Move wide char related routines to wcsmbs subdir
[glibc.git] / resolv / res_send.c
bloba001c1e753a561781304c5d67e05fda2115f2fac
1 /*
2 * Copyright (c) 1985, 1989, 1993
3 * The Regents of the University of California. All rights reserved.
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
7 * are met:
8 * 1. Redistributions of source code must retain the above copyright
9 * notice, this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright
11 * notice, this list of conditions and the following disclaimer in the
12 * documentation and/or other materials provided with the distribution.
13 * 4. Neither the name of the University nor the names of its contributors
14 * may be used to endorse or promote products derived from this software
15 * without specific prior written permission.
17 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
18 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
19 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
20 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
21 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
22 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
23 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
24 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
25 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
26 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
27 * SUCH DAMAGE.
31 * Portions Copyright (c) 1993 by Digital Equipment Corporation.
33 * Permission to use, copy, modify, and distribute this software for any
34 * purpose with or without fee is hereby granted, provided that the above
35 * copyright notice and this permission notice appear in all copies, and that
36 * the name of Digital Equipment Corporation not be used in advertising or
37 * publicity pertaining to distribution of the document or software without
38 * specific, written prior permission.
40 * THE SOFTWARE IS PROVIDED "AS IS" AND DIGITAL EQUIPMENT CORP. DISCLAIMS ALL
41 * WARRANTIES WITH REGARD TO THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES
42 * OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL DIGITAL EQUIPMENT
43 * CORPORATION BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL
44 * DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR
45 * PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS
46 * ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS
47 * SOFTWARE.
51 * Portions Copyright (c) 1996-1999 by Internet Software Consortium.
53 * Permission to use, copy, modify, and distribute this software for any
54 * purpose with or without fee is hereby granted, provided that the above
55 * copyright notice and this permission notice appear in all copies.
57 * THE SOFTWARE IS PROVIDED "AS IS" AND INTERNET SOFTWARE CONSORTIUM DISCLAIMS
58 * ALL WARRANTIES WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES
59 * OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL INTERNET SOFTWARE
60 * CONSORTIUM BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL
61 * DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR
62 * PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS
63 * ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS
64 * SOFTWARE.
67 #if defined(LIBC_SCCS) && !defined(lint)
68 static const char sccsid[] = "@(#)res_send.c 8.1 (Berkeley) 6/4/93";
69 static const char rcsid[] = "$BINDId: res_send.c,v 8.38 2000/03/30 20:16:51 vixie Exp $";
70 #endif /* LIBC_SCCS and not lint */
73 * Send query to name server and wait for reply.
76 #include <assert.h>
77 #include <sys/types.h>
78 #include <sys/param.h>
79 #include <sys/time.h>
80 #include <sys/socket.h>
81 #include <sys/uio.h>
82 #include <sys/poll.h>
84 #include <netinet/in.h>
85 #include <arpa/nameser.h>
86 #include <arpa/inet.h>
87 #include <sys/ioctl.h>
89 #include <errno.h>
90 #include <fcntl.h>
91 #include <netdb.h>
92 #include <resolv.h>
93 #include <signal.h>
94 #include <stdio.h>
95 #include <stdlib.h>
96 #include <string.h>
97 #include <unistd.h>
98 #include <kernel-features.h>
100 #if PACKETSZ > 65536
101 #define MAXPACKET PACKETSZ
102 #else
103 #define MAXPACKET 65536
104 #endif
107 #ifndef __ASSUME_SOCK_CLOEXEC
108 static int __have_o_nonblock;
109 #else
110 # define __have_o_nonblock 0
111 #endif
114 /* From ev_streams.c. */
116 static inline void
117 __attribute ((always_inline))
118 evConsIovec(void *buf, size_t cnt, struct iovec *vec) {
119 memset(vec, 0xf5, sizeof (*vec));
120 vec->iov_base = buf;
121 vec->iov_len = cnt;
124 /* From ev_timers.c. */
126 #define BILLION 1000000000
128 static inline void
129 evConsTime(struct timespec *res, time_t sec, long nsec) {
130 res->tv_sec = sec;
131 res->tv_nsec = nsec;
134 static inline void
135 evAddTime(struct timespec *res, const struct timespec *addend1,
136 const struct timespec *addend2) {
137 res->tv_sec = addend1->tv_sec + addend2->tv_sec;
138 res->tv_nsec = addend1->tv_nsec + addend2->tv_nsec;
139 if (res->tv_nsec >= BILLION) {
140 res->tv_sec++;
141 res->tv_nsec -= BILLION;
145 static inline void
146 evSubTime(struct timespec *res, const struct timespec *minuend,
147 const struct timespec *subtrahend) {
148 res->tv_sec = minuend->tv_sec - subtrahend->tv_sec;
149 if (minuend->tv_nsec >= subtrahend->tv_nsec)
150 res->tv_nsec = minuend->tv_nsec - subtrahend->tv_nsec;
151 else {
152 res->tv_nsec = (BILLION
153 - subtrahend->tv_nsec + minuend->tv_nsec);
154 res->tv_sec--;
158 static inline int
159 evCmpTime(struct timespec a, struct timespec b) {
160 long x = a.tv_sec - b.tv_sec;
162 if (x == 0L)
163 x = a.tv_nsec - b.tv_nsec;
164 return (x < 0L ? (-1) : x > 0L ? (1) : (0));
