xref: /openbsd/usr.bin/netstat/show.c (revision 891d7ab6)
1 /*	$OpenBSD: show.c,v 1.34 2010/10/11 12:33:36 claudio Exp $	*/
2 /*	$NetBSD: show.c,v 1.1 1996/11/15 18:01:41 gwr Exp $	*/
3 
4 /*
5  * Copyright (c) 1983, 1988, 1993
6  *	The Regents of the University of California.  All rights reserved.
7  *
8  * Redistribution and use in source and binary forms, with or without
9  * modification, are permitted provided that the following conditions
10  * are met:
11  * 1. Redistributions of source code must retain the above copyright
12  *    notice, this list of conditions and the following disclaimer.
13  * 2. Redistributions in binary form must reproduce the above copyright
14  *    notice, this list of conditions and the following disclaimer in the
15  *    documentation and/or other materials provided with the distribution.
16  * 3. Neither the name of the University nor the names of its contributors
17  *    may be used to endorse or promote products derived from this software
18  *    without specific prior written permission.
19  *
20  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
21  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
22  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
24  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
25  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
30  * SUCH DAMAGE.
31  */
32 
33 #include <sys/param.h>
34 #include <sys/protosw.h>
35 #include <sys/socket.h>
36 #include <sys/mbuf.h>
37 #include <sys/sysctl.h>
38 
39 #include <net/if.h>
40 #include <net/if_dl.h>
41 #include <net/if_types.h>
42 #include <net/pfkeyv2.h>
43 #include <net/route.h>
44 #include <netinet/in.h>
45 #include <netinet/if_ether.h>
46 #include <netinet/ip_ipsp.h>
47 #include <netmpls/mpls.h>
48 #include <arpa/inet.h>
49 
50 #include <err.h>
51 #include <errno.h>
52 #include <netdb.h>
53 #include <stdio.h>
54 #include <stddef.h>
55 #include <stdlib.h>
56 #include <string.h>
57 #include <unistd.h>
58 
59 #include "netstat.h"
60 
61 char	*any_ntoa(const struct sockaddr *);
62 char	*link_print(struct sockaddr *);
63 char	*label_print(struct sockaddr *);
64 
65 #define ROUNDUP(a) \
66 	((a) > 0 ? (1 + (((a) - 1) | (sizeof(long) - 1))) : sizeof(long))
67 #define ADVANCE(x, n) (x += ROUNDUP((n)->sa_len))
68 
69 #define PFKEYV2_CHUNK sizeof(u_int64_t)
70 
71 /*
72  * Definitions for showing gateway flags.
73  */
74 struct bits {
75 	int	b_mask;
76 	char	b_val;
77 };
78 static const struct bits bits[] = {
79 	{ RTF_UP,	'U' },
80 	{ RTF_GATEWAY,	'G' },
81 	{ RTF_HOST,	'H' },
82 	{ RTF_REJECT,	'R' },
83 	{ RTF_BLACKHOLE, 'B' },
84 	{ RTF_DYNAMIC,	'D' },
85 	{ RTF_MODIFIED,	'M' },
86 	{ RTF_DONE,	'd' }, /* Completed -- for routing messages only */
87 	{ RTF_MASK,	'm' }, /* Mask Present -- for routing messages only */
88 	{ RTF_CLONING,	'C' },
89 	{ RTF_XRESOLVE,	'X' },
90 	{ RTF_LLINFO,	'L' },
91 	{ RTF_STATIC,	'S' },
92 	{ RTF_PROTO1,	'1' },
93 	{ RTF_PROTO2,	'2' },
94 	{ RTF_PROTO3,	'3' },
95 	{ RTF_CLONED,	'c' },
96 	{ RTF_JUMBO,	'J' },
97 	{ RTF_MPATH,	'P' },
98 	{ RTF_MPLS,	'T' },
99 	{ 0 }
100 };
101 
102 void	 p_rtentry(struct rt_msghdr *);
103 void	 p_pfkentry(struct sadb_msg *);
104 void	 pr_family(int);
105 void	 p_encap(struct sockaddr *, struct sockaddr *, int);
106 void	 p_protocol(struct sadb_protocol *, struct sockaddr *, struct
107 	     sadb_protocol *, int);
108 void	 p_sockaddr(struct sockaddr *, struct sockaddr *, int, int);
109 void	 p_sockaddr_mpls(struct sockaddr *, struct sockaddr *, int, int);
110 void	 p_flags(int, char *);
111 char	*routename4(in_addr_t);
112 char	*routename6(struct sockaddr_in6 *);
113 void	 index_pfk(struct sadb_msg *, void **);
114 
115 /*
116  * Print routing tables.
