1 /* $OpenBSD: show.c,v 1.34 2010/10/11 12:33:36 claudio Exp $ */ 2 /* $NetBSD: show.c,v 1.1 1996/11/15 18:01:41 gwr Exp $ */ 3 4 /* 5 * Copyright (c) 1983, 1988, 1993 6 * The Regents of the University of California. All rights reserved. 7 * 8 * Redistribution and use in source and binary forms, with or without 9 * modification, are permitted provided that the following conditions 10 * are met: 11 * 1. Redistributions of source code must retain the above copyright 12 * notice, this list of conditions and the following disclaimer. 13 * 2. Redistributions in binary form must reproduce the above copyright 14 * notice, this list of conditions and the following disclaimer in the 15 * documentation and/or other materials provided with the distribution. 16 * 3. Neither the name of the University nor the names of its contributors 17 * may be used to endorse or promote products derived from this software 18 * without specific prior written permission. 19 * 20 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 21 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 22 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 23 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 24 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 25 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 26 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 27 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 28 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 29 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 30 * SUCH DAMAGE. 31 */ 32 33 #include <sys/param.h> 34 #include <sys/protosw.h> 35 #include <sys/socket.h> 36 #include <sys/mbuf.h> 37 #include <sys/sysctl.h> 38 39 #include <net/if.h> 40 #include <net/if_dl.h> 41 #include <net/if_types.h> 42 #include <net/pfkeyv2.h> 43 #include <net/route.h> 44 #include <netinet/in.h> 45 #include <netinet/if_ether.h> 46 #include <netinet/ip_ipsp.h> 47 #include <netmpls/mpls.h> 48 #include <arpa/inet.h> 49 50 #include <err.h> 51 #include <errno.h> 52 #include <netdb.h> 53 #include <stdio.h> 54 #include <stddef.h> 55 #include <stdlib.h> 56 #include <string.h> 57 #include <unistd.h> 58 59 #include "netstat.h" 60 61 char *any_ntoa(const struct sockaddr *); 62 char *link_print(struct sockaddr *); 63 char *label_print(struct sockaddr *); 64 65 #define ROUNDUP(a) \ 66 ((a) > 0 ? (1 + (((a) - 1) | (sizeof(long) - 1))) : sizeof(long)) 67 #define ADVANCE(x, n) (x += ROUNDUP((n)->sa_len)) 68 69 #define PFKEYV2_CHUNK sizeof(u_int64_t) 70 71 /* 72 * Definitions for showing gateway flags. 