xref: /dragonfly/usr.sbin/pfctl/pf_print_state.c (revision 9d0d81f9)
1ed1f0be2SJan Lentfer /*	$OpenBSD: pf_print_state.c,v 1.51 2008/06/29 08:42:15 mcbride Exp $	*/
295cc27f0SJoerg Sonnenberger 
395cc27f0SJoerg Sonnenberger /*
495cc27f0SJoerg Sonnenberger  * Copyright (c) 2001 Daniel Hartmeier
595cc27f0SJoerg Sonnenberger  * All rights reserved.
695cc27f0SJoerg Sonnenberger  *
795cc27f0SJoerg Sonnenberger  * Redistribution and use in source and binary forms, with or without
895cc27f0SJoerg Sonnenberger  * modification, are permitted provided that the following conditions
995cc27f0SJoerg Sonnenberger  * are met:
1095cc27f0SJoerg Sonnenberger  *
1195cc27f0SJoerg Sonnenberger  *    - Redistributions of source code must retain the above copyright
1295cc27f0SJoerg Sonnenberger  *      notice, this list of conditions and the following disclaimer.
1395cc27f0SJoerg Sonnenberger  *    - Redistributions in binary form must reproduce the above
1495cc27f0SJoerg Sonnenberger  *      copyright notice, this list of conditions and the following
1595cc27f0SJoerg Sonnenberger  *      disclaimer in the documentation and/or other materials provided
1695cc27f0SJoerg Sonnenberger  *      with the distribution.
1795cc27f0SJoerg Sonnenberger  *
1895cc27f0SJoerg Sonnenberger  * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
1995cc27f0SJoerg Sonnenberger  * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
2095cc27f0SJoerg Sonnenberger  * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
2195cc27f0SJoerg Sonnenberger  * FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
2295cc27f0SJoerg Sonnenberger  * COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
2395cc27f0SJoerg Sonnenberger  * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
2495cc27f0SJoerg Sonnenberger  * BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
2595cc27f0SJoerg Sonnenberger  * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
2695cc27f0SJoerg Sonnenberger  * CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
2795cc27f0SJoerg Sonnenberger  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN
2895cc27f0SJoerg Sonnenberger  * ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
2995cc27f0SJoerg Sonnenberger  * POSSIBILITY OF SUCH DAMAGE.
30a14160bcSMatthew Dillon  *
3195cc27f0SJoerg Sonnenberger  */
3295cc27f0SJoerg Sonnenberger 
33a798b49fSJoerg Sonnenberger #include <sys/types.h>
3495cc27f0SJoerg Sonnenberger #include <sys/socket.h>
3570224baaSJan Lentfer #include <sys/endian.h>
3695cc27f0SJoerg Sonnenberger #include <net/if.h>
3795cc27f0SJoerg Sonnenberger #define TCPSTATES
3895cc27f0SJoerg Sonnenberger #include <netinet/tcp_fsm.h>
