xref: /openbsd-src/usr.bin/netstat/route.c (revision db3296cf5c1dd9058ceecc3a29fe4aaa0bd26000)
1 /*	$OpenBSD: route.c,v 1.54 2003/06/26 21:59:11 deraadt Exp $	*/
2 /*	$NetBSD: route.c,v 1.15 1996/05/07 02:55:06 thorpej Exp $	*/
3 
4 /*
5  * Copyright (c) 1983, 1988, 1993
6  *	The Regents of the University of California.  All rights reserved.
7  *
8  * Redistribution and use in source and binary forms, with or without
9  * modification, are permitted provided that the following conditions
10  * are met:
11  * 1. Redistributions of source code must retain the above copyright
12  *    notice, this list of conditions and the following disclaimer.
13  * 2. Redistributions in binary form must reproduce the above copyright
14  *    notice, this list of conditions and the following disclaimer in the
15  *    documentation and/or other materials provided with the distribution.
16  * 3. Neither the name of the University nor the names of its contributors
17  *    may be used to endorse or promote products derived from this software
18  *    without specific prior written permission.
19  *
20  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
21  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
22  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
24  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
25  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
30  * SUCH DAMAGE.
31  */
32 
33 #ifndef lint
34 #if 0
35 static char sccsid[] = "from: @(#)route.c	8.3 (Berkeley) 3/9/94";
36 #else
37 static char *rcsid = "$OpenBSD: route.c,v 1.54 2003/06/26 21:59:11 deraadt Exp $";
38 #endif
39 #endif /* not lint */
40 
41 #include <sys/param.h>
42 #include <sys/protosw.h>
43 #include <sys/socket.h>
44 #include <sys/mbuf.h>
45 
46 #include <net/if.h>
47 #include <net/if_dl.h>
48 #include <net/if_types.h>
49 #define _KERNEL
50 #include <net/route.h>
51 #undef _KERNEL
52 #include <netinet/in.h>
53 #include <arpa/inet.h>
54 
55 #include <netns/ns.h>
56 
57 #include <netipx/ipx.h>
58 
59 #include <netatalk/at.h>
60 
61 #include <sys/sysctl.h>
62 
63 #include <arpa/inet.h>
64 
65 #include <limits.h>
66 #include <netdb.h>
67 #include <stdio.h>
68 #include <stdlib.h>
69 #include <string.h>
70 #include <unistd.h>
71 
72 #ifndef INET
73 #define INET
74 #endif
75 
76 #include <sys/socket.h>
77 #include <netinet/ip_ipsp.h>
78 #include "netstat.h"
79 
80 #define kget(p, d) (kread((u_long)(p), (char *)&(d), sizeof (d)))
81 
82 /* alignment constraint for routing socket */
83 #define ROUNDUP(a) \
84 	((a) > 0 ? (1 + (((a) - 1) | (sizeof(long) - 1))) : sizeof(long))
85 #define ADVANCE(x, n) (x += ROUNDUP((n)->sa_len))
86 
87 struct radix_node_head *rt_tables[AF_MAX+1];
88 
89 /*
90  * Definitions for showing gateway flags.
91  */
92 struct bits {
93 	short	b_mask;
94 	char	b_val;
95 } bits[] = {
96 	{ RTF_UP,	'U' },
97 	{ RTF_GATEWAY,	'G' },
98 	{ RTF_HOST,	'H' },
99 	{ RTF_REJECT,	'R' },
100 	{ RTF_BLACKHOLE, 'B' },
101 	{ RTF_DYNAMIC,	'D' },
102 	{ RTF_MODIFIED,	'M' },
103 	{ RTF_DONE,	'd' }, /* Completed -- for routing messages only */
104 	{ RTF_MASK,	'm' }, /* Mask Present -- for routing messages only */
105 	{ RTF_CLONING,	'C' },
106 	{ RTF_XRESOLVE,	'X' },
107 	{ RTF_LLINFO,	'L' },
108 	{ RTF_STATIC,	'S' },
109 	{ RTF_PROTO1,	'1' },
110 	{ RTF_PROTO2,	'2' },
111 	{ RTF_PROTO3,	'3' },
112 	{ 0 }
113 };
114 
115 static union {
116 	struct		sockaddr u_sa;
117 	u_int32_t	u_data[64];
118 	int		u_dummy;	/* force word-alignment */
119 } pt_u;
120 
121 int	do_rtent = 0;
122 struct	rtentry rtentry;
123 struct	radix_node rnode;
124 struct	radix_mask rmask;
125 
126 int	NewTree = 0;
127 
128 static struct sockaddr *kgetsa(struct sockaddr *);
129 static void p_tree(struct radix_node *);
130 static void p_rtnode(void);
131 static void p_rtflags(u_char);
132 static void ntreestuff(void);
133 static void np_rtentry(struct rt_msghdr *);
134 static void p_sockaddr(struct sockaddr *, struct sockaddr *, int, int);
135 static void p_flags(int, char *);
136 static void p_rtentry(struct rtentry *);
137 static void encap_print(struct rtentry *);
138 
139 /*
140  * Print routing tables.