167 static inline void
168 evNowTime(struct timespec *res) {
169 struct timeval now;
171 if (gettimeofday(&now, NULL) < 0)
172 evConsTime(res, 0, 0);
173 else
174 TIMEVAL_TO_TIMESPEC (&now, res);
178 /* Options. Leave them on. */
179 /* #undef DEBUG */
180 #include "res_debug.h"
182 #define EXT(res) ((res)->_u._ext)
184 /* Forward. */
186 static int send_vc(res_state, const u_char *, int,
187 const u_char *, int,
188 u_char **, int *, int *, int, u_char **,
189 u_char **, int *, int *);
190 static int send_dg(res_state, const u_char *, int,
191 const u_char *, int,
192 u_char **, int *, int *, int,
193 int *, int *, u_char **,
194 u_char **, int *, int *);
195 #ifdef DEBUG
196 static void Aerror(const res_state, FILE *, const char *, int,
197 const struct sockaddr *);
198 static void Perror(const res_state, FILE *, const char *, int);
199 #endif
200 static int sock_eq(struct sockaddr_in6 *, struct sockaddr_in6 *);
202 /* Public. */
204 /* int
205 * res_isourserver(ina)
206 * looks up "ina" in _res.ns_addr_list[]
207 * returns:
208 * 0 : not found
209 * >0 : found
210 * author:
211 * paul vixie, 29may94
214 res_ourserver_p(const res_state statp, const struct sockaddr_in6 *inp)
216 int ns;
218 if (inp->sin6_family == AF_INET) {
219 struct sockaddr_in *in4p = (struct sockaddr_in *) inp;
220 in_port_t port = in4p->sin_port;
221 in_addr_t addr = in4p->sin_addr.s_addr;
223 for (ns = 0; ns < MAXNS; ns++) {
224 const struct sockaddr_in *srv =
225 (struct sockaddr_in *)EXT(statp).nsaddrs[ns];
227 if ((srv != NULL) && (srv->sin_family == AF_INET) &&
228 (srv->sin_port == port) &&
229 (srv->sin_addr.s_addr == INADDR_ANY ||
230 srv->sin_addr.s_addr == addr))
231 return (1);
233 } else if (inp->sin6_family == AF_INET6) {
234 for (ns = 0; ns < MAXNS; ns++) {
235 const struct sockaddr_in6 *srv = EXT(statp).nsaddrs[ns];
236 if ((srv != NULL) && (srv->sin6_family == AF_INET6) &&
237 (srv->sin6_port == inp->sin6_port) &&
238 !(memcmp(&srv->sin6_addr, &in6addr_any,
239 sizeof (struct in6_addr)) &&
240 memcmp(&srv->sin6_addr, &inp->sin6_addr,
241 sizeof (struct in6_addr))))
242 return (1);
245 return (0);
248 /* int
249 * res_nameinquery(name, type, class, buf, eom)
250 * look for (name,type,class) in the query section of packet (buf,eom)
251 * requires:
252 * buf + HFIXEDSZ <= eom
253 * returns:
254 * -1 : format error
255 * 0 : not found
256 * >0 : found
257 * author:
258 * paul vixie, 29may94
261 res_nameinquery(const char *name, int type, int class,
262 const u_char *buf, const u_char *eom)
264 const u_char *cp = buf + HFIXEDSZ;
265 int qdcount = ntohs(((HEADER*)buf)->qdcount);
267 while (qdcount-- > 0) {
268 char tname[MAXDNAME+1];
269 int n, ttype, tclass;
271 n = dn_expand(buf, eom, cp, tname, sizeof tname);
272 if (n < 0)
273 return (-1);
274 cp += n;
275 if (cp + 2 * INT16SZ > eom)
276 return (-1);
277 NS_GET16(ttype, cp);
278 NS_GET16(tclass, cp);
279 if (ttype == type && tclass == class &&
280 ns_samename(tname, name) == 1)
281 return (1);
283 return (0);
285 libresolv_hidden_def (res_nameinquery)
287 /* int
288 * res_queriesmatch(buf1, eom1, buf2, eom2)
289 * is there a 1:1 mapping of (name,type,class)
290 * in (buf1,eom1) and (buf2,eom2)?
291 * returns:
292 * -1 : format error
293 * 0 : not a 1:1 mapping
294 * >0 : is a 1:1 mapping
295 * author:
296 * paul vixie, 29may94
299 res_queriesmatch(const u_char *buf1, const u_char *eom1,
300 const u_char *buf2, const u_char *eom2)
302 if (buf1 + HFIXEDSZ > eom1 || buf2 + HFIXEDSZ > eom2)
303 return (-1);
306 * Only header section present in replies to
307 * dynamic update packets.
309 if ((((HEADER *)buf1)->opcode == ns_o_update) &&
310 (((HEADER *)buf2)->opcode == ns_o_update))
311 return (1);
313 /* Note that we initially do not convert QDCOUNT to the host byte
314 order. We can compare it with the second buffer's QDCOUNT
315 value without doing this. */
316 int qdcount = ((HEADER*)buf1)->qdcount;
317 if (qdcount != ((HEADER*)buf2)->qdcount)
318 return (0);
320 qdcount = htons (qdcount);
321 const u_char *cp = buf1 + HFIXEDSZ;
323 while (qdcount-- > 0) {
324 char tname[MAXDNAME+1];
325 int n, ttype, tclass;
327 n = dn_expand(buf1, eom1, cp, tname, sizeof tname);
328 if (n < 0)
329 return (-1);
330 cp += n;
331 if (cp + 2 * INT16SZ > eom1)
332 return (-1);
333 NS_GET16(ttype, cp);
334 NS_GET16(tclass, cp);
335 if (!res_nameinquery(tname, ttype, tclass, buf2, eom2))
336 return (0);
338 return (1);
340 libresolv_hidden_def (res_queriesmatch)
343 __libc_res_nsend(res_state statp, const u_char *buf, int buflen,
344 const u_char *buf2, int buflen2,
345 u_char *ans, int anssiz, u_char **ansp, u_char **ansp2,
346 int *nansp2, int *resplen2)
348 int gotsomewhere, terrno, try, v_circuit, resplen, ns, n;
350 if (statp->nscount == 0) {
351 __set_errno (ESRCH);
352 return (-1);
355 if (anssiz < (buf2 == NULL ? 1 : 2) * HFIXEDSZ) {
356 __set_errno (EINVAL);
357 return (-1);
360 #ifdef USE_HOOKS
361 if (__builtin_expect (statp->qhook || statp->rhook, 0)) {
362 if (anssiz < MAXPACKET && ansp) {
363 u_char *buf = malloc (MAXPACKET);
364 if (buf == NULL)
365 return (-1);
366 memcpy (buf, ans, HFIXEDSZ);
367 *ansp = buf;
368 ans = buf;
369 anssiz = MAXPACKET;
372 #endif
374 DprintQ((statp->options & RES_DEBUG) || (statp->pfcode & RES_PRF_QUERY),
375 (stdout, ";; res_send()\n"), buf, buflen);
376 v_circuit = ((statp->options & RES_USEVC)
377 || buflen > PACKETSZ
378 || buflen2 > PACKETSZ);
379 gotsomewhere = 0;
380 terrno = ETIMEDOUT;
383 * If the ns_addr_list in the resolver context has changed, then
384 * invalidate our cached copy and the associated timing data.