3995cc27f0SJoerg Sonnenberger #include <net/pf/pfvar.h>
4095cc27f0SJoerg Sonnenberger #include <arpa/inet.h>
4178775ca5SSascha Wildner #include <inttypes.h>
4295cc27f0SJoerg Sonnenberger #include <netdb.h>
4395cc27f0SJoerg Sonnenberger 
4495cc27f0SJoerg Sonnenberger #include <stdio.h>
4595cc27f0SJoerg Sonnenberger #include <string.h>
4695cc27f0SJoerg Sonnenberger 
4795cc27f0SJoerg Sonnenberger #include "pfctl_parser.h"
4895cc27f0SJoerg Sonnenberger #include "pfctl.h"
4995cc27f0SJoerg Sonnenberger 
5095cc27f0SJoerg Sonnenberger void	print_name(struct pf_addr *, sa_family_t);
5195cc27f0SJoerg Sonnenberger 
5295cc27f0SJoerg Sonnenberger void
print_addr(struct pf_addr_wrap * addr,sa_family_t af,int verbose)5395cc27f0SJoerg Sonnenberger print_addr(struct pf_addr_wrap *addr, sa_family_t af, int verbose)
5495cc27f0SJoerg Sonnenberger {
5595cc27f0SJoerg Sonnenberger 	switch (addr->type) {
5695cc27f0SJoerg Sonnenberger 	case PF_ADDR_DYNIFTL:
5795cc27f0SJoerg Sonnenberger 		printf("(%s", addr->v.ifname);
5895cc27f0SJoerg Sonnenberger 		if (addr->iflags & PFI_AFLAG_NETWORK)
5995cc27f0SJoerg Sonnenberger 			printf(":network");
6095cc27f0SJoerg Sonnenberger 		if (addr->iflags & PFI_AFLAG_BROADCAST)
6195cc27f0SJoerg Sonnenberger 			printf(":broadcast");
6295cc27f0SJoerg Sonnenberger 		if (addr->iflags & PFI_AFLAG_PEER)
6395cc27f0SJoerg Sonnenberger 			printf(":peer");
6495cc27f0SJoerg Sonnenberger 		if (addr->iflags & PFI_AFLAG_NOALIAS)
6595cc27f0SJoerg Sonnenberger 			printf(":0");
6695cc27f0SJoerg Sonnenberger 		if (verbose) {
6795cc27f0SJoerg Sonnenberger 			if (addr->p.dyncnt <= 0)
6895cc27f0SJoerg Sonnenberger 				printf(":*");
6995cc27f0SJoerg Sonnenberger 			else
7095cc27f0SJoerg Sonnenberger 				printf(":%d", addr->p.dyncnt);
7195cc27f0SJoerg Sonnenberger 		}
7295cc27f0SJoerg Sonnenberger 		printf(")");
7395cc27f0SJoerg Sonnenberger 		break;
7495cc27f0SJoerg Sonnenberger 	case PF_ADDR_TABLE:
7595cc27f0SJoerg Sonnenberger 		if (verbose)
7695cc27f0SJoerg Sonnenberger 			if (addr->p.tblcnt == -1)
7795cc27f0SJoerg Sonnenberger 				printf("<%s:*>", addr->v.tblname);
7895cc27f0SJoerg Sonnenberger 			else
7995cc27f0SJoerg Sonnenberger 				printf("<%s:%d>", addr->v.tblname,
8095cc27f0SJoerg Sonnenberger 				    addr->p.tblcnt);
8195cc27f0SJoerg Sonnenberger 		else
8295cc27f0SJoerg Sonnenberger 			printf("<%s>", addr->v.tblname);
8395cc27f0SJoerg Sonnenberger 		return;
84ed1f0be2SJan Lentfer 	case PF_ADDR_RANGE: {
85ed1f0be2SJan Lentfer 		char buf[48];
86ed1f0be2SJan Lentfer 
87ed1f0be2SJan Lentfer 		if (inet_ntop(af, &addr->v.a.addr, buf, sizeof(buf)) == NULL)
88ed1f0be2SJan Lentfer 			printf("?");
89ed1f0be2SJan Lentfer 		else
