]> git.proxmox.com Git - mirror_frr.git/blame - lib/sockunion.c
zebra, lib: fix the ZEBRA_INTERFACE_VRF_UPDATE zapi message
[mirror_frr.git] / lib / sockunion.c
CommitLineData
718e3744 1/* Socket union related function.
2 * Copyright (c) 1997, 98 Kunihiro Ishiguro
3 *
4 * This file is part of GNU Zebra.
5 *
6 * GNU Zebra is free software; you can redistribute it and/or modify it
7 * under the terms of the GNU General Public License as published by the
8 * Free Software Foundation; either version 2, or (at your option) any
9 * later version.
10 *
11 * GNU Zebra is distributed in the hope that it will be useful, but
12 * WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
14 * General Public License for more details.
15 *
896014f4
DL
16 * You should have received a copy of the GNU General Public License along
17 * with this program; see the file COPYING; if not, write to the Free Software
18 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
718e3744 19 */
20
21#include <zebra.h>
22
23#include "prefix.h"
24#include "vty.h"
25#include "sockunion.h"
26#include "memory.h"
718e3744 27#include "log.h"
7cb5cdbb 28#include "jhash.h"
174482ef 29#include "lib_errors.h"
718e3744 30
4a1ab8e4
DL
31DEFINE_MTYPE_STATIC(LIB, SOCKUNION, "Socket union")
32
d62a17ae 33const char *inet_sutop(const union sockunion *su, char *str)
34{
35 switch (su->sa.sa_family) {
36 case AF_INET:
37 inet_ntop(AF_INET, &su->sin.sin_addr, str, INET_ADDRSTRLEN);
38 break;
39 case AF_INET6:
40 inet_ntop(AF_INET6, &su->sin6.sin6_addr, str, INET6_ADDRSTRLEN);
41 break;
42 }
43 return str;
718e3744 44}
45
d62a17ae 46int str2sockunion(const char *str, union sockunion *su)
718e3744 47{
d62a17ae 48 int ret;
718e3744 49
d1f92e45 50 if (str == NULL)
51 return -1;
52
d62a17ae 53 memset(su, 0, sizeof(union sockunion));
718e3744 54
d62a17ae 55 ret = inet_pton(AF_INET, str, &su->sin.sin_addr);
56 if (ret > 0) /* Valid IPv4 address format. */
57 {
58 su->sin.sin_family = AF_INET;
6f0e3f6e 59#ifdef HAVE_STRUCT_SOCKADDR_IN_SIN_LEN
d62a17ae 60 su->sin.sin_len = sizeof(struct sockaddr_in);
6f0e3f6e 61#endif /* HAVE_STRUCT_SOCKADDR_IN_SIN_LEN */
d62a17ae 62 return 0;
63 }
64 ret = inet_pton(AF_INET6, str, &su->sin6.sin6_addr);
65 if (ret > 0) /* Valid IPv6 address format. */
66 {
67 su->sin6.sin6_family = AF_INET6;
718e3744 68#ifdef SIN6_LEN
d62a17ae 69 su->sin6.sin6_len = sizeof(struct sockaddr_in6);
718e3744 70#endif /* SIN6_LEN */
d62a17ae 71 return 0;
72 }
73 return -1;
718e3744 74}
75
d62a17ae 76const char *sockunion2str(const union sockunion *su, char *buf, size_t len)
718e3744 77{
d62a17ae 78 switch (sockunion_family(su)) {
79 case AF_UNSPEC:
