xref: /openbsd-src/sbin/route/show.c (revision 50b7afb2c2c0993b0894d4e34bf857cb13ed9c80)
1 /*	$OpenBSD: show.c,v 1.96 2014/05/08 09:28:08 mpi Exp $	*/
2 /*	$NetBSD: show.c,v 1.1 1996/11/15 18:01:41 gwr Exp $	*/
3 
4 /*
5  * Copyright (c) 1983, 1988, 1993
6  *	The Regents of the University of California.  All rights reserved.
7  *
8  * Redistribution and use in source and binary forms, with or without
9  * modification, are permitted provided that the following conditions
10  * are met:
11  * 1. Redistributions of source code must retain the above copyright
12  *    notice, this list of conditions and the following disclaimer.
13  * 2. Redistributions in binary form must reproduce the above copyright
14  *    notice, this list of conditions and the following disclaimer in the
15  *    documentation and/or other materials provided with the distribution.
16  * 3. Neither the name of the University nor the names of its contributors
17  *    may be used to endorse or promote products derived from this software
18  *    without specific prior written permission.
19  *
20  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
21  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
22  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
24  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
25  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
30  * SUCH DAMAGE.
31  */
32 
33 #include <sys/param.h>
34 #include <sys/socket.h>
35 #include <sys/sysctl.h>
36 
37 #include <net/if.h>
38 #include <net/if_dl.h>
39 #include <net/if_types.h>
40 #include <net/pfkeyv2.h>
41 #include <net/route.h>
42 #include <netinet/in.h>
43 #include <netinet/if_ether.h>
44 #include <netinet/ip_ipsp.h>
45 #include <netmpls/mpls.h>
46 #include <arpa/inet.h>
47 
48 #include <err.h>
49 #include <errno.h>
50 #include <netdb.h>
51 #include <stdio.h>
52 #include <stddef.h>
53 #include <stdlib.h>
54 #include <string.h>
55 #include <unistd.h>
56 
57 #include "show.h"
58 
59 char	*any_ntoa(const struct sockaddr *);
60 char	*link_print(struct sockaddr *);
61 char	*label_print(struct sockaddr *);
62 
63 #define ROUNDUP(a) \
64 	((a) > 0 ? (1 + (((a) - 1) | (sizeof(long) - 1))) : sizeof(long))
65 #define ADVANCE(x, n) (x += ROUNDUP((n)->sa_len))
66 
67 #define PFKEYV2_CHUNK sizeof(u_int64_t)
68 
69 /*
70  * Definitions for showing gateway flags.
71  */
72 struct bits {
73 	int	b_mask;
74 	char	b_val;
75 };
76 static const struct bits bits[] = {
77 	{ RTF_UP,	'U' },
78 	{ RTF_GATEWAY,	'G' },
79 	{ RTF_HOST,	'H' },
80 	{ RTF_REJECT,	'R' },
81 	{ RTF_BLACKHOLE, 'B' },
82 	{ RTF_DYNAMIC,	'D' },
83 	{ RTF_MODIFIED,	'M' },
84 	{ RTF_DONE,	'd' }, /* Completed -- for routing messages only */
85 	{ RTF_MASK,	'm' }, /* Mask Present -- for routing messages only */
86 	{ RTF_CLONING,	'C' },
87 	{ RTF_XRESOLVE,	'X' },
88 	{ RTF_LLINFO,	'L' },
89 	{ RTF_STATIC,	'S' },
90 	{ RTF_PROTO1,	'1' },
91 	{ RTF_PROTO2,	'2' },
92 	{ RTF_PROTO3,	'3' },
93 	{ RTF_CLONED,	'c' },
94 	{ RTF_MPATH,	'P' },
95 	{ RTF_MPLS,	'T' },
96 	{ RTF_LOCAL,	'l' },
97 	{ RTF_BROADCAST, 'b' },
98 	{ 0 }
99 };
100 
101 int	 WID_DST(int);
102 void	 pr_rthdr(int);
103 void	 p_rtentry(struct rt_msghdr *);
104 void	 p_pfkentry(struct sadb_msg *);
105 void	 pr_family(int);
106 void	 p_encap(struct sockaddr *, struct sockaddr *, int);
107 void	 p_protocol(struct sadb_protocol *, struct sockaddr *, struct
108 	     sadb_protocol *, int);
109 void	 p_sockaddr(struct sockaddr *, struct sockaddr *, int, int);
110 void	 p_sockaddr_mpls(struct sockaddr *, struct sockaddr *, int, int);
111 void	 p_flags(int, char *);
112 char	*routename4(in_addr_t);
113 char	*routename6(struct sockaddr_in6 *);
114 char	*netname4(in_addr_t, struct sockaddr_in *);
115 char	*netname6(struct sockaddr_in6 *, struct sockaddr_in6 *);
116 void	 index_pfk(struct sadb_msg *, void **);
117 
118 /*
119  * Print routing tables.
