Annotation of src/usr.bin/netstat/show.c, Revision 1.14
1.14 ! claudio 1: /* $OpenBSD: show.c,v 1.13 2008/05/08 07:19:42 claudio Exp $ */
1.1 claudio 2: /* $NetBSD: show.c,v 1.1 1996/11/15 18:01:41 gwr Exp $ */
3:
4: /*
5: * Copyright (c) 1983, 1988, 1993
6: * The Regents of the University of California. All rights reserved.
7: *
8: * Redistribution and use in source and binary forms, with or without
9: * modification, are permitted provided that the following conditions
10: * are met:
11: * 1. Redistributions of source code must retain the above copyright
12: * notice, this list of conditions and the following disclaimer.
13: * 2. Redistributions in binary form must reproduce the above copyright
14: * notice, this list of conditions and the following disclaimer in the
15: * documentation and/or other materials provided with the distribution.
16: * 3. Neither the name of the University nor the names of its contributors
17: * may be used to endorse or promote products derived from this software
18: * without specific prior written permission.
19: *
20: * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
21: * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
22: * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23: * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
24: * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
25: * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26: * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27: * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28: * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29: * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
30: * SUCH DAMAGE.
31: */
32:
33: #include <sys/param.h>
34: #include <sys/protosw.h>
35: #include <sys/socket.h>
36: #include <sys/mbuf.h>
37: #include <sys/sysctl.h>
38:
39: #include <net/if.h>
40: #include <net/if_dl.h>
41: #include <net/if_types.h>
42: #include <net/pfkeyv2.h>
43: #include <net/route.h>
44: #include <netinet/in.h>
45: #include <netinet/if_ether.h>
46: #include <netinet/ip_ipsp.h>
1.13 claudio 47: #include <netmpls/mpls.h>
1.1 claudio 48: #include <arpa/inet.h>
49:
50: #include <err.h>
51: #include <errno.h>
52: #include <netdb.h>
53: #include <stdio.h>
54: #include <stddef.h>
55: #include <stdlib.h>
56: #include <string.h>
57: #include <unistd.h>
58:
59: #include "netstat.h"
60:
61: char *any_ntoa(const struct sockaddr *);
62: char *link_print(struct sockaddr *);
1.13 claudio 63: char *label_print_op(u_int8_t);
64: char *label_print(struct sockaddr *);
1.1 claudio 65:
66: #define ROUNDUP(a) \
67: ((a) > 0 ? (1 + (((a) - 1) | (sizeof(long) - 1))) : sizeof(long))
68: #define ADVANCE(x, n) (x += ROUNDUP((n)->sa_len))
69:
70: #define PFKEYV2_CHUNK sizeof(u_int64_t)
71:
72: /*
73: * Definitions for showing gateway flags.
74: */
75: struct bits {
76: int b_mask;
77: char b_val;
78: };
79: static const struct bits bits[] = {
80: { RTF_UP, 'U' },
81: { RTF_GATEWAY, 'G' },
82: { RTF_HOST, 'H' },
83: { RTF_REJECT, 'R' },
84: { RTF_BLACKHOLE, 'B' },
85: { RTF_DYNAMIC, 'D' },
86: { RTF_MODIFIED, 'M' },
87: { RTF_DONE, 'd' }, /* Completed -- for routing messages only */
88: { RTF_MASK, 'm' }, /* Mask Present -- for routing messages only */
89: { RTF_CLONING, 'C' },
90: { RTF_XRESOLVE, 'X' },
91: { RTF_LLINFO, 'L' },
92: { RTF_STATIC, 'S' },
93: { RTF_PROTO1, '1' },
94: { RTF_PROTO2, '2' },
95: { RTF_PROTO3, '3' },
96: { RTF_CLONED, 'c' },
97: { RTF_JUMBO, 'J' },
98: { 0 }
99: };
100:
101: void p_rtentry(struct rt_msghdr *);
102: void p_pfkentry(struct sadb_msg *);
103: void pr_family(int);
104: void p_encap(struct sockaddr *, struct sockaddr *, int);
105: void p_protocol(struct sadb_protocol *, struct sockaddr *, struct
1.13 claudio 106: sadb_protocol *, int);
1.1 claudio 107: void p_sockaddr(struct sockaddr *, struct sockaddr *, int, int);
108: void p_flags(int, char *);
109: char *routename4(in_addr_t);
110: char *routename6(struct sockaddr_in6 *);
111: void index_pfk(struct sadb_msg *, void **);
112:
113: /*
114: * Print routing tables.