90ed1f0be2SJan Lentfer 			printf("%s", buf);
91ed1f0be2SJan Lentfer 		if (inet_ntop(af, &addr->v.a.mask, buf, sizeof(buf)) == NULL)
92ed1f0be2SJan Lentfer 			printf(" - ?");
93ed1f0be2SJan Lentfer 		else
94ed1f0be2SJan Lentfer 			printf(" - %s", buf);
95ed1f0be2SJan Lentfer 		break;
96ed1f0be2SJan Lentfer 	}
9795cc27f0SJoerg Sonnenberger 	case PF_ADDR_ADDRMASK:
9895cc27f0SJoerg Sonnenberger 		if (PF_AZERO(&addr->v.a.addr, AF_INET6) &&
9995cc27f0SJoerg Sonnenberger 		    PF_AZERO(&addr->v.a.mask, AF_INET6))
10095cc27f0SJoerg Sonnenberger 			printf("any");
10195cc27f0SJoerg Sonnenberger 		else {
10295cc27f0SJoerg Sonnenberger 			char buf[48];
10395cc27f0SJoerg Sonnenberger 
10495cc27f0SJoerg Sonnenberger 			if (inet_ntop(af, &addr->v.a.addr, buf,
10595cc27f0SJoerg Sonnenberger 			    sizeof(buf)) == NULL)
10695cc27f0SJoerg Sonnenberger 				printf("?");
10795cc27f0SJoerg Sonnenberger 			else
10895cc27f0SJoerg Sonnenberger 				printf("%s", buf);
10995cc27f0SJoerg Sonnenberger 		}
11095cc27f0SJoerg Sonnenberger 		break;
11195cc27f0SJoerg Sonnenberger 	case PF_ADDR_NOROUTE:
11295cc27f0SJoerg Sonnenberger 		printf("no-route");
11395cc27f0SJoerg Sonnenberger 		return;
11470224baaSJan Lentfer 	case PF_ADDR_URPFFAILED:
11570224baaSJan Lentfer 		printf("urpf-failed");
11670224baaSJan Lentfer 		return;
11770224baaSJan Lentfer 	case PF_ADDR_RTLABEL:
11870224baaSJan Lentfer 		printf("route \"%s\"", addr->v.rtlabelname);
11970224baaSJan Lentfer 		return;
12095cc27f0SJoerg Sonnenberger 	default:
12195cc27f0SJoerg Sonnenberger 		printf("?");
12295cc27f0SJoerg Sonnenberger 		return;
12395cc27f0SJoerg Sonnenberger 	}
12495cc27f0SJoerg Sonnenberger 
12595cc27f0SJoerg Sonnenberger 	/* mask if not _both_ address and mask are zero */
126ed1f0be2SJan Lentfer 	if (addr->type != PF_ADDR_RANGE &&
127ed1f0be2SJan Lentfer 	    !(PF_AZERO(&addr->v.a.addr, AF_INET6) &&
12895cc27f0SJoerg Sonnenberger 	    PF_AZERO(&addr->v.a.mask, AF_INET6))) {
12995cc27f0SJoerg Sonnenberger 		int bits = unmask(&addr->v.a.mask, af);
13095cc27f0SJoerg Sonnenberger 
13195cc27f0SJoerg Sonnenberger 		if (bits != (af == AF_INET ? 32 : 128))
13295cc27f0SJoerg Sonnenberger 			printf("/%d", bits);
13395cc27f0SJoerg Sonnenberger 	}
13495cc27f0SJoerg Sonnenberger }
13595cc27f0SJoerg Sonnenberger 
13695cc27f0SJoerg Sonnenberger void
print_name(struct pf_addr * addr,sa_family_t af)13795cc27f0SJoerg Sonnenberger print_name(struct pf_addr *addr, sa_family_t af)
13895cc27f0SJoerg Sonnenberger {
13970224baaSJan Lentfer 	char his_host[NI_MAXHOST];
14095cc27f0SJoerg Sonnenberger 
14170224baaSJan Lentfer 	strlcpy(his_host, "?", sizeof(his_host));
14295cc27f0SJoerg Sonnenberger 	switch (af) {
