xref: /openbsd-src/usr.bin/netstat/show.c (revision 50b7afb2c2c0993b0894d4e34bf857cb13ed9c80)
1 /*	$OpenBSD: show.c,v 1.42 2014/05/08 09:28:08 mpi Exp $	*/
2 /*	$NetBSD: show.c,v 1.1 1996/11/15 18:01:41 gwr Exp $	*/
3 
4 /*
5  * Copyright (c) 1983, 1988, 1993
6  *	The Regents of the University of California.  All rights reserved.
7  *
8  * Redistribution and use in source and binary forms, with or without
9  * modification, are permitted provided that the following conditions
10  * are met:
11  * 1. Redistributions of source code must retain the above copyright
12  *    notice, this list of conditions and the following disclaimer.
13  * 2. Redistributions in binary form must reproduce the above copyright
14  *    notice, this list of conditions and the following disclaimer in the
15  *    documentation and/or other materials provided with the distribution.
16  * 3. Neither the name of the University nor the names of its contributors
17  *    may be used to endorse or promote products derived from this software
18  *    without specific prior written permission.
19  *
20  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
21  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
22  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
24  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
25  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
30  * SUCH DAMAGE.
31  */
32 
33 #include <sys/param.h>
34 #include <sys/socket.h>
35 #include <sys/sysctl.h>
36 
37 #include <net/if.h>
38 #include <net/if_dl.h>
39 #include <net/if_types.h>
40 #include <net/pfkeyv2.h>
41 #include <net/route.h>
42 #include <netinet/in.h>
43 #include <netinet/if_ether.h>
44 #include <netinet/ip_ipsp.h>
45 #include <netmpls/mpls.h>
46 #include <arpa/inet.h>
47 
48 #include <err.h>
49 #include <errno.h>
50 #include <netdb.h>
51 #include <stdio.h>
52 #include <stddef.h>
53 #include <stdlib.h>
54 #include <string.h>
55 #include <unistd.h>
56 
57 #include "netstat.h"
58 
59 char	*any_ntoa(const struct sockaddr *);
60 char	*link_print(struct sockaddr *);
61 char	*label_print(struct sockaddr *);
62 
63 #define ROUNDUP(a) \
64 	((a) > 0 ? (1 + (((a) - 1) | (sizeof(long) - 1))) : sizeof(long))
65 #define ADVANCE(x, n) (x += ROUNDUP((n)->sa_len))
66 
67 #define PFKEYV2_CHUNK sizeof(u_int64_t)
68 
69 /*
70  * Definitions for showing gateway flags.
71  */
72 struct bits {
73 	int	b_mask;
74 	char	b_val;
75 };
76 static const struct bits bits[] = {
77 	{ RTF_UP,	'U' },
78 	{ RTF_GATEWAY,	'G' },
79 	{ RTF_HOST,	'H' },
80 	{ RTF_REJECT,	'R' },
81 	{ RTF_BLACKHOLE, 'B' },
82 	{ RTF_DYNAMIC,	'D' },
83 	{ RTF_MODIFIED,	'M' },
84 	{ RTF_DONE,	'd' }, /* Completed -- for routing messages only */
85 	{ RTF_MASK,	'm' }, /* Mask Present -- for routing messages only */
86 	{ RTF_CLONING,	'C' },
87 	{ RTF_XRESOLVE,	'X' },
88 	{ RTF_LLINFO,	'L' },
89 	{ RTF_STATIC,	'S' },
90 	{ RTF_PROTO1,	'1' },
91 	{ RTF_PROTO2,	'2' },
92 	{ RTF_PROTO3,	'3' },
93 	{ RTF_CLONED,	'c' },
94 	{ RTF_MPATH,	'P' },
95 	{ RTF_MPLS,	'T' },
96 	{ RTF_LOCAL,	'l' },
97 	{ RTF_BROADCAST, 'b' },
98 	{ 0 }
99 };
100 
101 int	 WID_DST(int);
102 void	 p_rtentry(struct rt_msghdr *);
103 void	 p_pfkentry(struct sadb_msg *);
104 void	 pr_family(int);
105 void	 p_encap(struct sockaddr *, struct sockaddr *, int);
106 void	 p_protocol(struct sadb_protocol *, struct sockaddr *, struct
107 	     sadb_protocol *, int);
108 void	 p_sockaddr(struct sockaddr *, struct sockaddr *, int, int);
109 void	 p_sockaddr_mpls(struct sockaddr *, struct sockaddr *, int, int);
110 void	 p_flags(int, char *);
111 char	*routename4(in_addr_t);
112 char	*routename6(struct sockaddr_in6 *);
113 void	 index_pfk(struct sadb_msg *, void **);
114 
115 /*
116  * Print routing tables.
