Annotation of src/usr.bin/netstat/show.c, Revision 1.10
1.10 ! claudio 1: /* $OpenBSD: show.c,v 1.9 2007/07/24 20:36:34 claudio Exp $ */
1.1 claudio 2: /* $NetBSD: show.c,v 1.1 1996/11/15 18:01:41 gwr Exp $ */
3:
4: /*
5: * Copyright (c) 1983, 1988, 1993
6: * The Regents of the University of California. All rights reserved.
7: *
8: * Redistribution and use in source and binary forms, with or without
9: * modification, are permitted provided that the following conditions
10: * are met:
11: * 1. Redistributions of source code must retain the above copyright
12: * notice, this list of conditions and the following disclaimer.
13: * 2. Redistributions in binary form must reproduce the above copyright
14: * notice, this list of conditions and the following disclaimer in the
15: * documentation and/or other materials provided with the distribution.
16: * 3. Neither the name of the University nor the names of its contributors
17: * may be used to endorse or promote products derived from this software
18: * without specific prior written permission.
19: *
20: * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
21: * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
22: * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23: * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
24: * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
25: * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26: * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27: * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28: * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29: * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
30: * SUCH DAMAGE.
31: */
32:
33: #include <sys/param.h>
34: #include <sys/protosw.h>
35: #include <sys/socket.h>
36: #include <sys/mbuf.h>
37: #include <sys/sysctl.h>
38:
39: #include <net/if.h>
40: #include <net/if_dl.h>
41: #include <net/if_types.h>
42: #include <net/pfkeyv2.h>
43: #include <net/route.h>
44: #include <netinet/in.h>
45: #include <netinet/if_ether.h>
46: #include <netinet/ip_ipsp.h>
47: #include <arpa/inet.h>
48:
49: #include <err.h>
50: #include <errno.h>
51: #include <netdb.h>
52: #include <stdio.h>
53: #include <stddef.h>
54: #include <stdlib.h>
55: #include <string.h>
56: #include <unistd.h>
57:
58: #include "netstat.h"
59:
60: char *any_ntoa(const struct sockaddr *);
61: char *link_print(struct sockaddr *);
62:
63: #define ROUNDUP(a) \
64: ((a) > 0 ? (1 + (((a) - 1) | (sizeof(long) - 1))) : sizeof(long))
65: #define ADVANCE(x, n) (x += ROUNDUP((n)->sa_len))
66:
67: #define PFKEYV2_CHUNK sizeof(u_int64_t)
68:
69: /*
70: * Definitions for showing gateway flags.
71: */
72: struct bits {
73: int b_mask;
74: char b_val;
75: };
76: static const struct bits bits[] = {
77: { RTF_UP, 'U' },
78: { RTF_GATEWAY, 'G' },
79: { RTF_HOST, 'H' },
80: { RTF_REJECT, 'R' },
81: { RTF_BLACKHOLE, 'B' },
82: { RTF_DYNAMIC, 'D' },
83: { RTF_MODIFIED, 'M' },
84: { RTF_DONE, 'd' }, /* Completed -- for routing messages only */
85: { RTF_MASK, 'm' }, /* Mask Present -- for routing messages only */
86: { RTF_CLONING, 'C' },
87: { RTF_XRESOLVE, 'X' },
88: { RTF_LLINFO, 'L' },
89: { RTF_STATIC, 'S' },
90: { RTF_PROTO1, '1' },
91: { RTF_PROTO2, '2' },
92: { RTF_PROTO3, '3' },
93: { RTF_CLONED, 'c' },
94: { RTF_JUMBO, 'J' },
95: { 0 }
96: };
97:
98: void p_rtentry(struct rt_msghdr *);
99: void p_pfkentry(struct sadb_msg *);
100: void pr_family(int);
101: void p_encap(struct sockaddr *, struct sockaddr *, int);
102: void p_protocol(struct sadb_protocol *, struct sockaddr *, struct
103: sadb_protocol *, int);
104: void p_sockaddr(struct sockaddr *, struct sockaddr *, int, int);
105: void p_flags(int, char *);
106: char *routename4(in_addr_t);
107: char *routename6(struct sockaddr_in6 *);
108: void index_pfk(struct sadb_msg *, void **);
109:
110: /*
111: * Print routing tables.
