1 /* $OpenBSD: show.c,v 1.36 2012/03/17 10:16:41 dlg Exp $ */ 2 /* $NetBSD: show.c,v 1.1 1996/11/15 18:01:41 gwr Exp $ */ 3 4 /* 5 * Copyright (c) 1983, 1988, 1993 6 * The Regents of the University of California. All rights reserved. 7 * 8 * Redistribution and use in source and binary forms, with or without 9 * modification, are permitted provided that the following conditions 10 * are met: 11 * 1. Redistributions of source code must retain the above copyright 12 * notice, this list of conditions and the following disclaimer. 13 * 2. Redistributions in binary form must reproduce the above copyright 14 * notice, this list of conditions and the following disclaimer in the 15 * documentation and/or other materials provided with the distribution. 16 * 3. Neither the name of the University nor the names of its contributors 17 * may be used to endorse or promote products derived from this software 18 * without specific prior written permission. 19 * 20 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 21 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 22 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 23 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 24 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 25 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 26 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 27 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 28 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 29 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 30 * SUCH DAMAGE. 31 */ 32 33 #include <sys/param.h> 34 #include <sys/protosw.h> 35 #include <sys/socket.h> 36 #include <sys/mbuf.h> 37 #include <sys/sysctl.h> 38 39 #include <net/if.h> 40 #include <net/if_dl.h> 41 #include <net/if_types.h> 42 #include <net/pfkeyv2.h> 43 #include <net/route.h> 44 #include <netinet/in.h> 45 #include <netinet/if_ether.h> 46 #include <netinet/ip_ipsp.h> 47 #include <netmpls/mpls.h> 48 #include <arpa/inet.h> 49 50 #include <err.h> 51 #include <errno.h> 52 #include <netdb.h> 53 #include <stdio.h> 54 #include <stddef.h> 55 #include <stdlib.h> 56 #include <string.h> 57 #include <unistd.h> 58 59 #include "netstat.h" 60 61 char *any_ntoa(const struct sockaddr *); 62 char *link_print(struct sockaddr *); 63 char *label_print(struct sockaddr *); 64 65 #define ROUNDUP(a) \ 66 ((a) > 0 ? (1 + (((a) - 1) | (sizeof(long) - 1))) : sizeof(long)) 67 #define ADVANCE(x, n) (x += ROUNDUP((n)->sa_len)) 68 69 #define PFKEYV2_CHUNK sizeof(u_int64_t) 70 71 /* 72 * Definitions for showing gateway flags. 