rpc_generic.c revision 261046
1/*	$NetBSD: rpc_generic.c,v 1.4 2000/09/28 09:07:04 kleink Exp $	*/
2
3/*-
4 * Copyright (c) 2009, Sun Microsystems, Inc.
5 * All rights reserved.
6 *
7 * Redistribution and use in source and binary forms, with or without
8 * modification, are permitted provided that the following conditions are met:
9 * - Redistributions of source code must retain the above copyright notice,
10 *   this list of conditions and the following disclaimer.
11 * - Redistributions in binary form must reproduce the above copyright notice,
12 *   this list of conditions and the following disclaimer in the documentation
13 *   and/or other materials provided with the distribution.
14 * - Neither the name of Sun Microsystems, Inc. nor the names of its
15 *   contributors may be used to endorse or promote products derived
16 *   from this software without specific prior written permission.
17 *
18 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
19 * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
20 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
21 * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE
22 * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
23 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
24 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
25 * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
26 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
27 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
28 * POSSIBILITY OF SUCH DAMAGE.
29 */
30/*
31 * Copyright (c) 1986-1991 by Sun Microsystems Inc.
32 */
33
34/* #pragma ident	"@(#)rpc_generic.c	1.17	94/04/24 SMI" */
35#include <sys/cdefs.h>
36__FBSDID("$FreeBSD: stable/10/lib/libc/rpc/rpc_generic.c 261046 2014-01-22 23:45:27Z mav $");
37
38/*
39 * rpc_generic.c, Miscl routines for RPC.
40 *
41 */
42
43#include "namespace.h"
44#include "reentrant.h"
45#include <sys/types.h>
46#include <sys/param.h>
47#include <sys/socket.h>
48#include <sys/time.h>
49#include <sys/un.h>
50#include <sys/resource.h>
51#include <netinet/in.h>
52#include <arpa/inet.h>
53#include <rpc/rpc.h>
54#include <ctype.h>
55#include <stddef.h>
56#include <stdio.h>
57#include <netdb.h>
58#include <netconfig.h>
59#include <stdlib.h>
60#include <string.h>
61#include <syslog.h>
62#include <rpc/nettype.h>
63#include "un-namespace.h"
64#include "rpc_com.h"
65#include "mt_misc.h"
66
67struct handle {
68	NCONF_HANDLE *nhandle;
69	int nflag;		/* Whether NETPATH or NETCONFIG */
70	int nettype;
71};
72
73static const struct _rpcnettype {
74	const char *name;
75	const int type;
76} _rpctypelist[] = {
77	{ "netpath", _RPC_NETPATH },
78	{ "visible", _RPC_VISIBLE },
79	{ "circuit_v", _RPC_CIRCUIT_V },
80	{ "datagram_v", _RPC_DATAGRAM_V },
81	{ "circuit_n", _RPC_CIRCUIT_N },
82	{ "datagram_n", _RPC_DATAGRAM_N },
83	{ "tcp", _RPC_TCP },
84	{ "udp", _RPC_UDP },
85	{ 0, _RPC_NONE }
86};
87
88struct netid_af {
89	const char	*netid;
90	int		af;
91	int		protocol;
92};
93
94static const struct netid_af na_cvt[] = {
95	{ "udp",  AF_INET,  IPPROTO_UDP },
96	{ "tcp",  AF_INET,  IPPROTO_TCP },
97#ifdef INET6
98	{ "udp6", AF_INET6, IPPROTO_UDP },
99	{ "tcp6", AF_INET6, IPPROTO_TCP },
100#endif
101	{ "local", AF_LOCAL, 0 }
102};
103
104#if 0
105static char *strlocase(char *);
106#endif
107static int getnettype(const char *);
108
109/*
110 * Cache the result of getrlimit(), so we don't have to do an
111 * expensive call every time.
112 */
113int
114__rpc_dtbsize()
115{
116	static int tbsize;
117	struct rlimit rl;
118
119	if (tbsize) {
120		return (tbsize);
121	}
122	if (getrlimit(RLIMIT_NOFILE, &rl) == 0) {
123		return (tbsize = (int)rl.rlim_max);
124	}
125	/*
126	 * Something wrong.  I'll try to save face by returning a
127	 * pessimistic number.