73 */ 74 struct bits { 75 int b_mask; 76 char b_val; 77 }; 78 static const struct bits bits[] = { 79 { RTF_UP, 'U' }, 80 { RTF_GATEWAY, 'G' }, 81 { RTF_HOST, 'H' }, 82 { RTF_REJECT, 'R' }, 83 { RTF_BLACKHOLE, 'B' }, 84 { RTF_DYNAMIC, 'D' }, 85 { RTF_MODIFIED, 'M' }, 86 { RTF_DONE, 'd' }, /* Completed -- for routing messages only */ 87 { RTF_MASK, 'm' }, /* Mask Present -- for routing messages only */ 88 { RTF_CLONING, 'C' }, 89 { RTF_XRESOLVE, 'X' }, 90 { RTF_LLINFO, 'L' }, 91 { RTF_STATIC, 'S' }, 92 { RTF_PROTO1, '1' }, 93 { RTF_PROTO2, '2' }, 94 { RTF_PROTO3, '3' }, 95 { RTF_CLONED, 'c' }, 96 { RTF_JUMBO, 'J' }, 97 { RTF_MPATH, 'P' }, 98 { RTF_MPLS, 'T' }, 99 { 0 } 100 }; 101 102 void p_rtentry(struct rt_msghdr *); 103 void p_pfkentry(struct sadb_msg *); 104 void pr_family(int); 105 void p_encap(struct sockaddr *, struct sockaddr *, int); 106 void p_protocol(struct sadb_protocol *, struct sockaddr *, struct 107 sadb_protocol *, int); 108 void p_sockaddr(struct sockaddr *, struct sockaddr *, int, int); 109 void p_sockaddr_mpls(struct sockaddr *, struct sockaddr *, int, int); 110 void p_flags(int, char *); 111 char *routename4(in_addr_t); 112 char *routename6(struct sockaddr_in6 *); 113 void index_pfk(struct sadb_msg *, void **); 114 115 /* 116 * Print routing tables. 117 */ 118 void 119 p_rttables(int af, u_int tableid, int hastable) 120 { 121 struct rt_msghdr *rtm; 122 struct sadb_msg *msg; 123 char *buf = NULL, *next, *lim = NULL; 124 size_t needed; 125 int mib[7], mcnt; 126 struct sockaddr *sa; 127 128 mib[0] = CTL_NET; 129 mib[1] = PF_ROUTE; 130 mib[2] = 0; 131 mib[3] = af; 132 mib[4] = NET_RT_DUMP; 133 mib[5] = 0; 134 if (hastable) { 135 mib[6] = tableid; 136 mcnt = 7; 137 } else 138 mcnt = 6; 139 140 if (sysctl(mib, mcnt, NULL, &needed, NULL, 0) < 0) 141 err(1, "route-sysctl-estimate"); 142 if (needed > 0) { 143 if ((buf = malloc(needed)) == 0) 144 err(1, NULL); 145 if (sysctl(mib, mcnt, buf, &needed, NULL, 0) < 0) 146 err(1, "sysctl of routing table"); 147 lim = buf + needed; 148 } 149 150 printf("Routing tables\n"); 151 152 if (buf) { 153 for (next = buf; next < lim; next += rtm->rtm_msglen) { 154 rtm = (struct rt_msghdr *)next; 155 if (rtm->rtm_version != RTM_VERSION) 156 continue; 157 sa = (struct sockaddr *)(next + rtm->rtm_hdrlen); 158 if (af != AF_UNSPEC && sa->sa_family != af) 159 continue; 160 p_rtentry(rtm); 161 } 162 free(buf); 163 buf = NULL; 164 } 165 166 if (af != 0 && af != PF_KEY) 167 return; 168 169 mib[0] = CTL_NET; 170 mib[1] = PF_KEY; 171 mib[2] = PF_KEY_V2; 172 mib[3] = NET_KEY_SPD_DUMP; 173 mib[4] = mib[5] = 0; 174 175 if (sysctl(mib, 4, NULL, &needed, NULL, 0) == -1) { 176 if (errno == ENOPROTOOPT) 177 return; 178 err(1, "spd-sysctl-estimate"); 179 } 180 if (needed > 0) { 181 if ((buf = malloc(needed)) == 0) 182 err(1, NULL); 183 if (sysctl(mib, 4, buf, &needed, NULL, 0) == -1) 184 err(1,"sysctl of spd"); 185 lim = buf + needed; 186 } 187 188 if (buf) { 189 printf("\nEncap:\n"); 190 191 for (next = buf; next < lim; next += msg->sadb_msg_len * 192 PFKEYV2_CHUNK) { 193 msg = (struct sadb_msg *)next; 194 if (msg->sadb_msg_len == 0) 195 break; 196 p_pfkentry(msg); 197 } 198 free(buf); 199 buf = NULL; 200 } 201 } 202 203 /* 204 * column widths; each followed by one space 205 * width of destination/gateway column 206 * strlen("fe80::aaaa:bbbb:cccc:dddd@gif0") == 30, strlen("/128") == 4 207 */ 208 #define WID_GW(af) ((af) == AF_INET6 ? (nflag ? 