Annotation of src/usr.bin/netstat/show.c, Revision 1.19
1.19 ! michele 1: /* $OpenBSD: show.c,v 1.18 2009/01/26 17:28:09 claudio Exp $ */
1.1 claudio 2: /* $NetBSD: show.c,v 1.1 1996/11/15 18:01:41 gwr Exp $ */
3:
4: /*
5: * Copyright (c) 1983, 1988, 1993
6: * The Regents of the University of California. All rights reserved.
7: *
8: * Redistribution and use in source and binary forms, with or without
9: * modification, are permitted provided that the following conditions
10: * are met:
11: * 1. Redistributions of source code must retain the above copyright
12: * notice, this list of conditions and the following disclaimer.
13: * 2. Redistributions in binary form must reproduce the above copyright
14: * notice, this list of conditions and the following disclaimer in the
15: * documentation and/or other materials provided with the distribution.
16: * 3. Neither the name of the University nor the names of its contributors
17: * may be used to endorse or promote products derived from this software
18: * without specific prior written permission.
19: *
20: * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
21: * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
22: * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23: * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
24: * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
25: * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26: * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27: * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28: * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29: * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
30: * SUCH DAMAGE.
31: */
32:
33: #include <sys/param.h>
34: #include <sys/protosw.h>
35: #include <sys/socket.h>
36: #include <sys/mbuf.h>
37: #include <sys/sysctl.h>
38:
39: #include <net/if.h>
40: #include <net/if_dl.h>
41: #include <net/if_types.h>
42: #include <net/pfkeyv2.h>
43: #include <net/route.h>
44: #include <netinet/in.h>
45: #include <netinet/if_ether.h>
46: #include <netinet/ip_ipsp.h>
1.13 claudio 47: #include <netmpls/mpls.h>
1.1 claudio 48: #include <arpa/inet.h>
49:
50: #include <err.h>
51: #include <errno.h>
52: #include <netdb.h>
53: #include <stdio.h>
54: #include <stddef.h>
55: #include <stdlib.h>
56: #include <string.h>
57: #include <unistd.h>
58:
59: #include "netstat.h"
60:
61: char *any_ntoa(const struct sockaddr *);
62: char *link_print(struct sockaddr *);
1.16 michele 63: char *label_print_op(u_int32_t);
1.17 michele 64: char *label_print(struct sockaddr *, struct sockaddr *);
1.1 claudio 65:
66: #define ROUNDUP(a) \
67: ((a) > 0 ? (1 + (((a) - 1) | (sizeof(long) - 1))) : sizeof(long))
68: #define ADVANCE(x, n) (x += ROUNDUP((n)->sa_len))
69:
70: #define PFKEYV2_CHUNK sizeof(u_int64_t)
71:
72: /*
73: * Definitions for showing gateway flags.
74: */
75: struct bits {
76: int b_mask;
77: char b_val;
78: };
79: static const struct bits bits[] = {
80: { RTF_UP, 'U' },
81: { RTF_GATEWAY, 'G' },
82: { RTF_HOST, 'H' },
83: { RTF_REJECT, 'R' },
84: { RTF_BLACKHOLE, 'B' },
85: { RTF_DYNAMIC, 'D' },
86: { RTF_MODIFIED, 'M' },
87: { RTF_DONE, 'd' }, /* Completed -- for routing messages only */
88: { RTF_MASK, 'm' }, /* Mask Present -- for routing messages only */
89: { RTF_CLONING, 'C' },
90: { RTF_XRESOLVE, 'X' },
91: { RTF_LLINFO, 'L' },
92: { RTF_STATIC, 'S' },
93: { RTF_PROTO1, '1' },
94: { RTF_PROTO2, '2' },
95: { RTF_PROTO3, '3' },
96: { RTF_CLONED, 'c' },
97: { RTF_JUMBO, 'J' },
1.18 claudio 98: { RTF_MPATH, 'P' },
1.1 claudio 99: { 0 }
100: };
101:
102: void p_rtentry(struct rt_msghdr *);
103: void p_pfkentry(struct sadb_msg *);
104: void pr_family(int);
105: void p_encap(struct sockaddr *, struct sockaddr *, int);
106: void p_protocol(struct sadb_protocol *, struct sockaddr *, struct
1.13 claudio 107: sadb_protocol *, int);
1.1 claudio 108: void p_sockaddr(struct sockaddr *, struct sockaddr *, int, int);
1.17 michele 109: void p_sockaddr_mpls(struct sockaddr *, struct sockaddr *, int, int);
1.1 claudio 110: void p_flags(int, char *);
111: char *routename4(in_addr_t);
112: char *routename6(struct sockaddr_in6 *);
113: void index_pfk(struct sadb_msg *, void **);
114:
115: /*
116: * Print routing tables.
