]> git.proxmox.com Git - mirror_frr.git/blame - lib/sockunion.c
*: Replace `sizeof something` to sizeof(something)
[mirror_frr.git] / lib / sockunion.c
CommitLineData
718e3744 1/* Socket union related function.
2 * Copyright (c) 1997, 98 Kunihiro Ishiguro
3 *
4 * This file is part of GNU Zebra.
5 *
6 * GNU Zebra is free software; you can redistribute it and/or modify it
7 * under the terms of the GNU General Public License as published by the
8 * Free Software Foundation; either version 2, or (at your option) any
9 * later version.
10 *
11 * GNU Zebra is distributed in the hope that it will be useful, but
12 * WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
14 * General Public License for more details.
15 *
896014f4
DL
16 * You should have received a copy of the GNU General Public License along
17 * with this program; see the file COPYING; if not, write to the Free Software
18 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
718e3744 19 */
20
21#include <zebra.h>
22
23#include "prefix.h"
24#include "vty.h"
25#include "sockunion.h"
26#include "memory.h"
718e3744 27#include "log.h"
7cb5cdbb 28#include "jhash.h"
174482ef 29#include "lib_errors.h"
718e3744 30
4a1ab8e4
DL
31DEFINE_MTYPE_STATIC(LIB, SOCKUNION, "Socket union")
32
d62a17ae 33const char *inet_sutop(const union sockunion *su, char *str)
34{
35 switch (su->sa.sa_family) {
36 case AF_INET:
37 inet_ntop(AF_INET, &su->sin.sin_addr, str, INET_ADDRSTRLEN);
38 break;
39 case AF_INET6:
40 inet_ntop(AF_INET6, &su->sin6.sin6_addr, str, INET6_ADDRSTRLEN);
41 break;
42 }
43 return str;
718e3744 44}
45
d62a17ae 46int str2sockunion(const char *str, union sockunion *su)
718e3744 47{
d62a17ae 48 int ret;
718e3744 49
d1f92e45 50 if (str == NULL)
51 return -1;
52
d62a17ae 53 memset(su, 0, sizeof(union sockunion));
718e3744 54
d62a17ae 55 ret = inet_pton(AF_INET, str, &su->sin.sin_addr);
56 if (ret > 0) /* Valid IPv4 address format. */
57 {
58 su->sin.sin_family = AF_INET;
6f0e3f6e 59#ifdef HAVE_STRUCT_SOCKADDR_IN_SIN_LEN
d62a17ae 60 su->sin.sin_len = sizeof(struct sockaddr_in);
6f0e3f6e 61#endif /* HAVE_STRUCT_SOCKADDR_IN_SIN_LEN */
d62a17ae 62 return 0;
63 }
64 ret = inet_pton(AF_INET6, str, &su->sin6.sin6_addr);
65 if (ret > 0) /* Valid IPv6 address format. */
66 {
67 su->sin6.sin6_family = AF_INET6;
718e3744 68#ifdef SIN6_LEN
d62a17ae 69 su->sin6.sin6_len = sizeof(struct sockaddr_in6);
718e3744 70#endif /* SIN6_LEN */
d62a17ae 71 return 0;
72 }
73 return -1;
718e3744 74}
75
d62a17ae 76const char *sockunion2str(const union sockunion *su, char *buf, size_t len)
718e3744 77{
d62a17ae 78 switch (sockunion_family(su)) {
79 case AF_UNSPEC:
80 snprintf(buf, len, "(unspec)");