141  */
142 void
143 routepr(u_long rtree)
144 {
145 	struct radix_node_head *rnh, head;
146 	int i;
147 
148 	printf("Routing tables\n");
149 
150 	if (Aflag == 0 && NewTree)
151 		ntreestuff();
152 	else {
153 		if (rtree == 0) {
154 			printf("rt_tables: symbol not in namelist\n");
155 			return;
156 		}
157 
158 		kget(rtree, rt_tables);
159 		for (i = 0; i <= AF_MAX; i++) {
160 			if ((rnh = rt_tables[i]) == 0)
161 				continue;
162 			kget(rnh, head);
163 			if (i == AF_UNSPEC) {
164 				if (Aflag && af == 0) {
165 					printf("Netmasks:\n");
166 					p_tree(head.rnh_treetop);
167 				}
168 			} else if (af == AF_UNSPEC || af == i) {
169 				pr_family(i);
170 				do_rtent = 1;
171 				if (i != PF_KEY)
172 					pr_rthdr(i);
173 				else
174 					pr_encaphdr();
175 				p_tree(head.rnh_treetop);
176 			}
177 		}
178 	}
179 }
180 
181 /*
182  * Print address family header before a section of the routing table.
183  */
184 void
185 pr_family(int af)
186 {
187 	char *afname;
188 
189 	switch (af) {
190 	case AF_INET:
191 		afname = "Internet";
192 		break;
193 #ifdef INET6
194 	case AF_INET6:
195 		afname = "Internet6";
196 		break;
197 #endif
198 	case AF_NS:
199 		afname = "XNS";
200 		break;
201 	case AF_IPX:
202 		afname = "IPX";
203 		break;
204 	case AF_ISO:
205 		afname = "ISO";
206 		break;
207 	case AF_CCITT:
208 		afname = "X.25";
209 		break;
210 	case PF_KEY:
211 		afname = "Encap";
212 		break;
213 	case AF_APPLETALK:
214 		afname = "AppleTalk";
215 		break;
216 	default:
217 		afname = NULL;
218 		break;
219 	}
220 	if (afname)
221 		printf("\n%s:\n", afname);
222 	else
223 		printf("\nProtocol Family %d:\n", af);
224 }
225 
226 /* column widths; each followed by one space */
227 #ifndef INET6
228 #define	WID_DST(af)	18	/* width of destination column */
229 #define	WID_GW(af)	18	/* width of gateway column */
230 #else
231 /* width of destination/gateway column */
232 #if 1
233 /* strlen("fe80::aaaa:bbbb:cccc:dddd@gif0") == 30, strlen("/128") == 4 */
234 #define	WID_DST(af)	((af) == AF_INET6 ? (nflag ? 34 : 18) : 18)
235 #define	WID_GW(af)	((af) == AF_INET6 ? (nflag ? 30 : 18) : 18)
236 #else
237 /* strlen("fe80::aaaa:bbbb:cccc:dddd") == 25, strlen("/128") == 4 */
238 #define	WID_DST(af)	((af) == AF_INET6 ? (nflag ? 29 : 18) : 18)
239 #define	WID_GW(af)	((af) == AF_INET6 ? (nflag ? 25 : 18) : 18)
240 #endif
241 #endif /* INET6 */
242 
243 /*
244  * Print header for routing table columns.
245  */
246 void
247 pr_rthdr(int af)
248 {
249 
250 	if (Aflag)
251 		printf("%-*.*s ", PLEN, PLEN, "Address");
252 	printf("%-*.*s %-*.*s %-6.6s  %6.6s  %6.6s %6.6s  %s\n",
253 	    WID_DST(af), WID_DST(af), "Destination",
254 	    WID_GW(af), WID_GW(af), "Gateway",
255 	    "Flags", "Refs", "Use", "Mtu", "Interface");
256 }
257 
258 /*
259  * Print header for PF_KEY entries.
260  */
261 void
262 pr_encaphdr(void)
263 {
264 	if (Aflag)
265 		printf("%-*s ", PLEN, "Address");
266 	printf("%-18s %-5s %-18s %-5s %-5s %-22s\n",
267 	    "Source", "Port", "Destination",
268 	    "Port", "Proto", "SA(Address/Proto/Type/Direction)");
269 }
270 
271 static struct sockaddr *
272 kgetsa(struct sockaddr *dst)
273 {
274 
275 	kget(dst, pt_u.u_sa);
276 	if (pt_u.u_sa.sa_len > sizeof (pt_u.u_sa))
277 		kread((u_long)dst, (char *)pt_u.u_data, pt_u.u_sa.sa_len);
278 	return (&pt_u.u_sa);
279 }
280 
281 static void
282 p_tree(struct radix_node *rn)
283 {
284 
285 again:
286 	kget(rn, rnode);
287 	if (rnode.rn_b < 0) {
288 		if (Aflag)
289 			printf("%-16p ", rn);
290 		if (rnode.rn_flags & RNF_ROOT) {
291 			if (Aflag)
292 				printf("(root node)%s",
293 				    rnode.rn_dupedkey ? " =>\n" : "\n");
294 		} else if (do_rtent) {
295 			kget(rn, rtentry);
296 			p_rtentry(&rtentry);
297 			if (Aflag)
298 				p_rtnode();
299 		} else {
300 			p_sockaddr(kgetsa((struct sockaddr *)rnode.rn_key),
301 			    0, 0, 44);
302 			putchar('\n');
303 		}
304 		if ((rn = rnode.rn_dupedkey))
305 			goto again;
306 	} else {
307 		if (Aflag && do_rtent) {
