xref: /openbsd-src/sbin/route/show.c (revision 4c1e55dc91edd6e69ccc60ce855900fbc12cf34f)
1 /*	$OpenBSD: show.c,v 1.91 2012/03/17 10:16:40 dlg Exp $	*/
2 /*	$NetBSD: show.c,v 1.1 1996/11/15 18:01:41 gwr Exp $	*/
3 
4 /*
5  * Copyright (c) 1983, 1988, 1993
6  *	The Regents of the University of California.  All rights reserved.
7  *
8  * Redistribution and use in source and binary forms, with or without
9  * modification, are permitted provided that the following conditions
10  * are met:
11  * 1. Redistributions of source code must retain the above copyright
12  *    notice, this list of conditions and the following disclaimer.
13  * 2. Redistributions in binary form must reproduce the above copyright
14  *    notice, this list of conditions and the following disclaimer in the
15  *    documentation and/or other materials provided with the distribution.
16  * 3. Neither the name of the University nor the names of its contributors
17  *    may be used to endorse or promote products derived from this software
18  *    without specific prior written permission.
19  *
20  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
21  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
22  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
24  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
25  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
30  * SUCH DAMAGE.
31  */
32 
33 #include <sys/param.h>
34 #include <sys/socket.h>
35 #include <sys/mbuf.h>
36 #include <sys/sysctl.h>
37 
38 #include <net/if.h>
39 #include <net/if_dl.h>
40 #include <net/if_types.h>
41 #include <net/pfkeyv2.h>
42 #include <net/route.h>
43 #include <netinet/in.h>
44 #include <netinet/if_ether.h>
45 #include <netinet/ip_ipsp.h>
46 #include <netmpls/mpls.h>
47 #include <arpa/inet.h>
48 
49 #include <err.h>
50 #include <errno.h>
51 #include <netdb.h>
52 #include <stdio.h>
53 #include <stddef.h>
54 #include <stdlib.h>
55 #include <string.h>
56 #include <unistd.h>
57 
58 #include "show.h"
59 
60 char	*any_ntoa(const struct sockaddr *);
61 char	*link_print(struct sockaddr *);
62 char	*label_print(struct sockaddr *);
63 
64 extern int nflag;
65 extern int Fflag;
66 extern int verbose;
67 extern union sockunion so_label;
68 
69 #define PLEN  (LONG_BIT / 4 + 2) /* XXX this is also defined in netstat.h */
70 
71 #define ROUNDUP(a) \
72 	((a) > 0 ? (1 + (((a) - 1) | (sizeof(long) - 1))) : sizeof(long))
73 #define ADVANCE(x, n) (x += ROUNDUP((n)->sa_len))
74 
75 #define PFKEYV2_CHUNK sizeof(u_int64_t)
76 
77 /*
78  * Definitions for showing gateway flags.
79  */
80 struct bits {
81 	int	b_mask;
82 	char	b_val;
83 };
84 static const struct bits bits[] = {
85 	{ RTF_UP,	'U' },
86 	{ RTF_GATEWAY,	'G' },
87 	{ RTF_HOST,	'H' },
88 	{ RTF_REJECT,	'R' },
89 	{ RTF_BLACKHOLE, 'B' },
90 	{ RTF_DYNAMIC,	'D' },
91 	{ RTF_MODIFIED,	'M' },
92 	{ RTF_DONE,	'd' }, /* Completed -- for routing messages only */
93 	{ RTF_MASK,	'm' }, /* Mask Present -- for routing messages only */
94 	{ RTF_CLONING,	'C' },
95 	{ RTF_XRESOLVE,	'X' },
96 	{ RTF_LLINFO,	'L' },
97 	{ RTF_STATIC,	'S' },
98 	{ RTF_PROTO1,	'1' },
99 	{ RTF_PROTO2,	'2' },
100 	{ RTF_PROTO3,	'3' },
101 	{ RTF_CLONED,	'c' },
102 	{ RTF_MPATH,	'P' },
103 	{ RTF_MPLS,	'T' },
104 	{ 0 }
105 };
106 
107 void	 pr_rthdr(int);
108 void	 p_rtentry(struct rt_msghdr *);
109 void	 p_pfkentry(struct sadb_msg *);
110 void	 pr_family(int);
111 void	 p_encap(struct sockaddr *, struct sockaddr *, int);
112 void	 p_protocol(struct sadb_protocol *, struct sockaddr *, struct
113 	     sadb_protocol *, int);
114 void	 p_sockaddr(struct sockaddr *, struct sockaddr *, int, int);
115 void	 p_sockaddr_mpls(struct sockaddr *, struct sockaddr *, int, int);
116 void	 p_flags(int, char *);
117 char	*routename4(in_addr_t);
118 char	*routename6(struct sockaddr_in6 *);
119 void	 index_pfk(struct sadb_msg *, void **);
120 
121 /*
122  * Print routing tables.
