1 /* $OpenBSD: show.c,v 1.96 2014/05/08 09:28:08 mpi Exp $ */ 2 /* $NetBSD: show.c,v 1.1 1996/11/15 18:01:41 gwr Exp $ */ 3 4 /* 5 * Copyright (c) 1983, 1988, 1993 6 * The Regents of the University of California. All rights reserved. 7 * 8 * Redistribution and use in source and binary forms, with or without 9 * modification, are permitted provided that the following conditions 10 * are met: 11 * 1. Redistributions of source code must retain the above copyright 12 * notice, this list of conditions and the following disclaimer. 13 * 2. Redistributions in binary form must reproduce the above copyright 14 * notice, this list of conditions and the following disclaimer in the 15 * documentation and/or other materials provided with the distribution. 16 * 3. Neither the name of the University nor the names of its contributors 17 * may be used to endorse or promote products derived from this software 18 * without specific prior written permission. 19 * 20 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 21 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 22 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 23 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 24 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 25 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 26 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 27 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 28 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 29 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 30 * SUCH DAMAGE. 31 */ 32 33 #include <sys/param.h> 34 #include <sys/socket.h> 35 #include <sys/sysctl.h> 36 37 #include <net/if.h> 38 #include <net/if_dl.h> 39 #include <net/if_types.h> 40 #include <net/pfkeyv2.h> 41 #include <net/route.h> 42 #include <netinet/in.h> 43 #include <netinet/if_ether.h> 44 #include <netinet/ip_ipsp.h> 45 #include <netmpls/mpls.h> 46 #include <arpa/inet.h> 47 48 #include <err.h> 49 #include <errno.h> 50 #include <netdb.h> 51 #include <stdio.h> 52 #include <stddef.h> 53 #include <stdlib.h> 54 #include <string.h> 55 #include <unistd.h> 56 57 #include "show.h" 58 59 char *any_ntoa(const struct sockaddr *); 60 char *link_print(struct sockaddr *); 61 char *label_print(struct sockaddr *); 62 63 #define ROUNDUP(a) \ 64 ((a) > 0 ? (1 + (((a) - 1) | (sizeof(long) - 1))) : sizeof(long)) 65 #define ADVANCE(x, n) (x += ROUNDUP((n)->sa_len)) 66 67 #define PFKEYV2_CHUNK sizeof(u_int64_t) 68 69 /* 70 * Definitions for showing gateway flags. 71 */ 72 struct bits { 73 int b_mask; 74 char b_val; 75 }; 76 static const struct bits bits[] = { 77 { RTF_UP, 'U' }, 78 { RTF_GATEWAY, 'G' }, 79 { RTF_HOST, 'H' }, 80 { RTF_REJECT, 'R' }, 81 { RTF_BLACKHOLE, 'B' }, 82 { RTF_DYNAMIC, 'D' }, 83 { RTF_MODIFIED, 'M' }, 84 { RTF_DONE, 'd' }, /* Completed -- for routing messages only */ 85 { RTF_MASK, 'm' }, /* Mask Present -- for routing messages only */ 86 { RTF_CLONING, 'C' }, 87 { RTF_XRESOLVE, 'X' }, 88 { RTF_LLINFO, 'L' }, 89 { RTF_STATIC, 'S' }, 90 { RTF_PROTO1, '1' }, 91 { RTF_PROTO2, '2' }, 92 { RTF_PROTO3, '3' }, 93 { RTF_CLONED, 'c' }, 94 { RTF_MPATH, 'P' }, 95 { RTF_MPLS, 'T' }, 96 { RTF_LOCAL, 'l' }, 97 { RTF_BROADCAST, 'b' }, 98 { 0 } 99 }; 100 101 int WID_DST(int); 102 void pr_rthdr(int); 103 void p_rtentry(struct rt_msghdr *); 104 void p_pfkentry(struct sadb_msg *); 105 void pr_family(int); 106 void p_encap(struct sockaddr *, struct sockaddr *, int); 107 void p_protocol(struct sadb_protocol *, struct sockaddr *, struct 108 sadb_protocol *, int); 109 void p_sockaddr(struct sockaddr *, struct sockaddr *, int, int); 110 void p_sockaddr_mpls(struct sockaddr *, struct sockaddr *, int, int); 111 void p_flags(int, char *); 112 char *routename4(in_addr_t); 113 char *routename6(struct sockaddr_in6 *); 114 char *netname4(in_addr_t, struct sockaddr_in *); 115 char *netname6(struct sockaddr_in6 *, struct sockaddr_in6 *); 116 void index_pfk(struct sadb_msg *, void **); 117 118 /* 119 * Print routing tables. 120 */ 121 void 122 p_rttables(int af, u_int tableid, int hastable) 123 { 124 struct rt_msghdr *rtm; 125 struct sadb_msg *msg; 126 char *buf = NULL, *next, *lim = NULL; 127 size_t needed; 128 int mib[7], mcnt; 129 struct sockaddr *sa; 130 131 mib[0] = CTL_NET; 132 mib[1] = PF_ROUTE; 133 mib[2] = 0; 134 mib[3] = af; 135 mib[4] = NET_RT_DUMP; 136 mib[5] = 0; 137 if (hastable) { 138 mib[6] = tableid; 139 mcnt = 7; 140 } else 141 mcnt = 6; 142 143 while (1) { 144 if (sysctl(mib, mcnt, NULL, &needed, NULL, 0) == -1) 145 err(1, "route-sysctl-estimate"); 146 if (needed == 0) 147 break; 148 if ((buf = realloc(buf, needed)) == NULL) 149 err(1, NULL); 150 if (sysctl(mib, mcnt, buf, &needed, NULL, 0) == -1) { 151 if (errno == ENOMEM) 152 continue; 153 err(1, "sysctl of routing table"); 154 } 155 lim = buf + needed; 156 break; 157 } 158 159 printf("Routing tables\n"); 160 161 if (buf) { 162 for (next = buf; next < lim; next += rtm->rtm_msglen) { 163 rtm = (struct rt_msghdr *)next; 164 if (rtm->rtm_version != RTM_VERSION) 165 continue; 166 sa = (struct sockaddr *)(next + rtm->rtm_hdrlen); 167 if (af != AF_UNSPEC && sa->sa_family != af) 168 continue; 169 p_rtentry(rtm); 170 } 171 free(buf); 172 buf = NULL; 173 } 174 175 if (af != 0 && af != PF_KEY) 176 return; 177 178 mib[0] = CTL_NET; 179 mib[1] = PF_KEY; 180 mib[2] = PF_KEY_V2; 181 mib[3] = NET_KEY_SPD_DUMP; 182 mib[4] = mib[5] = 0; 183 while (1) { 184 if (sysctl(mib, 4, NULL, &needed, NULL, 0) == -1) { 185 if (errno == ENOPROTOOPT) 186 return; 187 err(1, "spd-sysctl-estimate"); 188 } 189 if (needed == 0) 190 break; 191 if ((buf = realloc(buf, needed)) == NULL) 192 err(1, NULL); 193 if (sysctl(mib, 4, buf, &needed, NULL, 0) == -1) { 194 if (errno == ENOMEM) 195 continue; 196 err(1,"sysctl of spd"); 197 } 198 lim = buf + needed; 199 break; 200 } 201 202 if (buf) { 203 printf("\nEncap:\n"); 204 205 for (next = buf; next < lim; next += msg->sadb_msg_len * 206 PFKEYV2_CHUNK) { 207 msg = (struct sadb_msg *)next; 208 if (msg->sadb_msg_len == 0) 209 break; 210 p_pfkentry(msg); 211 } 212 free(buf); 213 buf = NULL; 214 } 215 } 216 217 /* 218 * column widths; each followed by one space 219 * width of destination/gateway column 220 * strlen("fe80::aaaa:bbbb:cccc:dddd@gif0") == 30, strlen("/128") == 4 221 */ 222 #define WID_GW(af) ((af) == AF_INET6 ? (nflag ? 