1 /* $OpenBSD: route.c,v 1.54 2003/06/26 21:59:11 deraadt Exp $ */ 2 /* $NetBSD: route.c,v 1.15 1996/05/07 02:55:06 thorpej Exp $ */ 3 4 /* 5 * Copyright (c) 1983, 1988, 1993 6 * The Regents of the University of California. All rights reserved. 7 * 8 * Redistribution and use in source and binary forms, with or without 9 * modification, are permitted provided that the following conditions 10 * are met: 11 * 1. Redistributions of source code must retain the above copyright 12 * notice, this list of conditions and the following disclaimer. 13 * 2. Redistributions in binary form must reproduce the above copyright 14 * notice, this list of conditions and the following disclaimer in the 15 * documentation and/or other materials provided with the distribution. 16 * 3. Neither the name of the University nor the names of its contributors 17 * may be used to endorse or promote products derived from this software 18 * without specific prior written permission. 19 * 20 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 21 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 22 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 23 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 24 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 25 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 26 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 27 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 28 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 29 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 30 * SUCH DAMAGE. 31 */ 32 33 #ifndef lint 34 #if 0 35 static char sccsid[] = "from: @(#)route.c 8.3 (Berkeley) 3/9/94"; 36 #else 37 static char *rcsid = "$OpenBSD: route.c,v 1.54 2003/06/26 21:59:11 deraadt Exp $"; 38 #endif 39 #endif /* not lint */ 40 41 #include <sys/param.h> 42 #include <sys/protosw.h> 43 #include <sys/socket.h> 44 #include <sys/mbuf.h> 45 46 #include <net/if.h> 47 #include <net/if_dl.h> 48 #include <net/if_types.h> 49 #define _KERNEL 50 #include <net/route.h> 51 #undef _KERNEL 52 #include <netinet/in.h> 53 #include <arpa/inet.h> 54 55 #include <netns/ns.h> 56 57 #include <netipx/ipx.h> 58 59 #include <netatalk/at.h> 60 61 #include <sys/sysctl.h> 62 63 #include <arpa/inet.h> 64 65 #include <limits.h> 66 #include <netdb.h> 67 #include <stdio.h> 68 #include <stdlib.h> 69 #include <string.h> 70 #include <unistd.h> 71 72 #ifndef INET 73 #define INET 74 #endif 75 76 #include <sys/socket.h> 77 #include <netinet/ip_ipsp.h> 78 #include "netstat.h" 79 80 #define kget(p, d) (kread((u_long)(p), (char *)&(d), sizeof (d))) 81 82 /* alignment constraint for routing socket */ 83 #define ROUNDUP(a) \ 84 ((a) > 0 ? (1 + (((a) - 1) | (sizeof(long) - 1))) : sizeof(long)) 85 #define ADVANCE(x, n) (x += ROUNDUP((n)->sa_len)) 86 87 struct radix_node_head *rt_tables[AF_MAX+1]; 88 89 /* 90 * Definitions for showing gateway flags. 91 */ 92 struct bits { 93 short b_mask; 94 char b_val; 95 } bits[] = { 96 { RTF_UP, 'U' }, 97 { RTF_GATEWAY, 'G' }, 98 { RTF_HOST, 'H' }, 99 { RTF_REJECT, 'R' }, 100 { RTF_BLACKHOLE, 'B' }, 101 { RTF_DYNAMIC, 'D' }, 102 { RTF_MODIFIED, 'M' }, 103 { RTF_DONE, 'd' }, /* Completed -- for routing messages only */ 104 { RTF_MASK, 'm' }, /* Mask Present -- for routing messages only */ 105 { RTF_CLONING, 'C' }, 106 { RTF_XRESOLVE, 'X' }, 107 { RTF_LLINFO, 'L' }, 108 { RTF_STATIC, 'S' }, 109 { RTF_PROTO1, '1' }, 110 { RTF_PROTO2, '2' }, 111 { RTF_PROTO3, '3' }, 112 { 0 } 113 }; 114 115 static union { 116 struct sockaddr u_sa; 117 u_int32_t u_data[64]; 