14395cc27f0SJoerg Sonnenberger 	case AF_INET: {
14470224baaSJan Lentfer 		struct sockaddr_in sin;
14595cc27f0SJoerg Sonnenberger 
14670224baaSJan Lentfer 		memset(&sin, 0, sizeof(sin));
14770224baaSJan Lentfer 		sin.sin_len = sizeof(sin);
14870224baaSJan Lentfer 		sin.sin_family = AF_INET;
14970224baaSJan Lentfer 		sin.sin_addr = addr->v4;
15070224baaSJan Lentfer 		getnameinfo((struct sockaddr *)&sin, sin.sin_len,
15170224baaSJan Lentfer 		    his_host, sizeof(his_host), NULL, 0, NI_NOFQDN);
15295cc27f0SJoerg Sonnenberger 		break;
15395cc27f0SJoerg Sonnenberger 	}
15495cc27f0SJoerg Sonnenberger 	case AF_INET6: {
15595cc27f0SJoerg Sonnenberger 		struct sockaddr_in6 sin6;
15695cc27f0SJoerg Sonnenberger 
15795cc27f0SJoerg Sonnenberger 		memset(&sin6, 0, sizeof(sin6));
15895cc27f0SJoerg Sonnenberger 		sin6.sin6_len = sizeof(sin6);
15995cc27f0SJoerg Sonnenberger 		sin6.sin6_family = AF_INET6;
16095cc27f0SJoerg Sonnenberger 		sin6.sin6_addr = addr->v6;
16195cc27f0SJoerg Sonnenberger 		getnameinfo((struct sockaddr *)&sin6, sin6.sin6_len,
16270224baaSJan Lentfer 		    his_host, sizeof(his_host), NULL, 0, NI_NOFQDN);
16395cc27f0SJoerg Sonnenberger 		break;
16495cc27f0SJoerg Sonnenberger 	}
16595cc27f0SJoerg Sonnenberger 	}
16670224baaSJan Lentfer 	printf("%s", his_host);
16795cc27f0SJoerg Sonnenberger }
16895cc27f0SJoerg Sonnenberger 
16995cc27f0SJoerg Sonnenberger void
print_host(struct pf_addr * addr,u_int16_t port,sa_family_t af,int opts)170ed1f0be2SJan Lentfer print_host(struct pf_addr *addr, u_int16_t port, sa_family_t af, int opts)
17195cc27f0SJoerg Sonnenberger {
17295cc27f0SJoerg Sonnenberger 	if (opts & PF_OPT_USEDNS)
173ed1f0be2SJan Lentfer 		print_name(addr, af);
17495cc27f0SJoerg Sonnenberger 	else {
17595cc27f0SJoerg Sonnenberger 		struct pf_addr_wrap aw;
17695cc27f0SJoerg Sonnenberger 
17795cc27f0SJoerg Sonnenberger 		memset(&aw, 0, sizeof(aw));
178ed1f0be2SJan Lentfer 		aw.v.a.addr = *addr;
17995cc27f0SJoerg Sonnenberger 		if (af == AF_INET)
18095cc27f0SJoerg Sonnenberger 			aw.v.a.mask.addr32[0] = 0xffffffff;
18195cc27f0SJoerg Sonnenberger 		else {
18295cc27f0SJoerg Sonnenberger 			memset(&aw.v.a.mask, 0xff, sizeof(aw.v.a.mask));
18395cc27f0SJoerg Sonnenberger 			af = AF_INET6;
18495cc27f0SJoerg Sonnenberger 		}
18595cc27f0SJoerg Sonnenberger 		print_addr(&aw, af, opts & PF_OPT_VERBOSE2);
18695cc27f0SJoerg Sonnenberger 	}
18795cc27f0SJoerg Sonnenberger 
188ed1f0be2SJan Lentfer 	if (port) {
18995cc27f0SJoerg Sonnenberger 		if (af == AF_INET)
190ed1f0be2SJan Lentfer 			printf(":%u", ntohs(port));
19195cc27f0SJoerg Sonnenberger 		else
192ed1f0be2SJan Lentfer 			printf("[%u]", ntohs(port));
19395cc27f0SJoerg Sonnenberger 	}