115: */
116: void
1.10 claudio 117: p_rttables(int af, u_int tableid)
1.1 claudio 118: {
119: struct rt_msghdr *rtm;
120: struct sadb_msg *msg;
121: char *buf = NULL, *next, *lim = NULL;
122: size_t needed;
1.10 claudio 123: int mib[7];
1.1 claudio 124: struct sockaddr *sa;
125:
126: mib[0] = CTL_NET;
127: mib[1] = PF_ROUTE;
128: mib[2] = 0;
129: mib[3] = af;
130: mib[4] = NET_RT_DUMP;
131: mib[5] = 0;
1.10 claudio 132: mib[6] = tableid;
133:
134: if (sysctl(mib, 7, NULL, &needed, NULL, 0) < 0)
1.1 claudio 135: err(1, "route-sysctl-estimate");
136: if (needed > 0) {
137: if ((buf = malloc(needed)) == 0)
138: err(1, NULL);
1.10 claudio 139: if (sysctl(mib, 7, buf, &needed, NULL, 0) < 0)
1.1 claudio 140: err(1, "sysctl of routing table");
141: lim = buf + needed;
142: }
143:
144: printf("Routing tables\n");
145:
146: if (buf) {
147: for (next = buf; next < lim; next += rtm->rtm_msglen) {
148: rtm = (struct rt_msghdr *)next;
1.8 claudio 149: if (rtm->rtm_version != RTM_VERSION)
150: continue;
1.1 claudio 151: sa = (struct sockaddr *)(rtm + 1);
152: if (af != AF_UNSPEC && sa->sa_family != af)
153: continue;
154: p_rtentry(rtm);
155: }
156: free(buf);
157: buf = NULL;
158: }
159:
160: if (af != 0 && af != PF_KEY)
161: return;
162:
163: mib[0] = CTL_NET;
164: mib[1] = PF_KEY;
165: mib[2] = PF_KEY_V2;
166: mib[3] = NET_KEY_SPD_DUMP;
167: mib[4] = mib[5] = 0;
168:
169: if (sysctl(mib, 4, NULL, &needed, NULL, 0) == -1) {
170: if (errno == ENOPROTOOPT)
171: return;
172: err(1, "spd-sysctl-estimate");
173: }
174: if (needed > 0) {
175: if ((buf = malloc(needed)) == 0)
176: err(1, NULL);
177: if (sysctl(mib, 4, buf, &needed, NULL, 0) == -1)
178: err(1,"sysctl of spd");
179: lim = buf + needed;
180: }
181:
182: if (buf) {
183: printf("\nEncap:\n");
184:
185: for (next = buf; next < lim; next += msg->sadb_msg_len *
186: PFKEYV2_CHUNK) {
187: msg = (struct sadb_msg *)next;
188: if (msg->sadb_msg_len == 0)
189: break;
190: p_pfkentry(msg);
191: }
192: free(buf);
193: buf = NULL;
194: }
195: }
196:
1.12 deraadt 197: /*
1.1 claudio 198: * column widths; each followed by one space
199: * width of destination/gateway column
200: * strlen("fe80::aaaa:bbbb:cccc:dddd@gif0") == 30, strlen("/128") == 4
201: */
202: #define WID_GW(af) ((af) == AF_INET6 ? (nflag ? 30 : 18) : 18)
203:
1.13 claudio 204: int
205: WID_DST(int af)
206: {
207:
208: if (nflag)
209: switch (af) {
210: case AF_MPLS:
211: return 34;
212: case AF_INET6:
213: return 34;
214: default:
215: return 18;
216: }
217: else
218: switch (af) {
219: case AF_MPLS:
220: return 34;
221: default:
222: return 18;
223: }
224: }
225:
1.1 claudio 226: /*
227: * Print header for routing table columns.