73 */ 74 struct bits { 75 int b_mask; 76 char b_val; 77 }; 78 static const struct bits bits[] = { 79 { RTF_UP, 'U' }, 80 { RTF_GATEWAY, 'G' }, 81 { RTF_HOST, 'H' }, 82 { RTF_REJECT, 'R' }, 83 { RTF_BLACKHOLE, 'B' }, 84 { RTF_DYNAMIC, 'D' }, 85 { RTF_MODIFIED, 'M' }, 86 { RTF_DONE, 'd' }, /* Completed -- for routing messages only */ 87 { RTF_MASK, 'm' }, /* Mask Present -- for routing messages only */ 88 { RTF_CLONING, 'C' }, 89 { RTF_XRESOLVE, 'X' }, 90 { RTF_LLINFO, 'L' }, 91 { RTF_STATIC, 'S' }, 92 { RTF_PROTO1, '1' }, 93 { RTF_PROTO2, '2' }, 94 { RTF_PROTO3, '3' }, 95 { RTF_CLONED, 'c' }, 96 { RTF_MPATH, 'P' }, 97 { RTF_MPLS, 'T' }, 98 { 0 } 99 }; 100 101 void p_rtentry(struct rt_msghdr *); 102 void p_pfkentry(struct sadb_msg *); 103 void pr_family(int); 104 void p_encap(struct sockaddr *, struct sockaddr *, int); 105 void p_protocol(struct sadb_protocol *, struct sockaddr *, struct 106 sadb_protocol *, int); 107 void p_sockaddr(struct sockaddr *, struct sockaddr *, int, int); 108 void p_sockaddr_mpls(struct sockaddr *, struct sockaddr *, int, int); 109 void p_flags(int, char *); 110 char *routename4(in_addr_t); 111 char *routename6(struct sockaddr_in6 *); 112 void index_pfk(struct sadb_msg *, void **); 113 114 /* 115 * Print routing tables. 116 */ 117 void 118 p_rttables(int af, u_int tableid) 119 { 120 struct rt_msghdr *rtm; 121 struct sadb_msg *msg; 122 char *buf = NULL, *next, *lim = NULL; 123 size_t needed; 124 int mib[7], mcnt; 125 struct sockaddr *sa; 126 127 mib[0] = CTL_NET; 128 mib[1] = PF_ROUTE; 129 mib[2] = 0; 130 mib[3] = af; 131 mib[4] = NET_RT_DUMP; 132 mib[5] = 0; 133 mib[6] = tableid; 134 mcnt = 7; 135 136 if (sysctl(mib, mcnt, NULL, &needed, NULL, 0) < 0) 137 err(1, "route-sysctl-estimate"); 138 if (needed > 0) { 139 if ((buf = malloc(needed)) == 0) 140 err(1, NULL); 141 if (sysctl(mib, mcnt, buf, &needed, NULL, 0) < 0) 142 err(1, "sysctl of routing table"); 143 lim = buf + needed; 144 } 145 146 printf("Routing tables\n"); 147 148 if (buf) { 149 for (next = buf; next < lim; next += rtm->rtm_msglen) { 150 rtm = (struct rt_msghdr *)next; 151 if (rtm->rtm_version != RTM_VERSION) 152 continue; 153 sa = (struct sockaddr *)(next + rtm->rtm_hdrlen); 154 if (af != AF_UNSPEC && sa->sa_family != af) 155 continue; 156 p_rtentry(rtm); 157 } 158 free(buf); 159 buf = NULL; 160 } 161 162 if (af != 0 && af != PF_KEY) 163 return; 164 165 mib[0] = CTL_NET; 166 mib[1] = PF_KEY; 167 mib[2] = PF_KEY_V2; 168 mib[3] = NET_KEY_SPD_DUMP; 169 mib[4] = mib[5] = 0; 170 171 if (sysctl(mib, 4, NULL, &needed, NULL, 0) == -1) { 172 if (errno == ENOPROTOOPT) 173 return; 174 err(1, "spd-sysctl-estimate"); 175 } 176 if (needed > 0) { 177 if ((buf = malloc(needed)) == 0) 178 err(1, NULL); 179 if (sysctl(mib, 4, buf, &needed, NULL, 0) == -1) 180 err(1,"sysctl of spd"); 181 lim = buf + needed; 182 } 183 184 if (buf) { 185 printf("\nEncap:\n"); 186 187 for (next = buf; next < lim; next += msg->sadb_msg_len * 188 PFKEYV2_CHUNK) { 189 msg = (struct sadb_msg *)next; 190 if (msg->sadb_msg_len == 0) 191 break; 192 p_pfkentry(msg); 193 } 194 free(buf); 195 buf = NULL; 196 } 197 } 198 199 /* 200 * column widths; each followed by one space 201 * width of destination/gateway column 202 * strlen("fe80::aaaa:bbbb:cccc:dddd@gif0") == 30, strlen("/128") == 4 203 */ 204 #define WID_GW(af) ((af) == AF_INET6 ? (nflag ? 