diff options
Diffstat (limited to 'usr.bin/netstat/show.c')
-rw-r--r-- | usr.bin/netstat/show.c | 918 |
1 files changed, 918 insertions, 0 deletions
diff --git a/usr.bin/netstat/show.c b/usr.bin/netstat/show.c new file mode 100644 index 00000000000..cbdd6c97b6c --- /dev/null +++ b/usr.bin/netstat/show.c @@ -0,0 +1,918 @@ +/* $OpenBSD: show.c,v 1.1 2006/05/27 19:16:37 claudio Exp $ */ +/* $NetBSD: show.c,v 1.1 1996/11/15 18:01:41 gwr Exp $ */ + +/* + * Copyright (c) 1983, 1988, 1993 + * The Regents of the University of California. All rights reserved. + * + * Redistribution and use in source and binary forms, with or without + * modification, are permitted provided that the following conditions + * are met: + * 1. Redistributions of source code must retain the above copyright + * notice, this list of conditions and the following disclaimer. + * 2. Redistributions in binary form must reproduce the above copyright + * notice, this list of conditions and the following disclaimer in the + * documentation and/or other materials provided with the distribution. + * 3. Neither the name of the University nor the names of its contributors + * may be used to endorse or promote products derived from this software + * without specific prior written permission. + * + * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND + * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE + * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE + * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE + * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL + * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS + * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) + * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT + * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY + * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF + * SUCH DAMAGE. + */ + +#include <sys/param.h> +#include <sys/protosw.h> +#include <sys/socket.h> +#include <sys/mbuf.h> +#include <sys/sysctl.h> + +#include <net/if.h> +#include <net/if_dl.h> +#include <net/if_types.h> +#include <net/pfkeyv2.h> +#include <net/route.h> +#include <netinet/in.h> +#include <netipx/ipx.h> +#include <netinet/if_ether.h> +#include <netinet/ip_ipsp.h> +#include <arpa/inet.h> + +#include <err.h> +#include <errno.h> +#include <netdb.h> +#include <stdio.h> +#include <stddef.h> +#include <stdlib.h> +#include <string.h> +#include <unistd.h> + +#include "netstat.h" + +char *any_ntoa(const struct sockaddr *); +char *link_print(struct sockaddr *); + +#define ROUNDUP(a) \ + ((a) > 0 ? (1 + (((a) - 1) | (sizeof(long) - 1))) : sizeof(long)) +#define ADVANCE(x, n) (x += ROUNDUP((n)->sa_len)) + +#define PFKEYV2_CHUNK sizeof(u_int64_t) + +/* + * Definitions for showing gateway flags. + */ +struct bits { + int b_mask; + char b_val; +}; +static const struct bits bits[] = { + { RTF_UP, 'U' }, + { RTF_GATEWAY, 'G' }, + { RTF_HOST, 'H' }, + { RTF_REJECT, 'R' }, + { RTF_BLACKHOLE, 'B' }, + { RTF_DYNAMIC, 'D' }, + { RTF_MODIFIED, 'M' }, + { RTF_DONE, 