228: */
229: void
230: pr_rthdr(int af, int Aflag)
231: {
232: if (Aflag)
233: printf("%-*.*s ", PLEN, PLEN, "Address");
1.13 claudio 234: switch (af) {
235: case PF_KEY:
1.1 claudio 236: printf("%-18s %-5s %-18s %-5s %-5s %-22s\n",
237: "Source", "Port", "Destination",
238: "Port", "Proto", "SA(Address/Proto/Type/Direction)");
1.13 claudio 239: break;
240: case PF_MPLS:
241: printf("%-16s %-10s %-6s %-18s %-6.6s %5.5s %8.8s %5.5s %4.4s %s\n",
242: "In label", "Out label", "Op", "Gateway",
243: "Flags", "Refs", "Use", "Mtu", "Prio", "Interface");
244: break;
245: default:
246: printf("%-*.*s %-*.*s %-6.6s %5.5s %8.8s %5.5s %4.4s %s\n",
247: WID_DST(af), WID_DST(af), "Destination",
248: WID_GW(af), WID_GW(af), "Gateway",
249: "Flags", "Refs", "Use", "Mtu", "Prio", "Iface");
250: break;
251: }
1.1 claudio 252: }
253:
254: static void
255: get_rtaddrs(int addrs, struct sockaddr *sa, struct sockaddr **rti_info)
256: {
257: int i;
258:
259: for (i = 0; i < RTAX_MAX; i++) {
260: if (addrs & (1 << i)) {
261: rti_info[i] = sa;
262: sa = (struct sockaddr *)((char *)(sa) +
263: ROUNDUP(sa->sa_len));
264: } else
265: rti_info[i] = NULL;
266: }
267: }
268:
269: /*
270: * Print a routing table entry.
271: */
272: void
273: p_rtentry(struct rt_msghdr *rtm)
274: {
275: static int old_af = -1;
276: struct sockaddr *sa = (struct sockaddr *)(rtm + 1);
277: struct sockaddr *mask, *rti_info[RTAX_MAX];
278: char ifbuf[IF_NAMESIZE];
279:
280: if (sa->sa_family == AF_KEY)
281: return;
282:
1.5 pyr 283: get_rtaddrs(rtm->rtm_addrs, sa, rti_info);
284: if (Fflag && rti_info[RTAX_GATEWAY]->sa_family != sa->sa_family) {
285: return;
286: }
1.1 claudio 287: if (old_af != sa->sa_family) {
288: old_af = sa->sa_family;
289: pr_family(sa->sa_family);
290: pr_rthdr(sa->sa_family, 0);
291: }
292:
293: mask = rti_info[RTAX_NETMASK];
294: if ((sa = rti_info[RTAX_DST]) == NULL)
295: return;
296:
297: p_sockaddr(sa, mask, rtm->rtm_flags, WID_DST(sa->sa_family));
298: p_sockaddr(rti_info[RTAX_GATEWAY], NULL, RTF_HOST,
299: WID_GW(sa->sa_family));
300: p_flags(rtm->rtm_flags, "%-6.6s ");
1.13 claudio 301: printf("%5u %8llu ", rtm->rtm_rmx.rmx_refcnt,
1.1 claudio 302: rtm->rtm_rmx.rmx_pksent);
303: if (rtm->rtm_rmx.rmx_mtu)
1.13 claudio 304: printf("%5u ", rtm->rtm_rmx.rmx_mtu);
1.1 claudio 305: else
1.13 claudio 306: printf("%5s ", "-");
1.1 claudio 307: putchar((rtm->rtm_rmx.rmx_locks & RTV_MTU) ? 'L' : ' ');
1.14 ! claudio 308: printf(" %2d %.16s", rtm->rtm_priority & RTP_MASK,
1.13 claudio 309: if_indextoname(rtm->rtm_index, ifbuf));
1.1 claudio 310: putchar('\n');
311: }
312:
313: /*
314: * Print a pfkey/encap entry.
