xref: /openbsd-src/usr.bin/netstat/show.c (revision a28daedfc357b214be5c701aa8ba8adb29a7f1c2)
1 /*	$OpenBSD: show.c,v 1.21 2009/04/28 12:09:36 michele Exp $	*/
2 /*	$NetBSD: show.c,v 1.1 1996/11/15 18:01:41 gwr Exp $	*/
3 
4 /*
5  * Copyright (c) 1983, 1988, 1993
6  *	The Regents of the University of California.  All rights reserved.
7  *
8  * Redistribution and use in source and binary forms, with or without
9  * modification, are permitted provided that the following conditions
10  * are met:
11  * 1. Redistributions of source code must retain the above copyright
12  *    notice, this list of conditions and the following disclaimer.
13  * 2. Redistributions in binary form must reproduce the above copyright
14  *    notice, this list of conditions and the following disclaimer in the
15  *    documentation and/or other materials provided with the distribution.
16  * 3. Neither the name of the University nor the names of its contributors
17  *    may be used to endorse or promote products derived from this software
18  *    without specific prior written permission.
19  *
20  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
21  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
22  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
24  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
25  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
30  * SUCH DAMAGE.
31  */
32 
33 #include <sys/param.h>
34 #include <sys/protosw.h>
35 #include <sys/socket.h>
36 #include <sys/mbuf.h>
37 #include <sys/sysctl.h>
38 
39 #include <net/if.h>
40 #include <net/if_dl.h>
41 #include <net/if_types.h>
42 #include <net/pfkeyv2.h>
43 #include <net/route.h>
44 #include <netinet/in.h>
45 #include <netinet/if_ether.h>
46 #include <netinet/ip_ipsp.h>
47 #include <netmpls/mpls.h>
48 #include <arpa/inet.h>
49 
50 #include <err.h>
51 #include <errno.h>
52 #include <netdb.h>
53 #include <stdio.h>
54 #include <stddef.h>
55 #include <stdlib.h>
56 #include <string.h>
57 #include <unistd.h>
58 
59 #include "netstat.h"
60 
61 char	*any_ntoa(const struct sockaddr *);
62 char	*link_print(struct sockaddr *);
63 char	*label_print_op(u_int32_t);
64 char	*label_print(struct sockaddr *, struct sockaddr *);
65 
66 #define ROUNDUP(a) \
67 	((a) > 0 ? (1 + (((a) - 1) | (sizeof(long) - 1))) : sizeof(long))
68 #define ADVANCE(x, n) (x += ROUNDUP((n)->sa_len))
69 
70 #define PFKEYV2_CHUNK sizeof(u_int64_t)
71 
72 /*
73  * Definitions for showing gateway flags.
74  */
75 struct bits {
76 	int	b_mask;
77 	char	b_val;
78 };
79 static const struct bits bits[] = {
80 	{ RTF_UP,	'U' },
81 	{ RTF_GATEWAY,	'G' },
82 	{ RTF_HOST,	'H' },
83 	{ RTF_REJECT,	'R' },
84 	{ RTF_BLACKHOLE, 'B' },
85 	{ RTF_DYNAMIC,	'D' },
86 	{ RTF_MODIFIED,	'M' },
87 	{ RTF_DONE,	'd' }, /* Completed -- for routing messages only */
88 	{ RTF_MASK,	'm' }, /* Mask Present -- for routing messages only */
89 	{ RTF_CLONING,	'C' },
90 	{ RTF_XRESOLVE,	'X' },
91 	{ RTF_LLINFO,	'L' },
92 	{ RTF_STATIC,	'S' },
93 	{ RTF_PROTO1,	'1' },
94 	{ RTF_PROTO2,	'2' },
95 	{ RTF_PROTO3,	'3' },
96 	{ RTF_CLONED,	'c' },
97 	{ RTF_JUMBO,	'J' },
98 	{ RTF_MPATH,	'P' },
99 	{ 0 }
100 };
101 
102 void	 p_rtentry(struct rt_msghdr *);
103 void	 p_pfkentry(struct sadb_msg *);
104 void	 pr_family(int);
105 void	 p_encap(struct sockaddr *, struct sockaddr *, int);
106 void	 p_protocol(struct sadb_protocol *, struct sockaddr *, struct
107 	     sadb_protocol *, int);
108 void	 p_sockaddr(struct sockaddr *, struct sockaddr *, int, int);
109 void	 p_sockaddr_mpls(struct sockaddr *, struct sockaddr *, int, int);
110 void	 p_flags(int, char *);
111 char	*routename4(in_addr_t);
112 char	*routename6(struct sockaddr_in6 *);
113 void	 index_pfk(struct sadb_msg *, void **);
114 
115 /*
116  * Print routing tables.