117  */
118 void
119 p_rttables(int af, u_int tableid, int hastable)
120 {
121 	struct rt_msghdr *rtm;
122 	struct sadb_msg *msg;
123 	char *buf = NULL, *next, *lim = NULL;
124 	size_t needed;
125 	int mib[7], mcnt;
126 	struct sockaddr *sa;
127 
128 	mib[0] = CTL_NET;
129 	mib[1] = PF_ROUTE;
130 	mib[2] = 0;
131 	mib[3] = af;
132 	mib[4] = NET_RT_DUMP;
133 	mib[5] = 0;
134 	if (hastable) {
135 		mib[6] = tableid;
136 		mcnt = 7;
137 	} else
138 		mcnt = 6;
139 
140 	if (sysctl(mib, mcnt, NULL, &needed, NULL, 0) < 0)
141 		err(1, "route-sysctl-estimate");
142 	if (needed > 0) {
143 		if ((buf = malloc(needed)) == 0)
144 			err(1, NULL);
145 		if (sysctl(mib, mcnt, buf, &needed, NULL, 0) < 0)
146 			err(1, "sysctl of routing table");
147 		lim = buf + needed;
148 	}
149 
150 	printf("Routing tables\n");
151 
152 	if (buf) {
153 		for (next = buf; next < lim; next += rtm->rtm_msglen) {
154 			rtm = (struct rt_msghdr *)next;
155 			if (rtm->rtm_version != RTM_VERSION)
156 				continue;
157 			sa = (struct sockaddr *)(next + rtm->rtm_hdrlen);
158 			if (af != AF_UNSPEC && sa->sa_family != af)
159 				continue;
160 			p_rtentry(rtm);
161 		}
162 		free(buf);
163 		buf = NULL;
164 	}
165 
166 	if (af != 0 && af != PF_KEY)
167 		return;
168 
169 	mib[0] = CTL_NET;
170 	mib[1] = PF_KEY;
171 	mib[2] = PF_KEY_V2;
172 	mib[3] = NET_KEY_SPD_DUMP;
173 	mib[4] = mib[5] = 0;
174 
175 	if (sysctl(mib, 4, NULL, &needed, NULL, 0) == -1) {
176 		if (errno == ENOPROTOOPT)
177 			return;
178 		err(1, "spd-sysctl-estimate");
179 	}
180 	if (needed > 0) {
181 		if ((buf = malloc(needed)) == 0)
182 			err(1, NULL);
183 		if (sysctl(mib, 4, buf, &needed, NULL, 0) == -1)
184 			err(1,"sysctl of spd");
185 		lim = buf + needed;
186 	}
187 
188 	if (buf) {
189 		printf("\nEncap:\n");
190 
191 		for (next = buf; next < lim; next += msg->sadb_msg_len *
192 		    PFKEYV2_CHUNK) {
193 			msg = (struct sadb_msg *)next;
194 			if (msg->sadb_msg_len == 0)
195 				break;
196 			p_pfkentry(msg);
197 		}
198 		free(buf);
199 		buf = NULL;
200 	}
201 }
202 
203 /*
204  * column widths; each followed by one space
205  * width of destination/gateway column
206  * strlen("fe80::aaaa:bbbb:cccc:dddd@gif0") == 30, strlen("/128") == 4
207  */
208 #define	WID_GW(af)	((af) == AF_INET6 ? (nflag ? 30 : 18) : 18)
209 
210 int
211 WID_DST(int af)
212 {
213 
214 	if (nflag)
215 		switch (af) {
216 		case AF_MPLS:
217 			return 9;
218 		case AF_INET6:
219 			return 34;
220 		default:
221 			return 18;
222 		}
223 	else
224 		switch (af) {
225 		case AF_MPLS:
226 			return 9;
227  		default:
228 			return 18;
229 		}
230 }
231 
232 /*
233  * Print header for routing table columns.