30 : 18) : 18) 205 206 int 207 WID_DST(int af) 208 { 209 210 if (nflag) 211 switch (af) { 212 case AF_MPLS: 213 return 9; 214 case AF_INET6: 215 return 34; 216 default: 217 return 18; 218 } 219 else 220 switch (af) { 221 case AF_MPLS: 222 return 9; 223 default: 224 return 18; 225 } 226 } 227 228 /* 229 * Print header for routing table columns. 230 */ 231 void 232 pr_rthdr(int af, int Aflag) 233 { 234 if (Aflag) 235 printf("%-*.*s ", PLEN, PLEN, "Address"); 236 switch (af) { 237 case PF_KEY: 238 printf("%-18s %-5s %-18s %-5s %-5s %-22s\n", 239 "Source", "Port", "Destination", 240 "Port", "Proto", "SA(Address/Proto/Type/Direction)"); 241 break; 242 case PF_MPLS: 243 printf("%-9s %-9s %-6s %-18s %-6.6s %5.5s %8.8s %5.5s %4.4s %s\n", 244 "In label", "Out label", "Op", "Gateway", 245 "Flags", "Refs", "Use", "Mtu", "Prio", "Interface"); 246 break; 247 default: 248 printf("%-*.*s %-*.*s %-6.6s %5.5s %8.8s %5.5s %4.4s %s", 249 WID_DST(af), WID_DST(af), "Destination", 250 WID_GW(af), WID_GW(af), "Gateway", 251 "Flags", "Refs", "Use", "Mtu", "Prio", "Iface"); 252 if (vflag && !Aflag) 253 printf(" %s", "Label"); 254 putchar('\n'); 255 break; 256 } 257 } 258 259 static void 260 get_rtaddrs(int addrs, struct sockaddr *sa, struct sockaddr **rti_info) 261 { 262 int i; 263 264 for (i = 0; i < RTAX_MAX; i++) { 265 if (addrs & (1 << i)) { 266 rti_info[i] = sa; 267 sa = (struct sockaddr *)((char *)(sa) + 268 ROUNDUP(sa->sa_len)); 269 } else 270 rti_info[i] = NULL; 271 } 272 } 273 274 /* 275 * Print a routing table entry. 276 */ 277 void 278 p_rtentry(struct rt_msghdr *rtm) 279 { 280 static int old_af = -1; 281 struct sockaddr *sa = (struct sockaddr *)((char *)rtm + rtm->rtm_hdrlen); 282 struct sockaddr *mask, *rti_info[RTAX_MAX]; 283 char ifbuf[IF_NAMESIZE]; 284 285 if (sa->sa_family == AF_KEY) 286 return; 287 288 get_rtaddrs(rtm->rtm_addrs, sa, rti_info); 289 if (Fflag && rti_info[RTAX_GATEWAY]->sa_family != sa->sa_family) { 290 return; 291 } 292 if (old_af != sa->sa_family) { 293 old_af = sa->sa_family; 294 pr_family(sa->sa_family); 295 pr_rthdr(sa->sa_family, 0); 296 } 297 298 mask = rti_info[RTAX_NETMASK]; 299 if ((sa = rti_info[RTAX_DST]) == NULL) 300 return; 301 302 p_sockaddr(sa, mask, rtm->rtm_flags, WID_DST(sa->sa_family)); 303 p_sockaddr_mpls(sa, rti_info[RTAX_SRC], rtm->rtm_mpls, 304 WID_DST(sa->sa_family)); 305 306 p_sockaddr(rti_info[RTAX_GATEWAY], NULL, RTF_HOST, 307 WID_GW(sa->sa_family)); 308 309 p_flags(rtm->rtm_flags, "%-6.6s "); 310 printf("%5u %8llu ", rtm->rtm_rmx.rmx_refcnt, 311 rtm->rtm_rmx.rmx_pksent); 312 if (rtm->rtm_rmx.rmx_mtu) 313 printf("%5u ", rtm->rtm_rmx.rmx_mtu); 314 else 315 printf("%5s ", "-"); 316 putchar((rtm->rtm_rmx.rmx_locks & RTV_MTU) ? 'L' : ' '); 317 printf(" %2d %-5.16s", rtm->rtm_priority, 318 if_indextoname(rtm->rtm_index, ifbuf)); 319 if (vflag && rti_info[RTAX_LABEL]) 320 printf(" %s", ((struct sockaddr_rtlabel *) 321 rti_info[RTAX_LABEL])->sr_label); 322 putchar('\n'); 323 } 324 325 /* 326 * Print a pfkey/encap entry. 