19495cc27f0SJoerg Sonnenberger }
19595cc27f0SJoerg Sonnenberger 
19695cc27f0SJoerg Sonnenberger void
print_seq(struct pfsync_state_peer * p)197315a7da3SJan Lentfer print_seq(struct pfsync_state_peer *p)
19895cc27f0SJoerg Sonnenberger {
19995cc27f0SJoerg Sonnenberger 	if (p->seqdiff)
200ed1f0be2SJan Lentfer 		printf("[%u + %u](+%u)", ntohl(p->seqlo),
201ed1f0be2SJan Lentfer 		    ntohl(p->seqhi) - ntohl(p->seqlo), ntohl(p->seqdiff));
20295cc27f0SJoerg Sonnenberger 	else
203ed1f0be2SJan Lentfer 		printf("[%u + %u]", ntohl(p->seqlo),
204ed1f0be2SJan Lentfer 		    ntohl(p->seqhi) - ntohl(p->seqlo));
20595cc27f0SJoerg Sonnenberger }
20695cc27f0SJoerg Sonnenberger 
20795cc27f0SJoerg Sonnenberger void
print_state(struct pfsync_state * s,int opts)208315a7da3SJan Lentfer print_state(struct pfsync_state *s, int opts)
20995cc27f0SJoerg Sonnenberger {
210315a7da3SJan Lentfer 	struct pfsync_state_peer *src, *dst;
211ed1f0be2SJan Lentfer 	struct pfsync_state_key *sk, *nk;
21295cc27f0SJoerg Sonnenberger 	struct protoent *p;
21395cc27f0SJoerg Sonnenberger 	int min, sec;
21495cc27f0SJoerg Sonnenberger 
21595cc27f0SJoerg Sonnenberger 	if (s->direction == PF_OUT) {
21695cc27f0SJoerg Sonnenberger 		src = &s->src;
21795cc27f0SJoerg Sonnenberger 		dst = &s->dst;
218ed1f0be2SJan Lentfer 		sk = &s->key[PF_SK_STACK];
219ed1f0be2SJan Lentfer 		nk = &s->key[PF_SK_WIRE];
220ed1f0be2SJan Lentfer 		if (s->proto == IPPROTO_ICMP || s->proto == IPPROTO_ICMPV6)
221ed1f0be2SJan Lentfer 			sk->port[0] = nk->port[0];
22295cc27f0SJoerg Sonnenberger 	} else {
22395cc27f0SJoerg Sonnenberger 		src = &s->dst;
22495cc27f0SJoerg Sonnenberger 		dst = &s->src;
225ed1f0be2SJan Lentfer 		sk = &s->key[PF_SK_WIRE];
226ed1f0be2SJan Lentfer 		nk = &s->key[PF_SK_STACK];
227ed1f0be2SJan Lentfer 		if (s->proto == IPPROTO_ICMP || s->proto == IPPROTO_ICMPV6)
228ed1f0be2SJan Lentfer 			sk->port[1] = nk->port[1];
22995cc27f0SJoerg Sonnenberger 	}
230315a7da3SJan Lentfer 	printf("%s ", s->ifname);
23195cc27f0SJoerg Sonnenberger 	if ((p = getprotobynumber(s->proto)) != NULL)
23295cc27f0SJoerg Sonnenberger 		printf("%s ", p->p_name);
23395cc27f0SJoerg Sonnenberger 	else
23495cc27f0SJoerg Sonnenberger 		printf("%u ", s->proto);
235ed1f0be2SJan Lentfer 
236ed1f0be2SJan Lentfer 	print_host(&nk->addr[1], nk->port[1], s->af, opts);
237ed1f0be2SJan Lentfer 	if (PF_ANEQ(&nk->addr[1], &sk->addr[1], s->af) ||
238ed1f0be2SJan Lentfer 	    nk->port[1] != sk->port[1]) {
239ed1f0be2SJan Lentfer 		printf(" (");
240ed1f0be2SJan Lentfer 		print_host(&sk->addr[1], sk->port[1], s->af, opts);
241ed1f0be2SJan Lentfer 		printf(")");
24295cc27f0SJoerg Sonnenberger 	}