117: */
118: void
1.10 claudio 119: p_rttables(int af, u_int tableid)
1.1 claudio 120: {
121: struct rt_msghdr *rtm;
122: struct sadb_msg *msg;
123: char *buf = NULL, *next, *lim = NULL;
124: size_t needed;
1.10 claudio 125: int mib[7];
1.1 claudio 126: struct sockaddr *sa;
127:
128: mib[0] = CTL_NET;
129: mib[1] = PF_ROUTE;
130: mib[2] = 0;
131: mib[3] = af;
132: mib[4] = NET_RT_DUMP;
133: mib[5] = 0;
1.10 claudio 134: mib[6] = tableid;
135:
136: if (sysctl(mib, 7, NULL, &needed, NULL, 0) < 0)
1.1 claudio 137: err(1, "route-sysctl-estimate");
138: if (needed > 0) {
139: if ((buf = malloc(needed)) == 0)
140: err(1, NULL);
1.10 claudio 141: if (sysctl(mib, 7, buf, &needed, NULL, 0) < 0)
1.1 claudio 142: err(1, "sysctl of routing table");
143: lim = buf + needed;
144: }
145:
146: printf("Routing tables\n");
147:
148: if (buf) {
149: for (next = buf; next < lim; next += rtm->rtm_msglen) {
150: rtm = (struct rt_msghdr *)next;
1.8 claudio 151: if (rtm->rtm_version != RTM_VERSION)
152: continue;
1.1 claudio 153: sa = (struct sockaddr *)(rtm + 1);
154: if (af != AF_UNSPEC && sa->sa_family != af)
155: continue;
156: p_rtentry(rtm);
157: }
158: free(buf);
159: buf = NULL;
160: }
161:
162: if (af != 0 && af != PF_KEY)
163: return;
164:
165: mib[0] = CTL_NET;
166: mib[1] = PF_KEY;
167: mib[2] = PF_KEY_V2;
168: mib[3] = NET_KEY_SPD_DUMP;
169: mib[4] = mib[5] = 0;
170:
171: if (sysctl(mib, 4, NULL, &needed, NULL, 0) == -1) {
172: if (errno == ENOPROTOOPT)
173: return;
174: err(1, "spd-sysctl-estimate");
175: }
176: if (needed > 0) {
177: if ((buf = malloc(needed)) == 0)
178: err(1, NULL);
179: if (sysctl(mib, 4, buf, &needed, NULL, 0) == -1)
180: err(1,"sysctl of spd");
181: lim = buf + needed;
182: }
183:
184: if (buf) {
185: printf("\nEncap:\n");
186:
187: for (next = buf; next < lim; next += msg->sadb_msg_len *
188: PFKEYV2_CHUNK) {
189: msg = (struct sadb_msg *)next;
190: if (msg->sadb_msg_len == 0)
191: break;
192: p_pfkentry(msg);
193: }
194: free(buf);
195: buf = NULL;
196: }
197: }
198:
1.12 deraadt 199: /*
1.1 claudio 200: * column widths; each followed by one space
201: * width of destination/gateway column
202: * strlen("fe80::aaaa:bbbb:cccc:dddd@gif0") == 30, strlen("/128") == 4
203: */
204: #define WID_GW(af) ((af) == AF_INET6 ? (nflag ? 30 : 18) : 18)
205:
1.13 claudio 206: int
207: WID_DST(int af)
208: {
209:
210: if (nflag)
211: switch (af) {
212: case AF_MPLS:
213: return 34;
214: case AF_INET6:
215: return 34;
216: default:
217: return 18;
218: }
219: else
220: switch (af) {
221: case AF_MPLS:
222: return 34;
223: default:
224: return 18;
225: }
226: }
227:
1.1 claudio 228: /*
229: * Print header for routing table columns.