80 snprintf(buf, len, "(unspec)");
81 return buf;
82 case AF_INET:
83 return inet_ntop(AF_INET, &su->sin.sin_addr, buf, len);
84 case AF_INET6:
85 return inet_ntop(AF_INET6, &su->sin6.sin6_addr, buf, len);
86 }
87 snprintf(buf, len, "(af %d)", sockunion_family(su));
88 return buf;
718e3744 89}
90
d62a17ae 91union sockunion *sockunion_str2su(const char *str)
2fb2a455 92{
d62a17ae 93 union sockunion *su = XCALLOC(MTYPE_SOCKUNION, sizeof(union sockunion));
94
95 if (!str2sockunion(str, su))
96 return su;
97
98 XFREE(MTYPE_SOCKUNION, su);
99 return NULL;
2fb2a455
PJ
100}
101
1a7dcf42 102/* Convert IPv4 compatible IPv6 address to IPv4 address. */
d62a17ae 103static void sockunion_normalise_mapped(union sockunion *su)
104{
105 struct sockaddr_in sin;
106
107 if (su->sa.sa_family == AF_INET6
108 && IN6_IS_ADDR_V4MAPPED(&su->sin6.sin6_addr)) {
109 memset(&sin, 0, sizeof(struct sockaddr_in));
110 sin.sin_family = AF_INET;
111 sin.sin_port = su->sin6.sin6_port;
112 memcpy(&sin.sin_addr, ((char *)&su->sin6.sin6_addr) + 12, 4);
113 memcpy(su, &sin, sizeof(struct sockaddr_in));
114 }
1a7dcf42
PJ
115}
116
fc9707c3 117/* return sockunion structure : this function should be revised. */
d62a17ae 118static const char *sockunion_log(const union sockunion *su, char *buf,
119 size_t len)
fc9707c3 120{
d62a17ae 121 switch (su->sa.sa_family) {
122 case AF_INET:
123 return inet_ntop(AF_INET, &su->sin.sin_addr, buf, len);
fc9707c3 124
d62a17ae 125 case AF_INET6:
126 return inet_ntop(AF_INET6, &(su->sin6.sin6_addr), buf, len);
127 break;
fc9707c3 128
d62a17ae 129 default:
130 snprintf(buf, len, "af_unknown %d ", su->sa.sa_family);
131 return buf;
132 }
fc9707c3
DW
133}
134
718e3744 135/* Return socket of sockunion. */
d62a17ae 136int sockunion_socket(const union sockunion *su)
718e3744 137{
d62a17ae 138 int sock;
718e3744 139
d62a17ae 140 sock = socket(su->sa.sa_family, SOCK_STREAM, 0);
141 if (sock < 0) {
142 char buf[SU_ADDRSTRLEN];
450971aa 143 flog_err(EC_LIB_SOCKET, "Can't make socket for %s : %s",
1b5e2f89
DS
144 sockunion_log(su, buf, SU_ADDRSTRLEN),
145 safe_strerror(errno));
d62a17ae 146 return -1;
147 }
718e3744 148
d62a17ae 149 return sock;
718e3744 150}
151
152/* Return accepted new socket file descriptor. */
d62a17ae 153int sockunion_accept(int sock, union sockunion *su)
718e3744 154{
d62a17ae 155 socklen_t len;
156 int client_sock;
718e3744 157
d62a17ae 158 len = sizeof(union sockunion);
159 client_sock = accept(sock, (struct sockaddr *)su, &len);
160
161 sockunion_normalise_mapped(su);
162 return client_sock;
718e3744 163}
164
165/* Return sizeof union sockunion. */
d62a17ae 166static int sockunion_sizeof(const union sockunion *su)
