Annotation of src/usr.bin/netstat/show.c, Revision 1.16
1.16 ! michele 1: /* $OpenBSD: show.c,v 1.15 2008/12/15 20:16:20 deraadt Exp $ */
1.1 claudio 2: /* $NetBSD: show.c,v 1.1 1996/11/15 18:01:41 gwr Exp $ */
3:
4: /*
5: * Copyright (c) 1983, 1988, 1993
6: * The Regents of the University of California. All rights reserved.
7: *
8: * Redistribution and use in source and binary forms, with or without
9: * modification, are permitted provided that the following conditions
10: * are met:
11: * 1. Redistributions of source code must retain the above copyright
12: * notice, this list of conditions and the following disclaimer.
13: * 2. Redistributions in binary form must reproduce the above copyright
14: * notice, this list of conditions and the following disclaimer in the
15: * documentation and/or other materials provided with the distribution.
16: * 3. Neither the name of the University nor the names of its contributors
17: * may be used to endorse or promote products derived from this software
18: * without specific prior written permission.
19: *
20: * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
21: * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
22: * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23: * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
24: * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
25: * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26: * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27: * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28: * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29: * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
30: * SUCH DAMAGE.
31: */
32:
33: #include <sys/param.h>
34: #include <sys/protosw.h>
35: #include <sys/socket.h>
36: #include <sys/mbuf.h>
37: #include <sys/sysctl.h>
38:
39: #include <net/if.h>
40: #include <net/if_dl.h>
41: #include <net/if_types.h>
42: #include <net/pfkeyv2.h>
43: #include <net/route.h>
44: #include <netinet/in.h>
45: #include <netinet/if_ether.h>
46: #include <netinet/ip_ipsp.h>
1.13 claudio 47: #include <netmpls/mpls.h>
1.1 claudio 48: #include <arpa/inet.h>
49:
50: #include <err.h>
51: #include <errno.h>
52: #include <netdb.h>
53: #include <stdio.h>
54: #include <stddef.h>
55: #include <stdlib.h>
56: #include <string.h>
57: #include <unistd.h>
58:
59: #include "netstat.h"
60:
61: char *any_ntoa(const struct sockaddr *);
62: char *link_print(struct sockaddr *);
1.16 ! michele 63: char *label_print_op(u_int32_t);
1.13 claudio 64: char *label_print(struct sockaddr *);
1.1 claudio 65:
66: #define ROUNDUP(a) \
67: ((a) > 0 ? (1 + (((a) - 1) | (sizeof(long) - 1))) : sizeof(long))
68: #define ADVANCE(x, n) (x += ROUNDUP((n)->sa_len))
69:
70: #define PFKEYV2_CHUNK sizeof(u_int64_t)
71:
72: /*
73: * Definitions for showing gateway flags.
74: */
75: struct bits {
76: int b_mask;
77: char b_val;
78: };
79: static const struct bits bits[] = {
80: { RTF_UP, 'U' },
81: { RTF_GATEWAY, 'G' },
82: { RTF_HOST, 'H' },
83: { RTF_REJECT, 'R' },
84: { RTF_BLACKHOLE, 'B' },
85: { RTF_DYNAMIC, 'D' },
86: { RTF_MODIFIED, 'M' },
87: { RTF_DONE, 'd' }, /* Completed -- for routing messages only */
88: { RTF_MASK, 'm' }, /* Mask Present -- for routing messages only */
89: { RTF_CLONING, 'C' },
90: { RTF_XRESOLVE, 'X' },
91: { RTF_LLINFO, 'L' },
92: { RTF_STATIC, 'S' },
93: { RTF_PROTO1, '1' },
94: { RTF_PROTO2, '2' },
95: { RTF_PROTO3, '3' },
96: { RTF_CLONED, 'c' },
97: { RTF_JUMBO, 'J' },
98: { 0 }
99: };
100:
101: void p_rtentry(struct rt_msghdr *);
102: void p_pfkentry(struct sadb_msg *);
103: void pr_family(int);
104: void p_encap(struct sockaddr *, struct sockaddr *, int);
105: void p_protocol(struct sadb_protocol *, struct sockaddr *, struct
1.13 claudio 106: sadb_protocol *, int);
1.1 claudio 107: void p_sockaddr(struct sockaddr *, struct sockaddr *, int, int);
108: void p_flags(int, char *);
109: char *routename4(in_addr_t);
110: char *routename6(struct sockaddr_in6 *);
111: void index_pfk(struct sadb_msg *, void **);
112:
113: /*
114: * Print routing tables.