117  */
118 void
119 p_rttables(int af, u_int tableid)
120 {
121 	struct rt_msghdr *rtm;
122 	struct sadb_msg *msg;
123 	char *buf = NULL, *next, *lim = NULL;
124 	size_t needed;
125 	int mib[7];
126 	struct sockaddr *sa;
127 
128 	mib[0] = CTL_NET;
129 	mib[1] = PF_ROUTE;
130 	mib[2] = 0;
131 	mib[3] = af;
132 	mib[4] = NET_RT_DUMP;
133 	mib[5] = 0;
134 	mib[6] = tableid;
135 
136 	if (sysctl(mib, 7, NULL, &needed, NULL, 0) < 0)
137 		err(1, "route-sysctl-estimate");
138 	if (needed > 0) {
139 		if ((buf = malloc(needed)) == 0)
140 			err(1, NULL);
141 		if (sysctl(mib, 7, buf, &needed, NULL, 0) < 0)
142 			err(1, "sysctl of routing table");
143 		lim = buf + needed;
144 	}
145 
146 	printf("Routing tables\n");
147 
148 	if (buf) {
149 		for (next = buf; next < lim; next += rtm->rtm_msglen) {
150 			rtm = (struct rt_msghdr *)next;
151 			if (rtm->rtm_version != RTM_VERSION)
152 				continue;
153 			sa = (struct sockaddr *)(rtm + 1);
154 			if (af != AF_UNSPEC && sa->sa_family != af)
155 				continue;
156 			p_rtentry(rtm);
157 		}
158 		free(buf);
159 		buf = NULL;
160 	}
161 
162 	if (af != 0 && af != PF_KEY)
163 		return;
164 
165 	mib[0] = CTL_NET;
166 	mib[1] = PF_KEY;
167 	mib[2] = PF_KEY_V2;
168 	mib[3] = NET_KEY_SPD_DUMP;
169 	mib[4] = mib[5] = 0;
170 
171 	if (sysctl(mib, 4, NULL, &needed, NULL, 0) == -1) {
172 		if (errno == ENOPROTOOPT)
173 			return;
174 		err(1, "spd-sysctl-estimate");
175 	}
176 	if (needed > 0) {
177 		if ((buf = malloc(needed)) == 0)
178 			err(1, NULL);
179 		if (sysctl(mib, 4, buf, &needed, NULL, 0) == -1)
180 			err(1,"sysctl of spd");
181 		lim = buf + needed;
182 	}
183 
184 	if (buf) {
185 		printf("\nEncap:\n");
186 
187 		for (next = buf; next < lim; next += msg->sadb_msg_len *
188 		    PFKEYV2_CHUNK) {
189 			msg = (struct sadb_msg *)next;
190 			if (msg->sadb_msg_len == 0)
191 				break;
192 			p_pfkentry(msg);
193 		}
194 		free(buf);
195 		buf = NULL;
196 	}
197 }
198 
199 /*
200  * column widths; each followed by one space
201  * width of destination/gateway column
202  * strlen("fe80::aaaa:bbbb:cccc:dddd@gif0") == 30, strlen("/128") == 4
203  */
204 #define	WID_GW(af)	((af) == AF_INET6 ? (nflag ? 30 : 18) : 18)
205 
206 int
207 WID_DST(int af)
208 {
209 
210 	if (nflag)
211 		switch (af) {
212 		case AF_MPLS:
213 			return 34;
214 		case AF_INET6:
215 			return 34;
216 		default:
217 			return 18;
218 		}
219 	else
220 		switch (af) {
221 		case AF_MPLS:
222 			return 34;
223  		default:
224 			return 18;
225 		}
226 }
227 
228 /*
229  * Print header for routing table columns.