230: */
231: void
232: pr_rthdr(int af, int Aflag)
233: {
234: if (Aflag)
235: printf("%-*.*s ", PLEN, PLEN, "Address");
1.13 claudio 236: switch (af) {
237: case PF_KEY:
1.1 claudio 238: printf("%-18s %-5s %-18s %-5s %-5s %-22s\n",
239: "Source", "Port", "Destination",
240: "Port", "Proto", "SA(Address/Proto/Type/Direction)");
1.13 claudio 241: break;
242: case PF_MPLS:
243: printf("%-16s %-10s %-6s %-18s %-6.6s %5.5s %8.8s %5.5s %4.4s %s\n",
244: "In label", "Out label", "Op", "Gateway",
245: "Flags", "Refs", "Use", "Mtu", "Prio", "Interface");
246: break;
247: default:
248: printf("%-*.*s %-*.*s %-6.6s %5.5s %8.8s %5.5s %4.4s %s\n",
249: WID_DST(af), WID_DST(af), "Destination",
250: WID_GW(af), WID_GW(af), "Gateway",
251: "Flags", "Refs", "Use", "Mtu", "Prio", "Iface");
252: break;
253: }
1.1 claudio 254: }
255:
256: static void
257: get_rtaddrs(int addrs, struct sockaddr *sa, struct sockaddr **rti_info)
258: {
259: int i;
260:
261: for (i = 0; i < RTAX_MAX; i++) {
262: if (addrs & (1 << i)) {
263: rti_info[i] = sa;
264: sa = (struct sockaddr *)((char *)(sa) +
265: ROUNDUP(sa->sa_len));
266: } else
267: rti_info[i] = NULL;
268: }
269: }
270:
271: /*
272: * Print a routing table entry.
273: */
274: void
275: p_rtentry(struct rt_msghdr *rtm)
276: {
277: static int old_af = -1;
278: struct sockaddr *sa = (struct sockaddr *)(rtm + 1);
279: struct sockaddr *mask, *rti_info[RTAX_MAX];
280: char ifbuf[IF_NAMESIZE];
281:
282: if (sa->sa_family == AF_KEY)
283: return;
284:
1.5 pyr 285: get_rtaddrs(rtm->rtm_addrs, sa, rti_info);
286: if (Fflag && rti_info[RTAX_GATEWAY]->sa_family != sa->sa_family) {
287: return;
288: }
1.1 claudio 289: if (old_af != sa->sa_family) {
290: old_af = sa->sa_family;
291: pr_family(sa->sa_family);
292: pr_rthdr(sa->sa_family, 0);
293: }
294:
295: mask = rti_info[RTAX_NETMASK];
296: if ((sa = rti_info[RTAX_DST]) == NULL)
297: return;
298:
299: p_sockaddr(sa, mask, rtm->rtm_flags, WID_DST(sa->sa_family));
1.19 ! michele 300: p_sockaddr_mpls(sa, rti_info[RTAX_SRC], rtm->rtm_mpls,
1.17 michele 301: WID_DST(sa->sa_family));
302:
1.1 claudio 303: p_sockaddr(rti_info[RTAX_GATEWAY], NULL, RTF_HOST,
304: WID_GW(sa->sa_family));
305: p_flags(rtm->rtm_flags, "%-6.6s ");
1.13 claudio 306: printf("%5u %8llu ", rtm->rtm_rmx.rmx_refcnt,
1.1 claudio 307: rtm->rtm_rmx.rmx_pksent);
308: if (rtm->rtm_rmx.rmx_mtu)
1.13 claudio 309: printf("%5u ", rtm->rtm_rmx.rmx_mtu);
1.1 claudio 310: else
1.13 claudio 311: printf("%5s ", "-");
1.1 claudio 312: putchar((rtm->rtm_rmx.rmx_locks & RTV_MTU) ? 'L' : ' ');
1.14 claudio 313: printf(" %2d %.16s", rtm->rtm_priority & RTP_MASK,
1.13 claudio 314: if_indextoname(rtm->rtm_index, ifbuf));
1.1 claudio 315: putchar('\n');
316: }
317:
318: /*
319: * Print a pfkey/encap entry.
