1 /* $OpenBSD: show.c,v 1.14 2008/09/15 20:13:10 claudio Exp $ */ 2 /* $NetBSD: show.c,v 1.1 1996/11/15 18:01:41 gwr Exp $ */ 3 4 /* 5 * Copyright (c) 1983, 1988, 1993 6 * The Regents of the University of California. All rights reserved. 7 * 8 * Redistribution and use in source and binary forms, with or without 9 * modification, are permitted provided that the following conditions 10 * are met: 11 * 1. Redistributions of source code must retain the above copyright 12 * notice, this list of conditions and the following disclaimer. 13 * 2. Redistributions in binary form must reproduce the above copyright 14 * notice, this list of conditions and the following disclaimer in the 15 * documentation and/or other materials provided with the distribution. 16 * 3. Neither the name of the University nor the names of its contributors 17 * may be used to endorse or promote products derived from this software 18 * without specific prior written permission. 19 * 20 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 21 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 22 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 23 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 24 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 25 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 26 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 27 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 28 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 29 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 30 * SUCH DAMAGE. 31 */ 32 33 #include <sys/param.h> 34 #include <sys/protosw.h> 35 #include <sys/socket.h> 36 #include <sys/mbuf.h> 37 #include <sys/sysctl.h> 38 39 #include <net/if.h> 40 #include <net/if_dl.h> 41 #include <net/if_types.h> 42 #include <net/pfkeyv2.h> 43 #include <net/route.h> 44 #include <netinet/in.h> 45 #include <netinet/if_ether.h> 46 #include <netinet/ip_ipsp.h> 47 #include <netmpls/mpls.h> 48 #include <arpa/inet.h> 49 50 #include <err.h> 51 #include <errno.h> 52 #include <netdb.h> 53 #include <stdio.h> 54 #include <stddef.h> 55 #include <stdlib.h> 56 #include <string.h> 57 #include <unistd.h> 58 59 #include "netstat.h" 60 61 char *any_ntoa(const struct sockaddr *); 62 char *link_print(struct sockaddr *); 63 char *label_print_op(u_int8_t); 64 char *label_print(struct sockaddr *); 65 66 #define ROUNDUP(a) \ 67 ((a) > 0 ? (1 + (((a) - 1) | (sizeof(long) - 1))) : sizeof(long)) 68 #define ADVANCE(x, n) (x += ROUNDUP((n)->sa_len)) 69 70 #define PFKEYV2_CHUNK sizeof(u_int64_t) 71 72 /* 73 * Definitions for showing gateway flags. 