Annotation of src/usr.bin/netstat/show.c, Revision 1.6
1.6 ! henning 1: /* $OpenBSD: show.c,v 1.5 2007/03/23 10:59:38 pyr Exp $ */
1.1 claudio 2: /* $NetBSD: show.c,v 1.1 1996/11/15 18:01:41 gwr Exp $ */
3:
4: /*
5: * Copyright (c) 1983, 1988, 1993
6: * The Regents of the University of California. All rights reserved.
7: *
8: * Redistribution and use in source and binary forms, with or without
9: * modification, are permitted provided that the following conditions
10: * are met:
11: * 1. Redistributions of source code must retain the above copyright
12: * notice, this list of conditions and the following disclaimer.
13: * 2. Redistributions in binary form must reproduce the above copyright
14: * notice, this list of conditions and the following disclaimer in the
15: * documentation and/or other materials provided with the distribution.
16: * 3. Neither the name of the University nor the names of its contributors
17: * may be used to endorse or promote products derived from this software
18: * without specific prior written permission.
19: *
20: * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
21: * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
22: * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23: * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
24: * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
25: * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26: * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27: * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28: * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29: * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
30: * SUCH DAMAGE.
31: */
32:
33: #include <sys/param.h>
34: #include <sys/protosw.h>
35: #include <sys/socket.h>
36: #include <sys/mbuf.h>
37: #include <sys/sysctl.h>
38:
39: #include <net/if.h>
40: #include <net/if_dl.h>
41: #include <net/if_types.h>
42: #include <net/pfkeyv2.h>
43: #include <net/route.h>
44: #include <netinet/in.h>
45: #include <netinet/if_ether.h>
46: #include <netinet/ip_ipsp.h>
47: #include <arpa/inet.h>
48:
49: #include <err.h>
50: #include <errno.h>
51: #include <netdb.h>
52: #include <stdio.h>
53: #include <stddef.h>
54: #include <stdlib.h>
55: #include <string.h>
56: #include <unistd.h>
57:
58: #include "netstat.h"
59:
60: char *any_ntoa(const struct sockaddr *);
61: char *link_print(struct sockaddr *);
62:
63: #define ROUNDUP(a) \
64: ((a) > 0 ? (1 + (((a) - 1) | (sizeof(long) - 1))) : sizeof(long))
65: #define ADVANCE(x, n) (x += ROUNDUP((n)->sa_len))
66:
67: #define PFKEYV2_CHUNK sizeof(u_int64_t)
68:
69: /*
70: * Definitions for showing gateway flags.
71: */
72: struct bits {
73: int b_mask;
74: char b_val;
75: };
76: static const struct bits bits[] = {
77: { RTF_UP, 'U' },
78: { RTF_GATEWAY, 'G' },
79: { RTF_HOST, 'H' },
80: { RTF_REJECT, 'R' },
81: { RTF_BLACKHOLE, 'B' },
82: { RTF_DYNAMIC, 'D' },
83: { RTF_MODIFIED, 'M' },
84: { RTF_DONE, 'd' }, /* Completed -- for routing messages only */
85: { RTF_MASK, 'm' }, /* Mask Present -- for routing messages only */
86: { RTF_CLONING, 'C' },
87: { RTF_XRESOLVE, 'X' },
88: { RTF_LLINFO, 'L' },
89: { RTF_STATIC, 'S' },
90: { RTF_PROTO1, '1' },
91: { RTF_PROTO2, '2' },
92: { RTF_PROTO3, '3' },
93: { RTF_CLONED, 'c' },
94: { RTF_JUMBO, 'J' },
95: { 0 }
96: };
97:
98: void pr_rthdr(int, int);
99: void p_rtentry(struct rt_msghdr *);
100: void p_pfkentry(struct sadb_msg *);
101: void pr_family(int);
102: void p_encap(struct sockaddr *, struct sockaddr *, int);
103: void p_protocol(struct sadb_protocol *, struct sockaddr *, struct
104: sadb_protocol *, int);
105: void p_sockaddr(struct sockaddr *, struct sockaddr *, int, int);
106: void p_flags(int, char *);
107: char *routename4(in_addr_t);
108: char *routename6(struct sockaddr_in6 *);
109: void index_pfk(struct sadb_msg *, void **);
110:
111: /*
112: * Print routing tables.