81 return buf;
82 case AF_INET:
83 return inet_ntop(AF_INET, &su->sin.sin_addr, buf, len);
84 case AF_INET6:
85 return inet_ntop(AF_INET6, &su->sin6.sin6_addr, buf, len);
86 }
87 snprintf(buf, len, "(af %d)", sockunion_family(su));
88 return buf;
718e3744 89}
90
d62a17ae 91union sockunion *sockunion_str2su(const char *str)
2fb2a455 92{
d62a17ae 93 union sockunion *su = XCALLOC(MTYPE_SOCKUNION, sizeof(union sockunion));
94
95 if (!str2sockunion(str, su))
96 return su;
97
98 XFREE(MTYPE_SOCKUNION, su);
99 return NULL;
2fb2a455
PJ
100}
101
1a7dcf42 102/* Convert IPv4 compatible IPv6 address to IPv4 address. */
d62a17ae 103static void sockunion_normalise_mapped(union sockunion *su)
104{
105 struct sockaddr_in sin;
106
107 if (su->sa.sa_family == AF_INET6
108 && IN6_IS_ADDR_V4MAPPED(&su->sin6.sin6_addr)) {
109 memset(&sin, 0, sizeof(struct sockaddr_in));
110 sin.sin_family = AF_INET;
111 sin.sin_port = su->sin6.sin6_port;
112 memcpy(&sin.sin_addr, ((char *)&su->sin6.sin6_addr) + 12, 4);
113 memcpy(su, &sin, sizeof(struct sockaddr_in));
114 }
1a7dcf42
PJ
115}
116
fc9707c3 117/* return sockunion structure : this function should be revised. */
d62a17ae 118static const char *sockunion_log(const union sockunion *su, char *buf,
119 size_t len)
fc9707c3 120{
d62a17ae 121 switch (su->sa.sa_family) {
122 case AF_INET:
123 return inet_ntop(AF_INET, &su->sin.sin_addr, buf, len);
fc9707c3 124
d62a17ae 125 case AF_INET6:
126 return inet_ntop(AF_INET6, &(su->sin6.sin6_addr), buf, len);
fc9707c3 127
d62a17ae 128 default:
129 snprintf(buf, len, "af_unknown %d ", su->sa.sa_family);
130 return buf;
131 }
fc9707c3
DW
132}
133
718e3744 134/* Return socket of sockunion. */
d62a17ae 135int sockunion_socket(const union sockunion *su)
718e3744 136{
d62a17ae 137 int sock;
718e3744 138
d62a17ae 139 sock = socket(su->sa.sa_family, SOCK_STREAM, 0);
140 if (sock < 0) {
141 char buf[SU_ADDRSTRLEN];
450971aa 142 flog_err(EC_LIB_SOCKET, "Can't make socket for %s : %s",
1b5e2f89
DS
143 sockunion_log(su, buf, SU_ADDRSTRLEN),
144 safe_strerror(errno));
d62a17ae 145 return -1;
146 }
718e3744 147
d62a17ae 148 return sock;
718e3744 149}
150
151/* Return accepted new socket file descriptor. */
d62a17ae 152int sockunion_accept(int sock, union sockunion *su)
718e3744 153{
d62a17ae 154 socklen_t len;
155 int client_sock;
718e3744 156
d62a17ae 157 len = sizeof(union sockunion);
158 client_sock = accept(sock, (struct sockaddr *)su, &len);
159
160 sockunion_normalise_mapped(su);
161 return client_sock;
718e3744 162}
163
164/* Return sizeof union sockunion. */
862f2f37 165int sockunion_sizeof(const union sockunion *su)
d62a17ae 166{
167 int ret;
