xref: /minix3/external/bsd/dhcp/dist/common/socket.c (revision 83ee113ee0d94f3844d44065af2311604e9a30ad)
1*83ee113eSDavid van Moolenbroek /*	$NetBSD: socket.c,v 1.1.1.3 2014/07/12 11:57:46 spz Exp $	*/
2*83ee113eSDavid van Moolenbroek /* socket.c
3*83ee113eSDavid van Moolenbroek 
4*83ee113eSDavid van Moolenbroek    BSD socket interface code... */
5*83ee113eSDavid van Moolenbroek 
6*83ee113eSDavid van Moolenbroek /*
7*83ee113eSDavid van Moolenbroek  * Copyright (c) 2004-2014 by Internet Systems Consortium, Inc. ("ISC")
8*83ee113eSDavid van Moolenbroek  * Copyright (c) 1995-2003 by Internet Software Consortium
9*83ee113eSDavid van Moolenbroek  *
10*83ee113eSDavid van Moolenbroek  * Permission to use, copy, modify, and distribute this software for any
11*83ee113eSDavid van Moolenbroek  * purpose with or without fee is hereby granted, provided that the above
12*83ee113eSDavid van Moolenbroek  * copyright notice and this permission notice appear in all copies.
13*83ee113eSDavid van Moolenbroek  *
14*83ee113eSDavid van Moolenbroek  * THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES
15*83ee113eSDavid van Moolenbroek  * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
16*83ee113eSDavid van Moolenbroek  * MERCHANTABILITY AND FITNESS.  IN NO EVENT SHALL ISC BE LIABLE FOR
17*83ee113eSDavid van Moolenbroek  * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
18*83ee113eSDavid van Moolenbroek  * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
19*83ee113eSDavid van Moolenbroek  * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT
20*83ee113eSDavid van Moolenbroek  * OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
21*83ee113eSDavid van Moolenbroek  *
22*83ee113eSDavid van Moolenbroek  *   Internet Systems Consortium, Inc.
23*83ee113eSDavid van Moolenbroek  *   950 Charter Street
24*83ee113eSDavid van Moolenbroek  *   Redwood City, CA 94063
25*83ee113eSDavid van Moolenbroek  *   <info@isc.org>
26*83ee113eSDavid van Moolenbroek  *   https://www.isc.org/
27*83ee113eSDavid van Moolenbroek  *
28*83ee113eSDavid van Moolenbroek  */
29*83ee113eSDavid van Moolenbroek 
30*83ee113eSDavid van Moolenbroek #include <sys/cdefs.h>
31*83ee113eSDavid van Moolenbroek __RCSID("$NetBSD: socket.c,v 1.1.1.3 2014/07/12 11:57:46 spz Exp $");
32*83ee113eSDavid van Moolenbroek 
33*83ee113eSDavid van Moolenbroek /* SO_BINDTODEVICE support added by Elliot Poger (poger@leland.stanford.edu).
34*83ee113eSDavid van Moolenbroek  * This sockopt allows a socket to be bound to a particular interface,
35*83ee113eSDavid van Moolenbroek  * thus enabling the use of DHCPD on a multihomed host.
36*83ee113eSDavid van Moolenbroek  * If SO_BINDTODEVICE is defined in your system header files, the use of
37*83ee113eSDavid van Moolenbroek  * this sockopt will be automatically enabled.
38*83ee113eSDavid van Moolenbroek  * I have implemented it under Linux; other systems should be doable also.
39*83ee113eSDavid van Moolenbroek  */
40*83ee113eSDavid van Moolenbroek 
41*83ee113eSDavid van Moolenbroek #include "dhcpd.h"
42*83ee113eSDavid van Moolenbroek #include <errno.h>
43*83ee113eSDavid van Moolenbroek #include <sys/ioctl.h>
44*83ee113eSDavid van Moolenbroek #include <sys/uio.h>
45*83ee113eSDavid van Moolenbroek #include <sys/uio.h>
46*83ee113eSDavid van Moolenbroek 
47*83ee113eSDavid van Moolenbroek #if defined(sun) && defined(USE_V4_PKTINFO)
48*83ee113eSDavid van Moolenbroek #include <sys/sysmacros.h>
49*83ee113eSDavid van Moolenbroek #include <net/if.h>
50*83ee113eSDavid van Moolenbroek #include <sys/sockio.h>
51*83ee113eSDavid van Moolenbroek #include <net/if_dl.h>
52*83ee113eSDavid van Moolenbroek #include <sys/dlpi.h>
53*83ee113eSDavid van Moolenbroek #endif
54*83ee113eSDavid van Moolenbroek 
55*83ee113eSDavid van Moolenbroek #ifdef USE_SOCKET_FALLBACK
56*83ee113eSDavid van Moolenbroek # if !defined (USE_SOCKET_SEND)
57*83ee113eSDavid van Moolenbroek #  define if_register_send if_register_fallback
58*83ee113eSDavid van Moolenbroek #  define send_packet send_fallback
59*83ee113eSDavid van Moolenbroek #  define if_reinitialize_send if_reinitialize_fallback
60*83ee113eSDavid van Moolenbroek # endif
61*83ee113eSDavid van Moolenbroek #endif
62*83ee113eSDavid van Moolenbroek 
63*83ee113eSDavid van Moolenbroek #if defined(DHCPv6)
64*83ee113eSDavid van Moolenbroek /*
65*83ee113eSDavid van Moolenbroek  * XXX: this is gross.  we need to go back and overhaul the API for socket
66*83ee113eSDavid van Moolenbroek  * handling.