123  */
124 void
125 p_rttables(int af, u_int tableid, int hastable)
126 {
127 	struct rt_msghdr *rtm;
128 	struct sadb_msg *msg;
129 	char *buf = NULL, *next, *lim = NULL;
130 	size_t needed;
131 	int mib[7], mcnt;
132 	struct sockaddr *sa;
133 
134 	mib[0] = CTL_NET;
135 	mib[1] = PF_ROUTE;
136 	mib[2] = 0;
137 	mib[3] = af;
138 	mib[4] = NET_RT_DUMP;
139 	mib[5] = 0;
140 	if (hastable) {
141 		mib[6] = tableid;
142 		mcnt = 7;
143 	} else
144 		mcnt = 6;
145 
146 	if (sysctl(mib, mcnt, NULL, &needed, NULL, 0) < 0)
147 		err(1, "route-sysctl-estimate");
148 	if (needed > 0) {
149 		if ((buf = malloc(needed)) == 0)
150 			err(1, NULL);
151 		if (sysctl(mib, mcnt, buf, &needed, NULL, 0) < 0)
152 			err(1, "sysctl of routing table");
153 		lim = buf + needed;
154 	}
155 
156 	printf("Routing tables\n");
157 
158 	if (buf) {
159 		for (next = buf; next < lim; next += rtm->rtm_msglen) {
160 			rtm = (struct rt_msghdr *)next;
161 			if (rtm->rtm_version != RTM_VERSION)
162 				continue;
163 			sa = (struct sockaddr *)(next + rtm->rtm_hdrlen);
164 			if (af != AF_UNSPEC && sa->sa_family != af)
165 				continue;
166 			p_rtentry(rtm);
167 		}
168 		free(buf);
169 		buf = NULL;
170 	}
171 
172 	if (af != 0 && af != PF_KEY)
173 		return;
174 
175 	mib[0] = CTL_NET;
176 	mib[1] = PF_KEY;
177 	mib[2] = PF_KEY_V2;
178 	mib[3] = NET_KEY_SPD_DUMP;
179 	mib[4] = mib[5] = 0;
180 
181 	if (sysctl(mib, 4, NULL, &needed, NULL, 0) == -1) {
182 		if (errno == ENOPROTOOPT)
183 			return;
184 		err(1, "spd-sysctl-estimate");
185 	}
186 	if (needed > 0) {
187 		if ((buf = malloc(needed)) == 0)
188 			err(1, NULL);
189 		if (sysctl(mib, 4, buf, &needed, NULL, 0) == -1)
190 			err(1,"sysctl of spd");
191 		lim = buf + needed;
192 	}
193 
194 	if (buf) {
195 		printf("\nEncap:\n");
196 
197 		for (next = buf; next < lim; next += msg->sadb_msg_len *
198 		    PFKEYV2_CHUNK) {
199 			msg = (struct sadb_msg *)next;
200 			if (msg->sadb_msg_len == 0)
201 				break;
202 			p_pfkentry(msg);
203 		}
204 		free(buf);
205 		buf = NULL;
206 	}
207 }
208 
209 /*
210  * column widths; each followed by one space
211  * width of destination/gateway column
212  * strlen("fe80::aaaa:bbbb:cccc:dddd@gif0") == 30, strlen("/128") == 4
213  */
214 #define	WID_GW(af)	((af) == AF_INET6 ? (nflag ? 30 : 18) : 18)
215 
216 int
217 WID_DST(int af)
218 {
219 
220 	if (nflag)
221 		switch (af) {
222 		case AF_MPLS:
223 			return 9;
224 		case AF_INET6:
225 			return 34;
226 		default:
227 			return 18;
228 		}
229 	else
230 		switch (af) {
231 		case AF_MPLS:
232 			return 9;
233  		default:
234 			return 18;
235 		}
236 }
237 
238 /*
239  * Print header for routing table columns.