117  */
118 void
119 p_rttables(int af, u_int tableid)
120 {
121 	struct rt_msghdr *rtm;
122 	struct sadb_msg *msg;
123 	char *buf = NULL, *next, *lim = NULL;
124 	size_t needed;
125 	int mib[7], mcnt;
126 	struct sockaddr *sa;
127 
128 	mib[0] = CTL_NET;
129 	mib[1] = PF_ROUTE;
130 	mib[2] = 0;
131 	mib[3] = af;
132 	mib[4] = NET_RT_DUMP;
133 	mib[5] = 0;
134 	mib[6] = tableid;
135 	mcnt = 7;
136 	while (1) {
137 		if (sysctl(mib, mcnt, NULL, &needed, NULL, 0) == -1)
138 			err(1, "route-sysctl-estimate");
139 		if (needed == 0)
140 			break;
141 		if ((buf = realloc(buf, needed)) == NULL)
142 			err(1, NULL);
143 		if (sysctl(mib, mcnt, buf, &needed, NULL, 0) == -1) {
144 			if (errno == ENOMEM)
145 				continue;
146 			err(1, "sysctl of routing table");
147 		}
148 		lim = buf + needed;
149 		break;
150 	}
151 
152 	printf("Routing tables\n");
153 
154 	if (buf) {
155 		for (next = buf; next < lim; next += rtm->rtm_msglen) {
156 			rtm = (struct rt_msghdr *)next;
157 			if (rtm->rtm_version != RTM_VERSION)
158 				continue;
159 			sa = (struct sockaddr *)(next + rtm->rtm_hdrlen);
160 			if (af != AF_UNSPEC && sa->sa_family != af)
161 				continue;
162 			p_rtentry(rtm);
163 		}
164 		free(buf);
165 		buf = NULL;
166 	}
167 
168 	if (af != 0 && af != PF_KEY)
169 		return;
170 
171 	mib[0] = CTL_NET;
172 	mib[1] = PF_KEY;
173 	mib[2] = PF_KEY_V2;
174 	mib[3] = NET_KEY_SPD_DUMP;
175 	mib[4] = mib[5] = 0;
176 	while (1) {
177 		if (sysctl(mib, 4, NULL, &needed, NULL, 0) == -1) {
178 			if (errno == ENOPROTOOPT)
179 				return;
180 			err(1, "spd-sysctl-estimate");
181 		}
182 		if (needed == 0)
183 			break;
184 		if ((buf = realloc(buf, needed)) == NULL)
185 			err(1, NULL);
186 		if (sysctl(mib, 4, buf, &needed, NULL, 0) == -1) {
187 			if (errno == ENOMEM)
188 				continue;
189 			err(1,"sysctl of spd");
190 		}
191 		lim = buf + needed;
192 		break;
193 	}
194 
195 	if (buf) {
196 		printf("\nEncap:\n");
197 
198 		for (next = buf; next < lim; next += msg->sadb_msg_len *
199 		    PFKEYV2_CHUNK) {
200 			msg = (struct sadb_msg *)next;
201 			if (msg->sadb_msg_len == 0)
202 				break;
203 			p_pfkentry(msg);
204 		}
205 		free(buf);
206 		buf = NULL;
207 	}
208 }
209 
210 /*
211  * column widths; each followed by one space
212  * width of destination/gateway column
213  * strlen("fe80::aaaa:bbbb:cccc:dddd@gif0") == 30, strlen("/128") == 4
214  */
215 #define	WID_GW(af)	((af) == AF_INET6 ? (nflag ? 30 : 18) : 18)
216 
217 int
218 WID_DST(int af)
219 {
220 
221 	if (nflag)
222 		switch (af) {
223 		case AF_MPLS:
224 			return 9;
225 		case AF_INET6:
226 			return 34;
227 		default:
228 			return 18;
229 		}
230 	else
231 		switch (af) {
232 		case AF_MPLS:
233 			return 9;
234  		default:
235 			return 18;
236 		}
237 }
238 
239 /*
240  * Print header for routing table columns.