74 */ 75 struct bits { 76 int b_mask; 77 char b_val; 78 }; 79 static const struct bits bits[] = { 80 { RTF_UP, 'U' }, 81 { RTF_GATEWAY, 'G' }, 82 { RTF_HOST, 'H' }, 83 { RTF_REJECT, 'R' }, 84 { RTF_BLACKHOLE, 'B' }, 85 { RTF_DYNAMIC, 'D' }, 86 { RTF_MODIFIED, 'M' }, 87 { RTF_DONE, 'd' }, /* Completed -- for routing messages only */ 88 { RTF_MASK, 'm' }, /* Mask Present -- for routing messages only */ 89 { RTF_CLONING, 'C' }, 90 { RTF_XRESOLVE, 'X' }, 91 { RTF_LLINFO, 'L' }, 92 { RTF_STATIC, 'S' }, 93 { RTF_PROTO1, '1' }, 94 { RTF_PROTO2, '2' }, 95 { RTF_PROTO3, '3' }, 96 { RTF_CLONED, 'c' }, 97 { RTF_JUMBO, 'J' }, 98 { 0 } 99 }; 100 101 void p_rtentry(struct rt_msghdr *); 102 void p_pfkentry(struct sadb_msg *); 103 void pr_family(int); 104 void p_encap(struct sockaddr *, struct sockaddr *, int); 105 void p_protocol(struct sadb_protocol *, struct sockaddr *, struct 106 sadb_protocol *, int); 107 void p_sockaddr(struct sockaddr *, struct sockaddr *, int, int); 108 void p_flags(int, char *); 109 char *routename4(in_addr_t); 110 char *routename6(struct sockaddr_in6 *); 111 void index_pfk(struct sadb_msg *, void **); 112 113 /* 114 * Print routing tables. 115 */ 116 void 117 p_rttables(int af, u_int tableid) 118 { 119 struct rt_msghdr *rtm; 120 struct sadb_msg *msg; 121 char *buf = NULL, *next, *lim = NULL; 122 size_t needed; 123 int mib[7]; 124 struct sockaddr *sa; 125 126 mib[0] = CTL_NET; 127 mib[1] = PF_ROUTE; 128 mib[2] = 0; 129 mib[3] = af; 130 mib[4] = NET_RT_DUMP; 131 mib[5] = 0; 132 mib[6] = tableid; 133 134 if (sysctl(mib, 7, NULL, &needed, NULL, 0) < 0) 135 err(1, "route-sysctl-estimate"); 136 if (needed > 0) { 137 if ((buf = malloc(needed)) == 0) 138 err(1, NULL); 139 if (sysctl(mib, 7, buf, &needed, NULL, 0) < 0) 140 err(1, "sysctl of routing table"); 141 lim = buf + needed; 142 } 143 144 printf("Routing tables\n"); 145 146 if (buf) { 147 for (next = buf; next < lim; next += rtm->rtm_msglen) { 148 rtm = (struct rt_msghdr *)next; 149 if (rtm->rtm_version != RTM_VERSION) 150 continue; 151 sa = (struct sockaddr *)(rtm + 1); 152 if (af != AF_UNSPEC && sa->sa_family != af) 153 continue; 154 p_rtentry(rtm); 155 } 156 free(buf); 157 buf = NULL; 158 } 159 160 if (af != 0 && af != PF_KEY) 161 return; 162 163 mib[0] = CTL_NET; 164 mib[1] = PF_KEY; 165 mib[2] = PF_KEY_V2; 166 mib[3] = NET_KEY_SPD_DUMP; 167 mib[4] = mib[5] = 0; 168 169 if (sysctl(mib, 4, NULL, &needed, NULL, 0) == -1) { 170 if (errno == ENOPROTOOPT) 171 return; 172 err(1, "spd-sysctl-estimate"); 173 } 174 if (needed > 0) { 175 if ((buf = malloc(needed)) == 0) 176 err(1, NULL); 177 if (sysctl(mib, 4, buf, &needed, NULL, 0) == -1) 178 err(1,"sysctl of spd"); 179 lim = buf + needed; 180 } 181 182 if (buf) { 183 printf("\nEncap:\n"); 184 185 for (next = buf; next < lim; next += msg->sadb_msg_len * 186 PFKEYV2_CHUNK) { 187 msg = (struct sadb_msg *)next; 188 if (msg->sadb_msg_len == 0) 189 break; 190 p_pfkentry(msg); 191 } 192 free(buf); 193 buf = NULL; 194 } 195 } 196 197 /* 198 * column widths; each followed by one space 199 * width of destination/gateway column 200 * strlen("fe80::aaaa:bbbb:cccc:dddd@gif0") == 30, strlen("/128") == 4 201 */ 202 #define WID_GW(af) ((af) == AF_INET6 ? (nflag ? 