386 if (EXT(statp).nsinit) {
387 int needclose = 0;
389 if (EXT(statp).nscount != statp->nscount)
390 needclose++;
391 else
392 for (ns = 0; ns < MAXNS; ns++) {
393 unsigned int map = EXT(statp).nsmap[ns];
394 if (map < MAXNS
395 && !sock_eq((struct sockaddr_in6 *)
396 &statp->nsaddr_list[map],
397 EXT(statp).nsaddrs[ns]))
399 needclose++;
400 break;
403 if (needclose)
404 __res_iclose(statp, false);
408 * Maybe initialize our private copy of the ns_addr_list.
410 if (EXT(statp).nsinit == 0) {
411 unsigned char map[MAXNS];
413 memset (map, MAXNS, sizeof (map));
414 for (n = 0; n < MAXNS; n++) {
415 ns = EXT(statp).nsmap[n];
416 if (ns < statp->nscount)
417 map[ns] = n;
418 else if (ns < MAXNS) {
419 free(EXT(statp).nsaddrs[n]);
420 EXT(statp).nsaddrs[n] = NULL;
421 EXT(statp).nsmap[n] = MAXNS;
424 n = statp->nscount;
425 if (statp->nscount > EXT(statp).nscount)
426 for (n = EXT(statp).nscount, ns = 0;
427 n < statp->nscount; n++) {
428 while (ns < MAXNS
429 && EXT(statp).nsmap[ns] != MAXNS)
430 ns++;
431 if (ns == MAXNS)
432 break;
433 EXT(statp).nsmap[ns] = n;
434 map[n] = ns++;
436 EXT(statp).nscount = n;
437 for (ns = 0; ns < EXT(statp).nscount; ns++) {
438 n = map[ns];
439 if (EXT(statp).nsaddrs[n] == NULL)
440 EXT(statp).nsaddrs[n] =
441 malloc(sizeof (struct sockaddr_in6));
442 if (EXT(statp).nsaddrs[n] != NULL) {
443 memset (mempcpy(EXT(statp).nsaddrs[n],
444 &statp->nsaddr_list[n],
445 sizeof (struct sockaddr_in)),
446 '\0',
447 sizeof (struct sockaddr_in6)
448 - sizeof (struct sockaddr_in));
449 EXT(statp).nssocks[n] = -1;
450 n++;
453 EXT(statp).nsinit = 1;
457 * Some resolvers want to even out the load on their nameservers.
458 * Note that RES_BLAST overrides RES_ROTATE.
460 if (__builtin_expect ((statp->options & RES_ROTATE) != 0, 0) &&
461 (statp->options & RES_BLAST) == 0) {
462 struct sockaddr_in6 *ina;
463 unsigned int map;
465 n = 0;
466 while (n < MAXNS && EXT(statp).nsmap[n] == MAXNS)
467 n++;
468 if (n < MAXNS) {
469 ina = EXT(statp).nsaddrs[n];
470 map = EXT(statp).nsmap[n];
471 for (;;) {
472 ns = n + 1;
473 while (ns < MAXNS
474 && EXT(statp).nsmap[ns] == MAXNS)
475 ns++;
476 if (ns == MAXNS)
477 break;
478 EXT(statp).nsaddrs[n] = EXT(statp).nsaddrs[ns];
479 EXT(statp).nsmap[n] = EXT(statp).nsmap[ns];
480 n = ns;
482 EXT(statp).nsaddrs[n] = ina;
483 EXT(statp).nsmap[n] = map;
488 * Send request, RETRY times, or until successful.
490 for (try = 0; try < statp->retry; try++) {
491 for (ns = 0; ns < MAXNS; ns++)
493 #ifdef DEBUG
494 char tmpbuf[40];
495 #endif
496 struct sockaddr_in6 *nsap = EXT(statp).nsaddrs[ns];
498 if (nsap == NULL)
499 goto next_ns;
500 same_ns:
501 #ifdef USE_HOOKS
502 if (__builtin_expect (statp->qhook != NULL, 0)) {
503 int done = 0, loops = 0;
505 do {
506 res_sendhookact act;
508 struct sockaddr_in *nsap4;
509 nsap4 = (struct sockaddr_in *) nsap;
510 act = (*statp->qhook)(&nsap4, &buf, &buflen,
511 ans, anssiz, &resplen);
512 nsap = (struct sockaddr_in6 *) nsap4;
513 switch (act) {
514 case res_goahead:
515 done = 1;
516 break;
517 case res_nextns:
518 __res_iclose(statp, false);
519 goto next_ns;
520 case res_done:
521 return (resplen);
522 case res_modified:
523 /* give the hook another try */
524 if (++loops < 42) /*doug adams*/
525 break;
526 /*FALLTHROUGH*/
527 case res_error:
528 /*FALLTHROUGH*/
529 default:
530 return (-1);
532 } while (!done);
534 #endif
536 Dprint(statp->options & RES_DEBUG,
537 (stdout, ";; Querying server (# %d) address = %s\n",
538 ns + 1, inet_ntop(nsap->sin6_family,
539 (nsap->sin6_family == AF_INET6
540 ? &nsap->sin6_addr
541 : &((struct sockaddr_in *) nsap)->sin_addr),
542 tmpbuf, sizeof (tmpbuf))));
544 if (__builtin_expect (v_circuit, 0)) {
545 /* Use VC; at most one attempt per server. */
546 try = statp->retry;
547 n = send_vc(statp, buf, buflen, buf2, buflen2,
548 &ans, &anssiz, &terrno,
549 ns, ansp, ansp2, nansp2, resplen2);
550 if (n < 0)
551 return (-1);
552 if (n == 0 && (buf2 == NULL || *resplen2 == 0))
553 goto next_ns;
554 } else {
555 /* Use datagrams. */
556 n = send_dg(statp, buf, buflen, buf2, buflen2,
557 &ans, &anssiz, &terrno,
558 ns, &v_circuit, &gotsomewhere, ansp,
559 ansp2, nansp2, resplen2);
560 if (n < 0)
561 return (-1);
562 if (n == 0 && (buf2 == NULL || *resplen2 == 0))
563 goto next_ns;
564 if (v_circuit)
565 // XXX Check whether both requests failed or
566 // XXX whether one has been answered successfully
567 goto same_ns;
570 resplen = n;
572 Dprint((statp->options & RES_DEBUG) ||
573 ((statp->pfcode & RES_PRF_REPLY) &&
574 (statp->pfcode & RES_PRF_HEAD1)),
575 (stdout, ";; got answer:\n"));
577 DprintQ((statp->options & RES_DEBUG) ||
578 (statp->pfcode & RES_PRF_REPLY),
579 (stdout, "%s", ""),
580 ans, (resplen > anssiz) ? anssiz : resplen);
581 if (buf2 != NULL) {
582 DprintQ((statp->options & RES_DEBUG) ||
583 (statp->pfcode & RES_PRF_REPLY),
584 (stdout, "%s", ""),
585 *ansp2, (*resplen2 > *nansp2) ? *nansp2 : *resplen2);
589 * If we have temporarily opened a virtual circuit,
590 * or if we haven't been asked to keep a socket open,
591 * close the socket.