30 : 18) : 18) 223 224 int 225 WID_DST(int af) 226 { 227 228 if (nflag) 229 switch (af) { 230 case AF_MPLS: 231 return 9; 232 case AF_INET6: 233 return 34; 234 default: 235 return 18; 236 } 237 else 238 switch (af) { 239 case AF_MPLS: 240 return 9; 241 default: 242 return 18; 243 } 244 } 245 246 /* 247 * Print header for routing table columns. 248 */ 249 void 250 pr_rthdr(int af) 251 { 252 switch (af) { 253 case PF_KEY: 254 printf("%-18s %-5s %-18s %-5s %-5s %-22s\n", 255 "Source", "Port", "Destination", 256 "Port", "Proto", "SA(Address/Proto/Type/Direction)"); 257 break; 258 case PF_MPLS: 259 printf("%-9s %-9s %-6s %-18s %-6.6s %5.5s %8.8s %5.5s %4.4s %s\n", 260 "In label", "Out label", "Op", "Gateway", 261 "Flags", "Refs", "Use", "Mtu", "Prio", "Interface"); 262 break; 263 default: 264 printf("%-*.*s %-*.*s %-6.6s %5.5s %8.8s %5.5s %4.4s %s", 265 WID_DST(af), WID_DST(af), "Destination", 266 WID_GW(af), WID_GW(af), "Gateway", 267 "Flags", "Refs", "Use", "Mtu", "Prio", "Iface"); 268 if (verbose) 269 printf(" %s", "Label"); 270 putchar('\n'); 271 break; 272 } 273 } 274 275 static void 276 get_rtaddrs(int addrs, struct sockaddr *sa, struct sockaddr **rti_info) 277 { 278 int i; 279 280 for (i = 0; i < RTAX_MAX; i++) { 281 if (addrs & (1 << i)) { 282 rti_info[i] = sa; 283 sa = (struct sockaddr *)((char *)(sa) + 284 ROUNDUP(sa->sa_len)); 285 } else 286 rti_info[i] = NULL; 287 } 288 } 289 290 /* 291 * Print a routing table entry. 292 */ 293 void 294 p_rtentry(struct rt_msghdr *rtm) 295 { 296 static int old_af = -1; 297 struct sockaddr *sa = (struct sockaddr *)((char *)rtm + rtm->rtm_hdrlen); 298 struct sockaddr *mask, *rti_info[RTAX_MAX]; 299 char ifbuf[IF_NAMESIZE]; 300 char *label; 301 302 if (sa->sa_family == AF_KEY) 303 return; 304 305 get_rtaddrs(rtm->rtm_addrs, sa, rti_info); 306 307 if (Fflag && rti_info[RTAX_GATEWAY]->sa_family != sa->sa_family) { 308 return; 309 } 310 311 if (strlen(so_label.rtlabel.sr_label)) { 312 if (!rti_info[RTAX_LABEL]) 313 return; 314 label = ((struct sockaddr_rtlabel *)rti_info[RTAX_LABEL])-> 315 sr_label; 316 if (strcmp(label, so_label.rtlabel.sr_label)) 317 return; 318 } 319 320 if (old_af != sa->sa_family) { 321 old_af = sa->sa_family; 322 pr_family(sa->sa_family); 323 pr_rthdr(sa->sa_family); 324 } 325 326 mask = rti_info[RTAX_NETMASK]; 327 if ((sa = rti_info[RTAX_DST]) == NULL) 328 return; 329 330 p_sockaddr(sa, mask, rtm->rtm_flags, WID_DST(sa->sa_family)); 331 p_sockaddr_mpls(sa, rti_info[RTAX_SRC], rtm->rtm_mpls, 332 WID_DST(sa->sa_family)); 333 334 p_sockaddr(rti_info[RTAX_GATEWAY], NULL, RTF_HOST, 335 WID_GW(sa->sa_family)); 336 337 p_flags(rtm->rtm_flags, "%-6.6s "); 338 printf("%5u %8llu ", rtm->rtm_rmx.rmx_refcnt, 339 rtm->rtm_rmx.rmx_pksent); 340 if (rtm->rtm_rmx.rmx_mtu) 341 printf("%5u ", rtm->rtm_rmx.rmx_mtu); 342 else 343 printf("%5s ", "-"); 344 putchar((rtm->rtm_rmx.rmx_locks & RTV_MTU) ? 