30 : 18) : 18) 203 204 int 205 WID_DST(int af) 206 { 207 208 if (nflag) 209 switch (af) { 210 case AF_MPLS: 211 return 34; 212 case AF_INET6: 213 return 34; 214 default: 215 return 18; 216 } 217 else 218 switch (af) { 219 case AF_MPLS: 220 return 34; 221 default: 222 return 18; 223 } 224 } 225 226 /* 227 * Print header for routing table columns. 228 */ 229 void 230 pr_rthdr(int af, int Aflag) 231 { 232 if (Aflag) 233 printf("%-*.*s ", PLEN, PLEN, "Address"); 234 switch (af) { 235 case PF_KEY: 236 printf("%-18s %-5s %-18s %-5s %-5s %-22s\n", 237 "Source", "Port", "Destination", 238 "Port", "Proto", "SA(Address/Proto/Type/Direction)"); 239 break; 240 case PF_MPLS: 241 printf("%-16s %-10s %-6s %-18s %-6.6s %5.5s %8.8s %5.5s %4.4s %s\n", 242 "In label", "Out label", "Op", "Gateway", 243 "Flags", "Refs", "Use", "Mtu", "Prio", "Interface"); 244 break; 245 default: 246 printf("%-*.*s %-*.*s %-6.6s %5.5s %8.8s %5.5s %4.4s %s\n", 247 WID_DST(af), WID_DST(af), "Destination", 248 WID_GW(af), WID_GW(af), "Gateway", 249 "Flags", "Refs", "Use", "Mtu", "Prio", "Iface"); 250 break; 251 } 252 } 253 254 static void 255 get_rtaddrs(int addrs, struct sockaddr *sa, struct sockaddr **rti_info) 256 { 257 int i; 258 259 for (i = 0; i < RTAX_MAX; i++) { 260 if (addrs & (1 << i)) { 261 rti_info[i] = sa; 262 sa = (struct sockaddr *)((char *)(sa) + 263 ROUNDUP(sa->sa_len)); 264 } else 265 rti_info[i] = NULL; 266 } 267 } 268 269 /* 270 * Print a routing table entry. 271 */ 272 void 273 p_rtentry(struct rt_msghdr *rtm) 274 { 275 static int old_af = -1; 276 struct sockaddr *sa = (struct sockaddr *)(rtm + 1); 277 struct sockaddr *mask, *rti_info[RTAX_MAX]; 278 char ifbuf[IF_NAMESIZE]; 279 280 if (sa->sa_family == AF_KEY) 281 return; 282 283 get_rtaddrs(rtm->rtm_addrs, sa, rti_info); 284 if (Fflag && rti_info[RTAX_GATEWAY]->sa_family != sa->sa_family) { 285 return; 286 } 287 if (old_af != sa->sa_family) { 288 old_af = sa->sa_family; 289 pr_family(sa->sa_family); 290 pr_rthdr(sa->sa_family, 0); 291 } 292 293 mask = rti_info[RTAX_NETMASK]; 294 if ((sa = rti_info[RTAX_DST]) == NULL) 295 return; 296 297 p_sockaddr(sa, mask, rtm->rtm_flags, WID_DST(sa->sa_family)); 298 p_sockaddr(rti_info[RTAX_GATEWAY], NULL, RTF_HOST, 299 WID_GW(sa->sa_family)); 300 p_flags(rtm->rtm_flags, "%-6.6s "); 301 printf("%5u %8llu ", rtm->rtm_rmx.rmx_refcnt, 302 rtm->rtm_rmx.rmx_pksent); 303 if (rtm->rtm_rmx.rmx_mtu) 304 printf("%5u ", rtm->rtm_rmx.rmx_mtu); 305 else 306 printf("%5s ", "-"); 307 putchar((rtm->rtm_rmx.rmx_locks & RTV_MTU) ? 'L' : ' '); 308 printf(" %2d %.16s", rtm->rtm_priority & RTP_MASK, 309 if_indextoname(rtm->rtm_index, ifbuf)); 310 putchar('\n'); 311 } 312 313 /* 314 * Print a pfkey/encap entry. 