67*83ee113eSDavid van Moolenbroek  */
68*83ee113eSDavid van Moolenbroek static int no_global_v6_socket = 0;
69*83ee113eSDavid van Moolenbroek static unsigned int global_v6_socket_references = 0;
70*83ee113eSDavid van Moolenbroek static int global_v6_socket = -1;
71*83ee113eSDavid van Moolenbroek 
72*83ee113eSDavid van Moolenbroek static void if_register_multicast(struct interface_info *info);
73*83ee113eSDavid van Moolenbroek #endif
74*83ee113eSDavid van Moolenbroek 
75*83ee113eSDavid van Moolenbroek /*
76*83ee113eSDavid van Moolenbroek  * We can use a single socket for AF_INET (similar to AF_INET6) on all
77*83ee113eSDavid van Moolenbroek  * interfaces configured for DHCP if the system has support for IP_PKTINFO
78*83ee113eSDavid van Moolenbroek  * and IP_RECVPKTINFO (for example Solaris 11).
79*83ee113eSDavid van Moolenbroek  */
80*83ee113eSDavid van Moolenbroek #if defined(IP_PKTINFO) && defined(IP_RECVPKTINFO) && defined(USE_V4_PKTINFO)
81*83ee113eSDavid van Moolenbroek static unsigned int global_v4_socket_references = 0;
82*83ee113eSDavid van Moolenbroek static int global_v4_socket = -1;
83*83ee113eSDavid van Moolenbroek #endif
84*83ee113eSDavid van Moolenbroek 
85*83ee113eSDavid van Moolenbroek /*
86*83ee113eSDavid van Moolenbroek  * If we can't bind() to a specific interface, then we can only have
87*83ee113eSDavid van Moolenbroek  * a single socket. This variable insures that we don't try to listen
88*83ee113eSDavid van Moolenbroek  * on two sockets.
89*83ee113eSDavid van Moolenbroek  */
90*83ee113eSDavid van Moolenbroek #if !defined(SO_BINDTODEVICE) && !defined(USE_FALLBACK)
91*83ee113eSDavid van Moolenbroek static int once = 0;
92*83ee113eSDavid van Moolenbroek #endif /* !defined(SO_BINDTODEVICE) && !defined(USE_FALLBACK) */
93*83ee113eSDavid van Moolenbroek 
94*83ee113eSDavid van Moolenbroek /* Reinitializes the specified interface after an address change.   This
95*83ee113eSDavid van Moolenbroek    is not required for packet-filter APIs. */
96*83ee113eSDavid van Moolenbroek 
97*83ee113eSDavid van Moolenbroek #if defined (USE_SOCKET_SEND) || defined (USE_SOCKET_FALLBACK)
if_reinitialize_send(info)98*83ee113eSDavid van Moolenbroek void if_reinitialize_send (info)
99*83ee113eSDavid van Moolenbroek 	struct interface_info *info;
100*83ee113eSDavid van Moolenbroek {
101*83ee113eSDavid van Moolenbroek #if 0
102*83ee113eSDavid van Moolenbroek #ifndef USE_SOCKET_RECEIVE
103*83ee113eSDavid van Moolenbroek 	once = 0;
104*83ee113eSDavid van Moolenbroek 	close (info -> wfdesc);
105*83ee113eSDavid van Moolenbroek #endif
106*83ee113eSDavid van Moolenbroek 	if_register_send (info);
107*83ee113eSDavid van Moolenbroek #endif
108*83ee113eSDavid van Moolenbroek }
109*83ee113eSDavid van Moolenbroek #endif