120  */
121 void
122 p_rttables(int af, u_int tableid, int hastable)
123 {
124 	struct rt_msghdr *rtm;
125 	struct sadb_msg *msg;
126 	char *buf = NULL, *next, *lim = NULL;
127 	size_t needed;
128 	int mib[7], mcnt;
129 	struct sockaddr *sa;
130 
131 	mib[0] = CTL_NET;
132 	mib[1] = PF_ROUTE;
133 	mib[2] = 0;
134 	mib[3] = af;
135 	mib[4] = NET_RT_DUMP;
136 	mib[5] = 0;
137 	if (hastable) {
138 		mib[6] = tableid;
139 		mcnt = 7;
140 	} else
141 		mcnt = 6;
142 
143 	while (1) {
144 		if (sysctl(mib, mcnt, NULL, &needed, NULL, 0) == -1)
145 			err(1, "route-sysctl-estimate");
146 		if (needed == 0)
147 			break;
148 		if ((buf = realloc(buf, needed)) == NULL)
149 			err(1, NULL);
150 		if (sysctl(mib, mcnt, buf, &needed, NULL, 0) == -1) {
151 			if (errno == ENOMEM)
152 				continue;
153 			err(1, "sysctl of routing table");
154 		}
155 		lim = buf + needed;
156 		break;
157 	}
158 
159 	printf("Routing tables\n");
160 
161 	if (buf) {
162 		for (next = buf; next < lim; next += rtm->rtm_msglen) {
163 			rtm = (struct rt_msghdr *)next;
164 			if (rtm->rtm_version != RTM_VERSION)
165 				continue;
166 			sa = (struct sockaddr *)(next + rtm->rtm_hdrlen);
167 			if (af != AF_UNSPEC && sa->sa_family != af)
168 				continue;
169 			p_rtentry(rtm);
170 		}
171 		free(buf);
172 		buf = NULL;
173 	}
174 
175 	if (af != 0 && af != PF_KEY)
176 		return;
177 
178 	mib[0] = CTL_NET;
179 	mib[1] = PF_KEY;
180 	mib[2] = PF_KEY_V2;
181 	mib[3] = NET_KEY_SPD_DUMP;
182 	mib[4] = mib[5] = 0;
183 	while (1) {
184 		if (sysctl(mib, 4, NULL, &needed, NULL, 0) == -1) {
185 			if (errno == ENOPROTOOPT)
186 				return;
187 			err(1, "spd-sysctl-estimate");
188 		}
189 		if (needed == 0)
190 			break;
191 		if ((buf = realloc(buf, needed)) == NULL)
192 			err(1, NULL);
193 		if (sysctl(mib, 4, buf, &needed, NULL, 0) == -1) {
194 			if (errno == ENOMEM)
195 				continue;
196 			err(1,"sysctl of spd");
197 		}
198 		lim = buf + needed;
199 		break;
200 	}
201 
202 	if (buf) {
203 		printf("\nEncap:\n");
204 
205 		for (next = buf; next < lim; next += msg->sadb_msg_len *
206 		    PFKEYV2_CHUNK) {
207 			msg = (struct sadb_msg *)next;
208 			if (msg->sadb_msg_len == 0)
209 				break;
210 			p_pfkentry(msg);
211 		}
212 		free(buf);
213 		buf = NULL;
214 	}
215 }
216 
217 /*
218  * column widths; each followed by one space
219  * width of destination/gateway column
220  * strlen("fe80::aaaa:bbbb:cccc:dddd@gif0") == 30, strlen("/128") == 4
221  */
222 #define	WID_GW(af)	((af) == AF_INET6 ? (nflag ? 30 : 18) : 18)
223 
224 int
225 WID_DST(int af)
226 {
227 
228 	if (nflag)
229 		switch (af) {
230 		case AF_MPLS:
231 			return 9;
232 		case AF_INET6:
233 			return 34;
234 		default:
235 			return 18;
236 		}
237 	else
238 		switch (af) {
239 		case AF_MPLS:
240 			return 9;
241  		default:
242 			return 18;
243 		}
244 }
245 
246 /*
247  * Print header for routing table columns.