168
169 ret = 0;
170 switch (su->sa.sa_family) {
171 case AF_INET:
172 ret = sizeof(struct sockaddr_in);
173 break;
174 case AF_INET6:
175 ret = sizeof(struct sockaddr_in6);
176 break;
177 }
178 return ret;
718e3744 179}
180
b11b5772 181/* Performs a non-blocking connect(). */
d62a17ae 182enum connect_result sockunion_connect(int fd, const union sockunion *peersu,
183 unsigned short port, ifindex_t ifindex)
184{
185 int ret;
d62a17ae 186 union sockunion su;
187
188 memcpy(&su, peersu, sizeof(union sockunion));
189
190 switch (su.sa.sa_family) {
191 case AF_INET:
192 su.sin.sin_port = port;
193 break;
194 case AF_INET6:
195 su.sin6.sin6_port = port;
718e3744 196#ifdef KAME
d62a17ae 197 if (IN6_IS_ADDR_LINKLOCAL(&su.sin6.sin6_addr) && ifindex) {
198 su.sin6.sin6_scope_id = ifindex;
199 SET_IN6_LINKLOCAL_IFINDEX(su.sin6.sin6_addr, ifindex);
200 }
718e3744 201#endif /* KAME */
d62a17ae 202 break;
203 }
204
d62a17ae 205 /* Call connect function. */
206 ret = connect(fd, (struct sockaddr *)&su, sockunion_sizeof(&su));
207
208 /* Immediate success */
b11b5772 209 if (ret == 0)
d62a17ae 210 return connect_success;
d62a17ae 211
212 /* If connect is in progress then return 1 else it's real error. */
213 if (ret < 0) {
214 if (errno != EINPROGRESS) {
215 char str[SU_ADDRSTRLEN];
216 zlog_info("can't connect to %s fd %d : %s",
0d6f7fd6 217 sockunion_log(&su, str, sizeof(str)), fd,
d62a17ae 218 safe_strerror(errno));
219 return connect_error;
220 }
718e3744 221 }
718e3744 222
d62a17ae 223 return connect_in_progress;
718e3744 224}
225
226/* Make socket from sockunion union. */
d62a17ae 227int sockunion_stream_socket(union sockunion *su)
718e3744 228{
d62a17ae 229 int sock;
718e3744 230
d62a17ae 231 if (su->sa.sa_family == 0)
232 su->sa.sa_family = AF_INET_UNION;
718e3744 233
d62a17ae 234 sock = socket(su->sa.sa_family, SOCK_STREAM, 0);
718e3744 235
d62a17ae 236 if (sock < 0)
450971aa 237 flog_err(EC_LIB_SOCKET,
1b5e2f89 238 "can't make socket sockunion_stream_socket");
718e3744 239
d62a17ae 240 return sock;
718e3744 241}
242
243/* Bind socket to specified address. */
d62a17ae 244int sockunion_bind(int sock, union sockunion *su, unsigned short port,
245 union sockunion *su_addr)
718e3744 246{
d62a17ae 247 int size = 0;
248 int ret;
718e3744 249
d62a17ae 250 if (su->sa.sa_family == AF_INET) {
251 size = sizeof(struct sockaddr_in);
252 su->sin.sin_port = htons(port);
6f0e3f6e 253#ifdef HAVE_STRUCT_SOCKADDR_IN_SIN_LEN
d62a17ae 254 su->sin.sin_len = size;
6f0e3f6e 255#endif /* HAVE_STRUCT_SOCKADDR_IN_SIN_LEN */
d62a17ae 256 if (su_addr == NULL)
257 sockunion2ip(su) = htonl(INADDR_ANY);
258 } else if (su->sa.sa_family == AF_INET6) {
