2 * Copyright (c) 1983, 1988, 1993
3 * The Regents of the University of California. All rights reserved.
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
8 * 1. Redistributions of source code must retain the above copyright
9 * notice, this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright
11 * notice, this list of conditions and the following disclaimer in the
12 * documentation and/or other materials provided with the distribution.
13 * 3. All advertising materials mentioning features or use of this software
14 * must display the following acknowledgement:
15 * This product includes software developed by the University of
16 * California, Berkeley and its contributors.
17 * 4. Neither the name of the University nor the names of its contributors
18 * may be used to endorse or promote products derived from this software
19 * without specific prior written permission.
21 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
22 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
25 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
33 * @(#)route.c 8.6 (Berkeley) 4/28/95
34 * $FreeBSD: src/usr.bin/netstat/route.c,v 1.41.2.14 2002/07/17 02:22:22 kbyanc Exp $
35 * $DragonFly: src/usr.bin/netstat/route.c,v 1.13 2008/07/07 22:02:10 nant Exp $
38 #include <sys/kinfo.h>
39 #include <sys/param.h>
40 #include <sys/socket.h>
43 #include <net/ethernet.h>
45 #include <net/if_var.h>
46 #include <net/if_dl.h>
47 #include <net/if_types.h>
48 #include <net/route.h>
50 #include <netinet/in.h>
51 #include <netipx/ipx.h>
52 #include <netatalk/at.h>
53 #include <netgraph/socket/ng_socket.h>
55 #include <netproto/mpls/mpls.h>
57 #include <sys/sysctl.h>
59 #include <arpa/inet.h>
71 #define kget(p, d) (kread((u_long)(p), (char *)&(d), sizeof (d)))
74 /* alignment constraint for routing socket */
76 ((a) > 0 ? (1 + (((a) - 1) | (sizeof(long) - 1))) : sizeof(long))
77 #define ADVANCE(x, n) (x += ROUNDUP((n)->sa_len))
80 * Definitions for showing gateway flags.
91 { RTF_MODIFIED, 'M' },
92 { RTF_DONE, 'd' }, /* Completed -- for routing messages only */
94 { RTF_XRESOLVE, 'X' },
99 { RTF_WASCLONED,'W' },
100 { RTF_PRCLONING,'c' },
102 { RTF_BLACKHOLE,'B' },
103 { RTF_BROADCAST,'b' },
104 { RTF_MPLSOPS, 'm' },
109 long dummy; /* Helps align structure. */
110 struct sockaddr u_sa;
117 struct rtentry rtentry;
118 struct radix_node rnode;
119 struct radix_mask rmask;
120 struct radix_node_head *rt_tables[AF_MAX+1];
124 static struct sockaddr *kgetsa (struct sockaddr *);
125 static void size_cols (int ef, struct radix_node *rn);
126 static void size_cols_tree (struct radix_node *rn);
127 static void size_cols_rtentry (struct rtentry *rt);
128 static void p_tree (struct radix_node *);
129 static void p_rtnode (void);
130 static void ntreestuff (void);
131 static void np_rtentry (struct rt_msghdr *);
132 static void p_sockaddr (struct sockaddr *, struct sockaddr *, int, int);
133 static const char *fmt_sockaddr (struct sockaddr *sa, struct sockaddr *mask,
135 static void p_flags (int, const char *);
136 static const char *fmt_flags(int f);
137 static void p_rtentry (struct rtentry *);
138 static u_long forgemask (u_long);
139 static void domask (char *, u_long, u_long);
140 static const char *labelops(struct rtentry *);
143 * Print routing tables.
