Annotation of src/usr.bin/netstat/show.c, Revision 1.17
1.17 ! michele 1: /* $OpenBSD: show.c,v 1.16 2008/12/15 21:18:37 michele Exp $ */
1.1 claudio 2: /* $NetBSD: show.c,v 1.1 1996/11/15 18:01:41 gwr Exp $ */
3:
4: /*
5: * Copyright (c) 1983, 1988, 1993
6: * The Regents of the University of California. All rights reserved.
7: *
8: * Redistribution and use in source and binary forms, with or without
9: * modification, are permitted provided that the following conditions
10: * are met:
11: * 1. Redistributions of source code must retain the above copyright
12: * notice, this list of conditions and the following disclaimer.
13: * 2. Redistributions in binary form must reproduce the above copyright
14: * notice, this list of conditions and the following disclaimer in the
15: * documentation and/or other materials provided with the distribution.
16: * 3. Neither the name of the University nor the names of its contributors
17: * may be used to endorse or promote products derived from this software
18: * without specific prior written permission.
19: *
20: * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
21: * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
22: * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23: * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
24: * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
25: * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26: * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27: * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28: * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29: * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
30: * SUCH DAMAGE.
31: */
32:
33: #include <sys/param.h>
34: #include <sys/protosw.h>
35: #include <sys/socket.h>
36: #include <sys/mbuf.h>
37: #include <sys/sysctl.h>
38:
39: #include <net/if.h>
40: #include <net/if_dl.h>
41: #include <net/if_types.h>
42: #include <net/pfkeyv2.h>
43: #include <net/route.h>
44: #include <netinet/in.h>
45: #include <netinet/if_ether.h>
46: #include <netinet/ip_ipsp.h>
1.13 claudio 47: #include <netmpls/mpls.h>
1.1 claudio 48: #include <arpa/inet.h>
49:
50: #include <err.h>
51: #include <errno.h>
52: #include <netdb.h>
53: #include <stdio.h>
54: #include <stddef.h>
55: #include <stdlib.h>
56: #include <string.h>
57: #include <unistd.h>
58:
59: #include "netstat.h"
60:
61: char *any_ntoa(const struct sockaddr *);
62: char *link_print(struct sockaddr *);
1.16 michele 63: char *label_print_op(u_int32_t);
1.17 ! michele 64: char *label_print(struct sockaddr *, struct sockaddr *);
1.1 claudio 65:
66: #define ROUNDUP(a) \
67: ((a) > 0 ? (1 + (((a) - 1) | (sizeof(long) - 1))) : sizeof(long))
68: #define ADVANCE(x, n) (x += ROUNDUP((n)->sa_len))
69:
70: #define PFKEYV2_CHUNK sizeof(u_int64_t)
71:
72: /*
73: * Definitions for showing gateway flags.
74: */
75: struct bits {
76: int b_mask;
77: char b_val;
78: };
79: static const struct bits bits[] = {
80: { RTF_UP, 'U' },
81: { RTF_GATEWAY, 'G' },
82: { RTF_HOST, 'H' },
83: { RTF_REJECT, 'R' },
84: { RTF_BLACKHOLE, 'B' },
85: { RTF_DYNAMIC, 'D' },
86: { RTF_MODIFIED, 'M' },
87: { RTF_DONE, 'd' }, /* Completed -- for routing messages only */
88: { RTF_MASK, 'm' }, /* Mask Present -- for routing messages only */
89: { RTF_CLONING, 'C' },
90: { RTF_XRESOLVE, 'X' },
91: { RTF_LLINFO, 'L' },
92: { RTF_STATIC, 'S' },
93: { RTF_PROTO1, '1' },
94: { RTF_PROTO2, '2' },
95: { RTF_PROTO3, '3' },
96: { RTF_CLONED, 'c' },
97: { RTF_JUMBO, 'J' },
98: { 0 }
99: };
100:
101: void p_rtentry(struct rt_msghdr *);
102: void p_pfkentry(struct sadb_msg *);
103: void pr_family(int);
104: void p_encap(struct sockaddr *, struct sockaddr *, int);
105: void p_protocol(struct sadb_protocol *, struct sockaddr *, struct
1.13 claudio 106: sadb_protocol *, int);
1.1 claudio 107: void p_sockaddr(struct sockaddr *, struct sockaddr *, int, int);
1.17 ! michele 108: void p_sockaddr_mpls(struct sockaddr *, struct sockaddr *, int, int);
1.1 claudio 109: void p_flags(int, char *);
110: char *routename4(in_addr_t);
111: char *routename6(struct sockaddr_in6 *);
112: void index_pfk(struct sadb_msg *, void **);
113:
114: /*
115: * Print routing tables.