240  */
241 void
242 pr_rthdr(int af)
243 {
244 	switch (af) {
245 	case PF_KEY:
246 		printf("%-18s %-5s %-18s %-5s %-5s %-22s\n",
247 		    "Source", "Port", "Destination",
248 		    "Port", "Proto", "SA(Address/Proto/Type/Direction)");
249 		break;
250 	case PF_MPLS:
251 		printf("%-9s %-9s %-6s %-18s %-6.6s %5.5s %8.8s %5.5s  %4.4s %s\n",
252 		    "In label", "Out label", "Op", "Gateway",
253 		    "Flags", "Refs", "Use", "Mtu", "Prio", "Interface");
254 		break;
255 	default:
256 		printf("%-*.*s %-*.*s %-6.6s %5.5s %8.8s %5.5s  %4.4s %s",
257 		    WID_DST(af), WID_DST(af), "Destination",
258 		    WID_GW(af), WID_GW(af), "Gateway",
259 		    "Flags", "Refs", "Use", "Mtu", "Prio", "Iface");
260 		if (verbose)
261 			printf(" %s", "Label");
262 		putchar('\n');
263 		break;
264 	}
265 }
266 
267 static void
268 get_rtaddrs(int addrs, struct sockaddr *sa, struct sockaddr **rti_info)
269 {
270 	int	i;
271 
272 	for (i = 0; i < RTAX_MAX; i++) {
273 		if (addrs & (1 << i)) {
274 			rti_info[i] = sa;
275 			sa = (struct sockaddr *)((char *)(sa) +
276 			    ROUNDUP(sa->sa_len));
277 		} else
278 			rti_info[i] = NULL;
279 	}
280 }
281 
282 /*
283  * Print a routing table entry.
284  */
285 void
286 p_rtentry(struct rt_msghdr *rtm)
287 {
288 	static int	 old_af = -1;
289 	struct sockaddr	*sa = (struct sockaddr *)((char *)rtm + rtm->rtm_hdrlen);
290 	struct sockaddr	*mask, *rti_info[RTAX_MAX];
291 	char		 ifbuf[IF_NAMESIZE];
292 	char		*label;
293 
294 	if (sa->sa_family == AF_KEY)
295 		return;
296 
297 	get_rtaddrs(rtm->rtm_addrs, sa, rti_info);
298 
299 	if (Fflag && rti_info[RTAX_GATEWAY]->sa_family != sa->sa_family) {
300 		return;
301 	}
302 
303 	if (strlen(so_label.rtlabel.sr_label)) {
304 		if (!rti_info[RTAX_LABEL])
305 			return;
306 		label = ((struct sockaddr_rtlabel *)rti_info[RTAX_LABEL])->
307 		    sr_label;
308 		if (strcmp(label, so_label.rtlabel.sr_label))
309 			return;
310 	}
311 
312 	if (old_af != sa->sa_family) {
313 		old_af = sa->sa_family;
314 		pr_family(sa->sa_family);
315 		pr_rthdr(sa->sa_family);
316 	}
317 
318 	mask = rti_info[RTAX_NETMASK];
319 	if ((sa = rti_info[RTAX_DST]) == NULL)
320 		return;
321 
322 	p_sockaddr(sa, mask, rtm->rtm_flags, WID_DST(sa->sa_family));
323 	p_sockaddr_mpls(sa, rti_info[RTAX_SRC], rtm->rtm_mpls,
324 	    WID_DST(sa->sa_family));
325 
326 	p_sockaddr(rti_info[RTAX_GATEWAY], NULL, RTF_HOST,
327 	    WID_GW(sa->sa_family));
328 
329 	p_flags(rtm->rtm_flags, "%-6.6s ");
330 	printf("%5u %8llu ", rtm->rtm_rmx.rmx_refcnt,
331 	    rtm->rtm_rmx.rmx_pksent);
332 	if (rtm->rtm_rmx.rmx_mtu)
333 		printf("%5u ", rtm->rtm_rmx.rmx_mtu);
334 	else
335 		printf("%5s ", "-");
336 	putchar((rtm->rtm_rmx.rmx_locks & RTV_MTU) ? 'L' : ' ');
337 	printf("  %2d %-5.16s", rtm->rtm_priority,
338 	    if_indextoname(rtm->rtm_index, ifbuf));
339 	if (verbose && rti_info[RTAX_LABEL])
340 		printf(" %s", ((struct sockaddr_rtlabel *)
341 		    rti_info[RTAX_LABEL])->sr_label);
342 	putchar('\n');
343 }
344 
345 /*
346  * Print a pfkey/encap entry.