30 : 18) : 18) 209 210 int 211 WID_DST(int af) 212 { 213 214 if (nflag) 215 switch (af) { 216 case AF_MPLS: 217 return 9; 218 case AF_INET6: 219 return 34; 220 default: 221 return 18; 222 } 223 else 224 switch (af) { 225 case AF_MPLS: 226 return 9; 227 default: 228 return 18; 229 } 230 } 231 232 /* 233 * Print header for routing table columns. 234 */ 235 void 236 pr_rthdr(int af, int Aflag) 237 { 238 if (Aflag) 239 printf("%-*.*s ", PLEN, PLEN, "Address"); 240 switch (af) { 241 case PF_KEY: 242 printf("%-18s %-5s %-18s %-5s %-5s %-22s\n", 243 "Source", "Port", "Destination", 244 "Port", "Proto", "SA(Address/Proto/Type/Direction)"); 245 break; 246 case PF_MPLS: 247 printf("%-9s %-9s %-6s %-18s %-6.6s %5.5s %8.8s %5.5s %4.4s %s\n", 248 "In label", "Out label", "Op", "Gateway", 249 "Flags", "Refs", "Use", "Mtu", "Prio", "Interface"); 250 break; 251 default: 252 printf("%-*.*s %-*.*s %-6.6s %5.5s %8.8s %5.5s %4.4s %s", 253 WID_DST(af), WID_DST(af), "Destination", 254 WID_GW(af), WID_GW(af), "Gateway", 255 "Flags", "Refs", "Use", "Mtu", "Prio", "Iface"); 256 if (vflag && !Aflag) 257 printf(" %s", "Label"); 258 putchar('\n'); 259 break; 260 } 261 } 262 263 static void 264 get_rtaddrs(int addrs, struct sockaddr *sa, struct sockaddr **rti_info) 265 { 266 int i; 267 268 for (i = 0; i < RTAX_MAX; i++) { 269 if (addrs & (1 << i)) { 270 rti_info[i] = sa; 271 sa = (struct sockaddr *)((char *)(sa) + 272 ROUNDUP(sa->sa_len)); 273 } else 274 rti_info[i] = NULL; 275 } 276 } 277 278 /* 279 * Print a routing table entry. 280 */ 281 void 282 p_rtentry(struct rt_msghdr *rtm) 283 { 284 static int old_af = -1; 285 struct sockaddr *sa = (struct sockaddr *)((char *)rtm + rtm->rtm_hdrlen); 286 struct sockaddr *mask, *rti_info[RTAX_MAX]; 287 char ifbuf[IF_NAMESIZE]; 288 289 if (sa->sa_family == AF_KEY) 290 return; 291 292 get_rtaddrs(rtm->rtm_addrs, sa, rti_info); 293 if (Fflag && rti_info[RTAX_GATEWAY]->sa_family != sa->sa_family) { 294 return; 295 } 296 if (old_af != sa->sa_family) { 297 old_af = sa->sa_family; 298 pr_family(sa->sa_family); 299 pr_rthdr(sa->sa_family, 0); 300 } 301 302 mask = rti_info[RTAX_NETMASK]; 303 if ((sa = rti_info[RTAX_DST]) == NULL) 304 return; 305 306 p_sockaddr(sa, mask, rtm->rtm_flags, WID_DST(sa->sa_family)); 307 p_sockaddr_mpls(sa, rti_info[RTAX_SRC], rtm->rtm_mpls, 308 WID_DST(sa->sa_family)); 309 310 p_sockaddr(rti_info[RTAX_GATEWAY], NULL, RTF_HOST, 311 WID_GW(sa->sa_family)); 312 313 p_flags(rtm->rtm_flags, "%-6.6s "); 314 printf("%5u %8llu ", rtm->rtm_rmx.rmx_refcnt, 315 rtm->rtm_rmx.rmx_pksent); 316 if (rtm->rtm_rmx.rmx_mtu) 317 printf("%5u ", rtm->rtm_rmx.rmx_mtu); 318 else 319 printf("%5s ", "-"); 320 putchar((rtm->rtm_rmx.rmx_locks & RTV_MTU) ? 'L' : ' '); 321 printf(" %2d %-5.16s", rtm->rtm_priority, 322 if_indextoname(rtm->rtm_index, ifbuf)); 323 if (vflag && rti_info[RTAX_LABEL]) 324 printf(" %s", ((struct sockaddr_rtlabel *) 325 rti_info[RTAX_LABEL])->sr_label); 326 putchar('\n'); 327 } 328 329 /* 330 * Print a pfkey/encap entry. 