1 /* $OpenBSD: show.c,v 1.21 2009/04/28 12:09:36 michele Exp $ */ 2 /* $NetBSD: show.c,v 1.1 1996/11/15 18:01:41 gwr Exp $ */ 3 4 /* 5 * Copyright (c) 1983, 1988, 1993 6 * The Regents of the University of California. All rights reserved. 7 * 8 * Redistribution and use in source and binary forms, with or without 9 * modification, are permitted provided that the following conditions 10 * are met: 11 * 1. Redistributions of source code must retain the above copyright 12 * notice, this list of conditions and the following disclaimer. 13 * 2. Redistributions in binary form must reproduce the above copyright 14 * notice, this list of conditions and the following disclaimer in the 15 * documentation and/or other materials provided with the distribution. 16 * 3. Neither the name of the University nor the names of its contributors 17 * may be used to endorse or promote products derived from this software 18 * without specific prior written permission. 19 * 20 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 21 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 22 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 23 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 24 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 25 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 26 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 27 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 28 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 29 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 30 * SUCH DAMAGE. 31 */ 32 33 #include <sys/param.h> 34 #include <sys/protosw.h> 35 #include <sys/socket.h> 36 #include <sys/mbuf.h> 37 #include <sys/sysctl.h> 38 39 #include <net/if.h> 40 #include <net/if_dl.h> 41 #include <net/if_types.h> 42 #include <net/pfkeyv2.h> 43 #include <net/route.h> 44 #include <netinet/in.h> 45 #include <netinet/if_ether.h> 46 #include <netinet/ip_ipsp.h> 47 #include <netmpls/mpls.h> 48 #include <arpa/inet.h> 49 50 #include <err.h> 51 #include <errno.h> 52 #include <netdb.h> 53 #include <stdio.h> 54 #include <stddef.h> 55 #include <stdlib.h> 56 #include <string.h> 57 #include <unistd.h> 58 59 #include "netstat.h" 60 61 char *any_ntoa(const struct sockaddr *); 62 char *link_print(struct sockaddr *); 63 char *label_print_op(u_int32_t); 64 char *label_print(struct sockaddr *, struct sockaddr *); 65 66 #define ROUNDUP(a) \ 67 ((a) > 0 ? (1 + (((a) - 1) | (sizeof(long) - 1))) : sizeof(long)) 68 #define ADVANCE(x, n) (x += ROUNDUP((n)->sa_len)) 69 70 #define PFKEYV2_CHUNK sizeof(u_int64_t) 71 72 /* 73 * Definitions for showing gateway flags. 