315 */ 316 void 317 p_pfkentry(struct sadb_msg *msg) 318 { 319 static int old = 0; 320 struct sadb_address *saddr; 321 struct sadb_protocol *sap, *saft; 322 struct sockaddr *sa, *mask; 323 void *headers[SADB_EXT_MAX + 1]; 324 325 if (!old) { 326 pr_rthdr(PF_KEY, 0); 327 old++; 328 } 329 330 bzero(headers, sizeof(headers)); 331 index_pfk(msg, headers); 332 333 /* These are always set */ 334 saddr = headers[SADB_X_EXT_SRC_FLOW]; 335 sa = (struct sockaddr *)(saddr + 1); 336 saddr = headers[SADB_X_EXT_SRC_MASK]; 337 mask = (struct sockaddr *)(saddr + 1); 338 p_encap(sa, mask, WID_DST(sa->sa_family)); 339 340 /* These are always set, too. */ 341 saddr = headers[SADB_X_EXT_DST_FLOW]; 342 sa = (struct sockaddr *)(saddr + 1); 343 saddr = headers[SADB_X_EXT_DST_MASK]; 344 mask = (struct sockaddr *)(saddr + 1); 345 p_encap(sa, mask, WID_DST(sa->sa_family)); 346 347 /* Bypass and deny flows do not set SADB_EXT_ADDRESS_DST! */ 348 sap = headers[SADB_X_EXT_PROTOCOL]; 349 saft = headers[SADB_X_EXT_FLOW_TYPE]; 350 saddr = headers[SADB_EXT_ADDRESS_DST]; 351 if (saddr) 352 sa = (struct sockaddr *)(saddr + 1); 353 else 354 sa = NULL; 355 p_protocol(sap, sa, saft, msg->sadb_msg_satype); 356 357 printf("\n"); 358 } 359 360 /* 361 * Print address family header before a section of the routing table. 362 */ 363 void 364 pr_family(int af) 365 { 366 char *afname; 367 368 switch (af) { 369 case AF_INET: 370 afname = "Internet"; 371 break; 372 case AF_INET6: 373 afname = "Internet6"; 374 break; 375 case PF_KEY: 376 afname = "Encap"; 377 break; 378 case AF_MPLS: 379 afname = "MPLS"; 380 break; 381 case AF_APPLETALK: 382 afname = "AppleTalk"; 383 break; 384 default: 385 afname = NULL; 386 break; 387 } 388 if (afname) 389 printf("\n%s:\n", afname); 390 else 391 printf("\nProtocol Family %d:\n", af); 392 } 393 394 void 395 p_addr(struct sockaddr *sa, struct sockaddr *mask, int flags) 396 { 397 p_sockaddr(sa, mask, flags, WID_DST(sa->sa_family)); 398 } 399 400 void 401 p_gwaddr(struct sockaddr *sa, int af) 402 { 403 p_sockaddr(sa, 0, RTF_HOST, WID_GW(af)); 404 } 405 406 void 407 p_encap(struct sockaddr *sa, struct sockaddr *mask, int width) 408 { 409 char *cp; 410 unsigned short port = 0; 411 412 if (mask) 413 cp = netname(sa, mask); 414 else 415 cp = routename(sa); 416 switch (sa->sa_family) { 417 case AF_INET: 418 port = ntohs(((struct sockaddr_in *)sa)->sin_port); 419 break; 420 case AF_INET6: 421 port = ntohs(((struct sockaddr_in6 *)sa)->sin6_port); 422 break; 423 } 424 if (width < 0) 425 printf("%s", cp); 426 else { 427 if (nflag) 428 printf("%-*s %-5u ", width, cp, port); 429 else 430 printf("%-*.*s %-5u ", width, width, cp, port); 431 } 432 } 433 434 void 435 p_protocol(struct sadb_protocol *sap, struct sockaddr *sa, struct sadb_protocol 436 *saft, int proto) 437 { 438 printf("%-6u", sap->sadb_protocol_proto); 439 440 if (sa) 441 p_sockaddr(sa, NULL, 0, -1); 442 else 443 printf("none"); 444 445 switch (proto) { 446 case SADB_SATYPE_ESP: 447 printf("/esp"); 448 break; 449 case SADB_SATYPE_AH: 450 printf("/ah"); 451 break; 452 case SADB_X_SATYPE_IPCOMP: 453 printf("/ipcomp"); 454 break; 455 case SADB_X_SATYPE_IPIP: 456 printf("/ipip"); 457 break; 