]> git.proxmox.com Git - mirror_frr.git/blame - lib/sockunion.c
lib: Add errno details to the sockopt_reuseaddr api
[mirror_frr.git] / lib / sockunion.c
CommitLineData
718e3744 1/* Socket union related function.
2 * Copyright (c) 1997, 98 Kunihiro Ishiguro
3 *
4 * This file is part of GNU Zebra.
5 *
6 * GNU Zebra is free software; you can redistribute it and/or modify it
7 * under the terms of the GNU General Public License as published by the
8 * Free Software Foundation; either version 2, or (at your option) any
9 * later version.
10 *
11 * GNU Zebra is distributed in the hope that it will be useful, but
12 * WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
14 * General Public License for more details.
15 *
896014f4
DL
16 * You should have received a copy of the GNU General Public License along
17 * with this program; see the file COPYING; if not, write to the Free Software
18 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
718e3744 19 */
20
21#include <zebra.h>
22
23#include "prefix.h"
24#include "vty.h"
25#include "sockunion.h"
26#include "memory.h"
718e3744 27#include "log.h"
7cb5cdbb 28#include "jhash.h"
174482ef 29#include "lib_errors.h"
02f686ff 30#include "printfrr.h"
718e3744 31
bf8d3d6a 32DEFINE_MTYPE_STATIC(LIB, SOCKUNION, "Socket union");
4a1ab8e4 33
d62a17ae 34const char *inet_sutop(const union sockunion *su, char *str)
35{
36 switch (su->sa.sa_family) {
37 case AF_INET:
38 inet_ntop(AF_INET, &su->sin.sin_addr, str, INET_ADDRSTRLEN);
39 break;
40 case AF_INET6:
41 inet_ntop(AF_INET6, &su->sin6.sin6_addr, str, INET6_ADDRSTRLEN);
42 break;
43 }
44 return str;
718e3744 45}
46
d62a17ae 47int str2sockunion(const char *str, union sockunion *su)
718e3744 48{
d62a17ae 49 int ret;
718e3744 50
d1f92e45 51 if (str == NULL)
52 return -1;
53
d62a17ae 54 memset(su, 0, sizeof(union sockunion));
718e3744 55
d62a17ae 56 ret = inet_pton(AF_INET, str, &su->sin.sin_addr);
57 if (ret > 0) /* Valid IPv4 address format. */
58 {
59 su->sin.sin_family = AF_INET;
6f0e3f6e 60#ifdef HAVE_STRUCT_SOCKADDR_IN_SIN_LEN
d62a17ae 61 su->sin.sin_len = sizeof(struct sockaddr_in);
6f0e3f6e 62#endif /* HAVE_STRUCT_SOCKADDR_IN_SIN_LEN */
d62a17ae 63 return 0;
64 }
65 ret = inet_pton(AF_INET6, str, &su->sin6.sin6_addr);
66 if (ret > 0) /* Valid IPv6 address format. */
67 {
68 su->sin6.sin6_family = AF_INET6;
718e3744 69#ifdef SIN6_LEN
d62a17ae 70 su->sin6.sin6_len = sizeof(struct sockaddr_in6);
718e3744 71#endif /* SIN6_LEN */
d62a17ae 72 return 0;
73 }
74 return -1;
718e3744 75}
76
d62a17ae 77const char *sockunion2str(const union sockunion *su, char *buf, size_t len)
718e3744 78{
d62a17ae 79 switch (sockunion_family(su)) {
80 case AF_UNSPEC:
81 snprintf(buf, len, "(unspec)");
82 return buf;
83 case AF_INET:
84 return inet_ntop(AF_INET, &su->sin.sin_addr, buf, len);
85 case AF_INET6:
86 return inet_ntop(AF_INET6, &su->sin6.sin6_addr, buf, len);
87 }