74 */ 75 struct bits { 76 int b_mask; 77 char b_val; 78 }; 79 static const struct bits bits[] = { 80 { RTF_UP, 'U' }, 81 { RTF_GATEWAY, 'G' }, 82 { RTF_HOST, 'H' }, 83 { RTF_REJECT, 'R' }, 84 { RTF_BLACKHOLE, 'B' }, 85 { RTF_DYNAMIC, 'D' }, 86 { RTF_MODIFIED, 'M' }, 87 { RTF_DONE, 'd' }, /* Completed -- for routing messages only */ 88 { RTF_MASK, 'm' }, /* Mask Present -- for routing messages only */ 89 { RTF_CLONING, 'C' }, 90 { RTF_XRESOLVE, 'X' }, 91 { RTF_LLINFO, 'L' }, 92 { RTF_STATIC, 'S' }, 93 { RTF_PROTO1, '1' }, 94 { RTF_PROTO2, '2' }, 95 { RTF_PROTO3, '3' }, 96 { RTF_CLONED, 'c' }, 97 { RTF_JUMBO, 'J' }, 98 { RTF_MPATH, 'P' }, 99 { 0 } 100 }; 101 102 void p_rtentry(struct rt_msghdr *); 103 void p_pfkentry(struct sadb_msg *); 104 void pr_family(int); 105 void p_encap(struct sockaddr *, struct sockaddr *, int); 106 void p_protocol(struct sadb_protocol *, struct sockaddr *, struct 107 sadb_protocol *, int); 108 void p_sockaddr(struct sockaddr *, struct sockaddr *, int, int); 109 void p_sockaddr_mpls(struct sockaddr *, struct sockaddr *, int, int); 110 void p_flags(int, char *); 111 char *routename4(in_addr_t); 112 char *routename6(struct sockaddr_in6 *); 113 void index_pfk(struct sadb_msg *, void **); 114 115 /* 116 * Print routing tables. 117 */ 118 void 119 p_rttables(int af, u_int tableid) 120 { 121 struct rt_msghdr *rtm; 122 struct sadb_msg *msg; 123 char *buf = NULL, *next, *lim = NULL; 124 size_t needed; 125 int mib[7]; 126 struct sockaddr *sa; 127 128 mib[0] = CTL_NET; 129 mib[1] = PF_ROUTE; 130 mib[2] = 0; 131 mib[3] = af; 132 mib[4] = NET_RT_DUMP; 133 mib[5] = 0; 134 mib[6] = tableid; 135 136 if (sysctl(mib, 7, NULL, &needed, NULL, 0) < 0) 137 err(1, "route-sysctl-estimate"); 138 if (needed > 0) { 139 if ((buf = malloc(needed)) == 0) 140 err(1, NULL); 141 if (sysctl(mib, 7, buf, &needed, NULL, 0) < 0) 142 err(1, "sysctl of routing table"); 143 lim = buf + needed; 144 } 145 146 printf("Routing tables\n"); 147 148 if (buf) { 149 for (next = buf; next < lim; next += rtm->rtm_msglen) { 150 rtm = (struct rt_msghdr *)next; 151 if (rtm->rtm_version != RTM_VERSION) 152 continue; 153 sa = (struct sockaddr *)(rtm + 1); 154 if (af != AF_UNSPEC && sa->sa_family != af) 155 continue; 156 p_rtentry(rtm); 157 } 158 free(buf); 159 buf = NULL; 160 } 161 162 if (af != 0 && af != PF_KEY) 163 return; 164 165 mib[0] = CTL_NET; 166 mib[1] = PF_KEY; 167 mib[2] = PF_KEY_V2; 168 mib[3] = NET_KEY_SPD_DUMP; 169 mib[4] = mib[5] = 0; 170 171 if (sysctl(mib, 4, NULL, &needed, NULL, 0) == -1) { 172 if (errno == ENOPROTOOPT) 173 return; 174 err(1, "spd-sysctl-estimate"); 175 } 176 if (needed > 0) { 177 if ((buf = malloc(needed)) == 0) 178 err(1, NULL); 179 if (sysctl(mib, 4, buf, &needed, NULL, 0) == -1) 180 err(1,"sysctl of spd"); 181 lim = buf + needed; 182 } 183 184 if (buf) { 185 printf("\nEncap:\n"); 186 187 for (next = buf; next < lim; next += msg->sadb_msg_len * 188 PFKEYV2_CHUNK) { 189 msg = (struct sadb_msg *)next; 190 if (msg->sadb_msg_len == 0) 191 break; 192 p_pfkentry(msg); 193 } 194 free(buf); 195 buf = NULL; 196 } 197 } 198 199 /* 200 * column widths; each followed by one space 201 * width of destination/gateway column 202 * strlen("fe80::aaaa:bbbb:cccc:dddd@gif0") == 30, strlen("/128") == 4 203 */ 204 #define WID_GW(af) ((af) == AF_INET6 ? (nflag ? 