'L' : ' '); 345 printf(" %2d %-5.16s", rtm->rtm_priority, 346 if_indextoname(rtm->rtm_index, ifbuf)); 347 if (verbose && rti_info[RTAX_LABEL]) 348 printf(" %s", ((struct sockaddr_rtlabel *) 349 rti_info[RTAX_LABEL])->sr_label); 350 putchar('\n'); 351 } 352 353 /* 354 * Print a pfkey/encap entry. 355 */ 356 void 357 p_pfkentry(struct sadb_msg *msg) 358 { 359 static int old = 0; 360 struct sadb_address *saddr; 361 struct sadb_protocol *sap, *saft; 362 struct sockaddr *sa, *mask; 363 void *headers[SADB_EXT_MAX + 1]; 364 365 if (!old) { 366 pr_rthdr(PF_KEY); 367 old++; 368 } 369 370 bzero(headers, sizeof(headers)); 371 index_pfk(msg, headers); 372 373 /* These are always set */ 374 saddr = headers[SADB_X_EXT_SRC_FLOW]; 375 sa = (struct sockaddr *)(saddr + 1); 376 saddr = headers[SADB_X_EXT_SRC_MASK]; 377 mask = (struct sockaddr *)(saddr + 1); 378 p_encap(sa, mask, WID_DST(sa->sa_family)); 379 380 /* These are always set, too. */ 381 saddr = headers[SADB_X_EXT_DST_FLOW]; 382 sa = (struct sockaddr *)(saddr + 1); 383 saddr = headers[SADB_X_EXT_DST_MASK]; 384 mask = (struct sockaddr *)(saddr + 1); 385 p_encap(sa, mask, WID_DST(sa->sa_family)); 386 387 /* Bypass and deny flows do not set SADB_EXT_ADDRESS_DST! */ 388 sap = headers[SADB_X_EXT_PROTOCOL]; 389 saft = headers[SADB_X_EXT_FLOW_TYPE]; 390 saddr = headers[SADB_EXT_ADDRESS_DST]; 391 if (saddr) 392 sa = (struct sockaddr *)(saddr + 1); 393 else 394 sa = NULL; 395 p_protocol(sap, sa, saft, msg->sadb_msg_satype); 396 397 printf("\n"); 398 } 399 400 /* 401 * Print address family header before a section of the routing table. 402 */ 403 void 404 pr_family(int af) 405 { 406 char *afname; 407 408 switch (af) { 409 case AF_INET: 410 afname = "Internet"; 411 break; 412 case AF_INET6: 413 afname = "Internet6"; 414 break; 415 case PF_KEY: 416 afname = "Encap"; 417 break; 418 case AF_MPLS: 419 afname = "MPLS"; 420 break; 421 default: 422 afname = NULL; 423 break; 424 } 425 if (afname) 426 printf("\n%s:\n", afname); 427 else 428 printf("\nProtocol Family %d:\n", af); 429 } 430 431 void 432 p_encap(struct sockaddr *sa, struct sockaddr *mask, int width) 433 { 434 char *cp; 435 unsigned short port = 0; 436 437 if (mask) 438 cp = netname(sa, mask); 439 else 440 cp = routename(sa); 441 switch (sa->sa_family) { 442 case AF_INET: 443 port = ntohs(((struct sockaddr_in *)sa)->sin_port); 444 break; 445 case AF_INET6: 446 port = ntohs(((struct sockaddr_in6 *)sa)->sin6_port); 447 break; 448 } 449 if (width < 0) 450 printf("%s", cp); 451 else { 452 if (nflag) 453 printf("%-*s %-5u ", width, cp, port); 454 else 455 printf("%-*.