234  */
235 void
236 pr_rthdr(int af, int Aflag)
237 {
238 	if (Aflag)
239 		printf("%-*.*s ", PLEN, PLEN, "Address");
240 	switch (af) {
241 	case PF_KEY:
242 		printf("%-18s %-5s %-18s %-5s %-5s %-22s\n",
243 		    "Source", "Port", "Destination",
244 		    "Port", "Proto", "SA(Address/Proto/Type/Direction)");
245 		break;
246 	case PF_MPLS:
247 		printf("%-9s %-9s %-6s %-18s %-6.6s %5.5s %8.8s %5.5s  %4.4s %s\n",
248 		    "In label", "Out label", "Op", "Gateway",
249 		    "Flags", "Refs", "Use", "Mtu", "Prio", "Interface");
250 		break;
251 	default:
252 		printf("%-*.*s %-*.*s %-6.6s %5.5s %8.8s %5.5s  %4.4s %s",
253 		    WID_DST(af), WID_DST(af), "Destination",
254 		    WID_GW(af), WID_GW(af), "Gateway",
255 		    "Flags", "Refs", "Use", "Mtu", "Prio", "Iface");
256 		if (vflag && !Aflag)
257 			printf(" %s", "Label");
258 		putchar('\n');
259 		break;
260 	}
261 }
262 
263 static void
264 get_rtaddrs(int addrs, struct sockaddr *sa, struct sockaddr **rti_info)
265 {
266 	int	i;
267 
268 	for (i = 0; i < RTAX_MAX; i++) {
269 		if (addrs & (1 << i)) {
270 			rti_info[i] = sa;
271 			sa = (struct sockaddr *)((char *)(sa) +
272 			    ROUNDUP(sa->sa_len));
273 		} else
274 			rti_info[i] = NULL;
275 	}
276 }
277 
278 /*
279  * Print a routing table entry.
280  */
281 void
282 p_rtentry(struct rt_msghdr *rtm)
283 {
284 	static int	 old_af = -1;
285 	struct sockaddr	*sa = (struct sockaddr *)((char *)rtm + rtm->rtm_hdrlen);
286 	struct sockaddr	*mask, *rti_info[RTAX_MAX];
287 	char		 ifbuf[IF_NAMESIZE];
288 
289 	if (sa->sa_family == AF_KEY)
290 		return;
291 
292 	get_rtaddrs(rtm->rtm_addrs, sa, rti_info);
293 	if (Fflag && rti_info[RTAX_GATEWAY]->sa_family != sa->sa_family) {
294 		return;
295 	}
296 	if (old_af != sa->sa_family) {
297 		old_af = sa->sa_family;
298 		pr_family(sa->sa_family);
299 		pr_rthdr(sa->sa_family, 0);
300 	}
301 
302 	mask = rti_info[RTAX_NETMASK];
303 	if ((sa = rti_info[RTAX_DST]) == NULL)
304 		return;
305 
306 	p_sockaddr(sa, mask, rtm->rtm_flags, WID_DST(sa->sa_family));
307 	p_sockaddr_mpls(sa, rti_info[RTAX_SRC], rtm->rtm_mpls,
308 	    WID_DST(sa->sa_family));
309 
310 	p_sockaddr(rti_info[RTAX_GATEWAY], NULL, RTF_HOST,
311 	    WID_GW(sa->sa_family));
312 
313 	p_flags(rtm->rtm_flags, "%-6.6s ");
314 	printf("%5u %8llu ", rtm->rtm_rmx.rmx_refcnt,
315 	    rtm->rtm_rmx.rmx_pksent);
316 	if (rtm->rtm_rmx.rmx_mtu)
317 		printf("%5u ", rtm->rtm_rmx.rmx_mtu);
318 	else
319 		printf("%5s ", "-");
320 	putchar((rtm->rtm_rmx.rmx_locks & RTV_MTU) ? 'L' : ' ');
321 	printf("  %2d %-5.16s", rtm->rtm_priority,
322 	    if_indextoname(rtm->rtm_index, ifbuf));
323 	if (vflag && rti_info[RTAX_LABEL])
324 		printf(" %s", ((struct sockaddr_rtlabel *)
325 		    rti_info[RTAX_LABEL])->sr_label);
326 	putchar('\n');
327 }
328 
329 /*
330  * Print a pfkey/encap entry.