30 : 18) : 18) 205 206 int 207 WID_DST(int af) 208 { 209 210 if (nflag) 211 switch (af) { 212 case AF_MPLS: 213 return 34; 214 case AF_INET6: 215 return 34; 216 default: 217 return 18; 218 } 219 else 220 switch (af) { 221 case AF_MPLS: 222 return 34; 223 default: 224 return 18; 225 } 226 } 227 228 /* 229 * Print header for routing table columns. 230 */ 231 void 232 pr_rthdr(int af, int Aflag) 233 { 234 if (Aflag) 235 printf("%-*.*s ", PLEN, PLEN, "Address"); 236 switch (af) { 237 case PF_KEY: 238 printf("%-18s %-5s %-18s %-5s %-5s %-22s\n", 239 "Source", "Port", "Destination", 240 "Port", "Proto", "SA(Address/Proto/Type/Direction)"); 241 break; 242 case PF_MPLS: 243 printf("%-16s %-10s %-6s %-18s %-6.6s %5.5s %8.8s %5.5s %4.4s %s\n", 244 "In label", "Out label", "Op", "Gateway", 245 "Flags", "Refs", "Use", "Mtu", "Prio", "Interface"); 246 break; 247 default: 248 printf("%-*.*s %-*.*s %-6.6s %5.5s %8.8s %5.5s %4.4s %s\n", 249 WID_DST(af), WID_DST(af), "Destination", 250 WID_GW(af), WID_GW(af), "Gateway", 251 "Flags", "Refs", "Use", "Mtu", "Prio", "Iface"); 252 break; 253 } 254 } 255 256 static void 257 get_rtaddrs(int addrs, struct sockaddr *sa, struct sockaddr **rti_info) 258 { 259 int i; 260 261 for (i = 0; i < RTAX_MAX; i++) { 262 if (addrs & (1 << i)) { 263 rti_info[i] = sa; 264 sa = (struct sockaddr *)((char *)(sa) + 265 ROUNDUP(sa->sa_len)); 266 } else 267 rti_info[i] = NULL; 268 } 269 } 270 271 /* 272 * Print a routing table entry. 273 */ 274 void 275 p_rtentry(struct rt_msghdr *rtm) 276 { 277 static int old_af = -1; 278 struct sockaddr *sa = (struct sockaddr *)(rtm + 1); 279 struct sockaddr *mask, *rti_info[RTAX_MAX]; 280 char ifbuf[IF_NAMESIZE]; 281 282 if (sa->sa_family == AF_KEY) 283 return; 284 285 get_rtaddrs(rtm->rtm_addrs, sa, rti_info); 286 if (Fflag && rti_info[RTAX_GATEWAY]->sa_family != sa->sa_family) { 287 return; 288 } 289 if (old_af != sa->sa_family) { 290 old_af = sa->sa_family; 291 pr_family(sa->sa_family); 292 pr_rthdr(sa->sa_family, 0); 293 } 294 295 mask = rti_info[RTAX_NETMASK]; 296 if ((sa = rti_info[RTAX_DST]) == NULL) 297 return; 298 299 p_sockaddr(sa, mask, rtm->rtm_flags, WID_DST(sa->sa_family)); 300 p_sockaddr_mpls(sa, rti_info[RTAX_SRC], rtm->rtm_mpls, 301 WID_DST(sa->sa_family)); 302 303 p_sockaddr(rti_info[RTAX_GATEWAY], NULL, RTF_HOST, 304 WID_GW(sa->sa_family)); 305 p_flags(rtm->rtm_flags, "%-6.6s "); 306 printf("%5u %8llu ", rtm->rtm_rmx.rmx_refcnt, 307 rtm->rtm_rmx.rmx_pksent); 308 if (rtm->rtm_rmx.rmx_mtu) 309 printf("%5u ", rtm->rtm_rmx.rmx_mtu); 310 else 311 printf("%5s ", "-"); 312 putchar((rtm->rtm_rmx.rmx_locks & RTV_MTU) ? 'L' : ' '); 313 printf(" %2d %.16s", rtm->rtm_priority & RTP_MASK, 314 if_indextoname(rtm->rtm_index, ifbuf)); 315 putchar('\n'); 316 } 317 318 /* 319 * Print a pfkey/encap entry. 