167{
168 int ret;
169
170 ret = 0;
171 switch (su->sa.sa_family) {
172 case AF_INET:
173 ret = sizeof(struct sockaddr_in);
174 break;
175 case AF_INET6:
176 ret = sizeof(struct sockaddr_in6);
177 break;
178 }
179 return ret;
718e3744 180}
181
b11b5772 182/* Performs a non-blocking connect(). */
d62a17ae 183enum connect_result sockunion_connect(int fd, const union sockunion *peersu,
184 unsigned short port, ifindex_t ifindex)
185{
186 int ret;
d62a17ae 187 union sockunion su;
188
189 memcpy(&su, peersu, sizeof(union sockunion));
190
191 switch (su.sa.sa_family) {
192 case AF_INET:
193 su.sin.sin_port = port;
194 break;
195 case AF_INET6:
196 su.sin6.sin6_port = port;
718e3744 197#ifdef KAME
d62a17ae 198 if (IN6_IS_ADDR_LINKLOCAL(&su.sin6.sin6_addr) && ifindex) {
199 su.sin6.sin6_scope_id = ifindex;
200 SET_IN6_LINKLOCAL_IFINDEX(su.sin6.sin6_addr, ifindex);
201 }
718e3744 202#endif /* KAME */
d62a17ae 203 break;
204 }
205
d62a17ae 206 /* Call connect function. */
207 ret = connect(fd, (struct sockaddr *)&su, sockunion_sizeof(&su));
208
209 /* Immediate success */
b11b5772 210 if (ret == 0)
d62a17ae 211 return connect_success;
d62a17ae 212
213 /* If connect is in progress then return 1 else it's real error. */
214 if (ret < 0) {
215 if (errno != EINPROGRESS) {
216 char str[SU_ADDRSTRLEN];
217 zlog_info("can't connect to %s fd %d : %s",
218 sockunion_log(&su, str, sizeof str), fd,
219 safe_strerror(errno));
220 return connect_error;
221 }
718e3744 222 }
718e3744 223
d62a17ae 224 return connect_in_progress;
718e3744 225}
226
227/* Make socket from sockunion union. */
d62a17ae 228int sockunion_stream_socket(union sockunion *su)
718e3744 229{
d62a17ae 230 int sock;
718e3744 231
d62a17ae 232 if (su->sa.sa_family == 0)
233 su->sa.sa_family = AF_INET_UNION;
718e3744 234
d62a17ae 235 sock = socket(su->sa.sa_family, SOCK_STREAM, 0);
718e3744 236
d62a17ae 237 if (sock < 0)
450971aa 238 flog_err(EC_LIB_SOCKET,
1b5e2f89 239 "can't make socket sockunion_stream_socket");
718e3744 240
d62a17ae 241 return sock;
718e3744 242}
243
244/* Bind socket to specified address. */
d62a17ae 245int sockunion_bind(int sock, union sockunion *su, unsigned short port,
246 union sockunion *su_addr)
718e3744 247{
d62a17ae 248 int size = 0;
249 int ret;
718e3744 250
d62a17ae 251 if (su->sa.sa_family == AF_INET) {
252 size = sizeof(struct sockaddr_in);
253 su->sin.sin_port = htons(port);
6f0e3f6e 254#ifdef HAVE_STRUCT_SOCKADDR_IN_SIN_LEN
d62a17ae 255 su->sin.sin_len = size;
6f0e3f6e 256#endif /* HAVE_STRUCT_SOCKADDR_IN_SIN_LEN */
d62a17ae 257 if (su_addr == NULL)
258 sockunion2ip(su) = htonl(INADDR_ANY);
259 } else if (su->sa.sa_family == AF_INET6) {