331  */
332 void
333 p_pfkentry(struct sadb_msg *msg)
334 {
335 	static int		 old = 0;
336 	struct sadb_address	*saddr;
337 	struct sadb_protocol	*sap, *saft;
338 	struct sockaddr		*sa, *mask;
339 	void			*headers[SADB_EXT_MAX + 1];
340 
341 	if (!old) {
342 		pr_rthdr(PF_KEY, 0);
343 		old++;
344 	}
345 
346 	bzero(headers, sizeof(headers));
347 	index_pfk(msg, headers);
348 
349 	/* These are always set */
350 	saddr = headers[SADB_X_EXT_SRC_FLOW];
351 	sa = (struct sockaddr *)(saddr + 1);
352 	saddr = headers[SADB_X_EXT_SRC_MASK];
353 	mask = (struct sockaddr *)(saddr + 1);
354 	p_encap(sa, mask, WID_DST(sa->sa_family));
355 
356 	/* These are always set, too. */
357 	saddr = headers[SADB_X_EXT_DST_FLOW];
358 	sa = (struct sockaddr *)(saddr + 1);
359 	saddr = headers[SADB_X_EXT_DST_MASK];
360 	mask = (struct sockaddr *)(saddr + 1);
361 	p_encap(sa, mask, WID_DST(sa->sa_family));
362 
363 	/* Bypass and deny flows do not set SADB_EXT_ADDRESS_DST! */
364 	sap = headers[SADB_X_EXT_PROTOCOL];
365 	saft = headers[SADB_X_EXT_FLOW_TYPE];
366 	saddr = headers[SADB_EXT_ADDRESS_DST];
367 	if (saddr)
368 		sa = (struct sockaddr *)(saddr + 1);
369 	else
370 		sa = NULL;
371 	p_protocol(sap, sa, saft, msg->sadb_msg_satype);
372 
373 	printf("\n");
374 }
375 
376 /*
377  * Print address family header before a section of the routing table.
378  */
379 void
380 pr_family(int af)
381 {
382 	char *afname;
383 
384 	switch (af) {
385 	case AF_INET:
386 		afname = "Internet";
387 		break;
388 	case AF_INET6:
389 		afname = "Internet6";
390 		break;
391 	case PF_KEY:
392 		afname = "Encap";
393 		break;
394 	case AF_MPLS:
395 		afname = "MPLS";
396 		break;
397 	case AF_APPLETALK:
398 		afname = "AppleTalk";
399 		break;
400 	default:
401 		afname = NULL;
402 		break;
403 	}
404 	if (afname)
405 		printf("\n%s:\n", afname);
406 	else
407 		printf("\nProtocol Family %d:\n", af);
408 }
409 
410 void
411 p_addr(struct sockaddr *sa, struct sockaddr *mask, int flags)
412 {
413 	p_sockaddr(sa, mask, flags, WID_DST(sa->sa_family));
414 }
415 
416 void
417 p_gwaddr(struct sockaddr *sa, int af)
418 {
419 	p_sockaddr(sa, 0, RTF_HOST, WID_GW(af));
420 }
421 
422 void
423 p_encap(struct sockaddr *sa, struct sockaddr *mask, int width)
424 {
425 	char		*cp;
426 	unsigned short	 port = 0;
427 
428 	if (mask)
429 		cp = netname(sa, mask);
430 	else
431 		cp = routename(sa);
432 	switch (sa->sa_family) {
433 	case AF_INET:
434 		port = ntohs(((struct sockaddr_in *)sa)->sin_port);
435 		break;
436 	case AF_INET6:
437 		port = ntohs(((struct sockaddr_in6 *)sa)->sin6_port);
438 		break;
439 	}
440 	if (width < 0)
441 		printf("%s", cp);
442 	else {
443 		if (nflag)
444 			printf("%-*s %-5u ", width, cp, port);
445 		else
446 			printf("%-*.*s %-5u ", width, width, cp, port);
447 	}
448 }
449 
450 void
451 p_protocol(struct sadb_protocol *sap, struct sockaddr *sa, struct sadb_protocol
452     *saft, int proto)
453 {
454 	printf("%-6u", sap->sadb_protocol_proto);
455 
456 	if (sa)
457 		p_sockaddr(sa, NULL, 0, -1);
458 	else
459 		printf("none");
460 
461 	switch (proto) {
462 	case SADB_SATYPE_ESP:
463 		printf("/esp");
464 		break;
465 	case SADB_SATYPE_AH:
466 		printf("/ah");
467 		break;
468 	case SADB_X_SATYPE_IPCOMP:
469 		printf("/ipcomp");