308 			printf("%-16p ", rn);
309 			p_rtnode();
310 		}
311 		rn = rnode.rn_r;
312 		p_tree(rnode.rn_l);
313 		p_tree(rn);
314 	}
315 }
316 
317 static void
318 p_rtflags(u_char flags)
319 {
320 	putchar('<');
321 	if (flags & RNF_NORMAL)
322 		putchar('N');
323 	if (flags & RNF_ROOT)
324 		putchar('R');
325 	if (flags & RNF_ACTIVE)
326 		putchar('A');
327 	if (flags & RNF_IGNORE)
328 		putchar('I');
329 	if (flags & ~(RNF_NORMAL | RNF_ROOT | RNF_ACTIVE | RNF_IGNORE))
330 		printf("/0x%02x", flags);
331 	putchar('>');
332 }
333 
334 char	nbuf[25];
335 
336 static void
337 p_rtnode(void)
338 {
339 	struct radix_mask *rm = rnode.rn_mklist;
340 
341 	if (rnode.rn_b < 0) {
342 		if (rnode.rn_mask) {
343 			printf("\t  mask ");
344 			p_sockaddr(kgetsa((struct sockaddr *)rnode.rn_mask),
345 			    0, 0, -1);
346 		} else if (rm == 0)
347 			return;
348 	} else {
349 		snprintf(nbuf, sizeof nbuf, "(%d)", rnode.rn_b);
350 		printf("%6.6s %16p : %16p", nbuf, rnode.rn_l,
351 		    rnode.rn_r);
352 	}
353 
354 	putchar(' ');
355 	p_rtflags(rnode.rn_flags);
356 
357 	while (rm) {
358 		kget(rm, rmask);
359 		snprintf(nbuf, sizeof nbuf, " %d refs, ", rmask.rm_refs);
360 		printf(" mk = %16p {(%d),%s",
361 		    rm, -1 - rmask.rm_b, rmask.rm_refs ? nbuf : " ");
362 		p_rtflags(rmask.rm_flags);
363 		printf(", ");
364 		if (rmask.rm_flags & RNF_NORMAL) {
365 			struct radix_node rnode_aux;
366 
367 			printf("leaf = %p ", rmask.rm_leaf);
368 			kget(rmask.rm_leaf, rnode_aux);
369 			p_sockaddr(kgetsa((struct sockaddr *)rnode_aux.rn_mask),
370 			    0, 0, -1);
371 		} else
372 			p_sockaddr(kgetsa((struct sockaddr *)rmask.rm_mask),
373 			    0, 0, -1);
374 		putchar('}');
375 		if ((rm = rmask.rm_mklist))
376 			printf(" ->");
377 	}
378 	putchar('\n');
379 }
380 
381 static void
382 ntreestuff(void)
383 {
384 	size_t needed;
385 	int mib[6];
386 	char *buf, *next, *lim;
387 	struct rt_msghdr *rtm;
388 
389 	mib[0] = CTL_NET;
390 	mib[1] = PF_ROUTE;
391 	mib[2] = 0;
392 	mib[3] = 0;
393 	mib[4] = NET_RT_DUMP;
394 	mib[5] = 0;
395 	if (sysctl(mib, 6, NULL, &needed, NULL, 0) < 0) {
396 		perror("route-sysctl-estimate");
397 		exit(1);
398 	}
399 	if ((buf = malloc(needed)) == 0) {
400 		printf("out of space\n");
401 		exit(1);
402 	}
403 	if (sysctl(mib, 6, buf, &needed, NULL, 0) < 0) {
404 		perror("sysctl of routing table");
405 		exit(1);
406 	}
407 	lim = buf + needed;
408 	for (next = buf; next < lim; next += rtm->rtm_msglen) {
409 		rtm = (struct rt_msghdr *)next;
410 		np_rtentry(rtm);
411 	}
412 }
413 
414 static void
415 np_rtentry(struct rt_msghdr *rtm)
416 {
417 	struct sockaddr *sa = (struct sockaddr *)(rtm + 1);
418 #ifdef notdef
419 	static int masks_done, banner_printed;
420 #endif
421 	static int old_af;
422 	int af = 0, interesting = RTF_UP | RTF_GATEWAY | RTF_HOST;
423 
424 #ifdef notdef
425 	/* for the moment, netmasks are skipped over */
426 	if (!banner_printed) {
427 		printf("Netmasks:\n");
428 		banner_printed = 1;
429 	}
430 	if (masks_done == 0) {
431 		if (rtm->rtm_addrs != RTA_DST ) {
432 			masks_done = 1;
433 			af = sa->sa_family;
434 		}
435 	} else
436 #endif
437 		af = sa->sa_family;
438 	if (af != old_af) {
439 		pr_family(af);
440 		old_af = af;
441 	}
442 	if (rtm->rtm_addrs == RTA_DST)
443 		p_sockaddr(sa, 0, 0, 36);
444 	else {
445 		p_sockaddr(sa, 0, rtm->rtm_flags, 16);
446 		sa = (struct sockaddr *)(ROUNDUP(sa->sa_len) + (char *)sa);
447 		p_sockaddr(sa, 0, 0, 18);
448 	}
449 	p_flags(rtm->rtm_flags & interesting, "%-6.6s ");
450 	putchar('\n');
451 }
452 
453 static void
454 p_sockaddr(struct sockaddr *sa, struct sockaddr *mask, int flags, int width)
455 {
456 	char workbuf[128], *cplim;
457 	char *cp = workbuf;
458 	size_t n;
459 
460 	switch (sa->sa_family) {
461 	case AF_INET:
462 	    {
463 		struct sockaddr_in *sin = (struct sockaddr_in *)sa;
464 		struct sockaddr_in *msin = (struct sockaddr_in *)mask;
465 
466 		cp = (sin->sin_addr.s_addr == 0) ? "default" :
467 		    ((flags & RTF_HOST) || mask == NULL ?