115: */
116: void
1.10 claudio 117: p_rttables(int af, u_int tableid)
1.1 claudio 118: {
119: struct rt_msghdr *rtm;
120: struct sadb_msg *msg;
121: char *buf = NULL, *next, *lim = NULL;
122: size_t needed;
1.10 claudio 123: int mib[7];
1.1 claudio 124: struct sockaddr *sa;
125:
126: mib[0] = CTL_NET;
127: mib[1] = PF_ROUTE;
128: mib[2] = 0;
129: mib[3] = af;
130: mib[4] = NET_RT_DUMP;
131: mib[5] = 0;
1.10 claudio 132: mib[6] = tableid;
133:
134: if (sysctl(mib, 7, NULL, &needed, NULL, 0) < 0)
1.1 claudio 135: err(1, "route-sysctl-estimate");
136: if (needed > 0) {
137: if ((buf = malloc(needed)) == 0)
138: err(1, NULL);
1.10 claudio 139: if (sysctl(mib, 7, buf, &needed, NULL, 0) < 0)
1.1 claudio 140: err(1, "sysctl of routing table");
141: lim = buf + needed;
142: }
143:
144: printf("Routing tables\n");
145:
146: if (buf) {
147: for (next = buf; next < lim; next += rtm->rtm_msglen) {
148: rtm = (struct rt_msghdr *)next;
1.8 claudio 149: if (rtm->rtm_version != RTM_VERSION)
150: continue;
1.1 claudio 151: sa = (struct sockaddr *)(rtm + 1);
152: if (af != AF_UNSPEC && sa->sa_family != af)
153: continue;
154: p_rtentry(rtm);
155: }
156: free(buf);
157: buf = NULL;
158: }
159:
160: if (af != 0 && af != PF_KEY)
161: return;
162:
163: mib[0] = CTL_NET;
164: mib[1] = PF_KEY;
165: mib[2] = PF_KEY_V2;
166: mib[3] = NET_KEY_SPD_DUMP;
167: mib[4] = mib[5] = 0;
168:
169: if (sysctl(mib, 4, NULL, &needed, NULL, 0) == -1) {
170: if (errno == ENOPROTOOPT)
171: return;
172: err(1, "spd-sysctl-estimate");
173: }
174: if (needed > 0) {
175: if ((buf = malloc(needed)) == 0)
176: err(1, NULL);
177: if (sysctl(mib, 4, buf, &needed, NULL, 0) == -1)
178: err(1,"sysctl of spd");
179: lim = buf + needed;
180: }
181:
182: if (buf) {
183: printf("\nEncap:\n");
184:
185: for (next = buf; next < lim; next += msg->sadb_msg_len *
186: PFKEYV2_CHUNK) {
187: msg = (struct sadb_msg *)next;
188: if (msg->sadb_msg_len == 0)
189: break;
190: p_pfkentry(msg);
191: }
192: free(buf);
193: buf = NULL;
194: }
195: }
196:
1.12 deraadt 197: /*
1.1 claudio 198: * column widths; each followed by one space
199: * width of destination/gateway column
200: * strlen("fe80::aaaa:bbbb:cccc:dddd@gif0") == 30, strlen("/128") == 4
201: */
202: #define WID_GW(af) ((af) == AF_INET6 ? (nflag ? 30 : 18) : 18)
203:
1.13 claudio 204: int
205: WID_DST(int af)
206: {
207:
208: if (nflag)
209: switch (af) {
210: case AF_MPLS:
211: return 34;
212: case AF_INET6:
213: return 34;
214: default:
215: return 18;
216: }
217: else
218: switch (af) {
219: case AF_MPLS:
220: return 34;
221: default:
222: return 18;
223: }
224: }
225:
1.1 claudio 226: /*
227: * Print header for routing table columns.
