xref: /openbsd-src/usr.bin/netstat/show.c (revision 850e275390052b330d93020bf619a739a3c277ac)
1 /*	$OpenBSD: show.c,v 1.14 2008/09/15 20:13:10 claudio Exp $	*/
2 /*	$NetBSD: show.c,v 1.1 1996/11/15 18:01:41 gwr Exp $	*/
3 
4 /*
5  * Copyright (c) 1983, 1988, 1993
6  *	The Regents of the University of California.  All rights reserved.
7  *
8  * Redistribution and use in source and binary forms, with or without
9  * modification, are permitted provided that the following conditions
10  * are met:
11  * 1. Redistributions of source code must retain the above copyright
12  *    notice, this list of conditions and the following disclaimer.
13  * 2. Redistributions in binary form must reproduce the above copyright
14  *    notice, this list of conditions and the following disclaimer in the
15  *    documentation and/or other materials provided with the distribution.
16  * 3. Neither the name of the University nor the names of its contributors
17  *    may be used to endorse or promote products derived from this software
18  *    without specific prior written permission.
19  *
20  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
21  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
22  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
24  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
25  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
30  * SUCH DAMAGE.
31  */
32 
33 #include <sys/param.h>
34 #include <sys/protosw.h>
35 #include <sys/socket.h>
36 #include <sys/mbuf.h>
37 #include <sys/sysctl.h>
38 
39 #include <net/if.h>
40 #include <net/if_dl.h>
41 #include <net/if_types.h>
42 #include <net/pfkeyv2.h>
43 #include <net/route.h>
44 #include <netinet/in.h>
45 #include <netinet/if_ether.h>
46 #include <netinet/ip_ipsp.h>
47 #include <netmpls/mpls.h>
48 #include <arpa/inet.h>
49 
50 #include <err.h>
51 #include <errno.h>
52 #include <netdb.h>
53 #include <stdio.h>
54 #include <stddef.h>
55 #include <stdlib.h>
56 #include <string.h>
57 #include <unistd.h>
58 
59 #include "netstat.h"
60 
61 char	*any_ntoa(const struct sockaddr *);
62 char	*link_print(struct sockaddr *);
63 char	*label_print_op(u_int8_t);
64 char	*label_print(struct sockaddr *);
65 
66 #define ROUNDUP(a) \
67 	((a) > 0 ? (1 + (((a) - 1) | (sizeof(long) - 1))) : sizeof(long))
68 #define ADVANCE(x, n) (x += ROUNDUP((n)->sa_len))
69 
70 #define PFKEYV2_CHUNK sizeof(u_int64_t)
71 
72 /*
73  * Definitions for showing gateway flags.
74  */
75 struct bits {
76 	int	b_mask;
77 	char	b_val;
78 };
79 static const struct bits bits[] = {
80 	{ RTF_UP,	'U' },
81 	{ RTF_GATEWAY,	'G' },
82 	{ RTF_HOST,	'H' },
83 	{ RTF_REJECT,	'R' },
84 	{ RTF_BLACKHOLE, 'B' },
85 	{ RTF_DYNAMIC,	'D' },
86 	{ RTF_MODIFIED,	'M' },
87 	{ RTF_DONE,	'd' }, /* Completed -- for routing messages only */
88 	{ RTF_MASK,	'm' }, /* Mask Present -- for routing messages only */
89 	{ RTF_CLONING,	'C' },
90 	{ RTF_XRESOLVE,	'X' },
91 	{ RTF_LLINFO,	'L' },
92 	{ RTF_STATIC,	'S' },
93 	{ RTF_PROTO1,	'1' },
94 	{ RTF_PROTO2,	'2' },
95 	{ RTF_PROTO3,	'3' },
96 	{ RTF_CLONED,	'c' },
97 	{ RTF_JUMBO,	'J' },
98 	{ 0 }
99 };
100 
101 void	 p_rtentry(struct rt_msghdr *);
102 void	 p_pfkentry(struct sadb_msg *);
103 void	 pr_family(int);
104 void	 p_encap(struct sockaddr *, struct sockaddr *, int);
105 void	 p_protocol(struct sadb_protocol *, struct sockaddr *, struct
106 	     sadb_protocol *, int);
107 void	 p_sockaddr(struct sockaddr *, struct sockaddr *, int, int);
108 void	 p_flags(int, char *);
109 char	*routename4(in_addr_t);
110 char	*routename6(struct sockaddr_in6 *);
111 void	 index_pfk(struct sadb_msg *, void **);
112 
113 /*
114  * Print routing tables.
