1 /* $OpenBSD: show.c,v 1.42 2014/05/08 09:28:08 mpi Exp $ */ 2 /* $NetBSD: show.c,v 1.1 1996/11/15 18:01:41 gwr Exp $ */ 3 4 /* 5 * Copyright (c) 1983, 1988, 1993 6 * The Regents of the University of California. All rights reserved. 7 * 8 * Redistribution and use in source and binary forms, with or without 9 * modification, are permitted provided that the following conditions 10 * are met: 11 * 1. Redistributions of source code must retain the above copyright 12 * notice, this list of conditions and the following disclaimer. 13 * 2. Redistributions in binary form must reproduce the above copyright 14 * notice, this list of conditions and the following disclaimer in the 15 * documentation and/or other materials provided with the distribution. 16 * 3. Neither the name of the University nor the names of its contributors 17 * may be used to endorse or promote products derived from this software 18 * without specific prior written permission. 19 * 20 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 21 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 22 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 23 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 24 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 25 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 26 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 27 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 28 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 29 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 30 * SUCH DAMAGE. 31 */ 32 33 #include <sys/param.h> 34 #include <sys/socket.h> 35 #include <sys/sysctl.h> 36 37 #include <net/if.h> 38 #include <net/if_dl.h> 39 #include <net/if_types.h> 40 #include <net/pfkeyv2.h> 41 #include <net/route.h> 42 #include <netinet/in.h> 43 #include <netinet/if_ether.h> 44 #include <netinet/ip_ipsp.h> 45 #include <netmpls/mpls.h> 46 #include <arpa/inet.h> 47 48 #include <err.h> 49 #include <errno.h> 50 #include <netdb.h> 51 #include <stdio.h> 52 #include <stddef.h> 53 #include <stdlib.h> 54 #include <string.h> 55 #include <unistd.h> 56 57 #include "netstat.h" 58 59 char *any_ntoa(const struct sockaddr *); 60 char *link_print(struct sockaddr *); 61 char *label_print(struct sockaddr *); 62 63 #define ROUNDUP(a) \ 64 ((a) > 0 ? (1 + (((a) - 1) | (sizeof(long) - 1))) : sizeof(long)) 65 #define ADVANCE(x, n) (x += ROUNDUP((n)->sa_len)) 66 67 #define PFKEYV2_CHUNK sizeof(u_int64_t) 68 69 /* 70 * Definitions for showing gateway flags. 71 */ 72 struct bits { 73 int b_mask; 74 char b_val; 75 }; 76 static const struct bits bits[] = { 77 { RTF_UP, 'U' }, 78 { RTF_GATEWAY, 'G' }, 79 { RTF_HOST, 'H' }, 80 { RTF_REJECT, 'R' }, 81 { RTF_BLACKHOLE, 'B' }, 82 { RTF_DYNAMIC, 'D' }, 83 { RTF_MODIFIED, 'M' }, 84 { RTF_DONE, 'd' }, /* Completed -- for routing messages only */ 85 { RTF_MASK, 'm' }, /* Mask Present -- for routing messages only */ 86 { RTF_CLONING, 'C' }, 87 { RTF_XRESOLVE, 'X' }, 88 { RTF_LLINFO, 'L' }, 89 { RTF_STATIC, 'S' }, 90 { RTF_PROTO1, '1' }, 91 { RTF_PROTO2, '2' }, 92 { RTF_PROTO3, '3' }, 93 { RTF_CLONED, 'c' }, 94 { RTF_MPATH, 'P' }, 95 { RTF_MPLS, 'T' }, 96 { RTF_LOCAL, 'l' }, 97 { RTF_BROADCAST, 'b' }, 98 { 0 } 99 }; 100 101 int WID_DST(int); 102 void p_rtentry(struct rt_msghdr *); 103 void p_pfkentry(struct sadb_msg *); 104 void pr_family(int); 105 void p_encap(struct sockaddr *, struct sockaddr *, int); 106 void p_protocol(struct sadb_protocol *, struct sockaddr *, struct 107 sadb_protocol *, int); 108 void p_sockaddr(struct sockaddr *, struct sockaddr *, int, int); 109 void p_sockaddr_mpls(struct sockaddr *, struct sockaddr *, int, int); 110 void p_flags(int, char *); 111 char *routename4(in_addr_t); 112 char *routename6(struct sockaddr_in6 *); 113 void index_pfk(struct sadb_msg *, void **); 114 115 /* 116 * Print routing tables. 117 */ 118 void 119 p_rttables(int af, u_int tableid) 120 { 121 struct rt_msghdr *rtm; 122 struct sadb_msg *msg; 123 char *buf = NULL, *next, *lim = NULL; 124 size_t needed; 125 int mib[7], mcnt; 126 struct sockaddr *sa; 127 128 mib[0] = CTL_NET; 129 mib[1] = PF_ROUTE; 130 mib[2] = 0; 131 mib[3] = af; 132 mib[4] = NET_RT_DUMP; 133 mib[5] = 0; 134 mib[6] = tableid; 135 mcnt = 7; 136 while (1) { 137 if (sysctl(mib, mcnt, NULL, &needed, NULL, 0) == -1) 138 err(1, "route-sysctl-estimate"); 139 if (needed == 0) 140 break; 141 if ((buf = realloc(buf, needed)) == NULL) 142 err(1, NULL); 143 if (sysctl(mib, mcnt, buf, &needed, NULL, 0) == -1) { 144 if (errno == ENOMEM) 145 continue; 146 err(1, "sysctl of routing table"); 147 } 148 lim = buf + needed; 149 break; 150 } 151 152 printf("Routing tables\n"); 153 154 if (buf) { 155 for (next = buf; next < lim; next += rtm->rtm_msglen) { 156 rtm = (struct rt_msghdr *)next; 157 if (rtm->rtm_version != RTM_VERSION) 158 continue; 159 sa = (struct sockaddr *)(next + rtm->rtm_hdrlen); 160 if (af != AF_UNSPEC && sa->sa_family != af) 161 continue; 162 p_rtentry(rtm); 163 } 164 free(buf); 165 buf = NULL; 166 } 167 168 if (af != 0 && af != PF_KEY) 169 return; 170 171 mib[0] = CTL_NET; 172 mib[1] = PF_KEY; 173 mib[2] = PF_KEY_V2; 174 mib[3] = NET_KEY_SPD_DUMP; 175 mib[4] = mib[5] = 0; 176 while (1) { 177 if (sysctl(mib, 4, NULL, &needed, NULL, 0) == -1) { 178 if (errno == ENOPROTOOPT) 179 return; 180 err(1, "spd-sysctl-estimate"); 181 } 182 if (needed == 0) 183 break; 184 if ((buf = realloc(buf, needed)) == NULL) 185 err(1, NULL); 186 if (sysctl(mib, 4, buf, &needed, NULL, 0) == -1) { 187 if (errno == ENOMEM) 188 continue; 189 err(1,"sysctl of spd"); 190 } 191 lim = buf + needed; 192 break; 193 } 194 195 if (buf) { 196 printf("\nEncap:\n"); 197 198 for (next = buf; next < lim; next += msg->sadb_msg_len * 199 PFKEYV2_CHUNK) { 200 msg = (struct sadb_msg *)next; 201 if (msg->sadb_msg_len == 0) 202 break; 203 p_pfkentry(msg); 204 } 205 free(buf); 206 buf = NULL; 207 } 208 } 209 210 /* 211 * column widths; each followed by one space 212 * width of destination/gateway column 213 * strlen("fe80::aaaa:bbbb:cccc:dddd@gif0") == 30, strlen("/128") == 4 214 */ 215 #define WID_GW(af) ((af) == AF_INET6 ? (nflag ? 