128	 */
129	return (32);
130}
131
132
133/*
134 * Find the appropriate buffer size
135 */
136u_int
137/*ARGSUSED*/
138__rpc_get_t_size(af, proto, size)
139	int af, proto;
140	int size;	/* Size requested */
141{
142	int maxsize, defsize;
143
144	maxsize = 256 * 1024;	/* XXX */
145	switch (proto) {
146	case IPPROTO_TCP:
147		defsize = 64 * 1024;	/* XXX */
148		break;
149	case IPPROTO_UDP:
150		defsize = UDPMSGSIZE;
151		break;
152	default:
153		defsize = RPC_MAXDATASIZE;
154		break;
155	}
156	if (size == 0)
157		return defsize;
158
159	/* Check whether the value is within the upper max limit */
160	return (size > maxsize ? (u_int)maxsize : (u_int)size);
161}
162
163/*
164 * Find the appropriate address buffer size
165 */
166u_int
167__rpc_get_a_size(af)
168	int af;
169{
170	switch (af) {
171	case AF_INET:
172		return sizeof (struct sockaddr_in);
173#ifdef INET6
174	case AF_INET6:
175		return sizeof (struct sockaddr_in6);
176#endif
177	case AF_LOCAL:
178		return sizeof (struct sockaddr_un);
179	default:
180		break;
181	}
182	return ((u_int)RPC_MAXADDRSIZE);
183}
184
185#if 0
186static char *
187strlocase(p)
188	char *p;
189{
190	char *t = p;
191
192	for (; *p; p++)
193		if (isupper(*p))
194			*p = tolower(*p);
195	return (t);
196}
197#endif
198
199/*
200 * Returns the type of the network as defined in <rpc/nettype.h>
201 * If nettype is NULL, it defaults to NETPATH.
202 */
203static int
204getnettype(nettype)
205	const char *nettype;
206{
207	int i;
208
209	if ((nettype == NULL) || (nettype[0] == 0)) {
210		return (_RPC_NETPATH);	/* Default */
211	}
212
213#if 0
214	nettype = strlocase(nettype);
215#endif
216	for (i = 0; _rpctypelist[i].name; i++)
217		if (strcasecmp(nettype, _rpctypelist[i].name) == 0) {
218			return (_rpctypelist[i].type);
219		}
220	return (_rpctypelist[i].type);
221}
222
223static thread_key_t tcp_key, udp_key;
224static once_t keys_once = ONCE_INITIALIZER;
225static int tcp_key_error, udp_key_error;
226
227static void
228keys_init(void)
229{
230
231	tcp_key_error = thr_keycreate(&tcp_key, free);
232	udp_key_error = thr_keycreate(&udp_key, free);
233}
234
235/*
236 * For the given nettype (tcp or udp only), return the first structure found.
237 * This should be freed by calling freenetconfigent()
238 */
239struct netconfig *
240__rpc_getconfip(nettype)
241	const char *nettype;
242{
243	char *netid;
244	char *netid_tcp = (char *) NULL;
245	char *netid_udp = (char *) NULL;
246	static char *netid_tcp_main;
247	static char *netid_udp_main;
248	struct netconfig *dummy;
249	int main_thread;
250
251	if ((main_thread = thr_main())) {
252		netid_udp = netid_udp_main;
253		netid_tcp = netid_tcp_main;
254	} else {
255		if (thr_once(&keys_once, keys_init) != 0 ||
256		    tcp_key_error != 0 || udp_key_error != 0)
257			return (NULL);
258		netid_tcp = (char *)thr_getspecific(tcp_key);
259		netid_udp = (char *)thr_getspecific(udp_key);
260	}
261	if (!netid_udp && !netid_tcp) {
262		struct netconfig *nconf;
263		void *confighandle;
264
265		if (!(confighandle = setnetconfig())) {
266			syslog (LOG_ERR, "rpc: failed to open " NETCONFIG);
267			return (NULL);
268		}
269		while ((nconf = getnetconfig(confighandle)) != NULL) {
270			if (strcmp(nconf->nc_protofmly, NC_INET) == 0) {
271				if (strcmp(nconf->nc_proto, NC_TCP) == 0 &&
272				    netid_tcp == NULL) {
273					netid_tcp = strdup(nconf->nc_netid);
274					if (main_thread)
275						netid_tcp_main = netid_tcp;
276					else
277						thr_setspecific(tcp_key,
278							(void *) netid_tcp);
279				} else
280				if (strcmp(nconf->nc_proto, NC_UDP) == 0 &&
281				    netid_udp == NULL) {
282					netid_udp = strdup(nconf->nc_netid);
283					if (main_thread)
284						netid_udp_main = netid_udp;
285					else
286						thr_setspecific(udp_key,
287						(void *) netid_udp);
288				}
289			}
290		}
291		endnetconfig(confighandle);
292	}
293	if (strcmp(nettype, "udp") == 0)
294		netid = netid_udp;
295	else if (strcmp(nettype, "tcp") == 0)
296		netid = netid_tcp;
297	else {
298		return (NULL);
299	}
300	if ((netid == NULL) || (netid[0] == 0)) {
301		return (NULL);
302	}
303	dummy = getnetconfigent(netid);
304	return (dummy);
305}
306
307/*
308 * Returns the type of the nettype, which should then be used with
309 * __rpc_getconf().