248  */
249 void
250 pr_rthdr(int af)
251 {
252 	switch (af) {
253 	case PF_KEY:
254 		printf("%-18s %-5s %-18s %-5s %-5s %-22s\n",
255 		    "Source", "Port", "Destination",
256 		    "Port", "Proto", "SA(Address/Proto/Type/Direction)");
257 		break;
258 	case PF_MPLS:
259 		printf("%-9s %-9s %-6s %-18s %-6.6s %5.5s %8.8s %5.5s  %4.4s %s\n",
260 		    "In label", "Out label", "Op", "Gateway",
261 		    "Flags", "Refs", "Use", "Mtu", "Prio", "Interface");
262 		break;
263 	default:
264 		printf("%-*.*s %-*.*s %-6.6s %5.5s %8.8s %5.5s  %4.4s %s",
265 		    WID_DST(af), WID_DST(af), "Destination",
266 		    WID_GW(af), WID_GW(af), "Gateway",
267 		    "Flags", "Refs", "Use", "Mtu", "Prio", "Iface");
268 		if (verbose)
269 			printf(" %s", "Label");
270 		putchar('\n');
271 		break;
272 	}
273 }
274 
275 static void
276 get_rtaddrs(int addrs, struct sockaddr *sa, struct sockaddr **rti_info)
277 {
278 	int	i;
279 
280 	for (i = 0; i < RTAX_MAX; i++) {
281 		if (addrs & (1 << i)) {
282 			rti_info[i] = sa;
283 			sa = (struct sockaddr *)((char *)(sa) +
284 			    ROUNDUP(sa->sa_len));
285 		} else
286 			rti_info[i] = NULL;
287 	}
288 }
289 
290 /*
291  * Print a routing table entry.
292  */
293 void
294 p_rtentry(struct rt_msghdr *rtm)
295 {
296 	static int	 old_af = -1;
297 	struct sockaddr	*sa = (struct sockaddr *)((char *)rtm + rtm->rtm_hdrlen);
298 	struct sockaddr	*mask, *rti_info[RTAX_MAX];
299 	char		 ifbuf[IF_NAMESIZE];
300 	char		*label;
301 
302 	if (sa->sa_family == AF_KEY)
303 		return;
304 
305 	get_rtaddrs(rtm->rtm_addrs, sa, rti_info);
306 
307 	if (Fflag && rti_info[RTAX_GATEWAY]->sa_family != sa->sa_family) {
308 		return;
309 	}
310 
311 	if (strlen(so_label.rtlabel.sr_label)) {
312 		if (!rti_info[RTAX_LABEL])
313 			return;
314 		label = ((struct sockaddr_rtlabel *)rti_info[RTAX_LABEL])->
315 		    sr_label;
316 		if (strcmp(label, so_label.rtlabel.sr_label))
317 			return;
318 	}
319 
320 	if (old_af != sa->sa_family) {
321 		old_af = sa->sa_family;
322 		pr_family(sa->sa_family);
323 		pr_rthdr(sa->sa_family);
324 	}
325 
326 	mask = rti_info[RTAX_NETMASK];
327 	if ((sa = rti_info[RTAX_DST]) == NULL)
328 		return;
329 
330 	p_sockaddr(sa, mask, rtm->rtm_flags, WID_DST(sa->sa_family));
331 	p_sockaddr_mpls(sa, rti_info[RTAX_SRC], rtm->rtm_mpls,
332 	    WID_DST(sa->sa_family));
333 
334 	p_sockaddr(rti_info[RTAX_GATEWAY], NULL, RTF_HOST,
335 	    WID_GW(sa->sa_family));
336 
337 	p_flags(rtm->rtm_flags, "%-6.6s ");
338 	printf("%5u %8llu ", rtm->rtm_rmx.rmx_refcnt,
339 	    rtm->rtm_rmx.rmx_pksent);
340 	if (rtm->rtm_rmx.rmx_mtu)
341 		printf("%5u ", rtm->rtm_rmx.rmx_mtu);
342 	else
343 		printf("%5s ", "-");
344 	putchar((rtm->rtm_rmx.rmx_locks & RTV_MTU) ? 'L' : ' ');
345 	printf("  %2d %-5.16s", rtm->rtm_priority,
346 	    if_indextoname(rtm->rtm_index, ifbuf));
347 	if (verbose && rti_info[RTAX_LABEL])
348 		printf(" %s", ((struct sockaddr_rtlabel *)
349 		    rti_info[RTAX_LABEL])->sr_label);
350 	putchar('\n');
351 }
352 
353 /*
354  * Print a pfkey/encap entry.