331 */ 332 void 333 p_pfkentry(struct sadb_msg *msg) 334 { 335 static int old = 0; 336 struct sadb_address *saddr; 337 struct sadb_protocol *sap, *saft; 338 struct sockaddr *sa, *mask; 339 void *headers[SADB_EXT_MAX + 1]; 340 341 if (!old) { 342 pr_rthdr(PF_KEY, 0); 343 old++; 344 } 345 346 bzero(headers, sizeof(headers)); 347 index_pfk(msg, headers); 348 349 /* These are always set */ 350 saddr = headers[SADB_X_EXT_SRC_FLOW]; 351 sa = (struct sockaddr *)(saddr + 1); 352 saddr = headers[SADB_X_EXT_SRC_MASK]; 353 mask = (struct sockaddr *)(saddr + 1); 354 p_encap(sa, mask, WID_DST(sa->sa_family)); 355 356 /* These are always set, too. */ 357 saddr = headers[SADB_X_EXT_DST_FLOW]; 358 sa = (struct sockaddr *)(saddr + 1); 359 saddr = headers[SADB_X_EXT_DST_MASK]; 360 mask = (struct sockaddr *)(saddr + 1); 361 p_encap(sa, mask, WID_DST(sa->sa_family)); 362 363 /* Bypass and deny flows do not set SADB_EXT_ADDRESS_DST! */ 364 sap = headers[SADB_X_EXT_PROTOCOL]; 365 saft = headers[SADB_X_EXT_FLOW_TYPE]; 366 saddr = headers[SADB_EXT_ADDRESS_DST]; 367 if (saddr) 368 sa = (struct sockaddr *)(saddr + 1); 369 else 370 sa = NULL; 371 p_protocol(sap, sa, saft, msg->sadb_msg_satype); 372 373 printf("\n"); 374 } 375 376 /* 377 * Print address family header before a section of the routing table. 378 */ 379 void 380 pr_family(int af) 381 { 382 char *afname; 383 384 switch (af) { 385 case AF_INET: 386 afname = "Internet"; 387 break; 388 case AF_INET6: 389 afname = "Internet6"; 390 break; 391 case PF_KEY: 392 afname = "Encap"; 393 break; 394 case AF_MPLS: 395 afname = "MPLS"; 396 break; 397 case AF_APPLETALK: 398 afname = "AppleTalk"; 399 break; 400 default: 401 afname = NULL; 402 break; 403 } 404 if (afname) 405 printf("\n%s:\n", afname); 406 else 407 printf("\nProtocol Family %d:\n", af); 408 } 409 410 void 411 p_addr(struct sockaddr *sa, struct sockaddr *mask, int flags) 412 { 413 p_sockaddr(sa, mask, flags, WID_DST(sa->sa_family)); 414 } 415 416 void 417 p_gwaddr(struct sockaddr *sa, int af) 418 { 419 p_sockaddr(sa, 0, RTF_HOST, WID_GW(af)); 420 } 421 422 void 423 p_encap(struct sockaddr *sa, struct sockaddr *mask, int width) 424 { 425 char *cp; 426 unsigned short port = 0; 427 428 if (mask) 429 cp = netname(sa, mask); 430 else 431 cp = routename(sa); 432 switch (sa->sa_family) { 433 case AF_INET: 434 port = ntohs(((struct sockaddr_in *)sa)->sin_port); 435 break; 436 case AF_INET6: 437 port = ntohs(((struct sockaddr_in6 *)sa)->sin6_port); 438 break; 439 } 440 if (width < 0) 441 printf("%s", cp); 442 else { 443 if (nflag) 444 printf("%-*s %-5u ", width, cp, port); 445 else 446 printf("%-*.