118 int u_dummy; /* force word-alignment */ 119 } pt_u; 120 121 int do_rtent = 0; 122 struct rtentry rtentry; 123 struct radix_node rnode; 124 struct radix_mask rmask; 125 126 int NewTree = 0; 127 128 static struct sockaddr *kgetsa(struct sockaddr *); 129 static void p_tree(struct radix_node *); 130 static void p_rtnode(void); 131 static void p_rtflags(u_char); 132 static void ntreestuff(void); 133 static void np_rtentry(struct rt_msghdr *); 134 static void p_sockaddr(struct sockaddr *, struct sockaddr *, int, int); 135 static void p_flags(int, char *); 136 static void p_rtentry(struct rtentry *); 137 static void encap_print(struct rtentry *); 138 139 /* 140 * Print routing tables. 141 */ 142 void 143 routepr(u_long rtree) 144 { 145 struct radix_node_head *rnh, head; 146 int i; 147 148 printf("Routing tables\n"); 149 150 if (Aflag == 0 && NewTree) 151 ntreestuff(); 152 else { 153 if (rtree == 0) { 154 printf("rt_tables: symbol not in namelist\n"); 155 return; 156 } 157 158 kget(rtree, rt_tables); 159 for (i = 0; i <= AF_MAX; i++) { 160 if ((rnh = rt_tables[i]) == 0) 161 continue; 162 kget(rnh, head); 163 if (i == AF_UNSPEC) { 164 if (Aflag && af == 0) { 165 printf("Netmasks:\n"); 166 p_tree(head.rnh_treetop); 167 } 168 } else if (af == AF_UNSPEC || af == i) { 169 pr_family(i); 170 do_rtent = 1; 171 if (i != PF_KEY) 172 pr_rthdr(i); 173 else 174 pr_encaphdr(); 175 p_tree(head.rnh_treetop); 176 } 177 } 178 } 179 } 180 181 /* 182 * Print address family header before a section of the routing table. 183 */ 184 void 185 pr_family(int af) 186 { 187 char *afname; 188 189 switch (af) { 190 case AF_INET: 191 afname = "Internet"; 192 break; 193 #ifdef INET6 194 case AF_INET6: 195 afname = "Internet6"; 196 break; 197 #endif 198 case AF_NS: 199 afname = "XNS"; 200 break; 201 case AF_IPX: 202 afname = "IPX"; 203 break; 204 case AF_ISO: 205 afname = "ISO"; 206 break; 207 case AF_CCITT: 208 afname = "X.25"; 209 break; 210 case PF_KEY: 211 afname = "Encap"; 212 break; 213 case AF_APPLETALK: 214 afname = "AppleTalk"; 215 break; 216 default: 217 afname = NULL; 218 break; 219 } 220 if (afname) 221 printf("\n%s:\n", afname); 222 else 223 printf("\nProtocol Family %d:\n", af); 224 } 225 226 /* column widths; each followed by one space */ 227 #ifndef INET6 228 #define WID_DST(af) 18 /* width of destination column */ 229 #define WID_GW(af) 18 /* width of gateway column */ 230 #else 231 /* width of destination/gateway column */ 232 #if 1 233 /* strlen("fe80::aaaa:bbbb:cccc:dddd@gif0") == 30, strlen("/128") == 4 */ 234 #define WID_DST(af) ((af) == AF_INET6 ? (nflag ? 34 : 18) : 18) 235 #define WID_GW(af) ((af) == AF_INET6 ? (nflag ? 30 : 18) : 18) 236 #else 237 /* strlen("fe80::aaaa:bbbb:cccc:dddd") == 25, strlen("/128") == 4 */ 238 #define WID_DST(af) ((af) == AF_INET6 ? (nflag ? 29 : 18) : 18) 239 #define WID_GW(af) ((af) == AF_INET6 ? (nflag ? 25 : 18) : 18) 240 #endif 241 #endif /* INET6 */ 242 243 /* 244 * Print header for routing table columns. 245 */ 246 void 247 pr_rthdr(int af) 248 { 249 250 if (Aflag) 251 printf("%-*.*s ", PLEN, PLEN, "Address"); 252 printf("%-*.*s %-*.*s %-6.6s %6.6s %6.6s %6.6s %s\n", 253 WID_DST(af), WID_DST(af), "Destination", 254 WID_GW(af), WID_GW(af), "Gateway", 255 "Flags", "Refs", "Use", "Mtu", "Interface"); 256 } 257 258 /* 259 * Print header for PF_KEY entries. 