110*83ee113eSDavid van Moolenbroek 
111*83ee113eSDavid van Moolenbroek #ifdef USE_SOCKET_RECEIVE
if_reinitialize_receive(info)112*83ee113eSDavid van Moolenbroek void if_reinitialize_receive (info)
113*83ee113eSDavid van Moolenbroek 	struct interface_info *info;
114*83ee113eSDavid van Moolenbroek {
115*83ee113eSDavid van Moolenbroek #if 0
116*83ee113eSDavid van Moolenbroek 	once = 0;
117*83ee113eSDavid van Moolenbroek 	close (info -> rfdesc);
118*83ee113eSDavid van Moolenbroek 	if_register_receive (info);
119*83ee113eSDavid van Moolenbroek #endif
120*83ee113eSDavid van Moolenbroek }
121*83ee113eSDavid van Moolenbroek #endif
122*83ee113eSDavid van Moolenbroek 
123*83ee113eSDavid van Moolenbroek #if defined (USE_SOCKET_SEND) || \
124*83ee113eSDavid van Moolenbroek 	defined (USE_SOCKET_RECEIVE) || \
125*83ee113eSDavid van Moolenbroek 		defined (USE_SOCKET_FALLBACK)
126*83ee113eSDavid van Moolenbroek /* Generic interface registration routine... */
127*83ee113eSDavid van Moolenbroek int
if_register_socket(struct interface_info * info,int family,int * do_multicast,struct in6_addr * linklocal6)128*83ee113eSDavid van Moolenbroek if_register_socket(struct interface_info *info, int family,
129*83ee113eSDavid van Moolenbroek 		   int *do_multicast, struct in6_addr *linklocal6)
130*83ee113eSDavid van Moolenbroek {
131*83ee113eSDavid van Moolenbroek 	struct sockaddr_storage name;
132*83ee113eSDavid van Moolenbroek 	int name_len;
133*83ee113eSDavid van Moolenbroek 	int sock;
134*83ee113eSDavid van Moolenbroek 	int flag;
135*83ee113eSDavid van Moolenbroek 	int domain;
136*83ee113eSDavid van Moolenbroek #ifdef DHCPv6
137*83ee113eSDavid van Moolenbroek 	struct sockaddr_in6 *addr6;
138*83ee113eSDavid van Moolenbroek #endif
139*83ee113eSDavid van Moolenbroek 	struct sockaddr_in *addr;
140*83ee113eSDavid van Moolenbroek 
141*83ee113eSDavid van Moolenbroek 	/* INSIST((family == AF_INET) || (family == AF_INET6)); */
142*83ee113eSDavid van Moolenbroek 
143*83ee113eSDavid van Moolenbroek #if !defined(SO_BINDTODEVICE) && !defined(USE_FALLBACK)
144*83ee113eSDavid van Moolenbroek 	/* Make sure only one interface is registered. */
145*83ee113eSDavid van Moolenbroek 	if (once) {
146*83ee113eSDavid van Moolenbroek 		log_fatal ("The standard socket API can only support %s",
147*83ee113eSDavid van Moolenbroek 		       "hosts with a single network interface.");
148*83ee113eSDavid van Moolenbroek 	}
149*83ee113eSDavid van Moolenbroek 	once = 1;
150*83ee113eSDavid van Moolenbroek #endif
151*83ee113eSDavid van Moolenbroek 
152*83ee113eSDavid van Moolenbroek 	/*
153*83ee113eSDavid van Moolenbroek 	 * Set up the address we're going to bind to, depending on the
154*83ee113eSDavid van Moolenbroek 	 * address family.