116: */
117: void
1.10 claudio 118: p_rttables(int af, u_int tableid)
1.1 claudio 119: {
120: struct rt_msghdr *rtm;
121: struct sadb_msg *msg;
122: char *buf = NULL, *next, *lim = NULL;
123: size_t needed;
1.10 claudio 124: int mib[7];
1.1 claudio 125: struct sockaddr *sa;
126:
127: mib[0] = CTL_NET;
128: mib[1] = PF_ROUTE;
129: mib[2] = 0;
130: mib[3] = af;
131: mib[4] = NET_RT_DUMP;
132: mib[5] = 0;
1.10 claudio 133: mib[6] = tableid;
134:
135: if (sysctl(mib, 7, NULL, &needed, NULL, 0) < 0)
1.1 claudio 136: err(1, "route-sysctl-estimate");
137: if (needed > 0) {
138: if ((buf = malloc(needed)) == 0)
139: err(1, NULL);
1.10 claudio 140: if (sysctl(mib, 7, buf, &needed, NULL, 0) < 0)
1.1 claudio 141: err(1, "sysctl of routing table");
142: lim = buf + needed;
143: }
144:
145: printf("Routing tables\n");
146:
147: if (buf) {
148: for (next = buf; next < lim; next += rtm->rtm_msglen) {
149: rtm = (struct rt_msghdr *)next;
1.8 claudio 150: if (rtm->rtm_version != RTM_VERSION)
151: continue;
1.1 claudio 152: sa = (struct sockaddr *)(rtm + 1);
153: if (af != AF_UNSPEC && sa->sa_family != af)
154: continue;
155: p_rtentry(rtm);
156: }
157: free(buf);
158: buf = NULL;
159: }
160:
161: if (af != 0 && af != PF_KEY)
162: return;
163:
164: mib[0] = CTL_NET;
165: mib[1] = PF_KEY;
166: mib[2] = PF_KEY_V2;
167: mib[3] = NET_KEY_SPD_DUMP;
168: mib[4] = mib[5] = 0;
169:
170: if (sysctl(mib, 4, NULL, &needed, NULL, 0) == -1) {
171: if (errno == ENOPROTOOPT)
172: return;
173: err(1, "spd-sysctl-estimate");
174: }
175: if (needed > 0) {
176: if ((buf = malloc(needed)) == 0)
177: err(1, NULL);
178: if (sysctl(mib, 4, buf, &needed, NULL, 0) == -1)
179: err(1,"sysctl of spd");
180: lim = buf + needed;
181: }
182:
183: if (buf) {
184: printf("\nEncap:\n");
185:
186: for (next = buf; next < lim; next += msg->sadb_msg_len *
187: PFKEYV2_CHUNK) {
188: msg = (struct sadb_msg *)next;
189: if (msg->sadb_msg_len == 0)
190: break;
191: p_pfkentry(msg);
192: }
193: free(buf);
194: buf = NULL;
195: }
196: }
197:
1.12 deraadt 198: /*
1.1 claudio 199: * column widths; each followed by one space
200: * width of destination/gateway column
201: * strlen("fe80::aaaa:bbbb:cccc:dddd@gif0") == 30, strlen("/128") == 4
202: */
203: #define WID_GW(af) ((af) == AF_INET6 ? (nflag ? 30 : 18) : 18)
204:
1.13 claudio 205: int
206: WID_DST(int af)
207: {
208:
209: if (nflag)
210: switch (af) {
211: case AF_MPLS:
212: return 34;
213: case AF_INET6:
214: return 34;
215: default:
216: return 18;
217: }
218: else
219: switch (af) {
220: case AF_MPLS:
221: return 34;
222: default:
223: return 18;
224: }
225: }
226:
1.1 claudio 227: /*
228: * Print header for routing table columns.