260 */ 261 void 262 pr_encaphdr(void) 263 { 264 if (Aflag) 265 printf("%-*s ", PLEN, "Address"); 266 printf("%-18s %-5s %-18s %-5s %-5s %-22s\n", 267 "Source", "Port", "Destination", 268 "Port", "Proto", "SA(Address/Proto/Type/Direction)"); 269 } 270 271 static struct sockaddr * 272 kgetsa(struct sockaddr *dst) 273 { 274 275 kget(dst, pt_u.u_sa); 276 if (pt_u.u_sa.sa_len > sizeof (pt_u.u_sa)) 277 kread((u_long)dst, (char *)pt_u.u_data, pt_u.u_sa.sa_len); 278 return (&pt_u.u_sa); 279 } 280 281 static void 282 p_tree(struct radix_node *rn) 283 { 284 285 again: 286 kget(rn, rnode); 287 if (rnode.rn_b < 0) { 288 if (Aflag) 289 printf("%-16p ", rn); 290 if (rnode.rn_flags & RNF_ROOT) { 291 if (Aflag) 292 printf("(root node)%s", 293 rnode.rn_dupedkey ? " =>\n" : "\n"); 294 } else if (do_rtent) { 295 kget(rn, rtentry); 296 p_rtentry(&rtentry); 297 if (Aflag) 298 p_rtnode(); 299 } else { 300 p_sockaddr(kgetsa((struct sockaddr *)rnode.rn_key), 301 0, 0, 44); 302 putchar('\n'); 303 } 304 if ((rn = rnode.rn_dupedkey)) 305 goto again; 306 } else { 307 if (Aflag && do_rtent) { 308 printf("%-16p ", rn); 309 p_rtnode(); 310 } 311 rn = rnode.rn_r; 312 p_tree(rnode.rn_l); 313 p_tree(rn); 314 } 315 } 316 317 static void 318 p_rtflags(u_char flags) 319 { 320 putchar('<'); 321 if (flags & RNF_NORMAL) 322 putchar('N'); 323 if (flags & RNF_ROOT) 324 putchar('R'); 325 if (flags & RNF_ACTIVE) 326 putchar('A'); 327 if (flags & RNF_IGNORE) 328 putchar('I'); 329 if (flags & ~(RNF_NORMAL | RNF_ROOT | RNF_ACTIVE | RNF_IGNORE)) 330 printf("/0x%02x", flags); 331 putchar('>'); 332 } 333 334 char nbuf[25]; 335 336 static void 337 p_rtnode(void) 338 { 339 struct radix_mask *rm = rnode.rn_mklist; 340 341 if (rnode.rn_b < 0) { 342 if (rnode.rn_mask) { 343 printf("\t mask "); 344 p_sockaddr(kgetsa((struct sockaddr *)rnode.rn_mask), 345 0, 0, -1); 346 } else if (rm == 0) 347 return; 348 } else { 349 snprintf(nbuf, sizeof nbuf, "(%d)", rnode.rn_b); 350 printf("%6.6s %16p : %16p", nbuf, rnode.rn_l, 351 rnode.rn_r); 352 } 353 354 putchar(' '); 355 p_rtflags(rnode.rn_flags); 356 357 while (rm) { 358 kget(rm, rmask); 359 snprintf(nbuf, sizeof nbuf, " %d refs, ", rmask.rm_refs); 360 printf(" mk = %16p {(%d),%s", 361 rm, -1 - rmask.rm_b, rmask.rm_refs ? nbuf : " "); 362 p_rtflags(rmask.rm_flags); 363 printf(", "); 364 if (rmask.rm_flags & RNF_NORMAL) { 365 struct radix_node rnode_aux; 366 367 printf("leaf = %p ", rmask.rm_leaf); 368 kget(rmask.rm_leaf, rnode_aux); 369 p_sockaddr(kgetsa((struct sockaddr *)rnode_aux.rn_mask), 370 0, 0, -1); 371 } else 372 p_sockaddr(kgetsa((struct sockaddr *)rmask.rm_mask), 373 0, 0, -1); 374 putchar('}'); 375 if ((rm = rmask.rm_mklist)) 376 printf(" ->"); 377 } 378 putchar('\n'); 379 } 380 381 static void 382 ntreestuff(void) 383 { 384 size_t needed; 385 int mib[6]; 386 char *buf, *next, *lim; 387 struct rt_msghdr *rtm; 388 389 mib[0] = CTL_NET; 390 mib[1] = PF_ROUTE; 391 mib[2] = 0; 392 mib[3] = 0; 393 mib[4] = NET_RT_DUMP; 394 mib[5] = 0; 395 if (sysctl(mib, 6, NULL, &needed, NULL, 0) < 0) { 396 perror("route-sysctl-estimate"); 397 exit(1); 398 } 399 if ((buf = malloc(needed)) == 0) { 400 printf("out of space\n"); 401 exit(1); 402 } 403 if (sysctl(mib, 6, buf, &needed, NULL, 0) < 0) { 404 perror("sysctl of routing table"); 405 exit(1); 406 } 407 lim = buf + needed; 408 for (next = buf; next < lim; next += rtm->rtm_msglen) { 409 rtm = (struct rt_msghdr *)next; 410 np_rtentry(rtm); 411 } 412 } 413 414 static void 415 np_rtentry(struct rt_msghdr *rtm) 416 { 417 struct sockaddr *sa = (struct sockaddr *)(rtm + 1); 418 #ifdef notdef 419 static int masks_done, banner_printed; 420 #endif 421 static int old_af; 422 int af = 0, interesting = RTF_UP | RTF_GATEWAY | RTF_HOST; 423 424 #ifdef notdef 425 /* for the moment, netmasks are skipped over */ 426 if (!banner_printed) { 427 printf("Netmasks:\n"); 428 banner_printed = 1; 429 } 430 if (masks_done == 0) { 431 if (rtm->rtm_addrs != RTA_DST ) { 432 masks_done = 1; 433 af = sa->sa_family; 434 } 435 } else 436 #endif 437 af = sa->sa_family; 438 if (af != old_af) { 439 pr_family(af); 440 old_af = af; 441 } 442 if (rtm->rtm_addrs == RTA_DST) 443 p_sockaddr(sa, 0, 0, 36); 444 else { 445 p_sockaddr(sa, 0, rtm->rtm_flags, 16); 446 sa = (struct sockaddr *)(ROUNDUP(sa->sa_len) + (char *)sa); 447 p_sockaddr(sa, 0, 0, 18); 448 } 449 p_flags(rtm->rtm_flags & interesting, "%-6.6s "); 450 putchar('\n'); 451 } 452 453 static void 454 p_sockaddr(struct sockaddr *sa, struct sockaddr *mask, int flags, int width) 455 { 456 char workbuf[128], *cplim; 457 char *cp = workbuf; 458 size_t n; 459 460 switch (sa->sa_family) { 461 case AF_INET: 462 { 463 struct sockaddr_in *sin = (struct sockaddr_in *)sa; 464 struct sockaddr_in *msin = (struct sockaddr_in *)mask; 465 466 cp = (sin->sin_addr.s_addr == 0) ? "default" : 467 ((flags & RTF_HOST) || mask == NULL ? 468 routename(sin->sin_addr.s_addr) : 469 netname(sin->sin_addr.s_addr, msin->sin_addr.s_addr)); 470 471 break; 472 } 473 474 #ifdef INET6 475 case AF_INET6: 476 { 477 struct sockaddr_in6 *sa6 = (struct sockaddr_in6 *)sa; 478 #ifdef __KAME__ 479 struct in6_addr *in6 = &sa6->sin6_addr; 480 481 /* 482 * XXX: This is a special workaround for KAME kernels. 483 * sin6_scope_id field of SA should be set in the future. 484 */ 485 if (IN6_IS_ADDR_LINKLOCAL(in6) || 486 IN6_IS_ADDR_MC_LINKLOCAL(in6)) { 487 /* XXX: override is ok? */ 488 sa6->sin6_scope_id = (u_int32_t)ntohs(*(u_short *) 489 &in6->s6_addr[2]); 490 *(u_short *)&in6->s6_addr[2] = 0; 491 } 492 #endif 493 if (flags & RTF_HOST) 494 cp = routename6(sa6); 495 else if (mask) { 496 cp = netname6(sa6, 497 &((struct sockaddr_in6 *)mask)->sin6_addr); 498 } else 499 cp = netname6(sa6, NULL); 500 break; 501 } 502 #endif 503 504 case AF_NS: 505 cp = ns_print(sa); 506 break; 507 508 case AF_IPX: 509 cp = ipx_print(sa); 510 break; 511 512 case AF_LINK: 513 { 514 struct sockaddr_dl *sdl = (struct sockaddr_dl *)sa; 515 516 if (sdl->sdl_nlen == 0 && sdl->sdl_alen == 0 && 517 sdl->sdl_slen == 0) 518 (void) snprintf(workbuf, sizeof workbuf, 519 "link#%d", sdl->sdl_index); 520 else switch (sdl->sdl_type) { 521 case IFT_ETHER: 522 { 523 int i; 524 u_char *lla = (u_char *)sdl->sdl_data + 525 sdl->sdl_nlen; 526 527 cplim = ""; 528 for (i = 0; i < sdl->sdl_alen; i++, lla++) { 529 n = snprintf(cp, 530 workbuf + sizeof (workbuf) - cp, 531 "%s%x", cplim, *lla); 532 cplim = ":"; 533 if (n < 0) /* What else to do ? */ 534 continue; 535 if (n >= workbuf + sizeof (workbuf) - cp) 536 n = workbuf + sizeof (workbuf) - cp - 1; 537 cp += n; 538 } 539 cp = workbuf; 540 break; 541 } 542 default: 543 cp = link_ntoa(sdl); 544 break; 545 } 546 break; 547 } 548 549 case AF_APPLETALK: 550 { 551 /* XXX could do better */ 552 cp = atalk_print(sa,11); 553 break; 554 } 555 default: 556 { 557 u_char *s = (u_char *)sa->sa_data, *slim; 558 559 slim = sa->sa_len + (u_char *) sa; 560 cplim = cp + sizeof(workbuf) - 6; 561 if ((n = snprintf(cp, cplim - cp, "(%d)", sa->sa_family)) >= 562 cplim - cp) 563 n = cplim - cp - 1; 564 if (n > 0) 565 cp += n; 566 while (s < slim && cp < cplim) { 567 if ((n = snprintf(cp, workbuf + sizeof (workbuf) - cp, 568 " %02x", *s++)) >= workbuf + sizeof (workbuf) - cp) 569 n = workbuf + sizeof (workbuf) - cp - 1; 570 if (n > 0) 571 cp += n; 572 if (s < slim) { 573 if ((n = snprintf(cp, 574 workbuf + sizeof (workbuf) - cp, 575 "%02x", *s++)) >= 576 workbuf + sizeof (workbuf) - cp) 577 n = workbuf + sizeof (workbuf) - cp - 1; 578 if (n > 0) 579 cp += n; 580 } 581 } 582 cp = workbuf; 583 } 584 } 585 if (width < 0 ) 586 printf("%s ", cp); 587 else { 588 if (nflag) 589 printf("%-*s ", width, cp); 590 else 591 printf("%-*.