355  */
356 void
357 p_pfkentry(struct sadb_msg *msg)
358 {
359 	static int		 old = 0;
360 	struct sadb_address	*saddr;
361 	struct sadb_protocol	*sap, *saft;
362 	struct sockaddr		*sa, *mask;
363 	void			*headers[SADB_EXT_MAX + 1];
364 
365 	if (!old) {
366 		pr_rthdr(PF_KEY);
367 		old++;
368 	}
369 
370 	bzero(headers, sizeof(headers));
371 	index_pfk(msg, headers);
372 
373 	/* These are always set */
374 	saddr = headers[SADB_X_EXT_SRC_FLOW];
375 	sa = (struct sockaddr *)(saddr + 1);
376 	saddr = headers[SADB_X_EXT_SRC_MASK];
377 	mask = (struct sockaddr *)(saddr + 1);
378 	p_encap(sa, mask, WID_DST(sa->sa_family));
379 
380 	/* These are always set, too. */
381 	saddr = headers[SADB_X_EXT_DST_FLOW];
382 	sa = (struct sockaddr *)(saddr + 1);
383 	saddr = headers[SADB_X_EXT_DST_MASK];
384 	mask = (struct sockaddr *)(saddr + 1);
385 	p_encap(sa, mask, WID_DST(sa->sa_family));
386 
387 	/* Bypass and deny flows do not set SADB_EXT_ADDRESS_DST! */
388 	sap = headers[SADB_X_EXT_PROTOCOL];
389 	saft = headers[SADB_X_EXT_FLOW_TYPE];
390 	saddr = headers[SADB_EXT_ADDRESS_DST];
391 	if (saddr)
392 		sa = (struct sockaddr *)(saddr + 1);
393 	else
394 		sa = NULL;
395 	p_protocol(sap, sa, saft, msg->sadb_msg_satype);
396 
397 	printf("\n");
398 }
399 
400 /*
401  * Print address family header before a section of the routing table.
402  */
403 void
404 pr_family(int af)
405 {
406 	char *afname;
407 
408 	switch (af) {
409 	case AF_INET:
410 		afname = "Internet";
411 		break;
412 	case AF_INET6:
413 		afname = "Internet6";
414 		break;
415 	case PF_KEY:
416 		afname = "Encap";
417 		break;
418 	case AF_MPLS:
419 		afname = "MPLS";
420 		break;
421 	default:
422 		afname = NULL;
423 		break;
424 	}
425 	if (afname)
426 		printf("\n%s:\n", afname);
427 	else
428 		printf("\nProtocol Family %d:\n", af);
429 }
430 
431 void
432 p_encap(struct sockaddr *sa, struct sockaddr *mask, int width)
433 {
434 	char		*cp;
435 	unsigned short	 port = 0;
436 
437 	if (mask)
438 		cp = netname(sa, mask);
439 	else
440 		cp = routename(sa);
441 	switch (sa->sa_family) {
442 	case AF_INET:
443 		port = ntohs(((struct sockaddr_in *)sa)->sin_port);
444 		break;
445 	case AF_INET6:
446 		port = ntohs(((struct sockaddr_in6 *)sa)->sin6_port);
447 		break;
448 	}
449 	if (width < 0)
450 		printf("%s", cp);
451 	else {
452 		if (nflag)
453 			printf("%-*s %-5u ", width, cp, port);
454 		else
455 			printf("%-*.*s %-5u ", width, width, cp, port);
456 	}
457 }
458 
459 void
460 p_protocol(struct sadb_protocol *sap, struct sockaddr *sa, struct sadb_protocol
461     *saft, int proto)
462 {
463 	printf("%-6u", sap->sadb_protocol_proto);
464 
465 	if (sa)
466 		p_sockaddr(sa, NULL, 0, -1);
467 	else
468 		printf("none");
469 
470 	switch (proto) {
471 	case SADB_SATYPE_ESP:
472 		printf("/esp");
473 		break;
474 	case SADB_SATYPE_AH:
475 		printf("/ah");
476 		break;
477 	case SADB_X_SATYPE_IPCOMP:
478 		printf("/ipcomp");
479 		break;
480 	case SADB_X_SATYPE_IPIP:
481 		printf("/ipip");
482 		break;
483 	default:
484 		printf("/<unknown>");
485 	}
486 
487 	switch(saft->sadb_protocol_proto) {