*s %-5u ", width, width, cp, port); 456 } 457 } 458 459 void 460 p_protocol(struct sadb_protocol *sap, struct sockaddr *sa, struct sadb_protocol 461 *saft, int proto) 462 { 463 printf("%-6u", sap->sadb_protocol_proto); 464 465 if (sa) 466 p_sockaddr(sa, NULL, 0, -1); 467 else 468 printf("none"); 469 470 switch (proto) { 471 case SADB_SATYPE_ESP: 472 printf("/esp"); 473 break; 474 case SADB_SATYPE_AH: 475 printf("/ah"); 476 break; 477 case SADB_X_SATYPE_IPCOMP: 478 printf("/ipcomp"); 479 break; 480 case SADB_X_SATYPE_IPIP: 481 printf("/ipip"); 482 break; 483 default: 484 printf("/<unknown>"); 485 } 486 487 switch(saft->sadb_protocol_proto) { 488 case SADB_X_FLOW_TYPE_USE: 489 printf("/use"); 490 break; 491 case SADB_X_FLOW_TYPE_REQUIRE: 492 printf("/require"); 493 break; 494 case SADB_X_FLOW_TYPE_ACQUIRE: 495 printf("/acquire"); 496 break; 497 case SADB_X_FLOW_TYPE_DENY: 498 printf("/deny"); 499 break; 500 case SADB_X_FLOW_TYPE_BYPASS: 501 printf("/bypass"); 502 break; 503 case SADB_X_FLOW_TYPE_DONTACQ: 504 printf("/dontacq"); 505 break; 506 default: 507 printf("/<unknown type>"); 508 } 509 510 switch(saft->sadb_protocol_direction) { 511 case IPSP_DIRECTION_IN: 512 printf("/in"); 513 break; 514 case IPSP_DIRECTION_OUT: 515 printf("/out"); 516 break; 517 default: 518 printf("/<unknown>"); 519 } 520 } 521 522 void 523 p_sockaddr(struct sockaddr *sa, struct sockaddr *mask, int flags, int width) 524 { 525 char *cp; 526 527 switch (sa->sa_family) { 528 case AF_INET6: 529 { 530 struct sockaddr_in6 *sa6 = (struct sockaddr_in6 *)sa; 531 struct in6_addr *in6 = &sa6->sin6_addr; 532 533 /* 534 * XXX: This is a special workaround for KAME kernels. 535 * sin6_scope_id field of SA should be set in the future. 536 */ 537 if (IN6_IS_ADDR_LINKLOCAL(in6) || 538 IN6_IS_ADDR_MC_LINKLOCAL(in6) || 539 IN6_IS_ADDR_MC_INTFACELOCAL(in6)) { 540 /* XXX: override is ok? */ 541 sa6->sin6_scope_id = (u_int32_t)ntohs(*(u_short *) 542 &in6->s6_addr[2]); 543 *(u_short *)&in6->s6_addr[2] = 0; 544 } 545 if (flags & RTF_HOST) 546 cp = routename((struct sockaddr *)sa6); 547 else 548 cp = netname((struct sockaddr *)sa6, mask); 549 break; 550 } 551 case AF_MPLS: 552 return; 553 default: 554 if ((flags & RTF_HOST) || mask == NULL) 555 cp = routename(sa); 556 else 557 cp = netname(sa, mask); 558 break; 559 } 560 if (width < 0) 561 printf("%s", cp); 562 else { 563 if (nflag) 564 printf("%-*s ", width, cp); 565 else 566 printf("%-*.*s ", width, width, cp); 567 } 568 } 569 570 static char line[MAXHOSTNAMELEN]; 571 static char domain[MAXHOSTNAMELEN]; 572 573 void 574 p_sockaddr_mpls(struct sockaddr *in, struct sockaddr *out, int flags, int width) 575 { 576 if (in->sa_family != AF_MPLS) 577 return; 578 579 if (flags & MPLS_OP_POP || flags == MPLS_OP_LOCAL) { 580 printf("%-*s ", width, label_print(in)); 581 printf("%-*s ", width, label_print(NULL)); 582 } else { 583 printf("%-*s ", width, label_print(in)); 584 printf("%-*s ", width, label_print(out)); 585 } 586 587 printf("%-6s ", mpls_op(flags)); 588 } 589 590 void 591 p_flags(int f, char *format) 592 { 593 char name[33], *flags; 594 const struct bits *p = bits; 595 596 for (flags = name; p->b_mask && flags < &name[sizeof(name) - 2]; p++) 597 if (p->b_mask & f) 598 *flags++ = p->b_val; 599 *flags = '\0'; 600 printf(format, name); 601 } 602 603 char * 604 routename(struct sockaddr *sa) 605 { 606 char *cp = NULL; 607 static int first = 1; 608 609 if (first) { 610 first = 0; 611 if (gethostname(domain, sizeof(domain)) == 0 && 612 (cp = strchr(domain, '.'))) 