*s %-5u ", width, width, cp, port); 447 } 448 } 449 450 void 451 p_protocol(struct sadb_protocol *sap, struct sockaddr *sa, struct sadb_protocol 452 *saft, int proto) 453 { 454 printf("%-6u", sap->sadb_protocol_proto); 455 456 if (sa) 457 p_sockaddr(sa, NULL, 0, -1); 458 else 459 printf("none"); 460 461 switch (proto) { 462 case SADB_SATYPE_ESP: 463 printf("/esp"); 464 break; 465 case SADB_SATYPE_AH: 466 printf("/ah"); 467 break; 468 case SADB_X_SATYPE_IPCOMP: 469 printf("/ipcomp"); 470 break; 471 case SADB_X_SATYPE_IPIP: 472 printf("/ipip"); 473 break; 474 default: 475 printf("/<unknown>"); 476 } 477 478 switch(saft->sadb_protocol_proto) { 479 case SADB_X_FLOW_TYPE_USE: 480 printf("/use"); 481 break; 482 case SADB_X_FLOW_TYPE_REQUIRE: 483 printf("/require"); 484 break; 485 case SADB_X_FLOW_TYPE_ACQUIRE: 486 printf("/acquire"); 487 break; 488 case SADB_X_FLOW_TYPE_DENY: 489 printf("/deny"); 490 break; 491 case SADB_X_FLOW_TYPE_BYPASS: 492 printf("/bypass"); 493 break; 494 case SADB_X_FLOW_TYPE_DONTACQ: 495 printf("/dontacq"); 496 break; 497 default: 498 printf("/<unknown type>"); 499 } 500 501 switch(saft->sadb_protocol_direction) { 502 case IPSP_DIRECTION_IN: 503 printf("/in"); 504 break; 505 case IPSP_DIRECTION_OUT: 506 printf("/out"); 507 break; 508 default: 509 printf("/<unknown>"); 510 } 511 } 512 513 void 514 p_sockaddr(struct sockaddr *sa, struct sockaddr *mask, int flags, int width) 515 { 516 char *cp; 517 518 switch (sa->sa_family) { 519 case AF_INET6: 520 { 521 struct sockaddr_in6 *sa6 = (struct sockaddr_in6 *)sa; 522 struct in6_addr *in6 = &sa6->sin6_addr; 523 524 /* 525 * XXX: This is a special workaround for KAME kernels. 526 * sin6_scope_id field of SA should be set in the future. 527 */ 528 if (IN6_IS_ADDR_LINKLOCAL(in6) || 529 IN6_IS_ADDR_MC_LINKLOCAL(in6) || 530 IN6_IS_ADDR_MC_INTFACELOCAL(in6)) { 531 /* XXX: override is ok? */ 532 sa6->sin6_scope_id = (u_int32_t)ntohs(*(u_short *) 533 &in6->s6_addr[2]); 534 *(u_short *)&in6->s6_addr[2] = 0; 535 } 536 if (flags & RTF_HOST) 537 cp = routename((struct sockaddr *)sa6); 538 else 539 cp = netname((struct sockaddr *)sa6, mask); 540 break; 541 } 542 case AF_MPLS: 543 return; 544 default: 545 if ((flags & RTF_HOST) || mask == NULL) 546 cp = routename(sa); 547 else 548 cp = netname(sa, mask); 549 break; 550 } 551 if (width < 0) 552 printf("%s", cp); 553 else { 554 if (nflag) 555 printf("%-*s ", width, cp); 556 else 557 printf("%-*.*s ", width, width, cp); 558 } 559 } 560 561 static char line[MAXHOSTNAMELEN]; 562 static char domain[MAXHOSTNAMELEN]; 563 564 void 565 p_sockaddr_mpls(struct sockaddr *in, struct sockaddr *out, int flags, int width) 566 { 567 if (in->sa_family != AF_MPLS) 568 return; 569 570 if (flags & MPLS_OP_POP || flags == MPLS_OP_LOCAL) { 571 printf("%-*s ", width, label_print(in)); 572 printf("%-*s ", width, label_print(NULL)); 573 } else { 574 printf("%-*s ", width, label_print(in)); 575 printf("%-*s ", width, label_print(out)); 576 } 577 578 printf("%-6s ", mpls_op(flags)); 579 } 580 581 void 582 p_flags(int f, char *format) 583 { 584 char name[33], *flags; 585 const struct bits *p = bits; 586 587 for (flags = name; p->b_mask && flags < &name[sizeof(name) - 2]; p++) 588 if (p->b_mask & f) 589 *flags++ = p->b_val; 590 *flags = '\0'; 591 printf(format, name); 592 } 593 594 char * 595 routename(struct sockaddr *sa) 596 { 597 char *cp = NULL; 598 static int first = 1; 599 600 if (first) { 601 first = 0; 602 if (gethostname(domain, sizeof(domain)) == 0 && 603 (cp = strchr(domain, '.'))) 