115  */
116 void
117 p_rttables(int af, u_int tableid)
118 {
119 	struct rt_msghdr *rtm;
120 	struct sadb_msg *msg;
121 	char *buf = NULL, *next, *lim = NULL;
122 	size_t needed;
123 	int mib[7];
124 	struct sockaddr *sa;
125 
126 	mib[0] = CTL_NET;
127 	mib[1] = PF_ROUTE;
128 	mib[2] = 0;
129 	mib[3] = af;
130 	mib[4] = NET_RT_DUMP;
131 	mib[5] = 0;
132 	mib[6] = tableid;
133 
134 	if (sysctl(mib, 7, NULL, &needed, NULL, 0) < 0)
135 		err(1, "route-sysctl-estimate");
136 	if (needed > 0) {
137 		if ((buf = malloc(needed)) == 0)
138 			err(1, NULL);
139 		if (sysctl(mib, 7, buf, &needed, NULL, 0) < 0)
140 			err(1, "sysctl of routing table");
141 		lim = buf + needed;
142 	}
143 
144 	printf("Routing tables\n");
145 
146 	if (buf) {
147 		for (next = buf; next < lim; next += rtm->rtm_msglen) {
148 			rtm = (struct rt_msghdr *)next;
149 			if (rtm->rtm_version != RTM_VERSION)
150 				continue;
151 			sa = (struct sockaddr *)(rtm + 1);
152 			if (af != AF_UNSPEC && sa->sa_family != af)
153 				continue;
154 			p_rtentry(rtm);
155 		}
156 		free(buf);
157 		buf = NULL;
158 	}
159 
160 	if (af != 0 && af != PF_KEY)
161 		return;
162 
163 	mib[0] = CTL_NET;
164 	mib[1] = PF_KEY;
165 	mib[2] = PF_KEY_V2;
166 	mib[3] = NET_KEY_SPD_DUMP;
167 	mib[4] = mib[5] = 0;
168 
169 	if (sysctl(mib, 4, NULL, &needed, NULL, 0) == -1) {
170 		if (errno == ENOPROTOOPT)
171 			return;
172 		err(1, "spd-sysctl-estimate");
173 	}
174 	if (needed > 0) {
175 		if ((buf = malloc(needed)) == 0)
176 			err(1, NULL);
177 		if (sysctl(mib, 4, buf, &needed, NULL, 0) == -1)
178 			err(1,"sysctl of spd");
179 		lim = buf + needed;
180 	}
181 
182 	if (buf) {
183 		printf("\nEncap:\n");
184 
185 		for (next = buf; next < lim; next += msg->sadb_msg_len *
186 		    PFKEYV2_CHUNK) {
187 			msg = (struct sadb_msg *)next;
188 			if (msg->sadb_msg_len == 0)
189 				break;
190 			p_pfkentry(msg);
191 		}
192 		free(buf);
193 		buf = NULL;
194 	}
195 }
196 
197 /*
198  * column widths; each followed by one space
199  * width of destination/gateway column
200  * strlen("fe80::aaaa:bbbb:cccc:dddd@gif0") == 30, strlen("/128") == 4
201  */
202 #define	WID_GW(af)	((af) == AF_INET6 ? (nflag ? 30 : 18) : 18)
203 
204 int
205 WID_DST(int af)
206 {
207 
208 	if (nflag)
209 		switch (af) {
210 		case AF_MPLS:
211 			return 34;
212 		case AF_INET6:
213 			return 34;
214 		default:
215 			return 18;
216 		}
217 	else
218 		switch (af) {
219 		case AF_MPLS:
220 			return 34;
221  		default:
222 			return 18;
223 		}
224 }
225 
226 /*
227  * Print header for routing table columns.