146 routepr(u_long rtree)
148 struct radix_node_head *rnh, head;
151 printf("Routing tables\n");
153 if (Aflag == 0 && NewTree) {
157 printf("rt_tables: symbol not in namelist\n");
164 rtree += cpuflag * (AF_MAX + 1) * sizeof(void *);
166 kget(rtree, rt_tables);
167 for (i = 0; i <= AF_MAX; i++) {
168 if ((rnh = rt_tables[i]) == 0)
171 if (i == AF_UNSPEC) {
172 if (Aflag && af == 0) {
173 printf("Netmasks:\n");
174 p_tree(head.rnh_treetop);
176 } else if (af == AF_UNSPEC || af == i) {
177 size_cols(i, head.rnh_treetop);
181 p_tree(head.rnh_treetop);
188 * Print address family header before a section of the routing table.
201 afname = "Internet6";
211 afname = "AppleTalk";
227 printf("\n%s:\n", afname);
229 printf("\nProtocol Family %d:\n", af1);
232 /* column widths; each followed by one space */
234 #define WID_DST_DEFAULT(af) 18 /* width of destination column */
235 #define WID_GW_DEFAULT(af) 18 /* width of gateway column */
236 #define WID_IF_DEFAULT(af) (Wflag ? 8 : 6) /* width of netif column */
238 #define WID_DST_DEFAULT(af) \
239 ((af) == AF_INET6 ? (numeric_addr ? 33: 18) : 18)
240 #define WID_GW_DEFAULT(af) \
241 ((af) == AF_INET6 ? (numeric_addr ? 29 : 18) : 18)
242 #define WID_IF_DEFAULT(af) ((af) == AF_INET6 ? 8 : (Wflag ? 8 :6))
247 static int wid_flags;
252 static int wid_expire;
253 static int wid_mplslops;
256 size_cols(int ef, struct radix_node *rn)
258 wid_dst = WID_DST_DEFAULT(ef);
259 wid_gw = WID_GW_DEFAULT(ef);
264 wid_if = WID_IF_DEFAULT(ef);
273 size_cols_tree(struct radix_node *rn)
277 if (rnode.rn_bit < 0) {
278 if ((rnode.rn_flags & RNF_ROOT) == 0) {
280 size_cols_rtentry(&rtentry);
282 if ((rn = rnode.rn_dupedkey))
286 size_cols_tree(rnode.rn_left);
292 size_cols_rtentry(struct rtentry *rt)
294 static struct ifnet ifnet, *lastif;
295 struct rtentry parent;
296 static char buffer[100];
303 * Don't print protocol-cloned routes unless -a.
305 if (rt->rt_flags & RTF_WASCLONED && !aflag) {
306 kget(rt->rt_parent, parent);
307 if (parent.rt_flags & RTF_PRCLONING)
311 bzero(&addr, sizeof(addr));
312 if ((sa = kgetsa(rt_key(rt))))
313 bcopy(sa, &addr, sa->sa_len);
314 bzero(&mask, sizeof(mask));
315 if (rt_mask(rt) && (sa = kgetsa(rt_mask(rt))))
316 bcopy(sa, &mask, sa->sa_len);
317 bp = fmt_sockaddr(&addr.u_sa, &mask.u_sa, rt->rt_flags);
319 wid_dst = MAX(len, wid_dst);
321 bp = fmt_sockaddr(kgetsa(rt->rt_gateway), NULL, RTF_HOST);
323 wid_gw = MAX(len, wid_gw);
325 bp = fmt_flags(rt->rt_flags);
327 wid_flags = MAX(len, wid_flags);
329 if (addr.u_sa.sa_family == AF_INET || Wflag) {
330 len = snprintf(buffer, sizeof(buffer), "%ld", rt->rt_refcnt);
331 wid_refs = MAX(len, wid_refs);
332 len = snprintf(buffer, sizeof(buffer), "%lu", rt->rt_use);
333 wid_use = MAX(len, wid_use);
334 if (Wflag && rt->rt_rmx.rmx_mtu != 0) {
335 len = snprintf(buffer, sizeof(buffer),
336 "%lu", rt->rt_rmx.rmx_mtu);
337 wid_mtu = MAX(len, wid_mtu);
341 if (rt->rt_ifp != lastif) {
342 kget(rt->rt_ifp, ifnet);
344 len = strlen(ifnet.if_xname);
345 wid_if = MAX(len, wid_if);
347 if (rt->rt_rmx.rmx_expire) {
351 rt->rt_rmx.rmx_expire - time(NULL)) > 0) {
352 snprintf(buffer, sizeof(buffer), "%d",
354 wid_expire = MAX(len, wid_expire);
358 if (rt->rt_shim[0] != NULL)
359 len = strlen(labelops(rt));
360 wid_mplslops = MAX(len, wid_mplslops);
365 * Print header for routing table columns.