347  */
348 void
349 p_pfkentry(struct sadb_msg *msg)
350 {
351 	static int		 old = 0;
352 	struct sadb_address	*saddr;
353 	struct sadb_protocol	*sap, *saft;
354 	struct sockaddr		*sa, *mask;
355 	void			*headers[SADB_EXT_MAX + 1];
356 
357 	if (!old) {
358 		pr_rthdr(PF_KEY);
359 		old++;
360 	}
361 
362 	bzero(headers, sizeof(headers));
363 	index_pfk(msg, headers);
364 
365 	/* These are always set */
366 	saddr = headers[SADB_X_EXT_SRC_FLOW];
367 	sa = (struct sockaddr *)(saddr + 1);
368 	saddr = headers[SADB_X_EXT_SRC_MASK];
369 	mask = (struct sockaddr *)(saddr + 1);
370 	p_encap(sa, mask, WID_DST(sa->sa_family));
371 
372 	/* These are always set, too. */
373 	saddr = headers[SADB_X_EXT_DST_FLOW];
374 	sa = (struct sockaddr *)(saddr + 1);
375 	saddr = headers[SADB_X_EXT_DST_MASK];
376 	mask = (struct sockaddr *)(saddr + 1);
377 	p_encap(sa, mask, WID_DST(sa->sa_family));
378 
379 	/* Bypass and deny flows do not set SADB_EXT_ADDRESS_DST! */
380 	sap = headers[SADB_X_EXT_PROTOCOL];
381 	saft = headers[SADB_X_EXT_FLOW_TYPE];
382 	saddr = headers[SADB_EXT_ADDRESS_DST];
383 	if (saddr)
384 		sa = (struct sockaddr *)(saddr + 1);
385 	else
386 		sa = NULL;
387 	p_protocol(sap, sa, saft, msg->sadb_msg_satype);
388 
389 	printf("\n");
390 }
391 
392 /*
393  * Print address family header before a section of the routing table.
394  */
395 void
396 pr_family(int af)
397 {
398 	char *afname;
399 
400 	switch (af) {
401 	case AF_INET:
402 		afname = "Internet";
403 		break;
404 	case AF_INET6:
405 		afname = "Internet6";
406 		break;
407 	case PF_KEY:
408 		afname = "Encap";
409 		break;
410 	case AF_MPLS:
411 		afname = "MPLS";
412 		break;
413 	default:
414 		afname = NULL;
415 		break;
416 	}
417 	if (afname)
418 		printf("\n%s:\n", afname);
419 	else
420 		printf("\nProtocol Family %d:\n", af);
421 }
422 
423 void
424 p_encap(struct sockaddr *sa, struct sockaddr *mask, int width)
425 {
426 	char		*cp;
427 	unsigned short	 port = 0;
428 
429 	if (mask)
430 		cp = netname(sa, mask);
431 	else
432 		cp = routename(sa);
433 	switch (sa->sa_family) {
434 	case AF_INET:
435 		port = ntohs(((struct sockaddr_in *)sa)->sin_port);
436 		break;
437 	case AF_INET6:
438 		port = ntohs(((struct sockaddr_in6 *)sa)->sin6_port);
439 		break;
440 	}
441 	if (width < 0)
442 		printf("%s", cp);
443 	else {
444 		if (nflag)
445 			printf("%-*s %-5u ", width, cp, port);
446 		else
447 			printf("%-*.*s %-5u ", width, width, cp, port);
448 	}
449 }
450 
451 void
452 p_protocol(struct sadb_protocol *sap, struct sockaddr *sa, struct sadb_protocol
453     *saft, int proto)
454 {
455 	printf("%-6u", sap->sadb_protocol_proto);
456 
457 	if (sa)
458 		p_sockaddr(sa, NULL, 0, -1);
459 	else
460 		printf("none");
461 
462 	switch (proto) {
463 	case SADB_SATYPE_ESP:
464 		printf("/esp");
465 		break;
466 	case SADB_SATYPE_AH:
467 		printf("/ah");
468 		break;
469 	case SADB_X_SATYPE_IPCOMP:
470 		printf("/ipcomp");
471 		break;
472 	case SADB_X_SATYPE_IPIP:
473 		printf("/ipip");
474 		break;
475 	default:
476 		printf("/<unknown>");
477 	}
478 
479 	switch(saft->sadb_protocol_proto) {