228: */
229: void
230: pr_rthdr(int af, int Aflag)
231: {
232: if (Aflag)
233: printf("%-*.*s ", PLEN, PLEN, "Address");
1.13 claudio 234: switch (af) {
235: case PF_KEY:
1.1 claudio 236: printf("%-18s %-5s %-18s %-5s %-5s %-22s\n",
237: "Source", "Port", "Destination",
238: "Port", "Proto", "SA(Address/Proto/Type/Direction)");
1.13 claudio 239: break;
240: case PF_MPLS:
241: printf("%-16s %-10s %-6s %-18s %-6.6s %5.5s %8.8s %5.5s %4.4s %s\n",
242: "In label", "Out label", "Op", "Gateway",
243: "Flags", "Refs", "Use", "Mtu", "Prio", "Interface");
244: break;
245: default:
246: printf("%-*.*s %-*.*s %-6.6s %5.5s %8.8s %5.5s %4.4s %s\n",
247: WID_DST(af), WID_DST(af), "Destination",
248: WID_GW(af), WID_GW(af), "Gateway",
249: "Flags", "Refs", "Use", "Mtu", "Prio", "Iface");
250: break;
251: }
1.1 claudio 252: }
253:
254: static void
255: get_rtaddrs(int addrs, struct sockaddr *sa, struct sockaddr **rti_info)
256: {
257: int i;
258:
259: for (i = 0; i < RTAX_MAX; i++) {
260: if (addrs & (1 << i)) {
261: rti_info[i] = sa;
262: sa = (struct sockaddr *)((char *)(sa) +
263: ROUNDUP(sa->sa_len));
264: } else
265: rti_info[i] = NULL;
266: }
267: }
268:
269: /*
270: * Print a routing table entry.
271: */
272: void
273: p_rtentry(struct rt_msghdr *rtm)
274: {
275: static int old_af = -1;
276: struct sockaddr *sa = (struct sockaddr *)(rtm + 1);
277: struct sockaddr *mask, *rti_info[RTAX_MAX];
278: char ifbuf[IF_NAMESIZE];
279:
280: if (sa->sa_family == AF_KEY)
281: return;
282:
1.5 pyr 283: get_rtaddrs(rtm->rtm_addrs, sa, rti_info);
284: if (Fflag && rti_info[RTAX_GATEWAY]->sa_family != sa->sa_family) {
285: return;
286: }
1.1 claudio 287: if (old_af != sa->sa_family) {
288: old_af = sa->sa_family;
289: pr_family(sa->sa_family);
290: pr_rthdr(sa->sa_family, 0);
291: }
292:
293: mask = rti_info[RTAX_NETMASK];
294: if ((sa = rti_info[RTAX_DST]) == NULL)
295: return;
296:
297: p_sockaddr(sa, mask, rtm->rtm_flags, WID_DST(sa->sa_family));
298: p_sockaddr(rti_info[RTAX_GATEWAY], NULL, RTF_HOST,
299: WID_GW(sa->sa_family));
300: p_flags(rtm->rtm_flags, "%-6.6s ");
1.13 claudio 301: printf("%5u %8llu ", rtm->rtm_rmx.rmx_refcnt,
1.1 claudio 302: rtm->rtm_rmx.rmx_pksent);
303: if (rtm->rtm_rmx.rmx_mtu)
1.13 claudio 304: printf("%5u ", rtm->rtm_rmx.rmx_mtu);
1.1 claudio 305: else
1.13 claudio 306: printf("%5s ", "-");
1.1 claudio 307: putchar((rtm->rtm_rmx.rmx_locks & RTV_MTU) ? 'L' : ' ');
1.14 claudio 308: printf(" %2d %.16s", rtm->rtm_priority & RTP_MASK,
1.13 claudio 309: if_indextoname(rtm->rtm_index, ifbuf));
1.1 claudio 310: putchar('\n');
311: }
312:
313: /*
314: * Print a pfkey/encap entry.