113: */
114: void
115: p_rttables(int af)
116: {
117: struct rt_msghdr *rtm;
118: struct sadb_msg *msg;
119: char *buf = NULL, *next, *lim = NULL;
120: size_t needed;
121: int mib[6];
122: struct sockaddr *sa;
123:
124: mib[0] = CTL_NET;
125: mib[1] = PF_ROUTE;
126: mib[2] = 0;
127: mib[3] = af;
128: mib[4] = NET_RT_DUMP;
129: mib[5] = 0;
130: if (sysctl(mib, 6, NULL, &needed, NULL, 0) < 0)
131: err(1, "route-sysctl-estimate");
132: if (needed > 0) {
133: if ((buf = malloc(needed)) == 0)
134: err(1, NULL);
135: if (sysctl(mib, 6, buf, &needed, NULL, 0) < 0)
136: err(1, "sysctl of routing table");
137: lim = buf + needed;
138: }
139:
140: printf("Routing tables\n");
141:
142: if (buf) {
143: for (next = buf; next < lim; next += rtm->rtm_msglen) {
144: rtm = (struct rt_msghdr *)next;
145: sa = (struct sockaddr *)(rtm + 1);
146: if (af != AF_UNSPEC && sa->sa_family != af)
147: continue;
148: p_rtentry(rtm);
149: }
150: free(buf);
151: buf = NULL;
152: }
153:
154: if (af != 0 && af != PF_KEY)
155: return;
156:
157: mib[0] = CTL_NET;
158: mib[1] = PF_KEY;
159: mib[2] = PF_KEY_V2;
160: mib[3] = NET_KEY_SPD_DUMP;
161: mib[4] = mib[5] = 0;
162:
163: if (sysctl(mib, 4, NULL, &needed, NULL, 0) == -1) {
164: if (errno == ENOPROTOOPT)
165: return;
166: err(1, "spd-sysctl-estimate");
167: }
168: if (needed > 0) {
169: if ((buf = malloc(needed)) == 0)
170: err(1, NULL);
171: if (sysctl(mib, 4, buf, &needed, NULL, 0) == -1)
172: err(1,"sysctl of spd");
173: lim = buf + needed;
174: }
175:
176: if (buf) {
177: printf("\nEncap:\n");
178:
179: for (next = buf; next < lim; next += msg->sadb_msg_len *
180: PFKEYV2_CHUNK) {
181: msg = (struct sadb_msg *)next;
182: if (msg->sadb_msg_len == 0)
183: break;
184: p_pfkentry(msg);
185: }
186: free(buf);
187: buf = NULL;
188: }
189: }
190:
191: /*
192: * column widths; each followed by one space
193: * width of destination/gateway column
194: * strlen("fe80::aaaa:bbbb:cccc:dddd@gif0") == 30, strlen("/128") == 4
195: */
196: #define WID_DST(af) ((af) == AF_INET6 ? (nflag ? 34 : 18) : 18)
197: #define WID_GW(af) ((af) == AF_INET6 ? (nflag ? 30 : 18) : 18)
198:
199: /*
200: * Print header for routing table columns.
201: */
202: void
203: pr_rthdr(int af, int Aflag)
204: {
205: if (Aflag)
206: printf("%-*.*s ", PLEN, PLEN, "Address");
207: if (af != PF_KEY)
208: printf("%-*.*s %-*.*s %-6.6s %6.6s %8.8s %6.6s %s\n",
209: WID_DST(af), WID_DST(af), "Destination",
210: WID_GW(af), WID_GW(af), "Gateway",
211: "Flags", "Refs", "Use", "Mtu", "Interface");
212: else
213: printf("%-18s %-5s %-18s %-5s %-5s %-22s\n",
214: "Source", "Port", "Destination",
215: "Port", "Proto", "SA(Address/Proto/Type/Direction)");
216: }
217:
218: static void
219: get_rtaddrs(int addrs, struct sockaddr *sa, struct sockaddr **rti_info)
220: {
221: int i;
222:
223: for (i = 0; i < RTAX_MAX; i++) {
224: if (addrs & (1 << i)) {
225: rti_info[i] = sa;
226: sa = (struct sockaddr *)((char *)(sa) +
227: ROUNDUP(sa->sa_len));
228: } else
229: rti_info[i] = NULL;
230: }
231: }
232:
233: /*
234: * Print a routing table entry.