*s ", width, width, cp); 592 } 593 } 594 595 static void 596 p_flags(int f, char *format) 597 { 598 char name[33], *flags; 599 struct bits *p = bits; 600 601 for (flags = name; p->b_mask; p++) 602 if (p->b_mask & f) 603 *flags++ = p->b_val; 604 *flags = '\0'; 605 printf(format, name); 606 } 607 608 static void 609 p_rtentry(struct rtentry *rt) 610 { 611 static struct ifnet ifnet, *lastif; 612 struct sockaddr_storage sock1, sock2; 613 struct sockaddr *sa = (struct sockaddr *)&sock1; 614 struct sockaddr *mask = (struct sockaddr *)&sock2; 615 616 bcopy(kgetsa(rt_key(rt)), sa, sizeof(struct sockaddr)); 617 if (sa->sa_len > sizeof(struct sockaddr)) 618 bcopy(kgetsa(rt_key(rt)), sa, sa->sa_len); 619 620 if (sa->sa_family == PF_KEY) { 621 encap_print(rt); 622 return; 623 } 624 625 if (rt_mask(rt)) { 626 bcopy(kgetsa(rt_mask(rt)), mask, sizeof(struct sockaddr)); 627 if (sa->sa_len > sizeof(struct sockaddr)) 628 bcopy(kgetsa(rt_mask(rt)), mask, sa->sa_len); 629 } else 630 mask = 0; 631 632 p_sockaddr(sa, mask, rt->rt_flags, WID_DST(sa->sa_family)); 633 p_sockaddr(kgetsa(rt->rt_gateway), 0, RTF_HOST, WID_GW(sa->sa_family)); 634 p_flags(rt->rt_flags, "%-6.6s "); 635 printf("%6d %8ld ", rt->rt_refcnt, rt->rt_use); 636 if (rt->rt_rmx.rmx_mtu) 637 printf("%6ld ", rt->rt_rmx.rmx_mtu); 638 else 639 printf("%6s ", "-"); 640 putchar((rt->rt_rmx.rmx_locks & RTV_MTU) ? 'L' : ' '); 641 if (rt->rt_ifp) { 642 if (rt->rt_ifp != lastif) { 643 kget(rt->rt_ifp, ifnet); 644 lastif = rt->rt_ifp; 645 } 646 printf(" %.16s%s", ifnet.if_xname, 647 rt->rt_nodes[0].rn_dupedkey ? " =>" : ""); 648 } 649 putchar('\n'); 650 if (vflag) { 651 printf("\texpire %10lu%c recvpipe %10ld%c " 652 "sendpipe %10ld%c\n", 653 rt->rt_rmx.rmx_expire, 654 (rt->rt_rmx.rmx_locks & RTV_EXPIRE) ? 'L' : ' ', 655 rt->rt_rmx.rmx_recvpipe, 656 (rt->rt_rmx.rmx_locks & RTV_RPIPE) ? 'L' : ' ', 657 rt->rt_rmx.rmx_sendpipe, 658 (rt->rt_rmx.rmx_locks & RTV_SPIPE) ? 'L' : ' '); 659 printf("\tssthresh %10lu%c rtt %10ld%c " 660 "rttvar %10ld%c\n", 661 rt->rt_rmx.rmx_ssthresh, 662 (rt->rt_rmx.rmx_locks & RTV_SSTHRESH) ? 'L' : ' ', 663 rt->rt_rmx.rmx_rtt, 664 (rt->rt_rmx.rmx_locks & RTV_RTT) ? 'L' : ' ', 665 rt->rt_rmx.rmx_rttvar, 666 (rt->rt_rmx.rmx_locks & RTV_RTTVAR) ? 'L' : ' '); 667 } 668 } 669 670 char * 671 routename(in_addr_t in) 672 { 673 char *cp; 674 static char line[MAXHOSTNAMELEN]; 675 struct hostent *hp; 676 static char domain[MAXHOSTNAMELEN]; 677 static int first = 1; 678 679 if (first) { 680 first = 0; 681 if (gethostname(domain, sizeof domain) == 0 && 682 (cp = strchr(domain, '.'))) 683 (void) strlcpy(domain, cp + 1, sizeof domain); 684 else 685 domain[0] = '\0'; 686 } 687 cp = 0; 688 if (!nflag) { 689 hp = gethostbyaddr((char *)&in, sizeof (struct in_addr), 690 AF_INET); 691 if (hp) { 692 if ((cp = strchr(hp->h_name, '.')) && 693 !strcmp(cp + 1, domain)) 694 *cp = 0; 695 cp = hp->h_name; 696 } 697 } 698 if (cp) { 699 strlcpy(line, cp, sizeof(line)); 700 } else { 701 #define C(x) ((x) & 0xff) 702 in = ntohl(in); 703 snprintf(line, sizeof line, "%u.%u.%u.%u", 704 C(in >> 24), C(in >> 16), C(in >> 8), C(in)); 705 } 706 return (line); 707 } 708 709 /* 710 * Return the name of the network whose address is given. 