88 snprintf(buf, len, "(af %d)", sockunion_family(su));
89 return buf;
718e3744 90}
91
d62a17ae 92union sockunion *sockunion_str2su(const char *str)
2fb2a455 93{
d62a17ae 94 union sockunion *su = XCALLOC(MTYPE_SOCKUNION, sizeof(union sockunion));
95
96 if (!str2sockunion(str, su))
97 return su;
98
99 XFREE(MTYPE_SOCKUNION, su);
100 return NULL;
2fb2a455
PJ
101}
102
1a7dcf42 103/* Convert IPv4 compatible IPv6 address to IPv4 address. */
d62a17ae 104static void sockunion_normalise_mapped(union sockunion *su)
105{
106 struct sockaddr_in sin;
107
108 if (su->sa.sa_family == AF_INET6
109 && IN6_IS_ADDR_V4MAPPED(&su->sin6.sin6_addr)) {
6006b807 110 memset(&sin, 0, sizeof(sin));
d62a17ae 111 sin.sin_family = AF_INET;
112 sin.sin_port = su->sin6.sin6_port;
113 memcpy(&sin.sin_addr, ((char *)&su->sin6.sin6_addr) + 12, 4);
114 memcpy(su, &sin, sizeof(struct sockaddr_in));
115 }
1a7dcf42
PJ
116}
117
fc9707c3 118/* return sockunion structure : this function should be revised. */
d62a17ae 119static const char *sockunion_log(const union sockunion *su, char *buf,
120 size_t len)
fc9707c3 121{
d62a17ae 122 switch (su->sa.sa_family) {
123 case AF_INET:
124 return inet_ntop(AF_INET, &su->sin.sin_addr, buf, len);
fc9707c3 125
d62a17ae 126 case AF_INET6:
127 return inet_ntop(AF_INET6, &(su->sin6.sin6_addr), buf, len);
fc9707c3 128
d62a17ae 129 default:
130 snprintf(buf, len, "af_unknown %d ", su->sa.sa_family);
131 return buf;
132 }
fc9707c3
DW
133}
134
718e3744 135/* Return socket of sockunion. */
d62a17ae 136int sockunion_socket(const union sockunion *su)
718e3744 137{
d62a17ae 138 int sock;
718e3744 139
d62a17ae 140 sock = socket(su->sa.sa_family, SOCK_STREAM, 0);
141 if (sock < 0) {
142 char buf[SU_ADDRSTRLEN];
450971aa 143 flog_err(EC_LIB_SOCKET, "Can't make socket for %s : %s",
1b5e2f89
DS
144 sockunion_log(su, buf, SU_ADDRSTRLEN),
145 safe_strerror(errno));
d62a17ae 146 return -1;
147 }
718e3744 148
d62a17ae 149 return sock;
718e3744 150}
151
152/* Return accepted new socket file descriptor. */
d62a17ae 153int sockunion_accept(int sock, union sockunion *su)
718e3744 154{
d62a17ae 155 socklen_t len;
156 int client_sock;
718e3744 157
d62a17ae 158 len = sizeof(union sockunion);
159 client_sock = accept(sock, (struct sockaddr *)su, &len);
160
161 sockunion_normalise_mapped(su);
162 return client_sock;
718e3744 163}
164
165/* Return sizeof union sockunion. */
862f2f37 166int sockunion_sizeof(const union sockunion *su)
d62a17ae 167{
168 int ret;
169
170 ret = 0;
171 switch (su->sa.sa_family) {
172 case AF_INET:
173 ret = sizeof(struct sockaddr_in);
174 break;
175 case AF_INET6:
176 ret = sizeof(struct sockaddr_in6);
177 break;
178 }
179 return ret;
718e3744 180}
181
b11b5772 182/* Performs a non-blocking connect(). */
d62a17ae 183enum connect_result sockunion_connect(int fd, const union sockunion *peersu,
184 unsigned short port, ifindex_t ifindex)
185{
186 int ret;
