET: 618 return 619 (routename4(((struct sockaddr_in *)sa)->sin_addr.s_addr)); 620 621 case AF_INET6: 622 { 623 struct sockaddr_in6 sin6; 624 625 memset(&sin6, 0, sizeof(sin6)); 626 memcpy(&sin6, sa, sa->sa_len); 627 sin6.sin6_len = sizeof(struct sockaddr_in6); 628 sin6.sin6_family = AF_INET6; 629 if (sa->sa_len == sizeof(struct sockaddr_in6) && 630 (IN6_IS_ADDR_LINKLOCAL(&sin6.sin6_addr) || 631 IN6_IS_ADDR_MC_LINKLOCAL(&sin6.sin6_addr) || 632 IN6_IS_ADDR_MC_INTFACELOCAL(&sin6.sin6_addr)) && 633 sin6.sin6_scope_id == 0) { 634 sin6.sin6_scope_id = 635 ntohs(*(u_int16_t *)&sin6.sin6_addr.s6_addr[2]); 636 sin6.sin6_addr.s6_addr[2] = 0; 637 sin6.sin6_addr.s6_addr[3] = 0; 638 } 639 return (routename6(&sin6)); 640 } 641 642 case AF_LINK: 643 return (link_print(sa)); 644 case AF_MPLS: 645 return (label_print(sa)); 646 case AF_UNSPEC: 647 if (sa->sa_len == sizeof(struct sockaddr_rtlabel)) { 648 static char name[RTLABEL_LEN]; 649 struct sockaddr_rtlabel *sr; 650 651 sr = (struct sockaddr_rtlabel *)sa; 652 (void)strlcpy(name, sr->sr_label, sizeof(name)); 653 return (name); 654 } 655 /* FALLTHROUGH */ 656 default: 657 (void)snprintf(line, sizeof(line), "(%d) %s", 658 sa->sa_family, any_ntoa(sa)); 659 break; 660 } 661 return (line); 662 } 663 664 char * 665 routename4(in_addr_t in) 666 { 667 char *cp = NULL; 668 struct in_addr ina; 669 struct hostent *hp; 670 671 if (in == INADDR_ANY) 672 cp = "default"; 673 if (!cp && !nflag) { 674 if ((hp = gethostbyaddr((char *)&in, 675 sizeof(in), AF_INET)) != NULL) { 676 if ((cp = strchr(hp->h_name, '.')) && 677 !strcmp(cp + 1, domain)) 678 *cp = '\0'; 679 cp = hp->h_name; 680 } 681 } 682 ina.s_addr = in; 683 strlcpy(line, cp ? cp : inet_ntoa(ina), sizeof(line)); 684 685 return (line); 686 } 687 688 char * 689 routename6(struct sockaddr_in6 *sin6) 690 { 691 int niflags = 0; 692 693 if (nflag) 694 niflags |= NI_NUMERICHOST; 695 else 696 niflags |= NI_NOFQDN; 697 698 if (getnameinfo((struct sockaddr *)sin6, sin6->sin6_len, 699 line, sizeof(line), NULL, 0, niflags) != 0) 700 strncpy(line, "invalid", sizeof(line)); 701 702 return (line); 703 } 704 705 /* 706 * Return the name of the network whose address is given. 707 * The address is assumed to be that of a net or subnet, not a host. 708 */ 709 char * 710 netname4(in_addr_t in, struct sockaddr_in *maskp) 711 { 712 char *cp = NULL; 713 struct netent *np = NULL; 714 in_addr_t mask; 715 int mbits; 716 717 in = ntohl(in); 718 mask = maskp && maskp->sin_len != 0 ? ntohl(maskp->sin_addr.s_addr) : 0; 719 if (!nflag && in != INADDR_ANY) { 720 if ((np = getnetbyaddr(in, AF_INET)) != NULL) 721 cp = np->n_name; 722 } 723 if (in == INADDR_ANY && mask == INADDR_ANY) 724 cp = "default"; 725 mbits = mask ? 33 - ffs(mask) : 0; 726 if (cp) 727 strlcpy(line, cp, sizeof(line)); 728 #define C(x) ((x) & 0xff) 729 else if (mbits < 9) 730 snprintf(line, sizeof(line), "%u/%d", C(in >> 24), mbits); 731 else if (mbits < 17) 732 snprintf(line, sizeof(line), "%u.