327 */ 328 void 329 p_pfkentry(struct sadb_msg *msg) 330 { 331 static int old = 0; 332 struct sadb_address *saddr; 333 struct sadb_protocol *sap, *saft; 334 struct sockaddr *sa, *mask; 335 void *headers[SADB_EXT_MAX + 1]; 336 337 if (!old) { 338 pr_rthdr(PF_KEY, 0); 339 old++; 340 } 341 342 bzero(headers, sizeof(headers)); 343 index_pfk(msg, headers); 344 345 /* These are always set */ 346 saddr = headers[SADB_X_EXT_SRC_FLOW]; 347 sa = (struct sockaddr *)(saddr + 1); 348 saddr = headers[SADB_X_EXT_SRC_MASK]; 349 mask = (struct sockaddr *)(saddr + 1); 350 p_encap(sa, mask, WID_DST(sa->sa_family)); 351 352 /* These are always set, too. */ 353 saddr = headers[SADB_X_EXT_DST_FLOW]; 354 sa = (struct sockaddr *)(saddr + 1); 355 saddr = headers[SADB_X_EXT_DST_MASK]; 356 mask = (struct sockaddr *)(saddr + 1); 357 p_encap(sa, mask, WID_DST(sa->sa_family)); 358 359 /* Bypass and deny flows do not set SADB_EXT_ADDRESS_DST! */ 360 sap = headers[SADB_X_EXT_PROTOCOL]; 361 saft = headers[SADB_X_EXT_FLOW_TYPE]; 362 saddr = headers[SADB_EXT_ADDRESS_DST]; 363 if (saddr) 364 sa = (struct sockaddr *)(saddr + 1); 365 else 366 sa = NULL; 367 p_protocol(sap, sa, saft, msg->sadb_msg_satype); 368 369 printf("\n"); 370 } 371 372 /* 373 * Print address family header before a section of the routing table. 374 */ 375 void 376 pr_family(int af) 377 { 378 char *afname; 379 380 switch (af) { 381 case AF_INET: 382 afname = "Internet"; 383 break; 384 case AF_INET6: 385 afname = "Internet6"; 386 break; 387 case PF_KEY: 388 afname = "Encap"; 389 break; 390 case AF_MPLS: 391 afname = "MPLS"; 392 break; 393 case AF_APPLETALK: 394 afname = "AppleTalk"; 395 break; 396 default: 397 afname = NULL; 398 break; 399 } 400 if (afname) 401 printf("\n%s:\n", afname); 402 else 403 printf("\nProtocol Family %d:\n", af); 404 } 405 406 void 407 p_addr(struct sockaddr *sa, struct sockaddr *mask, int flags) 408 { 409 p_sockaddr(sa, mask, flags, WID_DST(sa->sa_family)); 410 } 411 412 void 413 p_gwaddr(struct sockaddr *sa, int af) 414 { 415 p_sockaddr(sa, 0, RTF_HOST, WID_GW(af)); 416 } 417 418 void 419 p_encap(struct sockaddr *sa, struct sockaddr *mask, int width) 420 { 421 char *cp; 422 unsigned short port = 0; 423 424 if (mask) 425 cp = netname(sa, mask); 426 else 427 cp = routename(sa); 428 switch (sa->sa_family) { 429 case AF_INET: 430 port = ntohs(((struct sockaddr_in *)sa)->sin_port); 431 break; 432 case AF_INET6: 433 port = ntohs(((struct sockaddr_in6 *)sa)->sin6_port); 434 break; 435 } 436 if (width < 0) 437 printf("%s", cp); 438 else { 439 if (nflag) 440 printf("%-*s %-5u ", width, cp, port); 441 else 442 printf("%-*.