d62a17ae 187 union sockunion su;
188
189 memcpy(&su, peersu, sizeof(union sockunion));
190
191 switch (su.sa.sa_family) {
192 case AF_INET:
193 su.sin.sin_port = port;
194 break;
195 case AF_INET6:
196 su.sin6.sin6_port = port;
718e3744 197#ifdef KAME
d62a17ae 198 if (IN6_IS_ADDR_LINKLOCAL(&su.sin6.sin6_addr) && ifindex) {
199 su.sin6.sin6_scope_id = ifindex;
200 SET_IN6_LINKLOCAL_IFINDEX(su.sin6.sin6_addr, ifindex);
201 }
718e3744 202#endif /* KAME */
d62a17ae 203 break;
204 }
205
d62a17ae 206 /* Call connect function. */
207 ret = connect(fd, (struct sockaddr *)&su, sockunion_sizeof(&su));
208
209 /* Immediate success */
b11b5772 210 if (ret == 0)
d62a17ae 211 return connect_success;
d62a17ae 212
213 /* If connect is in progress then return 1 else it's real error. */
214 if (ret < 0) {
215 if (errno != EINPROGRESS) {
216 char str[SU_ADDRSTRLEN];
217 zlog_info("can't connect to %s fd %d : %s",
0d6f7fd6 218 sockunion_log(&su, str, sizeof(str)), fd,
d62a17ae 219 safe_strerror(errno));
220 return connect_error;
221 }
718e3744 222 }
718e3744 223
d62a17ae 224 return connect_in_progress;
718e3744 225}
226
227/* Make socket from sockunion union. */
d62a17ae 228int sockunion_stream_socket(union sockunion *su)
718e3744 229{
d62a17ae 230 int sock;
718e3744 231
d62a17ae 232 if (su->sa.sa_family == 0)
233 su->sa.sa_family = AF_INET_UNION;
718e3744 234
d62a17ae 235 sock = socket(su->sa.sa_family, SOCK_STREAM, 0);
718e3744 236
d62a17ae 237 if (sock < 0)
450971aa 238 flog_err(EC_LIB_SOCKET,
1b5e2f89 239 "can't make socket sockunion_stream_socket");
718e3744 240
d62a17ae 241 return sock;
718e3744 242}
243
244/* Bind socket to specified address. */
d62a17ae 245int sockunion_bind(int sock, union sockunion *su, unsigned short port,
246 union sockunion *su_addr)
718e3744 247{
d62a17ae 248 int size = 0;
249 int ret;
718e3744 250
d62a17ae 251 if (su->sa.sa_family == AF_INET) {
252 size = sizeof(struct sockaddr_in);
253 su->sin.sin_port = htons(port);
6f0e3f6e 254#ifdef HAVE_STRUCT_SOCKADDR_IN_SIN_LEN
d62a17ae 255 su->sin.sin_len = size;
6f0e3f6e 256#endif /* HAVE_STRUCT_SOCKADDR_IN_SIN_LEN */
d62a17ae 257 if (su_addr == NULL)
258 sockunion2ip(su) = htonl(INADDR_ANY);
259 } else if (su->sa.sa_family == AF_INET6) {
260 size = sizeof(struct sockaddr_in6);
261 su->sin6.sin6_port = htons(port);
718e3744 262#ifdef SIN6_LEN
d62a17ae 263 su->sin6.sin6_len = size;
718e3744 264#endif /* SIN6_LEN */
d62a17ae 265 if (su_addr == NULL) {
1cbb5dfc 266#ifdef LINUX_IPV6
d62a17ae 267 memset(&su->sin6.sin6_addr, 0, sizeof(struct in6_addr));
718e3744 268#else
d62a17ae 269 su->sin6.sin6_addr = in6addr_any;
718e3744 270#endif /* LINUX_IPV6 */
d62a17ae 271 }
718e3744 272 }
718e3744 273
d62a17ae 274 ret = bind(sock, (struct sockaddr *)su, size);
275 if (ret < 0) {
276 char buf[SU_ADDRSTRLEN];
450971aa 277 flog_err(EC_LIB_SOCKET, "can't bind socket for %s : %s",
1b5e2f89
DS