30 : 18) : 18) 216 217 int 218 WID_DST(int af) 219 { 220 221 if (nflag) 222 switch (af) { 223 case AF_MPLS: 224 return 9; 225 case AF_INET6: 226 return 34; 227 default: 228 return 18; 229 } 230 else 231 switch (af) { 232 case AF_MPLS: 233 return 9; 234 default: 235 return 18; 236 } 237 } 238 239 /* 240 * Print header for routing table columns. 241 */ 242 void 243 pr_rthdr(int af, int Aflag) 244 { 245 if (Aflag) 246 printf("%-*.*s ", PLEN, PLEN, "Address"); 247 switch (af) { 248 case PF_KEY: 249 printf("%-18s %-5s %-18s %-5s %-5s %-22s\n", 250 "Source", "Port", "Destination", 251 "Port", "Proto", "SA(Address/Proto/Type/Direction)"); 252 break; 253 case PF_MPLS: 254 printf("%-9s %-9s %-6s %-18s %-6.6s %5.5s %8.8s %5.5s %4.4s %s\n", 255 "In label", "Out label", "Op", "Gateway", 256 "Flags", "Refs", "Use", "Mtu", "Prio", "Interface"); 257 break; 258 default: 259 printf("%-*.*s %-*.*s %-6.6s %5.5s %8.8s %5.5s %4.4s %s", 260 WID_DST(af), WID_DST(af), "Destination", 261 WID_GW(af), WID_GW(af), "Gateway", 262 "Flags", "Refs", "Use", "Mtu", "Prio", "Iface"); 263 if (vflag && !Aflag) 264 printf(" %s", "Label"); 265 putchar('\n'); 266 break; 267 } 268 } 269 270 static void 271 get_rtaddrs(int addrs, struct sockaddr *sa, struct sockaddr **rti_info) 272 { 273 int i; 274 275 for (i = 0; i < RTAX_MAX; i++) { 276 if (addrs & (1 << i)) { 277 rti_info[i] = sa; 278 sa = (struct sockaddr *)((char *)(sa) + 279 ROUNDUP(sa->sa_len)); 280 } else 281 rti_info[i] = NULL; 282 } 283 } 284 285 /* 286 * Print a routing table entry. 287 */ 288 void 289 p_rtentry(struct rt_msghdr *rtm) 290 { 291 static int old_af = -1; 292 struct sockaddr *sa = (struct sockaddr *)((char *)rtm + rtm->rtm_hdrlen); 293 struct sockaddr *mask, *rti_info[RTAX_MAX]; 294 char ifbuf[IF_NAMESIZE]; 295 296 if (sa->sa_family == AF_KEY) 297 return; 298 299 get_rtaddrs(rtm->rtm_addrs, sa, rti_info); 300 301 if (Fflag && rti_info[RTAX_GATEWAY]->sa_family != sa->sa_family) { 302 return; 303 } 304 if (old_af != sa->sa_family) { 305 old_af = sa->sa_family; 306 pr_family(sa->sa_family); 307 pr_rthdr(sa->sa_family, 0); 308 } 309 310 mask = rti_info[RTAX_NETMASK]; 311 if ((sa = rti_info[RTAX_DST]) == NULL) 312 return; 313 314 p_sockaddr(sa, mask, rtm->rtm_flags, WID_DST(sa->sa_family)); 315 p_sockaddr_mpls(sa, rti_info[RTAX_SRC], rtm->rtm_mpls, 316 WID_DST(sa->sa_family)); 317 318 p_sockaddr(rti_info[RTAX_GATEWAY], NULL, RTF_HOST, 319 WID_GW(sa->sa_family)); 320 321 p_flags(rtm->rtm_flags, "%-6.6s "); 322 printf("%5u %8llu ", rtm->rtm_rmx.rmx_refcnt, 323 rtm->rtm_rmx.rmx_pksent); 324 if (rtm->rtm_rmx.rmx_mtu) 325 printf("%5u ", rtm->rtm_rmx.rmx_mtu); 326 else 327 printf("%5s ", "-"); 328 putchar((rtm->rtm_rmx.rmx_locks & RTV_MTU) ? 'L' : ' '); 329 printf(" %2d %-5.16s", rtm->rtm_priority, 330 if_indextoname(rtm->rtm_index, ifbuf)); 331 if (vflag && rti_info[RTAX_LABEL]) 332 printf(" %s", ((struct sockaddr_rtlabel *) 333 rti_info[RTAX_LABEL])->sr_label); 334 putchar('\n'); 335 } 336 337 /* 338 * Print a pfkey/encap entry. 