260 size = sizeof(struct sockaddr_in6);
261 su->sin6.sin6_port = htons(port);
718e3744 262#ifdef SIN6_LEN
d62a17ae 263 su->sin6.sin6_len = size;
718e3744 264#endif /* SIN6_LEN */
d62a17ae 265 if (su_addr == NULL) {
1cbb5dfc 266#ifdef LINUX_IPV6
d62a17ae 267 memset(&su->sin6.sin6_addr, 0, sizeof(struct in6_addr));
718e3744 268#else
d62a17ae 269 su->sin6.sin6_addr = in6addr_any;
718e3744 270#endif /* LINUX_IPV6 */
d62a17ae 271 }
718e3744 272 }
718e3744 273
d62a17ae 274 ret = bind(sock, (struct sockaddr *)su, size);
275 if (ret < 0) {
276 char buf[SU_ADDRSTRLEN];
450971aa 277 flog_err(EC_LIB_SOCKET, "can't bind socket for %s : %s",
1b5e2f89
DS
278 sockunion_log(su, buf, SU_ADDRSTRLEN),
279 safe_strerror(errno));
d62a17ae 280 }
718e3744 281
d62a17ae 282 return ret;
718e3744 283}
284
d62a17ae 285int sockopt_reuseaddr(int sock)
718e3744 286{
d62a17ae 287 int ret;
288 int on = 1;
718e3744 289
d62a17ae 290 ret = setsockopt(sock, SOL_SOCKET, SO_REUSEADDR, (void *)&on,
291 sizeof(on));
292 if (ret < 0) {
450971aa 293 flog_err(EC_LIB_SOCKET,
1b5e2f89 294 "can't set sockopt SO_REUSEADDR to socket %d", sock);
d62a17ae 295 return -1;
296 }
297 return 0;
718e3744 298}
299
300#ifdef SO_REUSEPORT
d62a17ae 301int sockopt_reuseport(int sock)
718e3744 302{
d62a17ae 303 int ret;
304 int on = 1;
718e3744 305
d62a17ae 306 ret = setsockopt(sock, SOL_SOCKET, SO_REUSEPORT, (void *)&on,
307 sizeof(on));
308 if (ret < 0) {
450971aa 309 flog_err(EC_LIB_SOCKET,
1b5e2f89 310 "can't set sockopt SO_REUSEPORT to socket %d", sock);
d62a17ae 311 return -1;
312 }
313 return 0;
718e3744 314}
315#else
d62a17ae 316int sockopt_reuseport(int sock)
718e3744 317{
d62a17ae 318 return 0;
718e3744 319}
320#endif /* 0 */
321
d62a17ae 322int sockopt_ttl(int family, int sock, int ttl)
718e3744 323{
d62a17ae 324 int ret;
718e3744 325
326#ifdef IP_TTL
d62a17ae 327 if (family == AF_INET) {
328 ret = setsockopt(sock, IPPROTO_IP, IP_TTL, (void *)&ttl,
329 sizeof(int));
330 if (ret < 0) {
450971aa 331 flog_err(EC_LIB_SOCKET,
1b5e2f89 332 "can't set sockopt IP_TTL %d to socket %d",
ade6974d 333 ttl, sock);
d62a17ae 334 return -1;
335 }
336 return 0;
718e3744 337 }
718e3744 338#endif /* IP_TTL */
d62a17ae 339 if (family == AF_INET6) {
340 ret = setsockopt(sock, IPPROTO_IPV6, IPV6_UNICAST_HOPS,
341 (void *)&ttl, sizeof(int));
342 if (ret < 0) {
ade6974d 343 flog_err(
450971aa 344 EC_LIB_SOCKET,
ade6974d
QY
345 "can't set sockopt IPV6_UNICAST_HOPS %d to socket %d",
346 ttl, sock);
d62a17ae 347 return -1;
348 }
349 return 0;
718e3744 350 }
d62a17ae 351 return 0;
718e3744 352}
353
c62232b4
DS
354/*
355 * This function called setsockopt(.., TCP_CORK,...)