235: */
236: void
237: p_rtentry(struct rt_msghdr *rtm)
238: {
239: static int old_af = -1;
240: struct sockaddr *sa = (struct sockaddr *)(rtm + 1);
241: struct sockaddr *mask, *rti_info[RTAX_MAX];
242: char ifbuf[IF_NAMESIZE];
243:
244:
245: if (sa->sa_family == AF_KEY)
246: return;
247:
1.5 pyr 248: get_rtaddrs(rtm->rtm_addrs, sa, rti_info);
249: if (Fflag && rti_info[RTAX_GATEWAY]->sa_family != sa->sa_family) {
250: return;
251: }
1.1 claudio 252: if (old_af != sa->sa_family) {
253: old_af = sa->sa_family;
254: pr_family(sa->sa_family);
255: pr_rthdr(sa->sa_family, 0);
256: }
257:
258: mask = rti_info[RTAX_NETMASK];
259: if ((sa = rti_info[RTAX_DST]) == NULL)
260: return;
261:
262: p_sockaddr(sa, mask, rtm->rtm_flags, WID_DST(sa->sa_family));
263: p_sockaddr(rti_info[RTAX_GATEWAY], NULL, RTF_HOST,
264: WID_GW(sa->sa_family));
265: p_flags(rtm->rtm_flags, "%-6.6s ");
266: printf("%6d %8ld ", (int)rtm->rtm_rmx.rmx_refcnt,
267: rtm->rtm_rmx.rmx_pksent);
268: if (rtm->rtm_rmx.rmx_mtu)
269: printf("%6ld ", rtm->rtm_rmx.rmx_mtu);
270: else
271: printf("%6s ", "-");
272: putchar((rtm->rtm_rmx.rmx_locks & RTV_MTU) ? 'L' : ' ');
273: printf(" %.16s", if_indextoname(rtm->rtm_index, ifbuf));
274: putchar('\n');
275: }
276:
277: /*
278: * Print a pfkey/encap entry.
279: */
280: void
281: p_pfkentry(struct sadb_msg *msg)
282: {
283: static int old = 0;
284: struct sadb_ext *ext;
285: struct sadb_address *saddr;
286: struct sadb_protocol *sap, *saft;
287: struct sockaddr *sa, *mask;
288: void *headers[SADB_EXT_MAX + 1];
289:
290: if (!old) {
291: pr_rthdr(PF_KEY, 0);
292: old++;
293: }
294:
295: bzero(headers, sizeof(headers));
296: index_pfk(msg, headers);
297:
298: /* These are always set */
299: saddr = headers[SADB_X_EXT_SRC_FLOW];
300: sa = (struct sockaddr *)(saddr + 1);
301: saddr = headers[SADB_X_EXT_SRC_MASK];
302: mask = (struct sockaddr *)(saddr + 1);
303: p_encap(sa, mask, WID_DST(sa->sa_family));
304:
305: /* These are always set, too. */
306: saddr = headers[SADB_X_EXT_DST_FLOW];
307: sa = (struct sockaddr *)(saddr + 1);
308: saddr = headers[SADB_X_EXT_DST_MASK];
309: mask = (struct sockaddr *)(saddr + 1);
310: p_encap(sa, mask, WID_DST(sa->sa_family));
311:
312: /* Bypass and deny flows do not set SADB_EXT_ADDRESS_DST! */
313: sap = headers[SADB_X_EXT_PROTOCOL];
314: saft = headers[SADB_X_EXT_FLOW_TYPE];
315: saddr = headers[SADB_EXT_ADDRESS_DST];
316: if (saddr)
317: sa = (struct sockaddr *)(saddr + 1);
318: else
319: sa = NULL;
320: p_protocol(sap, sa, saft, msg->sadb_msg_satype);
321:
322: printf("\n");
323: }
324:
325: /*
326: * Print address family header before a section of the routing table.