'd' }, /* Completed -- for routing messages only */ + { RTF_MASK, 'm' }, /* Mask Present -- for routing messages only */ + { RTF_CLONING, 'C' }, + { RTF_XRESOLVE, 'X' }, + { RTF_LLINFO, 'L' }, + { RTF_STATIC, 'S' }, + { RTF_PROTO1, '1' }, + { RTF_PROTO2, '2' }, + { RTF_PROTO3, '3' }, + { RTF_CLONED, 'c' }, + { RTF_JUMBO, 'J' }, + { 0 } +}; + +void pr_rthdr(int, int); +void p_rtentry(struct rt_msghdr *); +void p_pfkentry(struct sadb_msg *); +void pr_family(int); +void p_encap(struct sockaddr *, struct sockaddr *, int); +void p_protocol(struct sadb_protocol *, struct sockaddr *, struct + sadb_protocol *, int); +void p_sockaddr(struct sockaddr *, struct sockaddr *, int, int); +void p_flags(int, char *); +char *routename4(in_addr_t); +char *routename6(struct sockaddr_in6 *); +void index_pfk(struct sadb_msg *, void **); + +/* + * Print routing tables. + */ +void +p_rttables(int af) +{ + struct rt_msghdr *rtm; + struct sadb_msg *msg; + char *buf = NULL, *next, *lim = NULL; + size_t needed; + int mib[6]; + struct sockaddr *sa; + + mib[0] = CTL_NET; + mib[1] = PF_ROUTE; + mib[2] = 0; + mib[3] = af; + mib[4] = NET_RT_DUMP; + mib[5] = 0; + if (sysctl(mib, 6, NULL, &needed, NULL, 0) < 0) + err(1, "route-sysctl-estimate"); + if (needed > 0) { + if ((buf = malloc(needed)) == 0) + err(1, NULL); + if (sysctl(mib, 6, buf, &needed, NULL, 0) < 0) + err(1, "sysctl of routing table"); + lim = buf + needed; + } + + printf("Routing tables\n"); + + if (buf) { + for (next = buf; next < lim; next += rtm->rtm_msglen) { + rtm = (struct rt_msghdr *)next; + sa = (struct sockaddr *)(rtm + 1); + if (af != AF_UNSPEC && sa->sa_family != af) + continue; + p_rtentry(rtm); + } + free(buf); + buf = NULL; + } + + if (af != 0 && af != PF_KEY) + return; + + mib[0] = CTL_NET; + mib[1] = PF_KEY; + mib[2] = PF_KEY_V2; + mib[3] = NET_KEY_SPD_DUMP; + mib[4] = mib[5] = 0; + + if (sysctl(mib, 4, NULL, &needed, NULL, 0) == -1) { + if (errno == ENOPROTOOPT) + return; + err(1, "spd-sysctl-estimate"); + } + if (needed > 0) { + if ((buf = malloc(needed)) == 0) + err(1, NULL); + if (sysctl(mib, 4, buf, &needed, NULL, 0) == -1) + err(1,"sysctl of spd"); + lim = buf + needed; + } + + if (buf) { + printf("\nEncap:\n"); + + for (next = buf; next < lim; next += msg->sadb_msg_len * + PFKEYV2_CHUNK) { + msg = (struct sadb_msg *)next; + if (msg->sadb_msg_len == 0) + break; + p_pfkentry(msg); + } + free(buf); + buf = NULL; + } +} + +/* + * column widths; each followed by one space + * width of destination/gateway column + * strlen("fe80::aaaa:bbbb:cccc:dddd@gif0") == 30, strlen("/128") == 4 + */ +#define WID_DST(af) ((af) == AF_INET6 ? (nflag ? 34 : 18) : 18) +#define WID_GW(af) ((af) == AF_INET6 ? (nflag ? 30 : 18) : 18) + +/* + * Print header for routing table columns. + */ +void +pr_rthdr(int af, int Aflag) +{ + if (Aflag) + printf("%-*.*s ", PLEN, PLEN, "Address"); + if (af != PF_KEY) + printf("%-*.*s %-*.