*s %-5u ", width, width, cp, port); 443 } 444 } 445 446 void 447 p_protocol(struct sadb_protocol *sap, struct sockaddr *sa, struct sadb_protocol 448 *saft, int proto) 449 { 450 printf("%-6u", sap->sadb_protocol_proto); 451 452 if (sa) 453 p_sockaddr(sa, NULL, 0, -1); 454 else 455 printf("none"); 456 457 switch (proto) { 458 case SADB_SATYPE_ESP: 459 printf("/esp"); 460 break; 461 case SADB_SATYPE_AH: 462 printf("/ah"); 463 break; 464 case SADB_X_SATYPE_IPCOMP: 465 printf("/ipcomp"); 466 break; 467 case SADB_X_SATYPE_IPIP: 468 printf("/ipip"); 469 break; 470 default: 471 printf("/<unknown>"); 472 } 473 474 switch(saft->sadb_protocol_proto) { 475 case SADB_X_FLOW_TYPE_USE: 476 printf("/use"); 477 break; 478 case SADB_X_FLOW_TYPE_REQUIRE: 479 printf("/require"); 480 break; 481 case SADB_X_FLOW_TYPE_ACQUIRE: 482 printf("/acquire"); 483 break; 484 case SADB_X_FLOW_TYPE_DENY: 485 printf("/deny"); 486 break; 487 case SADB_X_FLOW_TYPE_BYPASS: 488 printf("/bypass"); 489 break; 490 case SADB_X_FLOW_TYPE_DONTACQ: 491 printf("/dontacq"); 492 break; 493 default: 494 printf("/<unknown type>"); 495 } 496 497 switch(saft->sadb_protocol_direction) { 498 case IPSP_DIRECTION_IN: 499 printf("/in"); 500 break; 501 case IPSP_DIRECTION_OUT: 502 printf("/out"); 503 break; 504 default: 505 printf("/<unknown>"); 506 } 507 } 508 509 void 510 p_sockaddr(struct sockaddr *sa, struct sockaddr *mask, int flags, int width) 511 { 512 char *cp; 513 514 switch (sa->sa_family) { 515 case AF_INET6: 516 { 517 struct sockaddr_in6 *sa6 = (struct sockaddr_in6 *)sa; 518 struct in6_addr *in6 = &sa6->sin6_addr; 519 520 /* 521 * XXX: This is a special workaround for KAME kernels. 522 * sin6_scope_id field of SA should be set in the future. 523 */ 524 if (IN6_IS_ADDR_LINKLOCAL(in6) || 525 IN6_IS_ADDR_MC_LINKLOCAL(in6) || 526 IN6_IS_ADDR_MC_INTFACELOCAL(in6)) { 527 /* XXX: override is ok? */ 528 sa6->sin6_scope_id = (u_int32_t)ntohs(*(u_short *) 529 &in6->s6_addr[2]); 530 *(u_short *)&in6->s6_addr[2] = 0; 531 } 532 if (flags & RTF_HOST) 533 cp = routename((struct sockaddr *)sa6); 534 else 535 cp = netname((struct sockaddr *)sa6, mask); 536 break; 537 } 538 case AF_MPLS: 539 return; 540 default: 541 if ((flags & RTF_HOST) || mask == NULL) 542 cp = routename(sa); 543 else 544 cp = netname(sa, mask); 545 break; 546 } 547 if (width < 0) 548 printf("%s", cp); 549 else { 550 if (nflag) 551 printf("%-*s ", width, cp); 552 else 553 printf("%-*.*s ", width, width, cp); 554 } 555 } 556 557 static char line[MAXHOSTNAMELEN]; 558 static char domain[MAXHOSTNAMELEN]; 559 560 void 561 p_sockaddr_mpls(struct sockaddr *in, struct sockaddr *out, int flags, int width) 562 { 563 if (in->sa_family != AF_MPLS) 564 return; 565 566 if (flags & MPLS_OP_POP || flags == MPLS_OP_LOCAL) { 567 printf("%-*s ", width, label_print(in)); 568 printf("%-*s ", width, label_print(NULL)); 569 } else { 570 printf("%-*s ", width, label_print(in)); 571 printf("%-*s ", width, label_print(out)); 572 } 573 574 printf("%-6s ", mpls_op(flags)); 575 } 576 577 void 578 p_flags(int f, char *format) 579 { 580 char name[33], *flags; 581 const struct bits *p = bits; 582 583 for (flags = name; p->b_mask && flags < &name[sizeof(name) - 2]; p++) 584 if (p->b_mask & f) 585 *flags++ = p->b_val; 586 *flags = '\0'; 587 printf(format, name); 588 } 589 590 char * 591 routename(struct sockaddr *sa) 592 { 593 char *cp = NULL; 594 static int first = 1; 595 596 if (first) { 597 first = 0; 598 if (gethostname(domain, sizeof(domain)) == 0 && 599 (cp = strchr(domain, '.'))) 