604 (void)strlcpy(domain, cp + 1, sizeof(domain)); 605 else 606 domain[0] = '\0'; 607 cp = NULL; 608 } 609 610 if (sa->sa_len == 0) { 611 (void)strlcpy(line, "default", sizeof(line)); 612 return (line); 613 } 614 615 switch (sa->sa_family) { 616 case AF_INET: 617 return 618 (routename4(((struct sockaddr_in *)sa)->sin_addr.s_addr)); 619 620 case AF_INET6: 621 { 622 struct sockaddr_in6 sin6; 623 624 memset(&sin6, 0, sizeof(sin6)); 625 memcpy(&sin6, sa, sa->sa_len); 626 sin6.sin6_len = sizeof(struct sockaddr_in6); 627 sin6.sin6_family = AF_INET6; 628 if (sa->sa_len == sizeof(struct sockaddr_in6) && 629 (IN6_IS_ADDR_LINKLOCAL(&sin6.sin6_addr) || 630 IN6_IS_ADDR_MC_LINKLOCAL(&sin6.sin6_addr) || 631 IN6_IS_ADDR_MC_INTFACELOCAL(&sin6.sin6_addr)) && 632 sin6.sin6_scope_id == 0) { 633 sin6.sin6_scope_id = 634 ntohs(*(u_int16_t *)&sin6.sin6_addr.s6_addr[2]); 635 sin6.sin6_addr.s6_addr[2] = 0; 636 sin6.sin6_addr.s6_addr[3] = 0; 637 } 638 return (routename6(&sin6)); 639 } 640 641 case AF_LINK: 642 return (link_print(sa)); 643 case AF_MPLS: 644 return (label_print(sa)); 645 case AF_UNSPEC: 646 if (sa->sa_len == sizeof(struct sockaddr_rtlabel)) { 647 static char name[RTLABEL_LEN]; 648 struct sockaddr_rtlabel *sr; 649 650 sr = (struct sockaddr_rtlabel *)sa; 651 (void)strlcpy(name, sr->sr_label, sizeof(name)); 652 return (name); 653 } 654 /* FALLTHROUGH */ 655 default: 656 (void)snprintf(line, sizeof(line), "(%d) %s", 657 sa->sa_family, any_ntoa(sa)); 658 break; 659 } 660 return (line); 661 } 662 663 char * 664 routename4(in_addr_t in) 665 { 666 char *cp = NULL; 667 struct in_addr ina; 668 struct hostent *hp; 669 670 if (in == INADDR_ANY) 671 cp = "default"; 672 if (!cp && !nflag) { 673 if ((hp = gethostbyaddr((char *)&in, 674 sizeof(in), AF_INET)) != NULL) { 675 if ((cp = strchr(hp->h_name, '.')) && 676 !strcmp(cp + 1, domain)) 677 *cp = '\0'; 678 cp = hp->h_name; 679 } 680 } 681 ina.s_addr = in; 682 strlcpy(line, cp ? cp : inet_ntoa(ina), sizeof(line)); 683 684 return (line); 685 } 686 687 char * 688 routename6(struct sockaddr_in6 *sin6) 689 { 690 int niflags = 0; 691 692 if (nflag) 693 niflags |= NI_NUMERICHOST; 694 else 695 niflags |= NI_NOFQDN; 696 697 if (getnameinfo((struct sockaddr *)sin6, sin6->sin6_len, 698 line, sizeof(line), NULL, 0, niflags) != 0) 699 strncpy(line, "invalid", sizeof(line)); 700 701 return (line); 702 } 703 704 /* 705 * Return the name of the network whose address is given. 706 * The address is assumed to be that of a net or subnet, not a host. 707 */ 708 char * 709 netname4(in_addr_t in, in_addr_t mask) 710 { 711 char *cp = NULL; 712 struct netent *np = NULL; 713 int mbits; 714 715 in = ntohl(in); 716 mask = ntohl(mask); 717 if (!nflag && in != INADDR_ANY) { 718 if ((np = getnetbyaddr(in, AF_INET)) != NULL) 719 cp = np->n_name; 720 } 721 if (in == INADDR_ANY && mask == INADDR_ANY) 722 cp = "default"; 723 mbits = mask ? 