480 	case SADB_X_FLOW_TYPE_USE:
481 		printf("/use");
482 		break;
483 	case SADB_X_FLOW_TYPE_REQUIRE:
484 		printf("/require");
485 		break;
486 	case SADB_X_FLOW_TYPE_ACQUIRE:
487 		printf("/acquire");
488 		break;
489 	case SADB_X_FLOW_TYPE_DENY:
490 		printf("/deny");
491 		break;
492 	case SADB_X_FLOW_TYPE_BYPASS:
493 		printf("/bypass");
494 		break;
495 	case SADB_X_FLOW_TYPE_DONTACQ:
496 		printf("/dontacq");
497 		break;
498 	default:
499 		printf("/<unknown type>");
500 	}
501 
502 	switch(saft->sadb_protocol_direction) {
503 	case IPSP_DIRECTION_IN:
504 		printf("/in");
505 		break;
506 	case IPSP_DIRECTION_OUT:
507 		printf("/out");
508 		break;
509 	default:
510 		printf("/<unknown>");
511 	}
512 }
513 
514 void
515 p_sockaddr(struct sockaddr *sa, struct sockaddr *mask, int flags, int width)
516 {
517 	char *cp;
518 
519 	switch (sa->sa_family) {
520 	case AF_INET6:
521 	    {
522 		struct sockaddr_in6 *sa6 = (struct sockaddr_in6 *)sa;
523 		struct in6_addr *in6 = &sa6->sin6_addr;
524 
525 		/*
526 		 * XXX: This is a special workaround for KAME kernels.
527 		 * sin6_scope_id field of SA should be set in the future.
528 		 */
529 		if (IN6_IS_ADDR_LINKLOCAL(in6) ||
530 		    IN6_IS_ADDR_MC_LINKLOCAL(in6) ||
531 		    IN6_IS_ADDR_MC_INTFACELOCAL(in6)) {
532 			/* XXX: override is ok? */
533 			sa6->sin6_scope_id = (u_int32_t)ntohs(*(u_short *)
534 			    &in6->s6_addr[2]);
535 			*(u_short *)&in6->s6_addr[2] = 0;
536 		}
537 		if (flags & RTF_HOST)
538 			cp = routename((struct sockaddr *)sa6);
539 		else
540 			cp = netname((struct sockaddr *)sa6, mask);
541 		break;
542 	    }
543 	case AF_MPLS:
544 		return;
545 	default:
546 		if ((flags & RTF_HOST) || mask == NULL)
547 			cp = routename(sa);
548 		else
549 			cp = netname(sa, mask);
550 		break;
551 	}
552 	if (width < 0)
553 		printf("%s", cp);
554 	else {
555 		if (nflag)
556 			printf("%-*s ", width, cp);
557 		else
558 			printf("%-*.*s ", width, width, cp);
559 	}
560 }
561 
562 static char line[MAXHOSTNAMELEN];
563 static char domain[MAXHOSTNAMELEN];
564 
565 void
566 p_sockaddr_mpls(struct sockaddr *in, struct sockaddr *out, int flags, int width)
567 {
568 	if (in->sa_family != AF_MPLS)
569 		return;
570 
571 	if (flags & MPLS_OP_POP || flags == MPLS_OP_LOCAL) {
572 		printf("%-*s ", width, label_print(in));
573 		printf("%-*s ", width, label_print(NULL));
574 	} else {
575 		printf("%-*s ", width, label_print(in));
576 		printf("%-*s ", width, label_print(out));
577 	}
578 
579 	printf("%-6s ", mpls_op(flags));
580 }
581 
582 void
583 p_flags(int f, char *format)
584 {
585 	char name[33], *flags;
586 	const struct bits *p = bits;
587 
588 	for (flags = name; p->b_mask && flags < &name[sizeof(name) - 2]; p++)
589 		if (p->b_mask & f)
590 			*flags++ = p->b_val;
591 	*flags = '\0';
592 	printf(format, name);
593 }
594 
595 char *
596 routename(struct sockaddr *sa)
597 {
598 	char *cp = NULL;
599 	static int first = 1;
600 
601 	if (first) {
602 		first = 0;
603 		if (gethostname(domain, sizeof(domain)) == 0 &&
604 		    (cp = strchr(domain, '.')))