259 size = sizeof(struct sockaddr_in6);
260 su->sin6.sin6_port = htons(port);
718e3744 261#ifdef SIN6_LEN
d62a17ae 262 su->sin6.sin6_len = size;
718e3744 263#endif /* SIN6_LEN */
d62a17ae 264 if (su_addr == NULL) {
1cbb5dfc 265#ifdef LINUX_IPV6
d62a17ae 266 memset(&su->sin6.sin6_addr, 0, sizeof(struct in6_addr));
718e3744 267#else
d62a17ae 268 su->sin6.sin6_addr = in6addr_any;
718e3744 269#endif /* LINUX_IPV6 */
d62a17ae 270 }
718e3744 271 }
718e3744 272
d62a17ae 273 ret = bind(sock, (struct sockaddr *)su, size);
274 if (ret < 0) {
275 char buf[SU_ADDRSTRLEN];
450971aa 276 flog_err(EC_LIB_SOCKET, "can't bind socket for %s : %s",
1b5e2f89
DS
277 sockunion_log(su, buf, SU_ADDRSTRLEN),
278 safe_strerror(errno));
d62a17ae 279 }
718e3744 280
d62a17ae 281 return ret;
718e3744 282}
283
d62a17ae 284int sockopt_reuseaddr(int sock)
718e3744 285{
d62a17ae 286 int ret;
287 int on = 1;
718e3744 288
d62a17ae 289 ret = setsockopt(sock, SOL_SOCKET, SO_REUSEADDR, (void *)&on,
290 sizeof(on));
291 if (ret < 0) {
450971aa 292 flog_err(EC_LIB_SOCKET,
1b5e2f89 293 "can't set sockopt SO_REUSEADDR to socket %d", sock);
d62a17ae 294 return -1;
295 }
296 return 0;
718e3744 297}
298
299#ifdef SO_REUSEPORT
d62a17ae 300int sockopt_reuseport(int sock)
718e3744 301{
d62a17ae 302 int ret;
303 int on = 1;
718e3744 304
d62a17ae 305 ret = setsockopt(sock, SOL_SOCKET, SO_REUSEPORT, (void *)&on,
306 sizeof(on));
307 if (ret < 0) {
450971aa 308 flog_err(EC_LIB_SOCKET,
1b5e2f89 309 "can't set sockopt SO_REUSEPORT to socket %d", sock);
d62a17ae 310 return -1;
311 }
312 return 0;
718e3744 313}
314#else
d62a17ae 315int sockopt_reuseport(int sock)
718e3744 316{
d62a17ae 317 return 0;
718e3744 318}
319#endif /* 0 */
320
d62a17ae 321int sockopt_ttl(int family, int sock, int ttl)
718e3744 322{
d62a17ae 323 int ret;
718e3744 324
325#ifdef IP_TTL
d62a17ae 326 if (family == AF_INET) {
327 ret = setsockopt(sock, IPPROTO_IP, IP_TTL, (void *)&ttl,
328 sizeof(int));
329 if (ret < 0) {
450971aa 330 flog_err(EC_LIB_SOCKET,
1b5e2f89 331 "can't set sockopt IP_TTL %d to socket %d",
ade6974d 332 ttl, sock);
d62a17ae 333 return -1;
334 }
335 return 0;
718e3744 336 }
718e3744 337#endif /* IP_TTL */
d62a17ae 338 if (family == AF_INET6) {
339 ret = setsockopt(sock, IPPROTO_IPV6, IPV6_UNICAST_HOPS,
340 (void *)&ttl, sizeof(int));
341 if (ret < 0) {
ade6974d 342 flog_err(
450971aa 343 EC_LIB_SOCKET,
ade6974d
QY
344 "can't set sockopt IPV6_UNICAST_HOPS %d to socket %d",
345 ttl, sock);
d62a17ae 346 return -1;
347 }
348 return 0;
718e3744 349 }
d62a17ae 350 return 0;
718e3744 351}
352
c62232b4
DS
353/*
354 * This function called setsockopt(.., TCP_CORK,...)