228  */
229 void
230 pr_rthdr(int af, int Aflag)
231 {
232 	if (Aflag)
233 		printf("%-*.*s ", PLEN, PLEN, "Address");
234 	switch (af) {
235 	case PF_KEY:
236 		printf("%-18s %-5s %-18s %-5s %-5s %-22s\n",
237 		    "Source", "Port", "Destination",
238 		    "Port", "Proto", "SA(Address/Proto/Type/Direction)");
239 		break;
240 	case PF_MPLS:
241 		printf("%-16s %-10s %-6s %-18s %-6.6s %5.5s %8.8s %5.5s  %4.4s %s\n",
242 		    "In label", "Out label", "Op", "Gateway",
243 		    "Flags", "Refs", "Use", "Mtu", "Prio", "Interface");
244 		break;
245 	default:
246 		printf("%-*.*s %-*.*s %-6.6s %5.5s %8.8s %5.5s  %4.4s %s\n",
247 		    WID_DST(af), WID_DST(af), "Destination",
248 		    WID_GW(af), WID_GW(af), "Gateway",
249 		    "Flags", "Refs", "Use", "Mtu", "Prio", "Iface");
250 		break;
251 	}
252 }
253 
254 static void
255 get_rtaddrs(int addrs, struct sockaddr *sa, struct sockaddr **rti_info)
256 {
257 	int	i;
258 
259 	for (i = 0; i < RTAX_MAX; i++) {
260 		if (addrs & (1 << i)) {
261 			rti_info[i] = sa;
262 			sa = (struct sockaddr *)((char *)(sa) +
263 			    ROUNDUP(sa->sa_len));
264 		} else
265 			rti_info[i] = NULL;
266 	}
267 }
268 
269 /*
270  * Print a routing table entry.
271  */
272 void
273 p_rtentry(struct rt_msghdr *rtm)
274 {
275 	static int	 old_af = -1;
276 	struct sockaddr	*sa = (struct sockaddr *)(rtm + 1);
277 	struct sockaddr	*mask, *rti_info[RTAX_MAX];
278 	char		 ifbuf[IF_NAMESIZE];
279 
280 	if (sa->sa_family == AF_KEY)
281 		return;
282 
283 	get_rtaddrs(rtm->rtm_addrs, sa, rti_info);
284 	if (Fflag && rti_info[RTAX_GATEWAY]->sa_family != sa->sa_family) {
285 		return;
286 	}
287 	if (old_af != sa->sa_family) {
288 		old_af = sa->sa_family;
289 		pr_family(sa->sa_family);
290 		pr_rthdr(sa->sa_family, 0);
291 	}
292 
293 	mask = rti_info[RTAX_NETMASK];
294 	if ((sa = rti_info[RTAX_DST]) == NULL)
295 		return;
296 
297 	p_sockaddr(sa, mask, rtm->rtm_flags, WID_DST(sa->sa_family));
298 	p_sockaddr(rti_info[RTAX_GATEWAY], NULL, RTF_HOST,
299 	    WID_GW(sa->sa_family));
300 	p_flags(rtm->rtm_flags, "%-6.6s ");
301 	printf("%5u %8llu ", rtm->rtm_rmx.rmx_refcnt,
302 	    rtm->rtm_rmx.rmx_pksent);
303 	if (rtm->rtm_rmx.rmx_mtu)
304 		printf("%5u ", rtm->rtm_rmx.rmx_mtu);
305 	else
306 		printf("%5s ", "-");
307 	putchar((rtm->rtm_rmx.rmx_locks & RTV_MTU) ? 'L' : ' ');
308 	printf("  %2d %.16s", rtm->rtm_priority & RTP_MASK,
309 	    if_indextoname(rtm->rtm_index, ifbuf));
310 	putchar('\n');
311 }
312 
313 /*
314  * Print a pfkey/encap entry.