327: */
328: void
329: pr_family(int af)
330: {
331: char *afname;
332:
333: switch (af) {
334: case AF_INET:
335: afname = "Internet";
336: break;
337: case AF_INET6:
338: afname = "Internet6";
339: break;
340: case PF_KEY:
341: afname = "Encap";
342: break;
343: case AF_APPLETALK:
344: afname = "AppleTalk";
345: break;
346: default:
347: afname = NULL;
348: break;
349: }
350: if (afname)
351: printf("\n%s:\n", afname);
352: else
353: printf("\nProtocol Family %d:\n", af);
354: }
355:
356: void
357: p_addr(struct sockaddr *sa, struct sockaddr *mask, int flags)
358: {
359: p_sockaddr(sa, mask, flags, WID_DST(sa->sa_family));
360: }
361:
362: void
363: p_gwaddr(struct sockaddr *sa, int af)
364: {
365: p_sockaddr(sa, 0, RTF_HOST, WID_GW(af));
366: }
367:
368: void
369: p_encap(struct sockaddr *sa, struct sockaddr *mask, int width)
370: {
371: char *cp;
372: unsigned short port;
373:
1.2 todd 374: if (mask)
375: cp = netname(sa, mask);
376: else
377: cp = routename(sa);
1.1 claudio 378: switch (sa->sa_family) {
1.2 todd 379: case AF_INET6:
380: port = ntohs(((struct sockaddr_in6 *)sa)->sin6_port);
1.1 claudio 381: break;
382: default:
383: port = ntohs(((struct sockaddr_in *)sa)->sin_port);
384: break;
385: }
386: if (width < 0)
387: printf("%s", cp);
388: else {
389: if (nflag)
390: printf("%-*s %-5u ", width, cp, port);
391: else
392: printf("%-*.*s %-5u ", width, width, cp, port);
393: }
394: }
395:
396: void
397: p_protocol(struct sadb_protocol *sap, struct sockaddr *sa, struct sadb_protocol
398: *saft, int proto)
399: {
400: printf("%-6u", sap->sadb_protocol_proto);
401: if (sa)
402: p_sockaddr(sa, NULL, 0, -1);
403: else
404: printf("none");
405:
406: switch (proto) {
407: case SADB_SATYPE_ESP:
408: printf("/esp");
409: break;
410: case SADB_SATYPE_AH:
411: printf("/ah");
412: break;
413: case SADB_X_SATYPE_IPCOMP:
414: printf("/ipcomp");
415: break;
416: case SADB_X_SATYPE_IPIP:
417: printf("/ipip");
418: break;
419: default:
420: printf("/<unknown>");
421: }
422:
423: switch(saft->sadb_protocol_proto) {
424: case SADB_X_FLOW_TYPE_USE:
425: printf("/use");
426: break;
427: case SADB_X_FLOW_TYPE_REQUIRE:
428: printf("/require");
429: break;
430: case SADB_X_FLOW_TYPE_ACQUIRE:
431: printf("/acquire");
432: break;
433: case SADB_X_FLOW_TYPE_DENY:
434: printf("/deny");
435: break;
436: case SADB_X_FLOW_TYPE_BYPASS:
437: printf("/bypass");
438: break;
439: case SADB_X_FLOW_TYPE_DONTACQ:
440: printf("/dontacq");
441: break;
442: default:
443: printf("/<unknown type>");
444: }
445:
446: switch(saft->sadb_protocol_direction) {
447: case IPSP_DIRECTION_IN:
448: printf("/in");
449: break;
450: case IPSP_DIRECTION_OUT:
451: printf("/out");
452: break;
453: default:
454: printf("/<unknown>");
455: }
456: }
457:
458: void
459: p_sockaddr(struct sockaddr *sa, struct sockaddr *mask, int flags, int width)
460: {
461: char *cp;
462:
463: switch (sa->sa_family) {
464: case AF_INET6:
465: {
466: struct sockaddr_in6 *sa6 = (struct sockaddr_in6 *)sa;
467: struct in6_addr *in6 = &sa6->sin6_addr;
468:
469: /*
470: * XXX: This is a special workaround for KAME kernels.
471: * sin6_scope_id field of SA should be set in the future.