468 		    routename(sin->sin_addr.s_addr) :
469 		    netname(sin->sin_addr.s_addr, msin->sin_addr.s_addr));
470 
471 		break;
472 	    }
473 
474 #ifdef INET6
475 	case AF_INET6:
476 	    {
477 		struct sockaddr_in6 *sa6 = (struct sockaddr_in6 *)sa;
478 #ifdef __KAME__
479 		struct in6_addr *in6 = &sa6->sin6_addr;
480 
481 		/*
482 		 * XXX: This is a special workaround for KAME kernels.
483 		 * sin6_scope_id field of SA should be set in the future.
484 		 */
485 		if (IN6_IS_ADDR_LINKLOCAL(in6) ||
486 		    IN6_IS_ADDR_MC_LINKLOCAL(in6)) {
487 			/* XXX: override is ok? */
488 			sa6->sin6_scope_id = (u_int32_t)ntohs(*(u_short *)
489 			    &in6->s6_addr[2]);
490 			*(u_short *)&in6->s6_addr[2] = 0;
491 		}
492 #endif
493 		if (flags & RTF_HOST)
494 			cp = routename6(sa6);
495 		else if (mask) {
496 			cp = netname6(sa6,
497 			    &((struct sockaddr_in6 *)mask)->sin6_addr);
498 		} else
499 			cp = netname6(sa6, NULL);
500 		break;
501 	    }
502 #endif
503 
504 	case AF_NS:
505 		cp = ns_print(sa);
506 		break;
507 
508 	case AF_IPX:
509 		cp = ipx_print(sa);
510 		break;
511 
512 	case AF_LINK:
513 	    {
514 		struct sockaddr_dl *sdl = (struct sockaddr_dl *)sa;
515 
516 		if (sdl->sdl_nlen == 0 && sdl->sdl_alen == 0 &&
517 		    sdl->sdl_slen == 0)
518 			(void) snprintf(workbuf, sizeof workbuf,
519 			    "link#%d", sdl->sdl_index);
520 		else switch (sdl->sdl_type) {
521 		case IFT_ETHER:
522 		    {
523 			int i;
524 			u_char *lla = (u_char *)sdl->sdl_data +
525 			    sdl->sdl_nlen;
526 
527 			cplim = "";
528 			for (i = 0; i < sdl->sdl_alen; i++, lla++) {
529 				n = snprintf(cp,
530 				    workbuf + sizeof (workbuf) - cp,
531 				    "%s%x", cplim, *lla);
532 				cplim = ":";
533 				if (n < 0)	/* What else to do ? */
534 					continue;
535 				if (n >= workbuf + sizeof (workbuf) - cp)
536 					n = workbuf + sizeof (workbuf) - cp - 1;
537 				cp += n;
538 			}
539 			cp = workbuf;
540 			break;
541 		    }
542 		default:
543 			cp = link_ntoa(sdl);
544 			break;
545 		}
546 		break;
547 	    }
548 
549 	case AF_APPLETALK:
550 	    {
551 		/* XXX could do better */
552 		cp = atalk_print(sa,11);
553 		break;
554 	    }
555 	default:
556 	    {
557 		u_char *s = (u_char *)sa->sa_data, *slim;
558 
559 		slim = sa->sa_len + (u_char *) sa;
560 		cplim = cp + sizeof(workbuf) - 6;
561 		if ((n = snprintf(cp, cplim - cp, "(%d)", sa->sa_family)) >=
562 		    cplim - cp)
563 			n = cplim - cp - 1;
564 		if (n > 0)
565 			cp += n;
566 		while (s < slim && cp < cplim) {
567 			if ((n = snprintf(cp, workbuf + sizeof (workbuf) - cp,
568 			    " %02x", *s++)) >= workbuf + sizeof (workbuf) - cp)
569 				n = workbuf + sizeof (workbuf) - cp - 1;
570 			if (n > 0)
571 				cp += n;
572 			if (s < slim) {
573 				if ((n = snprintf(cp,
574 				    workbuf + sizeof (workbuf) - cp,
575 				    "%02x", *s++)) >=
576 				    workbuf + sizeof (workbuf) - cp)
577 					n = workbuf + sizeof (workbuf) - cp - 1;
578 				if (n > 0)
579 					cp += n;
580 			}
581 		}
582 		cp = workbuf;
583 	    }
584 	}
585 	if (width < 0 )
586 		printf("%s ", cp);
587 	else {
588 		if (nflag)
589 			printf("%-*s ", width, cp);
590 		else
591 			printf("%-*.*s ", width, width, cp);
592 	}
593 }
594 
595 static void
596 p_flags(int f, char *format)
597 {
598 	char name[33], *flags;
599 	struct bits *p = bits;
600 