339 */ 340 void 341 p_pfkentry(struct sadb_msg *msg) 342 { 343 static int old = 0; 344 struct sadb_address *saddr; 345 struct sadb_protocol *sap, *saft; 346 struct sockaddr *sa, *mask; 347 void *headers[SADB_EXT_MAX + 1]; 348 349 if (!old) { 350 pr_rthdr(PF_KEY, 0); 351 old++; 352 } 353 354 bzero(headers, sizeof(headers)); 355 index_pfk(msg, headers); 356 357 /* These are always set */ 358 saddr = headers[SADB_X_EXT_SRC_FLOW]; 359 sa = (struct sockaddr *)(saddr + 1); 360 saddr = headers[SADB_X_EXT_SRC_MASK]; 361 mask = (struct sockaddr *)(saddr + 1); 362 p_encap(sa, mask, WID_DST(sa->sa_family)); 363 364 /* These are always set, too. */ 365 saddr = headers[SADB_X_EXT_DST_FLOW]; 366 sa = (struct sockaddr *)(saddr + 1); 367 saddr = headers[SADB_X_EXT_DST_MASK]; 368 mask = (struct sockaddr *)(saddr + 1); 369 p_encap(sa, mask, WID_DST(sa->sa_family)); 370 371 /* Bypass and deny flows do not set SADB_EXT_ADDRESS_DST! */ 372 sap = headers[SADB_X_EXT_PROTOCOL]; 373 saft = headers[SADB_X_EXT_FLOW_TYPE]; 374 saddr = headers[SADB_EXT_ADDRESS_DST]; 375 if (saddr) 376 sa = (struct sockaddr *)(saddr + 1); 377 else 378 sa = NULL; 379 p_protocol(sap, sa, saft, msg->sadb_msg_satype); 380 381 printf("\n"); 382 } 383 384 /* 385 * Print address family header before a section of the routing table. 386 */ 387 void 388 pr_family(int af) 389 { 390 char *afname; 391 392 switch (af) { 393 case AF_INET: 394 afname = "Internet"; 395 break; 396 case AF_INET6: 397 afname = "Internet6"; 398 break; 399 case PF_KEY: 400 afname = "Encap"; 401 break; 402 case AF_MPLS: 403 afname = "MPLS"; 404 break; 405 default: 406 afname = NULL; 407 break; 408 } 409 if (afname) 410 printf("\n%s:\n", afname); 411 else 412 printf("\nProtocol Family %d:\n", af); 413 } 414 415 void 416 p_addr(struct sockaddr *sa, struct sockaddr *mask, int flags) 417 { 418 p_sockaddr(sa, mask, flags, WID_DST(sa->sa_family)); 419 } 420 421 void 422 p_gwaddr(struct sockaddr *sa, int af) 423 { 424 p_sockaddr(sa, 0, RTF_HOST, WID_GW(af)); 425 } 426 427 void 428 p_encap(struct sockaddr *sa, struct sockaddr *mask, int width) 429 { 430 char *cp; 431 unsigned short port = 0; 432 433 if (mask) 434 cp = netname(sa, mask); 435 else 436 cp = routename(sa); 437 switch (sa->sa_family) { 438 case AF_INET: 439 port = ntohs(((struct sockaddr_in *)sa)->sin_port); 440 break; 441 case AF_INET6: 442 port = ntohs(((struct sockaddr_in6 *)sa)->sin6_port); 443 break; 444 } 445 if (width < 0) 446 printf("%s", cp); 447 else { 448 if (nflag) 449 printf("%-*s %-5u ", width, cp, port); 450 else 451 printf("%-*.