593 if ((v_circuit && (statp->options & RES_USEVC) == 0) ||
594 (statp->options & RES_STAYOPEN) == 0) {
595 __res_iclose(statp, false);
597 #ifdef USE_HOOKS
598 if (__builtin_expect (statp->rhook, 0)) {
599 int done = 0, loops = 0;
601 do {
602 res_sendhookact act;
604 act = (*statp->rhook)((struct sockaddr_in *)
605 nsap, buf, buflen,
606 ans, anssiz, &resplen);
607 switch (act) {
608 case res_goahead:
609 case res_done:
610 done = 1;
611 break;
612 case res_nextns:
613 __res_iclose(statp, false);
614 goto next_ns;
615 case res_modified:
616 /* give the hook another try */
617 if (++loops < 42) /*doug adams*/
618 break;
619 /*FALLTHROUGH*/
620 case res_error:
621 /*FALLTHROUGH*/
622 default:
623 return (-1);
625 } while (!done);
628 #endif
629 return (resplen);
630 next_ns: ;
631 } /*foreach ns*/
632 } /*foreach retry*/
633 __res_iclose(statp, false);
634 if (!v_circuit) {
635 if (!gotsomewhere)
636 __set_errno (ECONNREFUSED); /* no nameservers found */
637 else
638 __set_errno (ETIMEDOUT); /* no answer obtained */
639 } else
640 __set_errno (terrno);
641 return (-1);
645 res_nsend(res_state statp,
646 const u_char *buf, int buflen, u_char *ans, int anssiz)
648 return __libc_res_nsend(statp, buf, buflen, NULL, 0, ans, anssiz,
649 NULL, NULL, NULL, NULL);
651 libresolv_hidden_def (res_nsend)
653 /* Private */
655 static int
656 send_vc(res_state statp,
657 const u_char *buf, int buflen, const u_char *buf2, int buflen2,
658 u_char **ansp, int *anssizp,
659 int *terrno, int ns, u_char **anscp, u_char **ansp2, int *anssizp2,
660 int *resplen2)
662 const HEADER *hp = (HEADER *) buf;
663 const HEADER *hp2 = (HEADER *) buf2;
664 u_char *ans = *ansp;
665 int orig_anssizp = *anssizp;
666 // XXX REMOVE
667 // int anssiz = *anssizp;
668 HEADER *anhp = (HEADER *) ans;
669 struct sockaddr_in6 *nsap = EXT(statp).nsaddrs[ns];
670 int truncating, connreset, resplen, n;
671 struct iovec iov[4];
672 u_short len;
673 u_short len2;
674 u_char *cp;
676 if (resplen2 != NULL)
677 *resplen2 = 0;
678 connreset = 0;
679 same_ns:
680 truncating = 0;
682 /* Are we still talking to whom we want to talk to? */
683 if (statp->_vcsock >= 0 && (statp->_flags & RES_F_VC) != 0) {
684 struct sockaddr_in6 peer;
685 socklen_t size = sizeof peer;
687 if (getpeername(statp->_vcsock,
688 (struct sockaddr *)&peer, &size) < 0 ||
689 !sock_eq(&peer, nsap)) {
690 __res_iclose(statp, false);
691 statp->_flags &= ~RES_F_VC;
695 if (statp->_vcsock < 0 || (statp->_flags & RES_F_VC) == 0) {
696 if (statp->_vcsock >= 0)
697 __res_iclose(statp, false);
699 statp->_vcsock = socket(nsap->sin6_family, SOCK_STREAM, 0);
700 if (statp->_vcsock < 0) {
701 *terrno = errno;
702 Perror(statp, stderr, "socket(vc)", errno);
703 return (-1);
705 __set_errno (0);
706 if (connect(statp->_vcsock, (struct sockaddr *)nsap,
707 nsap->sin6_family == AF_INET
708 ? sizeof (struct sockaddr_in)
709 : sizeof (struct sockaddr_in6)) < 0) {
710 *terrno = errno;
711 Aerror(statp, stderr, "connect/vc", errno,
712 (struct sockaddr *) nsap);
713 __res_iclose(statp, false);
714 return (0);
716 statp->_flags |= RES_F_VC;
720 * Send length & message
722 len = htons ((u_short) buflen);
723 evConsIovec(&len, INT16SZ, &iov[0]);
724 evConsIovec((void*)buf, buflen, &iov[1]);
725 int niov = 2;
726 ssize_t explen = INT16SZ + buflen;
727 if (buf2 != NULL) {
728 len2 = htons ((u_short) buflen2);
729 evConsIovec(&len2, INT16SZ, &iov[2]);
730 evConsIovec((void*)buf2, buflen2, &iov[3]);
731 niov = 4;
732 explen += INT16SZ + buflen2;
734 if (TEMP_FAILURE_RETRY (writev(statp->_vcsock, iov, niov)) != explen) {
735 *terrno = errno;
736 Perror(statp, stderr, "write failed", errno);
737 __res_iclose(statp, false);
738 return (0);
741 * Receive length & response
743 int recvresp1 = 0;
744 int recvresp2 = buf2 == NULL;
745 uint16_t rlen16;
746 read_len:
747 cp = (u_char *)&rlen16;
748 len = sizeof(rlen16);
749 while ((n = TEMP_FAILURE_RETRY (read(statp->_vcsock, cp,
750 (int)len))) > 0) {
751 cp += n;
752 if ((len -= n) <= 0)
753 break;
755 if (n <= 0) {
756 *terrno = errno;
757 Perror(statp, stderr, "read failed", errno);
758 __res_iclose(statp, false);
760 * A long running process might get its TCP
761 * connection reset if the remote server was
762 * restarted. Requery the server instead of
763 * trying a new one. When there is only one
764 * server, this means that a query might work
765 * instead of failing. We only allow one reset
766 * per query to prevent looping.