488 	case SADB_X_FLOW_TYPE_USE:
489 		printf("/use");
490 		break;
491 	case SADB_X_FLOW_TYPE_REQUIRE:
492 		printf("/require");
493 		break;
494 	case SADB_X_FLOW_TYPE_ACQUIRE:
495 		printf("/acquire");
496 		break;
497 	case SADB_X_FLOW_TYPE_DENY:
498 		printf("/deny");
499 		break;
500 	case SADB_X_FLOW_TYPE_BYPASS:
501 		printf("/bypass");
502 		break;
503 	case SADB_X_FLOW_TYPE_DONTACQ:
504 		printf("/dontacq");
505 		break;
506 	default:
507 		printf("/<unknown type>");
508 	}
509 
510 	switch(saft->sadb_protocol_direction) {
511 	case IPSP_DIRECTION_IN:
512 		printf("/in");
513 		break;
514 	case IPSP_DIRECTION_OUT:
515 		printf("/out");
516 		break;
517 	default:
518 		printf("/<unknown>");
519 	}
520 }
521 
522 void
523 p_sockaddr(struct sockaddr *sa, struct sockaddr *mask, int flags, int width)
524 {
525 	char *cp;
526 
527 	switch (sa->sa_family) {
528 	case AF_INET6:
529 	    {
530 		struct sockaddr_in6 *sa6 = (struct sockaddr_in6 *)sa;
531 		struct in6_addr *in6 = &sa6->sin6_addr;
532 
533 		/*
534 		 * XXX: This is a special workaround for KAME kernels.
535 		 * sin6_scope_id field of SA should be set in the future.
536 		 */
537 		if (IN6_IS_ADDR_LINKLOCAL(in6) ||
538 		    IN6_IS_ADDR_MC_LINKLOCAL(in6) ||
539 		    IN6_IS_ADDR_MC_INTFACELOCAL(in6)) {
540 			/* XXX: override is ok? */
541 			sa6->sin6_scope_id = (u_int32_t)ntohs(*(u_short *)
542 			    &in6->s6_addr[2]);
543 			*(u_short *)&in6->s6_addr[2] = 0;
544 		}
545 		if (flags & RTF_HOST)
546 			cp = routename((struct sockaddr *)sa6);
547 		else
548 			cp = netname((struct sockaddr *)sa6, mask);
549 		break;
550 	    }
551 	case AF_MPLS:
552 		return;
553 	default:
554 		if ((flags & RTF_HOST) || mask == NULL)
555 			cp = routename(sa);
556 		else
557 			cp = netname(sa, mask);
558 		break;
559 	}
560 	if (width < 0)
561 		printf("%s", cp);
562 	else {
563 		if (nflag)
564 			printf("%-*s ", width, cp);
565 		else
566 			printf("%-*.*s ", width, width, cp);
567 	}
568 }
569 
570 static char line[MAXHOSTNAMELEN];
571 static char domain[MAXHOSTNAMELEN];
572 
573 void
574 p_sockaddr_mpls(struct sockaddr *in, struct sockaddr *out, int flags, int width)
575 {
576 	if (in->sa_family != AF_MPLS)
577 		return;
578 
579 	if (flags & MPLS_OP_POP || flags == MPLS_OP_LOCAL) {
580 		printf("%-*s ", width, label_print(in));
581 		printf("%-*s ", width, label_print(NULL));
582 	} else {
583 		printf("%-*s ", width, label_print(in));
584 		printf("%-*s ", width, label_print(out));
585 	}
586 
587 	printf("%-6s ", mpls_op(flags));
588 }
589 
590 void
591 p_flags(int f, char *format)
592 {
593 	char name[33], *flags;
594 	const struct bits *p = bits;
595 
596 	for (flags = name; p->b_mask && flags < &name[sizeof(name) - 2]; p++)
597 		if (p->b_mask & f)
598 			*flags++ = p->b_val;
599 	*flags = '\0';
600 	printf(format, name);
601 }
602 
603 char *
604 routename(struct sockaddr *sa)
605 {
606 	char *cp = NULL;
607 	static int first = 1;
608 
609 	if (first) {
610 		first = 0;
611 		if (gethostname(domain, sizeof(domain)) == 0 &&
612 		    (cp = strchr(domain, '.')))