600 (void)strlcpy(domain, cp + 1, sizeof(domain)); 601 else 602 domain[0] = '\0'; 603 cp = NULL; 604 } 605 606 if (sa->sa_len == 0) { 607 (void)strlcpy(line, "default", sizeof(line)); 608 return (line); 609 } 610 611 switch (sa->sa_family) { 612 case AF_INET: 613 return 614 (routename4(((struct sockaddr_in *)sa)->sin_addr.s_addr)); 615 616 case AF_INET6: 617 { 618 struct sockaddr_in6 sin6; 619 620 memset(&sin6, 0, sizeof(sin6)); 621 memcpy(&sin6, sa, sa->sa_len); 622 sin6.sin6_len = sizeof(struct sockaddr_in6); 623 sin6.sin6_family = AF_INET6; 624 if (sa->sa_len == sizeof(struct sockaddr_in6) && 625 (IN6_IS_ADDR_LINKLOCAL(&sin6.sin6_addr) || 626 IN6_IS_ADDR_MC_LINKLOCAL(&sin6.sin6_addr) || 627 IN6_IS_ADDR_MC_INTFACELOCAL(&sin6.sin6_addr)) && 628 sin6.sin6_scope_id == 0) { 629 sin6.sin6_scope_id = 630 ntohs(*(u_int16_t *)&sin6.sin6_addr.s6_addr[2]); 631 sin6.sin6_addr.s6_addr[2] = 0; 632 sin6.sin6_addr.s6_addr[3] = 0; 633 } 634 return (routename6(&sin6)); 635 } 636 637 case AF_LINK: 638 return (link_print(sa)); 639 case AF_MPLS: 640 return (label_print(sa)); 641 case AF_UNSPEC: 642 if (sa->sa_len == sizeof(struct sockaddr_rtlabel)) { 643 static char name[RTLABEL_LEN]; 644 struct sockaddr_rtlabel *sr; 645 646 sr = (struct sockaddr_rtlabel *)sa; 647 (void)strlcpy(name, sr->sr_label, sizeof(name)); 648 return (name); 649 } 650 /* FALLTHROUGH */ 651 default: 652 (void)snprintf(line, sizeof(line), "(%d) %s", 653 sa->sa_family, any_ntoa(sa)); 654 break; 655 } 656 return (line); 657 } 658 659 char * 660 routename4(in_addr_t in) 661 { 662 char *cp = NULL; 663 struct in_addr ina; 664 struct hostent *hp; 665 666 if (in == INADDR_ANY) 667 cp = "default"; 668 if (!cp && !nflag) { 669 if ((hp = gethostbyaddr((char *)&in, 670 sizeof(in), AF_INET)) != NULL) { 671 if ((cp = strchr(hp->h_name, '.')) && 672 !strcmp(cp + 1, domain)) 673 *cp = '\0'; 674 cp = hp->h_name; 675 } 676 } 677 ina.s_addr = in; 678 strlcpy(line, cp ? cp : inet_ntoa(ina), sizeof(line)); 679 680 return (line); 681 } 682 683 char * 684 routename6(struct sockaddr_in6 *sin6) 685 { 686 int niflags = 0; 687 688 if (nflag) 689 niflags |= NI_NUMERICHOST; 690 else 691 niflags |= NI_NOFQDN; 692 693 if (getnameinfo((struct sockaddr *)sin6, sin6->sin6_len, 694 line, sizeof(line), NULL, 0, niflags) != 0) 695 strncpy(line, "invalid", sizeof(line)); 696 697 return (line); 698 } 699 700 /* 701 * Return the name of the network whose address is given. 702 * The address is assumed to be that of a net or subnet, not a host. 703 */ 704 char * 705 netname4(in_addr_t in, in_addr_t mask) 706 { 707 char *cp = NULL; 708 struct netent *np = NULL; 709 int mbits; 710 711 in = ntohl(in); 712 mask = ntohl(mask); 713 if (!nflag && in != INADDR_ANY) { 714 if ((np = getnetbyaddr(in, AF_INET)) != NULL) 715 cp = np->n_name; 716 } 717 if (in == INADDR_ANY && mask == INADDR_ANY) 718 cp = "default"; 719 mbits = mask ? 