24395cc27f0SJoerg Sonnenberger 	if (s->direction == PF_OUT)
24495cc27f0SJoerg Sonnenberger 		printf(" -> ");
24595cc27f0SJoerg Sonnenberger 	else
24695cc27f0SJoerg Sonnenberger 		printf(" <- ");
247ed1f0be2SJan Lentfer 	print_host(&nk->addr[0], nk->port[0], s->af, opts);
248ed1f0be2SJan Lentfer 	if (PF_ANEQ(&nk->addr[0], &sk->addr[0], s->af) ||
249ed1f0be2SJan Lentfer 	    nk->port[0] != sk->port[0]) {
250ed1f0be2SJan Lentfer 		printf(" (");
251ed1f0be2SJan Lentfer 		print_host(&sk->addr[0], sk->port[0], s->af, opts);
252ed1f0be2SJan Lentfer 		printf(")");
253ed1f0be2SJan Lentfer 	}
25495cc27f0SJoerg Sonnenberger 
25595cc27f0SJoerg Sonnenberger 	printf("    ");
25695cc27f0SJoerg Sonnenberger 	if (s->proto == IPPROTO_TCP) {
25795cc27f0SJoerg Sonnenberger 		if (src->state <= TCPS_TIME_WAIT &&
25895cc27f0SJoerg Sonnenberger 		    dst->state <= TCPS_TIME_WAIT)
25995cc27f0SJoerg Sonnenberger 			printf("   %s:%s\n", tcpstates[src->state],
26095cc27f0SJoerg Sonnenberger 			    tcpstates[dst->state]);
26195cc27f0SJoerg Sonnenberger 		else if (src->state == PF_TCPS_PROXY_SRC ||
26295cc27f0SJoerg Sonnenberger 		    dst->state == PF_TCPS_PROXY_SRC)
26395cc27f0SJoerg Sonnenberger 			printf("   PROXY:SRC\n");
26495cc27f0SJoerg Sonnenberger 		else if (src->state == PF_TCPS_PROXY_DST ||
26595cc27f0SJoerg Sonnenberger 		    dst->state == PF_TCPS_PROXY_DST)
26695cc27f0SJoerg Sonnenberger 			printf("   PROXY:DST\n");
26795cc27f0SJoerg Sonnenberger 		else
26895cc27f0SJoerg Sonnenberger 			printf("   <BAD STATE LEVELS %u:%u>\n",
26995cc27f0SJoerg Sonnenberger 			    src->state, dst->state);
27095cc27f0SJoerg Sonnenberger 		if (opts & PF_OPT_VERBOSE) {
27195cc27f0SJoerg Sonnenberger 			printf("   ");
27295cc27f0SJoerg Sonnenberger 			print_seq(src);
27395cc27f0SJoerg Sonnenberger 			if (src->wscale && dst->wscale)
27495cc27f0SJoerg Sonnenberger 				printf(" wscale %u",
27595cc27f0SJoerg Sonnenberger 				    src->wscale & PF_WSCALE_MASK);
27695cc27f0SJoerg Sonnenberger 			printf("  ");
27795cc27f0SJoerg Sonnenberger 			print_seq(dst);
27895cc27f0SJoerg Sonnenberger 			if (src->wscale && dst->wscale)
27995cc27f0SJoerg Sonnenberger 				printf(" wscale %u",
28095cc27f0SJoerg Sonnenberger 				    dst->wscale & PF_WSCALE_MASK);
28195cc27f0SJoerg Sonnenberger 			printf("\n");
28295cc27f0SJoerg Sonnenberger 		}
28395cc27f0SJoerg Sonnenberger 	} else if (s->proto == IPPROTO_UDP && src->state < PFUDPS_NSTATES &&
28495cc27f0SJoerg Sonnenberger 	    dst->state < PFUDPS_NSTATES) {
28595cc27f0SJoerg Sonnenberger 		const char *states[] = PFUDPS_NAMES;
28695cc27f0SJoerg Sonnenberger 
28795cc27f0SJoerg Sonnenberger 		printf("   %s:%s\n", states[src->state], states[dst->state]);