229: */
230: void
231: pr_rthdr(int af, int Aflag)
232: {
233: if (Aflag)
234: printf("%-*.*s ", PLEN, PLEN, "Address");
1.13 claudio 235: switch (af) {
236: case PF_KEY:
1.1 claudio 237: printf("%-18s %-5s %-18s %-5s %-5s %-22s\n",
238: "Source", "Port", "Destination",
239: "Port", "Proto", "SA(Address/Proto/Type/Direction)");
1.13 claudio 240: break;
241: case PF_MPLS:
242: printf("%-16s %-10s %-6s %-18s %-6.6s %5.5s %8.8s %5.5s %4.4s %s\n",
243: "In label", "Out label", "Op", "Gateway",
244: "Flags", "Refs", "Use", "Mtu", "Prio", "Interface");
245: break;
246: default:
247: printf("%-*.*s %-*.*s %-6.6s %5.5s %8.8s %5.5s %4.4s %s\n",
248: WID_DST(af), WID_DST(af), "Destination",
249: WID_GW(af), WID_GW(af), "Gateway",
250: "Flags", "Refs", "Use", "Mtu", "Prio", "Iface");
251: break;
252: }
1.1 claudio 253: }
254:
255: static void
256: get_rtaddrs(int addrs, struct sockaddr *sa, struct sockaddr **rti_info)
257: {
258: int i;
259:
260: for (i = 0; i < RTAX_MAX; i++) {
261: if (addrs & (1 << i)) {
262: rti_info[i] = sa;
263: sa = (struct sockaddr *)((char *)(sa) +
264: ROUNDUP(sa->sa_len));
265: } else
266: rti_info[i] = NULL;
267: }
268: }
269:
270: /*
271: * Print a routing table entry.
272: */
273: void
274: p_rtentry(struct rt_msghdr *rtm)
275: {
276: static int old_af = -1;
277: struct sockaddr *sa = (struct sockaddr *)(rtm + 1);
278: struct sockaddr *mask, *rti_info[RTAX_MAX];
279: char ifbuf[IF_NAMESIZE];
280:
281: if (sa->sa_family == AF_KEY)
282: return;
283:
1.5 pyr 284: get_rtaddrs(rtm->rtm_addrs, sa, rti_info);
285: if (Fflag && rti_info[RTAX_GATEWAY]->sa_family != sa->sa_family) {
286: return;
287: }
1.1 claudio 288: if (old_af != sa->sa_family) {
289: old_af = sa->sa_family;
290: pr_family(sa->sa_family);
291: pr_rthdr(sa->sa_family, 0);
292: }
293:
294: mask = rti_info[RTAX_NETMASK];
295: if ((sa = rti_info[RTAX_DST]) == NULL)
296: return;
297:
298: p_sockaddr(sa, mask, rtm->rtm_flags, WID_DST(sa->sa_family));
1.17 ! michele 299: p_sockaddr_mpls(sa, rti_info[RTAX_SRC], rtm->rtm_flags,
! 300: WID_DST(sa->sa_family));
! 301:
1.1 claudio 302: p_sockaddr(rti_info[RTAX_GATEWAY], NULL, RTF_HOST,
303: WID_GW(sa->sa_family));
304: p_flags(rtm->rtm_flags, "%-6.6s ");
1.13 claudio 305: printf("%5u %8llu ", rtm->rtm_rmx.rmx_refcnt,
1.1 claudio 306: rtm->rtm_rmx.rmx_pksent);
307: if (rtm->rtm_rmx.rmx_mtu)
1.13 claudio 308: printf("%5u ", rtm->rtm_rmx.rmx_mtu);
1.1 claudio 309: else
1.13 claudio 310: printf("%5s ", "-");
1.1 claudio 311: putchar((rtm->rtm_rmx.rmx_locks & RTV_MTU) ? 'L' : ' ');
1.14 claudio 312: printf(" %2d %.16s", rtm->rtm_priority & RTP_MASK,
1.13 claudio 313: if_indextoname(rtm->rtm_index, ifbuf));
1.1 claudio 314: putchar('\n');
315: }
316:
317: /*
318: * Print a pfkey/encap entry.