470 		break;
471 	case SADB_X_SATYPE_IPIP:
472 		printf("/ipip");
473 		break;
474 	default:
475 		printf("/<unknown>");
476 	}
477 
478 	switch(saft->sadb_protocol_proto) {
479 	case SADB_X_FLOW_TYPE_USE:
480 		printf("/use");
481 		break;
482 	case SADB_X_FLOW_TYPE_REQUIRE:
483 		printf("/require");
484 		break;
485 	case SADB_X_FLOW_TYPE_ACQUIRE:
486 		printf("/acquire");
487 		break;
488 	case SADB_X_FLOW_TYPE_DENY:
489 		printf("/deny");
490 		break;
491 	case SADB_X_FLOW_TYPE_BYPASS:
492 		printf("/bypass");
493 		break;
494 	case SADB_X_FLOW_TYPE_DONTACQ:
495 		printf("/dontacq");
496 		break;
497 	default:
498 		printf("/<unknown type>");
499 	}
500 
501 	switch(saft->sadb_protocol_direction) {
502 	case IPSP_DIRECTION_IN:
503 		printf("/in");
504 		break;
505 	case IPSP_DIRECTION_OUT:
506 		printf("/out");
507 		break;
508 	default:
509 		printf("/<unknown>");
510 	}
511 }
512 
513 void
514 p_sockaddr(struct sockaddr *sa, struct sockaddr *mask, int flags, int width)
515 {
516 	char *cp;
517 
518 	switch (sa->sa_family) {
519 	case AF_INET6:
520 	    {
521 		struct sockaddr_in6 *sa6 = (struct sockaddr_in6 *)sa;
522 		struct in6_addr *in6 = &sa6->sin6_addr;
523 
524 		/*
525 		 * XXX: This is a special workaround for KAME kernels.
526 		 * sin6_scope_id field of SA should be set in the future.
527 		 */
528 		if (IN6_IS_ADDR_LINKLOCAL(in6) ||
529 		    IN6_IS_ADDR_MC_LINKLOCAL(in6) ||
530 		    IN6_IS_ADDR_MC_INTFACELOCAL(in6)) {
531 			/* XXX: override is ok? */
532 			sa6->sin6_scope_id = (u_int32_t)ntohs(*(u_short *)
533 			    &in6->s6_addr[2]);
534 			*(u_short *)&in6->s6_addr[2] = 0;
535 		}
536 		if (flags & RTF_HOST)
537 			cp = routename((struct sockaddr *)sa6);
538 		else
539 			cp = netname((struct sockaddr *)sa6, mask);
540 		break;
541 	    }
542 	case AF_MPLS:
543 		return;
544 	default:
545 		if ((flags & RTF_HOST) || mask == NULL)
546 			cp = routename(sa);
547 		else
548 			cp = netname(sa, mask);
549 		break;
550 	}
551 	if (width < 0)
552 		printf("%s", cp);
553 	else {
554 		if (nflag)
555 			printf("%-*s ", width, cp);
556 		else
557 			printf("%-*.*s ", width, width, cp);
558 	}
559 }
560 
561 static char line[MAXHOSTNAMELEN];
562 static char domain[MAXHOSTNAMELEN];
563 
564 void
565 p_sockaddr_mpls(struct sockaddr *in, struct sockaddr *out, int flags, int width)
566 {
567 	if (in->sa_family != AF_MPLS)
568 		return;
569 
570 	if (flags & MPLS_OP_POP || flags == MPLS_OP_LOCAL) {
571 		printf("%-*s ", width, label_print(in));
572 		printf("%-*s ", width, label_print(NULL));
573 	} else {
574 		printf("%-*s ", width, label_print(in));
575 		printf("%-*s ", width, label_print(out));
576 	}
577 
578 	printf("%-6s ", mpls_op(flags));
579 }
580 
581 void
582 p_flags(int f, char *format)
583 {
584 	char name[33], *flags;
585 	const struct bits *p = bits;
586 
587 	for (flags = name; p->b_mask && flags < &name[sizeof(name) - 2]; p++)
588 		if (p->b_mask & f)
589 			*flags++ = p->b_val;
590 	*flags = '\0';
591 	printf(format, name);
592 }
593 
594 char *
595 routename(struct sockaddr *sa)
596 {
597 	char *cp = NULL;
598 	static int first = 1;
599 
600 	if (first) {
601 		first = 0;
602 		if (gethostname(domain, sizeof(domain)) == 0 &&
603 		    (cp = strchr(domain, '.')))