33 - ffs(mask) : 0; 720 if (cp) 721 strlcpy(line, cp, sizeof(line)); 722 #define C(x) ((x) & 0xff) 723 else if (mbits < 9) 724 snprintf(line, sizeof(line), "%u/%d", C(in >> 24), mbits); 725 else if (mbits < 17) 726 snprintf(line, sizeof(line), "%u.%u/%d", 727 C(in >> 24) , C(in >> 16), mbits); 728 else if (mbits < 25) 729 snprintf(line, sizeof(line), "%u.%u.%u/%d", 730 C(in >> 24), C(in >> 16), C(in >> 8), mbits); 731 else 732 snprintf(line, sizeof(line), "%u.%u.%u.%u/%d", C(in >> 24), 733 C(in >> 16), C(in >> 8), C(in), mbits); 734 #undef C 735 return (line); 736 } 737 738 char * 739 netname6(struct sockaddr_in6 *sa6, struct sockaddr_in6 *mask) 740 { 741 struct sockaddr_in6 sin6; 742 u_char *p; 743 int masklen, final = 0, illegal = 0; 744 int i, lim, flag, error; 745 char hbuf[NI_MAXHOST]; 746 747 sin6 = *sa6; 748 749 flag = 0; 750 masklen = 0; 751 if (mask) { 752 lim = mask->sin6_len - offsetof(struct sockaddr_in6, sin6_addr); 753 lim = lim < (int)sizeof(struct in6_addr) ? 754 lim : sizeof(struct in6_addr); 755 for (p = (u_char *)&mask->sin6_addr, i = 0; i < lim; p++) { 756 if (final && *p) { 757 illegal++; 758 sin6.sin6_addr.s6_addr[i++] = 0x00; 759 continue; 760 } 761 762 switch (*p & 0xff) { 763 case 0xff: 764 masklen += 8; 765 break; 766 case 0xfe: 767 masklen += 7; 768 final++; 769 break; 770 case 0xfc: 771 masklen += 6; 772 final++; 773 break; 774 case 0xf8: 775 masklen += 5; 776 final++; 777 break; 778 case 0xf0: 779 masklen += 4; 780 final++; 781 break; 782 case 0xe0: 783 masklen += 3; 784 final++; 785 break; 786 case 0xc0: 787 masklen += 2; 788 final++; 789 break; 790 case 0x80: 791 masklen += 1; 792 final++; 793 break; 794 case 0x00: 795 final++; 796 break; 797 default: 798 final++; 799 illegal++; 800 break; 801 } 802 803 if (!illegal) 804 sin6.sin6_addr.s6_addr[i++] &= *p; 805 else 806 sin6.sin6_addr.s6_addr[i++] = 0x00; 807 } 808 while (i < sizeof(struct in6_addr)) 809 sin6.sin6_addr.s6_addr[i++] = 0x00; 810 } else 811 masklen = 128; 812 813 if (masklen == 0 && IN6_IS_ADDR_UNSPECIFIED(&sin6.sin6_addr)) 814 return ("default"); 815 816 if (illegal) 817 warnx("illegal prefixlen"); 818 819 if (nflag) 820 flag |= NI_NUMERICHOST; 821 error = getnameinfo((struct sockaddr *)&sin6, sin6.sin6_len, 822 hbuf, sizeof(hbuf), NULL, 0, flag); 823 if (error) 824 snprintf(hbuf, sizeof(hbuf), "invalid"); 825 826 snprintf(line, sizeof(line), "%s/%d", hbuf, masklen); 827 return (line); 828 } 829 830 /* 831 * Return the name of the network whose address is given. 832 * The address is assumed to be that of a net or subnet, not a host. 833 */ 834 char * 835 netname(struct sockaddr *sa, struct sockaddr *mask) 836 { 837 switch (sa->sa_family) { 838 case AF_INET: 839 return netname4(((struct sockaddr_in *)sa)->sin_addr.s_addr, 840 mask->sa_len == 0 ? 