319: */
320: void
321: p_pfkentry(struct sadb_msg *msg)
322: {
1.13 claudio 323: static int old = 0;
1.1 claudio 324: struct sadb_address *saddr;
325: struct sadb_protocol *sap, *saft;
326: struct sockaddr *sa, *mask;
327: void *headers[SADB_EXT_MAX + 1];
328:
329: if (!old) {
330: pr_rthdr(PF_KEY, 0);
331: old++;
332: }
333:
334: bzero(headers, sizeof(headers));
335: index_pfk(msg, headers);
336:
337: /* These are always set */
338: saddr = headers[SADB_X_EXT_SRC_FLOW];
339: sa = (struct sockaddr *)(saddr + 1);
340: saddr = headers[SADB_X_EXT_SRC_MASK];
341: mask = (struct sockaddr *)(saddr + 1);
342: p_encap(sa, mask, WID_DST(sa->sa_family));
343:
344: /* These are always set, too. */
345: saddr = headers[SADB_X_EXT_DST_FLOW];
346: sa = (struct sockaddr *)(saddr + 1);
347: saddr = headers[SADB_X_EXT_DST_MASK];
348: mask = (struct sockaddr *)(saddr + 1);
349: p_encap(sa, mask, WID_DST(sa->sa_family));
350:
351: /* Bypass and deny flows do not set SADB_EXT_ADDRESS_DST! */
352: sap = headers[SADB_X_EXT_PROTOCOL];
353: saft = headers[SADB_X_EXT_FLOW_TYPE];
354: saddr = headers[SADB_EXT_ADDRESS_DST];
355: if (saddr)
356: sa = (struct sockaddr *)(saddr + 1);
357: else
358: sa = NULL;
359: p_protocol(sap, sa, saft, msg->sadb_msg_satype);
360:
361: printf("\n");
362: }
363:
364: /*
365: * Print address family header before a section of the routing table.
366: */
367: void
368: pr_family(int af)
369: {
370: char *afname;
371:
372: switch (af) {
373: case AF_INET:
374: afname = "Internet";
375: break;
376: case AF_INET6:
377: afname = "Internet6";
378: break;
379: case PF_KEY:
380: afname = "Encap";
381: break;
1.13 claudio 382: case AF_MPLS:
383: afname = "MPLS";
384: break;
1.1 claudio 385: case AF_APPLETALK:
386: afname = "AppleTalk";
387: break;
388: default:
389: afname = NULL;
390: break;
391: }
392: if (afname)
393: printf("\n%s:\n", afname);
394: else
395: printf("\nProtocol Family %d:\n", af);
396: }
397:
398: void
399: p_addr(struct sockaddr *sa, struct sockaddr *mask, int flags)
400: {
401: p_sockaddr(sa, mask, flags, WID_DST(sa->sa_family));
402: }
403:
404: void
405: p_gwaddr(struct sockaddr *sa, int af)
406: {
407: p_sockaddr(sa, 0, RTF_HOST, WID_GW(af));
408: }
409:
410: void
411: p_encap(struct sockaddr *sa, struct sockaddr *mask, int width)
412: {
1.13 claudio 413: char *cp;
414: unsigned short port = 0;
1.1 claudio 415:
1.2 todd 416: if (mask)
417: cp = netname(sa, mask);
418: else
419: cp = routename(sa);
1.1 claudio 420: switch (sa->sa_family) {
1.9 claudio 421: case AF_INET:
422: port = ntohs(((struct sockaddr_in *)sa)->sin_port);
423: break;
1.2 todd 424: case AF_INET6:
425: port = ntohs(((struct sockaddr_in6 *)sa)->sin6_port);
1.1 claudio 426: break;
427: }
428: if (width < 0)
429: printf("%s", cp);
430: else {
431: if (nflag)
432: printf("%-*s %-5u ", width, cp, port);
433: else
434: printf("%-*.*s %-5u ", width, width, cp, port);
435: }
436: }
437:
438: void
439: p_protocol(struct sadb_protocol *sap, struct sockaddr *sa, struct sadb_protocol
440: *saft, int proto)
441: {
442: printf("%-6u", sap->sadb_protocol_proto);
1.9 claudio 443:
1.1 claudio 444: if (sa)
445: p_sockaddr(sa, NULL, 0, -1);
446: else
447: printf("none");
448:
449: switch (proto) {
450: case SADB_SATYPE_ESP:
451: printf("/esp");
452: break;
453: case SADB_SATYPE_AH:
454: printf("/ah");
455: break;
456: case SADB_X_SATYPE_IPCOMP:
457: printf("/ipcomp");
458: break;
459: case SADB_X_SATYPE_IPIP:
460: printf("/ipip");
461: break;
462: default:
463: printf("/<unknown>");
464: }
465:
466: switch(saft->sadb_protocol_proto) {
467: case SADB_X_FLOW_TYPE_USE:
468: printf("/use");
469: break;
470: case SADB_X_FLOW_TYPE_REQUIRE:
471: printf("/require");
472: break;
473: case SADB_X_FLOW_TYPE_ACQUIRE:
474: printf("/acquire");
475: break;
476: case SADB_X_FLOW_TYPE_DENY:
477: printf("/deny");
478: break;
479: case SADB_X_FLOW_TYPE_BYPASS:
480: printf("/bypass");
481: break;
482: case SADB_X_FLOW_TYPE_DONTACQ:
483: printf("/dontacq");
484: break;
485: default:
486: printf("/<unknown type>");
487: }
488:
489: switch(saft->sadb_protocol_direction) {
490: case IPSP_DIRECTION_IN:
491: printf("/in");
492: break;
493: case IPSP_DIRECTION_OUT:
494: printf("/out");
495: break;
496: default:
497: printf("/<unknown>");
498: }
499: }
500:
501: void
502: p_sockaddr(struct sockaddr *sa, struct sockaddr *mask, int flags, int width)
503: {
504: char *cp;
505:
506: switch (sa->sa_family) {
507: case AF_INET6:
508: {
509: struct sockaddr_in6 *sa6 = (struct sockaddr_in6 *)sa;
510: struct in6_addr *in6 = &sa6->sin6_addr;
511:
512: /*
513: * XXX: This is a special workaround for KAME kernels.