33 - ffs(mask) : 0; 724 if (cp) 725 strlcpy(line, cp, sizeof(line)); 726 #define C(x) ((x) & 0xff) 727 else if (mbits < 9) 728 snprintf(line, sizeof(line), "%u/%d", C(in >> 24), mbits); 729 else if (mbits < 17) 730 snprintf(line, sizeof(line), "%u.%u/%d", 731 C(in >> 24) , C(in >> 16), mbits); 732 else if (mbits < 25) 733 snprintf(line, sizeof(line), "%u.%u.%u/%d", 734 C(in >> 24), C(in >> 16), C(in >> 8), mbits); 735 else 736 snprintf(line, sizeof(line), "%u.%u.%u.%u/%d", C(in >> 24), 737 C(in >> 16), C(in >> 8), C(in), mbits); 738 #undef C 739 return (line); 740 } 741 742 char * 743 netname6(struct sockaddr_in6 *sa6, struct sockaddr_in6 *mask) 744 { 745 struct sockaddr_in6 sin6; 746 u_char *p; 747 int masklen, final = 0, illegal = 0; 748 int i, lim, flag, error; 749 char hbuf[NI_MAXHOST]; 750 751 sin6 = *sa6; 752 753 flag = 0; 754 masklen = 0; 755 if (mask) { 756 lim = mask->sin6_len - offsetof(struct sockaddr_in6, sin6_addr); 757 lim = lim < (int)sizeof(struct in6_addr) ? 758 lim : sizeof(struct in6_addr); 759 for (p = (u_char *)&mask->sin6_addr, i = 0; i < lim; p++) { 760 if (final && *p) { 761 illegal++; 762 sin6.sin6_addr.s6_addr[i++] = 0x00; 763 continue; 764 } 765 766 switch (*p & 0xff) { 767 case 0xff: 768 masklen += 8; 769 break; 770 case 0xfe: 771 masklen += 7; 772 final++; 773 break; 774 case 0xfc: 775 masklen += 6; 776 final++; 777 break; 778 case 0xf8: 779 masklen += 5; 780 final++; 781 break; 782 case 0xf0: 783 masklen += 4; 784 final++; 785 break; 786 case 0xe0: 787 masklen += 3; 788 final++; 789 break; 790 case 0xc0: 791 masklen += 2; 792 final++; 793 break; 794 case 0x80: 795 masklen += 1; 796 final++; 797 break; 798 case 0x00: 799 final++; 800 break; 801 default: 802 final++; 803 illegal++; 804 break; 805 } 806 807 if (!illegal) 808 sin6.sin6_addr.s6_addr[i++] &= *p; 809 else 810 sin6.sin6_addr.s6_addr[i++] = 0x00; 811 } 812 while (i < sizeof(struct in6_addr)) 813 sin6.sin6_addr.s6_addr[i++] = 0x00; 814 } else 815 masklen = 128; 816 817 if (masklen == 0 && IN6_IS_ADDR_UNSPECIFIED(&sin6.sin6_addr)) 818 return ("default"); 819 820 if (illegal) 821 warnx("illegal prefixlen"); 822 823 if (nflag) 824 flag |= NI_NUMERICHOST; 825 error = getnameinfo((struct sockaddr *)&sin6, sin6.sin6_len, 826 hbuf, sizeof(hbuf), NULL, 0, flag); 827 if (error) 828 snprintf(hbuf, sizeof(hbuf), "invalid"); 829 830 snprintf(line, sizeof(line), "%s/%d", hbuf, masklen); 831 return (line); 832 } 833 834 /* 835 * Return the name of the network whose address is given. 836 * The address is assumed to be that of a net or subnet, not a host. 837 */ 838 char * 839 netname(struct sockaddr *sa, struct sockaddr *mask) 840 { 841 switch (sa->sa_family) { 842 case AF_INET: 843 return netname4(((struct sockaddr_in *)sa)->sin_addr.s_addr, 844 mask->sa_len == 0 ? 