315: */
316: void
317: p_pfkentry(struct sadb_msg *msg)
318: {
1.13 claudio 319: static int old = 0;
1.1 claudio 320: struct sadb_address *saddr;
321: struct sadb_protocol *sap, *saft;
322: struct sockaddr *sa, *mask;
323: void *headers[SADB_EXT_MAX + 1];
324:
325: if (!old) {
326: pr_rthdr(PF_KEY, 0);
327: old++;
328: }
329:
330: bzero(headers, sizeof(headers));
331: index_pfk(msg, headers);
332:
333: /* These are always set */
334: saddr = headers[SADB_X_EXT_SRC_FLOW];
335: sa = (struct sockaddr *)(saddr + 1);
336: saddr = headers[SADB_X_EXT_SRC_MASK];
337: mask = (struct sockaddr *)(saddr + 1);
338: p_encap(sa, mask, WID_DST(sa->sa_family));
339:
340: /* These are always set, too. */
341: saddr = headers[SADB_X_EXT_DST_FLOW];
342: sa = (struct sockaddr *)(saddr + 1);
343: saddr = headers[SADB_X_EXT_DST_MASK];
344: mask = (struct sockaddr *)(saddr + 1);
345: p_encap(sa, mask, WID_DST(sa->sa_family));
346:
347: /* Bypass and deny flows do not set SADB_EXT_ADDRESS_DST! */
348: sap = headers[SADB_X_EXT_PROTOCOL];
349: saft = headers[SADB_X_EXT_FLOW_TYPE];
350: saddr = headers[SADB_EXT_ADDRESS_DST];
351: if (saddr)
352: sa = (struct sockaddr *)(saddr + 1);
353: else
354: sa = NULL;
355: p_protocol(sap, sa, saft, msg->sadb_msg_satype);
356:
357: printf("\n");
358: }
359:
360: /*
361: * Print address family header before a section of the routing table.
362: */
363: void
364: pr_family(int af)
365: {
366: char *afname;
367:
368: switch (af) {
369: case AF_INET:
370: afname = "Internet";
371: break;
372: case AF_INET6:
373: afname = "Internet6";
374: break;
375: case PF_KEY:
376: afname = "Encap";
377: break;
1.13 claudio 378: case AF_MPLS:
379: afname = "MPLS";
380: break;
1.1 claudio 381: case AF_APPLETALK:
382: afname = "AppleTalk";
383: break;
384: default:
385: afname = NULL;
386: break;
387: }
388: if (afname)
389: printf("\n%s:\n", afname);
390: else
391: printf("\nProtocol Family %d:\n", af);
392: }
393:
394: void
395: p_addr(struct sockaddr *sa, struct sockaddr *mask, int flags)
396: {
397: p_sockaddr(sa, mask, flags, WID_DST(sa->sa_family));
398: }
399:
400: void
401: p_gwaddr(struct sockaddr *sa, int af)
402: {
403: p_sockaddr(sa, 0, RTF_HOST, WID_GW(af));
404: }
405:
406: void
407: p_encap(struct sockaddr *sa, struct sockaddr *mask, int width)
408: {
1.13 claudio 409: char *cp;
410: unsigned short port = 0;
1.1 claudio 411:
1.2 todd 412: if (mask)
413: cp = netname(sa, mask);
414: else
415: cp = routename(sa);
1.1 claudio 416: switch (sa->sa_family) {
1.9 claudio 417: case AF_INET:
418: port = ntohs(((struct sockaddr_in *)sa)->sin_port);
419: break;
1.2 todd 420: case AF_INET6:
421: port = ntohs(((struct sockaddr_in6 *)sa)->sin6_port);
1.1 claudio 422: break;
423: }
424: if (width < 0)
425: printf("%s", cp);
426: else {
427: if (nflag)
428: printf("%-*s %-5u ", width, cp, port);
429: else
430: printf("%-*.*s %-5u ", width, width, cp, port);
431: }
432: }
433:
434: void
435: p_protocol(struct sadb_protocol *sap, struct sockaddr *sa, struct sadb_protocol
436: *saft, int proto)
437: {
438: printf("%-6u", sap->sadb_protocol_proto);
1.9 claudio 439:
1.1 claudio 440: if (sa)
441: p_sockaddr(sa, NULL, 0, -1);
442: else
443: printf("none");
444:
445: switch (proto) {
446: case SADB_SATYPE_ESP:
447: printf("/esp");
448: break;
449: case SADB_SATYPE_AH:
450: printf("/ah");
451: break;
452: case SADB_X_SATYPE_IPCOMP:
453: printf("/ipcomp");
454: break;
455: case SADB_X_SATYPE_IPIP:
456: printf("/ipip");
457: break;
458: default:
459: printf("/<unknown>");
460: }
461:
462: switch(saft->sadb_protocol_proto) {
463: case SADB_X_FLOW_TYPE_USE:
464: printf("/use");
465: break;
466: case SADB_X_FLOW_TYPE_REQUIRE:
467: printf("/require");
468: break;
469: case SADB_X_FLOW_TYPE_ACQUIRE:
470: printf("/acquire");
471: break;
472: case SADB_X_FLOW_TYPE_DENY:
473: printf("/deny");
474: break;
475: case SADB_X_FLOW_TYPE_BYPASS:
476: printf("/bypass");
477: break;
478: case SADB_X_FLOW_TYPE_DONTACQ:
479: printf("/dontacq");
480: break;
481: default:
482: printf("/<unknown type>");
483: }
484:
485: switch(saft->sadb_protocol_direction) {
486: case IPSP_DIRECTION_IN:
487: printf("/in");
488: break;
489: case IPSP_DIRECTION_OUT:
490: printf("/out");
491: break;
492: default:
493: printf("/<unknown>");
494: }
495: }
496:
497: void
498: p_sockaddr(struct sockaddr *sa, struct sockaddr *mask, int flags, int width)
499: {
500: char *cp;
501:
502: switch (sa->sa_family) {
503: case AF_INET6:
504: {
505: struct sockaddr_in6 *sa6 = (struct sockaddr_in6 *)sa;
506: struct in6_addr *in6 = &sa6->sin6_addr;
507:
508: /*
509: * XXX: This is a special workaround for KAME kernels.