613 (void)strlcpy(domain, cp + 1, sizeof(domain)); 614 else 615 domain[0] = '\0'; 616 cp = NULL; 617 } 618 619 if (sa->sa_len == 0) { 620 (void)strlcpy(line, "default", sizeof(line)); 621 return (line); 622 } 623 624 switch (sa->sa_family) { 625 case AF_INET: 626 return 627 (routename4(((struct sockaddr_in *)sa)->sin_addr.s_addr)); 628 629 case AF_INET6: 630 { 631 struct sockaddr_in6 sin6; 632 633 memset(&sin6, 0, sizeof(sin6)); 634 memcpy(&sin6, sa, sa->sa_len); 635 sin6.sin6_len = sizeof(struct sockaddr_in6); 636 sin6.sin6_family = AF_INET6; 637 if (sa->sa_len == sizeof(struct sockaddr_in6) && 638 (IN6_IS_ADDR_LINKLOCAL(&sin6.sin6_addr) || 639 IN6_IS_ADDR_MC_LINKLOCAL(&sin6.sin6_addr) || 640 IN6_IS_ADDR_MC_INTFACELOCAL(&sin6.sin6_addr)) && 641 sin6.sin6_scope_id == 0) { 642 sin6.sin6_scope_id = 643 ntohs(*(u_int16_t *)&sin6.sin6_addr.s6_addr[2]); 644 sin6.sin6_addr.s6_addr[2] = 0; 645 sin6.sin6_addr.s6_addr[3] = 0; 646 } 647 return (routename6(&sin6)); 648 } 649 650 case AF_LINK: 651 return (link_print(sa)); 652 case AF_MPLS: 653 return (label_print(sa)); 654 case AF_UNSPEC: 655 if (sa->sa_len == sizeof(struct sockaddr_rtlabel)) { 656 static char name[RTLABEL_LEN]; 657 struct sockaddr_rtlabel *sr; 658 659 sr = (struct sockaddr_rtlabel *)sa; 660 (void)strlcpy(name, sr->sr_label, sizeof(name)); 661 return (name); 662 } 663 /* FALLTHROUGH */ 664 default: 665 (void)snprintf(line, sizeof(line), "(%d) %s", 666 sa->sa_family, any_ntoa(sa)); 667 break; 668 } 669 return (line); 670 } 671 672 char * 673 routename4(in_addr_t in) 674 { 675 char *cp = NULL; 676 struct in_addr ina; 677 struct hostent *hp; 678 679 if (in == INADDR_ANY) 680 cp = "default"; 681 if (!cp && !nflag) { 682 if ((hp = gethostbyaddr((char *)&in, 683 sizeof(in), AF_INET)) != NULL) { 684 if ((cp = strchr(hp->h_name, '.')) && 685 !strcmp(cp + 1, domain)) 686 *cp = '\0'; 687 cp = hp->h_name; 688 } 689 } 690 ina.s_addr = in; 691 strlcpy(line, cp ? cp : inet_ntoa(ina), sizeof(line)); 692 693 return (line); 694 } 695 696 char * 697 routename6(struct sockaddr_in6 *sin6) 698 { 699 int niflags = 0; 700 701 if (nflag) 702 niflags |= NI_NUMERICHOST; 703 else 704 niflags |= NI_NOFQDN; 705 706 if (getnameinfo((struct sockaddr *)sin6, sin6->sin6_len, 707 line, sizeof(line), NULL, 0, niflags) != 0) 708 strncpy(line, "invalid", sizeof(line)); 709 710 return (line); 711 } 712 713 /* 714 * Return the name of the network whose address is given. 715 * The address is assumed to be that of a net or subnet, not a host. 716 */ 717 char * 718 netname4(in_addr_t in, struct sockaddr_in *maskp) 719 { 720 char *cp = NULL; 721 struct netent *np = NULL; 722 in_addr_t mask; 723 int mbits; 724 725 in = ntohl(in); 726 mask = maskp && maskp->sin_len != 0 ? ntohl(maskp->sin_addr.s_addr) : 0; 727 if (!nflag && in != INADDR_ANY) { 728 if ((np = getnetbyaddr(in, AF_INET)) != NULL) 729 cp = np->n_name; 730 } 731 if (in == INADDR_ANY && mask == INADDR_ANY) 732 cp = "default"; 733 mbits = mask ? 