320: */
321: void
322: p_pfkentry(struct sadb_msg *msg)
323: {
1.13 claudio 324: static int old = 0;
1.1 claudio 325: struct sadb_address *saddr;
326: struct sadb_protocol *sap, *saft;
327: struct sockaddr *sa, *mask;
328: void *headers[SADB_EXT_MAX + 1];
329:
330: if (!old) {
331: pr_rthdr(PF_KEY, 0);
332: old++;
333: }
334:
335: bzero(headers, sizeof(headers));
336: index_pfk(msg, headers);
337:
338: /* These are always set */
339: saddr = headers[SADB_X_EXT_SRC_FLOW];
340: sa = (struct sockaddr *)(saddr + 1);
341: saddr = headers[SADB_X_EXT_SRC_MASK];
342: mask = (struct sockaddr *)(saddr + 1);
343: p_encap(sa, mask, WID_DST(sa->sa_family));
344:
345: /* These are always set, too. */
346: saddr = headers[SADB_X_EXT_DST_FLOW];
347: sa = (struct sockaddr *)(saddr + 1);
348: saddr = headers[SADB_X_EXT_DST_MASK];
349: mask = (struct sockaddr *)(saddr + 1);
350: p_encap(sa, mask, WID_DST(sa->sa_family));
351:
352: /* Bypass and deny flows do not set SADB_EXT_ADDRESS_DST! */
353: sap = headers[SADB_X_EXT_PROTOCOL];
354: saft = headers[SADB_X_EXT_FLOW_TYPE];
355: saddr = headers[SADB_EXT_ADDRESS_DST];
356: if (saddr)
357: sa = (struct sockaddr *)(saddr + 1);
358: else
359: sa = NULL;
360: p_protocol(sap, sa, saft, msg->sadb_msg_satype);
361:
362: printf("\n");
363: }
364:
365: /*
366: * Print address family header before a section of the routing table.
367: */
368: void
369: pr_family(int af)
370: {
371: char *afname;
372:
373: switch (af) {
374: case AF_INET:
375: afname = "Internet";
376: break;
377: case AF_INET6:
378: afname = "Internet6";
379: break;
380: case PF_KEY:
381: afname = "Encap";
382: break;
1.13 claudio 383: case AF_MPLS:
384: afname = "MPLS";
385: break;
1.1 claudio 386: case AF_APPLETALK:
387: afname = "AppleTalk";
388: break;
389: default:
390: afname = NULL;
391: break;
392: }
393: if (afname)
394: printf("\n%s:\n", afname);
395: else
396: printf("\nProtocol Family %d:\n", af);
397: }
398:
399: void
400: p_addr(struct sockaddr *sa, struct sockaddr *mask, int flags)
401: {
402: p_sockaddr(sa, mask, flags, WID_DST(sa->sa_family));
403: }
404:
405: void
406: p_gwaddr(struct sockaddr *sa, int af)
407: {
408: p_sockaddr(sa, 0, RTF_HOST, WID_GW(af));
409: }
410:
411: void
412: p_encap(struct sockaddr *sa, struct sockaddr *mask, int width)
413: {
1.13 claudio 414: char *cp;
415: unsigned short port = 0;
1.1 claudio 416:
1.2 todd 417: if (mask)
418: cp = netname(sa, mask);
419: else
420: cp = routename(sa);
1.1 claudio 421: switch (sa->sa_family) {
1.9 claudio 422: case AF_INET:
423: port = ntohs(((struct sockaddr_in *)sa)->sin_port);
424: break;
1.2 todd 425: case AF_INET6:
426: port = ntohs(((struct sockaddr_in6 *)sa)->sin6_port);
1.1 claudio 427: break;
428: }
429: if (width < 0)
430: printf("%s", cp);
431: else {
432: if (nflag)
433: printf("%-*s %-5u ", width, cp, port);
434: else
435: printf("%-*.*s %-5u ", width, width, cp, port);
436: }
437: }
438:
439: void
440: p_protocol(struct sadb_protocol *sap, struct sockaddr *sa, struct sadb_protocol
441: *saft, int proto)
442: {
443: printf("%-6u", sap->sadb_protocol_proto);
1.9 claudio 444:
1.1 claudio 445: if (sa)
446: p_sockaddr(sa, NULL, 0, -1);
447: else
448: printf("none");
449:
450: switch (proto) {
451: case SADB_SATYPE_ESP:
452: printf("/esp");
453: break;
454: case SADB_SATYPE_AH:
455: printf("/ah");
456: break;
457: case SADB_X_SATYPE_IPCOMP:
458: printf("/ipcomp");
459: break;
460: case SADB_X_SATYPE_IPIP:
461: printf("/ipip");
462: break;
463: default:
464: printf("/<unknown>");
465: }
466:
467: switch(saft->sadb_protocol_proto) {
468: case SADB_X_FLOW_TYPE_USE:
469: printf("/use");
470: break;
471: case SADB_X_FLOW_TYPE_REQUIRE:
472: printf("/require");
473: break;
474: case SADB_X_FLOW_TYPE_ACQUIRE:
475: printf("/acquire");
476: break;
477: case SADB_X_FLOW_TYPE_DENY:
478: printf("/deny");
479: break;
480: case SADB_X_FLOW_TYPE_BYPASS:
481: printf("/bypass");
482: break;
483: case SADB_X_FLOW_TYPE_DONTACQ:
484: printf("/dontacq");
485: break;
486: default:
487: printf("/<unknown type>");
488: }
489:
490: switch(saft->sadb_protocol_direction) {
491: case IPSP_DIRECTION_IN:
492: printf("/in");
493: break;
494: case IPSP_DIRECTION_OUT:
495: printf("/out");
496: break;
497: default:
498: printf("/<unknown>");
499: }
500: }
501:
502: void
503: p_sockaddr(struct sockaddr *sa, struct sockaddr *mask, int flags, int width)
504: {
505: char *cp;
506:
507: switch (sa->sa_family) {
508: case AF_INET6:
509: {
510: struct sockaddr_in6 *sa6 = (struct sockaddr_in6 *)sa;
511: struct in6_addr *in6 = &sa6->sin6_addr;
512:
513: /*
514: * XXX: This is a special workaround for KAME kernels.