768 if (*terrno == ECONNRESET && !connreset) {
769 connreset = 1;
770 goto same_ns;
772 return (0);
774 int rlen = ntohs (rlen16);
776 int *thisanssizp;
777 u_char **thisansp;
778 int *thisresplenp;
779 if ((recvresp1 | recvresp2) == 0 || buf2 == NULL) {
780 thisanssizp = anssizp;
781 thisansp = anscp ?: ansp;
782 assert (anscp != NULL || ansp2 == NULL);
783 thisresplenp = &resplen;
784 } else {
785 if (*anssizp != MAXPACKET) {
786 /* No buffer allocated for the first
787 reply. We can try to use the rest
788 of the user-provided buffer. */
789 #ifdef _STRING_ARCH_unaligned
790 *anssizp2 = orig_anssizp - resplen;
791 *ansp2 = *ansp + resplen;
792 #else
793 int aligned_resplen
794 = ((resplen + __alignof__ (HEADER) - 1)
795 & ~(__alignof__ (HEADER) - 1));
796 *anssizp2 = orig_anssizp - aligned_resplen;
797 *ansp2 = *ansp + aligned_resplen;
798 #endif
799 } else {
800 /* The first reply did not fit into the
801 user-provided buffer. Maybe the second
802 answer will. */
803 *anssizp2 = orig_anssizp;
804 *ansp2 = *ansp;
807 thisanssizp = anssizp2;
808 thisansp = ansp2;
809 thisresplenp = resplen2;
811 anhp = (HEADER *) *thisansp;
813 *thisresplenp = rlen;
814 if (rlen > *thisanssizp) {
815 /* Yes, we test ANSCP here. If we have two buffers
816 both will be allocatable. */
817 if (__builtin_expect (anscp != NULL, 1)) {
818 u_char *newp = malloc (MAXPACKET);
819 if (newp == NULL) {
820 *terrno = ENOMEM;
821 __res_iclose(statp, false);
822 return (0);
824 *thisanssizp = MAXPACKET;
825 *thisansp = newp;
826 anhp = (HEADER *) newp;
827 len = rlen;
828 } else {
829 Dprint(statp->options & RES_DEBUG,
830 (stdout, ";; response truncated\n")
832 truncating = 1;
833 len = *thisanssizp;
835 } else
836 len = rlen;
838 if (__builtin_expect (len < HFIXEDSZ, 0)) {
840 * Undersized message.
842 Dprint(statp->options & RES_DEBUG,
843 (stdout, ";; undersized: %d\n", len));
844 *terrno = EMSGSIZE;
845 __res_iclose(statp, false);
846 return (0);
849 cp = *thisansp;
850 while (len != 0 && (n = read(statp->_vcsock, (char *)cp, (int)len)) > 0){
851 cp += n;
852 len -= n;
854 if (__builtin_expect (n <= 0, 0)) {
855 *terrno = errno;
856 Perror(statp, stderr, "read(vc)", errno);
857 __res_iclose(statp, false);
858 return (0);
860 if (__builtin_expect (truncating, 0)) {
862 * Flush rest of answer so connection stays in synch.
864 anhp->tc = 1;
865 len = rlen - *thisanssizp;
866 while (len != 0) {
867 char junk[PACKETSZ];
869 n = read(statp->_vcsock, junk,
870 (len > sizeof junk) ? sizeof junk : len);
871 if (n > 0)
872 len -= n;
873 else
874 break;
878 * If the calling applicating has bailed out of
879 * a previous call and failed to arrange to have
880 * the circuit closed or the server has got
881 * itself confused, then drop the packet and
882 * wait for the correct one.
884 if ((recvresp1 || hp->id != anhp->id)
885 && (recvresp2 || hp2->id != anhp->id)) {
886 DprintQ((statp->options & RES_DEBUG) ||
887 (statp->pfcode & RES_PRF_REPLY),
888 (stdout, ";; old answer (unexpected):\n"),
889 *thisansp,
890 (rlen > *thisanssizp) ? *thisanssizp: rlen);
891 goto read_len;
894 /* Mark which reply we received. */
895 if (recvresp1 == 0 && hp->id == anhp->id)
896 recvresp1 = 1;
897 else
898 recvresp2 = 1;
899 /* Repeat waiting if we have a second answer to arrive. */
900 if ((recvresp1 & recvresp2) == 0)
901 goto read_len;
904 * All is well, or the error is fatal. Signal that the
905 * next nameserver ought not be tried.