%u/%d", 733 C(in >> 24) , C(in >> 16), mbits); 734 else if (mbits < 25) 735 snprintf(line, sizeof(line), "%u.%u.%u/%d", 736 C(in >> 24), C(in >> 16), C(in >> 8), mbits); 737 else 738 snprintf(line, sizeof(line), "%u.%u.%u.%u/%d", C(in >> 24), 739 C(in >> 16), C(in >> 8), C(in), mbits); 740 #undef C 741 return (line); 742 } 743 744 char * 745 netname6(struct sockaddr_in6 *sa6, struct sockaddr_in6 *mask) 746 { 747 struct sockaddr_in6 sin6; 748 u_char *p; 749 int masklen, final = 0, illegal = 0; 750 int i, lim, flag, error; 751 char hbuf[NI_MAXHOST]; 752 753 sin6 = *sa6; 754 755 flag = 0; 756 masklen = 0; 757 if (mask) { 758 lim = mask->sin6_len - offsetof(struct sockaddr_in6, sin6_addr); 759 lim = lim < (int)sizeof(struct in6_addr) ? 760 lim : sizeof(struct in6_addr); 761 for (p = (u_char *)&mask->sin6_addr, i = 0; i < lim; p++) { 762 if (final && *p) { 763 illegal++; 764 sin6.sin6_addr.s6_addr[i++] = 0x00; 765 continue; 766 } 767 768 switch (*p & 0xff) { 769 case 0xff: 770 masklen += 8; 771 break; 772 case 0xfe: 773 masklen += 7; 774 final++; 775 break; 776 case 0xfc: 777 masklen += 6; 778 final++; 779 break; 780 case 0xf8: 781 masklen += 5; 782 final++; 783 break; 784 case 0xf0: 785 masklen += 4; 786 final++; 787 break; 788 case 0xe0: 789 masklen += 3; 790 final++; 791 break; 792 case 0xc0: 793 masklen += 2; 794 final++; 795 break; 796 case 0x80: 797 masklen += 1; 798 final++; 799 break; 800 case 0x00: 801 final++; 802 break; 803 default: 804 final++; 805 illegal++; 806 break; 807 } 808 809 if (!illegal) 810 sin6.sin6_addr.s6_addr[i++] &= *p; 811 else 812 sin6.sin6_addr.s6_addr[i++] = 0x00; 813 } 814 while (i < sizeof(struct in6_addr)) 815 sin6.sin6_addr.s6_addr[i++] = 0x00; 816 } else 817 masklen = 128; 818 819 if (masklen == 0 && IN6_IS_ADDR_UNSPECIFIED(&sin6.sin6_addr)) 820 return ("default"); 821 822 if (illegal) 823 warnx("illegal prefixlen"); 824 825 if (nflag) 826 flag |= NI_NUMERICHOST; 827 error = getnameinfo((struct sockaddr *)&sin6, sin6.sin6_len, 828 hbuf, sizeof(hbuf), NULL, 0, flag); 829 if (error) 830 snprintf(hbuf, sizeof(hbuf), "invalid"); 831 832 snprintf(line, sizeof(line), "%s/%d", hbuf, masklen); 833 return (line); 834 } 835 836 /* 837 * Return the name of the network whose address is given. 838 * The address is assumed to be that of a net or subnet, not a host. 839 */ 840 char * 841 netname(struct sockaddr *sa, struct sockaddr *mask) 842 { 843 switch (sa->sa_family) { 844 case AF_INET: 845 return netname4(((struct sockaddr_in *)sa)->sin_addr.s_addr, 846 (struct sockaddr_in *)mask); 847 case AF_INET6: 848 return netname6((struct sockaddr_in6 *)sa, 849 (struct sockaddr_in6 *)mask); 850 case AF_LINK: 851 return (link_print(sa)); 852 case AF_MPLS: 853 return (label_print(sa)); 854 default: 855 snprintf(line, sizeof(line), "af %d: %s", 856 sa->sa_family, any_ntoa(sa)); 