458 default: 459 printf("/<unknown>"); 460 } 461 462 switch(saft->sadb_protocol_proto) { 463 case SADB_X_FLOW_TYPE_USE: 464 printf("/use"); 465 break; 466 case SADB_X_FLOW_TYPE_REQUIRE: 467 printf("/require"); 468 break; 469 case SADB_X_FLOW_TYPE_ACQUIRE: 470 printf("/acquire"); 471 break; 472 case SADB_X_FLOW_TYPE_DENY: 473 printf("/deny"); 474 break; 475 case SADB_X_FLOW_TYPE_BYPASS: 476 printf("/bypass"); 477 break; 478 case SADB_X_FLOW_TYPE_DONTACQ: 479 printf("/dontacq"); 480 break; 481 default: 482 printf("/<unknown type>"); 483 } 484 485 switch(saft->sadb_protocol_direction) { 486 case IPSP_DIRECTION_IN: 487 printf("/in"); 488 break; 489 case IPSP_DIRECTION_OUT: 490 printf("/out"); 491 break; 492 default: 493 printf("/<unknown>"); 494 } 495 } 496 497 void 498 p_sockaddr(struct sockaddr *sa, struct sockaddr *mask, int flags, int width) 499 { 500 char *cp; 501 502 switch (sa->sa_family) { 503 case AF_INET6: 504 { 505 struct sockaddr_in6 *sa6 = (struct sockaddr_in6 *)sa; 506 struct in6_addr *in6 = &sa6->sin6_addr; 507 508 /* 509 * XXX: This is a special workaround for KAME kernels. 510 * sin6_scope_id field of SA should be set in the future. 511 */ 512 if (IN6_IS_ADDR_LINKLOCAL(in6) || 513 IN6_IS_ADDR_MC_LINKLOCAL(in6) || 514 IN6_IS_ADDR_MC_INTFACELOCAL(in6)) { 515 /* XXX: override is ok? */ 516 sa6->sin6_scope_id = (u_int32_t)ntohs(*(u_short *) 517 &in6->s6_addr[2]); 518 *(u_short *)&in6->s6_addr[2] = 0; 519 } 520 if (flags & RTF_HOST) 521 cp = routename((struct sockaddr *)sa6); 522 else 523 cp = netname((struct sockaddr *)sa6, mask); 524 break; 525 } 526 default: 527 if ((flags & RTF_HOST) || mask == NULL) 528 cp = routename(sa); 529 else 530 cp = netname(sa, mask); 531 break; 532 } 533 if (width < 0) 534 printf("%s", cp); 535 else { 536 if (nflag) 537 printf("%-*s ", width, cp); 538 else 539 printf("%-*.*s ", width, width, cp); 540 } 541 } 542 543 void 544 p_flags(int f, char *format) 545 { 546 char name[33], *flags; 547 const struct bits *p = bits; 548 549 for (flags = name; p->b_mask && flags < &name[sizeof(name) - 2]; p++) 550 if (p->b_mask & f) 551 *flags++ = p->b_val; 552 *flags = '\0'; 553 printf(format, name); 554 } 555 556 static char line[MAXHOSTNAMELEN]; 557 static char domain[MAXHOSTNAMELEN]; 558 559 char * 560 routename(struct sockaddr *sa) 561 { 562 char *cp = NULL; 563 static int first = 1; 564 565 if (first) { 566 first = 0; 567 if (gethostname(domain, sizeof(domain)) == 0 && 568 (cp = strchr(domain, '.'))) 569 (void)strlcpy(domain, cp + 1, sizeof(domain)); 570 else 571 domain[0] = '\0'; 572 cp = NULL; 573 } 574 575 if (sa->sa_len == 0) { 576 (void)strlcpy(line, "default", sizeof(line)); 577 return (line); 578 } 579 580 switch (sa->sa_family) { 581 case AF_INET: 582 return 583 (routename4(((struct sockaddr_in *)sa)->sin_addr.s_addr)); 584 585 case AF_INET6: 586 { 587 struct sockaddr_in6 sin6; 588 589 memset(&sin6, 0, sizeof(sin6)); 590 