907 return resplen;
910 static int
911 reopen (res_state statp, int *terrno, int ns)
913 if (EXT(statp).nssocks[ns] == -1) {
914 struct sockaddr *nsap
915 = (struct sockaddr *) EXT(statp).nsaddrs[ns];
916 socklen_t slen;
918 /* only try IPv6 if IPv6 NS and if not failed before */
919 if (nsap->sa_family == AF_INET6 && !statp->ipv6_unavail) {
920 if (__builtin_expect (__have_o_nonblock >= 0, 1)) {
921 EXT(statp).nssocks[ns] =
922 socket(PF_INET6, SOCK_DGRAM|SOCK_NONBLOCK,
924 #ifndef __ASSUME_SOCK_CLOEXEC
925 if (__have_o_nonblock == 0)
926 __have_o_nonblock
927 = (EXT(statp).nssocks[ns] == -1
928 && errno == EINVAL ? -1 : 1);
929 #endif
931 if (__builtin_expect (__have_o_nonblock < 0, 0))
932 EXT(statp).nssocks[ns] =
933 socket(PF_INET6, SOCK_DGRAM, 0);
934 if (EXT(statp).nssocks[ns] < 0)
935 statp->ipv6_unavail = errno == EAFNOSUPPORT;
936 slen = sizeof (struct sockaddr_in6);
937 } else if (nsap->sa_family == AF_INET) {
938 if (__builtin_expect (__have_o_nonblock >= 0, 1)) {
939 EXT(statp).nssocks[ns]
940 = socket(PF_INET, SOCK_DGRAM|SOCK_NONBLOCK,
942 #ifndef __ASSUME_SOCK_CLOEXEC
943 if (__have_o_nonblock == 0)
944 __have_o_nonblock
945 = (EXT(statp).nssocks[ns] == -1
946 && errno == EINVAL ? -1 : 1);
947 #endif
949 if (__builtin_expect (__have_o_nonblock < 0, 0))
950 EXT(statp).nssocks[ns]
951 = socket(PF_INET, SOCK_DGRAM, 0);
952 slen = sizeof (struct sockaddr_in);
954 if (EXT(statp).nssocks[ns] < 0) {
955 *terrno = errno;
956 Perror(statp, stderr, "socket(dg)", errno);
957 return (-1);
961 * On a 4.3BSD+ machine (client and server,
962 * actually), sending to a nameserver datagram
963 * port with no nameserver will cause an
964 * ICMP port unreachable message to be returned.
965 * If our datagram socket is "connected" to the
966 * server, we get an ECONNREFUSED error on the next
967 * socket operation, and select returns if the
968 * error message is received. We can thus detect
969 * the absence of a nameserver without timing out.
971 if (connect(EXT(statp).nssocks[ns], nsap, slen) < 0) {
972 Aerror(statp, stderr, "connect(dg)", errno, nsap);
973 __res_iclose(statp, false);
974 return (0);
976 if (__builtin_expect (__have_o_nonblock < 0, 0)) {
977 /* Make socket non-blocking. */
978 int fl = __fcntl (EXT(statp).nssocks[ns], F_GETFL);
979 if (fl != -1)
980 __fcntl (EXT(statp).nssocks[ns], F_SETFL,
981 fl | O_NONBLOCK);
982 Dprint(statp->options & RES_DEBUG,
983 (stdout, ";; new DG socket\n"))
987 return 1;
990 static int
991 send_dg(res_state statp,
992 const u_char *buf, int buflen, const u_char *buf2, int buflen2,
993 u_char **ansp, int *anssizp,
994 int *terrno, int ns, int *v_circuit, int *gotsomewhere, u_char **anscp,
995 u_char **ansp2, int *anssizp2, int *resplen2)
997 const HEADER *hp = (HEADER *) buf;
998 const HEADER *hp2 = (HEADER *) buf2;
999 u_char *ans = *ansp;
1000 int orig_anssizp = *anssizp;
1001 struct timespec now, timeout, finish;
1002 struct pollfd pfd[1];
1003 int ptimeout;
1004 struct sockaddr_in6 from;
1005 int resplen = 0;
1006 int n;
1009 * Compute time for the total operation.
1011 int seconds = (statp->retrans << ns);
1012 if (ns > 0)
1013 seconds /= statp->nscount;
1014 if (seconds <= 0)
1015 seconds = 1;
1016 bool single_request = (statp->options & RES_SNGLKUP) != 0;
1017 bool single_request_reopen = (statp->options & RES_SNGLKUPREOP) != 0;
1018 int save_gotsomewhere = *gotsomewhere;
1020 int retval;
1021 retry_reopen:
1022 retval = reopen (statp, terrno, ns);
1023 if (retval <= 0)
1024 return retval;
1025 retry:
1026 evNowTime(&now);
1027 evConsTime(&timeout, seconds, 0);
1028 evAddTime(&finish, &now, &timeout);
1029 int need_recompute = 0;
1030 int nwritten = 0;
1031 int recvresp1 = 0;
1032 int recvresp2 = buf2 == NULL;
1033 pfd[0].fd = EXT(statp).nssocks[ns];
1034 pfd[0].events = POLLOUT;
1035 if (resplen2 != NULL)
1036 *resplen2 = 0;
1037 wait:
1038 if (need_recompute) {
1039 recompute_resend:
1040 evNowTime(&now);
1041 if (evCmpTime(finish, now) <= 0) {
1042 poll_err_out:
1043 Perror(statp, stderr, "poll", errno);
1044 err_out:
1045 __res_iclose(statp, false);
1046 return (0);
1048 evSubTime(&timeout, &finish, &now);
1049 need_recompute = 0;
1051 /* Convert struct timespec in milliseconds. */
1052 ptimeout = timeout.tv_sec * 1000 + timeout.tv_nsec / 1000000;
1054 n = 0;
1055 if (nwritten == 0)
1056 n = __poll (pfd, 1, 0);
1057 if (__builtin_expect (n == 0, 0)) {
1058 n = __poll (pfd, 1, ptimeout);
1059 need_recompute = 1;
1061 if (n == 0) {
1062 Dprint(statp->options & RES_DEBUG, (stdout, ";; timeout\n"));
1063 if (resplen > 1 && (recvresp1 || (buf2 != NULL && recvresp2)))
1065 /* There are quite a few broken name servers out
1066 there which don't handle two outstanding
1067 requests from the same source. There are also
1068 broken firewall settings. If we time out after
1069 having received one answer switch to the mode
1070 where we send the second request only once we
1071 have received the first answer. */
1072 if (!single_request)