112: */
113: void
1.10 ! claudio 114: p_rttables(int af, u_int tableid)
1.1 claudio 115: {
116: struct rt_msghdr *rtm;
117: struct sadb_msg *msg;
118: char *buf = NULL, *next, *lim = NULL;
119: size_t needed;
1.10 ! claudio 120: int mib[7];
1.1 claudio 121: struct sockaddr *sa;
122:
123: mib[0] = CTL_NET;
124: mib[1] = PF_ROUTE;
125: mib[2] = 0;
126: mib[3] = af;
127: mib[4] = NET_RT_DUMP;
128: mib[5] = 0;
1.10 ! claudio 129: mib[6] = tableid;
! 130:
! 131: if (sysctl(mib, 7, NULL, &needed, NULL, 0) < 0)
1.1 claudio 132: err(1, "route-sysctl-estimate");
133: if (needed > 0) {
134: if ((buf = malloc(needed)) == 0)
135: err(1, NULL);
1.10 ! claudio 136: if (sysctl(mib, 7, buf, &needed, NULL, 0) < 0)
1.1 claudio 137: err(1, "sysctl of routing table");
138: lim = buf + needed;
139: }
140:
141: printf("Routing tables\n");
142:
143: if (buf) {
144: for (next = buf; next < lim; next += rtm->rtm_msglen) {
145: rtm = (struct rt_msghdr *)next;
1.8 claudio 146: if (rtm->rtm_version != RTM_VERSION)
147: continue;
1.1 claudio 148: sa = (struct sockaddr *)(rtm + 1);
149: if (af != AF_UNSPEC && sa->sa_family != af)
150: continue;
151: p_rtentry(rtm);
152: }
153: free(buf);
154: buf = NULL;
155: }
156:
157: if (af != 0 && af != PF_KEY)
158: return;
159:
160: mib[0] = CTL_NET;
161: mib[1] = PF_KEY;
162: mib[2] = PF_KEY_V2;
163: mib[3] = NET_KEY_SPD_DUMP;
164: mib[4] = mib[5] = 0;
165:
166: if (sysctl(mib, 4, NULL, &needed, NULL, 0) == -1) {
167: if (errno == ENOPROTOOPT)
168: return;
169: err(1, "spd-sysctl-estimate");
170: }
171: if (needed > 0) {
172: if ((buf = malloc(needed)) == 0)
173: err(1, NULL);
174: if (sysctl(mib, 4, buf, &needed, NULL, 0) == -1)
175: err(1,"sysctl of spd");
176: lim = buf + needed;
177: }
178:
179: if (buf) {
180: printf("\nEncap:\n");
181:
182: for (next = buf; next < lim; next += msg->sadb_msg_len *
183: PFKEYV2_CHUNK) {
184: msg = (struct sadb_msg *)next;
185: if (msg->sadb_msg_len == 0)
186: break;
187: p_pfkentry(msg);
188: }
189: free(buf);
190: buf = NULL;
191: }
192: }
193:
194: /*
195: * column widths; each followed by one space
196: * width of destination/gateway column
197: * strlen("fe80::aaaa:bbbb:cccc:dddd@gif0") == 30, strlen("/128") == 4
198: */
199: #define WID_DST(af) ((af) == AF_INET6 ? (nflag ? 34 : 18) : 18)
200: #define WID_GW(af) ((af) == AF_INET6 ? (nflag ? 30 : 18) : 18)
201:
202: /*
203: * Print header for routing table columns.