315  */
316 void
317 p_pfkentry(struct sadb_msg *msg)
318 {
319 	static int		 old = 0;
320 	struct sadb_address	*saddr;
321 	struct sadb_protocol	*sap, *saft;
322 	struct sockaddr		*sa, *mask;
323 	void			*headers[SADB_EXT_MAX + 1];
324 
325 	if (!old) {
326 		pr_rthdr(PF_KEY, 0);
327 		old++;
328 	}
329 
330 	bzero(headers, sizeof(headers));
331 	index_pfk(msg, headers);
332 
333 	/* These are always set */
334 	saddr = headers[SADB_X_EXT_SRC_FLOW];
335 	sa = (struct sockaddr *)(saddr + 1);
336 	saddr = headers[SADB_X_EXT_SRC_MASK];
337 	mask = (struct sockaddr *)(saddr + 1);
338 	p_encap(sa, mask, WID_DST(sa->sa_family));
339 
340 	/* These are always set, too. */
341 	saddr = headers[SADB_X_EXT_DST_FLOW];
342 	sa = (struct sockaddr *)(saddr + 1);
343 	saddr = headers[SADB_X_EXT_DST_MASK];
344 	mask = (struct sockaddr *)(saddr + 1);
345 	p_encap(sa, mask, WID_DST(sa->sa_family));
346 
347 	/* Bypass and deny flows do not set SADB_EXT_ADDRESS_DST! */
348 	sap = headers[SADB_X_EXT_PROTOCOL];
349 	saft = headers[SADB_X_EXT_FLOW_TYPE];
350 	saddr = headers[SADB_EXT_ADDRESS_DST];
351 	if (saddr)
352 		sa = (struct sockaddr *)(saddr + 1);
353 	else
354 		sa = NULL;
355 	p_protocol(sap, sa, saft, msg->sadb_msg_satype);
356 
357 	printf("\n");
358 }
359 
360 /*
361  * Print address family header before a section of the routing table.
362  */
363 void
364 pr_family(int af)
365 {
366 	char *afname;
367 
368 	switch (af) {
369 	case AF_INET:
370 		afname = "Internet";
371 		break;
372 	case AF_INET6:
373 		afname = "Internet6";
374 		break;
375 	case PF_KEY:
376 		afname = "Encap";
377 		break;
378 	case AF_MPLS:
379 		afname = "MPLS";
380 		break;
381 	case AF_APPLETALK:
382 		afname = "AppleTalk";
383 		break;
384 	default:
385 		afname = NULL;
386 		break;
387 	}
388 	if (afname)
389 		printf("\n%s:\n", afname);
390 	else
391 		printf("\nProtocol Family %d:\n", af);
392 }
393 
394 void
395 p_addr(struct sockaddr *sa, struct sockaddr *mask, int flags)
396 {
397 	p_sockaddr(sa, mask, flags, WID_DST(sa->sa_family));
398 }
399 
400 void
401 p_gwaddr(struct sockaddr *sa, int af)
402 {
403 	p_sockaddr(sa, 0, RTF_HOST, WID_GW(af));
404 }
405 
406 void
407 p_encap(struct sockaddr *sa, struct sockaddr *mask, int width)
408 {
409 	char		*cp;
410 	unsigned short	 port = 0;
411 
412 	if (mask)
413 		cp = netname(sa, mask);
414 	else
415 		cp = routename(sa);
416 	switch (sa->sa_family) {
417 	case AF_INET:
418 		port = ntohs(((struct sockaddr_in *)sa)->sin_port);
419 		break;
420 	case AF_INET6:
421 		port = ntohs(((struct sockaddr_in6 *)sa)->sin6_port);
422 		break;
423 	}
424 	if (width < 0)
425 		printf("%s", cp);
426 	else {
427 		if (nflag)
428 			printf("%-*s %-5u ", width, cp, port);
429 		else
430 			printf("%-*.*s %-5u ", width, width, cp, port);
431 	}
432 }
433 
434 void
435 p_protocol(struct sadb_protocol *sap, struct sockaddr *sa, struct sadb_protocol
436     *saft, int proto)
437 {
438 	printf("%-6u", sap->sadb_protocol_proto);
439 
440 	if (sa)
441 		p_sockaddr(sa, NULL, 0, -1);
442 	else
443 		printf("none");
444 
445 	switch (proto) {
446 	case SADB_SATYPE_ESP:
447 		printf("/esp");
448 		break;
449 	case SADB_SATYPE_AH:
450 		printf("/ah");
451 		break;
452 	case SADB_X_SATYPE_IPCOMP:
453 		printf("/ipcomp");
454 		break;
455 	case SADB_X_SATYPE_IPIP:
456 		printf("/ipip");
457 		break;
458 	default:
459 		printf("/<unknown>");
460 	}
461 
462 	switch(saft->sadb_protocol_proto) {
463 	case SADB_X_FLOW_TYPE_USE:
464 		printf("/use");
465 		break;
466 	case SADB_X_FLOW_TYPE_REQUIRE:
467 		printf("/require");
468 		break;
469 	case SADB_X_FLOW_TYPE_ACQUIRE:
470 		printf("/acquire");
471 		break;
472 	case SADB_X_FLOW_TYPE_DENY:
473 		printf("/deny");
474 		break;
475 	case SADB_X_FLOW_TYPE_BYPASS:
476 		printf("/bypass");
477 		break;
478 	case SADB_X_FLOW_TYPE_DONTACQ:
479 		printf("/dontacq");
480 		break;
481 	default:
482 		printf("/<unknown type>");
483 	}
484 
485 	switch(saft->sadb_protocol_direction) {
486 	case IPSP_DIRECTION_IN:
487 		printf("/in");
488 		break;
489 	case IPSP_DIRECTION_OUT:
490 		printf("/out");
491 		break;
492 	default:
493 		printf("/<unknown>");
494 	}
495 }
496 
497 void
498 p_sockaddr(struct sockaddr *sa, struct sockaddr *mask, int flags, int width)
499 {
500 	char *cp;
501 
502 	switch (sa->sa_family) {
503 	case AF_INET6:
504 	    {
505 		struct sockaddr_in6 *sa6 = (struct sockaddr_in6 *)sa;
506 		struct in6_addr *in6 = &sa6->sin6_addr;
507 
508 		/*
509 		 * XXX: This is a special workaround for KAME kernels.