278 sockunion_log(su, buf, SU_ADDRSTRLEN),
279 safe_strerror(errno));
d62a17ae 280 }
718e3744 281
d62a17ae 282 return ret;
718e3744 283}
284
d62a17ae 285int sockopt_reuseaddr(int sock)
718e3744 286{
d62a17ae 287 int ret;
288 int on = 1;
718e3744 289
d62a17ae 290 ret = setsockopt(sock, SOL_SOCKET, SO_REUSEADDR, (void *)&on,
291 sizeof(on));
292 if (ret < 0) {
7cf66a22
MR
293 flog_err(
294 EC_LIB_SOCKET,
295 "can't set sockopt SO_REUSEADDR to socket %d errno=%d: %s",
296 sock, errno, safe_strerror(errno));
d62a17ae 297 return -1;
298 }
299 return 0;
718e3744 300}
301
302#ifdef SO_REUSEPORT
d62a17ae 303int sockopt_reuseport(int sock)
718e3744 304{
d62a17ae 305 int ret;
306 int on = 1;
718e3744 307
d62a17ae 308 ret = setsockopt(sock, SOL_SOCKET, SO_REUSEPORT, (void *)&on,
309 sizeof(on));
310 if (ret < 0) {
450971aa 311 flog_err(EC_LIB_SOCKET,
1b5e2f89 312 "can't set sockopt SO_REUSEPORT to socket %d", sock);
d62a17ae 313 return -1;
314 }
315 return 0;
718e3744 316}
317#else
d62a17ae 318int sockopt_reuseport(int sock)
718e3744 319{
d62a17ae 320 return 0;
718e3744 321}
322#endif /* 0 */
323
d62a17ae 324int sockopt_ttl(int family, int sock, int ttl)
718e3744 325{
d62a17ae 326 int ret;
718e3744 327
328#ifdef IP_TTL
d62a17ae 329 if (family == AF_INET) {
330 ret = setsockopt(sock, IPPROTO_IP, IP_TTL, (void *)&ttl,
331 sizeof(int));
332 if (ret < 0) {
450971aa 333 flog_err(EC_LIB_SOCKET,
1b5e2f89 334 "can't set sockopt IP_TTL %d to socket %d",
ade6974d 335 ttl, sock);
d62a17ae 336 return -1;
337 }
338 return 0;
718e3744 339 }
718e3744 340#endif /* IP_TTL */
d62a17ae 341 if (family == AF_INET6) {
342 ret = setsockopt(sock, IPPROTO_IPV6, IPV6_UNICAST_HOPS,
343 (void *)&ttl, sizeof(int));
344 if (ret < 0) {
ade6974d 345 flog_err(
450971aa 346 EC_LIB_SOCKET,
ade6974d
QY
347 "can't set sockopt IPV6_UNICAST_HOPS %d to socket %d",
348 ttl, sock);
d62a17ae 349 return -1;
350 }
351 return 0;
718e3744 352 }
d62a17ae 353 return 0;
718e3744 354}
355
d62a17ae 356int sockopt_minttl(int family, int sock, int minttl)
fa411a21 357{
89b6d1f8 358#ifdef IP_MINTTL
d62a17ae 359 if (family == AF_INET) {
360 int ret = setsockopt(sock, IPPROTO_IP, IP_MINTTL, &minttl,
361 sizeof(minttl));
362 if (ret < 0)
ade6974d 363 flog_err(
450971aa 364 EC_LIB_SOCKET,
ade6974d
QY
365 "can't set sockopt IP_MINTTL to %d on socket %d: %s",
366 minttl, sock, safe_strerror(errno));
d62a17ae 367 return ret;
368 }
d876bdf4 369#endif /* IP_MINTTL */
d8dc5257 370#ifdef IPV6_MINHOPCOUNT
d62a17ae 371 if (family == AF_INET6) {
372 int ret = setsockopt(sock, IPPROTO_IPV6, IPV6_MINHOPCOUNT,
373 &minttl, sizeof(minttl));
374 if (ret < 0)
ade6974d 375 flog_err(
450971aa 376 EC_LIB_SOCKET,
ade6974d
QY
377 "can't set sockopt IPV6_MINHOPCOUNT to %d on socket %d: %s",
378 minttl, sock, safe_strerror(errno));
d62a17ae 379 return ret;
380 }
d876bdf4 381#endif
fa411a21 382
d62a17ae 383 errno = EOPNOTSUPP;
384 return -1;