320 */ 321 void 322 p_pfkentry(struct sadb_msg *msg) 323 { 324 static int old = 0; 325 struct sadb_address *saddr; 326 struct sadb_protocol *sap, *saft; 327 struct sockaddr *sa, *mask; 328 void *headers[SADB_EXT_MAX + 1]; 329 330 if (!old) { 331 pr_rthdr(PF_KEY, 0); 332 old++; 333 } 334 335 bzero(headers, sizeof(headers)); 336 index_pfk(msg, headers); 337 338 /* These are always set */ 339 saddr = headers[SADB_X_EXT_SRC_FLOW]; 340 sa = (struct sockaddr *)(saddr + 1); 341 saddr = headers[SADB_X_EXT_SRC_MASK]; 342 mask = (struct sockaddr *)(saddr + 1); 343 p_encap(sa, mask, WID_DST(sa->sa_family)); 344 345 /* These are always set, too. */ 346 saddr = headers[SADB_X_EXT_DST_FLOW]; 347 sa = (struct sockaddr *)(saddr + 1); 348 saddr = headers[SADB_X_EXT_DST_MASK]; 349 mask = (struct sockaddr *)(saddr + 1); 350 p_encap(sa, mask, WID_DST(sa->sa_family)); 351 352 /* Bypass and deny flows do not set SADB_EXT_ADDRESS_DST! */ 353 sap = headers[SADB_X_EXT_PROTOCOL]; 354 saft = headers[SADB_X_EXT_FLOW_TYPE]; 355 saddr = headers[SADB_EXT_ADDRESS_DST]; 356 if (saddr) 357 sa = (struct sockaddr *)(saddr + 1); 358 else 359 sa = NULL; 360 p_protocol(sap, sa, saft, msg->sadb_msg_satype); 361 362 printf("\n"); 363 } 364 365 /* 366 * Print address family header before a section of the routing table. 367 */ 368 void 369 pr_family(int af) 370 { 371 char *afname; 372 373 switch (af) { 374 case AF_INET: 375 afname = "Internet"; 376 break; 377 case AF_INET6: 378 afname = "Internet6"; 379 break; 380 case PF_KEY: 381 afname = "Encap"; 382 break; 383 case AF_MPLS: 384 afname = "MPLS"; 385 break; 386 case AF_APPLETALK: 387 afname = "AppleTalk"; 388 break; 389 default: 390 afname = NULL; 391 break; 392 } 393 if (afname) 394 printf("\n%s:\n", afname); 395 else 396 printf("\nProtocol Family %d:\n", af); 397 } 398 399 void 400 p_addr(struct sockaddr *sa, struct sockaddr *mask, int flags) 401 { 402 p_sockaddr(sa, mask, flags, WID_DST(sa->sa_family)); 403 } 404 405 void 406 p_gwaddr(struct sockaddr *sa, int af) 407 { 408 p_sockaddr(sa, 0, RTF_HOST, WID_GW(af)); 409 } 410 411 void 412 p_encap(struct sockaddr *sa, struct sockaddr *mask, int width) 413 { 414 char *cp; 415 unsigned short port = 0; 416 417 if (mask) 418 cp = netname(sa, mask); 419 else 420 cp = routename(sa); 421 switch (sa->sa_family) { 422 case AF_INET: 423 port = ntohs(((struct sockaddr_in *)sa)->sin_port); 424 break; 425 case AF_INET6: 426 port = ntohs(((struct sockaddr_in6 *)sa)->sin6_port); 427 break; 428 } 429 if (width < 0) 430 printf("%s", cp); 431 else { 432 if (nflag) 433 printf("%-*s %-5u ", width, cp, port); 434 else 435 printf("%-*.*s %-5u ", width, width, cp, port); 436 } 437 } 438 439 void 440 p_protocol(struct sadb_protocol *sap, struct sockaddr *sa, struct sadb_protocol 441 *saft, int proto) 442 { 443 printf("%-6u", sap->sadb_protocol_proto); 444 445 if (sa) 446 p_sockaddr(sa, NULL, 0, -1); 447 else 448 printf("none"); 449 450 switch (proto) { 451 case SADB_SATYPE_ESP: 452 printf("/esp"); 453 break; 454 case SADB_SATYPE_AH: 455 printf("/ah"); 456 break; 457 case SADB_X_SATYPE_IPCOMP: 458 printf("/ipcomp"); 459 break; 460 case SADB_X_SATYPE_IPIP: 461 printf("/ipip"); 462 break; 463 default: 464 printf("/<unknown>"); 465 } 466 467 switch(saft->sadb_protocol_proto) { 468 case SADB_X_FLOW_TYPE_USE: 469 printf("/use"); 470 break; 471 