28895cc27f0SJoerg Sonnenberger 	} else if (s->proto != IPPROTO_ICMP && src->state < PFOTHERS_NSTATES &&
28995cc27f0SJoerg Sonnenberger 	    dst->state < PFOTHERS_NSTATES) {
29095cc27f0SJoerg Sonnenberger 		/* XXX ICMP doesn't really have state levels */
29195cc27f0SJoerg Sonnenberger 		const char *states[] = PFOTHERS_NAMES;
29295cc27f0SJoerg Sonnenberger 
29395cc27f0SJoerg Sonnenberger 		printf("   %s:%s\n", states[src->state], states[dst->state]);
29495cc27f0SJoerg Sonnenberger 	} else {
29595cc27f0SJoerg Sonnenberger 		printf("   %u:%u\n", src->state, dst->state);
29695cc27f0SJoerg Sonnenberger 	}
29795cc27f0SJoerg Sonnenberger 
29895cc27f0SJoerg Sonnenberger 	if (opts & PF_OPT_VERBOSE) {
299ed1f0be2SJan Lentfer 		u_int64_t packets[2];
300ed1f0be2SJan Lentfer 		u_int64_t bytes[2];
301ed1f0be2SJan Lentfer 		u_int32_t creation = ntohl(s->creation);
302ed1f0be2SJan Lentfer 		u_int32_t expire = ntohl(s->expire);
303ed1f0be2SJan Lentfer 
304f535a12dSMatthew Dillon 		printf("   rule %u", ntohl(s->rule));
305f535a12dSMatthew Dillon 		if (ntohl(s->anchor) != -1)
306f535a12dSMatthew Dillon 			printf(", anchor %u", ntohl(s->anchor));
307f535a12dSMatthew Dillon 		printf(", flags:");
3085f2a38e8SMatthew Dillon 		if (s->state_flags & PFSTATE_ALLOWOPTS)
3095f2a38e8SMatthew Dillon 			printf(" allowopts");
310f535a12dSMatthew Dillon 		if (s->state_flags & PFSTATE_SLOPPY)
311f535a12dSMatthew Dillon 			printf(" sloppy");
3125f2a38e8SMatthew Dillon 		if (s->state_flags & PFSTATE_STACK_GLOBAL)
3135f2a38e8SMatthew Dillon 			printf(" global");
3145f2a38e8SMatthew Dillon 		if (s->state_flags & PFSTATE_CREATEINPROG)
3155f2a38e8SMatthew Dillon 			printf(" creating");
316*9d0d81f9SMatthew Dillon 		if (s->state_flags & PFSTATE_HALF_DUPLEX)
317*9d0d81f9SMatthew Dillon 			printf(" (TRANSLATION COLLISION)");
318f535a12dSMatthew Dillon 		if (s->sync_flags & PFSYNC_FLAG_SRCNODE)
319f535a12dSMatthew Dillon 			printf(" source-track");
320f535a12dSMatthew Dillon 		if (s->sync_flags & PFSYNC_FLAG_NATSRCNODE)
321f535a12dSMatthew Dillon 			printf(" sticky-address");
3225f2a38e8SMatthew Dillon 		switch(s->pickup_mode) {
3235f2a38e8SMatthew Dillon 		case PF_PICKUPS_UNSPECIFIED:
3245f2a38e8SMatthew Dillon 			break;
3255f2a38e8SMatthew Dillon 		case PF_PICKUPS_DISABLED:
3265f2a38e8SMatthew Dillon 			printf(" no-pickups");
3275f2a38e8SMatthew Dillon 			break;
3285f2a38e8SMatthew Dillon 		case PF_PICKUPS_HASHONLY:
3295f2a38e8SMatthew Dillon 			printf(" hash-only");
3305f2a38e8SMatthew Dillon 			break;
3315f2a38e8SMatthew Dillon 		case PF_PICKUPS_ENABLED:
3325f2a38e8SMatthew Dillon 			printf(" pickups");
3335f2a38e8SMatthew Dillon 			break;