241  */
242 void
243 pr_rthdr(int af, int Aflag)
244 {
245 	if (Aflag)
246 		printf("%-*.*s ", PLEN, PLEN, "Address");
247 	switch (af) {
248 	case PF_KEY:
249 		printf("%-18s %-5s %-18s %-5s %-5s %-22s\n",
250 		    "Source", "Port", "Destination",
251 		    "Port", "Proto", "SA(Address/Proto/Type/Direction)");
252 		break;
253 	case PF_MPLS:
254 		printf("%-9s %-9s %-6s %-18s %-6.6s %5.5s %8.8s %5.5s  %4.4s %s\n",
255 		    "In label", "Out label", "Op", "Gateway",
256 		    "Flags", "Refs", "Use", "Mtu", "Prio", "Interface");
257 		break;
258 	default:
259 		printf("%-*.*s %-*.*s %-6.6s %5.5s %8.8s %5.5s  %4.4s %s",
260 		    WID_DST(af), WID_DST(af), "Destination",
261 		    WID_GW(af), WID_GW(af), "Gateway",
262 		    "Flags", "Refs", "Use", "Mtu", "Prio", "Iface");
263 		if (vflag && !Aflag)
264 			printf(" %s", "Label");
265 		putchar('\n');
266 		break;
267 	}
268 }
269 
270 static void
271 get_rtaddrs(int addrs, struct sockaddr *sa, struct sockaddr **rti_info)
272 {
273 	int	i;
274 
275 	for (i = 0; i < RTAX_MAX; i++) {
276 		if (addrs & (1 << i)) {
277 			rti_info[i] = sa;
278 			sa = (struct sockaddr *)((char *)(sa) +
279 			    ROUNDUP(sa->sa_len));
280 		} else
281 			rti_info[i] = NULL;
282 	}
283 }
284 
285 /*
286  * Print a routing table entry.
287  */
288 void
289 p_rtentry(struct rt_msghdr *rtm)
290 {
291 	static int	 old_af = -1;
292 	struct sockaddr	*sa = (struct sockaddr *)((char *)rtm + rtm->rtm_hdrlen);
293 	struct sockaddr	*mask, *rti_info[RTAX_MAX];
294 	char		 ifbuf[IF_NAMESIZE];
295 
296 	if (sa->sa_family == AF_KEY)
297 		return;
298 
299 	get_rtaddrs(rtm->rtm_addrs, sa, rti_info);
300 
301 	if (Fflag && rti_info[RTAX_GATEWAY]->sa_family != sa->sa_family) {
302 		return;
303 	}
304 	if (old_af != sa->sa_family) {
305 		old_af = sa->sa_family;
306 		pr_family(sa->sa_family);
307 		pr_rthdr(sa->sa_family, 0);
308 	}
309 
310 	mask = rti_info[RTAX_NETMASK];
311 	if ((sa = rti_info[RTAX_DST]) == NULL)
312 		return;
313 
314 	p_sockaddr(sa, mask, rtm->rtm_flags, WID_DST(sa->sa_family));
315 	p_sockaddr_mpls(sa, rti_info[RTAX_SRC], rtm->rtm_mpls,
316 	    WID_DST(sa->sa_family));
317 
318 	p_sockaddr(rti_info[RTAX_GATEWAY], NULL, RTF_HOST,
319 	    WID_GW(sa->sa_family));
320 
321 	p_flags(rtm->rtm_flags, "%-6.6s ");
322 	printf("%5u %8llu ", rtm->rtm_rmx.rmx_refcnt,
323 	    rtm->rtm_rmx.rmx_pksent);
324 	if (rtm->rtm_rmx.rmx_mtu)
325 		printf("%5u ", rtm->rtm_rmx.rmx_mtu);
326 	else
327 		printf("%5s ", "-");
328 	putchar((rtm->rtm_rmx.rmx_locks & RTV_MTU) ? 'L' : ' ');
329 	printf("  %2d %-5.16s", rtm->rtm_priority,
330 	    if_indextoname(rtm->rtm_index, ifbuf));
331 	if (vflag && rti_info[RTAX_LABEL])
332 		printf(" %s", ((struct sockaddr_rtlabel *)
333 		    rti_info[RTAX_LABEL])->sr_label);
334 	putchar('\n');
335 }
336 
337 /*
338  * Print a pfkey/encap entry.