711 * The address is assumed to be that of a net or subnet, not a host. 712 */ 713 char * 714 netname(in_addr_t in, in_addr_t mask) 715 { 716 char *cp = 0; 717 static char line[MAXHOSTNAMELEN]; 718 struct netent *np = 0; 719 int mbits; 720 721 in = ntohl(in); 722 mask = ntohl(mask); 723 if (!nflag && in != INADDR_ANY) { 724 if ((np = getnetbyaddr(in, AF_INET)) != NULL) 725 cp = np->n_name; 726 } 727 mbits = mask ? 33 - ffs(mask) : 0; 728 if (cp) { 729 strlcpy(line, cp, sizeof(line)); 730 } else if (mbits < 9) 731 snprintf(line, sizeof line, "%u/%d", C(in >> 24), mbits); 732 else if (mbits < 17) 733 snprintf(line, sizeof line, "%u.%u/%d", 734 C(in >> 24) , C(in >> 16), mbits); 735 else if (mbits < 25) 736 snprintf(line, sizeof line, "%u.%u.%u/%d", 737 C(in >> 24), C(in >> 16), C(in >> 8), mbits); 738 else 739 snprintf(line, sizeof line, "%u.%u.%u.%u/%d", C(in >> 24), 740 C(in >> 16), C(in >> 8), C(in), mbits); 741 return (line); 742 } 743 744 #ifdef INET6 745 char * 746 netname6(struct sockaddr_in6 *sa6, struct in6_addr *mask) 747 { 748 static char line[MAXHOSTNAMELEN + 1]; 749 struct sockaddr_in6 sin6; 750 u_char *p; 751 u_char *lim; 752 int masklen, final = 0, illegal = 0; 753 int i; 754 char hbuf[NI_MAXHOST]; 755 #ifdef NI_WITHSCOPEID 756 int flag = NI_WITHSCOPEID; 757 #else 758 int flag = 0; 759 #endif 760 int error; 761 762 sin6 = *sa6; 763 764 masklen = 0; 765 lim = (u_char *)(mask + 1); 766 i = 0; 767 if (mask) { 768 for (p = (u_char *)mask; p < lim; p++) { 769 if (final && *p) { 770 illegal++; 771 sin6.sin6_addr.s6_addr[i++] = 0x00; 772 continue; 773 } 774 775 switch (*p & 0xff) { 776 case 0xff: 777 masklen += 8; 778 break; 779 case 0xfe: 780 masklen += 7; 781 final++; 782 break; 783 case 0xfc: 784 masklen += 6; 785 final++; 786 break; 787 case 0xf8: 788 masklen += 5; 789 final++; 790 break; 791 case 0xf0: 792 masklen += 4; 793 final++; 794 break; 795 case 0xe0: 796 masklen += 3; 797 final++; 798 break; 799 case 0xc0: 800 masklen += 2; 801 final++; 802 break; 803 case 0x80: 804 masklen += 1; 805 final++; 806 break; 807 case 0x00: 808 final++; 809 break; 810 default: 811 final++; 812 illegal++; 813 break; 814 } 815 816 if (!illegal) 817 sin6.sin6_addr.s6_addr[i++] &= *p; 818 else 819 sin6.sin6_addr.s6_addr[i++] = 0x00; 820 } 821 } else 822 masklen = 128; 823 824 if (masklen == 0 && IN6_IS_ADDR_UNSPECIFIED(&sin6.sin6_addr)) 825 return("default"); 826 827 if (illegal) 828 fprintf(stderr, "illegal prefixlen\n"); 829 830 if (nflag) 831 flag |= NI_NUMERICHOST; 832 error = getnameinfo((struct sockaddr *)&sin6, sin6.sin6_len, 833 hbuf, sizeof(hbuf), NULL, 0, flag); 834 if (error) 835 snprintf(hbuf, sizeof(hbuf), "invalid"); 836 837 snprintf(line, sizeof(line), "%s/%d", hbuf, masklen); 838 return line; 839 } 840 841 char * 842 routename6(struct sockaddr_in6 *sa6) 843 { 844 static char line[NI_MAXHOST]; 845 #ifdef NI_WITHSCOPEID 846 const int niflag = NI_NUMERICHOST | NI_WITHSCOPEID; 847 #else 848 const int niflag = NI_NUMERICHOST; 849 #endif 850 if (getnameinfo((struct sockaddr *)sa6, sa6->sin6_len, 851 line, sizeof(line), NULL, 0, niflag) != 0) 852 strlcpy(line, "", sizeof line); 853 return line; 854 } 855 #endif /*INET6*/ 856 857 /* 858 * Print routing statistics 859 */ 860 void 861 rt_stats(u_long off) 862 { 863 struct rtstat rtstat; 864 865 if (off == 0) { 866 printf("rtstat: symbol not in namelist\n"); 867 return; 868 } 869 kread(off, (char *)&rtstat, sizeof (rtstat)); 870 printf("routing:\n"); 871 printf("\t%u bad routing redirect%s\n", 872 