*s %-5u ", width, width, cp, port); 452 } 453 } 454 455 void 456 p_protocol(struct sadb_protocol *sap, struct sockaddr *sa, struct sadb_protocol 457 *saft, int proto) 458 { 459 printf("%-6u", sap->sadb_protocol_proto); 460 461 if (sa) 462 p_sockaddr(sa, NULL, 0, -1); 463 else 464 printf("none"); 465 466 switch (proto) { 467 case SADB_SATYPE_ESP: 468 printf("/esp"); 469 break; 470 case SADB_SATYPE_AH: 471 printf("/ah"); 472 break; 473 case SADB_X_SATYPE_IPCOMP: 474 printf("/ipcomp"); 475 break; 476 case SADB_X_SATYPE_IPIP: 477 printf("/ipip"); 478 break; 479 default: 480 printf("/<unknown>"); 481 } 482 483 switch(saft->sadb_protocol_proto) { 484 case SADB_X_FLOW_TYPE_USE: 485 printf("/use"); 486 break; 487 case SADB_X_FLOW_TYPE_REQUIRE: 488 printf("/require"); 489 break; 490 case SADB_X_FLOW_TYPE_ACQUIRE: 491 printf("/acquire"); 492 break; 493 case SADB_X_FLOW_TYPE_DENY: 494 printf("/deny"); 495 break; 496 case SADB_X_FLOW_TYPE_BYPASS: 497 printf("/bypass"); 498 break; 499 case SADB_X_FLOW_TYPE_DONTACQ: 500 printf("/dontacq"); 501 break; 502 default: 503 printf("/<unknown type>"); 504 } 505 506 switch(saft->sadb_protocol_direction) { 507 case IPSP_DIRECTION_IN: 508 printf("/in"); 509 break; 510 case IPSP_DIRECTION_OUT: 511 printf("/out"); 512 break; 513 default: 514 printf("/<unknown>"); 515 } 516 } 517 518 void 519 p_sockaddr(struct sockaddr *sa, struct sockaddr *mask, int flags, int width) 520 { 521 char *cp; 522 523 switch (sa->sa_family) { 524 case AF_INET6: 525 { 526 struct sockaddr_in6 *sa6 = (struct sockaddr_in6 *)sa; 527 struct in6_addr *in6 = &sa6->sin6_addr; 528 529 /* 530 * XXX: This is a special workaround for KAME kernels. 531 * sin6_scope_id field of SA should be set in the future. 532 */ 533 if (IN6_IS_ADDR_LINKLOCAL(in6) || 534 IN6_IS_ADDR_MC_LINKLOCAL(in6) || 535 IN6_IS_ADDR_MC_INTFACELOCAL(in6)) { 536 /* XXX: override is ok? */ 537 sa6->sin6_scope_id = (u_int32_t)ntohs(*(u_short *) 538 &in6->s6_addr[2]); 539 *(u_short *)&in6->s6_addr[2] = 0; 540 } 541 if (flags & RTF_HOST) 542 cp = routename((struct sockaddr *)sa6); 543 else 544 cp = netname((struct sockaddr *)sa6, mask); 545 break; 546 } 547 case AF_MPLS: 548 return; 549 default: 550 if ((flags & RTF_HOST) || mask == NULL) 551 cp = routename(sa); 552 else 553 cp = netname(sa, mask); 554 break; 555 } 556 if (width < 0) 557 printf("%s", cp); 558 else { 559 if (nflag) 560 printf("%-*s ", width, cp); 561 else 562 printf("%-*.*s ", width, width, cp); 563 } 564 } 565 566 static char line[MAXHOSTNAMELEN]; 567 static char domain[MAXHOSTNAMELEN]; 568 569 void 570 p_sockaddr_mpls(struct sockaddr *in, struct sockaddr *out, int flags, int width) 571 { 572 if (in->sa_family != AF_MPLS) 573 return; 574 575 if (flags & MPLS_OP_POP || flags == MPLS_OP_LOCAL) { 576 printf("%-*s ", width, label_print(in)); 577 printf("%-*s ", width, label_print(NULL)); 578 } else { 579 printf("%-*s ", width, label_print(in)); 580 printf("%-*s ", width, label_print(out)); 581 } 582 583 printf("%-6s ", mpls_op(flags)); 584 } 585 586 void 587 p_flags(int f, char *format) 588 { 589 char name[33], *flags; 590 const struct bits *p = bits; 591 592 for (flags = name; p->b_mask && flags < &name[sizeof(name) - 2]; p++) 593 if (p->b_mask & f) 594 *flags++ = p->b_val; 595 *flags = '\0'; 596 printf(format, name); 597 } 598 599 char * 600 routename(struct sockaddr *sa) 601 { 602 char *cp = NULL; 603 static int first = 1; 604 605 if (first) { 606 first = 0; 607 if (gethostname(domain, sizeof(domain)) == 0 && 608 (cp = strchr(domain, '.'))) 