fa411a21
NH
385}
386
d62a17ae 387int sockopt_v6only(int family, int sock)
ca051269 388{
d62a17ae 389 int ret, on = 1;
ca051269 390
ca051269 391#ifdef IPV6_V6ONLY
d62a17ae 392 if (family == AF_INET6) {
393 ret = setsockopt(sock, IPPROTO_IPV6, IPV6_V6ONLY, (void *)&on,
394 sizeof(int));
395 if (ret < 0) {
450971aa 396 flog_err(EC_LIB_SOCKET,
3efd0893 397 "can't set sockopt IPV6_V6ONLY to socket %d",
1b5e2f89 398 sock);
d62a17ae 399 return -1;
400 }
401 return 0;
ca051269 402 }
ca051269 403#endif /* IPV6_V6ONLY */
d62a17ae 404 return 0;
ca051269
DL
405}
406
718e3744 407/* If same family and same prefix return 1. */
d62a17ae 408int sockunion_same(const union sockunion *su1, const union sockunion *su2)
409{
410 int ret = 0;
411
412 if (su1->sa.sa_family != su2->sa.sa_family)
413 return 0;
414
415 switch (su1->sa.sa_family) {
416 case AF_INET:
417 ret = memcmp(&su1->sin.sin_addr, &su2->sin.sin_addr,
418 sizeof(struct in_addr));
419 break;
420 case AF_INET6:
421 ret = memcmp(&su1->sin6.sin6_addr, &su2->sin6.sin6_addr,
422 sizeof(struct in6_addr));
423 if ((ret == 0) && IN6_IS_ADDR_LINKLOCAL(&su1->sin6.sin6_addr)) {
424 /* compare interface indices */
425 if (su1->sin6.sin6_scope_id && su2->sin6.sin6_scope_id)
426 ret = (su1->sin6.sin6_scope_id
427 == su2->sin6.sin6_scope_id)
428 ? 0
429 : 1;
430 }
431 break;
f2345335 432 }
d62a17ae 433 if (ret == 0)
434 return 1;
435 else
436 return 0;
718e3744 437}
438
d62a17ae 439unsigned int sockunion_hash(const union sockunion *su)
7cb5cdbb 440{
d62a17ae 441 switch (sockunion_family(su)) {
442 case AF_INET:
443 return jhash_1word(su->sin.sin_addr.s_addr, 0);
444 case AF_INET6:
445 return jhash2(su->sin6.sin6_addr.s6_addr32,
7e3a1ec7 446 array_size(su->sin6.sin6_addr.s6_addr32), 0);
d62a17ae 447 }
448 return 0;
7cb5cdbb
TT
449}
450
d62a17ae 451size_t family2addrsize(int family)
95e0999c 452{
d62a17ae 453 switch (family) {
454 case AF_INET:
455 return sizeof(struct in_addr);
456 case AF_INET6:
457 return sizeof(struct in6_addr);
458 }
459 return 0;
95e0999c
TT
460}
461
d62a17ae 462size_t sockunion_get_addrlen(const union sockunion *su)
95e0999c 463{
d62a17ae 464 return family2addrsize(sockunion_family(su));
95e0999c
TT
465}
466
d7c0a89a 467const uint8_t *sockunion_get_addr(const union sockunion *su)
95e0999c 468{
d62a17ae 469 switch (sockunion_family(su)) {
470 case AF_INET:
d7c0a89a 471 return (const uint8_t *)&su->sin.sin_addr.s_addr;
d62a17ae 472 case AF_INET6:
d7c0a89a 473 return (const uint8_t *)&su->sin6.sin6_addr;
d62a17ae 474 }
475 return NULL;
95e0999c
TT
476}
477
d7c0a89a 478void sockunion_set(union sockunion *su, int family, const uint8_t *addr,
d62a17ae 479 size_t bytes)
95e0999c 480{
d62a17ae 481 if (family2addrsize(family) != bytes)
482 return;
95e0999c 483
d62a17ae 484 sockunion_family(su) = family;
485 switch (family) {
486 case AF_INET:
487 memcpy(&su->sin.sin_addr.s_addr, addr, bytes);
488 break;