230  */
231 void
232 pr_rthdr(int af, int Aflag)
233 {
234 	if (Aflag)
235 		printf("%-*.*s ", PLEN, PLEN, "Address");
236 	switch (af) {
237 	case PF_KEY:
238 		printf("%-18s %-5s %-18s %-5s %-5s %-22s\n",
239 		    "Source", "Port", "Destination",
240 		    "Port", "Proto", "SA(Address/Proto/Type/Direction)");
241 		break;
242 	case PF_MPLS:
243 		printf("%-16s %-10s %-6s %-18s %-6.6s %5.5s %8.8s %5.5s  %4.4s %s\n",
244 		    "In label", "Out label", "Op", "Gateway",
245 		    "Flags", "Refs", "Use", "Mtu", "Prio", "Interface");
246 		break;
247 	default:
248 		printf("%-*.*s %-*.*s %-6.6s %5.5s %8.8s %5.5s  %4.4s %s\n",
249 		    WID_DST(af), WID_DST(af), "Destination",
250 		    WID_GW(af), WID_GW(af), "Gateway",
251 		    "Flags", "Refs", "Use", "Mtu", "Prio", "Iface");
252 		break;
253 	}
254 }
255 
256 static void
257 get_rtaddrs(int addrs, struct sockaddr *sa, struct sockaddr **rti_info)
258 {
259 	int	i;
260 
261 	for (i = 0; i < RTAX_MAX; i++) {
262 		if (addrs & (1 << i)) {
263 			rti_info[i] = sa;
264 			sa = (struct sockaddr *)((char *)(sa) +
265 			    ROUNDUP(sa->sa_len));
266 		} else
267 			rti_info[i] = NULL;
268 	}
269 }
270 
271 /*
272  * Print a routing table entry.
273  */
274 void
275 p_rtentry(struct rt_msghdr *rtm)
276 {
277 	static int	 old_af = -1;
278 	struct sockaddr	*sa = (struct sockaddr *)(rtm + 1);
279 	struct sockaddr	*mask, *rti_info[RTAX_MAX];
280 	char		 ifbuf[IF_NAMESIZE];
281 
282 	if (sa->sa_family == AF_KEY)
283 		return;
284 
285 	get_rtaddrs(rtm->rtm_addrs, sa, rti_info);
286 	if (Fflag && rti_info[RTAX_GATEWAY]->sa_family != sa->sa_family) {
287 		return;
288 	}
289 	if (old_af != sa->sa_family) {
290 		old_af = sa->sa_family;
291 		pr_family(sa->sa_family);
292 		pr_rthdr(sa->sa_family, 0);
293 	}
294 
295 	mask = rti_info[RTAX_NETMASK];
296 	if ((sa = rti_info[RTAX_DST]) == NULL)
297 		return;
298 
299 	p_sockaddr(sa, mask, rtm->rtm_flags, WID_DST(sa->sa_family));
300 	p_sockaddr_mpls(sa, rti_info[RTAX_SRC], rtm->rtm_mpls,
301 	    WID_DST(sa->sa_family));
302 
303 	p_sockaddr(rti_info[RTAX_GATEWAY], NULL, RTF_HOST,
304 	    WID_GW(sa->sa_family));
305 	p_flags(rtm->rtm_flags, "%-6.6s ");
306 	printf("%5u %8llu ", rtm->rtm_rmx.rmx_refcnt,
307 	    rtm->rtm_rmx.rmx_pksent);
308 	if (rtm->rtm_rmx.rmx_mtu)
309 		printf("%5u ", rtm->rtm_rmx.rmx_mtu);
310 	else
311 		printf("%5s ", "-");
312 	putchar((rtm->rtm_rmx.rmx_locks & RTV_MTU) ? 'L' : ' ');
313 	printf("  %2d %.16s", rtm->rtm_priority & RTP_MASK,
314 	    if_indextoname(rtm->rtm_index, ifbuf));
315 	putchar('\n');
316 }
317 
318 /*
319  * Print a pfkey/encap entry.
320  */
321 void
322 p_pfkentry(struct sadb_msg *msg)
323 {
324 	static int		 old = 0;
325 	struct sadb_address	*saddr;
326 	struct sadb_protocol	*sap, *saft;
327 	struct sockaddr		*sa, *mask;
328 	void			*headers[SADB_EXT_MAX + 1];
329 
330 	if (!old) {
331 		pr_rthdr(PF_KEY, 0);
332 		old++;
333 	}
334 
335 	bzero(headers, sizeof(headers));
336 	index_pfk(msg, headers);
337 
338 	/* These are always set */
339 	saddr = headers[SADB_X_EXT_SRC_FLOW];
340 	sa = (struct sockaddr *)(saddr + 1);
341 	saddr = headers[SADB_X_EXT_SRC_MASK];
342 	mask = (struct sockaddr *)(saddr + 1);
343 	p_encap(sa, mask, WID_DST(sa->sa_family));
344 
345 	/* These are always set, too. */
346 	saddr = headers[SADB_X_EXT_DST_FLOW];
347 	sa = (struct sockaddr *)(saddr + 1);
348 	saddr = headers[SADB_X_EXT_DST_MASK];
349 	mask = (struct sockaddr *)(saddr + 1);
350 	p_encap(sa, mask, WID_DST(sa->sa_family));
351 
352 	/* Bypass and deny flows do not set SADB_EXT_ADDRESS_DST! */
353 	sap = headers[SADB_X_EXT_PROTOCOL];
354 	saft = headers[SADB_X_EXT_FLOW_TYPE];
355 	saddr = headers[SADB_EXT_ADDRESS_DST];
356 	if (saddr)
357 		sa = (struct sockaddr *)(saddr + 1);
358 	else
359 		sa = NULL;
360 	p_protocol(sap, sa, saft, msg->sadb_msg_satype);
361 
362 	printf("\n");
363 }
364 
365 /*
366  * Print address family header before a section of the routing table.