33 - ffs(mask) : 0; 734 if (cp) 735 strlcpy(line, cp, sizeof(line)); 736 #define C(x) ((x) & 0xff) 737 else if (mbits < 9) 738 snprintf(line, sizeof(line), "%u/%d", C(in >> 24), mbits); 739 else if (mbits < 17) 740 snprintf(line, sizeof(line), "%u.%u/%d", 741 C(in >> 24) , C(in >> 16), mbits); 742 else if (mbits < 25) 743 snprintf(line, sizeof(line), "%u.%u.%u/%d", 744 C(in >> 24), C(in >> 16), C(in >> 8), mbits); 745 else 746 snprintf(line, sizeof(line), "%u.%u.%u.%u/%d", C(in >> 24), 747 C(in >> 16), C(in >> 8), C(in), mbits); 748 #undef C 749 return (line); 750 } 751 752 char * 753 netname6(struct sockaddr_in6 *sa6, struct sockaddr_in6 *mask) 754 { 755 struct sockaddr_in6 sin6; 756 u_char *p; 757 int masklen, final = 0, illegal = 0; 758 int i, lim, flag, error; 759 char hbuf[NI_MAXHOST]; 760 761 sin6 = *sa6; 762 763 flag = 0; 764 masklen = 0; 765 if (mask) { 766 lim = mask->sin6_len - offsetof(struct sockaddr_in6, sin6_addr); 767 lim = lim < (int)sizeof(struct in6_addr) ? 768 lim : (int)sizeof(struct in6_addr); 769 for (p = (u_char *)&mask->sin6_addr, i = 0; i < lim; p++) { 770 if (final && *p) { 771 illegal++; 772 sin6.sin6_addr.s6_addr[i++] = 0x00; 773 continue; 774 } 775 776 switch (*p & 0xff) { 777 case 0xff: 778 masklen += 8; 779 break; 780 case 0xfe: 781 masklen += 7; 782 final++; 783 break; 784 case 0xfc: 785 masklen += 6; 786 final++; 787 break; 788 case 0xf8: 789 masklen += 5; 790 final++; 791 break; 792 case 0xf0: 793 masklen += 4; 794 final++; 795 break; 796 case 0xe0: 797 masklen += 3; 798 final++; 799 break; 800 case 0xc0: 801 masklen += 2; 802 final++; 803 break; 804 case 0x80: 805 masklen += 1; 806 final++; 807 break; 808 case 0x00: 809 final++; 810 break; 811 default: 812 final++; 813 illegal++; 814 break; 815 } 816 817 if (!illegal) 818 sin6.sin6_addr.s6_addr[i++] &= *p; 819 else 820 sin6.sin6_addr.s6_addr[i++] = 0x00; 821 } 822 while (i < (int)sizeof(struct in6_addr)) 823 sin6.sin6_addr.s6_addr[i++] = 0x00; 824 } else 825 masklen = 128; 826 827 if (masklen == 0 && IN6_IS_ADDR_UNSPECIFIED(&sin6.sin6_addr)) 828 return ("default"); 829 830 if (illegal) 831 warnx("illegal prefixlen"); 832 833 if (nflag) 834 flag |= NI_NUMERICHOST; 835 error = getnameinfo((struct sockaddr *)&sin6, sin6.sin6_len, 836 hbuf, sizeof(hbuf), NULL, 0, flag); 837 if (error) 838 snprintf(hbuf, sizeof(hbuf), "invalid"); 839 840 snprintf(line, sizeof(line), "%s/%d", hbuf, masklen); 841 return (line); 842 } 843 844 /* 845 * Return the name of the network whose address is given. 