514: * sin6_scope_id field of SA should be set in the future.
515: */
516: if (IN6_IS_ADDR_LINKLOCAL(in6) ||
1.3 itojun 517: IN6_IS_ADDR_MC_LINKLOCAL(in6) ||
518: IN6_IS_ADDR_MC_INTFACELOCAL(in6)) {
1.1 claudio 519: /* XXX: override is ok? */
520: sa6->sin6_scope_id = (u_int32_t)ntohs(*(u_short *)
521: &in6->s6_addr[2]);
522: *(u_short *)&in6->s6_addr[2] = 0;
523: }
524: if (flags & RTF_HOST)
525: cp = routename((struct sockaddr *)sa6);
526: else
527: cp = netname((struct sockaddr *)sa6, mask);
528: break;
529: }
1.16 michele 530: case AF_MPLS:
1.17 ! michele 531: return;
1.1 claudio 532: default:
533: if ((flags & RTF_HOST) || mask == NULL)
534: cp = routename(sa);
535: else
536: cp = netname(sa, mask);
537: break;
538: }
539: if (width < 0)
540: printf("%s", cp);
541: else {
542: if (nflag)
543: printf("%-*s ", width, cp);
544: else
545: printf("%-*.*s ", width, width, cp);
546: }
547: }
548:
1.17 ! michele 549: static char line[MAXHOSTNAMELEN];
! 550: static char domain[MAXHOSTNAMELEN];
! 551:
! 552: void
! 553: p_sockaddr_mpls(struct sockaddr *in, struct sockaddr *out, int flags, int width)
! 554: {
! 555: char *cp;
! 556:
! 557: if (in->sa_family != AF_MPLS)
! 558: return;
! 559:
! 560: if (flags & MPLS_OP_POP)
! 561: cp = label_print(in, NULL);
! 562: else
! 563: cp = label_print(in, out);
! 564:
! 565: snprintf(cp, MAXHOSTNAMELEN, "%s %s", cp,
! 566: label_print_op(flags));
! 567:
! 568: printf("%-*s ", width, cp);
! 569: }
! 570:
1.1 claudio 571: void
572: p_flags(int f, char *format)
573: {
574: char name[33], *flags;
575: const struct bits *p = bits;
576:
577: for (flags = name; p->b_mask && flags < &name[sizeof(name) - 2]; p++)
578: if (p->b_mask & f)
579: *flags++ = p->b_val;
580: *flags = '\0';
581: printf(format, name);
582: }
583:
584: char *
585: routename(struct sockaddr *sa)
586: {
587: char *cp = NULL;
588: static int first = 1;
589:
590: if (first) {
591: first = 0;
592: if (gethostname(domain, sizeof(domain)) == 0 &&
593: (cp = strchr(domain, '.')))