155*83ee113eSDavid van Moolenbroek 	 */
156*83ee113eSDavid van Moolenbroek 	memset(&name, 0, sizeof(name));
157*83ee113eSDavid van Moolenbroek 	switch (family) {
158*83ee113eSDavid van Moolenbroek #ifdef DHCPv6
159*83ee113eSDavid van Moolenbroek 	case AF_INET6:
160*83ee113eSDavid van Moolenbroek 		addr6 = (struct sockaddr_in6 *)&name;
161*83ee113eSDavid van Moolenbroek 		addr6->sin6_family = AF_INET6;
162*83ee113eSDavid van Moolenbroek 		addr6->sin6_port = local_port;
163*83ee113eSDavid van Moolenbroek 		if (linklocal6) {
164*83ee113eSDavid van Moolenbroek 			memcpy(&addr6->sin6_addr,
165*83ee113eSDavid van Moolenbroek 			       linklocal6,
166*83ee113eSDavid van Moolenbroek 			       sizeof(addr6->sin6_addr));
167*83ee113eSDavid van Moolenbroek 			addr6->sin6_scope_id = if_nametoindex(info->name);
168*83ee113eSDavid van Moolenbroek 		}
169*83ee113eSDavid van Moolenbroek #ifdef HAVE_SA_LEN
170*83ee113eSDavid van Moolenbroek 		addr6->sin6_len = sizeof(*addr6);
171*83ee113eSDavid van Moolenbroek #endif
172*83ee113eSDavid van Moolenbroek 		name_len = sizeof(*addr6);
173*83ee113eSDavid van Moolenbroek 		domain = PF_INET6;
174*83ee113eSDavid van Moolenbroek 		if ((info->flags & INTERFACE_STREAMS) == INTERFACE_UPSTREAM) {
175*83ee113eSDavid van Moolenbroek 			*do_multicast = 0;
176*83ee113eSDavid van Moolenbroek 		}
177*83ee113eSDavid van Moolenbroek 		break;
178*83ee113eSDavid van Moolenbroek #endif /* DHCPv6 */
179*83ee113eSDavid van Moolenbroek 
180*83ee113eSDavid van Moolenbroek 	case AF_INET:
181*83ee113eSDavid van Moolenbroek 	default:
182*83ee113eSDavid van Moolenbroek 		addr = (struct sockaddr_in *)&name;
183*83ee113eSDavid van Moolenbroek 		addr->sin_family = AF_INET;
184*83ee113eSDavid van Moolenbroek 		addr->sin_port = local_port;
185*83ee113eSDavid van Moolenbroek 		memcpy(&addr->sin_addr,
186*83ee113eSDavid van Moolenbroek 		       &local_address,
187*83ee113eSDavid van Moolenbroek 		       sizeof(addr->sin_addr));
188*83ee113eSDavid van Moolenbroek #ifdef HAVE_SA_LEN
189*83ee113eSDavid van Moolenbroek 		addr->sin_len = sizeof(*addr);
190*83ee113eSDavid van Moolenbroek #endif
191*83ee113eSDavid van Moolenbroek 		name_len = sizeof(*addr);
192*83ee113eSDavid van Moolenbroek 		domain = PF_INET;
193*83ee113eSDavid van Moolenbroek 		break;
194*83ee113eSDavid van Moolenbroek 	}
195*83ee113eSDavid van Moolenbroek 
196*83ee113eSDavid van Moolenbroek 	/* Make a socket... */
197*83ee113eSDavid van Moolenbroek 	sock = socket(domain, SOCK_DGRAM, IPPROTO_UDP);
198*83ee113eSDavid van Moolenbroek 	if (sock < 0) {
199*83ee113eSDavid van Moolenbroek 		log_fatal("Can't create dhcp socket: %m");
200*83ee113eSDavid van Moolenbroek 	}
201*83ee113eSDavid van Moolenbroek 
202*83ee113eSDavid van Moolenbroek 	/* Set the REUSEADDR option so that we don't fail to start if
203*83ee113eSDavid van Moolenbroek 	   we're being restarted. */
204*83ee113eSDavid van Moolenbroek 	flag = 1;
205*83ee113eSDavid van Moolenbroek 	if (setsockopt(sock, SOL_SOCKET, SO_REUSEADDR,
206*83ee113eSDavid van Moolenbroek 			(char *)&flag, sizeof(flag)) < 0) {
207*83ee113eSDavid van Moolenbroek 		log_fatal("Can't set SO_REUSEADDR option on dhcp socket: %m");
208*83ee113eSDavid van Moolenbroek 	}
209*83ee113eSDavid van Moolenbroek 
210*83ee113eSDavid van Moolenbroek 	/* Set the BROADCAST option so that we can broadcast DHCP responses.
211*83ee113eSDavid van Moolenbroek 	   We shouldn't do this for fallback devices, and we can detect that
212*83ee113eSDavid van Moolenbroek 	   a device is a fallback because it has no ifp structure. */
213*83ee113eSDavid van Moolenbroek 	if (info->ifp &&
214*83ee113eSDavid van Moolenbroek 	    (setsockopt(sock, SOL_SOCKET, SO_BROADCAST,
215*83ee113eSDavid van Moolenbroek 			 (char *)&flag, sizeof(flag)) < 0)) {
216*83ee113eSDavid van Moolenbroek 		log_fatal("Can't set SO_BROADCAST option on dhcp socket: %m");
217*83ee113eSDavid van Moolenbroek 	}
218*83ee113eSDavid van Moolenbroek 
219*83ee113eSDavid van Moolenbroek #if defined(DHCPv6) && defined(SO_REUSEPORT)
220*83ee113eSDavid van Moolenbroek 	/*
221*83ee113eSDavid van Moolenbroek 	 * We only set SO_REUSEPORT on AF_INET6 sockets, so that multiple
222*83ee113eSDavid van Moolenbroek 	 * daemons can bind to their own sockets and get data for their
223*83ee113eSDavid van Moolenbroek 	 * respective interfaces.  This does not (and should not) affect
224*83ee113eSDavid van Moolenbroek 	 * DHCPv4 sockets; we can't yet support BSD sockets well, much
225*83ee113eSDavid van Moolenbroek 	 * less multiple sockets. Make sense only with multicast.