601 	for (flags = name; p->b_mask; p++)
602 		if (p->b_mask & f)
603 			*flags++ = p->b_val;
604 	*flags = '\0';
605 	printf(format, name);
606 }
607 
608 static void
609 p_rtentry(struct rtentry *rt)
610 {
611 	static struct ifnet ifnet, *lastif;
612 	struct sockaddr_storage sock1, sock2;
613 	struct sockaddr *sa = (struct sockaddr *)&sock1;
614 	struct sockaddr *mask = (struct sockaddr *)&sock2;
615 
616 	bcopy(kgetsa(rt_key(rt)), sa, sizeof(struct sockaddr));
617 	if (sa->sa_len > sizeof(struct sockaddr))
618 		bcopy(kgetsa(rt_key(rt)), sa, sa->sa_len);
619 
620 	if (sa->sa_family == PF_KEY) {
621 		encap_print(rt);
622 		return;
623 	}
624 
625 	if (rt_mask(rt)) {
626 		bcopy(kgetsa(rt_mask(rt)), mask, sizeof(struct sockaddr));
627 		if (sa->sa_len > sizeof(struct sockaddr))
628 			bcopy(kgetsa(rt_mask(rt)), mask, sa->sa_len);
629 	} else
630 		mask = 0;
631 
632 	p_sockaddr(sa, mask, rt->rt_flags, WID_DST(sa->sa_family));
633 	p_sockaddr(kgetsa(rt->rt_gateway), 0, RTF_HOST, WID_GW(sa->sa_family));
634 	p_flags(rt->rt_flags, "%-6.6s ");
635 	printf("%6d %8ld ", rt->rt_refcnt, rt->rt_use);
636 	if (rt->rt_rmx.rmx_mtu)
637 		printf("%6ld ", rt->rt_rmx.rmx_mtu);
638 	else
639 		printf("%6s ", "-");
640 	putchar((rt->rt_rmx.rmx_locks & RTV_MTU) ? 'L' : ' ');
641 	if (rt->rt_ifp) {
642 		if (rt->rt_ifp != lastif) {
643 			kget(rt->rt_ifp, ifnet);
644 			lastif = rt->rt_ifp;
645 		}
646 		printf(" %.16s%s", ifnet.if_xname,
647 		    rt->rt_nodes[0].rn_dupedkey ? " =>" : "");
648 	}
649 	putchar('\n');
650 	if (vflag) {
651 		printf("\texpire   %10lu%c  recvpipe %10ld%c  "
652 		    "sendpipe %10ld%c\n",
653 		    rt->rt_rmx.rmx_expire,
654 		    (rt->rt_rmx.rmx_locks & RTV_EXPIRE) ? 'L' : ' ',
655 		    rt->rt_rmx.rmx_recvpipe,
656 		    (rt->rt_rmx.rmx_locks & RTV_RPIPE) ? 'L' : ' ',
657 		    rt->rt_rmx.rmx_sendpipe,
658 		    (rt->rt_rmx.rmx_locks & RTV_SPIPE) ? 'L' : ' ');
659 		printf("\tssthresh %10lu%c  rtt      %10ld%c  "
660 		    "rttvar   %10ld%c\n",
661 		    rt->rt_rmx.rmx_ssthresh,
662 		    (rt->rt_rmx.rmx_locks & RTV_SSTHRESH) ? 'L' : ' ',
663 		    rt->rt_rmx.rmx_rtt,
664 		    (rt->rt_rmx.rmx_locks & RTV_RTT) ? 'L' : ' ',
665 		    rt->rt_rmx.rmx_rttvar,
666 		    (rt->rt_rmx.rmx_locks & RTV_RTTVAR) ? 'L' : ' ');
667 	}
668 }
669 
670 char *
671 routename(in_addr_t in)
672 {
673 	char *cp;
674 	static char line[MAXHOSTNAMELEN];
675 	struct hostent *hp;
676 	static char domain[MAXHOSTNAMELEN];
677 	static int first = 1;
678 
679 	if (first) {
680 		first = 0;
681 		if (gethostname(domain, sizeof domain) == 0 &&
682 		    (cp = strchr(domain, '.')))
683 			(void) strlcpy(domain, cp + 1, sizeof domain);
684 		else
685 			domain[0] = '\0';
686 	}
687 	cp = 0;
688 	if (!nflag) {
689 		hp = gethostbyaddr((char *)&in, sizeof (struct in_addr),
690 		    AF_INET);
691 		if (hp) {
692 			if ((cp = strchr(hp->h_name, '.')) &&
693 			    !strcmp(cp + 1, domain))
694 				*cp = 0;
695 			cp = hp->h_name;
696 		}
697 	}
698 	if (cp) {
699 		strlcpy(line, cp, sizeof(line));
700 	} else {
701 #define C(x)	((x) & 0xff)
702 		in = ntohl(in);
703 		snprintf(line, sizeof line, "%u.%u.%u.%u",
704 		    C(in >> 24), C(in >> 16), C(in >> 8), C(in));
705 	}
706 	return (line);
707 }
708 
709 /*
710  * Return the name of the network whose address is given.
711  * The address is assumed to be that of a net or subnet, not a host.