594: (void)strlcpy(domain, cp + 1, sizeof(domain));
595: else
596: domain[0] = '\0';
597: cp = NULL;
598: }
599:
600: if (sa->sa_len == 0) {
601: (void)strlcpy(line, "default", sizeof(line));
602: return (line);
603: }
604:
605: switch (sa->sa_family) {
606: case AF_INET:
607: return
608: (routename4(((struct sockaddr_in *)sa)->sin_addr.s_addr));
609:
610: case AF_INET6:
611: {
612: struct sockaddr_in6 sin6;
613:
614: memset(&sin6, 0, sizeof(sin6));
615: memcpy(&sin6, sa, sa->sa_len);
616: sin6.sin6_len = sizeof(struct sockaddr_in6);
617: sin6.sin6_family = AF_INET6;
618: if (sa->sa_len == sizeof(struct sockaddr_in6) &&
619: (IN6_IS_ADDR_LINKLOCAL(&sin6.sin6_addr) ||
1.3 itojun 620: IN6_IS_ADDR_MC_LINKLOCAL(&sin6.sin6_addr) ||
621: IN6_IS_ADDR_MC_INTFACELOCAL(&sin6.sin6_addr)) &&
1.1 claudio 622: sin6.sin6_scope_id == 0) {
623: sin6.sin6_scope_id =
624: ntohs(*(u_int16_t *)&sin6.sin6_addr.s6_addr[2]);
625: sin6.sin6_addr.s6_addr[2] = 0;
626: sin6.sin6_addr.s6_addr[3] = 0;
627: }
628: return (routename6(&sin6));
629: }
630:
631: case AF_LINK:
632: return (link_print(sa));
1.13 claudio 633: case AF_MPLS:
1.17 ! michele 634: return (label_print(sa, NULL));
1.1 claudio 635: case AF_UNSPEC:
636: if (sa->sa_len == sizeof(struct sockaddr_rtlabel)) {
637: static char name[RTLABEL_LEN];
638: struct sockaddr_rtlabel *sr;
639:
640: sr = (struct sockaddr_rtlabel *)sa;
1.9 claudio 641: (void)strlcpy(name, sr->sr_label, sizeof(name));
1.1 claudio 642: return (name);
643: }
644: /* FALLTHROUGH */
645: default:
646: (void)snprintf(line, sizeof(line), "(%d) %s",
647: sa->sa_family, any_ntoa(sa));
648: break;
649: }
650: return (line);
651: }
652:
653: char *
654: routename4(in_addr_t in)
655: {
656: char *cp = NULL;
657: struct in_addr ina;
658: struct hostent *hp;
659:
660: if (in == INADDR_ANY)
661: cp = "default";
662: if (!cp && !nflag) {
663: if ((hp = gethostbyaddr((char *)&in,
664: sizeof(in), AF_INET)) != NULL) {
665: if ((cp = strchr(hp->h_name, '.')) &&
666: !strcmp(cp + 1, domain))
667: *cp = '\0';
668: cp = hp->h_name;
669: }
670: }
671: ina.s_addr = in;
672: strlcpy(line, cp ? cp : inet_ntoa(ina), sizeof(line));
673:
674: return (line);
675: }
676:
677: char *
678: routename6(struct sockaddr_in6 *sin6)
679: {
680: int niflags = 0;
681:
682: if (nflag)
683: niflags |= NI_NUMERICHOST;
684: else
685: niflags |= NI_NOFQDN;
686:
687: if (getnameinfo((struct sockaddr *)sin6, sin6->sin6_len,
688: line, sizeof(line), NULL, 0, niflags) != 0)
689: strncpy(line, "invalid", sizeof(line));
690:
691: return (line);
692: }
693:
694: /*
695: * Return the name of the network whose address is given.
696: * The address is assumed to be that of a net or subnet, not a host.
697: */
698: char *
699: netname4(in_addr_t in, in_addr_t mask)
700: {
701: char *cp = NULL;
702: struct netent *np = NULL;
703: int mbits;
704:
705: in = ntohl(in);
706: mask = ntohl(mask);
707: if (!nflag && in != INADDR_ANY) {
708: if ((np = getnetbyaddr(in, AF_INET)) != NULL)
709: cp = np->n_name;
710: }
711: if (in == INADDR_ANY)
712: cp = "default";
713: mbits = mask ? 33 - ffs(mask) : 0;
714: if (cp)
715: strlcpy(line, cp, sizeof(line));
716: #define C(x) ((x) & 0xff)
717: else if (mbits < 9)
718: snprintf(line, sizeof(line), "%u/%d", C(in >> 24), mbits);
719: else if (mbits < 17)
720: snprintf(line, sizeof(line), "%u.%u/%d",
721: C(in >> 24) , C(in >> 16), mbits);
722: else if (mbits < 25)
723: snprintf(line, sizeof(line), "%u.%u.%u/%d",
724: C(in >> 24), C(in >> 16), C(in >> 8), mbits);
725: else
726: snprintf(line, sizeof(line), "%u.%u.%u.%u/%d", C(in >> 24),
727: C(in >> 16), C(in >> 8), C(in), mbits);
728: #undef C
729: return (line);
730: }
731:
732: char *
733: netname6(struct sockaddr_in6 *sa6, struct sockaddr_in6 *mask)
734: {
735: struct sockaddr_in6 sin6;
736: u_char *p;
737: int masklen, final = 0, illegal = 0;
738: int i, lim, flag, error;
739: char hbuf[NI_MAXHOST];
740:
741: sin6 = *sa6;
742:
743: flag = 0;
744: masklen = 0;
745: if (mask) {
746: lim = mask->sin6_len - offsetof(struct sockaddr_in6, sin6_addr);
1.4 claudio 747: lim = lim < (int)sizeof(struct in6_addr) ?