case SADB_X_FLOW_TYPE_REQUIRE: 472 printf("/require"); 473 break; 474 case SADB_X_FLOW_TYPE_ACQUIRE: 475 printf("/acquire"); 476 break; 477 case SADB_X_FLOW_TYPE_DENY: 478 printf("/deny"); 479 break; 480 case SADB_X_FLOW_TYPE_BYPASS: 481 printf("/bypass"); 482 break; 483 case SADB_X_FLOW_TYPE_DONTACQ: 484 printf("/dontacq"); 485 break; 486 default: 487 printf("/<unknown type>"); 488 } 489 490 switch(saft->sadb_protocol_direction) { 491 case IPSP_DIRECTION_IN: 492 printf("/in"); 493 break; 494 case IPSP_DIRECTION_OUT: 495 printf("/out"); 496 break; 497 default: 498 printf("/<unknown>"); 499 } 500 } 501 502 void 503 p_sockaddr(struct sockaddr *sa, struct sockaddr *mask, int flags, int width) 504 { 505 char *cp; 506 507 switch (sa->sa_family) { 508 case AF_INET6: 509 { 510 struct sockaddr_in6 *sa6 = (struct sockaddr_in6 *)sa; 511 struct in6_addr *in6 = &sa6->sin6_addr; 512 513 /* 514 * XXX: This is a special workaround for KAME kernels. 515 * sin6_scope_id field of SA should be set in the future. 516 */ 517 if (IN6_IS_ADDR_LINKLOCAL(in6) || 518 IN6_IS_ADDR_MC_LINKLOCAL(in6) || 519 IN6_IS_ADDR_MC_INTFACELOCAL(in6)) { 520 /* XXX: override is ok? */ 521 sa6->sin6_scope_id = (u_int32_t)ntohs(*(u_short *) 522 &in6->s6_addr[2]); 523 *(u_short *)&in6->s6_addr[2] = 0; 524 } 525 if (flags & RTF_HOST) 526 cp = routename((struct sockaddr *)sa6); 527 else 528 cp = netname((struct sockaddr *)sa6, mask); 529 break; 530 } 531 case AF_MPLS: 532 return; 533 default: 534 if ((flags & RTF_HOST) || mask == NULL) 535 cp = routename(sa); 536 else 537 cp = netname(sa, mask); 538 break; 539 } 540 if (width < 0) 541 printf("%s", cp); 542 else { 543 if (nflag) 544 printf("%-*s ", width, cp); 545 else 546 printf("%-*.*s ", width, width, cp); 547 } 548 } 549 550 static char line[MAXHOSTNAMELEN]; 551 static char domain[MAXHOSTNAMELEN]; 552 553 void 554 p_sockaddr_mpls(struct sockaddr *in, struct sockaddr *out, int flags, int width) 555 { 556 char *cp; 557 558 if (in->sa_family != AF_MPLS) 559 return; 560 561 if (flags & MPLS_OP_POP || flags == MPLS_OP_LOCAL) 562 cp = label_print(in, NULL); 563 else 564 cp = label_print(in, out); 565 566 snprintf(cp, MAXHOSTNAMELEN, "%s %s", cp, 567 label_print_op(flags)); 568 569 printf("%-*s ", width, cp); 570 } 571 572 void 573 p_flags(int f, char *format) 574 { 575 char name[33], *flags; 576 const struct bits *p = bits; 577 578 for (flags = name; p->b_mask && flags < &name[sizeof(name) - 2]; p++) 579 if (p->b_mask & f) 580 *flags++ = p->b_val; 581 *flags = '\0'; 582 printf(format, name); 583 } 584 585 char * 586 routename(struct sockaddr *sa) 587 { 588 char *cp = NULL; 589 static int first = 1; 590 591 if (first) { 592 first = 0; 593 if (gethostname(domain, sizeof(domain)) == 0 && 594 (cp = strchr(domain, '.'))) 