memcpy(&sin6, sa, sa->sa_len); 591 sin6.sin6_len = sizeof(struct sockaddr_in6); 592 sin6.sin6_family = AF_INET6; 593 if (sa->sa_len == sizeof(struct sockaddr_in6) && 594 (IN6_IS_ADDR_LINKLOCAL(&sin6.sin6_addr) || 595 IN6_IS_ADDR_MC_LINKLOCAL(&sin6.sin6_addr) || 596 IN6_IS_ADDR_MC_INTFACELOCAL(&sin6.sin6_addr)) && 597 sin6.sin6_scope_id == 0) { 598 sin6.sin6_scope_id = 599 ntohs(*(u_int16_t *)&sin6.sin6_addr.s6_addr[2]); 600 sin6.sin6_addr.s6_addr[2] = 0; 601 sin6.sin6_addr.s6_addr[3] = 0; 602 } 603 return (routename6(&sin6)); 604 } 605 606 case AF_LINK: 607 return (link_print(sa)); 608 case AF_MPLS: 609 return (label_print(sa)); 610 case AF_UNSPEC: 611 if (sa->sa_len == sizeof(struct sockaddr_rtlabel)) { 612 static char name[RTLABEL_LEN]; 613 struct sockaddr_rtlabel *sr; 614 615 sr = (struct sockaddr_rtlabel *)sa; 616 (void)strlcpy(name, sr->sr_label, sizeof(name)); 617 return (name); 618 } 619 /* FALLTHROUGH */ 620 default: 621 (void)snprintf(line, sizeof(line), "(%d) %s", 622 sa->sa_family, any_ntoa(sa)); 623 break; 624 } 625 return (line); 626 } 627 628 char * 629 routename4(in_addr_t in) 630 { 631 char *cp = NULL; 632 struct in_addr ina; 633 struct hostent *hp; 634 635 if (in == INADDR_ANY) 636 cp = "default"; 637 if (!cp && !nflag) { 638 if ((hp = gethostbyaddr((char *)&in, 639 sizeof(in), AF_INET)) != NULL) { 640 if ((cp = strchr(hp->h_name, '.')) && 641 !strcmp(cp + 1, domain)) 642 *cp = '\0'; 643 cp = hp->h_name; 644 } 645 } 646 ina.s_addr = in; 647 strlcpy(line, cp ? cp : inet_ntoa(ina), sizeof(line)); 648 649 return (line); 650 } 651 652 char * 653 routename6(struct sockaddr_in6 *sin6) 654 { 655 int niflags = 0; 656 657 if (nflag) 658 niflags |= NI_NUMERICHOST; 659 else 660 niflags |= NI_NOFQDN; 661 662 if (getnameinfo((struct sockaddr *)sin6, sin6->sin6_len, 663 line, sizeof(line), NULL, 0, niflags) != 0) 664 strncpy(line, "invalid", sizeof(line)); 665 666 return (line); 667 } 668 669 /* 670 * Return the name of the network whose address is given. 671 * The address is assumed to be that of a net or subnet, not a host. 672 */ 673 char * 674 netname4(in_addr_t in, in_addr_t mask) 675 { 676 char *cp = NULL; 677 struct netent *np = NULL; 678 int mbits; 679 680 in = ntohl(in); 681 mask = ntohl(mask); 682 if (!nflag && in != INADDR_ANY) { 683 if ((np = getnetbyaddr(in, AF_INET)) != NULL) 684 cp = np->n_name; 685 } 686 if (in == INADDR_ANY) 687 cp = "default"; 688 mbits = mask ? 33 - ffs(mask) : 0; 689 if (cp) 690 strlcpy(line, cp, sizeof(line)); 691 #define C(x) ((x) & 0xff) 692 else if (mbits < 9) 693 snprintf(line, sizeof(line), "%u/%d", C(in >> 24), mbits); 694 else if (mbits < 17) 695 snprintf(line, sizeof(line), "%u.%u/%d", 696 C(in >> 24) , C(in >> 16), mbits); 697 else if (mbits < 25) 698 snprintf(line, sizeof(line), "%u.%u.%u/%d", 699 C(in >> 24), C(in >> 16), C(in >> 8), mbits); 700 else 701 snprintf(line, sizeof(line), "%u.%u.%u.