204: */
205: void
206: pr_rthdr(int af, int Aflag)
207: {
208: if (Aflag)
209: printf("%-*.*s ", PLEN, PLEN, "Address");
210: if (af != PF_KEY)
211: printf("%-*.*s %-*.*s %-6.6s %6.6s %8.8s %6.6s %s\n",
212: WID_DST(af), WID_DST(af), "Destination",
213: WID_GW(af), WID_GW(af), "Gateway",
214: "Flags", "Refs", "Use", "Mtu", "Interface");
215: else
216: printf("%-18s %-5s %-18s %-5s %-5s %-22s\n",
217: "Source", "Port", "Destination",
218: "Port", "Proto", "SA(Address/Proto/Type/Direction)");
219: }
220:
221: static void
222: get_rtaddrs(int addrs, struct sockaddr *sa, struct sockaddr **rti_info)
223: {
224: int i;
225:
226: for (i = 0; i < RTAX_MAX; i++) {
227: if (addrs & (1 << i)) {
228: rti_info[i] = sa;
229: sa = (struct sockaddr *)((char *)(sa) +
230: ROUNDUP(sa->sa_len));
231: } else
232: rti_info[i] = NULL;
233: }
234: }
235:
236: /*
237: * Print a routing table entry.
238: */
239: void
240: p_rtentry(struct rt_msghdr *rtm)
241: {
242: static int old_af = -1;
243: struct sockaddr *sa = (struct sockaddr *)(rtm + 1);
244: struct sockaddr *mask, *rti_info[RTAX_MAX];
245: char ifbuf[IF_NAMESIZE];
246:
247: if (sa->sa_family == AF_KEY)
248: return;
249:
1.5 pyr 250: get_rtaddrs(rtm->rtm_addrs, sa, rti_info);
251: if (Fflag && rti_info[RTAX_GATEWAY]->sa_family != sa->sa_family) {
252: return;
253: }
1.1 claudio 254: if (old_af != sa->sa_family) {
255: old_af = sa->sa_family;
256: pr_family(sa->sa_family);
257: pr_rthdr(sa->sa_family, 0);
258: }
259:
260: mask = rti_info[RTAX_NETMASK];
261: if ((sa = rti_info[RTAX_DST]) == NULL)
262: return;
263:
264: p_sockaddr(sa, mask, rtm->rtm_flags, WID_DST(sa->sa_family));
265: p_sockaddr(rti_info[RTAX_GATEWAY], NULL, RTF_HOST,
266: WID_GW(sa->sa_family));
267: p_flags(rtm->rtm_flags, "%-6.6s ");
268: printf("%6d %8ld ", (int)rtm->rtm_rmx.rmx_refcnt,
269: rtm->rtm_rmx.rmx_pksent);
270: if (rtm->rtm_rmx.rmx_mtu)
271: printf("%6ld ", rtm->rtm_rmx.rmx_mtu);
272: else
273: printf("%6s ", "-");
274: putchar((rtm->rtm_rmx.rmx_locks & RTV_MTU) ? 'L' : ' ');
275: printf(" %.16s", if_indextoname(rtm->rtm_index, ifbuf));
276: putchar('\n');
277: }
278:
279: /*
280: * Print a pfkey/encap entry.