712  */
713 char *
714 netname(in_addr_t in, in_addr_t mask)
715 {
716 	char *cp = 0;
717 	static char line[MAXHOSTNAMELEN];
718 	struct netent *np = 0;
719 	int mbits;
720 
721 	in = ntohl(in);
722 	mask = ntohl(mask);
723 	if (!nflag && in != INADDR_ANY) {
724 		if ((np = getnetbyaddr(in, AF_INET)) != NULL)
725 			cp = np->n_name;
726 	}
727 	mbits = mask ? 33 - ffs(mask) : 0;
728 	if (cp) {
729 		strlcpy(line, cp, sizeof(line));
730 	} else if (mbits < 9)
731 		snprintf(line, sizeof line, "%u/%d", C(in >> 24), mbits);
732 	else if (mbits < 17)
733 		snprintf(line, sizeof line, "%u.%u/%d",
734 		    C(in >> 24) , C(in >> 16), mbits);
735 	else if (mbits < 25)
736 		snprintf(line, sizeof line, "%u.%u.%u/%d",
737 		    C(in >> 24), C(in >> 16), C(in >> 8), mbits);
738 	else
739 		snprintf(line, sizeof line, "%u.%u.%u.%u/%d", C(in >> 24),
740 		    C(in >> 16), C(in >> 8), C(in), mbits);
741 	return (line);
742 }
743 
744 #ifdef INET6
745 char *
746 netname6(struct sockaddr_in6 *sa6, struct in6_addr *mask)
747 {
748 	static char line[MAXHOSTNAMELEN + 1];
749 	struct sockaddr_in6 sin6;
750 	u_char *p;
751 	u_char *lim;
752 	int masklen, final = 0, illegal = 0;
753 	int i;
754 	char hbuf[NI_MAXHOST];
755 #ifdef NI_WITHSCOPEID
756 	int flag = NI_WITHSCOPEID;
757 #else
758 	int flag = 0;
759 #endif
760 	int error;
761 
762 	sin6 = *sa6;
763 
764 	masklen = 0;
765 	lim = (u_char *)(mask + 1);
766 	i = 0;
767 	if (mask) {
768 		for (p = (u_char *)mask; p < lim; p++) {
769 			if (final && *p) {
770 				illegal++;
771 				sin6.sin6_addr.s6_addr[i++] = 0x00;
772 				continue;
773 			}
774 
775 			switch (*p & 0xff) {
776 			case 0xff:
777 				masklen += 8;
778 				break;
779 			case 0xfe:
780 				masklen += 7;
781 				final++;
782 				break;
783 			case 0xfc:
784 				masklen += 6;
785 				final++;
786 				break;
787 			case 0xf8:
788 				masklen += 5;
789 				final++;
790 				break;
791 			case 0xf0:
792 				masklen += 4;
793 				final++;
794 				break;
795 			case 0xe0:
796 				masklen += 3;
797 				final++;
798 				break;
799 			case 0xc0:
800 				masklen += 2;
801 				final++;
802 				break;
803 			case 0x80:
804 				masklen += 1;
805 				final++;
806 				break;
807 			case 0x00:
808 				final++;
809 				break;
810 			default:
811 				final++;
812 				illegal++;
813 				break;
814 			}
815 
816 			if (!illegal)
817 				sin6.sin6_addr.s6_addr[i++] &= *p;
818 			else
819 				sin6.sin6_addr.s6_addr[i++] = 0x00;
820 		}
821 	} else
822 		masklen = 128;
823 
824 	if (masklen == 0 && IN6_IS_ADDR_UNSPECIFIED(&sin6.sin6_addr))
825 		return("default");
826 
827 	if (illegal)
828 		fprintf(stderr, "illegal prefixlen\n");
829 
830 	if (nflag)
831 		flag |= NI_NUMERICHOST;
832 	error = getnameinfo((struct sockaddr *)&sin6, sin6.sin6_len,
833 	    hbuf, sizeof(hbuf), NULL, 0, flag);
834 	if (error)
835 		snprintf(hbuf, sizeof(hbuf), "invalid");
836 
837 	snprintf(line, sizeof(line), "%s/%d", hbuf, masklen);
838 	return line;
839 }
840 
841 char *
842 routename6(struct sockaddr_in6 *sa6)
843 {
844 	static char line[NI_MAXHOST];
845 #ifdef NI_WITHSCOPEID
846 	const int niflag = NI_NUMERICHOST | NI_WITHSCOPEID;
847 #else
848 	const int niflag = NI_NUMERICHOST;
849 #endif
850 	if (getnameinfo((struct sockaddr *)sa6, sa6->sin6_len,
851 	    line, sizeof(line), NULL, 0, niflag) != 0)
852 		strlcpy(line, "", sizeof line);
853 	return line;
854 }
855 #endif /*INET6*/
856 
857 /*
858  * Print routing statistics
859  */
860 void
861 rt_stats(u_long off)
862 {
863 	struct rtstat rtstat;
864 
865 	if (off == 0) {
866 		printf("rtstat: symbol not in namelist\n");
867 		return;
868 	}
869 	kread(off, (char *)&rtstat, sizeof (rtstat));
870 	printf("routing:\n");
871 	printf("\t%u bad routing redirect%s\n",