515: * sin6_scope_id field of SA should be set in the future.
516: */
517: if (IN6_IS_ADDR_LINKLOCAL(in6) ||
1.3 itojun 518: IN6_IS_ADDR_MC_LINKLOCAL(in6) ||
519: IN6_IS_ADDR_MC_INTFACELOCAL(in6)) {
1.1 claudio 520: /* XXX: override is ok? */
521: sa6->sin6_scope_id = (u_int32_t)ntohs(*(u_short *)
522: &in6->s6_addr[2]);
523: *(u_short *)&in6->s6_addr[2] = 0;
524: }
525: if (flags & RTF_HOST)
526: cp = routename((struct sockaddr *)sa6);
527: else
528: cp = netname((struct sockaddr *)sa6, mask);
529: break;
530: }
1.16 michele 531: case AF_MPLS:
1.17 michele 532: return;
1.1 claudio 533: default:
534: if ((flags & RTF_HOST) || mask == NULL)
535: cp = routename(sa);
536: else
537: cp = netname(sa, mask);
538: break;
539: }
540: if (width < 0)
541: printf("%s", cp);
542: else {
543: if (nflag)
544: printf("%-*s ", width, cp);
545: else
546: printf("%-*.*s ", width, width, cp);
547: }
548: }
549:
1.17 michele 550: static char line[MAXHOSTNAMELEN];
551: static char domain[MAXHOSTNAMELEN];
552:
553: void
554: p_sockaddr_mpls(struct sockaddr *in, struct sockaddr *out, int flags, int width)
555: {
556: char *cp;
557:
558: if (in->sa_family != AF_MPLS)
559: return;
560:
561: if (flags & MPLS_OP_POP)
562: cp = label_print(in, NULL);
563: else
564: cp = label_print(in, out);
565:
566: snprintf(cp, MAXHOSTNAMELEN, "%s %s", cp,
567: label_print_op(flags));
568:
569: printf("%-*s ", width, cp);
570: }
571:
1.1 claudio 572: void
573: p_flags(int f, char *format)
574: {
575: char name[33], *flags;
576: const struct bits *p = bits;
577:
578: for (flags = name; p->b_mask && flags < &name[sizeof(name) - 2]; p++)
579: if (p->b_mask & f)
580: *flags++ = p->b_val;
581: *flags = '\0';
582: printf(format, name);
583: }
584:
585: char *
586: routename(struct sockaddr *sa)
587: {
588: char *cp = NULL;
589: static int first = 1;
590:
591: if (first) {
592: first = 0;
593: if (gethostname(domain, sizeof(domain)) == 0 &&
594: (cp = strchr(domain, '.')))