281: */
282: void
283: p_pfkentry(struct sadb_msg *msg)
284: {
285: static int old = 0;
286: struct sadb_address *saddr;
287: struct sadb_protocol *sap, *saft;
288: struct sockaddr *sa, *mask;
289: void *headers[SADB_EXT_MAX + 1];
290:
291: if (!old) {
292: pr_rthdr(PF_KEY, 0);
293: old++;
294: }
295:
296: bzero(headers, sizeof(headers));
297: index_pfk(msg, headers);
298:
299: /* These are always set */
300: saddr = headers[SADB_X_EXT_SRC_FLOW];
301: sa = (struct sockaddr *)(saddr + 1);
302: saddr = headers[SADB_X_EXT_SRC_MASK];
303: mask = (struct sockaddr *)(saddr + 1);
304: p_encap(sa, mask, WID_DST(sa->sa_family));
305:
306: /* These are always set, too. */
307: saddr = headers[SADB_X_EXT_DST_FLOW];
308: sa = (struct sockaddr *)(saddr + 1);
309: saddr = headers[SADB_X_EXT_DST_MASK];
310: mask = (struct sockaddr *)(saddr + 1);
311: p_encap(sa, mask, WID_DST(sa->sa_family));
312:
313: /* Bypass and deny flows do not set SADB_EXT_ADDRESS_DST! */
314: sap = headers[SADB_X_EXT_PROTOCOL];
315: saft = headers[SADB_X_EXT_FLOW_TYPE];
316: saddr = headers[SADB_EXT_ADDRESS_DST];
317: if (saddr)
318: sa = (struct sockaddr *)(saddr + 1);
319: else
320: sa = NULL;
321: p_protocol(sap, sa, saft, msg->sadb_msg_satype);
322:
323: printf("\n");
324: }
325:
326: /*
327: * Print address family header before a section of the routing table.
328: */
329: void
330: pr_family(int af)
331: {
332: char *afname;
333:
334: switch (af) {
335: case AF_INET:
336: afname = "Internet";
337: break;
338: case AF_INET6:
339: afname = "Internet6";
340: break;
341: case PF_KEY:
342: afname = "Encap";
343: break;
344: case AF_APPLETALK:
345: afname = "AppleTalk";
346: break;
347: default:
348: afname = NULL;
349: break;
350: }
351: if (afname)
352: printf("\n%s:\n", afname);
353: else
354: printf("\nProtocol Family %d:\n", af);
355: }
356:
357: void
358: p_addr(struct sockaddr *sa, struct sockaddr *mask, int flags)
359: {
360: p_sockaddr(sa, mask, flags, WID_DST(sa->sa_family));
361: }
362:
363: void
364: p_gwaddr(struct sockaddr *sa, int af)
365: {
366: p_sockaddr(sa, 0, RTF_HOST, WID_GW(af));
367: }
368:
369: void
370: p_encap(struct sockaddr *sa, struct sockaddr *mask, int width)
371: {
372: char *cp;
373: unsigned short port;
374:
1.2 todd 375: if (mask)
376: cp = netname(sa, mask);
377: else
378: cp = routename(sa);
1.1 claudio 379: switch (sa->sa_family) {
1.9 claudio 380: case AF_INET:
381: port = ntohs(((struct sockaddr_in *)sa)->sin_port);
382: break;
1.2 todd 383: case AF_INET6:
384: port = ntohs(((struct sockaddr_in6 *)sa)->sin6_port);
1.1 claudio 385: break;
386: }
387: if (width < 0)
388: printf("%s", cp);
389: else {
390: if (nflag)
391: printf("%-*s %-5u ", width, cp, port);
392: else
393: printf("%-*.*s %-5u ", width, width, cp, port);
394: }
395: }
396:
397: void
398: p_protocol(struct sadb_protocol *sap, struct sockaddr *sa, struct sadb_protocol
399: *saft, int proto)
400: {
401: printf("%-6u", sap->sadb_protocol_proto);
1.9 claudio 402:
1.1 claudio 403: if (sa)
404: p_sockaddr(sa, NULL, 0, -1);
405: else
406: printf("none");
407:
408: switch (proto) {
409: case SADB_SATYPE_ESP:
410: printf("/esp");
411: break;
412: case SADB_SATYPE_AH:
413: printf("/ah");
414: break;
415: case SADB_X_SATYPE_IPCOMP:
416: printf("/ipcomp");
417: break;
418: case SADB_X_SATYPE_IPIP:
419: printf("/ipip");
420: break;
421: default:
422: printf("/<unknown>");
423: }
424:
425: switch(saft->sadb_protocol_proto) {
426: case SADB_X_FLOW_TYPE_USE:
427: printf("/use");
428: break;
429: case SADB_X_FLOW_TYPE_REQUIRE:
430: printf("/require");
431: break;
432: case SADB_X_FLOW_TYPE_ACQUIRE:
433: printf("/acquire");
434: break;
435: case SADB_X_FLOW_TYPE_DENY:
436: printf("/deny");
437: break;
438: case SADB_X_FLOW_TYPE_BYPASS:
439: printf("/bypass");
440: break;
441: case SADB_X_FLOW_TYPE_DONTACQ:
442: printf("/dontacq");
443: break;
444: default:
445: printf("/<unknown type>");
446: }
447:
448: switch(saft->sadb_protocol_direction) {
449: case IPSP_DIRECTION_IN:
450: printf("/in");
451: break;
452: case IPSP_DIRECTION_OUT:
453: printf("/out");
454: break;
455: default:
456: printf("/<unknown>");
457: }
458: }
459:
460: void
461: p_sockaddr(struct sockaddr *sa, struct sockaddr *mask, int flags, int width)
462: {
463: char *cp;
464:
465: switch (sa->sa_family) {
466: case AF_INET6:
467: {
468: struct sockaddr_in6 *sa6 = (struct sockaddr_in6 *)sa;
469: struct in6_addr *in6 = &sa6->sin6_addr;
470:
471: /*
472: * XXX: This is a special workaround for KAME kernels.
473: * sin6_scope_id field of SA should be set in the future.
474: */
475: if (IN6_IS_ADDR_LINKLOCAL(in6) ||
1.3 itojun 476: IN6_IS_ADDR_MC_LINKLOCAL(in6) ||
477: IN6_IS_ADDR_MC_INTFACELOCAL(in6)) {
1.1 claudio 478: /* XXX: override is ok? */
479: sa6->sin6_scope_id = (u_int32_t)ntohs(*(u_short *)
480: &in6->s6_addr[2]);
481: *(u_short *)&in6->s6_addr[2] = 0;
482: }
483: if (flags & RTF_HOST)
484: cp = routename((struct sockaddr *)sa6);
485: else
486: cp = netname((struct sockaddr *)sa6, mask);
487: break;
488: }
489: default:
490: if ((flags & RTF_HOST) || mask == NULL)
491: cp = routename(sa);
492: else
493: cp = netname(sa, mask);
494: break;
495: }
496: if (width < 0)
497: printf("%s", cp);
498: else {
499: if (nflag)
500: printf("%-*s ", width, cp);
501: else
502: printf("%-*.*s ", width, width, cp);
503: }
504: }
505:
506: void
507: p_flags(int f, char *format)
508: {
509: char name[33], *flags;
510: const struct bits *p = bits;
511:
512: for (flags = name; p->b_mask && flags < &name[sizeof(name) - 2]; p++)
513: if (p->b_mask & f)
514: *flags++ = p->b_val;
515: *flags = '\0';
516: printf(format, name);
517: }
518:
519: static char line[MAXHOSTNAMELEN];
520: static char domain[MAXHOSTNAMELEN];
521:
522: char *
523: routename(struct sockaddr *sa)
524: {
525: char *cp = NULL;
526: static int first = 1;
527:
528: if (first) {
529: first = 0;
530: if (gethostname(domain, sizeof(domain)) == 0 &&
531: (cp = strchr(domain, '.')))