367  */
368 void
369 pr_family(int af)
370 {
371 	char *afname;
372 
373 	switch (af) {
374 	case AF_INET:
375 		afname = "Internet";
376 		break;
377 	case AF_INET6:
378 		afname = "Internet6";
379 		break;
380 	case PF_KEY:
381 		afname = "Encap";
382 		break;
383 	case AF_MPLS:
384 		afname = "MPLS";
385 		break;
386 	case AF_APPLETALK:
387 		afname = "AppleTalk";
388 		break;
389 	default:
390 		afname = NULL;
391 		break;
392 	}
393 	if (afname)
394 		printf("\n%s:\n", afname);
395 	else
396 		printf("\nProtocol Family %d:\n", af);
397 }
398 
399 void
400 p_addr(struct sockaddr *sa, struct sockaddr *mask, int flags)
401 {
402 	p_sockaddr(sa, mask, flags, WID_DST(sa->sa_family));
403 }
404 
405 void
406 p_gwaddr(struct sockaddr *sa, int af)
407 {
408 	p_sockaddr(sa, 0, RTF_HOST, WID_GW(af));
409 }
410 
411 void
412 p_encap(struct sockaddr *sa, struct sockaddr *mask, int width)
413 {
414 	char		*cp;
415 	unsigned short	 port = 0;
416 
417 	if (mask)
418 		cp = netname(sa, mask);
419 	else
420 		cp = routename(sa);
421 	switch (sa->sa_family) {
422 	case AF_INET:
423 		port = ntohs(((struct sockaddr_in *)sa)->sin_port);
424 		break;
425 	case AF_INET6:
426 		port = ntohs(((struct sockaddr_in6 *)sa)->sin6_port);
427 		break;
428 	}
429 	if (width < 0)
430 		printf("%s", cp);
431 	else {
432 		if (nflag)
433 			printf("%-*s %-5u ", width, cp, port);
434 		else
435 			printf("%-*.*s %-5u ", width, width, cp, port);
436 	}
437 }
438 
439 void
440 p_protocol(struct sadb_protocol *sap, struct sockaddr *sa, struct sadb_protocol
441     *saft, int proto)
442 {
443 	printf("%-6u", sap->sadb_protocol_proto);
444 
445 	if (sa)
446 		p_sockaddr(sa, NULL, 0, -1);
447 	else
448 		printf("none");
449 
450 	switch (proto) {
451 	case SADB_SATYPE_ESP:
452 		printf("/esp");
453 		break;
454 	case SADB_SATYPE_AH:
455 		printf("/ah");
456 		break;
457 	case SADB_X_SATYPE_IPCOMP:
458 		printf("/ipcomp");
459 		break;
460 	case SADB_X_SATYPE_IPIP:
461 		printf("/ipip");
462 		break;
463 	default:
464 		printf("/<unknown>");
465 	}
466 
467 	switch(saft->sadb_protocol_proto) {
468 	case SADB_X_FLOW_TYPE_USE:
469 		printf("/use");
470 		break;
471 	case SADB_X_FLOW_TYPE_REQUIRE:
472 		printf("/require");
473 		break;
474 	case SADB_X_FLOW_TYPE_ACQUIRE:
475 		printf("/acquire");
476 		break;
477 	case SADB_X_FLOW_TYPE_DENY:
478 		printf("/deny");
479 		break;
480 	case SADB_X_FLOW_TYPE_BYPASS:
481 		printf("/bypass");
482 		break;
483 	case SADB_X_FLOW_TYPE_DONTACQ:
484 		printf("/dontacq");
485 		break;
486 	default:
487 		printf("/<unknown type>");
488 	}
489 
490 	switch(saft->sadb_protocol_direction) {
491 	case IPSP_DIRECTION_IN:
492 		printf("/in");
493 		break;
494 	case IPSP_DIRECTION_OUT:
495 		printf("/out");
496 		break;
497 	default:
498 		printf("/<unknown>");
499 	}
500 }
501 
502 void
503 p_sockaddr(struct sockaddr *sa, struct sockaddr *mask, int flags, int width)
504 {
505 	char *cp;
506 
507 	switch (sa->sa_family) {
508 	case AF_INET6:
509 	    {
510 		struct sockaddr_in6 *sa6 = (struct sockaddr_in6 *)sa;
511 		struct in6_addr *in6 = &sa6->sin6_addr;
512 
513 		/*
514 		 * XXX: This is a special workaround for KAME kernels.