472: */
473: if (IN6_IS_ADDR_LINKLOCAL(in6) ||
1.3 itojun 474: IN6_IS_ADDR_MC_LINKLOCAL(in6) ||
475: IN6_IS_ADDR_MC_INTFACELOCAL(in6)) {
1.1 claudio 476: /* XXX: override is ok? */
477: sa6->sin6_scope_id = (u_int32_t)ntohs(*(u_short *)
478: &in6->s6_addr[2]);
479: *(u_short *)&in6->s6_addr[2] = 0;
480: }
481: if (flags & RTF_HOST)
482: cp = routename((struct sockaddr *)sa6);
483: else
484: cp = netname((struct sockaddr *)sa6, mask);
485: break;
486: }
487: default:
488: if ((flags & RTF_HOST) || mask == NULL)
489: cp = routename(sa);
490: else
491: cp = netname(sa, mask);
492: break;
493: }
494: if (width < 0)
495: printf("%s", cp);
496: else {
497: if (nflag)
498: printf("%-*s ", width, cp);
499: else
500: printf("%-*.*s ", width, width, cp);
501: }
502: }
503:
504: void
505: p_flags(int f, char *format)
506: {
507: char name[33], *flags;
508: const struct bits *p = bits;
509:
510: for (flags = name; p->b_mask && flags < &name[sizeof(name) - 2]; p++)
511: if (p->b_mask & f)
512: *flags++ = p->b_val;
513: *flags = '\0';
514: printf(format, name);
515: }
516:
517: static char line[MAXHOSTNAMELEN];
518: static char domain[MAXHOSTNAMELEN];
519:
520: char *
521: routename(struct sockaddr *sa)
522: {
523: char *cp = NULL;
524: static int first = 1;
525:
526: if (first) {
527: first = 0;
528: if (gethostname(domain, sizeof(domain)) == 0 &&
529: (cp = strchr(domain, '.')))
530: (void)strlcpy(domain, cp + 1, sizeof(domain));
531: else
532: domain[0] = '\0';
533: cp = NULL;
534: }
535:
536: if (sa->sa_len == 0) {
537: (void)strlcpy(line, "default", sizeof(line));
538: return (line);
539: }
540:
541: switch (sa->sa_family) {
542: case AF_INET:
543: return
544: (routename4(((struct sockaddr_in *)sa)->sin_addr.s_addr));
545:
546: case AF_INET6:
547: {
548: struct sockaddr_in6 sin6;
549:
550: memset(&sin6, 0, sizeof(sin6));
551: memcpy(&sin6, sa, sa->sa_len);
552: sin6.sin6_len = sizeof(struct sockaddr_in6);
553: sin6.sin6_family = AF_INET6;
554: if (sa->sa_len == sizeof(struct sockaddr_in6) &&
555: (IN6_IS_ADDR_LINKLOCAL(&sin6.sin6_addr) ||
1.3 itojun 556: IN6_IS_ADDR_MC_LINKLOCAL(&sin6.sin6_addr) ||
557: IN6_IS_ADDR_MC_INTFACELOCAL(&sin6.sin6_addr)) &&
1.1 claudio 558: sin6.sin6_scope_id == 0) {
559: sin6.sin6_scope_id =
560: ntohs(*(u_int16_t *)&sin6.sin6_addr.s6_addr[2]);
561: sin6.sin6_addr.s6_addr[2] = 0;
562: sin6.sin6_addr.s6_addr[3] = 0;
563: }
564: return (routename6(&sin6));
565: }
566:
567: case AF_LINK:
568: return (link_print(sa));
569:
570: case AF_UNSPEC:
571: if (sa->sa_len == sizeof(struct sockaddr_rtlabel)) {
572: static char name[RTLABEL_LEN];
573: struct sockaddr_rtlabel *sr;
574:
575: sr = (struct sockaddr_rtlabel *)sa;
576: strlcpy(name, sr->sr_label, sizeof(name));
577: return (name);
578: }
579: /* FALLTHROUGH */
580: default:
581: (void)snprintf(line, sizeof(line), "(%d) %s",
582: sa->sa_family, any_ntoa(sa));
583: break;
584: }
585: return (line);
586: }
587:
588: char *
589: routename4(in_addr_t in)
590: {
591: char *cp = NULL;
592: struct in_addr ina;
593: struct hostent *hp;
594:
595: if (in == INADDR_ANY)
596: cp = "default";
597: if (!cp && !nflag) {
598: if ((hp = gethostbyaddr((char *)&in,
599: sizeof(in), AF_INET)) != NULL) {
600: if ((cp = strchr(hp->h_name, '.')) &&
601: !strcmp(cp + 1, domain))
602: *cp = '\0';
603: cp = hp->h_name;
604: }
605: }
606: ina.s_addr = in;
607: strlcpy(line, cp ? cp : inet_ntoa(ina), sizeof(line));
608:
609: return (line);
610: }
611:
612: char *
613: routename6(struct sockaddr_in6 *sin6)
614: {
615: int niflags = 0;
616:
617: if (nflag)
618: niflags |= NI_NUMERICHOST;
619: else
620: niflags |= NI_NOFQDN;
621:
622: if (getnameinfo((struct sockaddr *)sin6, sin6->sin6_len,
623: line, sizeof(line), NULL, 0, niflags) != 0)
624: strncpy(line, "invalid", sizeof(line));
625:
626: return (line);
627: }
628:
629: /*
630: * Return the name of the network whose address is given.