613 			(void)strlcpy(domain, cp + 1, sizeof(domain));
614 		else
615 			domain[0] = '\0';
616 		cp = NULL;
617 	}
618 
619 	if (sa->sa_len == 0) {
620 		(void)strlcpy(line, "default", sizeof(line));
621 		return (line);
622 	}
623 
624 	switch (sa->sa_family) {
625 	case AF_INET:
626 		return
627 		    (routename4(((struct sockaddr_in *)sa)->sin_addr.s_addr));
628 
629 	case AF_INET6:
630 	    {
631 		struct sockaddr_in6 sin6;
632 
633 		memset(&sin6, 0, sizeof(sin6));
634 		memcpy(&sin6, sa, sa->sa_len);
635 		sin6.sin6_len = sizeof(struct sockaddr_in6);
636 		sin6.sin6_family = AF_INET6;
637 		if (sa->sa_len == sizeof(struct sockaddr_in6) &&
638 		    (IN6_IS_ADDR_LINKLOCAL(&sin6.sin6_addr) ||
639 		     IN6_IS_ADDR_MC_LINKLOCAL(&sin6.sin6_addr) ||
640 		     IN6_IS_ADDR_MC_INTFACELOCAL(&sin6.sin6_addr)) &&
641 		    sin6.sin6_scope_id == 0) {
642 			sin6.sin6_scope_id =
643 			    ntohs(*(u_int16_t *)&sin6.sin6_addr.s6_addr[2]);
644 			sin6.sin6_addr.s6_addr[2] = 0;
645 			sin6.sin6_addr.s6_addr[3] = 0;
646 		}
647 		return (routename6(&sin6));
648 	    }
649 
650 	case AF_LINK:
651 		return (link_print(sa));
652 	case AF_MPLS:
653 		return (label_print(sa));
654 	case AF_UNSPEC:
655 		if (sa->sa_len == sizeof(struct sockaddr_rtlabel)) {
656 			static char name[RTLABEL_LEN];
657 			struct sockaddr_rtlabel *sr;
658 
659 			sr = (struct sockaddr_rtlabel *)sa;
660 			(void)strlcpy(name, sr->sr_label, sizeof(name));
661 			return (name);
662 		}
663 		/* FALLTHROUGH */
664 	default:
665 		(void)snprintf(line, sizeof(line), "(%d) %s",
666 		    sa->sa_family, any_ntoa(sa));
667 		break;
668 	}
669 	return (line);
670 }
671 
672 char *
673 routename4(in_addr_t in)
674 {
675 	char		*cp = NULL;
676 	struct in_addr	 ina;
677 	struct hostent	*hp;
678 
679 	if (in == INADDR_ANY)
680 		cp = "default";
681 	if (!cp && !nflag) {
682 		if ((hp = gethostbyaddr((char *)&in,
683 		    sizeof(in), AF_INET)) != NULL) {
684 			if ((cp = strchr(hp->h_name, '.')) &&
685 			    !strcmp(cp + 1, domain))
686 				*cp = '\0';
687 			cp = hp->h_name;
688 		}
689 	}
690 	ina.s_addr = in;
691 	strlcpy(line, cp ? cp : inet_ntoa(ina), sizeof(line));
692 
693 	return (line);
694 }
695 
696 char *
697 routename6(struct sockaddr_in6 *sin6)
698 {
699 	int	 niflags = 0;
700 
701 	if (nflag)
702 		niflags |= NI_NUMERICHOST;
703 	else
704 		niflags |= NI_NOFQDN;
705 
706 	if (getnameinfo((struct sockaddr *)sin6, sin6->sin6_len,
707 	    line, sizeof(line), NULL, 0, niflags) != 0)
708 		strncpy(line, "invalid", sizeof(line));
709 
710 	return (line);
711 }
712 
713 /*
714  * Return the name of the network whose address is given.
715  * The address is assumed to be that of a net or subnet, not a host.