315: */
316: void
317: p_pfkentry(struct sadb_msg *msg)
318: {
1.13 claudio 319: static int old = 0;
1.1 claudio 320: struct sadb_address *saddr;
321: struct sadb_protocol *sap, *saft;
322: struct sockaddr *sa, *mask;
323: void *headers[SADB_EXT_MAX + 1];
324:
325: if (!old) {
326: pr_rthdr(PF_KEY, 0);
327: old++;
328: }
329:
330: bzero(headers, sizeof(headers));
331: index_pfk(msg, headers);
332:
333: /* These are always set */
334: saddr = headers[SADB_X_EXT_SRC_FLOW];
335: sa = (struct sockaddr *)(saddr + 1);
336: saddr = headers[SADB_X_EXT_SRC_MASK];
337: mask = (struct sockaddr *)(saddr + 1);
338: p_encap(sa, mask, WID_DST(sa->sa_family));
339:
340: /* These are always set, too. */
341: saddr = headers[SADB_X_EXT_DST_FLOW];
342: sa = (struct sockaddr *)(saddr + 1);
343: saddr = headers[SADB_X_EXT_DST_MASK];
344: mask = (struct sockaddr *)(saddr + 1);
345: p_encap(sa, mask, WID_DST(sa->sa_family));
346:
347: /* Bypass and deny flows do not set SADB_EXT_ADDRESS_DST! */
348: sap = headers[SADB_X_EXT_PROTOCOL];
349: saft = headers[SADB_X_EXT_FLOW_TYPE];
350: saddr = headers[SADB_EXT_ADDRESS_DST];
351: if (saddr)
352: sa = (struct sockaddr *)(saddr + 1);
353: else
354: sa = NULL;
355: p_protocol(sap, sa, saft, msg->sadb_msg_satype);
356:
357: printf("\n");
358: }
359:
360: /*
361: * Print address family header before a section of the routing table.
362: */
363: void
364: pr_family(int af)
365: {
366: char *afname;
367:
368: switch (af) {
369: case AF_INET:
370: afname = "Internet";
371: break;
372: case AF_INET6:
373: afname = "Internet6";
374: break;
375: case PF_KEY:
376: afname = "Encap";
377: break;
1.13 claudio 378: case AF_MPLS:
379: afname = "MPLS";
380: break;
1.1 claudio 381: case AF_APPLETALK:
382: afname = "AppleTalk";
383: break;
384: default:
385: afname = NULL;
386: break;
387: }
388: if (afname)
389: printf("\n%s:\n", afname);
390: else
391: printf("\nProtocol Family %d:\n", af);
392: }
393:
394: void
395: p_addr(struct sockaddr *sa, struct sockaddr *mask, int flags)
396: {
397: p_sockaddr(sa, mask, flags, WID_DST(sa->sa_family));
398: }
399:
400: void
401: p_gwaddr(struct sockaddr *sa, int af)
402: {
403: p_sockaddr(sa, 0, RTF_HOST, WID_GW(af));
404: }
405:
406: void
407: p_encap(struct sockaddr *sa, struct sockaddr *mask, int width)
408: {
1.13 claudio 409: char *cp;
410: unsigned short port = 0;
1.1 claudio 411:
1.2 todd 412: if (mask)
413: cp = netname(sa, mask);
414: else
415: cp = routename(sa);
1.1 claudio 416: switch (sa->sa_family) {
1.9 claudio 417: case AF_INET:
418: port = ntohs(((struct sockaddr_in *)sa)->sin_port);
419: break;
1.2 todd 420: case AF_INET6:
421: port = ntohs(((struct sockaddr_in6 *)sa)->sin6_port);
1.1 claudio 422: break;
423: }
424: if (width < 0)
425: printf("%s", cp);
426: else {
427: if (nflag)
428: printf("%-*s %-5u ", width, cp, port);
429: else
430: printf("%-*.*s %-5u ", width, width, cp, port);
431: }
432: }
433:
434: void
435: p_protocol(struct sadb_protocol *sap, struct sockaddr *sa, struct sadb_protocol
436: *saft, int proto)
437: {