372 printf("%-8.8s ","Address");
373 if (af1 == AF_INET || Wflag) {
375 printf("%-*.*s %-*.*s %-*.*s %*.*s %*.*s %*.*s %*.*s %*s %-*s\n",
376 wid_dst, wid_dst, "Destination",
377 wid_gw, wid_gw, "Gateway",
378 wid_flags, wid_flags, "Flags",
379 wid_refs, wid_refs, "Refs",
380 wid_use, wid_use, "Use",
381 wid_mtu, wid_mtu, "Mtu",
382 wid_if, wid_if, "Netif",
383 wid_expire, "Expire",
384 wid_mplslops, "Labelops");
386 printf("%-*.*s %-*.*s %-*.*s %*.*s %*.*s %*.*s %*s\n",
387 wid_dst, wid_dst, "Destination",
388 wid_gw, wid_gw, "Gateway",
389 wid_flags, wid_flags, "Flags",
390 wid_refs, wid_refs, "Refs",
391 wid_use, wid_use, "Use",
392 wid_if, wid_if, "Netif",
393 wid_expire, "Expire");
396 printf("%-*.*s %-*.*s %-*.*s %*.*s %*s\n",
397 wid_dst, wid_dst, "Destination",
398 wid_gw, wid_gw, "Gateway",
399 wid_flags, wid_flags, "Flags",
400 wid_if, wid_if, "Netif",
401 wid_expire, "Expire");
405 static struct sockaddr *
406 kgetsa(struct sockaddr *dst)
409 kget(dst, pt_u.u_sa);
410 if (pt_u.u_sa.sa_len > sizeof (pt_u.u_sa))
411 kread((u_long)dst, (char *)pt_u.u_data, pt_u.u_sa.sa_len);
416 p_tree(struct radix_node *rn)
421 if (rnode.rn_bit < 0) {
423 printf("%-8.8lx ", (u_long)rn);
424 if (rnode.rn_flags & RNF_ROOT) {
426 printf("(root node)%s",
427 rnode.rn_dupedkey ? " =>\n" : "\n");
428 } else if (do_rtent) {
434 p_sockaddr(kgetsa((struct sockaddr *)rnode.rn_key),
438 if ((rn = rnode.rn_dupedkey))
441 if (Aflag && do_rtent) {
442 printf("%-8.8lx ", (u_long)rn);
446 p_tree(rnode.rn_left);
456 struct radix_mask *rm = rnode.rn_mklist;
458 if (rnode.rn_bit < 0) {
461 p_sockaddr(kgetsa((struct sockaddr *)rnode.rn_mask),
466 sprintf(nbuf, "(%d)", rnode.rn_bit);
467 printf("%6.6s %8.8lx : %8.8lx", nbuf, (u_long)rnode.rn_left, (u_long)rnode.rn_right);
471 sprintf(nbuf, " %d refs, ", rmask.rm_refs);
472 printf(" mk = %8.8lx {(%d),%s",
473 (u_long)rm, -1 - rmask.rm_bit, rmask.rm_refs ? nbuf : " ");
474 if (rmask.rm_flags & RNF_NORMAL) {
475 struct radix_node rnode_aux;
476 printf(" <normal>, ");
477 kget(rmask.rm_leaf, rnode_aux);
478 p_sockaddr(kgetsa((struct sockaddr *)rnode_aux.rn_mask),