609 (void)strlcpy(domain, cp + 1, sizeof(domain)); 610 else 611 domain[0] = '\0'; 612 cp = NULL; 613 } 614 615 if (sa->sa_len == 0) { 616 (void)strlcpy(line, "default", sizeof(line)); 617 return (line); 618 } 619 620 switch (sa->sa_family) { 621 case AF_INET: 622 return 623 (routename4(((struct sockaddr_in *)sa)->sin_addr.s_addr)); 624 625 case AF_INET6: 626 { 627 struct sockaddr_in6 sin6; 628 629 memset(&sin6, 0, sizeof(sin6)); 630 memcpy(&sin6, sa, sa->sa_len); 631 sin6.sin6_len = sizeof(struct sockaddr_in6); 632 sin6.sin6_family = AF_INET6; 633 if (sa->sa_len == sizeof(struct sockaddr_in6) && 634 (IN6_IS_ADDR_LINKLOCAL(&sin6.sin6_addr) || 635 IN6_IS_ADDR_MC_LINKLOCAL(&sin6.sin6_addr) || 636 IN6_IS_ADDR_MC_INTFACELOCAL(&sin6.sin6_addr)) && 637 sin6.sin6_scope_id == 0) { 638 sin6.sin6_scope_id = 639 ntohs(*(u_int16_t *)&sin6.sin6_addr.s6_addr[2]); 640 sin6.sin6_addr.s6_addr[2] = 0; 641 sin6.sin6_addr.s6_addr[3] = 0; 642 } 643 return (routename6(&sin6)); 644 } 645 646 case AF_LINK: 647 return (link_print(sa)); 648 case AF_MPLS: 649 return (label_print(sa)); 650 case AF_UNSPEC: 651 if (sa->sa_len == sizeof(struct sockaddr_rtlabel)) { 652 static char name[RTLABEL_LEN]; 653 struct sockaddr_rtlabel *sr; 654 655 sr = (struct sockaddr_rtlabel *)sa; 656 (void)strlcpy(name, sr->sr_label, sizeof(name)); 657 return (name); 658 } 659 /* FALLTHROUGH */ 660 default: 661 (void)snprintf(line, sizeof(line), "(%d) %s", 662 sa->sa_family, any_ntoa(sa)); 663 break; 664 } 665 return (line); 666 } 667 668 char * 669 routename4(in_addr_t in) 670 { 671 char *cp = NULL; 672 struct in_addr ina; 673 struct hostent *hp; 674 675 if (in == INADDR_ANY) 676 cp = "default"; 677 if (!cp && !nflag) { 678 if ((hp = gethostbyaddr((char *)&in, 679 sizeof(in), AF_INET)) != NULL) { 680 if ((cp = strchr(hp->h_name, '.')) && 681 !strcmp(cp + 1, domain)) 682 *cp = '\0'; 683 cp = hp->h_name; 684 } 685 } 686 ina.s_addr = in; 687 strlcpy(line, cp ? cp : inet_ntoa(ina), sizeof(line)); 688 689 return (line); 690 } 691 692 char * 693 routename6(struct sockaddr_in6 *sin6) 694 { 695 int niflags = 0; 696 697 if (nflag) 698 niflags |= NI_NUMERICHOST; 699 else 700 niflags |= NI_NOFQDN; 701 702 if (getnameinfo((struct sockaddr *)sin6, sin6->sin6_len, 703 line, sizeof(line), NULL, 0, niflags) != 0) 704 strncpy(line, "invalid", sizeof(line)); 705 706 return (line); 707 } 708 709 /* 710 * Return the name of the network whose address is given. 711 * The address is assumed to be that of a net or subnet, not a host. 712 */ 713 char * 714 netname4(in_addr_t in, in_addr_t mask) 715 { 716 char *cp = NULL; 717 struct netent *np = NULL; 718 int mbits; 719 720 in = ntohl(in); 721 mask = ntohl(mask); 722 if (!nflag && in != INADDR_ANY) { 723 if ((np = getnetbyaddr(in, AF_INET)) != NULL) 724 cp = np->n_name; 725 } 726 if (in == INADDR_ANY && mask == INADDR_ANY) 727 cp = "default"; 728 mbits = mask ? 