rtstat.rts_badredirect, plural(rtstat.rts_badredirect)); 873 printf("\t%u dynamically created route%s\n", 874 rtstat.rts_dynamic, plural(rtstat.rts_dynamic)); 875 printf("\t%u new gateway%s due to redirects\n", 876 rtstat.rts_newgateway, plural(rtstat.rts_newgateway)); 877 printf("\t%u destination%s found unreachable\n", 878 rtstat.rts_unreach, plural(rtstat.rts_unreach)); 879 printf("\t%u use%s of a wildcard route\n", 880 rtstat.rts_wildcard, plural(rtstat.rts_wildcard)); 881 } 882 883 short ns_nullh[] = {0,0,0}; 884 short ns_bh[] = {-1,-1,-1}; 885 886 char * 887 ns_print(struct sockaddr *sa) 888 { 889 struct sockaddr_ns *sns = (struct sockaddr_ns*)sa; 890 struct ns_addr work; 891 union { union ns_net net_e; u_long long_e; } net; 892 in_port_t port; 893 static char mybuf[50], cport[10], chost[25]; 894 char *host = ""; 895 char *p; 896 u_char *q; 897 898 work = sns->sns_addr; 899 port = ntohs(work.x_port); 900 work.x_port = 0; 901 net.net_e = work.x_net; 902 if (ns_nullhost(work) && net.long_e == 0) { 903 if (port ) { 904 snprintf(mybuf, sizeof mybuf, "*.%xH", port); 905 upHex(mybuf); 906 } else 907 snprintf(mybuf, sizeof mybuf, "*.*"); 908 return (mybuf); 909 } 910 911 if (bcmp(ns_bh, work.x_host.c_host, 6) == 0) { 912 host = "any"; 913 } else if (bcmp(ns_nullh, work.x_host.c_host, 6) == 0) { 914 host = "*"; 915 } else { 916 q = work.x_host.c_host; 917 snprintf(chost, sizeof chost, "%02x%02x%02x%02x%02x%02xH", 918 q[0], q[1], q[2], q[3], q[4], q[5]); 919 for (p = chost; *p == '0' && p < chost + 12; p++) 920 continue; 921 host = p; 922 } 923 if (port) 924 snprintf(cport, sizeof cport, ".%xH", htons(port)); 925 else 926 *cport = 0; 927 928 snprintf(mybuf, sizeof mybuf, "%xH.%s%s", ntohl(net.long_e), 929 host, cport); 930 upHex(mybuf); 931 return(mybuf); 932 } 933 934 char * 935 ns_phost(struct sockaddr *sa) 936 { 937 struct sockaddr_ns *sns = (struct sockaddr_ns *)sa; 938 struct sockaddr_ns work; 939 static union ns_net ns_zeronet; 940 char *p; 941 942 work = *sns; 943 work.sns_addr.x_port = 0; 944 work.sns_addr.x_net = ns_zeronet; 945 946 p = ns_print((struct sockaddr *)&work); 947 if (strncmp("0H.", p, 3) == 0) 948 p += 3; 949 return(p); 950 } 951 952 u_short ipx_nullh[] = {0,0,0}; 953 u_short ipx_bh[] = {0xffff,0xffff,0xffff}; 954 955 char * 956 ipx_print(struct sockaddr *sa) 957 { 958 struct sockaddr_ipx *sipx = (struct sockaddr_ipx*)sa; 959 struct ipx_addr work; 960 union { union ipx_net net_e; u_long long_e; } net; 961 in_port_t port; 962 static char mybuf[50], cport[10], chost[25]; 963 char *host = ""; 964 char *q; 965 966 work = sipx->sipx_addr; 967 port = ntohs(work.ipx_port); 968 work.ipx_port = 0; 969 net.net_e = work.ipx_net; 970 if (ipx_nullhost(work) && net.long_e == 0) { 971 if (port != 0) { 972 snprintf(mybuf, sizeof mybuf, "*.%xH", port); 973 upHex(mybuf); 974 } else 975 snprintf(mybuf, sizeof mybuf, "*.*"); 976 return (mybuf); 977 } 978 979 if (bcmp(ipx_bh, work.ipx_host.c_host, 6) == 0) { 980 host = "any"; 981 } else if (bcmp(ipx_nullh, work.ipx_host.c_host, 6) == 0) { 982 host = "*"; 983 } else { 984 q = work.ipx_host.c_host; 985 snprintf(chost, sizeof chost, "%02x:%02x:%02x:%02x:%02x:%02x", 986 q[0], q[1], q[2], q[3], q[4], q[5]); 987 host = chost; 988 } 989 if (port) 990 snprintf(cport, sizeof cport, ".%xH", htons(port)); 991 else 992 *cport = 0; 993 994 snprintf(mybuf, sizeof mybuf, "%xH.