310 */
311void *
312__rpc_setconf(nettype)
313	const char *nettype;
314{
315	struct handle *handle;
316
317	handle = (struct handle *) malloc(sizeof (struct handle));
318	if (handle == NULL) {
319		return (NULL);
320	}
321	switch (handle->nettype = getnettype(nettype)) {
322	case _RPC_NETPATH:
323	case _RPC_CIRCUIT_N:
324	case _RPC_DATAGRAM_N:
325		if (!(handle->nhandle = setnetpath()))
326			goto failed;
327		handle->nflag = TRUE;
328		break;
329	case _RPC_VISIBLE:
330	case _RPC_CIRCUIT_V:
331	case _RPC_DATAGRAM_V:
332	case _RPC_TCP:
333	case _RPC_UDP:
334		if (!(handle->nhandle = setnetconfig())) {
335		        syslog (LOG_ERR, "rpc: failed to open " NETCONFIG);
336			goto failed;
337		}
338		handle->nflag = FALSE;
339		break;
340	default:
341		goto failed;
342	}
343
344	return (handle);
345
346failed:
347	free(handle);
348	return (NULL);
349}
350
351/*
352 * Returns the next netconfig struct for the given "net" type.
353 * __rpc_setconf() should have been called previously.
354 */
355struct netconfig *
356__rpc_getconf(vhandle)
357	void *vhandle;
358{
359	struct handle *handle;
360	struct netconfig *nconf;
361
362	handle = (struct handle *)vhandle;
363	if (handle == NULL) {
364		return (NULL);
365	}
366	for (;;) {
367		if (handle->nflag)
368			nconf = getnetpath(handle->nhandle);
369		else
370			nconf = getnetconfig(handle->nhandle);
371		if (nconf == NULL)
372			break;
373		if ((nconf->nc_semantics != NC_TPI_CLTS) &&
374			(nconf->nc_semantics != NC_TPI_COTS) &&
375			(nconf->nc_semantics != NC_TPI_COTS_ORD))
376			continue;
377		switch (handle->nettype) {
378		case _RPC_VISIBLE:
379			if (!(nconf->nc_flag & NC_VISIBLE))
380				continue;
381			/* FALLTHROUGH */
382		case _RPC_NETPATH:	/* Be happy */
383			break;
384		case _RPC_CIRCUIT_V:
385			if (!(nconf->nc_flag & NC_VISIBLE))
386				continue;
387			/* FALLTHROUGH */
388		case _RPC_CIRCUIT_N:
389			if ((nconf->nc_semantics != NC_TPI_COTS) &&
390				(nconf->nc_semantics != NC_TPI_COTS_ORD))
391				continue;
392			break;
393		case _RPC_DATAGRAM_V:
394			if (!(nconf->nc_flag & NC_VISIBLE))
395				continue;
396			/* FALLTHROUGH */
397		case _RPC_DATAGRAM_N:
398			if (nconf->nc_semantics != NC_TPI_CLTS)
399				continue;
400			break;
401		case _RPC_TCP:
402			if (((nconf->nc_semantics != NC_TPI_COTS) &&
403				(nconf->nc_semantics != NC_TPI_COTS_ORD)) ||
404				(strcmp(nconf->nc_protofmly, NC_INET)
405#ifdef INET6
406				 && strcmp(nconf->nc_protofmly, NC_INET6))
407#else
408				)
409#endif
410				||
411				strcmp(nconf->nc_proto, NC_TCP))
412				continue;
413			break;
414		case _RPC_UDP:
415			if ((nconf->nc_semantics != NC_TPI_CLTS) ||
416				(strcmp(nconf->nc_protofmly, NC_INET)
417#ifdef INET6
418				&& strcmp(nconf->nc_protofmly, NC_INET6))
419#else
420				)
421#endif
422				||
423				strcmp(nconf->nc_proto, NC_UDP))
424				continue;
425			break;
426		}
427		break;
428	}
429	return (nconf);
430}
431
432void
433__rpc_endconf(vhandle)
434	void * vhandle;
435{
436	struct handle *handle;
437
438	handle = (struct handle *) vhandle;
439	if (handle == NULL) {
440		return;
441	}
442	if (handle->nflag) {
443		endnetpath(handle->nhandle);
444	} else {
445		endnetconfig(handle->nhandle);
446	}
447	free(handle);
448}
449
450/*
451 * Used to ping the NULL procedure for clnt handle.