3345f2a38e8SMatthew Dillon 		}
335f535a12dSMatthew Dillon 		printf("\n");
336f535a12dSMatthew Dillon 
337ed1f0be2SJan Lentfer 		sec = creation % 60;
338ed1f0be2SJan Lentfer 		creation /= 60;
339ed1f0be2SJan Lentfer 		min = creation % 60;
340ed1f0be2SJan Lentfer 		creation /= 60;
341ed1f0be2SJan Lentfer 		printf("   age %.2u:%.2u:%.2u", creation, min, sec);
342ed1f0be2SJan Lentfer 		sec = expire % 60;
343ed1f0be2SJan Lentfer 		expire /= 60;
344f535a12dSMatthew Dillon 		min = expire % 60;
345ed1f0be2SJan Lentfer 		expire /= 60;
346ed1f0be2SJan Lentfer 		printf(", expires in %.2u:%.2u:%.2u", expire, min, sec);
347ed1f0be2SJan Lentfer 
348ed1f0be2SJan Lentfer 		bcopy(s->packets[0], &packets[0], sizeof(u_int64_t));
349ed1f0be2SJan Lentfer 		bcopy(s->packets[1], &packets[1], sizeof(u_int64_t));
350ed1f0be2SJan Lentfer 		bcopy(s->bytes[0], &bytes[0], sizeof(u_int64_t));
351ed1f0be2SJan Lentfer 		bcopy(s->bytes[1], &bytes[1], sizeof(u_int64_t));
352f535a12dSMatthew Dillon 		printf(", %" PRIu64 ":%" PRIu64 " pkts, %" PRIu64 ":%"
353f535a12dSMatthew Dillon 		       PRIu64 " bytes\n",
354ed1f0be2SJan Lentfer 		    be64toh(packets[0]),
355ed1f0be2SJan Lentfer 		    be64toh(packets[1]),
356ed1f0be2SJan Lentfer 		    be64toh(bytes[0]),
357ed1f0be2SJan Lentfer 		    be64toh(bytes[1]));
35895cc27f0SJoerg Sonnenberger 	}
35995cc27f0SJoerg Sonnenberger 	if (opts & PF_OPT_VERBOSE2) {
360ed1f0be2SJan Lentfer 		u_int64_t id;
361ed1f0be2SJan Lentfer 
362ed1f0be2SJan Lentfer 		bcopy(&s->id, &id, sizeof(u_int64_t));
3635f2a38e8SMatthew Dillon 		printf("   id: %016jx creatorid: %08x cpuid: %-3d",
3645f2a38e8SMatthew Dillon 		       be64toh(id),  ntohl(s->creatorid), s->cpuid);
365ed1f0be2SJan Lentfer 		printf("\n");
36695cc27f0SJoerg Sonnenberger 	}
36795cc27f0SJoerg Sonnenberger }
36895cc27f0SJoerg Sonnenberger 
36995cc27f0SJoerg Sonnenberger int
unmask(struct pf_addr * m,sa_family_t af __unused)37095cc27f0SJoerg Sonnenberger unmask(struct pf_addr *m, sa_family_t af __unused)
37195cc27f0SJoerg Sonnenberger {
37295cc27f0SJoerg Sonnenberger 	int i = 31, j = 0, b = 0;
37395cc27f0SJoerg Sonnenberger 	u_int32_t tmp;
37495cc27f0SJoerg Sonnenberger 
37595cc27f0SJoerg Sonnenberger 	while (j < 4 && m->addr32[j] == 0xffffffff) {
37695cc27f0SJoerg Sonnenberger 		b += 32;
37795cc27f0SJoerg Sonnenberger 		j++;
37895cc27f0SJoerg Sonnenberger 	}
37995cc27f0SJoerg Sonnenberger 	if (j < 4) {
38095cc27f0SJoerg Sonnenberger 		tmp = ntohl(m->addr32[j]);
38195cc27f0SJoerg Sonnenberger 		for (i = 31; tmp & (1 << i); --i)
38295cc27f0SJoerg Sonnenberger 			b++;
38395cc27f0SJoerg Sonnenberger 	}
38495cc27f0SJoerg Sonnenberger 	return (b);
38595cc27f0SJoerg Sonnenberger }
386