631: * The address is assumed to be that of a net or subnet, not a host.
632: */
633: char *
634: netname4(in_addr_t in, in_addr_t mask)
635: {
636: char *cp = NULL;
637: struct netent *np = NULL;
638: int mbits;
639:
640: in = ntohl(in);
641: mask = ntohl(mask);
642: if (!nflag && in != INADDR_ANY) {
643: if ((np = getnetbyaddr(in, AF_INET)) != NULL)
644: cp = np->n_name;
645: }
646: if (in == INADDR_ANY)
647: cp = "default";
648: mbits = mask ? 33 - ffs(mask) : 0;
649: if (cp)
650: strlcpy(line, cp, sizeof(line));
651: #define C(x) ((x) & 0xff)
652: else if (mbits < 9)
653: snprintf(line, sizeof(line), "%u/%d", C(in >> 24), mbits);
654: else if (mbits < 17)
655: snprintf(line, sizeof(line), "%u.%u/%d",
656: C(in >> 24) , C(in >> 16), mbits);
657: else if (mbits < 25)
658: snprintf(line, sizeof(line), "%u.%u.%u/%d",
659: C(in >> 24), C(in >> 16), C(in >> 8), mbits);
660: else
661: snprintf(line, sizeof(line), "%u.%u.%u.%u/%d", C(in >> 24),
662: C(in >> 16), C(in >> 8), C(in), mbits);
663: #undef C
664: return (line);
665: }
666:
667: char *
668: netname6(struct sockaddr_in6 *sa6, struct sockaddr_in6 *mask)
669: {
670: struct sockaddr_in6 sin6;
671: u_char *p;
672: int masklen, final = 0, illegal = 0;
673: int i, lim, flag, error;
674: char hbuf[NI_MAXHOST];
675:
676: sin6 = *sa6;
677:
678: flag = 0;
679: masklen = 0;
680: if (mask) {
681: lim = mask->sin6_len - offsetof(struct sockaddr_in6, sin6_addr);
1.4 claudio 682: lim = lim < (int)sizeof(struct in6_addr) ?
1.1 claudio 683: lim : sizeof(struct in6_addr);
684: for (p = (u_char *)&mask->sin6_addr, i = 0; i < lim; p++) {
685: if (final && *p) {
686: illegal++;
687: sin6.sin6_addr.s6_addr[i++] = 0x00;
688: continue;
689: }
690:
691: switch (*p & 0xff) {
692: case 0xff:
693: masklen += 8;
694: break;
695: case 0xfe:
696: masklen += 7;
697: final++;
698: break;
699: case 0xfc:
700: masklen += 6;
701: final++;
702: break;
703: case 0xf8:
704: masklen += 5;
705: final++;
706: break;
707: case 0xf0:
708: masklen += 4;
709: final++;
710: break;
711: case 0xe0:
712: masklen += 3;
713: final++;
714: break;
715: case 0xc0:
716: masklen += 2;
717: final++;
718: break;
719: case 0x80:
720: masklen += 1;
721: final++;
722: break;
723: case 0x00:
724: final++;
725: break;
726: default:
727: final++;
728: illegal++;
729: break;
730: }
731:
732: if (!illegal)
733: sin6.sin6_addr.s6_addr[i++] &= *p;
734: else
735: sin6.sin6_addr.s6_addr[i++] = 0x00;
736: }
737: while (i < sizeof(struct in6_addr))
738: sin6.sin6_addr.s6_addr[i++] = 0x00;
739: } else
740: masklen = 128;
741:
742: if (masklen == 0 && IN6_IS_ADDR_UNSPECIFIED(&sin6.sin6_addr))
743: return ("default");
744:
745: if (illegal)
746: warnx("illegal prefixlen");
747:
748: if (nflag)
749: flag |= NI_NUMERICHOST;
750: error = getnameinfo((struct sockaddr *)&sin6, sin6.sin6_len,
751: hbuf, sizeof(hbuf), NULL, 0, flag);
752: if (error)
753: snprintf(hbuf, sizeof(hbuf), "invalid");
754:
755: snprintf(line, sizeof(line), "%s/%d", hbuf, masklen);
756: return (line);
757: }
758:
759: /*
760: * Return the name of the network whose address is given.