438: printf("%-6u", sap->sadb_protocol_proto);
1.9 claudio 439:
1.1 claudio 440: if (sa)
441: p_sockaddr(sa, NULL, 0, -1);
442: else
443: printf("none");
444:
445: switch (proto) {
446: case SADB_SATYPE_ESP:
447: printf("/esp");
448: break;
449: case SADB_SATYPE_AH:
450: printf("/ah");
451: break;
452: case SADB_X_SATYPE_IPCOMP:
453: printf("/ipcomp");
454: break;
455: case SADB_X_SATYPE_IPIP:
456: printf("/ipip");
457: break;
458: default:
459: printf("/<unknown>");
460: }
461:
462: switch(saft->sadb_protocol_proto) {
463: case SADB_X_FLOW_TYPE_USE:
464: printf("/use");
465: break;
466: case SADB_X_FLOW_TYPE_REQUIRE:
467: printf("/require");
468: break;
469: case SADB_X_FLOW_TYPE_ACQUIRE:
470: printf("/acquire");
471: break;
472: case SADB_X_FLOW_TYPE_DENY:
473: printf("/deny");
474: break;
475: case SADB_X_FLOW_TYPE_BYPASS:
476: printf("/bypass");
477: break;
478: case SADB_X_FLOW_TYPE_DONTACQ:
479: printf("/dontacq");
480: break;
481: default:
482: printf("/<unknown type>");
483: }
484:
485: switch(saft->sadb_protocol_direction) {
486: case IPSP_DIRECTION_IN:
487: printf("/in");
488: break;
489: case IPSP_DIRECTION_OUT:
490: printf("/out");
491: break;
492: default:
493: printf("/<unknown>");
494: }
495: }
496:
497: void
498: p_sockaddr(struct sockaddr *sa, struct sockaddr *mask, int flags, int width)
499: {
500: char *cp;
501:
502: switch (sa->sa_family) {
503: case AF_INET6:
504: {
505: struct sockaddr_in6 *sa6 = (struct sockaddr_in6 *)sa;
506: struct in6_addr *in6 = &sa6->sin6_addr;
507:
508: /*
509: * XXX: This is a special workaround for KAME kernels.
510: * sin6_scope_id field of SA should be set in the future.
511: */
512: if (IN6_IS_ADDR_LINKLOCAL(in6) ||
1.3 itojun 513: IN6_IS_ADDR_MC_LINKLOCAL(in6) ||
514: IN6_IS_ADDR_MC_INTFACELOCAL(in6)) {
1.1 claudio 515: /* XXX: override is ok? */
516: sa6->sin6_scope_id = (u_int32_t)ntohs(*(u_short *)
517: &in6->s6_addr[2]);
518: *(u_short *)&in6->s6_addr[2] = 0;
519: }
520: if (flags & RTF_HOST)
521: cp = routename((struct sockaddr *)sa6);
522: else
523: cp = netname((struct sockaddr *)sa6, mask);
524: break;
525: }
526: default:
527: if ((flags & RTF_HOST) || mask == NULL)
528: cp = routename(sa);
529: else
530: cp = netname(sa, mask);
531: break;
532: }
533: if (width < 0)
534: printf("%s", cp);
535: else {
536: if (nflag)
537: printf("%-*s ", width, cp);
538: else
539: printf("%-*.*s ", width, width, cp);
540: }
541: }
542:
543: void
544: p_flags(int f, char *format)
545: {
546: char name[33], *flags;
547: const struct bits *p = bits;
548:
549: for (flags = name; p->b_mask && flags < &name[sizeof(name) - 2]; p++)
550: if (p->b_mask & f)
551: *flags++ = p->b_val;
552: *flags = '\0';
553: printf(format, name);
554: }
555:
556: static char line[MAXHOSTNAMELEN];
557: static char domain[MAXHOSTNAMELEN];
558:
559: char *
560: routename(struct sockaddr *sa)
561: {
562: char *cp = NULL;
563: static int first = 1;
564:
565: if (first) {
566: first = 0;
567: if (gethostname(domain, sizeof(domain)) == 0 &&
568: (cp = strchr(domain, '.')))