*s %-6.6s %6.6s %8.8s %6.6s %s\n", + WID_DST(af), WID_DST(af), "Destination", + WID_GW(af), WID_GW(af), "Gateway", + "Flags", "Refs", "Use", "Mtu", "Interface"); + else + printf("%-18s %-5s %-18s %-5s %-5s %-22s\n", + "Source", "Port", "Destination", + "Port", "Proto", "SA(Address/Proto/Type/Direction)"); +} + +static void +get_rtaddrs(int addrs, struct sockaddr *sa, struct sockaddr **rti_info) +{ + int i; + + for (i = 0; i < RTAX_MAX; i++) { + if (addrs & (1 << i)) { + rti_info[i] = sa; + sa = (struct sockaddr *)((char *)(sa) + + ROUNDUP(sa->sa_len)); + } else + rti_info[i] = NULL; + } +} + +/* + * Print a routing table entry. + */ +void +p_rtentry(struct rt_msghdr *rtm) +{ + static int old_af = -1; + struct sockaddr *sa = (struct sockaddr *)(rtm + 1); + struct sockaddr *mask, *rti_info[RTAX_MAX]; + char ifbuf[IF_NAMESIZE]; + + + if (sa->sa_family == AF_KEY) + return; + + if (old_af != sa->sa_family) { + old_af = sa->sa_family; + pr_family(sa->sa_family); + pr_rthdr(sa->sa_family, 0); + } + get_rtaddrs(rtm->rtm_addrs, sa, rti_info); + + mask = rti_info[RTAX_NETMASK]; + if ((sa = rti_info[RTAX_DST]) == NULL) + return; + + p_sockaddr(sa, mask, rtm->rtm_flags, WID_DST(sa->sa_family)); + p_sockaddr(rti_info[RTAX_GATEWAY], NULL, RTF_HOST, + WID_GW(sa->sa_family)); + p_flags(rtm->rtm_flags, "%-6.6s "); + printf("%6d %8ld ", (int)rtm->rtm_rmx.rmx_refcnt, + rtm->rtm_rmx.rmx_pksent); + if (rtm->rtm_rmx.rmx_mtu) + printf("%6ld ", rtm->rtm_rmx.rmx_mtu); + else + printf("%6s ", "-"); + putchar((rtm->rtm_rmx.rmx_locks & RTV_MTU) ? 'L' : ' '); + printf(" %.16s", if_indextoname(rtm->rtm_index, ifbuf)); + putchar('\n'); +} + +/* + * Print a pfkey/encap entry. + */ +void +p_pfkentry(struct sadb_msg *msg) +{ + static int old = 0; + struct sadb_ext *ext; + struct sadb_address *saddr; + struct sadb_protocol *sap, *saft; + struct sockaddr *sa, *mask; + void *headers[SADB_EXT_MAX + 1]; + + if (!old) { + pr_rthdr(PF_KEY, 0); + old++; + } + + bzero(headers, sizeof(headers)); + index_pfk(msg, headers); + + /* These are always set */ + saddr = headers[SADB_X_EXT_SRC_FLOW]; + sa = (struct sockaddr *)(saddr + 1); + saddr = headers[SADB_X_EXT_SRC_MASK]; + mask = (struct sockaddr *)(saddr + 1); + p_encap(sa, mask, WID_DST(sa->sa_family)); + + /* These are always set, too. */ + saddr = headers[SADB_X_EXT_DST_FLOW]; + sa = (struct sockaddr *)(saddr + 1); + saddr = headers[SADB_X_EXT_DST_MASK]; + mask = (struct sockaddr *)(saddr + 1); + p_encap(sa, mask, WID_DST(sa->sa_family)); + + /* Bypass and deny flows do not set SADB_EXT_ADDRESS_DST! */ + sap = headers[SADB_X_EXT_PROTOCOL]; + saft = headers[SADB_X_EXT_FLOW_TYPE]; + saddr = headers[SADB_EXT_ADDRESS_DST]; + if (saddr) + sa = (struct sockaddr *)(saddr + 1); + else + sa = NULL; + p_protocol(sap, sa, saft, msg->sadb_msg_satype); + + printf("\n"); +} + +/* + * Print address family header before a section of the routing table. + */ +void +pr_family(int af) +{ + char *afname; + + switch (af) { + case AF_INET: + afname = "Internet"; + break; + case AF_INET6: + afname = "Internet6"; + break; + case AF_IPX: + afname = "IPX"; + break; + case PF_KEY: + afname = "Encap"; + break; + case AF_APPLETALK: + afname = "AppleTalk"; + break; + default: + afname = NULL; + break; + } + if (afname) + printf("\n%s:\n", afname); + else + printf("\nProtocol Family %d:\n", af); +} + +void +p_addr(struct sockaddr *sa, struct sockaddr *mask, int flags) +{ + p_sockaddr(sa, mask, flags, WID_DST(sa->sa_family)); +} + +void +p_gwaddr(struct sockaddr *sa, int af) +{ + p_sockaddr(sa, 0, RTF_HOST, WID_GW(af)); +} + +void +p_encap(struct sockaddr *sa, struct sockaddr *mask, int width) +{ + char *cp; + unsigned short port; + + switch (sa->sa_family) { + case AF_INET6: { + break; + } + default: + if (mask) + cp = netname(sa, mask); + else + cp = routename(sa); + port = ntohs(((struct sockaddr_in *)sa)->sin_port); + break; + } + if (width < 0) + printf("%s", cp); + else { + if (nflag) + printf("%-*s %-5u ", width, cp, port); + else + printf("%-*.*s %-5u ", width, width, cp, port); + } +} + +void +p_protocol(struct sadb_protocol *sap, struct sockaddr *sa, struct sadb_protocol + *saft, int proto) +{ + printf("%-6u", sap->sadb_protocol_proto); + if (sa) + p_sockaddr(sa, NULL, 0, -1); + else + printf("none"); + + switch (proto) { + case SADB_SATYPE_ESP: + printf("/esp"); + break; + case SADB_SATYPE_AH: + printf("/ah"); + break; + case SADB_X_SATYPE_IPCOMP: + printf("/ipcomp"); + break; + case SADB_X_SATYPE_IPIP: + printf("/ipip"); + break; + default: + printf("/<unknown>"); + } + + switch(saft->sadb_protocol_proto) { + case SADB_X_FLOW_TYPE_USE: + printf("/use"); + break; + case SADB_X_FLOW_TYPE_REQUIRE: + printf("/require"); + break; + case SADB_X_FLOW_TYPE_ACQUIRE: + printf("/acquire"); + break; + case SADB_X_FLOW_TYPE_DENY: + printf("/deny"); + break; + case SADB_X_FLOW_TYPE_BYPASS: + printf("/bypass"); + break; + case SADB_X_FLOW_TYPE_DONTACQ: + printf("/dontacq"); + break; + default: + printf("/<unknown type>"); + } + + switch(saft->sadb_protocol_direction) { + case IPSP_DIRECTION_IN: + printf("/in"); + break; + case IPSP_DIRECTION_OUT: + printf("/out"); + break; + default: + printf("/<unknown>"); + } +} + +void +p_sockaddr(struct sockaddr *sa, struct sockaddr *mask, int flags, int width) +{ + char *cp; + + switch (sa->sa_family) { + case AF_INET6: + { + struct sockaddr_in6 *sa6 = (struct sockaddr_in6 *)sa; + struct in6_addr *in6 = &sa6->sin6_addr; + + /* + * XXX: This is a special workaround for KAME kernels. + * sin6_scope_id field of SA should be set in the future. + */ + if (IN6_IS_ADDR_LINKLOCAL(in6) || + IN6_IS_ADDR_MC_LINKLOCAL(in6)) { + /* XXX: override is ok? */ + sa6->sin6_scope_id = (u_int32_t)ntohs(*(u_short *) + &in6->s6_addr[2]); + *(u_short *)&in6->s6_addr[2] = 0; + } + if (flags & RTF_HOST) + cp = routename((struct sockaddr *)sa6); + else + cp = netname((struct sockaddr *)sa6, mask); + break; + } + default: + if ((flags & RTF_HOST) || mask == NULL) + cp = routename(sa); + else + cp = netname(sa, mask); + break; + } + if (width < 0) + printf("%s", cp); + else { + if (nflag) + printf("%-*s ", width, cp); + else + printf("%-*.