515 		 * sin6_scope_id field of SA should be set in the future.
516 		 */
517 		if (IN6_IS_ADDR_LINKLOCAL(in6) ||
518 		    IN6_IS_ADDR_MC_LINKLOCAL(in6) ||
519 		    IN6_IS_ADDR_MC_INTFACELOCAL(in6)) {
520 			/* XXX: override is ok? */
521 			sa6->sin6_scope_id = (u_int32_t)ntohs(*(u_short *)
522 			    &in6->s6_addr[2]);
523 			*(u_short *)&in6->s6_addr[2] = 0;
524 		}
525 		if (flags & RTF_HOST)
526 			cp = routename((struct sockaddr *)sa6);
527 		else
528 			cp = netname((struct sockaddr *)sa6, mask);
529 		break;
530 	    }
531 	case AF_MPLS:
532 		return;
533 	default:
534 		if ((flags & RTF_HOST) || mask == NULL)
535 			cp = routename(sa);
536 		else
537 			cp = netname(sa, mask);
538 		break;
539 	}
540 	if (width < 0)
541 		printf("%s", cp);
542 	else {
543 		if (nflag)
544 			printf("%-*s ", width, cp);
545 		else
546 			printf("%-*.*s ", width, width, cp);
547 	}
548 }
549 
550 static char line[MAXHOSTNAMELEN];
551 static char domain[MAXHOSTNAMELEN];
552 
553 void
554 p_sockaddr_mpls(struct sockaddr *in, struct sockaddr *out, int flags, int width)
555 {
556 	char *cp;
557 
558 	if (in->sa_family != AF_MPLS)
559 		return;
560 
561 	if (flags & MPLS_OP_POP || flags == MPLS_OP_LOCAL)
562 		cp = label_print(in, NULL);
563 	else
564 		cp = label_print(in, out);
565 
566 	snprintf(cp, MAXHOSTNAMELEN, "%s %s", cp,
567 	    label_print_op(flags));
568 
569 	printf("%-*s ", width, cp);
570 }
571 
572 void
573 p_flags(int f, char *format)
574 {
575 	char name[33], *flags;
576 	const struct bits *p = bits;
577 
578 	for (flags = name; p->b_mask && flags < &name[sizeof(name) - 2]; p++)
579 		if (p->b_mask & f)
580 			*flags++ = p->b_val;
581 	*flags = '\0';
582 	printf(format, name);
583 }
584 
585 char *
586 routename(struct sockaddr *sa)
587 {
588 	char *cp = NULL;
589 	static int first = 1;
590 
591 	if (first) {
592 		first = 0;
593 		if (gethostname(domain, sizeof(domain)) == 0 &&
594 		    (cp = strchr(domain, '.')))