481 p_sockaddr(kgetsa((struct sockaddr *)rmask.rm_mask),
484 if ((rm = rmask.rm_next))
496 char *buf, *next, *lim;
497 struct rt_msghdr *rtm;
503 mib[4] = NET_RT_DUMP;
511 if (sysctl(mib, miblen, NULL, &needed, NULL, 0) < 0) {
512 err(1, "sysctl: net.route.0.0.dump estimate");
515 if ((buf = malloc(needed)) == 0) {
516 err(2, "malloc(%lu)", (unsigned long)needed);
518 if (sysctl(mib, miblen, buf, &needed, NULL, 0) < 0) {
519 err(1, "sysctl: net.route.0.0.dump");
522 for (next = buf; next < lim; next += rtm->rtm_msglen) {
523 rtm = (struct rt_msghdr *)next;
529 np_rtentry(struct rt_msghdr *rtm)
531 struct sockaddr *sa = (struct sockaddr *)(rtm + 1);
533 static int masks_done, banner_printed;
536 int af1 = 0, interesting = RTF_UP | RTF_GATEWAY | RTF_HOST;
539 /* for the moment, netmasks are skipped over */
540 if (!banner_printed) {
541 printf("Netmasks:\n");
544 if (masks_done == 0) {
545 if (rtm->rtm_addrs != RTA_DST ) {
556 if (rtm->rtm_addrs == RTA_DST)
557 p_sockaddr(sa, NULL, 0, 36);
559 p_sockaddr(sa, NULL, rtm->rtm_flags, 16);
560 sa = (struct sockaddr *)(ROUNDUP(sa->sa_len) + (char *)sa);
561 p_sockaddr(sa, NULL, 0, 18);
563 p_flags(rtm->rtm_flags & interesting, "%-6.6s ");
568 p_sockaddr(struct sockaddr *sa, struct sockaddr *mask, int flags, int width)
572 cp = fmt_sockaddr(sa, mask, flags);
578 printf("%-*s ", width, cp);
580 printf("%-*.*s ", width, width, cp);
585 fmt_sockaddr(struct sockaddr *sa, struct sockaddr *mask, int flags)
587 static char workbuf[128];
588 const char *cp = workbuf;
590 switch(sa->sa_family) {
593 struct sockaddr_in *sin = (struct sockaddr_in *)sa;
595 if ((sin->sin_addr.s_addr == INADDR_ANY) &&
597 ntohl(((struct sockaddr_in *)mask)->sin_addr.s_addr)
600 else if (flags & RTF_HOST)
601 cp = routename(sin->sin_addr.s_addr);
603 cp = netname(sin->sin_addr.s_addr,
604 ntohl(((struct sockaddr_in *)mask)
607 cp = netname(sin->sin_addr.s_addr, 0L);
614 struct sockaddr_in6 *sa6 = (struct sockaddr_in6 *)sa;
615 struct in6_addr *in6 = &sa6->sin6_addr;
618 * XXX: This is a special workaround for KAME kernels.
619 * sin6_scope_id field of SA should be set in the future.