716  */
717 char *
718 netname4(in_addr_t in, struct sockaddr_in *maskp)
719 {
720 	char *cp = NULL;
721 	struct netent *np = NULL;
722 	in_addr_t mask;
723 	int mbits;
724 
725 	in = ntohl(in);
726 	mask = maskp && maskp->sin_len != 0 ? ntohl(maskp->sin_addr.s_addr) : 0;
727 	if (!nflag && in != INADDR_ANY) {
728 		if ((np = getnetbyaddr(in, AF_INET)) != NULL)
729 			cp = np->n_name;
730 	}
731 	if (in == INADDR_ANY && mask == INADDR_ANY)
732 		cp = "default";
733 	mbits = mask ? 33 - ffs(mask) : 0;
734 	if (cp)
735 		strlcpy(line, cp, sizeof(line));
736 #define C(x)	((x) & 0xff)
737 	else if (mbits < 9)
738 		snprintf(line, sizeof(line), "%u/%d", C(in >> 24), mbits);
739 	else if (mbits < 17)
740 		snprintf(line, sizeof(line), "%u.%u/%d",
741 		    C(in >> 24) , C(in >> 16), mbits);
742 	else if (mbits < 25)
743 		snprintf(line, sizeof(line), "%u.%u.%u/%d",
744 		    C(in >> 24), C(in >> 16), C(in >> 8), mbits);
745 	else
746 		snprintf(line, sizeof(line), "%u.%u.%u.%u/%d", C(in >> 24),
747 		    C(in >> 16), C(in >> 8), C(in), mbits);
748 #undef C
749 	return (line);
750 }
751 
752 char *
753 netname6(struct sockaddr_in6 *sa6, struct sockaddr_in6 *mask)
754 {
755 	struct sockaddr_in6 sin6;
756 	u_char *p;
757 	int masklen, final = 0, illegal = 0;
758 	int i, lim, flag, error;
759 	char hbuf[NI_MAXHOST];
760 
761 	sin6 = *sa6;
762 
763 	flag = 0;
764 	masklen = 0;
765 	if (mask) {
766 		lim = mask->sin6_len - offsetof(struct sockaddr_in6, sin6_addr);
767 		lim = lim < (int)sizeof(struct in6_addr) ?
768 		    lim : (int)sizeof(struct in6_addr);
769 		for (p = (u_char *)&mask->sin6_addr, i = 0; i < lim; p++) {
770 			if (final && *p) {
771 				illegal++;
772 				sin6.sin6_addr.s6_addr[i++] = 0x00;
773 				continue;
774 			}
775 
776 			switch (*p & 0xff) {
777 			case 0xff:
778 				masklen += 8;
779 				break;
780 			case 0xfe:
781 				masklen += 7;
782 				final++;
783 				break;
784 			case 0xfc:
785 				masklen += 6;
786 				final++;
787 				break;
788 			case 0xf8:
789 				masklen += 5;
790 				final++;
791 				break;
792 			case 0xf0:
793 				masklen += 4;
794 				final++;
795 				break;
796 			case 0xe0:
797 				masklen += 3;
798 				final++;
799 				break;
800 			case 0xc0:
801 				masklen += 2;
802 				final++;
803 				break;
804 			case 0x80:
805 				masklen += 1;
806 				final++;
807 				break;
808 			case 0x00:
809 				final++;
810 				break;
811 			default:
812 				final++;
813 				illegal++;
814 				break;
815 			}
816 
817 			if (!illegal)
818 				sin6.sin6_addr.s6_addr[i++] &= *p;
819 			else
820 				sin6.sin6_addr.s6_addr[i++] = 0x00;
821 		}
822 		while (i < (int)sizeof(struct in6_addr))
823 			sin6.sin6_addr.s6_addr[i++] = 0x00;
824 	} else
825 		masklen = 128;
826 
827 	if (masklen == 0 && IN6_IS_ADDR_UNSPECIFIED(&sin6.sin6_addr))
828 		return ("default");
829 
830 	if (illegal)
831 		warnx("illegal prefixlen");
832 
833 	if (nflag)
834 		flag |= NI_NUMERICHOST;
835 	error = getnameinfo((struct sockaddr *)&sin6, sin6.sin6_len,
836 	    hbuf, sizeof(hbuf), NULL, 0, flag);
837 	if (error)
838 		snprintf(hbuf, sizeof(hbuf), "invalid");
839 
840 	snprintf(line, sizeof(line), "%s/%d", hbuf, masklen);
841 	return (line);
842 }
843 
844 /*
845  * Return the name of the network whose address is given.
846  * The address is assumed to be that of a net or subnet, not a host.