226*83ee113eSDavid van Moolenbroek 	 */
227*83ee113eSDavid van Moolenbroek 	if ((local_family == AF_INET6) && *do_multicast) {
228*83ee113eSDavid van Moolenbroek 		flag = 1;
229*83ee113eSDavid van Moolenbroek 		if (setsockopt(sock, SOL_SOCKET, SO_REUSEPORT,
230*83ee113eSDavid van Moolenbroek 			       (char *)&flag, sizeof(flag)) < 0) {
231*83ee113eSDavid van Moolenbroek 			log_fatal("Can't set SO_REUSEPORT option on dhcp "
232*83ee113eSDavid van Moolenbroek 				  "socket: %m");
233*83ee113eSDavid van Moolenbroek 		}
234*83ee113eSDavid van Moolenbroek 	}
235*83ee113eSDavid van Moolenbroek #endif
236*83ee113eSDavid van Moolenbroek 
237*83ee113eSDavid van Moolenbroek 	/* Bind the socket to this interface's IP address. */
238*83ee113eSDavid van Moolenbroek 	if (bind(sock, (struct sockaddr *)&name, name_len) < 0) {
239*83ee113eSDavid van Moolenbroek 		log_error("Can't bind to dhcp address: %m");
240*83ee113eSDavid van Moolenbroek 		log_error("Please make sure there is no other dhcp server");
241*83ee113eSDavid van Moolenbroek 		log_error("running and that there's no entry for dhcp or");
242*83ee113eSDavid van Moolenbroek 		log_error("bootp in /etc/inetd.conf.   Also make sure you");
243*83ee113eSDavid van Moolenbroek 		log_error("are not running HP JetAdmin software, which");
244*83ee113eSDavid van Moolenbroek 		log_fatal("includes a bootp server.");
245*83ee113eSDavid van Moolenbroek 	}
246*83ee113eSDavid van Moolenbroek 
247*83ee113eSDavid van Moolenbroek #if defined(SO_BINDTODEVICE)
248*83ee113eSDavid van Moolenbroek 	/* Bind this socket to this interface. */
249*83ee113eSDavid van Moolenbroek 	if ((local_family != AF_INET6) && (info->ifp != NULL) &&
250*83ee113eSDavid van Moolenbroek 	    setsockopt(sock, SOL_SOCKET, SO_BINDTODEVICE,
251*83ee113eSDavid van Moolenbroek 			(char *)(info -> ifp), sizeof(*(info -> ifp))) < 0) {
252*83ee113eSDavid van Moolenbroek 		log_fatal("setsockopt: SO_BINDTODEVICE: %m");
253*83ee113eSDavid van Moolenbroek 	}
254*83ee113eSDavid van Moolenbroek #endif
255*83ee113eSDavid van Moolenbroek 
256*83ee113eSDavid van Moolenbroek 	/* IP_BROADCAST_IF instructs the kernel which interface to send
257*83ee113eSDavid van Moolenbroek 	 * IP packets whose destination address is 255.255.255.255.  These
258*83ee113eSDavid van Moolenbroek 	 * will be treated as subnet broadcasts on the interface identified
259*83ee113eSDavid van Moolenbroek 	 * by ip address (info -> primary_address).  This is only known to
260*83ee113eSDavid van Moolenbroek 	 * be defined in SCO system headers, and may not be defined in all
261*83ee113eSDavid van Moolenbroek 	 * releases.