356 * Which on linux is a no-op since it is enabled by
357 * default and on BSD it uses TCP_NOPUSH to do
358 * the same thing( which it was not configured to
0437e105 359 * use). This cleanup of the api occurred on 8/1/17
c62232b4
DS
360 * I imagine if after more than 1 year of no-one
361 * complaining, and a major upgrade release we
362 * can deprecate and remove this function call
363 */
d62a17ae 364int sockopt_cork(int sock, int onoff)
58192df7 365{
d62a17ae 366 return 0;
ed40466a
DS
367}
368
369int sockopt_mark_default(int sock, int mark, struct zebra_privs_t *cap)
370{
371#ifdef SO_MARK
d62a17ae 372 int ret;
ed40466a 373
6bb30c2c
DL
374 frr_elevate_privs(cap) {
375 ret = setsockopt(sock, SOL_SOCKET, SO_MARK, &mark,
376 sizeof(mark));
377 }
d62a17ae 378 return ret;
ed40466a 379#else
d62a17ae 380 return 0;
58192df7
SH
381#endif
382}
383
d62a17ae 384int sockopt_minttl(int family, int sock, int minttl)
fa411a21 385{
89b6d1f8 386#ifdef IP_MINTTL
d62a17ae 387 if (family == AF_INET) {
388 int ret = setsockopt(sock, IPPROTO_IP, IP_MINTTL, &minttl,
389 sizeof(minttl));
390 if (ret < 0)
ade6974d 391 flog_err(
450971aa 392 EC_LIB_SOCKET,
ade6974d
QY
393 "can't set sockopt IP_MINTTL to %d on socket %d: %s",
394 minttl, sock, safe_strerror(errno));
d62a17ae 395 return ret;
396 }
d876bdf4 397#endif /* IP_MINTTL */
d8dc5257 398#ifdef IPV6_MINHOPCOUNT
d62a17ae 399 if (family == AF_INET6) {
400 int ret = setsockopt(sock, IPPROTO_IPV6, IPV6_MINHOPCOUNT,
401 &minttl, sizeof(minttl));
402 if (ret < 0)
ade6974d 403 flog_err(
450971aa 404 EC_LIB_SOCKET,
ade6974d
QY
405 "can't set sockopt IPV6_MINHOPCOUNT to %d on socket %d: %s",
406 minttl, sock, safe_strerror(errno));
d62a17ae 407 return ret;
408 }
d876bdf4 409#endif
fa411a21 410
d62a17ae 411 errno = EOPNOTSUPP;
412 return -1;
fa411a21
NH
413}
414
d62a17ae 415int sockopt_v6only(int family, int sock)
ca051269 416{
d62a17ae 417 int ret, on = 1;
ca051269 418
ca051269 419#ifdef IPV6_V6ONLY
d62a17ae 420 if (family == AF_INET6) {
421 ret = setsockopt(sock, IPPROTO_IPV6, IPV6_V6ONLY, (void *)&on,
422 sizeof(int));
423 if (ret < 0) {
450971aa 424 flog_err(EC_LIB_SOCKET,
1b5e2f89
DS
425 "can't set sockopt IPV6_V6ONLY "
426 "to socket %d",
427 sock);
d62a17ae 428 return -1;
429 }
430 return 0;
ca051269 431 }
ca051269 432#endif /* IPV6_V6ONLY */
d62a17ae 433 return 0;
ca051269
DL
434}
435
718e3744 436/* If same family and same prefix return 1. */
d62a17ae 437int sockunion_same(const union sockunion *su1, const union sockunion *su2)
438{
439 int ret = 0;
440
441 if (su1->sa.sa_family != su2->sa.sa_family)
442 return 0;
443
444 switch (su1->sa.sa_family) {
445 case AF_INET:
446 ret = memcmp(&su1->sin.sin_addr, &su2->sin.sin_addr,
447 sizeof(struct in_addr));
448 break;
449 case AF_INET6:
450 ret = memcmp(&su1->sin6.sin6_addr, &su2->sin6.sin6_addr,
451 sizeof(struct in6_addr));
452 if ((ret == 0) && IN6_IS_ADDR_LINKLOCAL(&su1->sin6.sin6_addr)) {
453 /* compare interface indices */
454 if (su1->sin6.sin6_scope_id && su2->sin6.sin6_scope_id)
455 ret = (su1->sin6.sin6_scope_id
456 == su2->sin6.sin6_scope_id)
457 ? 0
458 : 1;