595: (void)strlcpy(domain, cp + 1, sizeof(domain));
596: else
597: domain[0] = '\0';
598: cp = NULL;
599: }
600:
601: if (sa->sa_len == 0) {
602: (void)strlcpy(line, "default", sizeof(line));
603: return (line);
604: }
605:
606: switch (sa->sa_family) {
607: case AF_INET:
608: return
609: (routename4(((struct sockaddr_in *)sa)->sin_addr.s_addr));
610:
611: case AF_INET6:
612: {
613: struct sockaddr_in6 sin6;
614:
615: memset(&sin6, 0, sizeof(sin6));
616: memcpy(&sin6, sa, sa->sa_len);
617: sin6.sin6_len = sizeof(struct sockaddr_in6);
618: sin6.sin6_family = AF_INET6;
619: if (sa->sa_len == sizeof(struct sockaddr_in6) &&
620: (IN6_IS_ADDR_LINKLOCAL(&sin6.sin6_addr) ||
1.3 itojun 621: IN6_IS_ADDR_MC_LINKLOCAL(&sin6.sin6_addr) ||
622: IN6_IS_ADDR_MC_INTFACELOCAL(&sin6.sin6_addr)) &&
1.1 claudio 623: sin6.sin6_scope_id == 0) {
624: sin6.sin6_scope_id =
625: ntohs(*(u_int16_t *)&sin6.sin6_addr.s6_addr[2]);
626: sin6.sin6_addr.s6_addr[2] = 0;
627: sin6.sin6_addr.s6_addr[3] = 0;
628: }
629: return (routename6(&sin6));
630: }
631:
632: case AF_LINK:
633: return (link_print(sa));
1.13 claudio 634: case AF_MPLS:
1.17 michele 635: return (label_print(sa, NULL));
1.1 claudio 636: case AF_UNSPEC:
637: if (sa->sa_len == sizeof(struct sockaddr_rtlabel)) {
638: static char name[RTLABEL_LEN];
639: struct sockaddr_rtlabel *sr;
640:
641: sr = (struct sockaddr_rtlabel *)sa;
1.9 claudio 642: (void)strlcpy(name, sr->sr_label, sizeof(name));
1.1 claudio 643: return (name);
644: }
645: /* FALLTHROUGH */
646: default:
647: (void)snprintf(line, sizeof(line), "(%d) %s",
648: sa->sa_family, any_ntoa(sa));
649: break;
650: }
651: return (line);
652: }
653:
654: char *
655: routename4(in_addr_t in)
656: {
657: char *cp = NULL;
658: struct in_addr ina;
659: struct hostent *hp;
660:
661: if (in == INADDR_ANY)
662: cp = "default";
663: if (!cp && !nflag) {
664: if ((hp = gethostbyaddr((char *)&in,
665: sizeof(in), AF_INET)) != NULL) {
666: if ((cp = strchr(hp->h_name, '.')) &&
667: !strcmp(cp + 1, domain))
668: *cp = '\0';
669: cp = hp->h_name;
670: }
671: }
672: ina.s_addr = in;
673: strlcpy(line, cp ? cp : inet_ntoa(ina), sizeof(line));
674:
675: return (line);
676: }
677:
678: char *
679: routename6(struct sockaddr_in6 *sin6)
680: {
681: int niflags = 0;
682:
683: if (nflag)
684: niflags |= NI_NUMERICHOST;
685: else
686: niflags |= NI_NOFQDN;
687:
688: if (getnameinfo((struct sockaddr *)sin6, sin6->sin6_len,
689: line, sizeof(line), NULL, 0, niflags) != 0)
690: strncpy(line, "invalid", sizeof(line));
691:
692: return (line);
693: }
694:
695: /*
696: * Return the name of the network whose address is given.
697: * The address is assumed to be that of a net or subnet, not a host.
698: */
699: char *
700: netname4(in_addr_t in, in_addr_t mask)
701: {
702: char *cp = NULL;
703: struct netent *np = NULL;
704: int mbits;
705:
706: in = ntohl(in);
707: mask = ntohl(mask);
708: if (!nflag && in != INADDR_ANY) {
709: if ((np = getnetbyaddr(in, AF_INET)) != NULL)
710: cp = np->n_name;
711: }
712: if (in == INADDR_ANY)
713: cp = "default";
714: mbits = mask ? 33 - ffs(mask) : 0;
715: if (cp)
716: strlcpy(line, cp, sizeof(line));
717: #define C(x) ((x) & 0xff)
718: else if (mbits < 9)
719: snprintf(line, sizeof(line), "%u/%d", C(in >> 24), mbits);
720: else if (mbits < 17)
721: snprintf(line, sizeof(line), "%u.%u/%d",
722: C(in >> 24) , C(in >> 16), mbits);
723: else if (mbits < 25)
724: snprintf(line, sizeof(line), "%u.%u.%u/%d",
725: C(in >> 24), C(in >> 16), C(in >> 8), mbits);
726: else
727: snprintf(line, sizeof(line), "%u.%u.%u.%u/%d", C(in >> 24),
728: C(in >> 16), C(in >> 8), C(in), mbits);
729: #undef C
730: return (line);
731: }
732:
733: char *
734: netname6(struct sockaddr_in6 *sa6, struct sockaddr_in6 *mask)
735: {
736: struct sockaddr_in6 sin6;
737: u_char *p;
738: int masklen, final = 0, illegal = 0;
739: int i, lim, flag, error;
740: char hbuf[NI_MAXHOST];
741:
742: sin6 = *sa6;
743:
744: flag = 0;
745: masklen = 0;
746: if (mask) {
747: lim = mask->sin6_len - offsetof(struct sockaddr_in6, sin6_addr);
1.4 claudio 748: lim = lim < (int)sizeof(struct in6_addr) ?