569: (void)strlcpy(domain, cp + 1, sizeof(domain));
570: else
571: domain[0] = '\0';
572: cp = NULL;
573: }
574:
575: if (sa->sa_len == 0) {
576: (void)strlcpy(line, "default", sizeof(line));
577: return (line);
578: }
579:
580: switch (sa->sa_family) {
581: case AF_INET:
582: return
583: (routename4(((struct sockaddr_in *)sa)->sin_addr.s_addr));
584:
585: case AF_INET6:
586: {
587: struct sockaddr_in6 sin6;
588:
589: memset(&sin6, 0, sizeof(sin6));
590: memcpy(&sin6, sa, sa->sa_len);
591: sin6.sin6_len = sizeof(struct sockaddr_in6);
592: sin6.sin6_family = AF_INET6;
593: if (sa->sa_len == sizeof(struct sockaddr_in6) &&
594: (IN6_IS_ADDR_LINKLOCAL(&sin6.sin6_addr) ||
1.3 itojun 595: IN6_IS_ADDR_MC_LINKLOCAL(&sin6.sin6_addr) ||
596: IN6_IS_ADDR_MC_INTFACELOCAL(&sin6.sin6_addr)) &&
1.1 claudio 597: sin6.sin6_scope_id == 0) {
598: sin6.sin6_scope_id =
599: ntohs(*(u_int16_t *)&sin6.sin6_addr.s6_addr[2]);
600: sin6.sin6_addr.s6_addr[2] = 0;
601: sin6.sin6_addr.s6_addr[3] = 0;
602: }
603: return (routename6(&sin6));
604: }
605:
606: case AF_LINK:
607: return (link_print(sa));
1.13 claudio 608: case AF_MPLS:
609: return (label_print(sa));
1.1 claudio 610: case AF_UNSPEC:
611: if (sa->sa_len == sizeof(struct sockaddr_rtlabel)) {
612: static char name[RTLABEL_LEN];
613: struct sockaddr_rtlabel *sr;
614:
615: sr = (struct sockaddr_rtlabel *)sa;
1.9 claudio 616: (void)strlcpy(name, sr->sr_label, sizeof(name));
1.1 claudio 617: return (name);
618: }
619: /* FALLTHROUGH */
620: default:
621: (void)snprintf(line, sizeof(line), "(%d) %s",
622: sa->sa_family, any_ntoa(sa));
623: break;
624: }
625: return (line);
626: }
627:
628: char *
629: routename4(in_addr_t in)
630: {
631: char *cp = NULL;
632: struct in_addr ina;
633: struct hostent *hp;
634:
635: if (in == INADDR_ANY)
636: cp = "default";
637: if (!cp && !nflag) {
638: if ((hp = gethostbyaddr((char *)&in,
639: sizeof(in), AF_INET)) != NULL) {
640: if ((cp = strchr(hp->h_name, '.')) &&
641: !strcmp(cp + 1, domain))
642: *cp = '\0';
643: cp = hp->h_name;
644: }
645: }
646: ina.s_addr = in;
647: strlcpy(line, cp ? cp : inet_ntoa(ina), sizeof(line));
648:
649: return (line);
650: }
651:
652: char *
653: routename6(struct sockaddr_in6 *sin6)
654: {
655: int niflags = 0;
656:
657: if (nflag)
658: niflags |= NI_NUMERICHOST;
659: else
660: niflags |= NI_NOFQDN;
661:
662: if (getnameinfo((struct sockaddr *)sin6, sin6->sin6_len,
663: line, sizeof(line), NULL, 0, niflags) != 0)
664: strncpy(line, "invalid", sizeof(line));
665:
666: return (line);
667: }
668:
669: /*
670: * Return the name of the network whose address is given.
671: * The address is assumed to be that of a net or subnet, not a host.
672: */
673: char *
674: netname4(in_addr_t in, in_addr_t mask)
675: {
676: char *cp = NULL;
677: struct netent *np = NULL;
678: int mbits;
679:
680: in = ntohl(in);
681: mask = ntohl(mask);
682: if (!nflag && in != INADDR_ANY) {
683: if ((np = getnetbyaddr(in, AF_INET)) != NULL)
684: cp = np->n_name;
685: }
686: if (in == INADDR_ANY)
687: cp = "default";
688: mbits = mask ? 33 - ffs(mask) : 0;
689: if (cp)
690: strlcpy(line, cp, sizeof(line));
691: #define C(x) ((x) & 0xff)
692: else if (mbits < 9)
693: snprintf(line, sizeof(line), "%u/%d", C(in >> 24), mbits);
694: else if (mbits < 17)
695: snprintf(line, sizeof(line), "%u.%u/%d",
696: C(in >> 24) , C(in >> 16), mbits);
697: else if (mbits < 25)
698: snprintf(line, sizeof(line), "%u.%u.%u/%d",
699: C(in >> 24), C(in >> 16), C(in >> 8), mbits);
700: else
701: snprintf(line, sizeof(line), "%u.%u.%u.%u/%d", C(in >> 24),
702: C(in >> 16), C(in >> 8), C(in), mbits);
703: #undef C
704: return (line);
705: }
706:
707: char *
708: netname6(struct sockaddr_in6 *sa6, struct sockaddr_in6 *mask)
709: {
710: struct sockaddr_in6 sin6;
711: u_char *p;
712: int masklen, final = 0, illegal = 0;
713: int i, lim, flag, error;
714: char hbuf[NI_MAXHOST];
715:
716: sin6 = *sa6;
717:
718: flag = 0;
719: masklen = 0;
720: if (mask) {
721: lim = mask->sin6_len - offsetof(struct sockaddr_in6, sin6_addr);
1.4 claudio 722: lim = lim < (int)sizeof(struct in6_addr) ?