532: (void)strlcpy(domain, cp + 1, sizeof(domain));
533: else
534: domain[0] = '\0';
535: cp = NULL;
536: }
537:
538: if (sa->sa_len == 0) {
539: (void)strlcpy(line, "default", sizeof(line));
540: return (line);
541: }
542:
543: switch (sa->sa_family) {
544: case AF_INET:
545: return
546: (routename4(((struct sockaddr_in *)sa)->sin_addr.s_addr));
547:
548: case AF_INET6:
549: {
550: struct sockaddr_in6 sin6;
551:
552: memset(&sin6, 0, sizeof(sin6));
553: memcpy(&sin6, sa, sa->sa_len);
554: sin6.sin6_len = sizeof(struct sockaddr_in6);
555: sin6.sin6_family = AF_INET6;
556: if (sa->sa_len == sizeof(struct sockaddr_in6) &&
557: (IN6_IS_ADDR_LINKLOCAL(&sin6.sin6_addr) ||
1.3 itojun 558: IN6_IS_ADDR_MC_LINKLOCAL(&sin6.sin6_addr) ||
559: IN6_IS_ADDR_MC_INTFACELOCAL(&sin6.sin6_addr)) &&
1.1 claudio 560: sin6.sin6_scope_id == 0) {
561: sin6.sin6_scope_id =
562: ntohs(*(u_int16_t *)&sin6.sin6_addr.s6_addr[2]);
563: sin6.sin6_addr.s6_addr[2] = 0;
564: sin6.sin6_addr.s6_addr[3] = 0;
565: }
566: return (routename6(&sin6));
567: }
568:
569: case AF_LINK:
570: return (link_print(sa));
571:
572: case AF_UNSPEC:
573: if (sa->sa_len == sizeof(struct sockaddr_rtlabel)) {
574: static char name[RTLABEL_LEN];
575: struct sockaddr_rtlabel *sr;
576:
577: sr = (struct sockaddr_rtlabel *)sa;
1.9 claudio 578: (void)strlcpy(name, sr->sr_label, sizeof(name));
1.1 claudio 579: return (name);
580: }
581: /* FALLTHROUGH */
582: default:
583: (void)snprintf(line, sizeof(line), "(%d) %s",
584: sa->sa_family, any_ntoa(sa));
585: break;
586: }
587: return (line);
588: }
589:
590: char *
591: routename4(in_addr_t in)
592: {
593: char *cp = NULL;
594: struct in_addr ina;
595: struct hostent *hp;
596:
597: if (in == INADDR_ANY)
598: cp = "default";
599: if (!cp && !nflag) {
600: if ((hp = gethostbyaddr((char *)&in,
601: sizeof(in), AF_INET)) != NULL) {
602: if ((cp = strchr(hp->h_name, '.')) &&
603: !strcmp(cp + 1, domain))
604: *cp = '\0';
605: cp = hp->h_name;
606: }
607: }
608: ina.s_addr = in;
609: strlcpy(line, cp ? cp : inet_ntoa(ina), sizeof(line));
610:
611: return (line);
612: }
613:
614: char *
615: routename6(struct sockaddr_in6 *sin6)
616: {
617: int niflags = 0;
618:
619: if (nflag)
620: niflags |= NI_NUMERICHOST;
621: else
622: niflags |= NI_NOFQDN;
623:
624: if (getnameinfo((struct sockaddr *)sin6, sin6->sin6_len,
625: line, sizeof(line), NULL, 0, niflags) != 0)
626: strncpy(line, "invalid", sizeof(line));
627:
628: return (line);
629: }
630:
631: /*
632: * Return the name of the network whose address is given.
633: * The address is assumed to be that of a net or subnet, not a host.