595 (void)strlcpy(domain, cp + 1, sizeof(domain)); 596 else 597 domain[0] = '\0'; 598 cp = NULL; 599 } 600 601 if (sa->sa_len == 0) { 602 (void)strlcpy(line, "default", sizeof(line)); 603 return (line); 604 } 605 606 switch (sa->sa_family) { 607 case AF_INET: 608 return 609 (routename4(((struct sockaddr_in *)sa)->sin_addr.s_addr)); 610 611 case AF_INET6: 612 { 613 struct sockaddr_in6 sin6; 614 615 memset(&sin6, 0, sizeof(sin6)); 616 memcpy(&sin6, sa, sa->sa_len); 617 sin6.sin6_len = sizeof(struct sockaddr_in6); 618 sin6.sin6_family = AF_INET6; 619 if (sa->sa_len == sizeof(struct sockaddr_in6) && 620 (IN6_IS_ADDR_LINKLOCAL(&sin6.sin6_addr) || 621 IN6_IS_ADDR_MC_LINKLOCAL(&sin6.sin6_addr) || 622 IN6_IS_ADDR_MC_INTFACELOCAL(&sin6.sin6_addr)) && 623 sin6.sin6_scope_id == 0) { 624 sin6.sin6_scope_id = 625 ntohs(*(u_int16_t *)&sin6.sin6_addr.s6_addr[2]); 626 sin6.sin6_addr.s6_addr[2] = 0; 627 sin6.sin6_addr.s6_addr[3] = 0; 628 } 629 return (routename6(&sin6)); 630 } 631 632 case AF_LINK: 633 return (link_print(sa)); 634 case AF_MPLS: 635 return (label_print(sa, NULL)); 636 case AF_UNSPEC: 637 if (sa->sa_len == sizeof(struct sockaddr_rtlabel)) { 638 static char name[RTLABEL_LEN]; 639 struct sockaddr_rtlabel *sr; 640 641 sr = (struct sockaddr_rtlabel *)sa; 642 (void)strlcpy(name, sr->sr_label, sizeof(name)); 643 return (name); 644 } 645 /* FALLTHROUGH */ 646 default: 647 (void)snprintf(line, sizeof(line), "(%d) %s", 648 sa->sa_family, any_ntoa(sa)); 649 break; 650 } 651 return (line); 652 } 653 654 char * 655 routename4(in_addr_t in) 656 { 657 char *cp = NULL; 658 struct in_addr ina; 659 struct hostent *hp; 660 661 if (in == INADDR_ANY) 662 cp = "default"; 663 if (!cp && !nflag) { 664 if ((hp = gethostbyaddr((char *)&in, 665 sizeof(in), AF_INET)) != NULL) { 666 if ((cp = strchr(hp->h_name, '.')) && 667 !strcmp(cp + 1, domain)) 668 *cp = '\0'; 669 cp = hp->h_name; 670 } 671 } 672 ina.s_addr = in; 673 strlcpy(line, cp ? cp : inet_ntoa(ina), sizeof(line)); 674 675 return (line); 676 } 677 678 char * 679 routename6(struct sockaddr_in6 *sin6) 680 { 681 int niflags = 0; 682 683 if (nflag) 684 niflags |= NI_NUMERICHOST; 685 else 686 niflags |= NI_NOFQDN; 687 688 if (getnameinfo((struct sockaddr *)sin6, sin6->sin6_len, 689 line, sizeof(line), NULL, 0, niflags) != 0) 690 strncpy(line, "invalid", sizeof(line)); 691 692 return (line); 693 } 694 695 /* 696 * Return the name of the network whose address is given. 697 * The address is assumed to be that of a net or subnet, not a host. 698 */ 699 char * 700 netname4(in_addr_t in, in_addr_t mask) 701 { 702 char *cp = NULL; 703 struct netent *np = NULL; 704 int mbits; 705 706 in = ntohl(in); 707 mask = ntohl(mask); 708 if (!nflag && in != INADDR_ANY) { 709 if ((np = getnetbyaddr(in, AF_INET)) != NULL) 710 cp = np->n_name; 711 } 712 if (in == INADDR_ANY) 713 cp = "default"; 714 mbits = mask ? 33 - ffs(mask) : 0; 715 if (cp) 716 strlcpy(line, cp, sizeof(line)); 717 #define C(x) ((x) & 0xff) 718 else if (mbits < 9) 719 snprintf(line, sizeof(line), "%u/%d", C(in >> 24), mbits); 720 else if (mbits < 17) 721 snprintf(line, sizeof(line), "%u.%u/%d", 722 C(in >> 24) , C(in >> 16), mbits); 723 else if (mbits < 25) 724 snprintf(line, sizeof(line), "%u.%u.