355 * Which on linux is a no-op since it is enabled by
356 * default and on BSD it uses TCP_NOPUSH to do
357 * the same thing( which it was not configured to
0437e105 358 * use). This cleanup of the api occurred on 8/1/17
c62232b4
DS
359 * I imagine if after more than 1 year of no-one
360 * complaining, and a major upgrade release we
361 * can deprecate and remove this function call
362 */
d62a17ae 363int sockopt_cork(int sock, int onoff)
58192df7 364{
d62a17ae 365 return 0;
ed40466a
DS
366}
367
d62a17ae 368int sockopt_minttl(int family, int sock, int minttl)
fa411a21 369{
89b6d1f8 370#ifdef IP_MINTTL
d62a17ae 371 if (family == AF_INET) {
372 int ret = setsockopt(sock, IPPROTO_IP, IP_MINTTL, &minttl,
373 sizeof(minttl));
374 if (ret < 0)
ade6974d 375 flog_err(
450971aa 376 EC_LIB_SOCKET,
ade6974d
QY
377 "can't set sockopt IP_MINTTL to %d on socket %d: %s",
378 minttl, sock, safe_strerror(errno));
d62a17ae 379 return ret;
380 }
d876bdf4 381#endif /* IP_MINTTL */
d8dc5257 382#ifdef IPV6_MINHOPCOUNT
d62a17ae 383 if (family == AF_INET6) {
384 int ret = setsockopt(sock, IPPROTO_IPV6, IPV6_MINHOPCOUNT,
385 &minttl, sizeof(minttl));
386 if (ret < 0)
ade6974d 387 flog_err(
450971aa 388 EC_LIB_SOCKET,
ade6974d
QY
389 "can't set sockopt IPV6_MINHOPCOUNT to %d on socket %d: %s",
390 minttl, sock, safe_strerror(errno));
d62a17ae 391 return ret;
392 }
d876bdf4 393#endif
fa411a21 394
d62a17ae 395 errno = EOPNOTSUPP;
396 return -1;
fa411a21
NH
397}
398
d62a17ae 399int sockopt_v6only(int family, int sock)
ca051269 400{
d62a17ae 401 int ret, on = 1;
ca051269 402
ca051269 403#ifdef IPV6_V6ONLY
d62a17ae 404 if (family == AF_INET6) {
405 ret = setsockopt(sock, IPPROTO_IPV6, IPV6_V6ONLY, (void *)&on,
406 sizeof(int));
407 if (ret < 0) {
450971aa 408 flog_err(EC_LIB_SOCKET,
1b5e2f89
DS
409 "can't set sockopt IPV6_V6ONLY "
410 "to socket %d",
411 sock);
d62a17ae 412 return -1;
413 }
414 return 0;
ca051269 415 }
ca051269 416#endif /* IPV6_V6ONLY */
d62a17ae 417 return 0;
ca051269
DL
418}
419
718e3744 420/* If same family and same prefix return 1. */
d62a17ae 421int sockunion_same(const union sockunion *su1, const union sockunion *su2)
422{
423 int ret = 0;
424
425 if (su1->sa.sa_family != su2->sa.sa_family)
426 return 0;
427
428 switch (su1->sa.sa_family) {
429 case AF_INET:
430 ret = memcmp(&su1->sin.sin_addr, &su2->sin.sin_addr,
431 sizeof(struct in_addr));
432 break;
433 case AF_INET6:
434 ret = memcmp(&su1->sin6.sin6_addr, &su2->sin6.sin6_addr,
435 sizeof(struct in6_addr));
436 if ((ret == 0) && IN6_IS_ADDR_LINKLOCAL(&su1->sin6.sin6_addr)) {
437 /* compare interface indices */
438 if (su1->sin6.sin6_scope_id && su2->sin6.sin6_scope_id)
439 ret = (su1->sin6.sin6_scope_id
440 == su2->sin6.sin6_scope_id)
441 ? 0
442 : 1;
443 }
444 break;
f2345335 445 }
d62a17ae 446 if (ret == 0)
447 return 1;
448 else
449 return 0;
718e3744 450}
451
d62a17ae 452unsigned int sockunion_hash(const union sockunion *su)
7cb5cdbb 453{
d62a17ae 454 switch (sockunion_family(su)) {
455 case AF_INET:
456 return jhash_1word(su->sin.sin_addr.s_addr, 0);
457 case AF_INET6:
458 return jhash2(su->sin6.sin6_addr.s6_addr32,
7e3a1ec7 459 array_size(su->sin6.sin6_addr.s6_addr32), 0);
d62a17ae 460 }
461 return 0;
7cb5cdbb
TT
462}
463
d62a17ae 464size_t family2addrsize(int family)
95e0999c 465{
d62a17ae 466 switch (family) {
467 case AF_INET:
468 return sizeof(struct in_addr);
469 case AF_INET6:
470 return sizeof(struct in6_addr);
471 }
472 return 0;
95e0999c
TT
473}
474
d62a17ae 475size_t sockunion_get_addrlen(const union sockunion *su)
95e0999c 476{
d62a17ae 477 return family2addrsize(sockunion_family(su));
95e0999c
TT
478}
479
d7c0a89a 480const uint8_t *sockunion_get_addr(const union sockunion *su)
95e0999c 481{
d62a17ae 482 switch (sockunion_family(su)) {
483 case AF_INET:
d7c0a89a 484 return (const uint8_t *)&su->sin.sin_addr.s_addr;
d62a17ae 485 case AF_INET6:
d7c0a89a 486 return (const uint8_t *)&su->sin6.sin6_addr;
d62a17ae 487 }
488 return NULL;
95e0999c
TT
489}
490
d7c0a89a 491void sockunion_set(union sockunion *su, int family, const uint8_t *addr,
d62a17ae 492 size_t bytes)
95e0999c 493{
d62a17ae 494 if (family2addrsize(family) != bytes)
495 return;
95e0999c 496
d62a17ae 497 sockunion_family(su) = family;
498 switch (family) {
499 case AF_INET:
500 memcpy(&su->sin.sin_addr.s_addr, addr, bytes);
501 break;
502 case AF_INET6:
503 memcpy(&su->sin6.sin6_addr, addr, bytes);
504 break;
505 }
95e0999c
TT
506}
507
718e3744 508/* After TCP connection is established. Get local address and port. */
d62a17ae 509union sockunion *sockunion_getsockname(int fd)
510{
511 int ret;
512 socklen_t len;
513 union {
514 struct sockaddr sa;
515 struct sockaddr_in sin;
516 struct sockaddr_in6 sin6;
517 char tmp_buffer[128];
518 } name;
519 union sockunion *su;
520
0d6f7fd6
DA
521 memset(&name, 0, sizeof(name));
522 len = sizeof(name);
d62a17ae 523
524 ret = getsockname(fd, (struct sockaddr *)&name, &len);
525 if (ret < 0) {
450971aa 526 flog_err(EC_LIB_SOCKET,
1b5e2f89
DS
527 "Can't get local address and port by getsockname: %s",
528 safe_strerror(errno));
d62a17ae 529 return NULL;
530 }
531
532 if (name.sa.sa_family == AF_INET) {
533 su = XCALLOC(MTYPE_SOCKUNION, sizeof(union sockunion));
534 memcpy(su, &name, sizeof(struct sockaddr_in));
535 return su;
536 }
537 if (name.sa.sa_family == AF_INET6) {
538 su = XCALLOC(MTYPE_SOCKUNION, sizeof(union sockunion));
539 memcpy(su, &name, sizeof(struct sockaddr_in6));
540 sockunion_normalise_mapped(su);
541 return su;
542 }
543 return NULL;
718e3744 544}
545
546/* After TCP connection is established. Get remote address and port. */
d62a17ae 547union sockunion *sockunion_getpeername(int fd)
548{
549 int ret;
550 socklen_t len;
551 union {
552 struct sockaddr sa;
553 struct sockaddr_in sin;
554 struct sockaddr_in6 sin6;
555 char tmp_buffer[128];
556 } name;
557 union sockunion *su;
558
0d6f7fd6
DA
559 memset(&name, 0, sizeof(name));
560 len = sizeof(name);
d62a17ae 561 ret = getpeername(fd, (struct sockaddr *)&name, &len);