339  */
340 void
341 p_pfkentry(struct sadb_msg *msg)
342 {
343 	static int		 old = 0;
344 	struct sadb_address	*saddr;
345 	struct sadb_protocol	*sap, *saft;
346 	struct sockaddr		*sa, *mask;
347 	void			*headers[SADB_EXT_MAX + 1];
348 
349 	if (!old) {
350 		pr_rthdr(PF_KEY, 0);
351 		old++;
352 	}
353 
354 	bzero(headers, sizeof(headers));
355 	index_pfk(msg, headers);
356 
357 	/* These are always set */
358 	saddr = headers[SADB_X_EXT_SRC_FLOW];
359 	sa = (struct sockaddr *)(saddr + 1);
360 	saddr = headers[SADB_X_EXT_SRC_MASK];
361 	mask = (struct sockaddr *)(saddr + 1);
362 	p_encap(sa, mask, WID_DST(sa->sa_family));
363 
364 	/* These are always set, too. */
365 	saddr = headers[SADB_X_EXT_DST_FLOW];
366 	sa = (struct sockaddr *)(saddr + 1);
367 	saddr = headers[SADB_X_EXT_DST_MASK];
368 	mask = (struct sockaddr *)(saddr + 1);
369 	p_encap(sa, mask, WID_DST(sa->sa_family));
370 
371 	/* Bypass and deny flows do not set SADB_EXT_ADDRESS_DST! */
372 	sap = headers[SADB_X_EXT_PROTOCOL];
373 	saft = headers[SADB_X_EXT_FLOW_TYPE];
374 	saddr = headers[SADB_EXT_ADDRESS_DST];
375 	if (saddr)
376 		sa = (struct sockaddr *)(saddr + 1);
377 	else
378 		sa = NULL;
379 	p_protocol(sap, sa, saft, msg->sadb_msg_satype);
380 
381 	printf("\n");
382 }
383 
384 /*
385  * Print address family header before a section of the routing table.
386  */
387 void
388 pr_family(int af)
389 {
390 	char *afname;
391 
392 	switch (af) {
393 	case AF_INET:
394 		afname = "Internet";
395 		break;
396 	case AF_INET6:
397 		afname = "Internet6";
398 		break;
399 	case PF_KEY:
400 		afname = "Encap";
401 		break;
402 	case AF_MPLS:
403 		afname = "MPLS";
404 		break;
405 	default:
406 		afname = NULL;
407 		break;
408 	}
409 	if (afname)
410 		printf("\n%s:\n", afname);
411 	else
412 		printf("\nProtocol Family %d:\n", af);
413 }
414 
415 void
416 p_addr(struct sockaddr *sa, struct sockaddr *mask, int flags)
417 {
418 	p_sockaddr(sa, mask, flags, WID_DST(sa->sa_family));
419 }
420 
421 void
422 p_gwaddr(struct sockaddr *sa, int af)
423 {
424 	p_sockaddr(sa, 0, RTF_HOST, WID_GW(af));
425 }
426 
427 void
428 p_encap(struct sockaddr *sa, struct sockaddr *mask, int width)
429 {
430 	char		*cp;
431 	unsigned short	 port = 0;
432 
433 	if (mask)
434 		cp = netname(sa, mask);
435 	else
436 		cp = routename(sa);
437 	switch (sa->sa_family) {
438 	case AF_INET:
439 		port = ntohs(((struct sockaddr_in *)sa)->sin_port);
440 		break;
441 	case AF_INET6:
442 		port = ntohs(((struct sockaddr_in6 *)sa)->sin6_port);
443 		break;
444 	}
445 	if (width < 0)
446 		printf("%s", cp);
447 	else {
448 		if (nflag)
449 			printf("%-*s %-5u ", width, cp, port);
450 		else
451 			printf("%-*.*s %-5u ", width, width, cp, port);
452 	}
453 }
454 
455 void
456 p_protocol(struct sadb_protocol *sap, struct sockaddr *sa, struct sadb_protocol
457     *saft, int proto)
458 {
459 	printf("%-6u", sap->sadb_protocol_proto);
460 
461 	if (sa)
462 		p_sockaddr(sa, NULL, 0, -1);
463 	else
464 		printf("none");
465 
466 	switch (proto) {
467 	case SADB_SATYPE_ESP:
468 		printf("/esp");
469 		break;
470 	case SADB_SATYPE_AH:
471 		printf("/ah");
472 		break;
473 	case SADB_X_SATYPE_IPCOMP:
474 		printf("/ipcomp");
475 		break;