847  */
848 char *
849 netname(struct sockaddr *sa, struct sockaddr *mask)
850 {
851 	switch (sa->sa_family) {
852 	case AF_INET:
853 		return netname4(((struct sockaddr_in *)sa)->sin_addr.s_addr,
854 		    (struct sockaddr_in *)mask);
855 	case AF_INET6:
856 		return netname6((struct sockaddr_in6 *)sa,
857 		    (struct sockaddr_in6 *)mask);
858 	case AF_LINK:
859 		return (link_print(sa));
860 	case AF_MPLS:
861 		return (label_print(sa));
862 	default:
863 		snprintf(line, sizeof(line), "af %d: %s",
864 		    sa->sa_family, any_ntoa(sa));
865 		break;
866 	}
867 	return (line);
868 }
869 
870 static const char hexlist[] = "0123456789abcdef";
871 
872 char *
873 any_ntoa(const struct sockaddr *sa)
874 {
875 	static char obuf[240];
876 	const char *in = sa->sa_data;
877 	char *out = obuf;
878 	int len = sa->sa_len - offsetof(struct sockaddr, sa_data);
879 
880 	*out++ = 'Q';
881 	do {
882 		*out++ = hexlist[(*in >> 4) & 15];
883 		*out++ = hexlist[(*in++)    & 15];
884 		*out++ = '.';
885 	} while (--len > 0 && (out + 3) < &obuf[sizeof(obuf) - 1]);
886 	out[-1] = '\0';
887 	return (obuf);
888 }
889 
890 char *
891 link_print(struct sockaddr *sa)
892 {
893 	struct sockaddr_dl	*sdl = (struct sockaddr_dl *)sa;
894 	u_char			*lla = (u_char *)sdl->sdl_data + sdl->sdl_nlen;
895 
896 	if (sdl->sdl_nlen == 0 && sdl->sdl_alen == 0 &&
897 	    sdl->sdl_slen == 0) {
898 		(void)snprintf(line, sizeof(line), "link#%d", sdl->sdl_index);
899 		return (line);
900 	}
901 	switch (sdl->sdl_type) {
902 	case IFT_ETHER:
903 	case IFT_CARP:
904 		return (ether_ntoa((struct ether_addr *)lla));
905 	default:
906 		return (link_ntoa(sdl));
907 	}
908 }
909 
910 char *
911 mpls_op(u_int32_t type)
912 {
913 	switch (type & (MPLS_OP_PUSH | MPLS_OP_POP | MPLS_OP_SWAP)) {
914 	case MPLS_OP_LOCAL:
915 		return ("LOCAL");
916 	case MPLS_OP_POP:
917 		return ("POP");
918 	case MPLS_OP_SWAP:
919 		return ("SWAP");
920 	case MPLS_OP_PUSH:
921 		return ("PUSH");
922 	default:
923 		return ("?");
924 	}
925 }
926 
927 char *
928 label_print(struct sockaddr *sa)
929 {
930 	struct sockaddr_mpls	*smpls = (struct sockaddr_mpls *)sa;
931 
932 	if (smpls)
933 		(void)snprintf(line, sizeof(line), "%u",
934 		    ntohl(smpls->smpls_label) >> MPLS_LABEL_OFFSET);
935 	else
936 		(void)snprintf(line, sizeof(line), "-");
937 
938 	return (line);
939 }
940 
941 void
942 index_pfk(struct sadb_msg *msg, void **headers)
943 {
944 	struct sadb_ext	*ext;
945 
946 	for (ext = (struct sadb_ext *)(msg + 1);
947 	    (size_t)((u_int8_t *)ext - (u_int8_t *)msg) <
948 	    msg->sadb_msg_len * PFKEYV2_CHUNK && ext->sadb_ext_len > 0;
949 	    ext = (struct sadb_ext *)((u_int8_t *)ext +
950 	    ext->sadb_ext_len * PFKEYV2_CHUNK)) {
951 		switch (ext->sadb_ext_type) {
952 		case SADB_EXT_ADDRESS_SRC:
953 			headers[SADB_EXT_ADDRESS_SRC] = (void *)ext;
954 			break;
955 		case SADB_EXT_ADDRESS_DST:
956 			headers[SADB_EXT_ADDRESS_DST] = (void *)ext;
957 			break;
958 		case SADB_X_EXT_PROTOCOL:
959 			headers[SADB_X_EXT_PROTOCOL] = (void *)ext;
960 			break;
961 		case SADB_X_EXT_SRC_FLOW:
962 			headers[SADB_X_EXT_SRC_FLOW] = (void *)ext;
963 			break;
964 		case SADB_X_EXT_DST_FLOW:
965 			headers[SADB_X_EXT_DST_FLOW] = (void *)ext;
966 			break;
967 		case SADB_X_EXT_SRC_MASK:
968 			headers[SADB_X_EXT_SRC_MASK] = (void *)ext;
969 			break;
970 		case SADB_X_EXT_DST_MASK:
971 			headers[SADB_X_EXT_DST_MASK] = (void *)ext;
972 			break;
973 		case SADB_X_EXT_FLOW_TYPE:
974 			headers[SADB_X_EXT_FLOW_TYPE] = (void *)ext;
975 			break;
976 		default:
977 			/* Ignore. */
978 			break;
979 		}
980 	}
981 }
982