510 		 * sin6_scope_id field of SA should be set in the future.
511 		 */
512 		if (IN6_IS_ADDR_LINKLOCAL(in6) ||
513 		    IN6_IS_ADDR_MC_LINKLOCAL(in6) ||
514 		    IN6_IS_ADDR_MC_INTFACELOCAL(in6)) {
515 			/* XXX: override is ok? */
516 			sa6->sin6_scope_id = (u_int32_t)ntohs(*(u_short *)
517 			    &in6->s6_addr[2]);
518 			*(u_short *)&in6->s6_addr[2] = 0;
519 		}
520 		if (flags & RTF_HOST)
521 			cp = routename((struct sockaddr *)sa6);
522 		else
523 			cp = netname((struct sockaddr *)sa6, mask);
524 		break;
525 	    }
526 	default:
527 		if ((flags & RTF_HOST) || mask == NULL)
528 			cp = routename(sa);
529 		else
530 			cp = netname(sa, mask);
531 		break;
532 	}
533 	if (width < 0)
534 		printf("%s", cp);
535 	else {
536 		if (nflag)
537 			printf("%-*s ", width, cp);
538 		else
539 			printf("%-*.*s ", width, width, cp);
540 	}
541 }
542 
543 void
544 p_flags(int f, char *format)
545 {
546 	char name[33], *flags;
547 	const struct bits *p = bits;
548 
549 	for (flags = name; p->b_mask && flags < &name[sizeof(name) - 2]; p++)
550 		if (p->b_mask & f)
551 			*flags++ = p->b_val;
552 	*flags = '\0';
553 	printf(format, name);
554 }
555 
556 static char line[MAXHOSTNAMELEN];
557 static char domain[MAXHOSTNAMELEN];
558 
559 char *
560 routename(struct sockaddr *sa)
561 {
562 	char *cp = NULL;
563 	static int first = 1;
564 
565 	if (first) {
566 		first = 0;
567 		if (gethostname(domain, sizeof(domain)) == 0 &&
568 		    (cp = strchr(domain, '.')))