621 if (IN6_IS_ADDR_LINKLOCAL(in6) ||
622 IN6_IS_ADDR_MC_LINKLOCAL(in6)) {
623 /* XXX: override is ok? */
624 sa6->sin6_scope_id = (u_int32_t)ntohs(*(u_short *)&in6->s6_addr[2]);
625 *(u_short *)&in6->s6_addr[2] = 0;
628 if (flags & RTF_HOST)
629 cp = routename6(sa6);
632 &((struct sockaddr_in6 *)mask)->sin6_addr);
634 cp = netname6(sa6, NULL);
642 struct ipx_addr work = ((struct sockaddr_ipx *)sa)->sipx_addr;
643 if (ipx_nullnet(satoipx_addr(work)))
651 if (!(flags & RTF_HOST) && mask)
652 cp = atalk_print2(sa,mask,9);
654 cp = atalk_print(sa,11);
659 printf("%s", ((struct sockaddr_ng *)sa)->sg_data);
664 struct sockaddr_dl *sdl = (struct sockaddr_dl *)sa;
666 if (sdl->sdl_nlen == 0 && sdl->sdl_alen == 0 &&
668 (void) sprintf(workbuf, "link#%d", sdl->sdl_index);
670 switch (sdl->sdl_type) {
674 if (sdl->sdl_alen == ETHER_ADDR_LEN) {
675 cp = ether_ntoa((struct ether_addr *)
676 (sdl->sdl_data + sdl->sdl_nlen));
689 struct sockaddr_mpls *smpls = (struct sockaddr_mpls *)sa;
691 (void) sprintf(workbuf, "%d", ntohl(smpls->smpls_label));
697 u_char *s = (u_char *)sa->sa_data, *slim;
701 slim = sa->sa_len + (u_char *) sa;
702 cqlim = cq + sizeof(workbuf) - 6;
703 cq += sprintf(cq, "(%d)", sa->sa_family);
704 while (s < slim && cq < cqlim) {
705 cq += sprintf(cq, " %02x", *s++);
707 cq += sprintf(cq, "%02x", *s++);
717 p_flags(int f, const char *format)
719 printf(format, fmt_flags(f));
725 static char name[33];
727 struct bits *p = bits;
729 for (flags = name; p->b_mask; p++)
737 p_rtentry(struct rtentry *rt)
739 static struct ifnet ifnet, *lastif;
740 struct rtentry parent;
741 static char buffer[128];
742 static char prettyname[128];
747 * Don't print protocol-cloned routes unless -a.
749 if (rt->rt_flags & RTF_WASCLONED && !aflag) {
750 kget(rt->rt_parent, parent);
751 if (parent.rt_flags & RTF_PRCLONING)
755 bzero(&addr, sizeof(addr));
756 if ((sa = kgetsa(rt_key(rt))))
757 bcopy(sa, &addr, sa->sa_len);
758 bzero(&mask, sizeof(mask));
759 if (rt_mask(rt) && (sa = kgetsa(rt_mask(rt))))
760 bcopy(sa, &mask, sa->sa_len);
761 p_sockaddr(&addr.u_sa, &mask.u_sa, rt->rt_flags, wid_dst);
762 p_sockaddr(kgetsa(rt->rt_gateway), NULL, RTF_HOST, wid_gw);
763 snprintf(buffer, sizeof(buffer), "%%-%d.%ds ", wid_flags, wid_flags);
764 p_flags(rt->rt_flags, buffer);
765 if (addr.u_sa.sa_family == AF_INET || Wflag) {
766 printf("%*ld %*lu ", wid_refs, rt->rt_refcnt,
767 wid_use, rt->rt_use);
769 if (rt->rt_rmx.rmx_mtu != 0)
770 printf("%*lu ", wid_mtu, rt->rt_rmx.rmx_mtu);
772 printf("%*s ", wid_mtu, "");
776 if (rt->rt_ifp != lastif) {
777 kget(rt->rt_ifp, ifnet);
779 strlcpy(prettyname, ifnet.if_xname, sizeof(prettyname));
781 printf("%*.*s", wid_if, wid_if, prettyname);
782 if (rt->rt_rmx.rmx_expire) {
786 rt->rt_rmx.rmx_expire - time(NULL)) > 0)
787 printf(" %*d", wid_expire, (int)expire_time);
789 printf("%*s ", wid_expire, "");
791 if (rt->rt_nodes[0].rn_dupedkey)
795 if (rt->rt_shim[0] != NULL)
796 printf(" %-*s", wid_mplslops, labelops(rt));
805 static char line[MAXHOSTNAMELEN];
810 hp = gethostbyaddr(&in, sizeof (struct in_addr), AF_INET);
813 trimdomain(cp, strlen(cp));
817 strncpy(line, cp, sizeof(line) - 1);
818 line[sizeof(line) - 1] = '\0';
820 #define C(x) ((x) & 0xff)
822 sprintf(line, "%lu.%lu.%lu.%lu",
823 C(in >> 24), C(in >> 16), C(in >> 8), C(in));
835 else if (IN_CLASSB(a))
843 domask(char *dst, u_long addr, u_long mask)
847 if (!mask || (forgemask(addr) == mask)) {
852 for (b = 0; b < 32; b++)
853 if (mask & (1 << b)) {
857 for (bb = b+1; bb < 32; bb++)
858 if (!(mask & (1 << bb))) {
859 i = -1; /* noncontig */
865 sprintf(dst, "&0x%lx", mask);
867 sprintf(dst, "/%d", 32-i);
871 * Return the name of the network whose address is given.