476 	case SADB_X_SATYPE_IPIP:
477 		printf("/ipip");
478 		break;
479 	default:
480 		printf("/<unknown>");
481 	}
482 
483 	switch(saft->sadb_protocol_proto) {
484 	case SADB_X_FLOW_TYPE_USE:
485 		printf("/use");
486 		break;
487 	case SADB_X_FLOW_TYPE_REQUIRE:
488 		printf("/require");
489 		break;
490 	case SADB_X_FLOW_TYPE_ACQUIRE:
491 		printf("/acquire");
492 		break;
493 	case SADB_X_FLOW_TYPE_DENY:
494 		printf("/deny");
495 		break;
496 	case SADB_X_FLOW_TYPE_BYPASS:
497 		printf("/bypass");
498 		break;
499 	case SADB_X_FLOW_TYPE_DONTACQ:
500 		printf("/dontacq");
501 		break;
502 	default:
503 		printf("/<unknown type>");
504 	}
505 
506 	switch(saft->sadb_protocol_direction) {
507 	case IPSP_DIRECTION_IN:
508 		printf("/in");
509 		break;
510 	case IPSP_DIRECTION_OUT:
511 		printf("/out");
512 		break;
513 	default:
514 		printf("/<unknown>");
515 	}
516 }
517 
518 void
519 p_sockaddr(struct sockaddr *sa, struct sockaddr *mask, int flags, int width)
520 {
521 	char *cp;
522 
523 	switch (sa->sa_family) {
524 	case AF_INET6:
525 	    {
526 		struct sockaddr_in6 *sa6 = (struct sockaddr_in6 *)sa;
527 		struct in6_addr *in6 = &sa6->sin6_addr;
528 
529 		/*
530 		 * XXX: This is a special workaround for KAME kernels.
531 		 * sin6_scope_id field of SA should be set in the future.
532 		 */
533 		if (IN6_IS_ADDR_LINKLOCAL(in6) ||
534 		    IN6_IS_ADDR_MC_LINKLOCAL(in6) ||
535 		    IN6_IS_ADDR_MC_INTFACELOCAL(in6)) {
536 			/* XXX: override is ok? */
537 			sa6->sin6_scope_id = (u_int32_t)ntohs(*(u_short *)
538 			    &in6->s6_addr[2]);
539 			*(u_short *)&in6->s6_addr[2] = 0;
540 		}
541 		if (flags & RTF_HOST)
542 			cp = routename((struct sockaddr *)sa6);
543 		else
544 			cp = netname((struct sockaddr *)sa6, mask);
545 		break;
546 	    }
547 	case AF_MPLS:
548 		return;
549 	default:
550 		if ((flags & RTF_HOST) || mask == NULL)
551 			cp = routename(sa);
552 		else
553 			cp = netname(sa, mask);
554 		break;
555 	}
556 	if (width < 0)
557 		printf("%s", cp);
558 	else {
559 		if (nflag)
560 			printf("%-*s ", width, cp);
561 		else
562 			printf("%-*.*s ", width, width, cp);
563 	}
564 }
565 
566 static char line[MAXHOSTNAMELEN];
567 static char domain[MAXHOSTNAMELEN];
568 
569 void
570 p_sockaddr_mpls(struct sockaddr *in, struct sockaddr *out, int flags, int width)
571 {
572 	if (in->sa_family != AF_MPLS)
573 		return;
574 
575 	if (flags & MPLS_OP_POP || flags == MPLS_OP_LOCAL) {
576 		printf("%-*s ", width, label_print(in));
577 		printf("%-*s ", width, label_print(NULL));
578 	} else {
579 		printf("%-*s ", width, label_print(in));
580 		printf("%-*s ", width, label_print(out));
581 	}
582 
583 	printf("%-6s ", mpls_op(flags));
584 }
585 
586 void
587 p_flags(int f, char *format)
588 {
589 	char name[33], *flags;
590 	const struct bits *p = bits;
591 
592 	for (flags = name; p->b_mask && flags < &name[sizeof(name) - 2]; p++)
593 		if (p->b_mask & f)
594 			*flags++ = p->b_val;
595 	*flags = '\0';
596 	printf(format, name);
597 }
598 
599 char *
600 routename(struct sockaddr *sa)
601 {
602 	char *cp = NULL;
603 	static int first = 1;
604 
605 	if (first) {
606 		first = 0;
607 		if (gethostname(domain, sizeof(domain)) == 0 &&
608 		    (cp = strchr(domain, '.')))