595 			(void)strlcpy(domain, cp + 1, sizeof(domain));
596 		else
597 			domain[0] = '\0';
598 		cp = NULL;
599 	}
600 
601 	if (sa->sa_len == 0) {
602 		(void)strlcpy(line, "default", sizeof(line));
603 		return (line);
604 	}
605 
606 	switch (sa->sa_family) {
607 	case AF_INET:
608 		return
609 		    (routename4(((struct sockaddr_in *)sa)->sin_addr.s_addr));
610 
611 	case AF_INET6:
612 	    {
613 		struct sockaddr_in6 sin6;
614 
615 		memset(&sin6, 0, sizeof(sin6));
616 		memcpy(&sin6, sa, sa->sa_len);
617 		sin6.sin6_len = sizeof(struct sockaddr_in6);
618 		sin6.sin6_family = AF_INET6;
619 		if (sa->sa_len == sizeof(struct sockaddr_in6) &&
620 		    (IN6_IS_ADDR_LINKLOCAL(&sin6.sin6_addr) ||
621 		     IN6_IS_ADDR_MC_LINKLOCAL(&sin6.sin6_addr) ||
622 		     IN6_IS_ADDR_MC_INTFACELOCAL(&sin6.sin6_addr)) &&
623 		    sin6.sin6_scope_id == 0) {
624 			sin6.sin6_scope_id =
625 			    ntohs(*(u_int16_t *)&sin6.sin6_addr.s6_addr[2]);
626 			sin6.sin6_addr.s6_addr[2] = 0;
627 			sin6.sin6_addr.s6_addr[3] = 0;
628 		}
629 		return (routename6(&sin6));
630 	    }
631 
632 	case AF_LINK:
633 		return (link_print(sa));
634 	case AF_MPLS:
635 		return (label_print(sa, NULL));
636 	case AF_UNSPEC:
637 		if (sa->sa_len == sizeof(struct sockaddr_rtlabel)) {
638 			static char name[RTLABEL_LEN];
639 			struct sockaddr_rtlabel *sr;
640 
641 			sr = (struct sockaddr_rtlabel *)sa;
642 			(void)strlcpy(name, sr->sr_label, sizeof(name));
643 			return (name);
644 		}
645 		/* FALLTHROUGH */
646 	default:
647 		(void)snprintf(line, sizeof(line), "(%d) %s",
648 		    sa->sa_family, any_ntoa(sa));
649 		break;
650 	}
651 	return (line);
652 }
653 
654 char *
655 routename4(in_addr_t in)
656 {
657 	char		*cp = NULL;
658 	struct in_addr	 ina;
659 	struct hostent	*hp;
660 
661 	if (in == INADDR_ANY)
662 		cp = "default";
663 	if (!cp && !nflag) {
664 		if ((hp = gethostbyaddr((char *)&in,
665 		    sizeof(in), AF_INET)) != NULL) {
666 			if ((cp = strchr(hp->h_name, '.')) &&
667 			    !strcmp(cp + 1, domain))
668 				*cp = '\0';
669 			cp = hp->h_name;
670 		}
671 	}
672 	ina.s_addr = in;
673 	strlcpy(line, cp ? cp : inet_ntoa(ina), sizeof(line));
674 
675 	return (line);
676 }
677 
678 char *
679 routename6(struct sockaddr_in6 *sin6)
680 {
681 	int	 niflags = 0;
682 
683 	if (nflag)
684 		niflags |= NI_NUMERICHOST;
685 	else
686 		niflags |= NI_NOFQDN;
687 
688 	if (getnameinfo((struct sockaddr *)sin6, sin6->sin6_len,
689 	    line, sizeof(line), NULL, 0, niflags) != 0)
690 		strncpy(line, "invalid", sizeof(line));
691 
692 	return (line);
693 }
694 
695 /*
696  * Return the name of the network whose address is given.
697  * The address is assumed to be that of a net or subnet, not a host.
698  */
699 char *
700 netname4(in_addr_t in, in_addr_t mask)
701 {
702 	char *cp = NULL;
703 	struct netent *np = NULL;
704 	int mbits;
705 
706 	in = ntohl(in);
707 	mask = ntohl(mask);
708 	if (!nflag && in != INADDR_ANY) {
709 		if ((np = getnetbyaddr(in, AF_INET)) != NULL)
710 			cp = np->n_name;
711 	}
712 	if (in == INADDR_ANY)
713 		cp = "default";
714 	mbits = mask ? 33 - ffs(mask) : 0;
715 	if (cp)
716 		strlcpy(line, cp, sizeof(line));
717 #define C(x)	((x) & 0xff)
718 	else if (mbits < 9)
719 		snprintf(line, sizeof(line), "%u/%d", C(in >> 24), mbits);
720 	else if (mbits < 17)
721 		snprintf(line, sizeof(line), "%u.%u/%d",
722 		    C(in >> 24) , C(in >> 16), mbits);
723 	else if (mbits < 25)
724 		snprintf(line, sizeof(line), "%u.%u.%u/%d",
725 		    C(in >> 24), C(in >> 16), C(in >> 8), mbits);
726 	else
727 		snprintf(line, sizeof(line), "%u.%u.%u.%u/%d", C(in >> 24),
728 		    C(in >> 16), C(in >> 8), C(in), mbits);
729 #undef C
730 	return (line);
731 }
732 
733 char *
734 netname6(struct sockaddr_in6 *sa6, struct sockaddr_in6 *mask)
735 {
736 	struct sockaddr_in6 sin6;
737 	u_char *p;
738 	int masklen, final = 0, illegal = 0;
739 	int i, lim, flag, error;
740 	char hbuf[NI_MAXHOST];
741 
742 	sin6 = *sa6;
743 
744 	flag = 0;
745 	masklen = 0;
746 	if (mask) {
747 		lim = mask->sin6_len - offsetof(struct sockaddr_in6, sin6_addr);
748 		lim = lim < (int)sizeof(struct in6_addr) ?