761: * The address is assumed to be that of a net or subnet, not a host.
762: */
763: char *
764: netname(struct sockaddr *sa, struct sockaddr *mask)
765: {
766: switch (sa->sa_family) {
767:
768: case AF_INET:
769: return netname4(((struct sockaddr_in *)sa)->sin_addr.s_addr,
770: ((struct sockaddr_in *)mask)->sin_addr.s_addr);
771: case AF_INET6:
772: return netname6((struct sockaddr_in6 *)sa,
773: (struct sockaddr_in6 *)mask);
774: case AF_LINK:
775: return (link_print(sa));
776: default:
777: snprintf(line, sizeof(line), "af %d: %s",
778: sa->sa_family, any_ntoa(sa));
779: break;
780: }
781: return (line);
782: }
783:
784: static const char hexlist[] = "0123456789abcdef";
785:
786: char *
787: any_ntoa(const struct sockaddr *sa)
788: {
789: static char obuf[240];
790: const char *in = sa->sa_data;
791: char *out = obuf;
792: int len = sa->sa_len - offsetof(struct sockaddr, sa_data);
793:
794: *out++ = 'Q';
795: do {
796: *out++ = hexlist[(*in >> 4) & 15];
797: *out++ = hexlist[(*in++) & 15];
798: *out++ = '.';
799: } while (--len > 0 && (out + 3) < &obuf[sizeof(obuf) - 1]);
800: out[-1] = '\0';
801: return (obuf);
802: }
803:
804: char *
805: link_print(struct sockaddr *sa)
806: {
807: struct sockaddr_dl *sdl = (struct sockaddr_dl *)sa;
808: u_char *lla = (u_char *)sdl->sdl_data + sdl->sdl_nlen;
809:
810: if (sdl->sdl_nlen == 0 && sdl->sdl_alen == 0 &&
811: sdl->sdl_slen == 0) {
812: (void)snprintf(line, sizeof(line), "link#%d", sdl->sdl_index);
813: return (line);
814: }
815: switch (sdl->sdl_type) {
816: case IFT_ETHER:
817: case IFT_CARP:
818: return (ether_ntoa((struct ether_addr *)lla));
819: default:
820: return (link_ntoa(sdl));
821: }
822: }
823:
824: void
825: index_pfk(struct sadb_msg *msg, void **headers)
826: {
827: struct sadb_ext *ext;
828:
829: for (ext = (struct sadb_ext *)(msg + 1);
830: (size_t)((u_int8_t *)ext - (u_int8_t *)msg) <
831: msg->sadb_msg_len * PFKEYV2_CHUNK && ext->sadb_ext_len > 0;
832: ext = (struct sadb_ext *)((u_int8_t *)ext +
833: ext->sadb_ext_len * PFKEYV2_CHUNK)) {
834: switch (ext->sadb_ext_type) {
835: case SADB_EXT_ADDRESS_SRC:
836: headers[SADB_EXT_ADDRESS_SRC] = (void *)ext;
837: break;
838: case SADB_EXT_ADDRESS_DST:
839: headers[SADB_EXT_ADDRESS_DST] = (void *)ext;
840: break;
841: case SADB_X_EXT_PROTOCOL:
842: headers[SADB_X_EXT_PROTOCOL] = (void *)ext;
843: break;
844: case SADB_X_EXT_SRC_FLOW:
845: headers[SADB_X_EXT_SRC_FLOW] = (void *)ext;
846: break;
847: case SADB_X_EXT_DST_FLOW:
848: headers[SADB_X_EXT_DST_FLOW] = (void *)ext;
849: break;
850: case SADB_X_EXT_SRC_MASK:
851: headers[SADB_X_EXT_SRC_MASK] = (void *)ext;
852: break;
853: case SADB_X_EXT_DST_MASK:
854: headers[SADB_X_EXT_DST_MASK] = (void *)ext;
855: break;
856: case SADB_X_EXT_FLOW_TYPE:
857: headers[SADB_X_EXT_FLOW_TYPE] = (void *)ext;
858: default:
859: /* Ignore. */
860: break;
861: }
862: }
863: }