459 }
460 break;
f2345335 461 }
d62a17ae 462 if (ret == 0)
463 return 1;
464 else
465 return 0;
718e3744 466}
467
d62a17ae 468unsigned int sockunion_hash(const union sockunion *su)
7cb5cdbb 469{
d62a17ae 470 switch (sockunion_family(su)) {
471 case AF_INET:
472 return jhash_1word(su->sin.sin_addr.s_addr, 0);
473 case AF_INET6:
474 return jhash2(su->sin6.sin6_addr.s6_addr32,
475 ZEBRA_NUM_OF(su->sin6.sin6_addr.s6_addr32), 0);
476 }
477 return 0;
7cb5cdbb
TT
478}
479
d62a17ae 480size_t family2addrsize(int family)
95e0999c 481{
d62a17ae 482 switch (family) {
483 case AF_INET:
484 return sizeof(struct in_addr);
485 case AF_INET6:
486 return sizeof(struct in6_addr);
487 }
488 return 0;
95e0999c
TT
489}
490
d62a17ae 491size_t sockunion_get_addrlen(const union sockunion *su)
95e0999c 492{
d62a17ae 493 return family2addrsize(sockunion_family(su));
95e0999c
TT
494}
495
d7c0a89a 496const uint8_t *sockunion_get_addr(const union sockunion *su)
95e0999c 497{
d62a17ae 498 switch (sockunion_family(su)) {
499 case AF_INET:
d7c0a89a 500 return (const uint8_t *)&su->sin.sin_addr.s_addr;
d62a17ae 501 case AF_INET6:
d7c0a89a 502 return (const uint8_t *)&su->sin6.sin6_addr;
d62a17ae 503 }
504 return NULL;
95e0999c
TT
505}
506
d7c0a89a 507void sockunion_set(union sockunion *su, int family, const uint8_t *addr,
d62a17ae 508 size_t bytes)
95e0999c 509{
d62a17ae 510 if (family2addrsize(family) != bytes)
511 return;
95e0999c 512
d62a17ae 513 sockunion_family(su) = family;
514 switch (family) {
515 case AF_INET:
516 memcpy(&su->sin.sin_addr.s_addr, addr, bytes);
517 break;
518 case AF_INET6:
519 memcpy(&su->sin6.sin6_addr, addr, bytes);
520 break;
521 }
95e0999c
TT
522}
523
718e3744 524/* After TCP connection is established. Get local address and port. */
d62a17ae 525union sockunion *sockunion_getsockname(int fd)
526{
527 int ret;
528 socklen_t len;
529 union {
530 struct sockaddr sa;
531 struct sockaddr_in sin;
532 struct sockaddr_in6 sin6;
533 char tmp_buffer[128];
534 } name;
535 union sockunion *su;
536
537 memset(&name, 0, sizeof name);
538 len = sizeof name;
539
540 ret = getsockname(fd, (struct sockaddr *)&name, &len);
541 if (ret < 0) {
450971aa 542 flog_err(EC_LIB_SOCKET,
1b5e2f89
DS
543 "Can't get local address and port by getsockname: %s",
544 safe_strerror(errno));
d62a17ae 545 return NULL;
546 }
547
548 if (name.sa.sa_family == AF_INET) {
549 su = XCALLOC(MTYPE_SOCKUNION, sizeof(union sockunion));
550 memcpy(su, &name, sizeof(struct sockaddr_in));
551 return su;
552 }
553 if (name.sa.sa_family == AF_INET6) {
554 su = XCALLOC(MTYPE_SOCKUNION, sizeof(union sockunion));
555 memcpy(su, &name, sizeof(struct sockaddr_in6));
556 sockunion_normalise_mapped(su);
557 return su;
558 }
559 return NULL;
718e3744 560}
561
562/* After TCP connection is established. Get remote address and port. */
d62a17ae 563union sockunion *sockunion_getpeername(int fd)
564{
565 int ret;
566 socklen_t len;
567 union {
568 struct sockaddr sa;
569 struct sockaddr_in sin;
570 struct sockaddr_in6 sin6;
571 char tmp_buffer[128];
572 } name;
573 union sockunion *su;
574