262*83ee113eSDavid van Moolenbroek 	 */
263*83ee113eSDavid van Moolenbroek #if defined(SCO) && defined(IP_BROADCAST_IF)
264*83ee113eSDavid van Moolenbroek         if (info->address_count &&
265*83ee113eSDavid van Moolenbroek 	    setsockopt(sock, IPPROTO_IP, IP_BROADCAST_IF, &info->addresses[0],
266*83ee113eSDavid van Moolenbroek 		       sizeof(info->addresses[0])) < 0)
267*83ee113eSDavid van Moolenbroek 		log_fatal("Can't set IP_BROADCAST_IF on dhcp socket: %m");
268*83ee113eSDavid van Moolenbroek #endif
269*83ee113eSDavid van Moolenbroek 
270*83ee113eSDavid van Moolenbroek #if defined(IP_PKTINFO) && defined(IP_RECVPKTINFO)  && defined(USE_V4_PKTINFO)
271*83ee113eSDavid van Moolenbroek 	/*
272*83ee113eSDavid van Moolenbroek 	 * If we turn on IP_RECVPKTINFO we will be able to receive
273*83ee113eSDavid van Moolenbroek 	 * the interface index information of the received packet.
274*83ee113eSDavid van Moolenbroek 	 */
275*83ee113eSDavid van Moolenbroek 	if (family == AF_INET) {
276*83ee113eSDavid van Moolenbroek 		int on = 1;
277*83ee113eSDavid van Moolenbroek 		if (setsockopt(sock, IPPROTO_IP, IP_RECVPKTINFO,
278*83ee113eSDavid van Moolenbroek 		               &on, sizeof(on)) != 0) {
279*83ee113eSDavid van Moolenbroek 			log_fatal("setsockopt: IPV_RECVPKTINFO: %m");
280*83ee113eSDavid van Moolenbroek 		}
281*83ee113eSDavid van Moolenbroek 	}
282*83ee113eSDavid van Moolenbroek #endif
283*83ee113eSDavid van Moolenbroek 
284*83ee113eSDavid van Moolenbroek #ifdef DHCPv6
285*83ee113eSDavid van Moolenbroek 	/*
286*83ee113eSDavid van Moolenbroek 	 * If we turn on IPV6_PKTINFO, we will be able to receive
287*83ee113eSDavid van Moolenbroek 	 * additional information, such as the destination IP address.
288*83ee113eSDavid van Moolenbroek 	 * We need this to spot unicast packets.
289*83ee113eSDavid van Moolenbroek 	 */
290*83ee113eSDavid van Moolenbroek 	if (family == AF_INET6) {
291*83ee113eSDavid van Moolenbroek 		int on = 1;
292*83ee113eSDavid van Moolenbroek #ifdef IPV6_RECVPKTINFO
293*83ee113eSDavid van Moolenbroek 		/* RFC3542 */
294*83ee113eSDavid van Moolenbroek 		if (setsockopt(sock, IPPROTO_IPV6, IPV6_RECVPKTINFO,
295*83ee113eSDavid van Moolenbroek 		               &on, sizeof(on)) != 0) {
296*83ee113eSDavid van Moolenbroek 			log_fatal("setsockopt: IPV6_RECVPKTINFO: %m");
297*83ee113eSDavid van Moolenbroek 		}
298*83ee113eSDavid van Moolenbroek #else
299*83ee113eSDavid van Moolenbroek 		/* RFC2292 */
300*83ee113eSDavid van Moolenbroek 		if (setsockopt(sock, IPPROTO_IPV6, IPV6_PKTINFO,
301*83ee113eSDavid van Moolenbroek 		               &on, sizeof(on)) != 0) {
302*83ee113eSDavid van Moolenbroek 			log_fatal("setsockopt: IPV6_PKTINFO: %m");
303*83ee113eSDavid van Moolenbroek 		}
304*83ee113eSDavid van Moolenbroek #endif
305*83ee113eSDavid van Moolenbroek 	}
306*83ee113eSDavid van Moolenbroek 
307*83ee113eSDavid van Moolenbroek 	if ((family == AF_INET6) &&
308*83ee113eSDavid van Moolenbroek 	    ((info->flags & INTERFACE_UPSTREAM) != 0)) {
309*83ee113eSDavid van Moolenbroek 		int hop_limit = 32;
310*83ee113eSDavid van Moolenbroek 		if (setsockopt(sock, IPPROTO_IPV6, IPV6_MULTICAST_HOPS,
311*83ee113eSDavid van Moolenbroek 			       &hop_limit, sizeof(int)) < 0) {
312*83ee113eSDavid van Moolenbroek 			log_fatal("setsockopt: IPV6_MULTICAST_HOPS: %m");
313*83ee113eSDavid van Moolenbroek 		}
314*83ee113eSDavid van Moolenbroek 	}
315*83ee113eSDavid van Moolenbroek #endif /* DHCPv6 */
316*83ee113eSDavid van Moolenbroek 
317*83ee113eSDavid van Moolenbroek 	return sock;
318*83ee113eSDavid van Moolenbroek }
319*83ee113eSDavid van Moolenbroek #endif /* USE_SOCKET_SEND || USE_SOCKET_RECEIVE || USE_SOCKET_FALLBACK */
320*83ee113eSDavid van Moolenbroek 