510: * sin6_scope_id field of SA should be set in the future.
511: */
512: if (IN6_IS_ADDR_LINKLOCAL(in6) ||
1.3 itojun 513: IN6_IS_ADDR_MC_LINKLOCAL(in6) ||
514: IN6_IS_ADDR_MC_INTFACELOCAL(in6)) {
1.1 claudio 515: /* XXX: override is ok? */
516: sa6->sin6_scope_id = (u_int32_t)ntohs(*(u_short *)
517: &in6->s6_addr[2]);
518: *(u_short *)&in6->s6_addr[2] = 0;
519: }
520: if (flags & RTF_HOST)
521: cp = routename((struct sockaddr *)sa6);
522: else
523: cp = netname((struct sockaddr *)sa6, mask);
524: break;
525: }
1.16 ! michele 526: case AF_MPLS:
! 527: if (flags & RTF_HOST || mask == NULL)
! 528: cp = routename(sa);
! 529: else
! 530: cp = netname(sa, mask);
! 531:
! 532: snprintf(cp, MAXHOSTNAMELEN, "%s %s", cp,
! 533: label_print_op(flags));
! 534:
! 535: break;
1.1 claudio 536: default:
537: if ((flags & RTF_HOST) || mask == NULL)
538: cp = routename(sa);
539: else
540: cp = netname(sa, mask);
541: break;
542: }
543: if (width < 0)
544: printf("%s", cp);
545: else {
546: if (nflag)
547: printf("%-*s ", width, cp);
548: else
549: printf("%-*.*s ", width, width, cp);
550: }
551: }
552:
553: void
554: p_flags(int f, char *format)
555: {
556: char name[33], *flags;
557: const struct bits *p = bits;
558:
559: for (flags = name; p->b_mask && flags < &name[sizeof(name) - 2]; p++)
560: if (p->b_mask & f)
561: *flags++ = p->b_val;
562: *flags = '\0';
563: printf(format, name);
564: }
565:
566: static char line[MAXHOSTNAMELEN];
567: static char domain[MAXHOSTNAMELEN];
568:
569: char *
570: routename(struct sockaddr *sa)
571: {
572: char *cp = NULL;
573: static int first = 1;
574:
575: if (first) {
576: first = 0;
577: if (gethostname(domain, sizeof(domain)) == 0 &&
578: (cp = strchr(domain, '.')))