604 			(void)strlcpy(domain, cp + 1, sizeof(domain));
605 		else
606 			domain[0] = '\0';
607 		cp = NULL;
608 	}
609 
610 	if (sa->sa_len == 0) {
611 		(void)strlcpy(line, "default", sizeof(line));
612 		return (line);
613 	}
614 
615 	switch (sa->sa_family) {
616 	case AF_INET:
617 		return
618 		    (routename4(((struct sockaddr_in *)sa)->sin_addr.s_addr));
619 
620 	case AF_INET6:
621 	    {
622 		struct sockaddr_in6 sin6;
623 
624 		memset(&sin6, 0, sizeof(sin6));
625 		memcpy(&sin6, sa, sa->sa_len);
626 		sin6.sin6_len = sizeof(struct sockaddr_in6);
627 		sin6.sin6_family = AF_INET6;
628 		if (sa->sa_len == sizeof(struct sockaddr_in6) &&
629 		    (IN6_IS_ADDR_LINKLOCAL(&sin6.sin6_addr) ||
630 		     IN6_IS_ADDR_MC_LINKLOCAL(&sin6.sin6_addr) ||
631 		     IN6_IS_ADDR_MC_INTFACELOCAL(&sin6.sin6_addr)) &&
632 		    sin6.sin6_scope_id == 0) {
633 			sin6.sin6_scope_id =
634 			    ntohs(*(u_int16_t *)&sin6.sin6_addr.s6_addr[2]);
635 			sin6.sin6_addr.s6_addr[2] = 0;
636 			sin6.sin6_addr.s6_addr[3] = 0;
637 		}
638 		return (routename6(&sin6));
639 	    }
640 
641 	case AF_LINK:
642 		return (link_print(sa));
643 	case AF_MPLS:
644 		return (label_print(sa));
645 	case AF_UNSPEC:
646 		if (sa->sa_len == sizeof(struct sockaddr_rtlabel)) {
647 			static char name[RTLABEL_LEN];
648 			struct sockaddr_rtlabel *sr;
649 
650 			sr = (struct sockaddr_rtlabel *)sa;
651 			(void)strlcpy(name, sr->sr_label, sizeof(name));
652 			return (name);
653 		}
654 		/* FALLTHROUGH */
655 	default:
656 		(void)snprintf(line, sizeof(line), "(%d) %s",
657 		    sa->sa_family, any_ntoa(sa));
658 		break;
659 	}
660 	return (line);
661 }
662 
663 char *
664 routename4(in_addr_t in)
665 {
666 	char		*cp = NULL;
667 	struct in_addr	 ina;
668 	struct hostent	*hp;
669 
670 	if (in == INADDR_ANY)
671 		cp = "default";
672 	if (!cp && !nflag) {
673 		if ((hp = gethostbyaddr((char *)&in,
674 		    sizeof(in), AF_INET)) != NULL) {
675 			if ((cp = strchr(hp->h_name, '.')) &&
676 			    !strcmp(cp + 1, domain))
677 				*cp = '\0';
678 			cp = hp->h_name;
679 		}
680 	}
681 	ina.s_addr = in;
682 	strlcpy(line, cp ? cp : inet_ntoa(ina), sizeof(line));
683 
684 	return (line);
685 }
686 
687 char *
688 routename6(struct sockaddr_in6 *sin6)
689 {
690 	int	 niflags = 0;
691 
692 	if (nflag)
693 		niflags |= NI_NUMERICHOST;
694 	else
695 		niflags |= NI_NOFQDN;
696 
697 	if (getnameinfo((struct sockaddr *)sin6, sin6->sin6_len,
698 	    line, sizeof(line), NULL, 0, niflags) != 0)
699 		strncpy(line, "invalid", sizeof(line));
700 
701 	return (line);
702 }
703 
704 /*
705  * Return the name of the network whose address is given.
706  * The address is assumed to be that of a net or subnet, not a host.