846 * The address is assumed to be that of a net or subnet, not a host. 847 */ 848 char * 849 netname(struct sockaddr *sa, struct sockaddr *mask) 850 { 851 switch (sa->sa_family) { 852 case AF_INET: 853 return netname4(((struct sockaddr_in *)sa)->sin_addr.s_addr, 854 (struct sockaddr_in *)mask); 855 case AF_INET6: 856 return netname6((struct sockaddr_in6 *)sa, 857 (struct sockaddr_in6 *)mask); 858 case AF_LINK: 859 return (link_print(sa)); 860 case AF_MPLS: 861 return (label_print(sa)); 862 default: 863 snprintf(line, sizeof(line), "af %d: %s", 864 sa->sa_family, any_ntoa(sa)); 865 break; 866 } 867 return (line); 868 } 869 870 static const char hexlist[] = "0123456789abcdef"; 871 872 char * 873 any_ntoa(const struct sockaddr *sa) 874 { 875 static char obuf[240]; 876 const char *in = sa->sa_data; 877 char *out = obuf; 878 int len = sa->sa_len - offsetof(struct sockaddr, sa_data); 879 880 *out++ = 'Q'; 881 do { 882 *out++ = hexlist[(*in >> 4) & 15]; 883 *out++ = hexlist[(*in++) & 15]; 884 *out++ = '.'; 885 } while (--len > 0 && (out + 3) < &obuf[sizeof(obuf) - 1]); 886 out[-1] = '\0'; 887 return (obuf); 888 } 889 890 char * 891 link_print(struct sockaddr *sa) 892 { 893 struct sockaddr_dl *sdl = (struct sockaddr_dl *)sa; 894 u_char *lla = (u_char *)sdl->sdl_data + sdl->sdl_nlen; 895 896 if (sdl->sdl_nlen == 0 && sdl->sdl_alen == 0 && 897 sdl->sdl_slen == 0) { 898 (void)snprintf(line, sizeof(line), "link#%d", sdl->sdl_index); 899 return (line); 900 } 901 switch (sdl->sdl_type) { 902 case IFT_ETHER: 903 case IFT_CARP: 904 return (ether_ntoa((struct ether_addr *)lla)); 905 default: 906 return (link_ntoa(sdl)); 907 } 908 } 909 910 char * 911 mpls_op(u_int32_t type) 912 { 913 switch (type & (MPLS_OP_PUSH | MPLS_OP_POP | MPLS_OP_SWAP)) { 914 case MPLS_OP_LOCAL: 915 return ("LOCAL"); 916 case MPLS_OP_POP: 917 return ("POP"); 918 case MPLS_OP_SWAP: 919 return ("SWAP"); 920 case MPLS_OP_PUSH: 921 return ("PUSH"); 922 default: 923 return ("?"); 924 } 925 } 926 927 char * 928 label_print(struct sockaddr *sa) 929 { 930 struct sockaddr_mpls *smpls = (struct sockaddr_mpls *)sa; 931 932 if (smpls) 933 (void)snprintf(line, sizeof(line), "%u", 934 ntohl(smpls->smpls_label) >> MPLS_LABEL_OFFSET); 935 else 936 (void)snprintf(line, sizeof(line), "-"); 937 938 return (line); 939 } 940 941 void 942 index_pfk(struct sadb_msg *msg, void **headers) 943 { 944 struct sadb_ext *ext; 945 946 for (ext = (struct sadb_ext *)(msg + 1); 947 (size_t)((u_int8_t *)ext - (u_int8_t *)msg) < 948 msg->sadb_msg_len * PFKEYV2_CHUNK && ext->sadb_ext_len > 0; 949 ext = (struct sadb_ext *)((u_int8_t *)ext + 950 ext->sadb_ext_len * PFKEYV2_CHUNK)) { 951 switch (ext->sadb_ext_type) { 952 case SADB_EXT_ADDRESS_SRC: 953 headers[SADB_EXT_ADDRESS_SRC] = (void *)ext; 954 break; 955 case SADB_EXT_ADDRESS_DST: 956 headers[SADB_EXT_ADDRESS_DST] = (void *)ext; 957 break; 958 case SADB_X_EXT_PROTOCOL: 959 headers[SADB_X_EXT_PROTOCOL] = (void *)ext; 960 break; 961 case SADB_X_EXT_SRC_FLOW: 962 headers[SADB_X_EXT_SRC_FLOW] = (void *)ext; 963 break; 964 case SADB_X_EXT_DST_FLOW: 965 headers[SADB_X_EXT_DST_FLOW] = (void *)ext; 966 break; 967 case SADB_X_EXT_SRC_MASK: 968 headers[SADB_X_EXT_SRC_MASK] = (void *)ext; 969 break; 970 case SADB_X_EXT_DST_MASK: 971 headers[SADB_X_EXT_DST_MASK] = (void *)ext; 972 break; 973 case SADB_X_EXT_FLOW_TYPE: 974 headers[SADB_X_EXT_FLOW_TYPE] = (void *)ext; 975 break; 976 default: 977 /* Ignore. */ 978 break; 979 } 980 } 981 } 982