579: (void)strlcpy(domain, cp + 1, sizeof(domain));
580: else
581: domain[0] = '\0';
582: cp = NULL;
583: }
584:
585: if (sa->sa_len == 0) {
586: (void)strlcpy(line, "default", sizeof(line));
587: return (line);
588: }
589:
590: switch (sa->sa_family) {
591: case AF_INET:
592: return
593: (routename4(((struct sockaddr_in *)sa)->sin_addr.s_addr));
594:
595: case AF_INET6:
596: {
597: struct sockaddr_in6 sin6;
598:
599: memset(&sin6, 0, sizeof(sin6));
600: memcpy(&sin6, sa, sa->sa_len);
601: sin6.sin6_len = sizeof(struct sockaddr_in6);
602: sin6.sin6_family = AF_INET6;
603: if (sa->sa_len == sizeof(struct sockaddr_in6) &&
604: (IN6_IS_ADDR_LINKLOCAL(&sin6.sin6_addr) ||
1.3 itojun 605: IN6_IS_ADDR_MC_LINKLOCAL(&sin6.sin6_addr) ||
606: IN6_IS_ADDR_MC_INTFACELOCAL(&sin6.sin6_addr)) &&
1.1 claudio 607: sin6.sin6_scope_id == 0) {
608: sin6.sin6_scope_id =
609: ntohs(*(u_int16_t *)&sin6.sin6_addr.s6_addr[2]);
610: sin6.sin6_addr.s6_addr[2] = 0;
611: sin6.sin6_addr.s6_addr[3] = 0;
612: }
613: return (routename6(&sin6));
614: }
615:
616: case AF_LINK:
617: return (link_print(sa));
1.13 claudio 618: case AF_MPLS:
619: return (label_print(sa));
1.1 claudio 620: case AF_UNSPEC:
621: if (sa->sa_len == sizeof(struct sockaddr_rtlabel)) {
622: static char name[RTLABEL_LEN];
623: struct sockaddr_rtlabel *sr;
624:
625: sr = (struct sockaddr_rtlabel *)sa;
1.9 claudio 626: (void)strlcpy(name, sr->sr_label, sizeof(name));
1.1 claudio 627: return (name);
628: }
629: /* FALLTHROUGH */
630: default:
631: (void)snprintf(line, sizeof(line), "(%d) %s",
632: sa->sa_family, any_ntoa(sa));
633: break;
634: }
635: return (line);
636: }
637:
638: char *
639: routename4(in_addr_t in)
640: {
641: char *cp = NULL;
642: struct in_addr ina;
643: struct hostent *hp;
644:
645: if (in == INADDR_ANY)
646: cp = "default";
647: if (!cp && !nflag) {
648: if ((hp = gethostbyaddr((char *)&in,
649: sizeof(in), AF_INET)) != NULL) {
650: if ((cp = strchr(hp->h_name, '.')) &&
651: !strcmp(cp + 1, domain))
652: *cp = '\0';
653: cp = hp->h_name;
654: }
655: }
656: ina.s_addr = in;
657: strlcpy(line, cp ? cp : inet_ntoa(ina), sizeof(line));
658:
659: return (line);
660: }
661:
662: char *
663: routename6(struct sockaddr_in6 *sin6)
664: {
665: int niflags = 0;
666:
667: if (nflag)
668: niflags |= NI_NUMERICHOST;
669: else
670: niflags |= NI_NOFQDN;
671:
672: if (getnameinfo((struct sockaddr *)sin6, sin6->sin6_len,
673: line, sizeof(line), NULL, 0, niflags) != 0)
674: strncpy(line, "invalid", sizeof(line));
675:
676: return (line);
677: }
678:
679: /*
680: * Return the name of the network whose address is given.
681: * The address is assumed to be that of a net or subnet, not a host.
682: */
683: char *
684: netname4(in_addr_t in, in_addr_t mask)
685: {
686: char *cp = NULL;
687: struct netent *np = NULL;
688: int mbits;
689:
690: in = ntohl(in);
691: mask = ntohl(mask);
692: if (!nflag && in != INADDR_ANY) {
693: if ((np = getnetbyaddr(in, AF_INET)) != NULL)
694: cp = np->n_name;
695: }
696: if (in == INADDR_ANY)
697: cp = "default";
698: mbits = mask ? 33 - ffs(mask) : 0;
699: if (cp)
700: strlcpy(line, cp, sizeof(line));
701: #define C(x) ((x) & 0xff)
702: else if (mbits < 9)
703: snprintf(line, sizeof(line), "%u/%d", C(in >> 24), mbits);
704: else if (mbits < 17)
705: snprintf(line, sizeof(line), "%u.%u/%d",
706: C(in >> 24) , C(in >> 16), mbits);
707: else if (mbits < 25)
708: snprintf(line, sizeof(line), "%u.%u.%u/%d",
709: C(in >> 24), C(in >> 16), C(in >> 8), mbits);
710: else
711: snprintf(line, sizeof(line), "%u.%u.%u.%u/%d", C(in >> 24),
712: C(in >> 16), C(in >> 8), C(in), mbits);
713: #undef C
714: return (line);
715: }
716:
717: char *
718: netname6(struct sockaddr_in6 *sa6, struct sockaddr_in6 *mask)
719: {
720: struct sockaddr_in6 sin6;
721: u_char *p;
722: int masklen, final = 0, illegal = 0;
723: int i, lim, flag, error;
724: char hbuf[NI_MAXHOST];
725:
726: sin6 = *sa6;
727:
728: flag = 0;
729: masklen = 0;
730: if (mask) {
731: lim = mask->sin6_len - offsetof(struct sockaddr_in6, sin6_addr);
1.4 claudio 732: lim = lim < (int)sizeof(struct in6_addr) ?