707  */
708 char *
709 netname4(in_addr_t in, in_addr_t mask)
710 {
711 	char *cp = NULL;
712 	struct netent *np = NULL;
713 	int mbits;
714 
715 	in = ntohl(in);
716 	mask = ntohl(mask);
717 	if (!nflag && in != INADDR_ANY) {
718 		if ((np = getnetbyaddr(in, AF_INET)) != NULL)
719 			cp = np->n_name;
720 	}
721 	if (in == INADDR_ANY && mask == INADDR_ANY)
722 		cp = "default";
723 	mbits = mask ? 33 - ffs(mask) : 0;
724 	if (cp)
725 		strlcpy(line, cp, sizeof(line));
726 #define C(x)	((x) & 0xff)
727 	else if (mbits < 9)
728 		snprintf(line, sizeof(line), "%u/%d", C(in >> 24), mbits);
729 	else if (mbits < 17)
730 		snprintf(line, sizeof(line), "%u.%u/%d",
731 		    C(in >> 24) , C(in >> 16), mbits);
732 	else if (mbits < 25)
733 		snprintf(line, sizeof(line), "%u.%u.%u/%d",
734 		    C(in >> 24), C(in >> 16), C(in >> 8), mbits);
735 	else
736 		snprintf(line, sizeof(line), "%u.%u.%u.%u/%d", C(in >> 24),
737 		    C(in >> 16), C(in >> 8), C(in), mbits);
738 #undef C
739 	return (line);
740 }
741 
742 char *
743 netname6(struct sockaddr_in6 *sa6, struct sockaddr_in6 *mask)
744 {
745 	struct sockaddr_in6 sin6;
746 	u_char *p;
747 	int masklen, final = 0, illegal = 0;
748 	int i, lim, flag, error;
749 	char hbuf[NI_MAXHOST];
750 
751 	sin6 = *sa6;
752 
753 	flag = 0;
754 	masklen = 0;
755 	if (mask) {
756 		lim = mask->sin6_len - offsetof(struct sockaddr_in6, sin6_addr);
757 		lim = lim < (int)sizeof(struct in6_addr) ?
758 		    lim : sizeof(struct in6_addr);
759 		for (p = (u_char *)&mask->sin6_addr, i = 0; i < lim; p++) {
760 			if (final && *p) {
761 				illegal++;
762 				sin6.sin6_addr.s6_addr[i++] = 0x00;
763 				continue;
764 			}
765 
766 			switch (*p & 0xff) {
767 			case 0xff:
768 				masklen += 8;
769 				break;
770 			case 0xfe:
771 				masklen += 7;
772 				final++;
773 				break;
774 			case 0xfc:
775 				masklen += 6;
776 				final++;
777 				break;
778 			case 0xf8:
779 				masklen += 5;
780 				final++;
781 				break;
782 			case 0xf0:
783 				masklen += 4;
784 				final++;
785 				break;
786 			case 0xe0:
787 				masklen += 3;
788 				final++;
789 				break;
790 			case 0xc0:
791 				masklen += 2;
792 				final++;
793 				break;
794 			case 0x80:
795 				masklen += 1;
796 				final++;
797 				break;
798 			case 0x00:
799 				final++;
800 				break;
801 			default:
802 				final++;
803 				illegal++;
804 				break;
805 			}
806 
807 			if (!illegal)
808 				sin6.sin6_addr.s6_addr[i++] &= *p;
809 			else
810 				sin6.sin6_addr.s6_addr[i++] = 0x00;
811 		}
812 		while (i < sizeof(struct in6_addr))
813 			sin6.sin6_addr.s6_addr[i++] = 0x00;
814 	} else
815 		masklen = 128;
816 
817 	if (masklen == 0 && IN6_IS_ADDR_UNSPECIFIED(&sin6.sin6_addr))
818 		return ("default");
819 
820 	if (illegal)
821 		warnx("illegal prefixlen");
822 
823 	if (nflag)
824 		flag |= NI_NUMERICHOST;
825 	error = getnameinfo((struct sockaddr *)&sin6, sin6.sin6_len,
826 	    hbuf, sizeof(hbuf), NULL, 0, flag);
827 	if (error)
828 		snprintf(hbuf, sizeof(hbuf), "invalid");
829 
830 	snprintf(line, sizeof(line), "%s/%d", hbuf, masklen);
831 	return (line);
832 }
833 
834 /*
835  * Return the name of the network whose address is given.
836  * The address is assumed to be that of a net or subnet, not a host.