%u/%d", 725 C(in >> 24), C(in >> 16), C(in >> 8), mbits); 726 else 727 snprintf(line, sizeof(line), "%u.%u.%u.%u/%d", C(in >> 24), 728 C(in >> 16), C(in >> 8), C(in), mbits); 729 #undef C 730 return (line); 731 } 732 733 char * 734 netname6(struct sockaddr_in6 *sa6, struct sockaddr_in6 *mask) 735 { 736 struct sockaddr_in6 sin6; 737 u_char *p; 738 int masklen, final = 0, illegal = 0; 739 int i, lim, flag, error; 740 char hbuf[NI_MAXHOST]; 741 742 sin6 = *sa6; 743 744 flag = 0; 745 masklen = 0; 746 if (mask) { 747 lim = mask->sin6_len - offsetof(struct sockaddr_in6, sin6_addr); 748 lim = lim < (int)sizeof(struct in6_addr) ? 749 lim : sizeof(struct in6_addr); 750 for (p = (u_char *)&mask->sin6_addr, i = 0; i < lim; p++) { 751 if (final && *p) { 752 illegal++; 753 sin6.sin6_addr.s6_addr[i++] = 0x00; 754 continue; 755 } 756 757 switch (*p & 0xff) { 758 case 0xff: 759 masklen += 8; 760 break; 761 case 0xfe: 762 masklen += 7; 763 final++; 764 break; 765 case 0xfc: 766 masklen += 6; 767 final++; 768 break; 769 case 0xf8: 770 masklen += 5; 771 final++; 772 break; 773 case 0xf0: 774 masklen += 4; 775 final++; 776 break; 777 case 0xe0: 778 masklen += 3; 779 final++; 780 break; 781 case 0xc0: 782 masklen += 2; 783 final++; 784 break; 785 case 0x80: 786 masklen += 1; 787 final++; 788 break; 789 case 0x00: 790 final++; 791 break; 792 default: 793 final++; 794 illegal++; 795 break; 796 } 797 798 if (!illegal) 799 sin6.sin6_addr.s6_addr[i++] &= *p; 800 else 801 sin6.sin6_addr.s6_addr[i++] = 0x00; 802 } 803 while (i < sizeof(struct in6_addr)) 804 sin6.sin6_addr.s6_addr[i++] = 0x00; 805 } else 806 masklen = 128; 807 808 if (masklen == 0 && IN6_IS_ADDR_UNSPECIFIED(&sin6.sin6_addr)) 809 return ("default"); 810 811 if (illegal) 812 warnx("illegal prefixlen"); 813 814 if (nflag) 815 flag |= NI_NUMERICHOST; 816 error = getnameinfo((struct sockaddr *)&sin6, sin6.sin6_len, 817 hbuf, sizeof(hbuf), NULL, 0, flag); 818 if (error) 819 snprintf(hbuf, sizeof(hbuf), "invalid"); 820 821 snprintf(line, sizeof(line), "%s/%d", hbuf, masklen); 822 return (line); 823 } 824 825 /* 826 * Return the name of the network whose address is given. 827 * The address is assumed to be that of a net or subnet, not a host. 828 */ 829 char * 830 netname(struct sockaddr *sa, struct sockaddr *mask) 831 { 832 switch (sa->sa_family) { 833 834 case AF_INET: 835 return netname4(((struct sockaddr_in *)sa)->sin_addr.s_addr, 836 ((struct sockaddr_in *)mask)->sin_addr.s_addr); 837 case AF_INET6: 838 return netname6((struct sockaddr_in6 *)sa, 839 (struct sockaddr_in6 *)mask); 840 case AF_LINK: 841 return (link_print(sa)); 842 case AF_MPLS: 843 return (label_print(sa, NULL)); 844 default: 845 snprintf(line, sizeof(line), "af %d: %s", 846 sa->sa_family, any_ntoa(sa)); 847 break; 848 } 849 return (line); 850 } 851 852 static const char hexlist[] = "0123456789abcdef"; 853 854 char * 855 any_ntoa(const struct sockaddr *sa) 856 { 857 static char obuf[240]; 858 const char *in = sa->sa_data; 859 char *out = obuf; 860 int len = sa->sa_len - offsetof(struct