0 : 841 ((struct sockaddr_in *)mask)->sin_addr.s_addr); 842 case AF_INET6: 843 return netname6((struct sockaddr_in6 *)sa, 844 (struct sockaddr_in6 *)mask); 845 case AF_LINK: 846 return (link_print(sa)); 847 case AF_MPLS: 848 return (label_print(sa)); 849 default: 850 snprintf(line, sizeof(line), "af %d: %s", 851 sa->sa_family, any_ntoa(sa)); 852 break; 853 } 854 return (line); 855 } 856 857 static const char hexlist[] = "0123456789abcdef"; 858 859 char * 860 any_ntoa(const struct sockaddr *sa) 861 { 862 static char obuf[240]; 863 const char *in = sa->sa_data; 864 char *out = obuf; 865 int len = sa->sa_len - offsetof(struct sockaddr, sa_data); 866 867 *out++ = 'Q'; 868 do { 869 *out++ = hexlist[(*in >> 4) & 15]; 870 *out++ = hexlist[(*in++) & 15]; 871 *out++ = '.'; 872 } while (--len > 0 && (out + 3) < &obuf[sizeof(obuf) - 1]); 873 out[-1] = '\0'; 874 return (obuf); 875 } 876 877 char * 878 link_print(struct sockaddr *sa) 879 { 880 struct sockaddr_dl *sdl = (struct sockaddr_dl *)sa; 881 u_char *lla = (u_char *)sdl->sdl_data + sdl->sdl_nlen; 882 883 if (sdl->sdl_nlen == 0 && sdl->sdl_alen == 0 && 884 sdl->sdl_slen == 0) { 885 (void)snprintf(line, sizeof(line), "link#%d", sdl->sdl_index); 886 return (line); 887 } 888 switch (sdl->sdl_type) { 889 case IFT_ETHER: 890 case IFT_CARP: 891 return (ether_ntoa((struct ether_addr *)lla)); 892 default: 893 return (link_ntoa(sdl)); 894 } 895 } 896 897 char * 898 mpls_op(u_int32_t type) 899 { 900 switch (type & (MPLS_OP_PUSH | MPLS_OP_POP | MPLS_OP_SWAP)) { 901 case MPLS_OP_LOCAL: 902 return ("LOCAL"); 903 case MPLS_OP_POP: 904 return ("POP"); 905 case MPLS_OP_SWAP: 906 return ("SWAP"); 907 case MPLS_OP_PUSH: 908 return ("PUSH"); 909 default: 910 return ("?"); 911 } 912 } 913 914 char * 915 label_print(struct sockaddr *sa) 916 { 917 struct sockaddr_mpls *smpls = (struct sockaddr_mpls *)sa; 918 919 if (smpls) 920 (void)snprintf(line, sizeof(line), "%u", 921 ntohl(smpls->smpls_label) >> MPLS_LABEL_OFFSET); 922 else 923 (void)snprintf(line, sizeof(line), "-"); 924 925 return (line); 926 } 927 928 void 929 index_pfk(struct sadb_msg *msg, void **headers) 930 { 931 struct sadb_ext *ext; 932 933 for (ext = (struct sadb_ext *)(msg + 1); 934 (size_t)((u_int8_t *)ext - (u_int8_t *)msg) < 935 msg->sadb_msg_len * PFKEYV2_CHUNK && ext->sadb_ext_len > 0; 936 ext = (struct sadb_ext *)((u_int8_t *)ext + 937 ext->sadb_ext_len * PFKEYV2_CHUNK)) { 938 switch (ext->sadb_ext_type) { 939 case SADB_EXT_ADDRESS_SRC: 940 headers[SADB_EXT_ADDRESS_SRC] = (void *)ext; 941 break; 942 case SADB_EXT_ADDRESS_DST: 943 headers[SADB_EXT_ADDRESS_DST] = (void *)ext; 944 break; 945 case SADB_X_EXT_PROTOCOL: 946 headers[SADB_X_EXT_PROTOCOL] = (void *)ext; 947 break; 948 case SADB_X_EXT_SRC_FLOW: 949 headers[SADB_X_EXT_SRC_FLOW] = (void *)ext; 950 break; 951 case SADB_X_EXT_DST_FLOW: 952 headers[SADB_X_EXT_DST_FLOW] = (void *)ext; 953 break; 954 case SADB_X_EXT_SRC_MASK: 955 headers[SADB_X_EXT_SRC_MASK] = (void *)ext; 956 break; 957 case SADB_X_EXT_DST_MASK: 958 headers[SADB_X_EXT_DST_MASK] = (void *)ext; 959 break; 960 case SADB_X_EXT_FLOW_TYPE: 961 headers[SADB_X_EXT_FLOW_TYPE] = (void *)ext; 962 break; 963 default: 964 /* Ignore. */ 965 break; 966 } 967 } 968 } 969