1.1 claudio 749: lim : sizeof(struct in6_addr);
750: for (p = (u_char *)&mask->sin6_addr, i = 0; i < lim; p++) {
751: if (final && *p) {
752: illegal++;
753: sin6.sin6_addr.s6_addr[i++] = 0x00;
754: continue;
755: }
756:
757: switch (*p & 0xff) {
758: case 0xff:
759: masklen += 8;
760: break;
761: case 0xfe:
762: masklen += 7;
763: final++;
764: break;
765: case 0xfc:
766: masklen += 6;
767: final++;
768: break;
769: case 0xf8:
770: masklen += 5;
771: final++;
772: break;
773: case 0xf0:
774: masklen += 4;
775: final++;
776: break;
777: case 0xe0:
778: masklen += 3;
779: final++;
780: break;
781: case 0xc0:
782: masklen += 2;
783: final++;
784: break;
785: case 0x80:
786: masklen += 1;
787: final++;
788: break;
789: case 0x00:
790: final++;
791: break;
792: default:
793: final++;
794: illegal++;
795: break;
796: }
797:
798: if (!illegal)
799: sin6.sin6_addr.s6_addr[i++] &= *p;
800: else
801: sin6.sin6_addr.s6_addr[i++] = 0x00;
802: }
803: while (i < sizeof(struct in6_addr))
804: sin6.sin6_addr.s6_addr[i++] = 0x00;
805: } else
806: masklen = 128;
807:
808: if (masklen == 0 && IN6_IS_ADDR_UNSPECIFIED(&sin6.sin6_addr))
809: return ("default");
810:
811: if (illegal)
812: warnx("illegal prefixlen");
813:
814: if (nflag)
815: flag |= NI_NUMERICHOST;
816: error = getnameinfo((struct sockaddr *)&sin6, sin6.sin6_len,
817: hbuf, sizeof(hbuf), NULL, 0, flag);
818: if (error)
819: snprintf(hbuf, sizeof(hbuf), "invalid");
820:
821: snprintf(line, sizeof(line), "%s/%d", hbuf, masklen);
822: return (line);
823: }
824:
825: /*
826: * Return the name of the network whose address is given.
827: * The address is assumed to be that of a net or subnet, not a host.
828: */
829: char *
830: netname(struct sockaddr *sa, struct sockaddr *mask)
831: {
832: switch (sa->sa_family) {
833:
834: case AF_INET:
835: return netname4(((struct sockaddr_in *)sa)->sin_addr.s_addr,
836: ((struct sockaddr_in *)mask)->sin_addr.s_addr);
837: case AF_INET6:
838: return netname6((struct sockaddr_in6 *)sa,
839: (struct sockaddr_in6 *)mask);
840: case AF_LINK:
841: return (link_print(sa));
1.13 claudio 842: case AF_MPLS:
1.17 michele 843: return (label_print(sa, NULL));
1.1 claudio 844: default:
845: snprintf(line, sizeof(line), "af %d: %s",
846: sa->sa_family, any_ntoa(sa));
847: break;
848: }
849: return (line);
850: }
851:
852: static const char hexlist[] = "0123456789abcdef";
853:
854: char *
855: any_ntoa(const struct sockaddr *sa)
856: {
857: static char obuf[240];
858: const char *in = sa->sa_data;
859: char *out = obuf;
860: int len = sa->sa_len - offsetof(struct sockaddr, sa_data);
861:
862: *out++ = 'Q';
863: do {
864: *out++ = hexlist[(*in >> 4) & 15];
865: *out++ = hexlist[(*in++) & 15];
866: *out++ = '.';
867: } while (--len > 0 && (out + 3) < &obuf[sizeof(obuf) - 1]);
868: out[-1] = '\0';
869: return (obuf);
870: }
871:
872: char *
873: link_print(struct sockaddr *sa)
874: {
875: struct sockaddr_dl *sdl = (struct sockaddr_dl *)sa;