452 * Returns NULL if fails, else a non-NULL pointer.
453 */
454void *
455rpc_nullproc(clnt)
456	CLIENT *clnt;
457{
458	struct timeval TIMEOUT = {25, 0};
459
460	if (clnt_call(clnt, NULLPROC, (xdrproc_t) xdr_void, NULL,
461		(xdrproc_t) xdr_void, NULL, TIMEOUT) != RPC_SUCCESS) {
462		return (NULL);
463	}
464	return ((void *) clnt);
465}
466
467/*
468 * Try all possible transports until
469 * one succeeds in finding the netconf for the given fd.
470 */
471struct netconfig *
472__rpcgettp(fd)
473	int fd;
474{
475	const char *netid;
476	struct __rpc_sockinfo si;
477
478	if (!__rpc_fd2sockinfo(fd, &si))
479		return NULL;
480
481	if (!__rpc_sockinfo2netid(&si, &netid))
482		return NULL;
483
484	/*LINTED const castaway*/
485	return getnetconfigent((char *)netid);
486}
487
488int
489__rpc_fd2sockinfo(int fd, struct __rpc_sockinfo *sip)
490{
491	socklen_t len;
492	int type, proto;
493	struct sockaddr_storage ss;
494
495	len = sizeof ss;
496	if (_getsockname(fd, (struct sockaddr *)(void *)&ss, &len) < 0)
497		return 0;
498	sip->si_alen = len;
499
500	len = sizeof type;
501	if (_getsockopt(fd, SOL_SOCKET, SO_TYPE, &type, &len) < 0)
502		return 0;
503
504	/* XXX */
505	if (ss.ss_family != AF_LOCAL) {
506		if (type == SOCK_STREAM)
507			proto = IPPROTO_TCP;
508		else if (type == SOCK_DGRAM)
509			proto = IPPROTO_UDP;
510		else
511			return 0;
512	} else
513		proto = 0;
514
515	sip->si_af = ss.ss_family;
516	sip->si_proto = proto;
517	sip->si_socktype = type;
518
519	return 1;
520}
521
522/*
523 * Linear search, but the number of entries is small.
524 */
525int
526__rpc_nconf2sockinfo(const struct netconfig *nconf, struct __rpc_sockinfo *sip)
527{
528	int i;
529
530	for (i = 0; i < (sizeof na_cvt) / (sizeof (struct netid_af)); i++)
531		if (strcmp(na_cvt[i].netid, nconf->nc_netid) == 0 || (
532		    strcmp(nconf->nc_netid, "unix") == 0 &&
533		    strcmp(na_cvt[i].netid, "local") == 0)) {
534			sip->si_af = na_cvt[i].af;
535			sip->si_proto = na_cvt[i].protocol;
536			sip->si_socktype =
537			    __rpc_seman2socktype((int)nconf->nc_semantics);
538			if (sip->si_socktype == -1)
539				return 0;
540			sip->si_alen = __rpc_get_a_size(sip->si_af);
541			return 1;
542		}
543
544	return 0;
545}
546
547int
548__rpc_nconf2fd(const struct netconfig *nconf)
549{
550	struct __rpc_sockinfo si;
551
552	if (!__rpc_nconf2sockinfo(nconf, &si))
553		return 0;
554
555	return _socket(si.si_af, si.si_socktype, si.si_proto);
556}
557
558int
559__rpc_sockinfo2netid(struct __rpc_sockinfo *sip, const char **netid)
560{
561	int i;
562	struct netconfig *nconf;
563
564	nconf = getnetconfigent("local");
565
566	for (i = 0; i < (sizeof na_cvt) / (sizeof (struct netid_af)); i++) {