1.1 claudio 748: lim : sizeof(struct in6_addr);
749: for (p = (u_char *)&mask->sin6_addr, i = 0; i < lim; p++) {
750: if (final && *p) {
751: illegal++;
752: sin6.sin6_addr.s6_addr[i++] = 0x00;
753: continue;
754: }
755:
756: switch (*p & 0xff) {
757: case 0xff:
758: masklen += 8;
759: break;
760: case 0xfe:
761: masklen += 7;
762: final++;
763: break;
764: case 0xfc:
765: masklen += 6;
766: final++;
767: break;
768: case 0xf8:
769: masklen += 5;
770: final++;
771: break;
772: case 0xf0:
773: masklen += 4;
774: final++;
775: break;
776: case 0xe0:
777: masklen += 3;
778: final++;
779: break;
780: case 0xc0:
781: masklen += 2;
782: final++;
783: break;
784: case 0x80:
785: masklen += 1;
786: final++;
787: break;
788: case 0x00:
789: final++;
790: break;
791: default:
792: final++;
793: illegal++;
794: break;
795: }
796:
797: if (!illegal)
798: sin6.sin6_addr.s6_addr[i++] &= *p;
799: else
800: sin6.sin6_addr.s6_addr[i++] = 0x00;
801: }
802: while (i < sizeof(struct in6_addr))
803: sin6.sin6_addr.s6_addr[i++] = 0x00;
804: } else
805: masklen = 128;
806:
807: if (masklen == 0 && IN6_IS_ADDR_UNSPECIFIED(&sin6.sin6_addr))
808: return ("default");
809:
810: if (illegal)
811: warnx("illegal prefixlen");
812:
813: if (nflag)
814: flag |= NI_NUMERICHOST;
815: error = getnameinfo((struct sockaddr *)&sin6, sin6.sin6_len,
816: hbuf, sizeof(hbuf), NULL, 0, flag);
817: if (error)
818: snprintf(hbuf, sizeof(hbuf), "invalid");
819:
820: snprintf(line, sizeof(line), "%s/%d", hbuf, masklen);
821: return (line);
822: }
823:
824: /*
825: * Return the name of the network whose address is given.
826: * The address is assumed to be that of a net or subnet, not a host.
827: */
828: char *
829: netname(struct sockaddr *sa, struct sockaddr *mask)
830: {
831: switch (sa->sa_family) {
832:
833: case AF_INET:
834: return netname4(((struct sockaddr_in *)sa)->sin_addr.s_addr,
835: ((struct sockaddr_in *)mask)->sin_addr.s_addr);
836: case AF_INET6:
837: return netname6((struct sockaddr_in6 *)sa,
838: (struct sockaddr_in6 *)mask);
839: case AF_LINK:
840: return (link_print(sa));
1.13 claudio 841: case AF_MPLS:
1.17 ! michele 842: return (label_print(sa, NULL));
1.1 claudio 843: default:
844: snprintf(line, sizeof(line), "af %d: %s",
845: sa->sa_family, any_ntoa(sa));
846: break;
847: }
848: return (line);
849: }
850:
851: static const char hexlist[] = "0123456789abcdef";
852:
853: char *
854: any_ntoa(const struct sockaddr *sa)
855: {
856: static char obuf[240];
857: const char *in = sa->sa_data;
858: char *out = obuf;
859: int len = sa->sa_len - offsetof(struct sockaddr, sa_data);
860:
861: *out++ = 'Q';
862: do {
863: *out++ = hexlist[(*in >> 4) & 15];
864: *out++ = hexlist[(*in++) & 15];
865: *out++ = '.';
866: } while (--len > 0 && (out + 3) < &obuf[sizeof(obuf) - 1]);
867: out[-1] = '\0';
868: return (obuf);
869: }
870:
871: char *
872: link_print(struct sockaddr *sa)
873: {
874: struct sockaddr_dl *sdl = (struct sockaddr_dl *)sa;