*s ", width, width, cp); + } +} + +void +p_flags(int f, char *format) +{ + char name[33], *flags; + const struct bits *p = bits; + + for (flags = name; p->b_mask && flags < &name[sizeof(name) - 2]; p++) + if (p->b_mask & f) + *flags++ = p->b_val; + *flags = '\0'; + printf(format, name); +} + +static char line[MAXHOSTNAMELEN]; +static char domain[MAXHOSTNAMELEN]; + +char * +routename(struct sockaddr *sa) +{ + char *cp = NULL; + static int first = 1; + + if (first) { + first = 0; + if (gethostname(domain, sizeof(domain)) == 0 && + (cp = strchr(domain, '.'))) + (void)strlcpy(domain, cp + 1, sizeof(domain)); + else + domain[0] = '\0'; + cp = NULL; + } + + if (sa->sa_len == 0) { + (void)strlcpy(line, "default", sizeof(line)); + return (line); + } + + switch (sa->sa_family) { + case AF_INET: + return + (routename4(((struct sockaddr_in *)sa)->sin_addr.s_addr)); + + case AF_INET6: + { + struct sockaddr_in6 sin6; + + memset(&sin6, 0, sizeof(sin6)); + memcpy(&sin6, sa, sa->sa_len); + sin6.sin6_len = sizeof(struct sockaddr_in6); + sin6.sin6_family = AF_INET6; + if (sa->sa_len == sizeof(struct sockaddr_in6) && + (IN6_IS_ADDR_LINKLOCAL(&sin6.sin6_addr) || + IN6_IS_ADDR_MC_LINKLOCAL(&sin6.sin6_addr)) && + sin6.sin6_scope_id == 0) { + sin6.sin6_scope_id = + ntohs(*(u_int16_t *)&sin6.sin6_addr.s6_addr[2]); + sin6.sin6_addr.s6_addr[2] = 0; + sin6.sin6_addr.s6_addr[3] = 0; + } + return (routename6(&sin6)); + } + + case AF_IPX: + return (ipx_print(sa)); + + case AF_LINK: + return (link_print(sa)); + + case AF_UNSPEC: + if (sa->sa_len == sizeof(struct sockaddr_rtlabel)) { + static char name[RTLABEL_LEN]; + struct sockaddr_rtlabel *sr; + + sr = (struct sockaddr_rtlabel *)sa; + strlcpy(name, sr->sr_label, sizeof(name)); + return (name); + } + /* FALLTHROUGH */ + default: + (void)snprintf(line, sizeof(line), "(%d) %s", + sa->sa_family, any_ntoa(sa)); + break; + } + return (line); +} + +char * +routename4(in_addr_t in) +{ + char *cp = NULL; + struct in_addr ina; + struct hostent *hp; + + if (in == INADDR_ANY) + cp = "default"; + if (!cp && !nflag) { + if ((hp = gethostbyaddr((char *)&in, + sizeof(in), AF_INET)) != NULL) { + if ((cp = strchr(hp->h_name, '.')) && + !strcmp(cp + 1, domain)) + *cp = '\0'; + cp = hp->h_name; + } + } + ina.s_addr = in; + strlcpy(line, cp ? cp : inet_ntoa(ina), sizeof(line)); + + return (line); +} + +char * +routename6(struct sockaddr_in6 *sin6) +{ + int niflags = 0; + + if (nflag) + niflags |= NI_NUMERICHOST; + else + niflags |= NI_NOFQDN; + + if (getnameinfo((struct sockaddr *)sin6, sin6->sin6_len, + line, sizeof(line), NULL, 0, niflags) != 0) + strncpy(line, "invalid", sizeof(line)); + + return (line); +} + +/* + * Return the name of the network whose address is given. + * The address is assumed to be that of a net or subnet, not a host. + */ +char * +netname4(in_addr_t in, in_addr_t mask) +{ + char *cp = NULL; + struct netent *np = NULL; + int mbits; + + in = ntohl(in); + mask = ntohl(mask); + if (!nflag && in != INADDR_ANY) { + if ((np = getnetbyaddr(in, AF_INET)) != NULL) + cp = np->n_name; + } + if (in == INADDR_ANY) + cp = "default"; + mbits = mask ? 