567		if (na_cvt[i].af == sip->si_af &&
568		    na_cvt[i].protocol == sip->si_proto) {
569			if (strcmp(na_cvt[i].netid, "local") == 0 && nconf == NULL) {
570				if (netid)
571					*netid = "unix";
572			} else {
573				if (netid)
574					*netid = na_cvt[i].netid;
575			}
576			if (nconf != NULL)
577				freenetconfigent(nconf);
578			return 1;
579		}
580	}
581	if (nconf != NULL)
582		freenetconfigent(nconf);
583
584	return 0;
585}
586
587char *
588taddr2uaddr(const struct netconfig *nconf, const struct netbuf *nbuf)
589{
590	struct __rpc_sockinfo si;
591
592	if (!__rpc_nconf2sockinfo(nconf, &si))
593		return NULL;
594	return __rpc_taddr2uaddr_af(si.si_af, nbuf);
595}
596
597struct netbuf *
598uaddr2taddr(const struct netconfig *nconf, const char *uaddr)
599{
600	struct __rpc_sockinfo si;
601
602	if (!__rpc_nconf2sockinfo(nconf, &si))
603		return NULL;
604	return __rpc_uaddr2taddr_af(si.si_af, uaddr);
605}
606
607char *
608__rpc_taddr2uaddr_af(int af, const struct netbuf *nbuf)
609{
610	char *ret;
611	struct sockaddr_in *sin;
612	struct sockaddr_un *sun;
613	char namebuf[INET_ADDRSTRLEN];
614#ifdef INET6
615	struct sockaddr_in6 *sin6;
616	char namebuf6[INET6_ADDRSTRLEN];
617#endif
618	u_int16_t port;
619
620	switch (af) {
621	case AF_INET:
622		sin = nbuf->buf;
623		if (inet_ntop(af, &sin->sin_addr, namebuf, sizeof namebuf)
624		    == NULL)
625			return NULL;
626		port = ntohs(sin->sin_port);
627		if (asprintf(&ret, "%s.%u.%u", namebuf, ((u_int32_t)port) >> 8,
628		    port & 0xff) < 0)
629			return NULL;
630		break;
631#ifdef INET6
632	case AF_INET6:
633		sin6 = nbuf->buf;
634		if (inet_ntop(af, &sin6->sin6_addr, namebuf6, sizeof namebuf6)
635		    == NULL)
636			return NULL;
637		port = ntohs(sin6->sin6_port);
638		if (asprintf(&ret, "%s.%u.%u", namebuf6, ((u_int32_t)port) >> 8,
639		    port & 0xff) < 0)
640			return NULL;
641		break;
642#endif
643	case AF_LOCAL:
644		sun = nbuf->buf;
645		if (asprintf(&ret, "%.*s", (int)(sun->sun_len -
646		    offsetof(struct sockaddr_un, sun_path)),
647		    sun->sun_path) < 0)
648			return (NULL);
649		break;
650	default:
651		return NULL;
652	}
653
654	return ret;
655}
656
657struct netbuf *
658__rpc_uaddr2taddr_af(int af, const char *uaddr)
659{
660	struct netbuf *ret = NULL;
661	char *addrstr, *p;
662	unsigned port, portlo, porthi;
663	struct sockaddr_in *sin;
664#ifdef INET6
665	struct sockaddr_in6 *sin6;
666#endif
667	struct sockaddr_un *sun;
668
669	port = 0;
670	sin = NULL;
671	addrstr = strdup(uaddr);
672	if (addrstr == NULL)
673		return NULL;
674
675	/*
676	 * AF_LOCAL addresses are expected to be absolute
677	 * pathnames, anything else will be AF_INET or AF_INET6.