872 	    rtstat.rts_badredirect, plural(rtstat.rts_badredirect));
873 	printf("\t%u dynamically created route%s\n",
874 	    rtstat.rts_dynamic, plural(rtstat.rts_dynamic));
875 	printf("\t%u new gateway%s due to redirects\n",
876 	    rtstat.rts_newgateway, plural(rtstat.rts_newgateway));
877 	printf("\t%u destination%s found unreachable\n",
878 	    rtstat.rts_unreach, plural(rtstat.rts_unreach));
879 	printf("\t%u use%s of a wildcard route\n",
880 	    rtstat.rts_wildcard, plural(rtstat.rts_wildcard));
881 }
882 
883 short ns_nullh[] = {0,0,0};
884 short ns_bh[] = {-1,-1,-1};
885 
886 char *
887 ns_print(struct sockaddr *sa)
888 {
889 	struct sockaddr_ns *sns = (struct sockaddr_ns*)sa;
890 	struct ns_addr work;
891 	union { union ns_net net_e; u_long long_e; } net;
892 	in_port_t port;
893 	static char mybuf[50], cport[10], chost[25];
894 	char *host = "";
895 	char *p;
896 	u_char *q;
897 
898 	work = sns->sns_addr;
899 	port = ntohs(work.x_port);
900 	work.x_port = 0;
901 	net.net_e = work.x_net;
902 	if (ns_nullhost(work) && net.long_e == 0) {
903 		if (port ) {
904 			snprintf(mybuf, sizeof mybuf, "*.%xH", port);
905 			upHex(mybuf);
906 		} else
907 			snprintf(mybuf, sizeof mybuf, "*.*");
908 		return (mybuf);
909 	}
910 
911 	if (bcmp(ns_bh, work.x_host.c_host, 6) == 0) {
912 		host = "any";
913 	} else if (bcmp(ns_nullh, work.x_host.c_host, 6) == 0) {
914 		host = "*";
915 	} else {
916 		q = work.x_host.c_host;
917 		snprintf(chost, sizeof chost, "%02x%02x%02x%02x%02x%02xH",
918 		    q[0], q[1], q[2], q[3], q[4], q[5]);
919 		for (p = chost; *p == '0' && p < chost + 12; p++)
920 			continue;
921 		host = p;
922 	}
923 	if (port)
924 		snprintf(cport, sizeof cport, ".%xH", htons(port));
925 	else
926 		*cport = 0;
927 
928 	snprintf(mybuf, sizeof mybuf, "%xH.%s%s", ntohl(net.long_e),
929 	    host, cport);
930 	upHex(mybuf);
931 	return(mybuf);
932 }
933 
934 char *
935 ns_phost(struct sockaddr *sa)
936 {
937 	struct sockaddr_ns *sns = (struct sockaddr_ns *)sa;
938 	struct sockaddr_ns work;
939 	static union ns_net ns_zeronet;
940 	char *p;
941 
942 	work = *sns;
943 	work.sns_addr.x_port = 0;
944 	work.sns_addr.x_net = ns_zeronet;
945 
946 	p = ns_print((struct sockaddr *)&work);
947 	if (strncmp("0H.", p, 3) == 0)
948 		p += 3;
949 	return(p);
950 }
951 
952 u_short ipx_nullh[] = {0,0,0};
953 u_short ipx_bh[] = {0xffff,0xffff,0xffff};
954 
955 char *
956 ipx_print(struct sockaddr *sa)
957 {
958 	struct sockaddr_ipx *sipx = (struct sockaddr_ipx*)sa;
959 	struct ipx_addr work;
960 	union { union ipx_net net_e; u_long long_e; } net;
961 	in_port_t port;
962 	static char mybuf[50], cport[10], chost[25];
963 	char *host = "";
964 	char *q;
965 
966 	work = sipx->sipx_addr;
967 	port = ntohs(work.ipx_port);
968 	work.ipx_port = 0;
969 	net.net_e = work.ipx_net;
970 	if (ipx_nullhost(work) && net.long_e == 0) {
971 		if (port != 0) {
972 			snprintf(mybuf, sizeof mybuf, "*.%xH", port);
973 			upHex(mybuf);
974 		} else
975 			snprintf(mybuf, sizeof mybuf, "*.*");
976 		return (mybuf);
977 	}
978 
979 	if (bcmp(ipx_bh, work.ipx_host.c_host, 6) == 0) {
980 		host = "any";
981 	} else if (bcmp(ipx_nullh, work.ipx_host.c_host, 6) == 0) {
982 		host = "*";
983 	} else {
984 		q = work.ipx_host.c_host;
985 		snprintf(chost, sizeof chost, "%02x:%02x:%02x:%02x:%02x:%02x",
986 		    q[0], q[1], q[2], q[3], q[4], q[5]);
987 		host = chost;
988 	}
989 	if (port)
990 		snprintf(cport, sizeof cport, ".%xH", htons(port));
991 	else
992 		*cport = 0;
993 
994 	snprintf(mybuf, sizeof mybuf, "%xH.%s%s", ntohl(net.long_e),
995 	    host, cport);
996 	upHex(mybuf);
997 	return(mybuf);
998 }
999 
1000 char *
1001 ipx_phost(struct sockaddr *sa)
1002 {
1003 	struct sockaddr_ipx *sipx = (struct sockaddr_ipx *)sa;