872 * The address is assumed to be that of a net or subnet, not a host.
875 netname(u_long in, u_long mask)
878 static char line[MAXHOSTNAMELEN];
879 struct netent *np = 0;
883 #define NSHIFT(m) ( \
884 (m) == IN_CLASSA_NET ? IN_CLASSA_NSHIFT : \
885 (m) == IN_CLASSB_NET ? IN_CLASSB_NSHIFT : \
886 (m) == IN_CLASSC_NET ? IN_CLASSC_NSHIFT : \
890 dmask = forgemask(i);
891 if (!numeric_addr && i) {
892 np = getnetbyaddr(i >> NSHIFT(mask), AF_INET);
893 if (np == NULL && mask == 0)
894 np = getnetbyaddr(i >> NSHIFT(dmask), AF_INET);
897 trimdomain(cp, strlen(cp));
902 strncpy(line, cp, sizeof(line) - 1);
903 line[sizeof(line) - 1] = '\0';
905 if (mask <= IN_CLASSA_NET &&
906 (i & IN_CLASSA_HOST) == 0) {
907 sprintf(line, "%lu", C(i >> 24));
908 } else if (mask <= IN_CLASSB_NET &&
909 (i & IN_CLASSB_HOST) == 0) {
910 sprintf(line, "%lu.%lu",
911 C(i >> 24), C(i >> 16));
912 } else if (mask <= IN_CLASSC_NET &&
913 (i & IN_CLASSC_HOST) == 0) {
914 sprintf(line, "%lu.%lu.%lu",
915 C(i >> 24), C(i >> 16), C(i >> 8));
917 sprintf(line, "%lu.%lu.%lu.%lu",
918 C(i >> 24), C(i >> 16), C(i >> 8), C(i));
921 domask(line + strlen(line), i, mask);
927 netname6(struct sockaddr_in6 *sa6, struct in6_addr *mask)
929 static char line[MAXHOSTNAMELEN];
930 u_char *p = (u_char *)mask;
932 int masklen, illegal = 0, flag = NI_WITHSCOPEID;
935 for (masklen = 0, lim = p + 16; p < lim; p++) {
969 fprintf(stderr, "illegal prefixlen\n");
974 if (masklen == 0 && IN6_IS_ADDR_UNSPECIFIED(&sa6->sin6_addr))
978 flag |= NI_NUMERICHOST;
979 getnameinfo((struct sockaddr *)sa6, sa6->sin6_len, line, sizeof(line),
983 sprintf(&line[strlen(line)], "/%d", masklen);
989 routename6(struct sockaddr_in6 *sa6)
991 static char line[MAXHOSTNAMELEN];
992 int flag = NI_WITHSCOPEID;
993 /* use local variable for safety */
994 struct sockaddr_in6 sa6_local;
996 sa6_local.sin6_family = AF_INET6;
997 sa6_local.sin6_len = sizeof(sa6_local);
998 sa6_local.sin6_addr = sa6->sin6_addr;
999 sa6_local.sin6_scope_id = sa6->sin6_scope_id;
1002 flag |= NI_NUMERICHOST;
1004 getnameinfo((struct sockaddr *)&sa6_local, sa6_local.sin6_len,
1005 line, sizeof(line), NULL, 0, flag);
1012 * Print routing statistics
1017 struct rtstatistics rts;
1020 error = kinfo_get_net_rtstatistics(&rts);
1022 printf("routing: could not retrieve statistics\n");
1025 printf("routing:\n");
1027 #define p(f, m) if (rts.f || sflag <= 1) \