%u/%d", C(in >> 24), 702 C(in >> 16), C(in >> 8), C(in), mbits); 703 #undef C 704 return (line); 705 } 706 707 char * 708 netname6(struct sockaddr_in6 *sa6, struct sockaddr_in6 *mask) 709 { 710 struct sockaddr_in6 sin6; 711 u_char *p; 712 int masklen, final = 0, illegal = 0; 713 int i, lim, flag, error; 714 char hbuf[NI_MAXHOST]; 715 716 sin6 = *sa6; 717 718 flag = 0; 719 masklen = 0; 720 if (mask) { 721 lim = mask->sin6_len - offsetof(struct sockaddr_in6, sin6_addr); 722 lim = lim < (int)sizeof(struct in6_addr) ? 723 lim : sizeof(struct in6_addr); 724 for (p = (u_char *)&mask->sin6_addr, i = 0; i < lim; p++) { 725 if (final && *p) { 726 illegal++; 727 sin6.sin6_addr.s6_addr[i++] = 0x00; 728 continue; 729 } 730 731 switch (*p & 0xff) { 732 case 0xff: 733 masklen += 8; 734 break; 735 case 0xfe: 736 masklen += 7; 737 final++; 738 break; 739 case 0xfc: 740 masklen += 6; 741 final++; 742 break; 743 case 0xf8: 744 masklen += 5; 745 final++; 746 break; 747 case 0xf0: 748 masklen += 4; 749 final++; 750 break; 751 case 0xe0: 752 masklen += 3; 753 final++; 754 break; 755 case 0xc0: 756 masklen += 2; 757 final++; 758 break; 759 case 0x80: 760 masklen += 1; 761 final++; 762 break; 763 case 0x00: 764 final++; 765 break; 766 default: 767 final++; 768 illegal++; 769 break; 770 } 771 772 if (!illegal) 773 sin6.sin6_addr.s6_addr[i++] &= *p; 774 else 775 sin6.sin6_addr.s6_addr[i++] = 0x00; 776 } 777 while (i < sizeof(struct in6_addr)) 778 sin6.sin6_addr.s6_addr[i++] = 0x00; 779 } else 780 masklen = 128; 781 782 if (masklen == 0 && IN6_IS_ADDR_UNSPECIFIED(&sin6.sin6_addr)) 783 return ("default"); 784 785 if (illegal) 786 warnx("illegal prefixlen"); 787 788 if (nflag) 789 flag |= NI_NUMERICHOST; 790 error = getnameinfo((struct sockaddr *)&sin6, sin6.sin6_len, 791 hbuf, sizeof(hbuf), NULL, 0, flag); 792 if (error) 793 snprintf(hbuf, sizeof(hbuf), "invalid"); 794 795 snprintf(line, sizeof(line), "%s/%d", hbuf, masklen); 796 return (line); 797 } 798 799 /* 800 * Return the name of the network whose address is given. 801 * The address is assumed to be that of a net or subnet, not a host. 802 */ 803 char * 804 netname(struct sockaddr *sa, struct sockaddr *mask) 805 { 806 switch (sa->sa_family) { 807 808 case AF_INET: 809 return netname4(((struct sockaddr_in *)sa)->sin_addr.s_addr, 810 ((struct sockaddr_in *)mask)->sin_addr.s_addr); 811 case AF_INET6: 812 return netname6((struct sockaddr_in6 *)sa, 813 (struct sockaddr_in6 *)mask); 814 case AF_LINK: 815 return (link_print(sa)); 816 case AF_MPLS: 817 return (label_print(sa)); 818 default: 819 snprintf(line, sizeof(line), "af %d: %s", 820 sa->sa_family, any_ntoa(sa)); 821 break; 822 } 823 return (line); 824 } 825 826 static const char hexlist[] = "0123456789abcdef"; 827 828 char * 829 any_ntoa(const struct sockaddr *sa) 830 { 831 static char obuf[240]; 832 const char *in = sa->sa_data; 833 char *out = obuf; 834 int len = sa->sa_len - offsetof(struct sockaddr, sa_data); 835 836 *out++ = 'Q'; 837 do { 838 *out++ = hexlist[(*in >> 4) & 15]; 839 *out++ = hexlist[(*in++) & 15]; 840 *out++ = '.'; 841 } while (--len > 0 && (out + 3) < &obuf[sizeof(obuf) - 1]); 842 out[-1] = '\0'; 843 return (obuf); 844 } 845 846 char * 847 link_print(struct sockaddr *sa) 848 { 849 struct sockaddr_dl *sdl = (struct sockaddr_dl *)sa; 850 u_char *lla = (u_char *)sdl->sdl_data + sdl->sdl_nlen; 851 852 if (sdl->sdl_nlen == 0 && sdl->sdl_alen == 0 && 853 sdl->sdl_slen == 0) { 854 (void)snprintf(line, sizeof(line), "link#%d", sdl->sdl_index); 855 return (line); 856 } 857 switch (sdl->sdl_type) { 858 case IFT_ETHER: 859 case IFT_CARP: 860 return (ether_ntoa((struct ether_addr *)lla)); 861 default: 862 return (link_ntoa(sdl)); 863 } 864 } 865 866 char * 867 label_print_op(u_int8_t type) 868 { 869 switch (type) { 870 case MPLS_OP_POP: 871 return ("POP"); 872 case MPLS_OP_SWAP: 873 return ("SWAP"); 874 case MPLS_OP_PUSH: 875 return ("PUSH"); 876 default: 877 return ("?"); 878 } 879 } 880 881 char * 882 label_print(struct sockaddr *sa) 883 { 884 struct sockaddr_mpls *smpls = (struct sockaddr_mpls *)sa; 885 char ifname_in[IF_NAMESIZE]; 886 char ifname_out[IF_NAMESIZE]; 887 char *in_label; 888 char *out_label; 889 890 if (asprintf(&in_label, "%u%%%s", 891 ntohl(smpls->smpls_in_label) >> MPLS_LABEL_OFFSET, 892 if_indextoname(smpls->smpls_in_ifindex, ifname_in)) == -1) 893 err(1, NULL); 894 895 if (asprintf(&out_label, "%u", 896 ntohl(smpls->smpls_out_label) >> MPLS_LABEL_OFFSET) == -1) 897 err(1, NULL); 898 899 (void)snprintf(line, sizeof(line), "%-16s %-10s %-6s", in_label, 900 smpls->smpls_operation == MPLS_OP_POP ? "-" : out_label, 901 label_print_op(smpls->smpls_operation)); 902 903 free(in_label); 904 free(out_label); 905 906 return (line); 907 } 908 909 void 910 index_pfk(struct sadb_msg *msg, void **headers) 911 { 912 struct sadb_ext *ext; 913 914 for (ext = (struct sadb_ext *)(msg + 1); 915 (size_t)((u_int8_t *)ext - (u_int8_t *)msg) < 916 msg->sadb_msg_len * PFKEYV2_CHUNK && ext->sadb_ext_len > 0; 917 ext = (struct sadb_ext *)((u_int8_t *)ext + 918 ext->sadb_ext_len * PFKEYV2_CHUNK)) { 919 switch (ext->sadb_ext_type) { 920 case SADB_EXT_ADDRESS_SRC: 921 headers[SADB_EXT_ADDRESS_SRC] = (void *)ext; 922 break; 923 case SADB_EXT_ADDRESS_DST: 924 headers[SADB_EXT_ADDRESS_DST] = (void *)ext; 925 break; 926 case SADB_X_EXT_PROTOCOL: 927 headers[SADB_X_EXT_PROTOCOL] = (void *)ext; 928 break; 929 case SADB_X_EXT_SRC_FLOW: 930 headers[SADB_X_EXT_SRC_FLOW] = (void *)ext; 931 break; 932 case SADB_X_EXT_DST_FLOW: 933 headers[SADB_X_EXT_DST_FLOW] = (void *)ext; 934 break; 935 case SADB_X_EXT_SRC_MASK: 936 headers[SADB_X_EXT_SRC_MASK] = (void *)ext; 937 break; 938 case SADB_X_EXT_DST_MASK: 939 headers[SADB_X_EXT_DST_MASK] = (void *)ext; 940 break; 941 case SADB_X_EXT_FLOW_TYPE: 942 headers[SADB_X_EXT_FLOW_TYPE] = (void *)ext; 943 default: 944 /* Ignore. */ 945 break; 946 } 947 } 948 } 949