837  */
838 char *
839 netname(struct sockaddr *sa, struct sockaddr *mask)
840 {
841 	switch (sa->sa_family) {
842 	case AF_INET:
843 		return netname4(((struct sockaddr_in *)sa)->sin_addr.s_addr,
844 		    mask->sa_len == 0 ? 0 :
845 		    ((struct sockaddr_in *)mask)->sin_addr.s_addr);
846 	case AF_INET6:
847 		return netname6((struct sockaddr_in6 *)sa,
848 		    (struct sockaddr_in6 *)mask);
849 	case AF_LINK:
850 		return (link_print(sa));
851 	case AF_MPLS:
852 		return (label_print(sa));
853 	default:
854 		snprintf(line, sizeof(line), "af %d: %s",
855 		    sa->sa_family, any_ntoa(sa));
856 		break;
857 	}
858 	return (line);
859 }
860 
861 static const char hexlist[] = "0123456789abcdef";
862 
863 char *
864 any_ntoa(const struct sockaddr *sa)
865 {
866 	static char obuf[240];
867 	const char *in = sa->sa_data;
868 	char *out = obuf;
869 	int len = sa->sa_len - offsetof(struct sockaddr, sa_data);
870 
871 	*out++ = 'Q';
872 	do {
873 		*out++ = hexlist[(*in >> 4) & 15];
874 		*out++ = hexlist[(*in++)    & 15];
875 		*out++ = '.';
876 	} while (--len > 0 && (out + 3) < &obuf[sizeof(obuf) - 1]);
877 	out[-1] = '\0';
878 	return (obuf);
879 }
880 
881 char *
882 link_print(struct sockaddr *sa)
883 {
884 	struct sockaddr_dl	*sdl = (struct sockaddr_dl *)sa;
885 	u_char			*lla = (u_char *)sdl->sdl_data + sdl->sdl_nlen;
886 
887 	if (sdl->sdl_nlen == 0 && sdl->sdl_alen == 0 &&
888 	    sdl->sdl_slen == 0) {
889 		(void)snprintf(line, sizeof(line), "link#%d", sdl->sdl_index);
890 		return (line);
891 	}
892 	switch (sdl->sdl_type) {
893 	case IFT_ETHER:
894 	case IFT_CARP:
895 		return (ether_ntoa((struct ether_addr *)lla));
896 	default:
897 		return (link_ntoa(sdl));
898 	}
899 }
900 
901 char *
902 mpls_op(u_int32_t type)
903 {
904 	switch (type & (MPLS_OP_PUSH | MPLS_OP_POP | MPLS_OP_SWAP)) {
905 	case MPLS_OP_LOCAL:
906 		return ("LOCAL");
907 	case MPLS_OP_POP:
908 		return ("POP");
909 	case MPLS_OP_SWAP:
910 		return ("SWAP");
911 	case MPLS_OP_PUSH:
912 		return ("PUSH");
913 	default:
914 		return ("?");
915 	}
916 }
917 
918 char *
919 label_print(struct sockaddr *sa)
920 {
921 	struct sockaddr_mpls	*smpls = (struct sockaddr_mpls *)sa;
922 
923 	if (smpls)
924 		(void)snprintf(line, sizeof(line), "%u",
925 		    ntohl(smpls->smpls_label) >> MPLS_LABEL_OFFSET);
926 	else
927 		(void)snprintf(line, sizeof(line), "-");
928 
929 	return (line);
930 }
931 
932 void
933 index_pfk(struct sadb_msg *msg, void **headers)
934 {
935 	struct sadb_ext	*ext;
936 
937 	for (ext = (struct sadb_ext *)(msg + 1);
938 	    (size_t)((u_int8_t *)ext - (u_int8_t *)msg) <
939 	    msg->sadb_msg_len * PFKEYV2_CHUNK && ext->sadb_ext_len > 0;
940 	    ext = (struct sadb_ext *)((u_int8_t *)ext +
941 	    ext->sadb_ext_len * PFKEYV2_CHUNK)) {
942 		switch (ext->sadb_ext_type) {
943 		case SADB_EXT_ADDRESS_SRC:
944 			headers[SADB_EXT_ADDRESS_SRC] = (void *)ext;
945 			break;
946 		case SADB_EXT_ADDRESS_DST:
947 			headers[SADB_EXT_ADDRESS_DST] = (void *)ext;
948 			break;
949 		case SADB_X_EXT_PROTOCOL:
950 			headers[SADB_X_EXT_PROTOCOL] = (void *)ext;
951 			break;
952 		case SADB_X_EXT_SRC_FLOW:
953 			headers[SADB_X_EXT_SRC_FLOW] = (void *)ext;
954 			break;
955 		case SADB_X_EXT_DST_FLOW:
956 			headers[SADB_X_EXT_DST_FLOW] = (void *)ext;
957 			break;
958 		case SADB_X_EXT_SRC_MASK:
959 			headers[SADB_X_EXT_SRC_MASK] = (void *)ext;
960 			break;
961 		case SADB_X_EXT_DST_MASK:
962 			headers[SADB_X_EXT_DST_MASK] = (void *)ext;
963 			break;
964 		case SADB_X_EXT_FLOW_TYPE:
965 			headers[SADB_X_EXT_FLOW_TYPE] = (void *)ext;
966 			break;
967 		default:
968 			/* Ignore. */
969 			break;
970 		}
971 	}
972 }
973