0 : 845 ((struct sockaddr_in *)mask)->sin_addr.s_addr); 846 case AF_INET6: 847 return netname6((struct sockaddr_in6 *)sa, 848 (struct sockaddr_in6 *)mask); 849 case AF_LINK: 850 return (link_print(sa)); 851 case AF_MPLS: 852 return (label_print(sa)); 853 default: 854 snprintf(line, sizeof(line), "af %d: %s", 855 sa->sa_family, any_ntoa(sa)); 856 break; 857 } 858 return (line); 859 } 860 861 static const char hexlist[] = "0123456789abcdef"; 862 863 char * 864 any_ntoa(const struct sockaddr *sa) 865 { 866 static char obuf[240]; 867 const char *in = sa->sa_data; 868 char *out = obuf; 869 int len = sa->sa_len - offsetof(struct sockaddr, sa_data); 870 871 *out++ = 'Q'; 872 do { 873 *out++ = hexlist[(*in >> 4) & 15]; 874 *out++ = hexlist[(*in++) & 15]; 875 *out++ = '.'; 876 } while (--len > 0 && (out + 3) < &obuf[sizeof(obuf) - 1]); 877 out[-1] = '\0'; 878 return (obuf); 879 } 880 881 char * 882 link_print(struct sockaddr *sa) 883 { 884 struct sockaddr_dl *sdl = (struct sockaddr_dl *)sa; 885 u_char *lla = (u_char *)sdl->sdl_data + sdl->sdl_nlen; 886 887 if (sdl->sdl_nlen == 0 && sdl->sdl_alen == 0 && 888 sdl->sdl_slen == 0) { 889 (void)snprintf(line, sizeof(line), "link#%d", sdl->sdl_index); 890 return (line); 891 } 892 switch (sdl->sdl_type) { 893 case IFT_ETHER: 894 case IFT_CARP: 895 return (ether_ntoa((struct ether_addr *)lla)); 896 default: 897 return (link_ntoa(sdl)); 898 } 899 } 900 901 char * 902 mpls_op(u_int32_t type) 903 { 904 switch (type & (MPLS_OP_PUSH | MPLS_OP_POP | MPLS_OP_SWAP)) { 905 case MPLS_OP_LOCAL: 906 return ("LOCAL"); 907 case MPLS_OP_POP: 908 return ("POP"); 909 case MPLS_OP_SWAP: 910 return ("SWAP"); 911 case MPLS_OP_PUSH: 912 return ("PUSH"); 913 default: 914 return ("?"); 915 } 916 } 917 918 char * 919 label_print(struct sockaddr *sa) 920 { 921 struct sockaddr_mpls *smpls = (struct sockaddr_mpls *)sa; 922 923 if (smpls) 924 (void)snprintf(line, sizeof(line), "%u", 925 ntohl(smpls->smpls_label) >> MPLS_LABEL_OFFSET); 926 else 927 (void)snprintf(line, sizeof(line), "-"); 928 929 return (line); 930 } 931 932 void 933 index_pfk(struct sadb_msg *msg, void **headers) 934 { 935 struct sadb_ext *ext; 936 937 for (ext = (struct sadb_ext *)(msg + 1); 938 (size_t)((u_int8_t *)ext - (u_int8_t *)msg) < 939 msg->sadb_msg_len * PFKEYV2_CHUNK && ext->sadb_ext_len > 0; 940 ext = (struct sadb_ext *)((u_int8_t *)ext + 941 ext->sadb_ext_len * PFKEYV2_CHUNK)) { 942 switch (ext->sadb_ext_type) { 943 case SADB_EXT_ADDRESS_SRC: 944 headers[SADB_EXT_ADDRESS_SRC] = (void *)ext; 945 break; 946 case SADB_EXT_ADDRESS_DST: 947 headers[SADB_EXT_ADDRESS_DST] = (void *)ext; 948 break; 949 case SADB_X_EXT_PROTOCOL: 950 headers[SADB_X_EXT_PROTOCOL] = (void *)ext; 951 break; 952 case SADB_X_EXT_SRC_FLOW: 953 headers[SADB_X_EXT_SRC_FLOW] = (void *)ext; 954 break; 955 case SADB_X_EXT_DST_FLOW: 956 headers[SADB_X_EXT_DST_FLOW] = (void *)ext; 957 break; 958 case SADB_X_EXT_SRC_MASK: 959 headers[SADB_X_EXT_SRC_MASK] = (void *)ext; 960 break; 961 case SADB_X_EXT_DST_MASK: 962 headers[SADB_X_EXT_DST_MASK] = (void *)ext; 963 break; 964 case SADB_X_EXT_FLOW_TYPE: 965 headers[SADB_X_EXT_FLOW_TYPE] = (void *)ext; 966 break; 967 default: 968 /* Ignore. */ 969 break; 970 } 971 } 972 } 973