609 			(void)strlcpy(domain, cp + 1, sizeof(domain));
610 		else
611 			domain[0] = '\0';
612 		cp = NULL;
613 	}
614 
615 	if (sa->sa_len == 0) {
616 		(void)strlcpy(line, "default", sizeof(line));
617 		return (line);
618 	}
619 
620 	switch (sa->sa_family) {
621 	case AF_INET:
622 		return
623 		    (routename4(((struct sockaddr_in *)sa)->sin_addr.s_addr));
624 
625 	case AF_INET6:
626 	    {
627 		struct sockaddr_in6 sin6;
628 
629 		memset(&sin6, 0, sizeof(sin6));
630 		memcpy(&sin6, sa, sa->sa_len);
631 		sin6.sin6_len = sizeof(struct sockaddr_in6);
632 		sin6.sin6_family = AF_INET6;
633 		if (sa->sa_len == sizeof(struct sockaddr_in6) &&
634 		    (IN6_IS_ADDR_LINKLOCAL(&sin6.sin6_addr) ||
635 		     IN6_IS_ADDR_MC_LINKLOCAL(&sin6.sin6_addr) ||
636 		     IN6_IS_ADDR_MC_INTFACELOCAL(&sin6.sin6_addr)) &&
637 		    sin6.sin6_scope_id == 0) {
638 			sin6.sin6_scope_id =
639 			    ntohs(*(u_int16_t *)&sin6.sin6_addr.s6_addr[2]);
640 			sin6.sin6_addr.s6_addr[2] = 0;
641 			sin6.sin6_addr.s6_addr[3] = 0;
642 		}
643 		return (routename6(&sin6));
644 	    }
645 
646 	case AF_LINK:
647 		return (link_print(sa));
648 	case AF_MPLS:
649 		return (label_print(sa));
650 	case AF_UNSPEC:
651 		if (sa->sa_len == sizeof(struct sockaddr_rtlabel)) {
652 			static char name[RTLABEL_LEN];
653 			struct sockaddr_rtlabel *sr;
654 
655 			sr = (struct sockaddr_rtlabel *)sa;
656 			(void)strlcpy(name, sr->sr_label, sizeof(name));
657 			return (name);
658 		}
659 		/* FALLTHROUGH */
660 	default:
661 		(void)snprintf(line, sizeof(line), "(%d) %s",
662 		    sa->sa_family, any_ntoa(sa));
663 		break;
664 	}
665 	return (line);
666 }
667 
668 char *
669 routename4(in_addr_t in)
670 {
671 	char		*cp = NULL;
672 	struct in_addr	 ina;
673 	struct hostent	*hp;
674 
675 	if (in == INADDR_ANY)
676 		cp = "default";
677 	if (!cp && !nflag) {
678 		if ((hp = gethostbyaddr((char *)&in,
679 		    sizeof(in), AF_INET)) != NULL) {
680 			if ((cp = strchr(hp->h_name, '.')) &&
681 			    !strcmp(cp + 1, domain))
682 				*cp = '\0';
683 			cp = hp->h_name;
684 		}
685 	}
686 	ina.s_addr = in;
687 	strlcpy(line, cp ? cp : inet_ntoa(ina), sizeof(line));
688 
689 	return (line);
690 }
691 
692 char *
693 routename6(struct sockaddr_in6 *sin6)
694 {
695 	int	 niflags = 0;
696 
697 	if (nflag)
698 		niflags |= NI_NUMERICHOST;
699 	else
700 		niflags |= NI_NOFQDN;
701 
702 	if (getnameinfo((struct sockaddr *)sin6, sin6->sin6_len,
703 	    line, sizeof(line), NULL, 0, niflags) != 0)
704 		strncpy(line, "invalid", sizeof(line));
705 
706 	return (line);
707 }
708 
709 /*
710  * Return the name of the network whose address is given.
711  * The address is assumed to be that of a net or subnet, not a host.