634: */
635: char *
636: netname4(in_addr_t in, in_addr_t mask)
637: {
638: char *cp = NULL;
639: struct netent *np = NULL;
640: int mbits;
641:
642: in = ntohl(in);
643: mask = ntohl(mask);
644: if (!nflag && in != INADDR_ANY) {
645: if ((np = getnetbyaddr(in, AF_INET)) != NULL)
646: cp = np->n_name;
647: }
648: if (in == INADDR_ANY)
649: cp = "default";
650: mbits = mask ? 33 - ffs(mask) : 0;
651: if (cp)
652: strlcpy(line, cp, sizeof(line));
653: #define C(x) ((x) & 0xff)
654: else if (mbits < 9)
655: snprintf(line, sizeof(line), "%u/%d", C(in >> 24), mbits);
656: else if (mbits < 17)
657: snprintf(line, sizeof(line), "%u.%u/%d",
658: C(in >> 24) , C(in >> 16), mbits);
659: else if (mbits < 25)
660: snprintf(line, sizeof(line), "%u.%u.%u/%d",
661: C(in >> 24), C(in >> 16), C(in >> 8), mbits);
662: else
663: snprintf(line, sizeof(line), "%u.%u.%u.%u/%d", C(in >> 24),
664: C(in >> 16), C(in >> 8), C(in), mbits);
665: #undef C
666: return (line);
667: }
668:
669: char *
670: netname6(struct sockaddr_in6 *sa6, struct sockaddr_in6 *mask)
671: {
672: struct sockaddr_in6 sin6;
673: u_char *p;
674: int masklen, final = 0, illegal = 0;
675: int i, lim, flag, error;
676: char hbuf[NI_MAXHOST];
677:
678: sin6 = *sa6;
679:
680: flag = 0;
681: masklen = 0;
682: if (mask) {
683: lim = mask->sin6_len - offsetof(struct sockaddr_in6, sin6_addr);
1.4 claudio 684: lim = lim < (int)sizeof(struct in6_addr) ?
1.1 claudio 685: lim : sizeof(struct in6_addr);
686: for (p = (u_char *)&mask->sin6_addr, i = 0; i < lim; p++) {
687: if (final && *p) {
688: illegal++;
689: sin6.sin6_addr.s6_addr[i++] = 0x00;
690: continue;
691: }
692:
693: switch (*p & 0xff) {
694: case 0xff:
695: masklen += 8;
696: break;
697: case 0xfe:
698: masklen += 7;
699: final++;
700: break;
701: case 0xfc:
702: masklen += 6;
703: final++;
704: break;
705: case 0xf8:
706: masklen += 5;
707: final++;
708: break;
709: case 0xf0:
710: masklen += 4;
711: final++;
712: break;
713: case 0xe0:
714: masklen += 3;
715: final++;
716: break;
717: case 0xc0:
718: masklen += 2;
719: final++;
720: break;
721: case 0x80:
722: masklen += 1;
723: final++;
724: break;
725: case 0x00:
726: final++;
727: break;
728: default:
729: final++;
730: illegal++;
731: break;
732: }
733:
734: if (!illegal)
735: sin6.sin6_addr.s6_addr[i++] &= *p;
736: else
737: sin6.sin6_addr.s6_addr[i++] = 0x00;
738: }
739: while (i < sizeof(struct in6_addr))
740: sin6.sin6_addr.s6_addr[i++] = 0x00;
741: } else
742: masklen = 128;
743:
744: if (masklen == 0 && IN6_IS_ADDR_UNSPECIFIED(&sin6.sin6_addr))
745: return ("default");
746:
747: if (illegal)
748: warnx("illegal prefixlen");
749:
750: if (nflag)
751: flag |= NI_NUMERICHOST;
752: error = getnameinfo((struct sockaddr *)&sin6, sin6.sin6_len,
753: hbuf, sizeof(hbuf), NULL, 0, flag);
754: if (error)
755: snprintf(hbuf, sizeof(hbuf), "invalid");
756:
757: snprintf(line, sizeof(line), "%s/%d", hbuf, masklen);
758: return (line);
759: }
760:
761: /*
762: * Return the name of the network whose address is given.
763: * The address is assumed to be that of a net or subnet, not a host.