678	 */
679	if (*addrstr != '/') {
680		p = strrchr(addrstr, '.');
681		if (p == NULL)
682			goto out;
683		portlo = (unsigned)atoi(p + 1);
684		*p = '\0';
685
686		p = strrchr(addrstr, '.');
687		if (p == NULL)
688			goto out;
689		porthi = (unsigned)atoi(p + 1);
690		*p = '\0';
691		port = (porthi << 8) | portlo;
692	}
693
694	ret = (struct netbuf *)malloc(sizeof *ret);
695	if (ret == NULL)
696		goto out;
697
698	switch (af) {
699	case AF_INET:
700		sin = (struct sockaddr_in *)malloc(sizeof *sin);
701		if (sin == NULL)
702			goto out;
703		memset(sin, 0, sizeof *sin);
704		sin->sin_family = AF_INET;
705		sin->sin_port = htons(port);
706		if (inet_pton(AF_INET, addrstr, &sin->sin_addr) <= 0) {
707			free(sin);
708			free(ret);
709			ret = NULL;
710			goto out;
711		}
712		sin->sin_len = ret->maxlen = ret->len = sizeof *sin;
713		ret->buf = sin;
714		break;
715#ifdef INET6
716	case AF_INET6:
717		sin6 = (struct sockaddr_in6 *)malloc(sizeof *sin6);
718		if (sin6 == NULL)
719			goto out;
720		memset(sin6, 0, sizeof *sin6);
721		sin6->sin6_family = AF_INET6;
722		sin6->sin6_port = htons(port);
723		if (inet_pton(AF_INET6, addrstr, &sin6->sin6_addr) <= 0) {
724			free(sin6);
725			free(ret);
726			ret = NULL;
727			goto out;
728		}
729		sin6->sin6_len = ret->maxlen = ret->len = sizeof *sin6;
730		ret->buf = sin6;
731		break;
732#endif
733	case AF_LOCAL:
734		sun = (struct sockaddr_un *)malloc(sizeof *sun);
735		if (sun == NULL)
736			goto out;
737		memset(sun, 0, sizeof *sun);
738		sun->sun_family = AF_LOCAL;
739		strncpy(sun->sun_path, addrstr, sizeof(sun->sun_path) - 1);
740		ret->len = ret->maxlen = sun->sun_len = SUN_LEN(sun);
741		ret->buf = sun;
742		break;
743	default:
744		break;
745	}
746out:
747	free(addrstr);
748	return ret;
749}
750
751int
752__rpc_seman2socktype(int semantics)
753{
754	switch (semantics) {
755	case NC_TPI_CLTS:
756		return SOCK_DGRAM;
757	case NC_TPI_COTS_ORD:
758		return SOCK_STREAM;
759	case NC_TPI_RAW:
760		return SOCK_RAW;
761	default:
762		break;
763	}
764
765	return -1;
766}
767
768int
769__rpc_socktype2seman(int socktype)
770{
771	switch (socktype) {
772	case SOCK_DGRAM:
773		return NC_TPI_CLTS;
774	case SOCK_STREAM:
775		return NC_TPI_COTS_ORD;
776	case SOCK_RAW:
777		return NC_TPI_RAW;
778	default:
779		break;
780	}
781
782	return -1;
783}
784
785/*
786 * XXXX - IPv6 scope IDs can't be handled in universal addresses.
787 * Here, we compare the original server address to that of the RPC
788 * service we just received back from a call to rpcbind on the remote
789 * machine. If they are both "link local" or "site local", copy
790 * the scope id of the server address over to the service address.
791 */
792int
793__rpc_fixup_addr(struct netbuf *new, const struct netbuf *svc)
794{
795#ifdef INET6
796	struct sockaddr *sa_new, *sa_svc;
797	struct sockaddr_in6 *sin6_new, *sin6_svc;
798
799	sa_svc = (struct sockaddr *)svc->buf;
800	sa_new = (struct sockaddr *)new->buf;
801
802	if (sa_new->sa_family == sa_svc->sa_family &&
803	    sa_new->sa_family == AF_INET6) {
804		sin6_new = (struct sockaddr_in6 *)new->buf;
805		sin6_svc = (struct sockaddr_in6 *)svc->buf;
806
807		if ((IN6_IS_ADDR_LINKLOCAL(&sin6_new->sin6_addr) &&
808		     IN6_IS_ADDR_LINKLOCAL(&sin6_svc->sin6_addr)) ||
809		    (IN6_IS_ADDR_SITELOCAL(&sin6_new->sin6_addr) &&
810		     IN6_IS_ADDR_SITELOCAL(&sin6_svc->sin6_addr))) {
811			sin6_new->sin6_scope_id = sin6_svc->sin6_scope_id;
812		}
813	}
814#endif
815	return 1;
816}
817
818int
819__rpc_sockisbound(int fd)
820{
821	struct sockaddr_storage ss;
822	socklen_t slen;
823
824	slen = sizeof (struct sockaddr_storage);
825	if (_getsockname(fd, (struct sockaddr *)(void *)&ss, &slen) < 0)
826		return 0;
827
828	switch (ss.ss_family) {
829		case AF_INET:
830			return (((struct sockaddr_in *)
831			    (void *)&ss)->sin_port != 0);
832#ifdef INET6
833		case AF_INET6:
834			return (((struct sockaddr_in6 *)
835			    (void *)&ss)->sin6_port != 0);
836#endif
837		case AF_LOCAL:
838			/* XXX check this */
839			return (((struct sockaddr_un *)
840			    (void *)&ss)->sun_path[0] != '\0');
841		default:
842			break;
843	}
844
845	return 0;
846}
847