562 if (ret < 0) {
1c50c1c0 563 flog_err(EC_LIB_SOCKET, "Can't get remote address and port: %s",
1b5e2f89 564 safe_strerror(errno));
d62a17ae 565 return NULL;
566 }
567
568 if (name.sa.sa_family == AF_INET) {
569 su = XCALLOC(MTYPE_SOCKUNION, sizeof(union sockunion));
570 memcpy(su, &name, sizeof(struct sockaddr_in));
571 return su;
572 }
573 if (name.sa.sa_family == AF_INET6) {
574 su = XCALLOC(MTYPE_SOCKUNION, sizeof(union sockunion));
575 memcpy(su, &name, sizeof(struct sockaddr_in6));
576 sockunion_normalise_mapped(su);
577 return su;
578 }
579 return NULL;
718e3744 580}
581
582/* Print sockunion structure */
d62a17ae 583static void __attribute__((unused)) sockunion_print(const union sockunion *su)
584{
585 if (su == NULL)
586 return;
587
588 switch (su->sa.sa_family) {
589 case AF_INET:
590 printf("%s\n", inet_ntoa(su->sin.sin_addr));
591 break;
592 case AF_INET6: {
593 char buf[SU_ADDRSTRLEN];
594
595 printf("%s\n", inet_ntop(AF_INET6, &(su->sin6.sin6_addr), buf,
596 sizeof(buf)));
597 } break;
718e3744 598
599#ifdef AF_LINK
d62a17ae 600 case AF_LINK: {
601 struct sockaddr_dl *sdl;
602
603 sdl = (struct sockaddr_dl *)&(su->sa);
604 printf("link#%d\n", sdl->sdl_index);
605 } break;
718e3744 606#endif /* AF_LINK */
d62a17ae 607 default:
608 printf("af_unknown %d\n", su->sa.sa_family);
609 break;
610 }
718e3744 611}
612
d62a17ae 613static int in6addr_cmp(const struct in6_addr *addr1,
614 const struct in6_addr *addr2)
718e3744 615{
d62a17ae 616 unsigned int i;
d7c0a89a 617 const uint8_t *p1, *p2;
718e3744 618
d7c0a89a
QY
619 p1 = (const uint8_t *)addr1;
620 p2 = (const uint8_t *)addr2;
718e3744 621
d62a17ae 622 for (i = 0; i < sizeof(struct in6_addr); i++) {
623 if (p1[i] > p2[i])
624 return 1;
625 else if (p1[i] < p2[i])
626 return -1;
627 }
628 return 0;
718e3744 629}
718e3744 630
d62a17ae 631int sockunion_cmp(const union sockunion *su1, const union sockunion *su2)
718e3744 632{
d62a17ae 633 if (su1->sa.sa_family > su2->sa.sa_family)
634 return 1;
635 if (su1->sa.sa_family < su2->sa.sa_family)
636 return -1;
718e3744 637
d62a17ae 638 if (su1->sa.sa_family == AF_INET) {
639 if (ntohl(sockunion2ip(su1)) == ntohl(sockunion2ip(su2)))
640 return 0;
641 if (ntohl(sockunion2ip(su1)) > ntohl(sockunion2ip(su2)))
642 return 1;
643 else
644 return -1;
645 }
646 if (su1->sa.sa_family == AF_INET6)
647 return in6addr_cmp(&su1->sin6.sin6_addr, &su2->sin6.sin6_addr);
718e3744 648 return 0;
718e3744 649}
650
651/* Duplicate sockunion. */
d62a17ae 652union sockunion *sockunion_dup(const union sockunion *su)
718e3744 653{
d62a17ae 654 union sockunion *dup =
655 XCALLOC(MTYPE_SOCKUNION, sizeof(union sockunion));
656 memcpy(dup, su, sizeof(union sockunion));
657 return dup;
718e3744 658}
659
d62a17ae 660void sockunion_free(union sockunion *su)
718e3744 661{
d62a17ae 662 XFREE(MTYPE_SOCKUNION, su);
718e3744 663}
dd793e4a 664
d62a17ae 665void sockunion_init(union sockunion *su)
dd793e4a 666{
d62a17ae 667 memset(su, 0, sizeof(union sockunion));
dd793e4a 668}