569 			(void)strlcpy(domain, cp + 1, sizeof(domain));
570 		else
571 			domain[0] = '\0';
572 		cp = NULL;
573 	}
574 
575 	if (sa->sa_len == 0) {
576 		(void)strlcpy(line, "default", sizeof(line));
577 		return (line);
578 	}
579 
580 	switch (sa->sa_family) {
581 	case AF_INET:
582 		return
583 		    (routename4(((struct sockaddr_in *)sa)->sin_addr.s_addr));
584 
585 	case AF_INET6:
586 	    {
587 		struct sockaddr_in6 sin6;
588 
589 		memset(&sin6, 0, sizeof(sin6));
590 		memcpy(&sin6, sa, sa->sa_len);
591 		sin6.sin6_len = sizeof(struct sockaddr_in6);
592 		sin6.sin6_family = AF_INET6;
593 		if (sa->sa_len == sizeof(struct sockaddr_in6) &&
594 		    (IN6_IS_ADDR_LINKLOCAL(&sin6.sin6_addr) ||
595 		     IN6_IS_ADDR_MC_LINKLOCAL(&sin6.sin6_addr) ||
596 		     IN6_IS_ADDR_MC_INTFACELOCAL(&sin6.sin6_addr)) &&
597 		    sin6.sin6_scope_id == 0) {
598 			sin6.sin6_scope_id =
599 			    ntohs(*(u_int16_t *)&sin6.sin6_addr.s6_addr[2]);
600 			sin6.sin6_addr.s6_addr[2] = 0;
601 			sin6.sin6_addr.s6_addr[3] = 0;
602 		}
603 		return (routename6(&sin6));
604 	    }
605 
606 	case AF_LINK:
607 		return (link_print(sa));
608 	case AF_MPLS:
609 		return (label_print(sa));
610 	case AF_UNSPEC:
611 		if (sa->sa_len == sizeof(struct sockaddr_rtlabel)) {
612 			static char name[RTLABEL_LEN];
613 			struct sockaddr_rtlabel *sr;
614 
615 			sr = (struct sockaddr_rtlabel *)sa;
616 			(void)strlcpy(name, sr->sr_label, sizeof(name));
617 			return (name);
618 		}
619 		/* FALLTHROUGH */
620 	default:
621 		(void)snprintf(line, sizeof(line), "(%d) %s",
622 		    sa->sa_family, any_ntoa(sa));
623 		break;
624 	}
625 	return (line);
626 }
627 
628 char *
629 routename4(in_addr_t in)
630 {
631 	char		*cp = NULL;
632 	struct in_addr	 ina;
633 	struct hostent	*hp;
634 
635 	if (in == INADDR_ANY)
636 		cp = "default";
637 	if (!cp && !nflag) {
638 		if ((hp = gethostbyaddr((char *)&in,
639 		    sizeof(in), AF_INET)) != NULL) {
640 			if ((cp = strchr(hp->h_name, '.')) &&
641 			    !strcmp(cp + 1, domain))
642 				*cp = '\0';
643 			cp = hp->h_name;
644 		}
645 	}
646 	ina.s_addr = in;
647 	strlcpy(line, cp ? cp : inet_ntoa(ina), sizeof(line));
648 
649 	return (line);
650 }
651 
652 char *
653 routename6(struct sockaddr_in6 *sin6)
654 {
655 	int	 niflags = 0;
656 
657 	if (nflag)
658 		niflags |= NI_NUMERICHOST;
659 	else
660 		niflags |= NI_NOFQDN;
661 
662 	if (getnameinfo((struct sockaddr *)sin6, sin6->sin6_len,
663 	    line, sizeof(line), NULL, 0, niflags) != 0)
664 		strncpy(line, "invalid", sizeof(line));
665 
666 	return (line);
667 }
668 
669 /*
670  * Return the name of the network whose address is given.
671  * The address is assumed to be that of a net or subnet, not a host.
672  */
673 char *
674 netname4(in_addr_t in, in_addr_t mask)
675 {
676 	char *cp = NULL;
677 	struct netent *np = NULL;
678 	int mbits;
679 
680 	in = ntohl(in);
681 	mask = ntohl(mask);
682 	if (!nflag && in != INADDR_ANY) {
683 		if ((np = getnetbyaddr(in, AF_INET)) != NULL)
684 			cp = np->n_name;
685 	}
686 	if (in == INADDR_ANY)
687 		cp = "default";
688 	mbits = mask ? 33 - ffs(mask) : 0;
689 	if (cp)
690 		strlcpy(line, cp, sizeof(line));
691 #define C(x)	((x) & 0xff)
692 	else if (mbits < 9)
693 		snprintf(line, sizeof(line), "%u/%d", C(in >> 24), mbits);
694 	else if (mbits < 17)
695 		snprintf(line, sizeof(line), "%u.%u/%d",
696 		    C(in >> 24) , C(in >> 16), mbits);
697 	else if (mbits < 25)
698 		snprintf(line, sizeof(line), "%u.%u.%u/%d",
699 		    C(in >> 24), C(in >> 16), C(in >> 8), mbits);
700 	else
701 		snprintf(line, sizeof(line), "%u.%u.%u.%u/%d", C(in >> 24),
702 		    C(in >> 16), C(in >> 8), C(in), mbits);
703 #undef C
704 	return (line);
705 }
706 
707 char *
708 netname6(struct sockaddr_in6 *sa6, struct sockaddr_in6 *mask)
709 {
710 	struct sockaddr_in6 sin6;
711 	u_char *p;
712 	int masklen, final = 0, illegal = 0;
713 	int i, lim, flag, error;
714 	char hbuf[NI_MAXHOST];
715 
716 	sin6 = *sa6;
717 
718 	flag = 0;
719 	masklen = 0;
720 	if (mask) {
721 		lim = mask->sin6_len - offsetof(struct sockaddr_in6, sin6_addr);
722 		lim = lim < (int)sizeof(struct in6_addr) ?