489 case AF_INET6:
490 memcpy(&su->sin6.sin6_addr, addr, bytes);
491 break;
492 }
95e0999c
TT
493}
494
718e3744 495/* After TCP connection is established. Get local address and port. */
d62a17ae 496union sockunion *sockunion_getsockname(int fd)
497{
498 int ret;
499 socklen_t len;
500 union {
501 struct sockaddr sa;
502 struct sockaddr_in sin;
503 struct sockaddr_in6 sin6;
504 char tmp_buffer[128];
505 } name;
506 union sockunion *su;
507
0d6f7fd6
DA
508 memset(&name, 0, sizeof(name));
509 len = sizeof(name);
d62a17ae 510
511 ret = getsockname(fd, (struct sockaddr *)&name, &len);
512 if (ret < 0) {
450971aa 513 flog_err(EC_LIB_SOCKET,
1b5e2f89
DS
514 "Can't get local address and port by getsockname: %s",
515 safe_strerror(errno));
d62a17ae 516 return NULL;
517 }
518
519 if (name.sa.sa_family == AF_INET) {
520 su = XCALLOC(MTYPE_SOCKUNION, sizeof(union sockunion));
521 memcpy(su, &name, sizeof(struct sockaddr_in));
522 return su;
523 }
524 if (name.sa.sa_family == AF_INET6) {
525 su = XCALLOC(MTYPE_SOCKUNION, sizeof(union sockunion));
526 memcpy(su, &name, sizeof(struct sockaddr_in6));
527 sockunion_normalise_mapped(su);
528 return su;
529 }
c08f5630
DS
530
531 flog_err(
532 EC_LIB_SOCKET,
533 "Unexpected AFI received(%d) for sockunion_getsockname call for fd: %d",
534 name.sa.sa_family, fd);
d62a17ae 535 return NULL;
718e3744 536}
537
538/* After TCP connection is established. Get remote address and port. */
d62a17ae 539union sockunion *sockunion_getpeername(int fd)
540{
541 int ret;
542 socklen_t len;
543 union {
544 struct sockaddr sa;
545 struct sockaddr_in sin;
546 struct sockaddr_in6 sin6;
547 char tmp_buffer[128];
548 } name;
549 union sockunion *su;
550
0d6f7fd6
DA
551 memset(&name, 0, sizeof(name));
552 len = sizeof(name);
d62a17ae 553 ret = getpeername(fd, (struct sockaddr *)&name, &len);
554 if (ret < 0) {
1c50c1c0 555 flog_err(EC_LIB_SOCKET, "Can't get remote address and port: %s",
1b5e2f89 556 safe_strerror(errno));
d62a17ae 557 return NULL;
558 }
559
560 if (name.sa.sa_family == AF_INET) {
561 su = XCALLOC(MTYPE_SOCKUNION, sizeof(union sockunion));
562 memcpy(su, &name, sizeof(struct sockaddr_in));
563 return su;
564 }
565 if (name.sa.sa_family == AF_INET6) {
566 su = XCALLOC(MTYPE_SOCKUNION, sizeof(union sockunion));
567 memcpy(su, &name, sizeof(struct sockaddr_in6));
568 sockunion_normalise_mapped(su);
569 return su;
570 }
c08f5630
DS
571
572 flog_err(
573 EC_LIB_SOCKET,
574 "Unexpected AFI received(%d) for sockunion_getpeername call for fd: %d",
575 name.sa.sa_family, fd);
d62a17ae 576 return NULL;
718e3744 577}
578
579/* Print sockunion structure */
d62a17ae 580static void __attribute__((unused)) sockunion_print(const union sockunion *su)
581{
582 if (su == NULL)
583 return;
584
585 switch (su->sa.sa_family) {
586 case AF_INET:
af3b34f6
DA
587 printf("%pI4\n", &su->sin.sin_addr);
588 break;
589 case AF_INET6:
590 printf("%pI6\n", &su->sin6.sin6_addr);
d62a17ae 591 break;
718e3744 592#ifdef AF_LINK
d62a17ae 593 case AF_LINK: {
594 struct sockaddr_dl *sdl;
595
596 sdl = (struct sockaddr_dl *)&(su->sa);
597 printf("link#%d\n", sdl->sdl_index);
598 } break;
718e3744 599#endif /* AF_LINK */
d62a17ae 600 default:
601 printf("af_unknown %d\n", su->sa.sa_family);
602 break;
603 }
718e3744 604}
605
62510c09 606int in6addr_cmp(const struct in6_addr *addr1, const struct in6_addr *addr2)
718e3744 607{
d62a17ae 608 unsigned int i;
d7c0a89a 609 const uint8_t *p1, *p2;
718e3744 610
d7c0a89a
QY
611 p1 = (const uint8_t *)addr1;
612 p2 = (const uint8_t *)addr2;
718e3744 613
d62a17ae 614 for (i = 0; i < sizeof(struct in6_addr); i++) {
615 if (p1[i] > p2[i])
616 return 1;
617 else if (p1[i] < p2[i])
618 return -1;
619 }
620 return 0;
718e3744 621}
718e3744 622
d62a17ae 623int sockunion_cmp(const union sockunion *su1, const union sockunion *su2)
718e3744 624{
d62a17ae 625 if (su1->sa.sa_family > su2->sa.sa_family)
626 return 1;
627 if (su1->sa.sa_family < su2->sa.sa_family)
628 return -1;
718e3744 629
d62a17ae 630 if (su1->sa.sa_family == AF_INET) {
631 if (ntohl(sockunion2ip(su1)) == ntohl(sockunion2ip(su2)))
632 return 0;
633 if (ntohl(sockunion2ip(su1)) > ntohl(sockunion2ip(su2)))
634 return 1;
635 else
636 return -1;
637 }
638 if (su1->sa.sa_family == AF_INET6)
639 return in6addr_cmp(&su1->sin6.sin6_addr, &su2->sin6.sin6_addr);
718e3744 640 return 0;
718e3744 641}
642
643/* Duplicate sockunion. */
d62a17ae 644union sockunion *sockunion_dup(const union sockunion *su)
718e3744 645{
d62a17ae 646 union sockunion *dup =
647 XCALLOC(MTYPE_SOCKUNION, sizeof(union sockunion));
648 memcpy(dup, su, sizeof(union sockunion));
649 return dup;
718e3744 650}
651
d62a17ae 652void sockunion_free(union sockunion *su)
718e3744 653{
d62a17ae 654 XFREE(MTYPE_SOCKUNION, su);
718e3744 655}
dd793e4a 656
d62a17ae 657void sockunion_init(union sockunion *su)
dd793e4a 658{
d62a17ae 659 memset(su, 0, sizeof(union sockunion));
dd793e4a 660}
02f686ff 661
54929fd3 662printfrr_ext_autoreg_p("SU", printfrr_psu);
3ea79430
DL
663static ssize_t printfrr_psu(struct fbuf *buf, struct printfrr_eargs *ea,
664 const void *ptr)
02f686ff
DL
665{
666 const union sockunion *su = ptr;
94f78404 667 bool include_port = false, include_scope = false;
02f686ff 668 bool endflags = false;
212e04e5
DL
669 ssize_t ret = 0;
670 char cbuf[INET6_ADDRSTRLEN];
671
672 if (!su)
eba599a3 673 return bputs(buf, "(null)");
212e04e5
DL
674
675 while (!endflags) {
3ea79430 676 switch (*ea->fmt) {
212e04e5 677 case 'p':
3ea79430 678 ea->fmt++;
212e04e5 679 include_port = true;
02f686ff 680 break;
94f78404
DL
681 case 's':
682 ea->fmt++;
683 include_scope = true;
684 break;
8e2c653e 685 default:
212e04e5
DL
686 endflags = true;
687 break;
02f686ff 688 }
212e04e5 689 }
02f686ff 690
212e04e5
DL
691 switch (sockunion_family(su)) {
692 case AF_UNSPEC:
693 ret += bputs(buf, "(unspec)");
694 break;
695 case AF_INET:
696 inet_ntop(AF_INET, &su->sin.sin_addr, cbuf, sizeof(cbuf));
697 ret += bputs(buf, cbuf);
698 if (include_port)
94f78404 699 ret += bprintfrr(buf, ":%d", ntohs(su->sin.sin_port));
212e04e5
DL
700 break;
701 case AF_INET6:
94f78404
DL
702 if (include_port)
703 ret += bputch(buf, '[');
212e04e5
DL
704 inet_ntop(AF_INET6, &su->sin6.sin6_addr, cbuf, sizeof(cbuf));
705 ret += bputs(buf, cbuf);
94f78404
DL
706 if (include_scope && su->sin6.sin6_scope_id)
707 ret += bprintfrr(buf, "%%%u",
708 (unsigned int)su->sin6.sin6_scope_id);
212e04e5 709 if (include_port)
94f78404
DL
710 ret += bprintfrr(buf, "]:%d",
711 ntohs(su->sin6.sin6_port));
712 break;
713 case AF_UNIX: {
714 int len;
715#ifdef __linux__
716 if (su->sun.sun_path[0] == '\0' && su->sun.sun_path[1]) {
717 len = strnlen(su->sun.sun_path + 1,
718 sizeof(su->sun.sun_path) - 1);
719 ret += bprintfrr(buf, "@%*pSE", len,
720 su->sun.sun_path + 1);
721 break;
722 }
723#endif
724 len = strnlen(su->sun.sun_path, sizeof(su->sun.sun_path));
725 ret += bprintfrr(buf, "%*pSE", len, su->sun.sun_path);
212e04e5 726 break;
94f78404 727 }
212e04e5
DL
728 default:
729 ret += bprintfrr(buf, "(af %d)", sockunion_family(su));
02f686ff
DL
730 }
731
212e04e5 732 return ret;
02f686ff 733}
ddd8d8c8
GG
734
735int sockunion_is_null(const union sockunion *su)
736{
737 unsigned char null_s6_addr[16] = {0};
738
739 switch (sockunion_family(su)) {
740 case AF_UNSPEC:
741 return 1;
742 case AF_INET:
743 return (su->sin.sin_addr.s_addr == 0);
744 case AF_INET6:
745 return !memcmp(su->sin6.sin6_addr.s6_addr, null_s6_addr,
746 sizeof(null_s6_addr));
747 default:
748 return 0;
749 }
750}
7b183fd8 751
54929fd3 752printfrr_ext_autoreg_i("PF", printfrr_pf);
7b183fd8
DL
753static ssize_t printfrr_pf(struct fbuf *buf, struct printfrr_eargs *ea,
754 uintmax_t val)
755{
756 switch (val) {
757 case AF_INET:
758 return bputs(buf, "AF_INET");
759 case AF_INET6:
760 return bputs(buf, "AF_INET6");
761 case AF_UNIX:
762 return bputs(buf, "AF_UNIX");
763#ifdef AF_PACKET
764 case AF_PACKET:
765 return bputs(buf, "AF_PACKET");
766#endif
767#ifdef AF_NETLINK
768 case AF_NETLINK:
769 return bputs(buf, "AF_NETLINK");
770#endif
771 }
772 return bprintfrr(buf, "AF_(%ju)", val);
773}
774
54929fd3 775printfrr_ext_autoreg_i("SO", printfrr_so);
7b183fd8
DL
776static ssize_t printfrr_so(struct fbuf *buf, struct printfrr_eargs *ea,
777 uintmax_t val)
778{
779 switch (val) {
780 case SOCK_STREAM:
781 return bputs(buf, "SOCK_STREAM");
782 case SOCK_DGRAM:
783 return bputs(buf, "SOCK_DGRAM");
784 case SOCK_SEQPACKET:
785 return bputs(buf, "SOCK_SEQPACKET");
786#ifdef SOCK_RAW
787 case SOCK_RAW:
788 return bputs(buf, "SOCK_RAW");
789#endif
790#ifdef SOCK_PACKET
791 case SOCK_PACKET:
792 return bputs(buf, "SOCK_PACKET");
793#endif
794 }
795 return bprintfrr(buf, "SOCK_(%ju)", val);
796}