605 			(void)strlcpy(domain, cp + 1, sizeof(domain));
606 		else
607 			domain[0] = '\0';
608 		cp = NULL;
609 	}
610 
611 	if (sa->sa_len == 0) {
612 		(void)strlcpy(line, "default", sizeof(line));
613 		return (line);
614 	}
615 
616 	switch (sa->sa_family) {
617 	case AF_INET:
618 		return
619 		    (routename4(((struct sockaddr_in *)sa)->sin_addr.s_addr));
620 
621 	case AF_INET6:
622 	    {
623 		struct sockaddr_in6 sin6;
624 
625 		memset(&sin6, 0, sizeof(sin6));
626 		memcpy(&sin6, sa, sa->sa_len);
627 		sin6.sin6_len = sizeof(struct sockaddr_in6);
628 		sin6.sin6_family = AF_INET6;
629 		if (sa->sa_len == sizeof(struct sockaddr_in6) &&
630 		    (IN6_IS_ADDR_LINKLOCAL(&sin6.sin6_addr) ||
631 		     IN6_IS_ADDR_MC_LINKLOCAL(&sin6.sin6_addr) ||
632 		     IN6_IS_ADDR_MC_INTFACELOCAL(&sin6.sin6_addr)) &&
633 		    sin6.sin6_scope_id == 0) {
634 			sin6.sin6_scope_id =
635 			    ntohs(*(u_int16_t *)&sin6.sin6_addr.s6_addr[2]);
636 			sin6.sin6_addr.s6_addr[2] = 0;
637 			sin6.sin6_addr.s6_addr[3] = 0;
638 		}
639 		return (routename6(&sin6));
640 	    }
641 
642 	case AF_LINK:
643 		return (link_print(sa));
644 	case AF_MPLS:
645 		return (label_print(sa));
646 	case AF_UNSPEC:
647 		if (sa->sa_len == sizeof(struct sockaddr_rtlabel)) {
648 			static char name[RTLABEL_LEN];
649 			struct sockaddr_rtlabel *sr;
650 
651 			sr = (struct sockaddr_rtlabel *)sa;
652 			(void)strlcpy(name, sr->sr_label, sizeof(name));
653 			return (name);
654 		}
655 		/* FALLTHROUGH */
656 	default:
657 		(void)snprintf(line, sizeof(line), "(%d) %s",
658 		    sa->sa_family, any_ntoa(sa));
659 		break;
660 	}
661 	return (line);
662 }
663 
664 char *
665 routename4(in_addr_t in)
666 {
667 	char		*cp = NULL;
668 	struct in_addr	 ina;
669 	struct hostent	*hp;
670 
671 	if (in == INADDR_ANY)
672 		cp = "default";
673 	if (!cp && !nflag) {
674 		if ((hp = gethostbyaddr((char *)&in,
675 		    sizeof(in), AF_INET)) != NULL) {
676 			if ((cp = strchr(hp->h_name, '.')) &&
677 			    !strcmp(cp + 1, domain))
678 				*cp = '\0';
679 			cp = hp->h_name;
680 		}
681 	}
682 	ina.s_addr = in;
683 	strlcpy(line, cp ? cp : inet_ntoa(ina), sizeof(line));
684 
685 	return (line);
686 }
687 
688 char *
689 routename6(struct sockaddr_in6 *sin6)
690 {
691 	int	 niflags = 0;
692 
693 	if (nflag)
694 		niflags |= NI_NUMERICHOST;
695 	else
696 		niflags |= NI_NOFQDN;
697 
698 	if (getnameinfo((struct sockaddr *)sin6, sin6->sin6_len,
699 	    line, sizeof(line), NULL, 0, niflags) != 0)
700 		strncpy(line, "invalid", sizeof(line));
701 
702 	return (line);
703 }
704 
705 /*
706  * Return the name of the network whose address is given.
707  * The address is assumed to be that of a net or subnet, not a host.