857 break; 858 } 859 return (line); 860 } 861 862 static const char hexlist[] = "0123456789abcdef"; 863 864 char * 865 any_ntoa(const struct sockaddr *sa) 866 { 867 static char obuf[240]; 868 const char *in = sa->sa_data; 869 char *out = obuf; 870 int len = sa->sa_len - offsetof(struct sockaddr, sa_data); 871 872 *out++ = 'Q'; 873 do { 874 *out++ = hexlist[(*in >> 4) & 15]; 875 *out++ = hexlist[(*in++) & 15]; 876 *out++ = '.'; 877 } while (--len > 0 && (out + 3) < &obuf[sizeof(obuf) - 1]); 878 out[-1] = '\0'; 879 return (obuf); 880 } 881 882 char * 883 link_print(struct sockaddr *sa) 884 { 885 struct sockaddr_dl *sdl = (struct sockaddr_dl *)sa; 886 u_char *lla = (u_char *)sdl->sdl_data + sdl->sdl_nlen; 887 888 if (sdl->sdl_nlen == 0 && sdl->sdl_alen == 0 && 889 sdl->sdl_slen == 0) { 890 (void)snprintf(line, sizeof(line), "link#%d", sdl->sdl_index); 891 return (line); 892 } 893 switch (sdl->sdl_type) { 894 case IFT_ETHER: 895 case IFT_CARP: 896 return (ether_ntoa((struct ether_addr *)lla)); 897 default: 898 return (link_ntoa(sdl)); 899 } 900 } 901 902 char * 903 mpls_op(u_int32_t type) 904 { 905 switch (type & (MPLS_OP_PUSH | MPLS_OP_POP | MPLS_OP_SWAP)) { 906 case MPLS_OP_LOCAL: 907 return ("LOCAL"); 908 case MPLS_OP_POP: 909 return ("POP"); 910 case MPLS_OP_SWAP: 911 return ("SWAP"); 912 case MPLS_OP_PUSH: 913 return ("PUSH"); 914 default: 915 return ("?"); 916 } 917 } 918 919 char * 920 label_print(struct sockaddr *sa) 921 { 922 struct sockaddr_mpls *smpls = (struct sockaddr_mpls *)sa; 923 924 if (smpls) 925 (void)snprintf(line, sizeof(line), "%u", 926 ntohl(smpls->smpls_label) >> MPLS_LABEL_OFFSET); 927 else 928 (void)snprintf(line, sizeof(line), "-"); 929 930 return (line); 931 } 932 933 void 934 index_pfk(struct sadb_msg *msg, void **headers) 935 { 936 struct sadb_ext *ext; 937 938 for (ext = (struct sadb_ext *)(msg + 1); 939 (size_t)((u_int8_t *)ext - (u_int8_t *)msg) < 940 msg->sadb_msg_len * PFKEYV2_CHUNK && ext->sadb_ext_len > 0; 941 ext = (struct sadb_ext *)((u_int8_t *)ext + 942 ext->sadb_ext_len * PFKEYV2_CHUNK)) { 943 switch (ext->sadb_ext_type) { 944 case SADB_EXT_ADDRESS_SRC: 945 headers[SADB_EXT_ADDRESS_SRC] = (void *)ext; 946 break; 947 case SADB_EXT_ADDRESS_DST: 948 headers[SADB_EXT_ADDRESS_DST] = (void *)ext; 949 break; 950 case SADB_X_EXT_PROTOCOL: 951 headers[SADB_X_EXT_PROTOCOL] = (void *)ext; 952 break; 953 case SADB_X_EXT_SRC_FLOW: 954 headers[SADB_X_EXT_SRC_FLOW] = (void *)ext; 955 break; 956 case SADB_X_EXT_DST_FLOW: 957 headers[SADB_X_EXT_DST_FLOW] = (void *)ext; 958 break; 959 case SADB_X_EXT_SRC_MASK: 960 headers[SADB_X_EXT_SRC_MASK] = (void *)ext; 961 break; 962 case SADB_X_EXT_DST_MASK: 963 headers[SADB_X_EXT_DST_MASK] = (void *)ext; 964 break; 965 case SADB_X_EXT_FLOW_TYPE: 966 headers[SADB_X_EXT_FLOW_TYPE] = (void *)ext; 967 break; 968 default: 969 /* Ignore. */ 970 break; 971 } 972 } 973 } 974