1074 statp->options |= RES_SNGLKUP;
1075 single_request = true;
1076 *gotsomewhere = save_gotsomewhere;
1077 goto retry;
1079 else if (!single_request_reopen)
1081 statp->options |= RES_SNGLKUPREOP;
1082 single_request_reopen = true;
1083 *gotsomewhere = save_gotsomewhere;
1084 __res_iclose (statp, false);
1085 goto retry_reopen;
1088 *resplen2 = 1;
1089 return resplen;
1092 *gotsomewhere = 1;
1093 return (0);
1095 if (n < 0) {
1096 if (errno == EINTR)
1097 goto recompute_resend;
1099 goto poll_err_out;
1101 __set_errno (0);
1102 if (pfd[0].revents & POLLOUT) {
1103 ssize_t sr;
1104 if (nwritten != 0)
1105 sr = send (pfd[0].fd, buf2, buflen2, MSG_NOSIGNAL);
1106 else
1107 sr = send (pfd[0].fd, buf, buflen, MSG_NOSIGNAL);
1109 if (sr != buflen) {
1110 if (errno == EINTR || errno == EAGAIN)
1111 goto recompute_resend;
1112 Perror(statp, stderr, "send", errno);
1113 goto err_out;
1115 if (nwritten != 0 || buf2 == NULL
1116 || single_request || single_request_reopen)
1117 pfd[0].events = POLLIN;
1118 else
1119 pfd[0].events = POLLIN | POLLOUT;
1120 ++nwritten;
1121 goto wait;
1122 } else if (pfd[0].revents & POLLIN) {
1123 int *thisanssizp;
1124 u_char **thisansp;
1125 int *thisresplenp;
1127 if ((recvresp1 | recvresp2) == 0 || buf2 == NULL) {
1128 thisanssizp = anssizp;
1129 thisansp = anscp ?: ansp;
1130 assert (anscp != NULL || ansp2 == NULL);
1131 thisresplenp = &resplen;
1132 } else {
1133 if (*anssizp != MAXPACKET) {
1134 /* No buffer allocated for the first
1135 reply. We can try to use the rest
1136 of the user-provided buffer. */
1137 #ifdef _STRING_ARCH_unaligned
1138 *anssizp2 = orig_anssizp - resplen;
1139 *ansp2 = *ansp + resplen;
1140 #else
1141 int aligned_resplen
1142 = ((resplen + __alignof__ (HEADER) - 1)
1143 & ~(__alignof__ (HEADER) - 1));
1144 *anssizp2 = orig_anssizp - aligned_resplen;
1145 *ansp2 = *ansp + aligned_resplen;
1146 #endif
1147 } else {
1148 /* The first reply did not fit into the
1149 user-provided buffer. Maybe the second
1150 answer will. */
1151 *anssizp2 = orig_anssizp;
1152 *ansp2 = *ansp;
1155 thisanssizp = anssizp2;
1156 thisansp = ansp2;
1157 thisresplenp = resplen2;
1160 if (*thisanssizp < MAXPACKET
1161 /* Yes, we test ANSCP here. If we have two buffers
1162 both will be allocatable. */
1163 && anscp
1164 && (ioctl (pfd[0].fd, FIONREAD, thisresplenp) < 0
1165 || *thisanssizp < *thisresplenp)) {
1166 u_char *newp = malloc (MAXPACKET);
1167 if (newp != NULL) {
1168 *anssizp = MAXPACKET;
1169 *thisansp = ans = newp;
1172 HEADER *anhp = (HEADER *) *thisansp;
1173 socklen_t fromlen = sizeof(struct sockaddr_in6);
1174 assert (sizeof(from) <= fromlen);
1175 *thisresplenp = recvfrom(pfd[0].fd, (char*)*thisansp,
1176 *thisanssizp, 0,
1177 (struct sockaddr *)&from, &fromlen);
1178 if (__builtin_expect (*thisresplenp <= 0, 0)) {
1179 if (errno == EINTR || errno == EAGAIN) {
1180 need_recompute = 1;
1181 goto wait;
1183 Perror(statp, stderr, "recvfrom", errno);
1184 goto err_out;
1186 *gotsomewhere = 1;
1187 if (__builtin_expect (*thisresplenp < HFIXEDSZ, 0)) {
1189 * Undersized message.
1191 Dprint(statp->options & RES_DEBUG,
1192 (stdout, ";; undersized: %d\n",
1193 *thisresplenp));
1194 *terrno = EMSGSIZE;
1195 goto err_out;
1197 if ((recvresp1 || hp->id != anhp->id)
1198 && (recvresp2 || hp2->id != anhp->id)) {
1200 * response from old query, ignore it.
1201 * XXX - potential security hazard could
1202 * be detected here.
1204 DprintQ((statp->options & RES_DEBUG) ||
1205 (statp->pfcode & RES_PRF_REPLY),
1206 (stdout, ";; old answer:\n"),
1207 *thisansp,
1208 (*thisresplenp > *thisanssizp)
1209 ? *thisanssizp : *thisresplenp);
1210 goto wait;
1212 if (!(statp->options & RES_INSECURE1) &&
1213 !res_ourserver_p(statp, &from)) {
1215 * response from wrong server? ignore it.
1216 * XXX - potential security hazard could
1217 * be detected here.
1219 DprintQ((statp->options & RES_DEBUG) ||
1220 (statp->pfcode & RES_PRF_REPLY),
1221 (stdout, ";; not our server:\n"),
1222 *thisansp,
1223 (*thisresplenp > *thisanssizp)
1224 ? *thisanssizp : *thisresplenp);
1225 goto wait;
1227 #ifdef RES_USE_EDNS0
1228 if (anhp->rcode == FORMERR
1229 && (statp->options & RES_USE_EDNS0) != 0U) {
1231 * Do not retry if the server does not understand
1232 * EDNS0. The case has to be captured here, as
1233 * FORMERR packet do not carry query section, hence
1234 * res_queriesmatch() returns 0.
1236 DprintQ(statp->options & RES_DEBUG,
1237 (stdout,
1238 "server rejected query with EDNS0:\n"),
1239 *thisansp,
1240 (*thisresplenp > *thisanssizp)
1241 ? *thisanssizp : *thisresplenp);
1242 /* record the error */
1243 statp->_flags |= RES_F_EDNS0ERR;
1244 goto err_out;
1246 #endif
1247 if (!(statp->options & RES_INSECURE2)
1248 && (recvresp1 || !res_queriesmatch(buf, buf + buflen,
1249 *thisansp,
1250 *thisansp
1251 + *thisanssizp))
1252 && (recvresp2 || !res_queriesmatch(buf2, buf2 + buflen2,
1253 *thisansp,
1254 *thisansp
1255 + *thisanssizp))) {
1257 * response contains wrong query? ignore it.