1.1 claudio 723: lim : sizeof(struct in6_addr);
724: for (p = (u_char *)&mask->sin6_addr, i = 0; i < lim; p++) {
725: if (final && *p) {
726: illegal++;
727: sin6.sin6_addr.s6_addr[i++] = 0x00;
728: continue;
729: }
730:
731: switch (*p & 0xff) {
732: case 0xff:
733: masklen += 8;
734: break;
735: case 0xfe:
736: masklen += 7;
737: final++;
738: break;
739: case 0xfc:
740: masklen += 6;
741: final++;
742: break;
743: case 0xf8:
744: masklen += 5;
745: final++;
746: break;
747: case 0xf0:
748: masklen += 4;
749: final++;
750: break;
751: case 0xe0:
752: masklen += 3;
753: final++;
754: break;
755: case 0xc0:
756: masklen += 2;
757: final++;
758: break;
759: case 0x80:
760: masklen += 1;
761: final++;
762: break;
763: case 0x00:
764: final++;
765: break;
766: default:
767: final++;
768: illegal++;
769: break;
770: }
771:
772: if (!illegal)
773: sin6.sin6_addr.s6_addr[i++] &= *p;
774: else
775: sin6.sin6_addr.s6_addr[i++] = 0x00;
776: }
777: while (i < sizeof(struct in6_addr))
778: sin6.sin6_addr.s6_addr[i++] = 0x00;
779: } else
780: masklen = 128;
781:
782: if (masklen == 0 && IN6_IS_ADDR_UNSPECIFIED(&sin6.sin6_addr))
783: return ("default");
784:
785: if (illegal)
786: warnx("illegal prefixlen");
787:
788: if (nflag)
789: flag |= NI_NUMERICHOST;
790: error = getnameinfo((struct sockaddr *)&sin6, sin6.sin6_len,
791: hbuf, sizeof(hbuf), NULL, 0, flag);
792: if (error)
793: snprintf(hbuf, sizeof(hbuf), "invalid");
794:
795: snprintf(line, sizeof(line), "%s/%d", hbuf, masklen);
796: return (line);
797: }
798:
799: /*
800: * Return the name of the network whose address is given.
801: * The address is assumed to be that of a net or subnet, not a host.
802: */
803: char *
804: netname(struct sockaddr *sa, struct sockaddr *mask)
805: {
806: switch (sa->sa_family) {
807:
808: case AF_INET:
809: return netname4(((struct sockaddr_in *)sa)->sin_addr.s_addr,
810: ((struct sockaddr_in *)mask)->sin_addr.s_addr);
811: case AF_INET6:
812: return netname6((struct sockaddr_in6 *)sa,
813: (struct sockaddr_in6 *)mask);
814: case AF_LINK:
815: return (link_print(sa));
1.13 claudio 816: case AF_MPLS:
817: return (label_print(sa));
1.1 claudio 818: default:
819: snprintf(line, sizeof(line), "af %d: %s",
820: sa->sa_family, any_ntoa(sa));
821: break;
822: }
823: return (line);
824: }
825:
826: static const char hexlist[] = "0123456789abcdef";
827:
828: char *
829: any_ntoa(const struct sockaddr *sa)
830: {
831: static char obuf[240];
832: const char *in = sa->sa_data;
833: char *out = obuf;
834: int len = sa->sa_len - offsetof(struct sockaddr, sa_data);
835:
836: *out++ = 'Q';
837: do {
838: *out++ = hexlist[(*in >> 4) & 15];
839: *out++ = hexlist[(*in++) & 15];
840: *out++ = '.';
841: } while (--len > 0 && (out + 3) < &obuf[sizeof(obuf) - 1]);
842: out[-1] = '\0';
843: return (obuf);
844: }
845:
846: char *
847: link_print(struct sockaddr *sa)
848: {
849: struct sockaddr_dl *sdl = (struct sockaddr_dl *)sa;
850: u_char *lla = (u_char *)sdl->sdl_data + sdl->sdl_nlen;
851:
852: if (sdl->sdl_nlen == 0 && sdl->sdl_alen == 0 &&
853: sdl->sdl_slen == 0) {
854: (void)snprintf(line, sizeof(line), "link#%d", sdl->sdl_index);
855: return (line);
856: }
857: switch (sdl->sdl_type) {
858: case IFT_ETHER:
859: case IFT_CARP:
860: return (ether_ntoa((struct ether_addr *)lla));
861: default:
862: return (link_ntoa(sdl));
863: }
1.13 claudio 864: }
865:
866: char *
867: label_print_op(u_int8_t type)
868: {
869: switch (type) {
870: case MPLS_OP_POP:
871: return ("POP");
872: case MPLS_OP_SWAP:
873: return ("SWAP");
874: case MPLS_OP_PUSH:
875: return ("PUSH");
876: default:
877: return ("?");
878: }
879: }
880:
881: char *
882: label_print(struct sockaddr *sa)
883: {
884: struct sockaddr_mpls *smpls = (struct sockaddr_mpls *)sa;
885: char ifname_in[IF_NAMESIZE];
886: char ifname_out[IF_NAMESIZE];
887: char *in_label;
888: char *out_label;
889:
890: if (asprintf(&in_label, "%u%%%s",
891: ntohl(smpls->smpls_in_label) >> MPLS_LABEL_OFFSET,
892: if_indextoname(smpls->smpls_in_ifindex, ifname_in)) == -1)
893: err(1, NULL);
894:
895: if (asprintf(&out_label, "%u",
896: ntohl(smpls->smpls_out_label) >> MPLS_LABEL_OFFSET) == -1)
897: err(1, NULL);
898:
899: (void)snprintf(line, sizeof(line), "%-16s %-10s %-6s", in_label,
900: smpls->smpls_operation == MPLS_OP_POP ? "-" : out_label,
901: label_print_op(smpls->smpls_operation));
902:
903: free(in_label);
904: free(out_label);
905:
906: return (line);
1.1 claudio 907: }
908:
909: void
910: index_pfk(struct sadb_msg *msg, void **headers)
911: {
912: struct sadb_ext *ext;
913:
914: for (ext = (struct sadb_ext *)(msg + 1);
915: (size_t)((u_int8_t *)ext - (u_int8_t *)msg) <
916: msg->sadb_msg_len * PFKEYV2_CHUNK && ext->sadb_ext_len > 0;
917: ext = (struct sadb_ext *)((u_int8_t *)ext +
918: ext->sadb_ext_len * PFKEYV2_CHUNK)) {
919: switch (ext->sadb_ext_type) {
920: case SADB_EXT_ADDRESS_SRC:
921: headers[SADB_EXT_ADDRESS_SRC] = (void *)ext;
922: break;
923: case SADB_EXT_ADDRESS_DST:
924: headers[SADB_EXT_ADDRESS_DST] = (void *)ext;
925: break;
926: case SADB_X_EXT_PROTOCOL:
927: headers[SADB_X_EXT_PROTOCOL] = (void *)ext;
928: break;
929: case SADB_X_EXT_SRC_FLOW:
930: headers[SADB_X_EXT_SRC_FLOW] = (void *)ext;
931: break;
932: case SADB_X_EXT_DST_FLOW:
933: headers[SADB_X_EXT_DST_FLOW] = (void *)ext;
934: break;
935: case SADB_X_EXT_SRC_MASK:
936: headers[SADB_X_EXT_SRC_MASK] = (void *)ext;
937: break;
938: case SADB_X_EXT_DST_MASK:
939: headers[SADB_X_EXT_DST_MASK] = (void *)ext;
940: break;
941: case SADB_X_EXT_FLOW_TYPE:
942: headers[SADB_X_EXT_FLOW_TYPE] = (void *)ext;
943: default:
944: /* Ignore. */
945: break;
946: }
947: }
948: }