708  */
709 char *
710 netname4(in_addr_t in, struct sockaddr_in *maskp)
711 {
712 	char *cp = NULL;
713 	struct netent *np = NULL;
714 	in_addr_t mask;
715 	int mbits;
716 
717 	in = ntohl(in);
718 	mask = maskp && maskp->sin_len != 0 ? ntohl(maskp->sin_addr.s_addr) : 0;
719 	if (!nflag && in != INADDR_ANY) {
720 		if ((np = getnetbyaddr(in, AF_INET)) != NULL)
721 			cp = np->n_name;
722 	}
723 	if (in == INADDR_ANY && mask == INADDR_ANY)
724 		cp = "default";
725 	mbits = mask ? 33 - ffs(mask) : 0;
726 	if (cp)
727 		strlcpy(line, cp, sizeof(line));
728 #define C(x)	((x) & 0xff)
729 	else if (mbits < 9)
730 		snprintf(line, sizeof(line), "%u/%d", C(in >> 24), mbits);
731 	else if (mbits < 17)
732 		snprintf(line, sizeof(line), "%u.%u/%d",
733 		    C(in >> 24) , C(in >> 16), mbits);
734 	else if (mbits < 25)
735 		snprintf(line, sizeof(line), "%u.%u.%u/%d",
736 		    C(in >> 24), C(in >> 16), C(in >> 8), mbits);
737 	else
738 		snprintf(line, sizeof(line), "%u.%u.%u.%u/%d", C(in >> 24),
739 		    C(in >> 16), C(in >> 8), C(in), mbits);
740 #undef C
741 	return (line);
742 }
743 
744 char *
745 netname6(struct sockaddr_in6 *sa6, struct sockaddr_in6 *mask)
746 {
747 	struct sockaddr_in6 sin6;
748 	u_char *p;
749 	int masklen, final = 0, illegal = 0;
750 	int i, lim, flag, error;
751 	char hbuf[NI_MAXHOST];
752 
753 	sin6 = *sa6;
754 
755 	flag = 0;
756 	masklen = 0;
757 	if (mask) {
758 		lim = mask->sin6_len - offsetof(struct sockaddr_in6, sin6_addr);
759 		lim = lim < (int)sizeof(struct in6_addr) ?
760 		    lim : sizeof(struct in6_addr);
761 		for (p = (u_char *)&mask->sin6_addr, i = 0; i < lim; p++) {
762 			if (final && *p) {
763 				illegal++;
764 				sin6.sin6_addr.s6_addr[i++] = 0x00;
765 				continue;
766 			}
767 
768 			switch (*p & 0xff) {
769 			case 0xff:
770 				masklen += 8;
771 				break;
772 			case 0xfe:
773 				masklen += 7;
774 				final++;
775 				break;
776 			case 0xfc:
777 				masklen += 6;
778 				final++;
779 				break;
780 			case 0xf8:
781 				masklen += 5;
782 				final++;
783 				break;
784 			case 0xf0:
785 				masklen += 4;
786 				final++;
787 				break;
788 			case 0xe0:
789 				masklen += 3;
790 				final++;
791 				break;
792 			case 0xc0:
793 				masklen += 2;
794 				final++;
795 				break;
796 			case 0x80:
797 				masklen += 1;
798 				final++;
799 				break;
800 			case 0x00:
801 				final++;
802 				break;
803 			default:
804 				final++;
805 				illegal++;
806 				break;
807 			}
808 
809 			if (!illegal)
810 				sin6.sin6_addr.s6_addr[i++] &= *p;
811 			else
812 				sin6.sin6_addr.s6_addr[i++] = 0x00;
813 		}
814 		while (i < sizeof(struct in6_addr))
815 			sin6.sin6_addr.s6_addr[i++] = 0x00;
816 	} else
817 		masklen = 128;
818 
819 	if (masklen == 0 && IN6_IS_ADDR_UNSPECIFIED(&sin6.sin6_addr))
820 		return ("default");
821 
822 	if (illegal)
823 		warnx("illegal prefixlen");
824 
825 	if (nflag)
826 		flag |= NI_NUMERICHOST;
827 	error = getnameinfo((struct sockaddr *)&sin6, sin6.sin6_len,
828 	    hbuf, sizeof(hbuf), NULL, 0, flag);
829 	if (error)
830 		snprintf(hbuf, sizeof(hbuf), "invalid");
831 
832 	snprintf(line, sizeof(line), "%s/%d", hbuf, masklen);
833 	return (line);
834 }
835 
836 /*
837  * Return the name of the network whose address is given.
838  * The address is assumed to be that of a net or subnet, not a host.