1028 printf(m, rts.f, plural(rts.f))
1030 p(rts_badredirect, "\t%lu bad routing redirect%s\n");
1031 p(rts_dynamic, "\t%lu dynamically created route%s\n");
1032 p(rts_newgateway, "\t%lu new gateway%s due to redirects\n");
1033 p(rts_unreach, "\t%lu destination%s found unreachable\n");
1034 p(rts_wildcard, "\t%lu use%s of a wildcard route\n");
1039 ipx_print(struct sockaddr *sa)
1042 struct servent *sp = 0;
1043 const char *net = "", *host = "";
1046 struct ipx_addr work = ((struct sockaddr_ipx *)sa)->sipx_addr;
1047 static char mybuf[50];
1048 char cport[10], chost[15], cnet[15];
1050 port = ntohs(work.x_port);
1052 if (ipx_nullnet(work) && ipx_nullhost(work)) {
1056 sprintf(mybuf, "*.%s", sp->s_name);
1058 sprintf(mybuf, "*.%x", port);
1060 sprintf(mybuf, "*.*");
1065 if (ipx_wildnet(work))
1067 else if (ipx_nullnet(work))
1070 q = work.x_net.c_net;
1071 sprintf(cnet, "%02x%02x%02x%02x",
1072 q[0], q[1], q[2], q[3]);
1073 for (p = cnet; *p == '0' && p < cnet + 8; p++)
1078 if (ipx_wildhost(work))
1080 else if (ipx_nullhost(work))
1083 q = work.x_host.c_host;
1084 sprintf(chost, "%02x%02x%02x%02x%02x%02x",
1085 q[0], q[1], q[2], q[3], q[4], q[5]);
1086 for (p = chost; *p == '0' && p < chost + 12; p++)
1092 if (strcmp(host, "*") == 0)
1095 snprintf(cport, sizeof(cport),
1096 "%s%s", *host ? "." : "", sp->s_name);
1098 snprintf(cport, sizeof(cport),
1099 "%s%x", *host ? "." : "", port);
1103 snprintf(mybuf, sizeof(mybuf), "%s.%s%s", net, host, cport);
1108 ipx_phost(struct sockaddr *sa)
1110 struct sockaddr_ipx *sipx = (struct sockaddr_ipx *)sa;
1111 struct sockaddr_ipx work;
1112 static union ipx_net ipx_zeronet;
1117 in = work.sipx_addr;
1119 work.sipx_addr.x_port = 0;
1120 work.sipx_addr.x_net = ipx_zeronet;
1121 p = ipx_print((struct sockaddr *)&work);
1122 if (strncmp("*.", p, 2) == 0) p += 2;
1147 labelops(struct rtentry *rt)
1149 const char *lops[] = { "push", "pop", "swap", "pop all" };
1150 static char buffer[100];
1152 struct sockaddr_mpls *smpls;
1155 for (i=0; i<MPLS_MAXLOPS; ++i) {
1157 if (rt->rt_shim[i] == NULL)
1161 sizeof(buffer) - (cp - buffer),
1164 smpls = (struct sockaddr_mpls *)kgetsa(rt->rt_shim[i]);
1165 if (smpls->smpls_op != MPLSLOP_POP &&
1166 smpls->smpls_op != MPLSLOP_POPALL){
1168 sizeof(buffer) - (cp - buffer),
1170 lops[smpls->smpls_op - 1],
1171 ntohl(smpls->smpls_label));
1174 sizeof(buffer) - (cp - buffer),
1176 lops[smpls->smpls_op - 1]);