723 		    lim : sizeof(struct in6_addr);
724 		for (p = (u_char *)&mask->sin6_addr, i = 0; i < lim; p++) {
725 			if (final && *p) {
726 				illegal++;
727 				sin6.sin6_addr.s6_addr[i++] = 0x00;
728 				continue;
729 			}
730 
731 			switch (*p & 0xff) {
732 			case 0xff:
733 				masklen += 8;
734 				break;
735 			case 0xfe:
736 				masklen += 7;
737 				final++;
738 				break;
739 			case 0xfc:
740 				masklen += 6;
741 				final++;
742 				break;
743 			case 0xf8:
744 				masklen += 5;
745 				final++;
746 				break;
747 			case 0xf0:
748 				masklen += 4;
749 				final++;
750 				break;
751 			case 0xe0:
752 				masklen += 3;
753 				final++;
754 				break;
755 			case 0xc0:
756 				masklen += 2;
757 				final++;
758 				break;
759 			case 0x80:
760 				masklen += 1;
761 				final++;
762 				break;
763 			case 0x00:
764 				final++;
765 				break;
766 			default:
767 				final++;
768 				illegal++;
769 				break;
770 			}
771 
772 			if (!illegal)
773 				sin6.sin6_addr.s6_addr[i++] &= *p;
774 			else
775 				sin6.sin6_addr.s6_addr[i++] = 0x00;
776 		}
777 		while (i < sizeof(struct in6_addr))
778 			sin6.sin6_addr.s6_addr[i++] = 0x00;
779 	} else
780 		masklen = 128;
781 
782 	if (masklen == 0 && IN6_IS_ADDR_UNSPECIFIED(&sin6.sin6_addr))
783 		return ("default");
784 
785 	if (illegal)
786 		warnx("illegal prefixlen");
787 
788 	if (nflag)
789 		flag |= NI_NUMERICHOST;
790 	error = getnameinfo((struct sockaddr *)&sin6, sin6.sin6_len,
791 	    hbuf, sizeof(hbuf), NULL, 0, flag);
792 	if (error)
793 		snprintf(hbuf, sizeof(hbuf), "invalid");
794 
795 	snprintf(line, sizeof(line), "%s/%d", hbuf, masklen);
796 	return (line);
797 }
798 
799 /*
800  * Return the name of the network whose address is given.
801  * The address is assumed to be that of a net or subnet, not a host.
802  */
803 char *
804 netname(struct sockaddr *sa, struct sockaddr *mask)
805 {
806 	switch (sa->sa_family) {
807 
808 	case AF_INET:
809 		return netname4(((struct sockaddr_in *)sa)->sin_addr.s_addr,
810 		    ((struct sockaddr_in *)mask)->sin_addr.s_addr);
811 	case AF_INET6:
812 		return netname6((struct sockaddr_in6 *)sa,
813 		    (struct sockaddr_in6 *)mask);
814 	case AF_LINK:
815 		return (link_print(sa));
816 	case AF_MPLS:
817 		return (label_print(sa));
818 	default:
819 		snprintf(line, sizeof(line), "af %d: %s",
820 		    sa->sa_family, any_ntoa(sa));
821 		break;
822 	}
823 	return (line);
824 }
825 
826 static const char hexlist[] = "0123456789abcdef";
827 
828 char *
829 any_ntoa(const struct sockaddr *sa)
830 {
831 	static char obuf[240];
832 	const char *in = sa->sa_data;
833 	char *out = obuf;
834 	int len = sa->sa_len - offsetof(struct sockaddr, sa_data);
835 
836 	*out++ = 'Q';
837 	do {
838 		*out++ = hexlist[(*in >> 4) & 15];
839 		*out++ = hexlist[(*in++)    & 15];
840 		*out++ = '.';
841 	} while (--len > 0 && (out + 3) < &obuf[sizeof(obuf) - 1]);
842 	out[-1] = '\0';