749 		    lim : sizeof(struct in6_addr);
750 		for (p = (u_char *)&mask->sin6_addr, i = 0; i < lim; p++) {
751 			if (final && *p) {
752 				illegal++;
753 				sin6.sin6_addr.s6_addr[i++] = 0x00;
754 				continue;
755 			}
756 
757 			switch (*p & 0xff) {
758 			case 0xff:
759 				masklen += 8;
760 				break;
761 			case 0xfe:
762 				masklen += 7;
763 				final++;
764 				break;
765 			case 0xfc:
766 				masklen += 6;
767 				final++;
768 				break;
769 			case 0xf8:
770 				masklen += 5;
771 				final++;
772 				break;
773 			case 0xf0:
774 				masklen += 4;
775 				final++;
776 				break;
777 			case 0xe0:
778 				masklen += 3;
779 				final++;
780 				break;
781 			case 0xc0:
782 				masklen += 2;
783 				final++;
784 				break;
785 			case 0x80:
786 				masklen += 1;
787 				final++;
788 				break;
789 			case 0x00:
790 				final++;
791 				break;
792 			default:
793 				final++;
794 				illegal++;
795 				break;
796 			}
797 
798 			if (!illegal)
799 				sin6.sin6_addr.s6_addr[i++] &= *p;
800 			else
801 				sin6.sin6_addr.s6_addr[i++] = 0x00;
802 		}
803 		while (i < sizeof(struct in6_addr))
804 			sin6.sin6_addr.s6_addr[i++] = 0x00;
805 	} else
806 		masklen = 128;
807 
808 	if (masklen == 0 && IN6_IS_ADDR_UNSPECIFIED(&sin6.sin6_addr))
809 		return ("default");
810 
811 	if (illegal)
812 		warnx("illegal prefixlen");
813 
814 	if (nflag)
815 		flag |= NI_NUMERICHOST;
816 	error = getnameinfo((struct sockaddr *)&sin6, sin6.sin6_len,
817 	    hbuf, sizeof(hbuf), NULL, 0, flag);
818 	if (error)
819 		snprintf(hbuf, sizeof(hbuf), "invalid");
820 
821 	snprintf(line, sizeof(line), "%s/%d", hbuf, masklen);
822 	return (line);
823 }
824 
825 /*
826  * Return the name of the network whose address is given.
827  * The address is assumed to be that of a net or subnet, not a host.
828  */
829 char *
830 netname(struct sockaddr *sa, struct sockaddr *mask)
831 {
832 	switch (sa->sa_family) {
833 
834 	case AF_INET:
835 		return netname4(((struct sockaddr_in *)sa)->sin_addr.s_addr,
836 		    ((struct sockaddr_in *)mask)->sin_addr.s_addr);
837 	case AF_INET6:
838 		return netname6((struct sockaddr_in6 *)sa,
839 		    (struct sockaddr_in6 *)mask);
840 	case AF_LINK:
841 		return (link_print(sa));
842 	case AF_MPLS:
843 		return (label_print(sa, NULL));
844 	default:
845 		snprintf(line, sizeof(line), "af %d: %s",
846 		    sa->sa_family, any_ntoa(sa));
847 		break;
848 	}
849 	return (line);
850 }
851 
852 static const char hexlist[] = "0123456789abcdef";
853 
854 char *
855 any_ntoa(const struct sockaddr *sa)
856 {
857 	static char obuf[240];
858 	const char *in = sa->sa_data;
859 	char *out = obuf;
860 	int len = sa->sa_len - offsetof(struct sockaddr, sa_data);
861 
862 	*out++ = 'Q';
863 	do {
864 		*out++ = hexlist[(*in >> 4) & 15];
865 		*out++ = hexlist[(*in++)    & 15];
866 		*out++ = '.';
867 	} while (--len > 0 && (out + 3) < &obuf[sizeof(obuf) - 1]);
868 	out[-1] = '\0';
869 	return (obuf);
870 }