712  */
713 char *
714 netname4(in_addr_t in, in_addr_t mask)
715 {
716 	char *cp = NULL;
717 	struct netent *np = NULL;
718 	int mbits;
719 
720 	in = ntohl(in);
721 	mask = ntohl(mask);
722 	if (!nflag && in != INADDR_ANY) {
723 		if ((np = getnetbyaddr(in, AF_INET)) != NULL)
724 			cp = np->n_name;
725 	}
726 	if (in == INADDR_ANY && mask == INADDR_ANY)
727 		cp = "default";
728 	mbits = mask ? 33 - ffs(mask) : 0;
729 	if (cp)
730 		strlcpy(line, cp, sizeof(line));
731 #define C(x)	((x) & 0xff)
732 	else if (mbits < 9)
733 		snprintf(line, sizeof(line), "%u/%d", C(in >> 24), mbits);
734 	else if (mbits < 17)
735 		snprintf(line, sizeof(line), "%u.%u/%d",
736 		    C(in >> 24) , C(in >> 16), mbits);
737 	else if (mbits < 25)
738 		snprintf(line, sizeof(line), "%u.%u.%u/%d",
739 		    C(in >> 24), C(in >> 16), C(in >> 8), mbits);
740 	else
741 		snprintf(line, sizeof(line), "%u.%u.%u.%u/%d", C(in >> 24),
742 		    C(in >> 16), C(in >> 8), C(in), mbits);
743 #undef C
744 	return (line);
745 }
746 
747 char *
748 netname6(struct sockaddr_in6 *sa6, struct sockaddr_in6 *mask)
749 {
750 	struct sockaddr_in6 sin6;
751 	u_char *p;
752 	int masklen, final = 0, illegal = 0;
753 	int i, lim, flag, error;
754 	char hbuf[NI_MAXHOST];
755 
756 	sin6 = *sa6;
757 
758 	flag = 0;
759 	masklen = 0;
760 	if (mask) {
761 		lim = mask->sin6_len - offsetof(struct sockaddr_in6, sin6_addr);
762 		lim = lim < (int)sizeof(struct in6_addr) ?
763 		    lim : (int)sizeof(struct in6_addr);
764 		for (p = (u_char *)&mask->sin6_addr, i = 0; i < lim; p++) {
765 			if (final && *p) {
766 				illegal++;
767 				sin6.sin6_addr.s6_addr[i++] = 0x00;
768 				continue;
769 			}
770 
771 			switch (*p & 0xff) {
772 			case 0xff:
773 				masklen += 8;
774 				break;
775 			case 0xfe:
776 				masklen += 7;
777 				final++;
778 				break;
779 			case 0xfc:
780 				masklen += 6;
781 				final++;
782 				break;
783 			case 0xf8:
784 				masklen += 5;
785 				final++;
786 				break;
787 			case 0xf0:
788 				masklen += 4;
789 				final++;
790 				break;
791 			case 0xe0:
792 				masklen += 3;
793 				final++;
794 				break;
795 			case 0xc0:
796 				masklen += 2;
797 				final++;
798 				break;
799 			case 0x80:
800 				masklen += 1;
801 				final++;
802 				break;
803 			case 0x00:
804 				final++;
805 				break;
806 			default:
807 				final++;
808 				illegal++;
809 				break;
810 			}
811 
812 			if (!illegal)
813 				sin6.sin6_addr.s6_addr[i++] &= *p;
814 			else
815 				sin6.sin6_addr.s6_addr[i++] = 0x00;
816 		}
817 		while (i < (int)sizeof(struct in6_addr))
818 			sin6.sin6_addr.s6_addr[i++] = 0x00;
819 	} else
820 		masklen = 128;
821 
822 	if (masklen == 0 && IN6_IS_ADDR_UNSPECIFIED(&sin6.sin6_addr))
823 		return ("default");
824 
825 	if (illegal)
826 		warnx("illegal prefixlen");
827 
828 	if (nflag)
829 		flag |= NI_NUMERICHOST;
830 	error = getnameinfo((struct sockaddr *)&sin6, sin6.sin6_len,
831 	    hbuf, sizeof(hbuf), NULL, 0, flag);
832 	if (error)
833 		snprintf(hbuf, sizeof(hbuf), "invalid");
834 
835 	snprintf(line, sizeof(line), "%s/%d", hbuf, masklen);
836 	return (line);
837 }
838 
839 /*
840  * Return the name of the network whose address is given.
841  * The address is assumed to be that of a net or subnet, not a host.