33 - ffs(mask) : 0; 729 if (cp) 730 strlcpy(line, cp, sizeof(line)); 731 #define C(x) ((x) & 0xff) 732 else if (mbits < 9) 733 snprintf(line, sizeof(line), "%u/%d", C(in >> 24), mbits); 734 else if (mbits < 17) 735 snprintf(line, sizeof(line), "%u.%u/%d", 736 C(in >> 24) , C(in >> 16), mbits); 737 else if (mbits < 25) 738 snprintf(line, sizeof(line), "%u.%u.%u/%d", 739 C(in >> 24), C(in >> 16), C(in >> 8), mbits); 740 else 741 snprintf(line, sizeof(line), "%u.%u.%u.%u/%d", C(in >> 24), 742 C(in >> 16), C(in >> 8), C(in), mbits); 743 #undef C 744 return (line); 745 } 746 747 char * 748 netname6(struct sockaddr_in6 *sa6, struct sockaddr_in6 *mask) 749 { 750 struct sockaddr_in6 sin6; 751 u_char *p; 752 int masklen, final = 0, illegal = 0; 753 int i, lim, flag, error; 754 char hbuf[NI_MAXHOST]; 755 756 sin6 = *sa6; 757 758 flag = 0; 759 masklen = 0; 760 if (mask) { 761 lim = mask->sin6_len - offsetof(struct sockaddr_in6, sin6_addr); 762 lim = lim < (int)sizeof(struct in6_addr) ? 763 lim : (int)sizeof(struct in6_addr); 764 for (p = (u_char *)&mask->sin6_addr, i = 0; i < lim; p++) { 765 if (final && *p) { 766 illegal++; 767 sin6.sin6_addr.s6_addr[i++] = 0x00; 768 continue; 769 } 770 771 switch (*p & 0xff) { 772 case 0xff: 773 masklen += 8; 774 break; 775 case 0xfe: 776 masklen += 7; 777 final++; 778 break; 779 case 0xfc: 780 masklen += 6; 781 final++; 782 break; 783 case 0xf8: 784 masklen += 5; 785 final++; 786 break; 787 case 0xf0: 788 masklen += 4; 789 final++; 790 break; 791 case 0xe0: 792 masklen += 3; 793 final++; 794 break; 795 case 0xc0: 796 masklen += 2; 797 final++; 798 break; 799 case 0x80: 800 masklen += 1; 801 final++; 802 break; 803 case 0x00: 804 final++; 805 break; 806 default: 807 final++; 808 illegal++; 809 break; 810 } 811 812 if (!illegal) 813 sin6.sin6_addr.s6_addr[i++] &= *p; 814 else 815 sin6.sin6_addr.s6_addr[i++] = 0x00; 816 } 817 while (i < (int)sizeof(struct in6_addr)) 818 sin6.sin6_addr.s6_addr[i++] = 0x00; 819 } else 820 masklen = 128; 821 822 if (masklen == 0 && IN6_IS_ADDR_UNSPECIFIED(&sin6.sin6_addr)) 823 return ("default"); 824 825 if (illegal) 826 warnx("illegal prefixlen"); 827 828 if (nflag) 829 flag |= NI_NUMERICHOST; 830 error = getnameinfo((struct sockaddr *)&sin6, sin6.sin6_len, 831 hbuf, sizeof(hbuf), NULL, 0, flag); 832 if (error) 833 snprintf(hbuf, sizeof(hbuf), "invalid"); 834 835 snprintf(line, sizeof(line), "%s/%d", hbuf, masklen); 836 return (line); 837 } 838 839 /* 840 * Return the name of the network whose address is given. 841 * The address is assumed to be that of a net or subnet, not a host. 842 */ 843 char * 844 netname(struct sockaddr *sa, struct sockaddr *mask) 845 { 846 switch (sa->sa_family) { 847 case AF_INET: 848 return netname4(((struct sockaddr_in *)sa)->sin_addr.s_addr, 849 mask->sa_len == 0 ? 