1004 	struct sockaddr_ipx work;
1005 	static union ipx_net ipx_zeronet;
1006 	char *p;
1007 
1008 	work = *sipx;
1009 	work.sipx_addr.ipx_port = 0;
1010 	work.sipx_addr.ipx_net = ipx_zeronet;
1011 
1012 	p = ipx_print((struct sockaddr *)&work);
1013 	if (strncmp("0H.", p, 3) == 0)
1014 		p += 3;
1015 	return(p);
1016 }
1017 
1018 static void
1019 encap_print(struct rtentry *rt)
1020 {
1021 	struct sockaddr_encap sen1, sen2, sen3;
1022 	struct ipsec_policy ipo;
1023 
1024 #ifdef INET6
1025 	struct sockaddr_in6 s61, s62;
1026 #endif /* INET6 */
1027 
1028 	bcopy(kgetsa(rt_key(rt)), &sen1, sizeof(sen1));
1029 	bcopy(kgetsa(rt_mask(rt)), &sen2, sizeof(sen2));
1030 	bcopy(kgetsa(rt->rt_gateway), &sen3, sizeof(sen3));
1031 
1032 	if (sen1.sen_type == SENT_IP4) {
1033 		printf("%-18s %-5u ", netname(sen1.sen_ip_src.s_addr,
1034 		    sen2.sen_ip_src.s_addr), ntohs(sen1.sen_sport));
1035 		printf("%-18s %-5u %-5u ", netname(sen1.sen_ip_dst.s_addr,
1036 		    sen2.sen_ip_dst.s_addr),
1037 		    ntohs(sen1.sen_dport), sen1.sen_proto);
1038 	}
1039 
1040 #ifdef INET6
1041 	if (sen1.sen_type == SENT_IP6) {
1042 		bzero(&s61, sizeof(s61));
1043 		bzero(&s62, sizeof(s62));
1044 		s61.sin6_family = s62.sin6_family = AF_INET6;
1045 		s61.sin6_len = s62.sin6_len = sizeof(s61);
1046 		bcopy(&sen1.sen_ip6_src, &s61.sin6_addr, sizeof(struct in6_addr));
1047 		bcopy(&sen2.sen_ip6_src, &s62.sin6_addr, sizeof(struct in6_addr));
1048 
1049 		printf("%-42s %-5u ", netname6(&s61, &s62.sin6_addr),
1050 		    ntohs(sen1.sen_ip6_sport));
1051 
1052 		bzero(&s61, sizeof(s61));
1053 		bzero(&s62, sizeof(s62));
1054 		s61.sin6_family = s62.sin6_family = AF_INET6;
1055 		s61.sin6_len = s62.sin6_len = sizeof(s61);
1056 		bcopy(&sen1.sen_ip6_dst, &s61.sin6_addr, sizeof(struct in6_addr));
1057 		bcopy(&sen2.sen_ip6_dst, &s62.sin6_addr, sizeof(struct in6_addr));
1058 
1059 		printf("%-42s %-5u %-5u ", netname6(&s61, &s62.sin6_addr),
1060 		    ntohs(sen1.sen_ip6_dport), sen1.sen_ip6_proto);
1061 	}
1062 #endif /* INET6 */
1063 
1064 	if (sen3.sen_type == SENT_IPSP) {
1065 		char hostn[NI_MAXHOST];
1066 
1067 		kget(sen3.sen_ipsp, ipo);
1068 
1069 		if (getnameinfo(&ipo.ipo_dst.sa, ipo.ipo_dst.sa.sa_len,
1070 		    hostn, NI_MAXHOST, NULL, 0, NI_NUMERICHOST) != 0)
1071 			strlcpy (hostn, "none", NI_MAXHOST);
1072 
1073 		printf("%s", hostn);
1074 		printf("/%-u", ipo.ipo_sproto);
1075 
1076 		switch (ipo.ipo_type) {
1077 		case IPSP_IPSEC_REQUIRE:
1078 			printf("/require");
1079 			break;
1080 		case IPSP_IPSEC_ACQUIRE:
1081 			printf("/acquire");
1082 			break;
1083 		case IPSP_IPSEC_USE:
1084 			printf("/use");
1085 			break;
1086 		case IPSP_IPSEC_DONTACQ:
1087 			printf("/dontacq");
1088 			break;
1089 		case IPSP_PERMIT:
1090 			printf("/permit");
1091 			break;
1092 		case IPSP_DENY:
1093 			printf("/deny");
1094 			break;
1095 		default:
1096 			printf("/<unknown type!>");
1097 			break;
1098 		}
1099 
1100 		if ((ipo.ipo_addr.sen_type == SENT_IP4 &&
1101 		    ipo.ipo_addr.sen_direction == IPSP_DIRECTION_IN) ||
1102 		    (ipo.ipo_addr.sen_type == SENT_IP6 &&
1103 		    ipo.ipo_addr.sen_ip6_direction == IPSP_DIRECTION_IN))
1104 			printf("/in\n");
1105 		else if ((ipo.ipo_addr.sen_type == SENT_IP4 &&
1106 		    ipo.ipo_addr.sen_direction == IPSP_DIRECTION_OUT) ||
1107 		    (ipo.ipo_addr.sen_type == SENT_IP6 &&
1108 		    ipo.ipo_addr.sen_ip6_direction == IPSP_DIRECTION_OUT))
1109 			printf("/out\n");
1110 		else
1111 			printf("/<unknown>\n");
1112 	}
1113 }
1114 
1115 void
1116 upHex(char *p0)
1117 {
1118 	char *p = p0;
1119 
1120 	for (; *p; p++)
1121 		switch (*p) {
1122 		case 'a':
1123 		case 'b':
1124 		case 'c':
1125 		case 'd':
1126 		case 'e':
1127 		case 'f':
1128 			*p += ('A' - 'a');
1129 			break;
1130 	}
1131 }
1132