321*83ee113eSDavid van Moolenbroek #if defined (USE_SOCKET_SEND) || defined (USE_SOCKET_FALLBACK)
if_register_send(info)322*83ee113eSDavid van Moolenbroek void if_register_send (info)
323*83ee113eSDavid van Moolenbroek 	struct interface_info *info;
324*83ee113eSDavid van Moolenbroek {
325*83ee113eSDavid van Moolenbroek #ifndef USE_SOCKET_RECEIVE
326*83ee113eSDavid van Moolenbroek 	info->wfdesc = if_register_socket(info, AF_INET, 0, NULL);
327*83ee113eSDavid van Moolenbroek 	/* If this is a normal IPv4 address, get the hardware address. */
328*83ee113eSDavid van Moolenbroek 	if (strcmp(info->name, "fallback") != 0)
329*83ee113eSDavid van Moolenbroek 		get_hw_addr(info->name, &info->hw_address);
330*83ee113eSDavid van Moolenbroek #if defined (USE_SOCKET_FALLBACK)
331*83ee113eSDavid van Moolenbroek 	/* Fallback only registers for send, but may need to receive as
332*83ee113eSDavid van Moolenbroek 	   well. */
333*83ee113eSDavid van Moolenbroek 	info->rfdesc = info->wfdesc;
334*83ee113eSDavid van Moolenbroek #endif
335*83ee113eSDavid van Moolenbroek #else
336*83ee113eSDavid van Moolenbroek 	info->wfdesc = info->rfdesc;
337*83ee113eSDavid van Moolenbroek #endif
338*83ee113eSDavid van Moolenbroek 	if (!quiet_interface_discovery)
339*83ee113eSDavid van Moolenbroek 		log_info ("Sending on   Socket/%s%s%s",
340*83ee113eSDavid van Moolenbroek 		      info->name,
341*83ee113eSDavid van Moolenbroek 		      (info->shared_network ? "/" : ""),
342*83ee113eSDavid van Moolenbroek 		      (info->shared_network ?
343*83ee113eSDavid van Moolenbroek 		       info->shared_network->name : ""));
344*83ee113eSDavid van Moolenbroek }
345*83ee113eSDavid van Moolenbroek 
346*83ee113eSDavid van Moolenbroek #if defined (USE_SOCKET_SEND)
if_deregister_send(info)347*83ee113eSDavid van Moolenbroek void if_deregister_send (info)
348*83ee113eSDavid van Moolenbroek 	struct interface_info *info;
349*83ee113eSDavid van Moolenbroek {
350*83ee113eSDavid van Moolenbroek #ifndef USE_SOCKET_RECEIVE
351*83ee113eSDavid van Moolenbroek 	close (info -> wfdesc);
352*83ee113eSDavid van Moolenbroek #endif
353*83ee113eSDavid van Moolenbroek 	info -> wfdesc = -1;
354*83ee113eSDavid van Moolenbroek 
355*83ee113eSDavid van Moolenbroek 	if (!quiet_interface_discovery)
356*83ee113eSDavid van Moolenbroek 		log_info ("Disabling output on Socket/%s%s%s",
357*83ee113eSDavid van Moolenbroek 		      info -> name,
358*83ee113eSDavid van Moolenbroek 		      (info -> shared_network ? "/" : ""),
359*83ee113eSDavid van Moolenbroek 		      (info -> shared_network ?
360*83ee113eSDavid van Moolenbroek 		       info -> shared_network -> name : ""));
361*83ee113eSDavid van Moolenbroek }
362*83ee113eSDavid van Moolenbroek #endif /* USE_SOCKET_SEND */
363*83ee113eSDavid van Moolenbroek #endif /* USE_SOCKET_SEND || USE_SOCKET_FALLBACK */
364*83ee113eSDavid van Moolenbroek 
365*83ee113eSDavid van Moolenbroek #ifdef USE_SOCKET_RECEIVE
if_register_receive(info)366*83ee113eSDavid van Moolenbroek void if_register_receive (info)
367*83ee113eSDavid van Moolenbroek 	struct interface_info *info;
368*83ee113eSDavid van Moolenbroek {
369*83ee113eSDavid van Moolenbroek 
370*83ee113eSDavid van Moolenbroek #if defined(IP_PKTINFO) && defined(IP_RECVPKTINFO) && defined(USE_V4_PKTINFO)
371*83ee113eSDavid van Moolenbroek 	if (global_v4_socket_references == 0) {
372*83ee113eSDavid van Moolenbroek 		global_v4_socket = if_register_socket(info, AF_INET, 0, NULL);
373*83ee113eSDavid van Moolenbroek 		if (global_v4_socket < 0) {
374*83ee113eSDavid van Moolenbroek 			/*
375*83ee113eSDavid van Moolenbroek 			 * if_register_socket() fatally logs if it fails to
376*83ee113eSDavid van Moolenbroek 			 * create a socket, this is just a sanity check.