0 : 850 ((struct sockaddr_in *)mask)->sin_addr.s_addr); 851 case AF_INET6: 852 return netname6((struct sockaddr_in6 *)sa, 853 (struct sockaddr_in6 *)mask); 854 case AF_LINK: 855 return (link_print(sa)); 856 case AF_MPLS: 857 return (label_print(sa)); 858 default: 859 snprintf(line, sizeof(line), "af %d: %s", 860 sa->sa_family, any_ntoa(sa)); 861 break; 862 } 863 return (line); 864 } 865 866 static const char hexlist[] = "0123456789abcdef"; 867 868 char * 869 any_ntoa(const struct sockaddr *sa) 870 { 871 static char obuf[240]; 872 const char *in = sa->sa_data; 873 char *out = obuf; 874 int len = sa->sa_len - offsetof(struct sockaddr, sa_data); 875 876 *out++ = 'Q'; 877 do { 878 *out++ = hexlist[(*in >> 4) & 15]; 879 *out++ = hexlist[(*in++) & 15]; 880 *out++ = '.'; 881 } while (--len > 0 && (out + 3) < &obuf[sizeof(obuf) - 1]); 882 out[-1] = '\0'; 883 return (obuf); 884 } 885 886 char * 887 link_print(struct sockaddr *sa) 888 { 889 struct sockaddr_dl *sdl = (struct sockaddr_dl *)sa; 890 u_char *lla = (u_char *)sdl->sdl_data + sdl->sdl_nlen; 891 892 if (sdl->sdl_nlen == 0 && sdl->sdl_alen == 0 && 893 sdl->sdl_slen == 0) { 894 (void)snprintf(line, sizeof(line), "link#%d", sdl->sdl_index); 895 return (line); 896 } 897 switch (sdl->sdl_type) { 898 case IFT_ETHER: 899 case IFT_CARP: 900 return (ether_ntoa((struct ether_addr *)lla)); 901 default: 902 return (link_ntoa(sdl)); 903 } 904 } 905 906 char * 907 mpls_op(u_int32_t type) 908 { 909 switch (type & (MPLS_OP_PUSH | MPLS_OP_POP | MPLS_OP_SWAP)) { 910 case MPLS_OP_LOCAL: 911 return ("LOCAL"); 912 case MPLS_OP_POP: 913 return ("POP"); 914 case MPLS_OP_SWAP: 915 return ("SWAP"); 916 case MPLS_OP_PUSH: 917 return ("PUSH"); 918 default: 919 return ("?"); 920 } 921 } 922 923 char * 924 label_print(struct sockaddr *sa) 925 { 926 struct sockaddr_mpls *smpls = (struct sockaddr_mpls *)sa; 927 928 if (smpls) 929 (void)snprintf(line, sizeof(line), "%u", 930 ntohl(smpls->smpls_label) >> MPLS_LABEL_OFFSET); 931 else 932 (void)snprintf(line, sizeof(line), "-"); 933 934 return (line); 935 } 936 937 void 938 index_pfk(struct sadb_msg *msg, void **headers) 939 { 940 struct sadb_ext *ext; 941 942 for (ext = (struct sadb_ext *)(msg + 1); 943 (size_t)((u_int8_t *)ext - (u_int8_t *)msg) < 944 msg->sadb_msg_len * PFKEYV2_CHUNK && ext->sadb_ext_len > 0; 945 ext = (struct sadb_ext *)((u_int8_t *)ext + 946 ext->sadb_ext_len * PFKEYV2_CHUNK)) { 947 switch (ext->sadb_ext_type) { 948 case SADB_EXT_ADDRESS_SRC: 949 headers[SADB_EXT_ADDRESS_SRC] = (void *)ext; 950 break; 951 case SADB_EXT_ADDRESS_DST: 952 headers[SADB_EXT_ADDRESS_DST] = (void *)ext; 953 break; 954 case SADB_X_EXT_PROTOCOL: 955 headers[SADB_X_EXT_PROTOCOL] = (void *)ext; 956 break; 957 case SADB_X_EXT_SRC_FLOW: 958 headers[SADB_X_EXT_SRC_FLOW] = (void *)ext; 959 break; 960 case SADB_X_EXT_DST_FLOW: 961 headers[SADB_X_EXT_DST_FLOW] = (void *)ext; 962 break; 963 case SADB_X_EXT_SRC_MASK: 964 headers[SADB_X_EXT_SRC_MASK] = (void *)ext; 965 break; 966 case SADB_X_EXT_DST_MASK: 967 headers[SADB_X_EXT_DST_MASK] = (void *)ext; 968 break; 969 case SADB_X_EXT_FLOW_TYPE: 970 headers[SADB_X_EXT_FLOW_TYPE] = (void *)ext; 971 break; 972 default: 973 /* Ignore. */ 974 break; 975 } 976 } 977 } 978