sockaddr, sa_data); 861 862 *out++ = 'Q'; 863 do { 864 *out++ = hexlist[(*in >> 4) & 15]; 865 *out++ = hexlist[(*in++) & 15]; 866 *out++ = '.'; 867 } while (--len > 0 && (out + 3) < &obuf[sizeof(obuf) - 1]); 868 out[-1] = '\0'; 869 return (obuf); 870 } 871 872 char * 873 link_print(struct sockaddr *sa) 874 { 875 struct sockaddr_dl *sdl = (struct sockaddr_dl *)sa; 876 u_char *lla = (u_char *)sdl->sdl_data + sdl->sdl_nlen; 877 878 if (sdl->sdl_nlen == 0 && sdl->sdl_alen == 0 && 879 sdl->sdl_slen == 0) { 880 (void)snprintf(line, sizeof(line), "link#%d", sdl->sdl_index); 881 return (line); 882 } 883 switch (sdl->sdl_type) { 884 case IFT_ETHER: 885 case IFT_CARP: 886 return (ether_ntoa((struct ether_addr *)lla)); 887 default: 888 return (link_ntoa(sdl)); 889 } 890 } 891 892 char * 893 label_print_op(u_int32_t type) 894 { 895 switch (type & (MPLS_OP_PUSH | MPLS_OP_POP | MPLS_OP_SWAP)) { 896 case MPLS_OP_LOCAL: 897 return ("LOCAL"); 898 case MPLS_OP_POP: 899 return ("POP"); 900 case MPLS_OP_SWAP: 901 return ("SWAP"); 902 case MPLS_OP_PUSH: 903 return ("PUSH"); 904 default: 905 return ("?"); 906 } 907 } 908 909 char * 910 label_print(struct sockaddr *in, struct sockaddr *out) 911 { 912 struct sockaddr_mpls *insmpls = (struct sockaddr_mpls *)in; 913 struct sockaddr_mpls *outsmpls = (struct sockaddr_mpls *)out; 914 char *in_label; 915 char *out_label; 916 917 if (asprintf(&in_label, "%u", 918 ntohl(insmpls->smpls_label) >> MPLS_LABEL_OFFSET) == -1) 919 err(1, NULL); 920 921 if (outsmpls) { 922 if (asprintf(&out_label, "%u", 923 ntohl(outsmpls->smpls_label) >> MPLS_LABEL_OFFSET) == -1) 924 err(1, NULL); 925 } else { 926 if (asprintf(&out_label, "-") == -1) 927 err(1, NULL); 928 } 929 930 (void)snprintf(line, sizeof(line), "%-16s %-10s", in_label, 931 out_label); 932 933 free(in_label); 934 free(out_label); 935 936 return (line); 937 } 938 939 void 940 index_pfk(struct sadb_msg *msg, void **headers) 941 { 942 struct sadb_ext *ext; 943 944 for (ext = (struct sadb_ext *)(msg + 1); 945 (size_t)((u_int8_t *)ext - (u_int8_t *)msg) < 946 msg->sadb_msg_len * PFKEYV2_CHUNK && ext->sadb_ext_len > 0; 947 ext = (struct sadb_ext *)((u_int8_t *)ext + 948 ext->sadb_ext_len * PFKEYV2_CHUNK)) { 949 switch (ext->sadb_ext_type) { 950 case SADB_EXT_ADDRESS_SRC: 951 headers[SADB_EXT_ADDRESS_SRC] = (void *)ext; 952 break; 953 case SADB_EXT_ADDRESS_DST: 954 headers[SADB_EXT_ADDRESS_DST] = (void *)ext; 955 break; 956 case SADB_X_EXT_PROTOCOL: 957 headers[SADB_X_EXT_PROTOCOL] = (void *)ext; 958 break; 959 case SADB_X_EXT_SRC_FLOW: 960 headers[SADB_X_EXT_SRC_FLOW] = (void *)ext; 961 break; 962 case SADB_X_EXT_DST_FLOW: 963 headers[SADB_X_EXT_DST_FLOW] = (void *)ext; 964 break; 965 case SADB_X_EXT_SRC_MASK: 966 headers[SADB_X_EXT_SRC_MASK] = (void *)ext; 967 break; 968 case SADB_X_EXT_DST_MASK: 969 headers[SADB_X_EXT_DST_MASK] = (void *)ext; 970 break; 971 case SADB_X_EXT_FLOW_TYPE: 972 headers[SADB_X_EXT_FLOW_TYPE] = (void *)ext; 973 default: 974 /* Ignore. */ 975 break; 976 } 977 } 978 } 979