839  */
840 char *
841 netname(struct sockaddr *sa, struct sockaddr *mask)
842 {
843 	switch (sa->sa_family) {
844 	case AF_INET:
845 		return netname4(((struct sockaddr_in *)sa)->sin_addr.s_addr,
846 		    (struct sockaddr_in *)mask);
847 	case AF_INET6:
848 		return netname6((struct sockaddr_in6 *)sa,
849 		    (struct sockaddr_in6 *)mask);
850 	case AF_LINK:
851 		return (link_print(sa));
852 	case AF_MPLS:
853 		return (label_print(sa));
854 	default:
855 		snprintf(line, sizeof(line), "af %d: %s",
856 		    sa->sa_family, any_ntoa(sa));
857 		break;
858 	}
859 	return (line);
860 }
861 
862 static const char hexlist[] = "0123456789abcdef";
863 
864 char *
865 any_ntoa(const struct sockaddr *sa)
866 {
867 	static char obuf[240];
868 	const char *in = sa->sa_data;
869 	char *out = obuf;
870 	int len = sa->sa_len - offsetof(struct sockaddr, sa_data);
871 
872 	*out++ = 'Q';
873 	do {
874 		*out++ = hexlist[(*in >> 4) & 15];
875 		*out++ = hexlist[(*in++)    & 15];
876 		*out++ = '.';
877 	} while (--len > 0 && (out + 3) < &obuf[sizeof(obuf) - 1]);
878 	out[-1] = '\0';
879 	return (obuf);
880 }
881 
882 char *
883 link_print(struct sockaddr *sa)
884 {
885 	struct sockaddr_dl	*sdl = (struct sockaddr_dl *)sa;
886 	u_char			*lla = (u_char *)sdl->sdl_data + sdl->sdl_nlen;
887 
888 	if (sdl->sdl_nlen == 0 && sdl->sdl_alen == 0 &&
889 	    sdl->sdl_slen == 0) {
890 		(void)snprintf(line, sizeof(line), "link#%d", sdl->sdl_index);
891 		return (line);
892 	}
893 	switch (sdl->sdl_type) {
894 	case IFT_ETHER:
895 	case IFT_CARP:
896 		return (ether_ntoa((struct ether_addr *)lla));
897 	default:
898 		return (link_ntoa(sdl));
899 	}
900 }
901 
902 char *
903 mpls_op(u_int32_t type)
904 {
905 	switch (type & (MPLS_OP_PUSH | MPLS_OP_POP | MPLS_OP_SWAP)) {
906 	case MPLS_OP_LOCAL:
907 		return ("LOCAL");
908 	case MPLS_OP_POP:
909 		return ("POP");
910 	case MPLS_OP_SWAP:
911 		return ("SWAP");
912 	case MPLS_OP_PUSH:
913 		return ("PUSH");
914 	default:
915 		return ("?");
916 	}
917 }
918 
919 char *
920 label_print(struct sockaddr *sa)
921 {
922 	struct sockaddr_mpls	*smpls = (struct sockaddr_mpls *)sa;
923 
924 	if (smpls)
925 		(void)snprintf(line, sizeof(line), "%u",
926 		    ntohl(smpls->smpls_label) >> MPLS_LABEL_OFFSET);
927 	else
928 		(void)snprintf(line, sizeof(line), "-");
929 
930 	return (line);
931 }
932 
933 void
934 index_pfk(struct sadb_msg *msg, void **headers)
935 {
936 	struct sadb_ext	*ext;
937 
938 	for (ext = (struct sadb_ext *)(msg + 1);
939 	    (size_t)((u_int8_t *)ext - (u_int8_t *)msg) <
940 	    msg->sadb_msg_len * PFKEYV2_CHUNK && ext->sadb_ext_len > 0;
941 	    ext = (struct sadb_ext *)((u_int8_t *)ext +
942 	    ext->sadb_ext_len * PFKEYV2_CHUNK)) {
943 		switch (ext->sadb_ext_type) {
944 		case SADB_EXT_ADDRESS_SRC:
945 			headers[SADB_EXT_ADDRESS_SRC] = (void *)ext;
946 			break;
947 		case SADB_EXT_ADDRESS_DST:
948 			headers[SADB_EXT_ADDRESS_DST] = (void *)ext;
949 			break;
950 		case SADB_X_EXT_PROTOCOL:
951 			headers[SADB_X_EXT_PROTOCOL] = (void *)ext;
952 			break;
953 		case SADB_X_EXT_SRC_FLOW:
954 			headers[SADB_X_EXT_SRC_FLOW] = (void *)ext;
955 			break;
956 		case SADB_X_EXT_DST_FLOW:
957 			headers[SADB_X_EXT_DST_FLOW] = (void *)ext;
958 			break;
959 		case SADB_X_EXT_SRC_MASK:
960 			headers[SADB_X_EXT_SRC_MASK] = (void *)ext;
961 			break;
962 		case SADB_X_EXT_DST_MASK:
963 			headers[SADB_X_EXT_DST_MASK] = (void *)ext;
964 			break;
965 		case SADB_X_EXT_FLOW_TYPE:
966 			headers[SADB_X_EXT_FLOW_TYPE] = (void *)ext;
967 			break;
968 		default:
969 			/* Ignore. */
970 			break;
971 		}
972 	}
973 }
974