876: u_char *lla = (u_char *)sdl->sdl_data + sdl->sdl_nlen;
877:
878: if (sdl->sdl_nlen == 0 && sdl->sdl_alen == 0 &&
879: sdl->sdl_slen == 0) {
880: (void)snprintf(line, sizeof(line), "link#%d", sdl->sdl_index);
881: return (line);
882: }
883: switch (sdl->sdl_type) {
884: case IFT_ETHER:
885: case IFT_CARP:
886: return (ether_ntoa((struct ether_addr *)lla));
887: default:
888: return (link_ntoa(sdl));
889: }
1.13 claudio 890: }
891:
892: char *
1.16 michele 893: label_print_op(u_int32_t type)
1.13 claudio 894: {
1.16 michele 895: switch (type & (MPLS_OP_PUSH | MPLS_OP_POP | MPLS_OP_SWAP)) {
1.13 claudio 896: case MPLS_OP_POP:
897: return ("POP");
898: case MPLS_OP_SWAP:
899: return ("SWAP");
900: case MPLS_OP_PUSH:
901: return ("PUSH");
902: default:
903: return ("?");
904: }
905: }
906:
907: char *
1.17 michele 908: label_print(struct sockaddr *in, struct sockaddr *out)
1.13 claudio 909: {
1.17 michele 910: struct sockaddr_mpls *insmpls = (struct sockaddr_mpls *)in;
911: struct sockaddr_mpls *outsmpls = (struct sockaddr_mpls *)out;
1.13 claudio 912: char ifname_in[IF_NAMESIZE];
913: char ifname_out[IF_NAMESIZE];
914: char *in_label;
915: char *out_label;
916:
1.16 michele 917: if (asprintf(&in_label, "%u",
1.17 michele 918: ntohl(insmpls->smpls_label) >> MPLS_LABEL_OFFSET) == -1)
1.13 claudio 919: err(1, NULL);
920:
1.17 michele 921: if (outsmpls) {
922: if (asprintf(&out_label, "%u",
923: ntohl(outsmpls->smpls_label) >> MPLS_LABEL_OFFSET) == -1)
924: err(1, NULL);
925: } else {
926: if (asprintf(&out_label, "-") == -1)
927: err(1, NULL);
928: }
1.13 claudio 929:
1.16 michele 930: (void)snprintf(line, sizeof(line), "%-16s %-10s", in_label,
931: out_label);
1.13 claudio 932:
933: free(in_label);
934: free(out_label);
935:
936: return (line);
1.1 claudio 937: }
938:
939: void
940: index_pfk(struct sadb_msg *msg, void **headers)
941: {
942: struct sadb_ext *ext;
943:
944: for (ext = (struct sadb_ext *)(msg + 1);
945: (size_t)((u_int8_t *)ext - (u_int8_t *)msg) <
946: msg->sadb_msg_len * PFKEYV2_CHUNK && ext->sadb_ext_len > 0;
947: ext = (struct sadb_ext *)((u_int8_t *)ext +
948: ext->sadb_ext_len * PFKEYV2_CHUNK)) {
949: switch (ext->sadb_ext_type) {
950: case SADB_EXT_ADDRESS_SRC:
951: headers[SADB_EXT_ADDRESS_SRC] = (void *)ext;
952: break;
953: case SADB_EXT_ADDRESS_DST:
954: headers[SADB_EXT_ADDRESS_DST] = (void *)ext;
955: break;
956: case SADB_X_EXT_PROTOCOL:
957: headers[SADB_X_EXT_PROTOCOL] = (void *)ext;
958: break;
959: case SADB_X_EXT_SRC_FLOW:
960: headers[SADB_X_EXT_SRC_FLOW] = (void *)ext;
961: break;
962: case SADB_X_EXT_DST_FLOW:
963: headers[SADB_X_EXT_DST_FLOW] = (void *)ext;
964: break;
965: case SADB_X_EXT_SRC_MASK:
966: headers[SADB_X_EXT_SRC_MASK] = (void *)ext;
967: break;
968: case SADB_X_EXT_DST_MASK:
969: headers[SADB_X_EXT_DST_MASK] = (void *)ext;
970: break;
971: case SADB_X_EXT_FLOW_TYPE:
972: headers[SADB_X_EXT_FLOW_TYPE] = (void *)ext;
973: default:
974: /* Ignore. */
975: break;
976: }
977: }
978: }