33 - ffs(mask) : 0; + if (cp) + strlcpy(line, cp, sizeof(line)); +#define C(x) ((x) & 0xff) + else if (mbits < 9) + snprintf(line, sizeof(line), "%u/%d", C(in >> 24), mbits); + else if (mbits < 17) + snprintf(line, sizeof(line), "%u.%u/%d", + C(in >> 24) , C(in >> 16), mbits); + else if (mbits < 25) + snprintf(line, sizeof(line), "%u.%u.%u/%d", + C(in >> 24), C(in >> 16), C(in >> 8), mbits); + else + snprintf(line, sizeof(line), "%u.%u.%u.%u/%d", C(in >> 24), + C(in >> 16), C(in >> 8), C(in), mbits); +#undef C + return (line); +} + +char * +netname6(struct sockaddr_in6 *sa6, struct sockaddr_in6 *mask) +{ + struct sockaddr_in6 sin6; + u_char *p; + int masklen, final = 0, illegal = 0; + int i, lim, flag, error; + char hbuf[NI_MAXHOST]; + + sin6 = *sa6; + + flag = 0; + masklen = 0; + if (mask) { + lim = mask->sin6_len - offsetof(struct sockaddr_in6, sin6_addr); + lim = lim < sizeof(struct in6_addr) ? + lim : sizeof(struct in6_addr); + for (p = (u_char *)&mask->sin6_addr, i = 0; i < lim; p++) { + if (final && *p) { + illegal++; + sin6.sin6_addr.s6_addr[i++] = 0x00; + continue; + } + + switch (*p & 0xff) { + case 0xff: + masklen += 8; + break; + case 0xfe: + masklen += 7; + final++; + break; + case 0xfc: + masklen += 6; + final++; + break; + case 0xf8: + masklen += 5; + final++; + break; + case 0xf0: + masklen += 4; + final++; + break; + case 0xe0: + masklen += 3; + final++; + break; + case 0xc0: + masklen += 2; + final++; + break; + case 0x80: + masklen += 1; + final++; + break; + case 0x00: + final++; + break; + default: + final++; + illegal++; + break; + } + + if (!illegal) + sin6.sin6_addr.s6_addr[i++] &= *p; + else + sin6.sin6_addr.s6_addr[i++] = 0x00; + } + while (i < sizeof(struct in6_addr)) + sin6.sin6_addr.s6_addr[i++] = 0x00; + } else + masklen = 128; + + if (masklen == 0 && IN6_IS_ADDR_UNSPECIFIED(&sin6.sin6_addr)) + return ("default"); + + if (illegal) + warnx("illegal prefixlen"); + + if (nflag) + flag |= NI_NUMERICHOST; + error = getnameinfo((struct sockaddr *)&sin6, sin6.sin6_len, + hbuf, sizeof(hbuf), NULL, 0, flag); + if (error) + snprintf(hbuf, sizeof(hbuf), "invalid"); + + snprintf(line, sizeof(line), "%s/%d", hbuf, masklen); + return (line); +} + +/* + * Return the name of the network whose address is given. + * The address is assumed to be that of a net or subnet, not a host. + */ +char * +netname(struct sockaddr *sa, struct sockaddr *mask) +{ + switch (sa->sa_family) { + + case AF_INET: + return netname4(((struct sockaddr_in *)sa)->sin_addr.s_addr, + ((struct sockaddr_in *)mask)->sin_addr.s_addr); + case AF_INET6: + return netname6((struct sockaddr_in6 *)sa, + (struct sockaddr_in6 *)mask); + case AF_IPX: + return (ipx_print(sa)); + case AF_LINK: + return (link_print(sa)); + default: + snprintf(line, sizeof(line), "af %d: %s", + sa->sa_family, any_ntoa(sa)); + break; + } + return (line); +} + +static const char hexlist[] = "0123456789abcdef"; + +char * +any_ntoa(const struct sockaddr *sa) +{ + static char obuf[240]; + const char *in = sa->sa_data; + char *out = obuf; + int len = sa->sa_len - offsetof(struct sockaddr, sa_data); + + *out++ = 'Q'; + do { + *out++ = hexlist[(*in >> 4) & 15]; + *out++ = hexlist[(*in++) & 15]; + *out++ = '.'; + } while (--len > 0 && (out + 3) < &obuf[sizeof(obuf) - 1]); + out[-1] = '\0'; + return (obuf); +} + +short ipx_nullh[] = {0,0,0}; +short ipx_bh[] = {-1,-1,-1}; + +char * +ipx_print(struct sockaddr *sa) +{ + struct sockaddr_ipx *sipx = (struct sockaddr_ipx *)sa; + struct ipx_addr work; + union { + union ipx_net net_e; + u_int32_t long_e; + } net; + u_short port; + static char mybuf[50+MAXHOSTNAMELEN], cport[10], chost[25]; + char *host = ""; + char *p; + u_char *q; + + work = sipx->sipx_addr; + port = ntohs(work.ipx_port); + work.ipx_port = 0; + net.net_e = work.ipx_net; + if (ipx_nullhost(work) && net.long_e == 0) { + if (!port) + return ("*.*"); + (void)snprintf(mybuf, sizeof(mybuf), "*.0x%XH", port); + return (mybuf); + } + + if (memcmp(ipx_bh, work.ipx_host.c_host, 6) == 0) + host = "any"; + else if (memcmp(ipx_nullh, work.ipx_host.c_host, 6) == 0) + host = "*"; + else { + q = work.ipx_host.c_host; + (void)snprintf(chost, sizeof(chost), "%02X%02X%02X%02X%02X%02XH", + q[0], q[1], q[2], q[3], q[4], q[5]); + for (p = chost; *p == '0' && p < chost + 12; p++) + /* void */; + host = p; + } + if (port) + (void)snprintf(cport, sizeof(cport), ".%XH", htons(port)); + else + *cport = '\0'; + + (void)snprintf(mybuf, sizeof(mybuf), "%XH.%s%s", + ntohl(net.long_e), host, cport); + return (mybuf); +} + +char * +link_print(struct sockaddr *sa) +{ + struct sockaddr_dl *sdl = (struct sockaddr_dl *)sa; + u_char *lla = (u_char *)sdl->sdl_data + sdl->sdl_nlen; + + if (sdl->sdl_nlen == 0 && sdl->sdl_alen == 0 && + sdl->sdl_slen == 0) { + (void)snprintf(line, sizeof(line), "link#%d", sdl->sdl_index); + return (line); + } + switch (sdl->sdl_type) { + case IFT_ETHER: + case IFT_CARP: + return (ether_ntoa((struct ether_addr *)lla)); + default: + return (link_ntoa(sdl)); + } +} + +void +index_pfk(struct sadb_msg *msg, void **headers) +{ + struct sadb_ext *ext; + + for (ext = (struct sadb_ext *)(msg + 1); + (size_t)((u_int8_t *)ext - (u_int8_t *)msg) < + msg->sadb_msg_len * PFKEYV2_CHUNK && ext->sadb_ext_len > 0; + ext = (struct sadb_ext *)((u_int8_t *)ext + + ext->sadb_ext_len * PFKEYV2_CHUNK)) { + switch (ext->sadb_ext_type) { + case SADB_EXT_ADDRESS_SRC: + headers[SADB_EXT_ADDRESS_SRC] = (void *)ext; + break; + case SADB_EXT_ADDRESS_DST: + headers[SADB_EXT_ADDRESS_DST] = (void *)ext; + break; + case SADB_X_EXT_PROTOCOL: + headers[SADB_X_EXT_PROTOCOL] = (void *)ext; + break; + case SADB_X_EXT_SRC_FLOW: + headers[SADB_X_EXT_SRC_FLOW] = (void *)ext; + break; + case SADB_X_EXT_DST_FLOW: + headers[SADB_X_EXT_DST_FLOW] = (void *)ext; + break; + case SADB_X_EXT_SRC_MASK: + headers[SADB_X_EXT_SRC_MASK] = (void *)ext; + break; + case SADB_X_EXT_DST_MASK: + headers[SADB_X_EXT_DST_MASK] = (void *)ext; + break; + case SADB_X_EXT_FLOW_TYPE: + headers[SADB_X_EXT_FLOW_TYPE] = (void *)ext; + default: + /* Ignore. */ + break; + } + } +} |