1258 * XXX - potential security hazard could
1259 * be detected here.
1261 DprintQ((statp->options & RES_DEBUG) ||
1262 (statp->pfcode & RES_PRF_REPLY),
1263 (stdout, ";; wrong query name:\n"),
1264 *thisansp,
1265 (*thisresplenp > *thisanssizp)
1266 ? *thisanssizp : *thisresplenp);
1267 goto wait;
1269 if (anhp->rcode == SERVFAIL ||
1270 anhp->rcode == NOTIMP ||
1271 anhp->rcode == REFUSED) {
1272 DprintQ(statp->options & RES_DEBUG,
1273 (stdout, "server rejected query:\n"),
1274 *thisansp,
1275 (*thisresplenp > *thisanssizp)
1276 ? *thisanssizp : *thisresplenp);
1278 if (recvresp1 || (buf2 != NULL && recvresp2)) {
1279 *resplen2 = 0;
1280 return resplen;
1282 if (buf2 != NULL)
1284 /* No data from the first reply. */
1285 resplen = 0;
1286 /* We are waiting for a possible second reply. */
1287 if (hp->id == anhp->id)
1288 recvresp1 = 1;
1289 else
1290 recvresp2 = 1;
1292 goto wait;
1295 next_ns:
1296 __res_iclose(statp, false);
1297 /* don't retry if called from dig */
1298 if (!statp->pfcode)
1299 return (0);
1301 if (anhp->rcode == NOERROR && anhp->ancount == 0
1302 && anhp->aa == 0 && anhp->ra == 0 && anhp->arcount == 0) {
1303 DprintQ(statp->options & RES_DEBUG,
1304 (stdout, "referred query:\n"),
1305 *thisansp,
1306 (*thisresplenp > *thisanssizp)
1307 ? *thisanssizp : *thisresplenp);
1308 goto next_ns;
1310 if (!(statp->options & RES_IGNTC) && anhp->tc) {
1312 * To get the rest of answer,
1313 * use TCP with same server.
1315 Dprint(statp->options & RES_DEBUG,
1316 (stdout, ";; truncated answer\n"));
1317 *v_circuit = 1;
1318 __res_iclose(statp, false);
1319 // XXX if we have received one reply we could
1320 // XXX use it and not repeat it over TCP...
1321 return (1);
1323 /* Mark which reply we received. */
1324 if (recvresp1 == 0 && hp->id == anhp->id)
1325 recvresp1 = 1;
1326 else
1327 recvresp2 = 1;
1328 /* Repeat waiting if we have a second answer to arrive. */
1329 if ((recvresp1 & recvresp2) == 0) {
1330 if (single_request || single_request_reopen) {
1331 pfd[0].events = POLLOUT;
1332 if (single_request_reopen) {
1333 __res_iclose (statp, false);
1334 retval = reopen (statp, terrno, ns);
1335 if (retval <= 0)
1336 return retval;
1339 goto wait;
1342 * All is well, or the error is fatal. Signal that the
1343 * next nameserver ought not be tried.
1345 return (resplen);
1346 } else if (pfd[0].revents & (POLLERR | POLLHUP | POLLNVAL)) {
1347 /* Something went wrong. We can stop trying. */
1348 goto err_out;
1350 else {
1351 /* poll should not have returned > 0 in this case. */
1352 abort ();
1356 #ifdef DEBUG
1357 static void
1358 Aerror(const res_state statp, FILE *file, const char *string, int error,
1359 const struct sockaddr *address)
1361 int save = errno;
1363 if ((statp->options & RES_DEBUG) != 0) {
1364 char tmp[sizeof "xxxx.xxxx.xxxx.255.255.255.255"];
1366 fprintf(file, "res_send: %s ([%s].%u): %s\n",
1367 string,
1368 (address->sa_family == AF_INET
1369 ? inet_ntop(address->sa_family,
1370 &((const struct sockaddr_in *) address)->sin_addr,
1371 tmp, sizeof tmp)
1372 : inet_ntop(address->sa_family,
1373 &((const struct sockaddr_in6 *) address)->sin6_addr,
1374 tmp, sizeof tmp)),
1375 (address->sa_family == AF_INET
1376 ? ntohs(((struct sockaddr_in *) address)->sin_port)
1377 : address->sa_family == AF_INET6
1378 ? ntohs(((struct sockaddr_in6 *) address)->sin6_port)
1379 : 0),
1380 strerror(error));
1382 __set_errno (save);
1385 static void
1386 Perror(const res_state statp, FILE *file, const char *string, int error) {
1387 int save = errno;
1389 if ((statp->options & RES_DEBUG) != 0)
1390 fprintf(file, "res_send: %s: %s\n",
1391 string, strerror(error));
1392 __set_errno (save);
1394 #endif
1396 static int
1397 sock_eq(struct sockaddr_in6 *a1, struct sockaddr_in6 *a2) {
1398 if (a1->sin6_family == a2->sin6_family) {
1399 if (a1->sin6_family == AF_INET)
1400 return ((((struct sockaddr_in *)a1)->sin_port ==
1401 ((struct sockaddr_in *)a2)->sin_port) &&
1402 (((struct sockaddr_in *)a1)->sin_addr.s_addr ==
1403 ((struct sockaddr_in *)a2)->sin_addr.s_addr));
1404 else
1405 return ((a1->sin6_port == a2->sin6_port) &&
1406 !memcmp(&a1->sin6_addr, &a2->sin6_addr,
1407 sizeof (struct in6_addr)));
1409 if (a1->sin6_family == AF_INET) {
1410 struct sockaddr_in6 *sap = a1;
1411 a1 = a2;
1412 a2 = sap;
1413 } /* assumes that AF_INET and AF_INET6 are the only possibilities */
1414 return ((a1->sin6_port == ((struct sockaddr_in *)a2)->sin_port) &&
1415 IN6_IS_ADDR_V4MAPPED(&a1->sin6_addr) &&
1416 (a1->sin6_addr.s6_addr32[3] ==
1417 ((struct sockaddr_in *)a2)->sin_addr.s_addr));