843 	return (obuf);
844 }
845 
846 char *
847 link_print(struct sockaddr *sa)
848 {
849 	struct sockaddr_dl	*sdl = (struct sockaddr_dl *)sa;
850 	u_char			*lla = (u_char *)sdl->sdl_data + sdl->sdl_nlen;
851 
852 	if (sdl->sdl_nlen == 0 && sdl->sdl_alen == 0 &&
853 	    sdl->sdl_slen == 0) {
854 		(void)snprintf(line, sizeof(line), "link#%d", sdl->sdl_index);
855 		return (line);
856 	}
857 	switch (sdl->sdl_type) {
858 	case IFT_ETHER:
859 	case IFT_CARP:
860 		return (ether_ntoa((struct ether_addr *)lla));
861 	default:
862 		return (link_ntoa(sdl));
863 	}
864 }
865 
866 char *
867 label_print_op(u_int8_t type)
868 {
869 	switch (type) {
870 	case MPLS_OP_POP:
871 		return ("POP");
872 	case MPLS_OP_SWAP:
873 		return ("SWAP");
874 	case MPLS_OP_PUSH:
875 		return ("PUSH");
876 	default:
877 		return ("?");
878 	}
879 }
880 
881 char *
882 label_print(struct sockaddr *sa)
883 {
884 	struct sockaddr_mpls	*smpls = (struct sockaddr_mpls *)sa;
885 	char			 ifname_in[IF_NAMESIZE];
886 	char			 ifname_out[IF_NAMESIZE];
887 	char			*in_label;
888 	char			*out_label;
889 
890 	if (asprintf(&in_label, "%u%%%s",
891 	    ntohl(smpls->smpls_in_label) >> MPLS_LABEL_OFFSET,
892 	    if_indextoname(smpls->smpls_in_ifindex, ifname_in)) == -1)
893 		err(1, NULL);
894 
895 	if (asprintf(&out_label, "%u",
896 	    ntohl(smpls->smpls_out_label) >> MPLS_LABEL_OFFSET) == -1)
897 		err(1, NULL);
898 
899 	(void)snprintf(line, sizeof(line), "%-16s %-10s %-6s", in_label,
900 	    smpls->smpls_operation == MPLS_OP_POP ? "-" : out_label,
901 	    label_print_op(smpls->smpls_operation));
902 
903 	free(in_label);
904 	free(out_label);
905 
906 	return (line);
907 }
908 
909 void
910 index_pfk(struct sadb_msg *msg, void **headers)
911 {
912 	struct sadb_ext	*ext;
913 
914 	for (ext = (struct sadb_ext *)(msg + 1);
915 	    (size_t)((u_int8_t *)ext - (u_int8_t *)msg) <
916 	    msg->sadb_msg_len * PFKEYV2_CHUNK && ext->sadb_ext_len > 0;
917 	    ext = (struct sadb_ext *)((u_int8_t *)ext +
918 	    ext->sadb_ext_len * PFKEYV2_CHUNK)) {
919 		switch (ext->sadb_ext_type) {
920 		case SADB_EXT_ADDRESS_SRC:
921 			headers[SADB_EXT_ADDRESS_SRC] = (void *)ext;
922 			break;
923 		case SADB_EXT_ADDRESS_DST:
924 			headers[SADB_EXT_ADDRESS_DST] = (void *)ext;
925 			break;
926 		case SADB_X_EXT_PROTOCOL:
927 			headers[SADB_X_EXT_PROTOCOL] = (void *)ext;
928 			break;
929 		case SADB_X_EXT_SRC_FLOW:
930 			headers[SADB_X_EXT_SRC_FLOW] = (void *)ext;
931 			break;
932 		case SADB_X_EXT_DST_FLOW:
933 			headers[SADB_X_EXT_DST_FLOW] = (void *)ext;
934 			break;
935 		case SADB_X_EXT_SRC_MASK:
936 			headers[SADB_X_EXT_SRC_MASK] = (void *)ext;
937 			break;
938 		case SADB_X_EXT_DST_MASK:
939 			headers[SADB_X_EXT_DST_MASK] = (void *)ext;
940 			break;
941 		case SADB_X_EXT_FLOW_TYPE:
942 			headers[SADB_X_EXT_FLOW_TYPE] = (void *)ext;
943 		default:
944 			/* Ignore. */
945 			break;
946 		}
947 	}
948 }
949