875: u_char *lla = (u_char *)sdl->sdl_data + sdl->sdl_nlen;
876:
877: if (sdl->sdl_nlen == 0 && sdl->sdl_alen == 0 &&
878: sdl->sdl_slen == 0) {
879: (void)snprintf(line, sizeof(line), "link#%d", sdl->sdl_index);
880: return (line);
881: }
882: switch (sdl->sdl_type) {
883: case IFT_ETHER:
884: case IFT_CARP:
885: return (ether_ntoa((struct ether_addr *)lla));
886: default:
887: return (link_ntoa(sdl));
888: }
1.13 claudio 889: }
890:
891: char *
1.16 michele 892: label_print_op(u_int32_t type)
1.13 claudio 893: {
1.16 michele 894: switch (type & (MPLS_OP_PUSH | MPLS_OP_POP | MPLS_OP_SWAP)) {
1.13 claudio 895: case MPLS_OP_POP:
896: return ("POP");
897: case MPLS_OP_SWAP:
898: return ("SWAP");
899: case MPLS_OP_PUSH:
900: return ("PUSH");
901: default:
902: return ("?");
903: }
904: }
905:
906: char *
1.17 ! michele 907: label_print(struct sockaddr *in, struct sockaddr *out)
1.13 claudio 908: {
1.17 ! michele 909: struct sockaddr_mpls *insmpls = (struct sockaddr_mpls *)in;
! 910: struct sockaddr_mpls *outsmpls = (struct sockaddr_mpls *)out;
1.13 claudio 911: char ifname_in[IF_NAMESIZE];
912: char ifname_out[IF_NAMESIZE];
913: char *in_label;
914: char *out_label;
915:
1.16 michele 916: if (asprintf(&in_label, "%u",
1.17 ! michele 917: ntohl(insmpls->smpls_label) >> MPLS_LABEL_OFFSET) == -1)
1.13 claudio 918: err(1, NULL);
919:
1.17 ! michele 920: if (outsmpls) {
! 921: if (asprintf(&out_label, "%u",
! 922: ntohl(outsmpls->smpls_label) >> MPLS_LABEL_OFFSET) == -1)
! 923: err(1, NULL);
! 924: } else {
! 925: if (asprintf(&out_label, "-") == -1)
! 926: err(1, NULL);
! 927: }
1.13 claudio 928:
1.16 michele 929: (void)snprintf(line, sizeof(line), "%-16s %-10s", in_label,
930: out_label);
1.13 claudio 931:
932: free(in_label);
933: free(out_label);
934:
935: return (line);
1.1 claudio 936: }
937:
938: void
939: index_pfk(struct sadb_msg *msg, void **headers)
940: {
941: struct sadb_ext *ext;
942:
943: for (ext = (struct sadb_ext *)(msg + 1);
944: (size_t)((u_int8_t *)ext - (u_int8_t *)msg) <
945: msg->sadb_msg_len * PFKEYV2_CHUNK && ext->sadb_ext_len > 0;
946: ext = (struct sadb_ext *)((u_int8_t *)ext +
947: ext->sadb_ext_len * PFKEYV2_CHUNK)) {
948: switch (ext->sadb_ext_type) {
949: case SADB_EXT_ADDRESS_SRC:
950: headers[SADB_EXT_ADDRESS_SRC] = (void *)ext;
951: break;
952: case SADB_EXT_ADDRESS_DST:
953: headers[SADB_EXT_ADDRESS_DST] = (void *)ext;
954: break;
955: case SADB_X_EXT_PROTOCOL:
956: headers[SADB_X_EXT_PROTOCOL] = (void *)ext;
957: break;
958: case SADB_X_EXT_SRC_FLOW:
959: headers[SADB_X_EXT_SRC_FLOW] = (void *)ext;
960: break;
961: case SADB_X_EXT_DST_FLOW:
962: headers[SADB_X_EXT_DST_FLOW] = (void *)ext;
963: break;
964: case SADB_X_EXT_SRC_MASK:
965: headers[SADB_X_EXT_SRC_MASK] = (void *)ext;
966: break;
967: case SADB_X_EXT_DST_MASK:
968: headers[SADB_X_EXT_DST_MASK] = (void *)ext;
969: break;
970: case SADB_X_EXT_FLOW_TYPE:
971: headers[SADB_X_EXT_FLOW_TYPE] = (void *)ext;
972: default:
973: /* Ignore. */
974: break;
975: }
976: }
977: }