%s%s", ntohl(net.long_e), 995 host, cport); 996 upHex(mybuf); 997 return(mybuf); 998 } 999 1000 char * 1001 ipx_phost(struct sockaddr *sa) 1002 { 1003 struct sockaddr_ipx *sipx = (struct sockaddr_ipx *)sa; 1004 struct sockaddr_ipx work; 1005 static union ipx_net ipx_zeronet; 1006 char *p; 1007 1008 work = *sipx; 1009 work.sipx_addr.ipx_port = 0; 1010 work.sipx_addr.ipx_net = ipx_zeronet; 1011 1012 p = ipx_print((struct sockaddr *)&work); 1013 if (strncmp("0H.", p, 3) == 0) 1014 p += 3; 1015 return(p); 1016 } 1017 1018 static void 1019 encap_print(struct rtentry *rt) 1020 { 1021 struct sockaddr_encap sen1, sen2, sen3; 1022 struct ipsec_policy ipo; 1023 1024 #ifdef INET6 1025 struct sockaddr_in6 s61, s62; 1026 #endif /* INET6 */ 1027 1028 bcopy(kgetsa(rt_key(rt)), &sen1, sizeof(sen1)); 1029 bcopy(kgetsa(rt_mask(rt)), &sen2, sizeof(sen2)); 1030 bcopy(kgetsa(rt->rt_gateway), &sen3, sizeof(sen3)); 1031 1032 if (sen1.sen_type == SENT_IP4) { 1033 printf("%-18s %-5u ", netname(sen1.sen_ip_src.s_addr, 1034 sen2.sen_ip_src.s_addr), ntohs(sen1.sen_sport)); 1035 printf("%-18s %-5u %-5u ", netname(sen1.sen_ip_dst.s_addr, 1036 sen2.sen_ip_dst.s_addr), 1037 ntohs(sen1.sen_dport), sen1.sen_proto); 1038 } 1039 1040 #ifdef INET6 1041 if (sen1.sen_type == SENT_IP6) { 1042 bzero(&s61, sizeof(s61)); 1043 bzero(&s62, sizeof(s62)); 1044 s61.sin6_family = s62.sin6_family = AF_INET6; 1045 s61.sin6_len = s62.sin6_len = sizeof(s61); 1046 bcopy(&sen1.sen_ip6_src, &s61.sin6_addr, sizeof(struct in6_addr)); 1047 bcopy(&sen2.sen_ip6_src, &s62.sin6_addr, sizeof(struct in6_addr)); 1048 1049 printf("%-42s %-5u ", netname6(&s61, &s62.sin6_addr), 1050 ntohs(sen1.sen_ip6_sport)); 1051 1052 bzero(&s61, sizeof(s61)); 1053 bzero(&s62, sizeof(s62)); 1054 s61.sin6_family = s62.sin6_family = AF_INET6; 1055 s61.sin6_len = s62.sin6_len = sizeof(s61); 1056 bcopy(&sen1.sen_ip6_dst, &s61.sin6_addr, sizeof(struct in6_addr)); 1057 bcopy(&sen2.sen_ip6_dst, &s62.sin6_addr, sizeof(struct in6_addr)); 1058 1059 printf("%-42s %-5u %-5u ", netname6(&s61, &s62.sin6_addr), 1060 ntohs(sen1.sen_ip6_dport), sen1.sen_ip6_proto); 1061 } 1062 #endif /* INET6 */ 1063 1064 if (sen3.sen_type == SENT_IPSP) { 1065 char hostn[NI_MAXHOST]; 1066 1067 kget(sen3.sen_ipsp, ipo); 1068 1069 if (getnameinfo(&ipo.ipo_dst.sa, ipo.ipo_dst.sa.sa_len, 1070 hostn, NI_MAXHOST, NULL, 0, NI_NUMERICHOST) != 0) 1071 strlcpy (hostn, "none", NI_MAXHOST); 1072 1073 printf("%s", hostn); 1074 printf("/%-u", ipo.ipo_sproto); 1075 1076 switch (ipo.ipo_type) { 1077 case IPSP_IPSEC_REQUIRE: 1078 printf("/require"); 1079 break; 1080 case IPSP_IPSEC_ACQUIRE: 1081 printf("/acquire"); 1082 break; 1083 case IPSP_IPSEC_USE: 1084 printf("/use"); 1085 break; 1086 case IPSP_IPSEC_DONTACQ: 1087 printf("/dontacq"); 1088 break; 1089 case IPSP_PERMIT: 1090 printf("/permit"); 1091 break; 1092 case IPSP_DENY: 1093 printf("/deny"); 1094 break; 1095 default: 1096 printf("/<unknown type!>"); 1097 break; 1098 } 1099 1100 if ((ipo.ipo_addr.sen_type == SENT_IP4 && 1101 ipo.ipo_addr.sen_direction == IPSP_DIRECTION_IN) || 1102 (ipo.ipo_addr.sen_type == SENT_IP6 && 1103 ipo.ipo_addr.sen_ip6_direction == IPSP_DIRECTION_IN)) 1104 printf("/in\n"); 1105 else if ((ipo.ipo_addr.sen_type == SENT_IP4 && 1106 ipo.ipo_addr.sen_direction == IPSP_DIRECTION_OUT) || 1107 (ipo.ipo_addr.sen_type == SENT_IP6 && 1108 ipo.ipo_addr.sen_ip6_direction == IPSP_DIRECTION_OUT)) 1109 printf("/out\n"); 1110 else 1111 printf("/<unknown>\n"); 1112 } 1113 } 1114 1115 void 1116 upHex(char *p0) 1117 { 1118 char *p = p0; 1119 1120 for (; *p; p++) 1121 switch (*p) { 1122 case 'a': 1123 case 'b': 1124 case 'c': 1125 case 'd': 1126 case 'e': 1127 case 'f': 1128 *p += ('A' - 'a'); 1129 break; 1130 } 1131 } 1132