1.1 claudio 733: lim : sizeof(struct in6_addr);
734: for (p = (u_char *)&mask->sin6_addr, i = 0; i < lim; p++) {
735: if (final && *p) {
736: illegal++;
737: sin6.sin6_addr.s6_addr[i++] = 0x00;
738: continue;
739: }
740:
741: switch (*p & 0xff) {
742: case 0xff:
743: masklen += 8;
744: break;
745: case 0xfe:
746: masklen += 7;
747: final++;
748: break;
749: case 0xfc:
750: masklen += 6;
751: final++;
752: break;
753: case 0xf8:
754: masklen += 5;
755: final++;
756: break;
757: case 0xf0:
758: masklen += 4;
759: final++;
760: break;
761: case 0xe0:
762: masklen += 3;
763: final++;
764: break;
765: case 0xc0:
766: masklen += 2;
767: final++;
768: break;
769: case 0x80:
770: masklen += 1;
771: final++;
772: break;
773: case 0x00:
774: final++;
775: break;
776: default:
777: final++;
778: illegal++;
779: break;
780: }
781:
782: if (!illegal)
783: sin6.sin6_addr.s6_addr[i++] &= *p;
784: else
785: sin6.sin6_addr.s6_addr[i++] = 0x00;
786: }
787: while (i < sizeof(struct in6_addr))
788: sin6.sin6_addr.s6_addr[i++] = 0x00;
789: } else
790: masklen = 128;
791:
792: if (masklen == 0 && IN6_IS_ADDR_UNSPECIFIED(&sin6.sin6_addr))
793: return ("default");
794:
795: if (illegal)
796: warnx("illegal prefixlen");
797:
798: if (nflag)
799: flag |= NI_NUMERICHOST;
800: error = getnameinfo((struct sockaddr *)&sin6, sin6.sin6_len,
801: hbuf, sizeof(hbuf), NULL, 0, flag);
802: if (error)
803: snprintf(hbuf, sizeof(hbuf), "invalid");
804:
805: snprintf(line, sizeof(line), "%s/%d", hbuf, masklen);
806: return (line);
807: }
808:
809: /*
810: * Return the name of the network whose address is given.
811: * The address is assumed to be that of a net or subnet, not a host.
812: */
813: char *
814: netname(struct sockaddr *sa, struct sockaddr *mask)
815: {
816: switch (sa->sa_family) {
817:
818: case AF_INET:
819: return netname4(((struct sockaddr_in *)sa)->sin_addr.s_addr,
820: ((struct sockaddr_in *)mask)->sin_addr.s_addr);
821: case AF_INET6:
822: return netname6((struct sockaddr_in6 *)sa,
823: (struct sockaddr_in6 *)mask);
824: case AF_LINK:
825: return (link_print(sa));
1.13 claudio 826: case AF_MPLS:
827: return (label_print(sa));
1.1 claudio 828: default:
829: snprintf(line, sizeof(line), "af %d: %s",
830: sa->sa_family, any_ntoa(sa));
831: break;
832: }
833: return (line);
834: }
835:
836: static const char hexlist[] = "0123456789abcdef";
837:
838: char *
839: any_ntoa(const struct sockaddr *sa)
840: {
841: static char obuf[240];
842: const char *in = sa->sa_data;
843: char *out = obuf;
844: int len = sa->sa_len - offsetof(struct sockaddr, sa_data);
845:
846: *out++ = 'Q';
847: do {
848: *out++ = hexlist[(*in >> 4) & 15];
849: *out++ = hexlist[(*in++) & 15];
850: *out++ = '.';
851: } while (--len > 0 && (out + 3) < &obuf[sizeof(obuf) - 1]);
852: out[-1] = '\0';
853: return (obuf);
854: }
855:
856: char *
857: link_print(struct sockaddr *sa)
858: {
859: struct sockaddr_dl *sdl = (struct sockaddr_dl *)sa;
860: u_char *lla = (u_char *)sdl->sdl_data + sdl->sdl_nlen;
861:
862: if (sdl->sdl_nlen == 0 && sdl->sdl_alen == 0 &&
863: sdl->sdl_slen == 0) {
864: (void)snprintf(line, sizeof(line), "link#%d", sdl->sdl_index);
865: return (line);
866: }
867: switch (sdl->sdl_type) {
868: case IFT_ETHER:
869: case IFT_CARP:
870: return (ether_ntoa((struct ether_addr *)lla));
871: default:
872: return (link_ntoa(sdl));
873: }
1.13 claudio 874: }
875:
876: char *
1.16 ! michele 877: label_print_op(u_int32_t type)
1.13 claudio 878: {
1.16 ! michele 879: switch (type & (MPLS_OP_PUSH | MPLS_OP_POP | MPLS_OP_SWAP)) {
1.13 claudio 880: case MPLS_OP_POP:
881: return ("POP");
882: case MPLS_OP_SWAP:
883: return ("SWAP");
884: case MPLS_OP_PUSH:
885: return ("PUSH");
886: default:
887: return ("?");
888: }
889: }
890:
891: char *
892: label_print(struct sockaddr *sa)
893: {
894: struct sockaddr_mpls *smpls = (struct sockaddr_mpls *)sa;
895: char ifname_in[IF_NAMESIZE];
896: char ifname_out[IF_NAMESIZE];
897: char *in_label;
898: char *out_label;
899:
1.16 ! michele 900: if (asprintf(&in_label, "%u",
! 901: ntohl(smpls->smpls_in_label) >> MPLS_LABEL_OFFSET) == -1)
1.13 claudio 902: err(1, NULL);
903:
904: if (asprintf(&out_label, "%u",
905: ntohl(smpls->smpls_out_label) >> MPLS_LABEL_OFFSET) == -1)
906: err(1, NULL);
907:
1.16 ! michele 908: (void)snprintf(line, sizeof(line), "%-16s %-10s", in_label,
! 909: out_label);
1.13 claudio 910:
911: free(in_label);
912: free(out_label);
913:
914: return (line);
1.1 claudio 915: }
916:
917: void
918: index_pfk(struct sadb_msg *msg, void **headers)
919: {
920: struct sadb_ext *ext;
921:
922: for (ext = (struct sadb_ext *)(msg + 1);
923: (size_t)((u_int8_t *)ext - (u_int8_t *)msg) <
924: msg->sadb_msg_len * PFKEYV2_CHUNK && ext->sadb_ext_len > 0;
925: ext = (struct sadb_ext *)((u_int8_t *)ext +
926: ext->sadb_ext_len * PFKEYV2_CHUNK)) {
927: switch (ext->sadb_ext_type) {
928: case SADB_EXT_ADDRESS_SRC:
929: headers[SADB_EXT_ADDRESS_SRC] = (void *)ext;
930: break;
931: case SADB_EXT_ADDRESS_DST:
932: headers[SADB_EXT_ADDRESS_DST] = (void *)ext;
933: break;
934: case SADB_X_EXT_PROTOCOL:
935: headers[SADB_X_EXT_PROTOCOL] = (void *)ext;
936: break;
937: case SADB_X_EXT_SRC_FLOW:
938: headers[SADB_X_EXT_SRC_FLOW] = (void *)ext;
939: break;
940: case SADB_X_EXT_DST_FLOW:
941: headers[SADB_X_EXT_DST_FLOW] = (void *)ext;
942: break;
943: case SADB_X_EXT_SRC_MASK:
944: headers[SADB_X_EXT_SRC_MASK] = (void *)ext;
945: break;
946: case SADB_X_EXT_DST_MASK:
947: headers[SADB_X_EXT_DST_MASK] = (void *)ext;
948: break;
949: case SADB_X_EXT_FLOW_TYPE:
950: headers[SADB_X_EXT_FLOW_TYPE] = (void *)ext;
951: default:
952: /* Ignore. */
953: break;
954: }
955: }
956: }