871 
872 char *
873 link_print(struct sockaddr *sa)
874 {
875 	struct sockaddr_dl	*sdl = (struct sockaddr_dl *)sa;
876 	u_char			*lla = (u_char *)sdl->sdl_data + sdl->sdl_nlen;
877 
878 	if (sdl->sdl_nlen == 0 && sdl->sdl_alen == 0 &&
879 	    sdl->sdl_slen == 0) {
880 		(void)snprintf(line, sizeof(line), "link#%d", sdl->sdl_index);
881 		return (line);
882 	}
883 	switch (sdl->sdl_type) {
884 	case IFT_ETHER:
885 	case IFT_CARP:
886 		return (ether_ntoa((struct ether_addr *)lla));
887 	default:
888 		return (link_ntoa(sdl));
889 	}
890 }
891 
892 char *
893 label_print_op(u_int32_t type)
894 {
895 	switch (type & (MPLS_OP_PUSH | MPLS_OP_POP | MPLS_OP_SWAP)) {
896 	case MPLS_OP_LOCAL:
897 		return ("LOCAL");
898 	case MPLS_OP_POP:
899 		return ("POP");
900 	case MPLS_OP_SWAP:
901 		return ("SWAP");
902 	case MPLS_OP_PUSH:
903 		return ("PUSH");
904 	default:
905 		return ("?");
906 	}
907 }
908 
909 char *
910 label_print(struct sockaddr *in, struct sockaddr *out)
911 {
912 	struct sockaddr_mpls	*insmpls = (struct sockaddr_mpls *)in;
913 	struct sockaddr_mpls	*outsmpls = (struct sockaddr_mpls *)out;
914 	char			*in_label;
915 	char			*out_label;
916 
917 	if (asprintf(&in_label, "%u",
918 	    ntohl(insmpls->smpls_label) >> MPLS_LABEL_OFFSET) == -1)
919 		err(1, NULL);
920 
921 	if (outsmpls) {
922 		if (asprintf(&out_label, "%u",
923 		    ntohl(outsmpls->smpls_label) >> MPLS_LABEL_OFFSET) == -1)
924 			err(1, NULL);
925 	} else {
926 		if (asprintf(&out_label, "-") == -1)
927 			err(1, NULL);
928 	}
929 
930 	(void)snprintf(line, sizeof(line), "%-16s %-10s", in_label,
931 	    out_label);
932 
933 	free(in_label);
934 	free(out_label);
935 
936 	return (line);
937 }
938 
939 void
940 index_pfk(struct sadb_msg *msg, void **headers)
941 {
942 	struct sadb_ext	*ext;
943 
944 	for (ext = (struct sadb_ext *)(msg + 1);
945 	    (size_t)((u_int8_t *)ext - (u_int8_t *)msg) <
946 	    msg->sadb_msg_len * PFKEYV2_CHUNK && ext->sadb_ext_len > 0;
947 	    ext = (struct sadb_ext *)((u_int8_t *)ext +
948 	    ext->sadb_ext_len * PFKEYV2_CHUNK)) {
949 		switch (ext->sadb_ext_type) {
950 		case SADB_EXT_ADDRESS_SRC:
951 			headers[SADB_EXT_ADDRESS_SRC] = (void *)ext;
952 			break;
953 		case SADB_EXT_ADDRESS_DST:
954 			headers[SADB_EXT_ADDRESS_DST] = (void *)ext;
955 			break;
956 		case SADB_X_EXT_PROTOCOL:
957 			headers[SADB_X_EXT_PROTOCOL] = (void *)ext;
958 			break;
959 		case SADB_X_EXT_SRC_FLOW:
960 			headers[SADB_X_EXT_SRC_FLOW] = (void *)ext;
961 			break;
962 		case SADB_X_EXT_DST_FLOW:
963 			headers[SADB_X_EXT_DST_FLOW] = (void *)ext;
964 			break;
965 		case SADB_X_EXT_SRC_MASK:
966 			headers[SADB_X_EXT_SRC_MASK] = (void *)ext;
967 			break;
968 		case SADB_X_EXT_DST_MASK:
969 			headers[SADB_X_EXT_DST_MASK] = (void *)ext;
970 			break;
971 		case SADB_X_EXT_FLOW_TYPE:
972 			headers[SADB_X_EXT_FLOW_TYPE] = (void *)ext;
973 		default:
974 			/* Ignore. */
975 			break;
976 		}
977 	}
978 }
979