764: */
765: char *
766: netname(struct sockaddr *sa, struct sockaddr *mask)
767: {
768: switch (sa->sa_family) {
769:
770: case AF_INET:
771: return netname4(((struct sockaddr_in *)sa)->sin_addr.s_addr,
772: ((struct sockaddr_in *)mask)->sin_addr.s_addr);
773: case AF_INET6:
774: return netname6((struct sockaddr_in6 *)sa,
775: (struct sockaddr_in6 *)mask);
776: case AF_LINK:
777: return (link_print(sa));
778: default:
779: snprintf(line, sizeof(line), "af %d: %s",
780: sa->sa_family, any_ntoa(sa));
781: break;
782: }
783: return (line);
784: }
785:
786: static const char hexlist[] = "0123456789abcdef";
787:
788: char *
789: any_ntoa(const struct sockaddr *sa)
790: {
791: static char obuf[240];
792: const char *in = sa->sa_data;
793: char *out = obuf;
794: int len = sa->sa_len - offsetof(struct sockaddr, sa_data);
795:
796: *out++ = 'Q';
797: do {
798: *out++ = hexlist[(*in >> 4) & 15];
799: *out++ = hexlist[(*in++) & 15];
800: *out++ = '.';
801: } while (--len > 0 && (out + 3) < &obuf[sizeof(obuf) - 1]);
802: out[-1] = '\0';
803: return (obuf);
804: }
805:
806: char *
807: link_print(struct sockaddr *sa)
808: {
809: struct sockaddr_dl *sdl = (struct sockaddr_dl *)sa;
810: u_char *lla = (u_char *)sdl->sdl_data + sdl->sdl_nlen;
811:
812: if (sdl->sdl_nlen == 0 && sdl->sdl_alen == 0 &&
813: sdl->sdl_slen == 0) {
814: (void)snprintf(line, sizeof(line), "link#%d", sdl->sdl_index);
815: return (line);
816: }
817: switch (sdl->sdl_type) {
818: case IFT_ETHER:
819: case IFT_CARP:
820: return (ether_ntoa((struct ether_addr *)lla));
821: default:
822: return (link_ntoa(sdl));
823: }
824: }
825:
826: void
827: index_pfk(struct sadb_msg *msg, void **headers)
828: {
829: struct sadb_ext *ext;
830:
831: for (ext = (struct sadb_ext *)(msg + 1);
832: (size_t)((u_int8_t *)ext - (u_int8_t *)msg) <
833: msg->sadb_msg_len * PFKEYV2_CHUNK && ext->sadb_ext_len > 0;
834: ext = (struct sadb_ext *)((u_int8_t *)ext +
835: ext->sadb_ext_len * PFKEYV2_CHUNK)) {
836: switch (ext->sadb_ext_type) {
837: case SADB_EXT_ADDRESS_SRC:
838: headers[SADB_EXT_ADDRESS_SRC] = (void *)ext;
839: break;
840: case SADB_EXT_ADDRESS_DST:
841: headers[SADB_EXT_ADDRESS_DST] = (void *)ext;
842: break;
843: case SADB_X_EXT_PROTOCOL:
844: headers[SADB_X_EXT_PROTOCOL] = (void *)ext;
845: break;
846: case SADB_X_EXT_SRC_FLOW:
847: headers[SADB_X_EXT_SRC_FLOW] = (void *)ext;
848: break;
849: case SADB_X_EXT_DST_FLOW:
850: headers[SADB_X_EXT_DST_FLOW] = (void *)ext;
851: break;
852: case SADB_X_EXT_SRC_MASK:
853: headers[SADB_X_EXT_SRC_MASK] = (void *)ext;
854: break;
855: case SADB_X_EXT_DST_MASK:
856: headers[SADB_X_EXT_DST_MASK] = (void *)ext;
857: break;
858: case SADB_X_EXT_FLOW_TYPE:
859: headers[SADB_X_EXT_FLOW_TYPE] = (void *)ext;
860: default:
861: /* Ignore. */
862: break;
863: }
864: }
865: }