842  */
843 char *
844 netname(struct sockaddr *sa, struct sockaddr *mask)
845 {
846 	switch (sa->sa_family) {
847 	case AF_INET:
848 		return netname4(((struct sockaddr_in *)sa)->sin_addr.s_addr,
849 		    mask->sa_len == 0 ? 0 :
850 		    ((struct sockaddr_in *)mask)->sin_addr.s_addr);
851 	case AF_INET6:
852 		return netname6((struct sockaddr_in6 *)sa,
853 		    (struct sockaddr_in6 *)mask);
854 	case AF_LINK:
855 		return (link_print(sa));
856 	case AF_MPLS:
857 		return (label_print(sa));
858 	default:
859 		snprintf(line, sizeof(line), "af %d: %s",
860 		    sa->sa_family, any_ntoa(sa));
861 		break;
862 	}
863 	return (line);
864 }
865 
866 static const char hexlist[] = "0123456789abcdef";
867 
868 char *
869 any_ntoa(const struct sockaddr *sa)
870 {
871 	static char obuf[240];
872 	const char *in = sa->sa_data;
873 	char *out = obuf;
874 	int len = sa->sa_len - offsetof(struct sockaddr, sa_data);
875 
876 	*out++ = 'Q';
877 	do {
878 		*out++ = hexlist[(*in >> 4) & 15];
879 		*out++ = hexlist[(*in++)    & 15];
880 		*out++ = '.';
881 	} while (--len > 0 && (out + 3) < &obuf[sizeof(obuf) - 1]);
882 	out[-1] = '\0';
883 	return (obuf);
884 }
885 
886 char *
887 link_print(struct sockaddr *sa)
888 {
889 	struct sockaddr_dl	*sdl = (struct sockaddr_dl *)sa;
890 	u_char			*lla = (u_char *)sdl->sdl_data + sdl->sdl_nlen;
891 
892 	if (sdl->sdl_nlen == 0 && sdl->sdl_alen == 0 &&
893 	    sdl->sdl_slen == 0) {
894 		(void)snprintf(line, sizeof(line), "link#%d", sdl->sdl_index);
895 		return (line);
896 	}
897 	switch (sdl->sdl_type) {
898 	case IFT_ETHER:
899 	case IFT_CARP:
900 		return (ether_ntoa((struct ether_addr *)lla));
901 	default:
902 		return (link_ntoa(sdl));
903 	}
904 }
905 
906 char *
907 mpls_op(u_int32_t type)
908 {
909 	switch (type & (MPLS_OP_PUSH | MPLS_OP_POP | MPLS_OP_SWAP)) {
910 	case MPLS_OP_LOCAL:
911 		return ("LOCAL");
912 	case MPLS_OP_POP:
913 		return ("POP");
914 	case MPLS_OP_SWAP:
915 		return ("SWAP");
916 	case MPLS_OP_PUSH:
917 		return ("PUSH");
918 	default:
919 		return ("?");
920 	}
921 }
922 
923 char *
924 label_print(struct sockaddr *sa)
925 {
926 	struct sockaddr_mpls	*smpls = (struct sockaddr_mpls *)sa;
927 
928 	if (smpls)
929 		(void)snprintf(line, sizeof(line), "%u",
930 		    ntohl(smpls->smpls_label) >> MPLS_LABEL_OFFSET);
931 	else
932 		(void)snprintf(line, sizeof(line), "-");
933 
934 	return (line);
935 }
936 
937 void
938 index_pfk(struct sadb_msg *msg, void **headers)
939 {
940 	struct sadb_ext	*ext;
941 
942 	for (ext = (struct sadb_ext *)(msg + 1);
943 	    (size_t)((u_int8_t *)ext - (u_int8_t *)msg) <
944 	    msg->sadb_msg_len * PFKEYV2_CHUNK && ext->sadb_ext_len > 0;
945 	    ext = (struct sadb_ext *)((u_int8_t *)ext +
946 	    ext->sadb_ext_len * PFKEYV2_CHUNK)) {
947 		switch (ext->sadb_ext_type) {
948 		case SADB_EXT_ADDRESS_SRC:
949 			headers[SADB_EXT_ADDRESS_SRC] = (void *)ext;
950 			break;
951 		case SADB_EXT_ADDRESS_DST:
952 			headers[SADB_EXT_ADDRESS_DST] = (void *)ext;
953 			break;
954 		case SADB_X_EXT_PROTOCOL:
955 			headers[SADB_X_EXT_PROTOCOL] = (void *)ext;
956 			break;
957 		case SADB_X_EXT_SRC_FLOW:
958 			headers[SADB_X_EXT_SRC_FLOW] = (void *)ext;
959 			break;
960 		case SADB_X_EXT_DST_FLOW:
961 			headers[SADB_X_EXT_DST_FLOW] = (void *)ext;
962 			break;
963 		case SADB_X_EXT_SRC_MASK:
964 			headers[SADB_X_EXT_SRC_MASK] = (void *)ext;
965 			break;
966 		case SADB_X_EXT_DST_MASK:
967 			headers[SADB_X_EXT_DST_MASK] = (void *)ext;
968 			break;
969 		case SADB_X_EXT_FLOW_TYPE:
970 			headers[SADB_X_EXT_FLOW_TYPE] = (void *)ext;
971 			break;
972 		default:
973 			/* Ignore. */
974 			break;
975 		}
976 	}
977 }
978