575 memset(&name, 0, sizeof name);
576 len = sizeof name;
577 ret = getpeername(fd, (struct sockaddr *)&name, &len);
578 if (ret < 0) {
1c50c1c0 579 flog_err(EC_LIB_SOCKET, "Can't get remote address and port: %s",
1b5e2f89 580 safe_strerror(errno));
d62a17ae 581 return NULL;
582 }
583
584 if (name.sa.sa_family == AF_INET) {
585 su = XCALLOC(MTYPE_SOCKUNION, sizeof(union sockunion));
586 memcpy(su, &name, sizeof(struct sockaddr_in));
587 return su;
588 }
589 if (name.sa.sa_family == AF_INET6) {
590 su = XCALLOC(MTYPE_SOCKUNION, sizeof(union sockunion));
591 memcpy(su, &name, sizeof(struct sockaddr_in6));
592 sockunion_normalise_mapped(su);
593 return su;
594 }
595 return NULL;
718e3744 596}
597
598/* Print sockunion structure */
d62a17ae 599static void __attribute__((unused)) sockunion_print(const union sockunion *su)
600{
601 if (su == NULL)
602 return;
603
604 switch (su->sa.sa_family) {
605 case AF_INET:
606 printf("%s\n", inet_ntoa(su->sin.sin_addr));
607 break;
608 case AF_INET6: {
609 char buf[SU_ADDRSTRLEN];
610
611 printf("%s\n", inet_ntop(AF_INET6, &(su->sin6.sin6_addr), buf,
612 sizeof(buf)));
613 } break;
718e3744 614
615#ifdef AF_LINK
d62a17ae 616 case AF_LINK: {
617 struct sockaddr_dl *sdl;
618
619 sdl = (struct sockaddr_dl *)&(su->sa);
620 printf("link#%d\n", sdl->sdl_index);
621 } break;
718e3744 622#endif /* AF_LINK */
d62a17ae 623 default:
624 printf("af_unknown %d\n", su->sa.sa_family);
625 break;
626 }
718e3744 627}
628
d62a17ae 629static int in6addr_cmp(const struct in6_addr *addr1,
630 const struct in6_addr *addr2)
718e3744 631{
d62a17ae 632 unsigned int i;
d7c0a89a 633 const uint8_t *p1, *p2;
718e3744 634
d7c0a89a
QY
635 p1 = (const uint8_t *)addr1;
636 p2 = (const uint8_t *)addr2;
718e3744 637
d62a17ae 638 for (i = 0; i < sizeof(struct in6_addr); i++) {
639 if (p1[i] > p2[i])
640 return 1;
641 else if (p1[i] < p2[i])
642 return -1;
643 }
644 return 0;
718e3744 645}
718e3744 646
d62a17ae 647int sockunion_cmp(const union sockunion *su1, const union sockunion *su2)
718e3744 648{
d62a17ae 649 if (su1->sa.sa_family > su2->sa.sa_family)
650 return 1;
651 if (su1->sa.sa_family < su2->sa.sa_family)
652 return -1;
718e3744 653
d62a17ae 654 if (su1->sa.sa_family == AF_INET) {
655 if (ntohl(sockunion2ip(su1)) == ntohl(sockunion2ip(su2)))
656 return 0;
657 if (ntohl(sockunion2ip(su1)) > ntohl(sockunion2ip(su2)))
658 return 1;
659 else
660 return -1;
661 }
662 if (su1->sa.sa_family == AF_INET6)
663 return in6addr_cmp(&su1->sin6.sin6_addr, &su2->sin6.sin6_addr);
718e3744 664 return 0;
718e3744 665}
666
667/* Duplicate sockunion. */
d62a17ae 668union sockunion *sockunion_dup(const union sockunion *su)
718e3744 669{
d62a17ae 670 union sockunion *dup =
671 XCALLOC(MTYPE_SOCKUNION, sizeof(union sockunion));
672 memcpy(dup, su, sizeof(union sockunion));
673 return dup;
718e3744 674}
675
d62a17ae 676void sockunion_free(union sockunion *su)
718e3744 677{
d62a17ae 678 XFREE(MTYPE_SOCKUNION, su);
718e3744 679}
dd793e4a 680
d62a17ae 681void sockunion_init(union sockunion *su)
dd793e4a 682{
d62a17ae 683 memset(su, 0, sizeof(union sockunion));
dd793e4a 684}