377*83ee113eSDavid van Moolenbroek 			 */
378*83ee113eSDavid van Moolenbroek 			log_fatal("Failed to create AF_INET socket %s:%d",
379*83ee113eSDavid van Moolenbroek 				  MDL);
380*83ee113eSDavid van Moolenbroek 		}
381*83ee113eSDavid van Moolenbroek 	}
382*83ee113eSDavid van Moolenbroek 
383*83ee113eSDavid van Moolenbroek 	info->rfdesc = global_v4_socket;
384*83ee113eSDavid van Moolenbroek 	global_v4_socket_references++;
385*83ee113eSDavid van Moolenbroek #else
386*83ee113eSDavid van Moolenbroek 	/* If we're using the socket API for sending and receiving,
387*83ee113eSDavid van Moolenbroek 	   we don't need to register this interface twice. */
388*83ee113eSDavid van Moolenbroek 	info->rfdesc = if_register_socket(info, AF_INET, 0, NULL);
389*83ee113eSDavid van Moolenbroek #endif /* IP_PKTINFO... */
390*83ee113eSDavid van Moolenbroek 	/* If this is a normal IPv4 address, get the hardware address. */
391*83ee113eSDavid van Moolenbroek 	if (strcmp(info->name, "fallback") != 0)
392*83ee113eSDavid van Moolenbroek 		get_hw_addr(info->name, &info->hw_address);
393*83ee113eSDavid van Moolenbroek 
394*83ee113eSDavid van Moolenbroek 	if (!quiet_interface_discovery)
395*83ee113eSDavid van Moolenbroek 		log_info ("Listening on Socket/%s%s%s",
396*83ee113eSDavid van Moolenbroek 		      info->name,
397*83ee113eSDavid van Moolenbroek 		      (info->shared_network ? "/" : ""),
398*83ee113eSDavid van Moolenbroek 		      (info->shared_network ?
399*83ee113eSDavid van Moolenbroek 		       info->shared_network->name : ""));
400*83ee113eSDavid van Moolenbroek }
401*83ee113eSDavid van Moolenbroek 
if_deregister_receive(info)402*83ee113eSDavid van Moolenbroek void if_deregister_receive (info)
403*83ee113eSDavid van Moolenbroek 	struct interface_info *info;
404*83ee113eSDavid van Moolenbroek {
405*83ee113eSDavid van Moolenbroek #if defined(IP_PKTINFO) && defined(IP_RECVPKTINFO) && defined(USE_V4_PKTINFO)
406*83ee113eSDavid van Moolenbroek 	/* Dereference the global v4 socket. */
407*83ee113eSDavid van Moolenbroek 	if ((info->rfdesc == global_v4_socket) &&
408*83ee113eSDavid van Moolenbroek 	    (info->wfdesc == global_v4_socket) &&
409*83ee113eSDavid van Moolenbroek 	    (global_v4_socket_references > 0)) {
410*83ee113eSDavid van Moolenbroek 		global_v4_socket_references--;
411*83ee113eSDavid van Moolenbroek 		info->rfdesc = -1;
412*83ee113eSDavid van Moolenbroek 	} else {
413*83ee113eSDavid van Moolenbroek 		log_fatal("Impossible condition at %s:%d", MDL);
414*83ee113eSDavid van Moolenbroek 	}
415*83ee113eSDavid van Moolenbroek 
416*83ee113eSDavid van Moolenbroek 	if (global_v4_socket_references == 0) {
417*83ee113eSDavid van Moolenbroek 		close(global_v4_socket);
418*83ee113eSDavid van Moolenbroek 		global_v4_socket = -1;
419*83ee113eSDavid van Moolenbroek 	}
420*83ee113eSDavid van Moolenbroek #else
421*83ee113eSDavid van Moolenbroek 	close(info->rfdesc);
422*83ee113eSDavid van Moolenbroek 	info->rfdesc = -1;
423*83ee113eSDavid van Moolenbroek #endif /* IP_PKTINFO... */
424*83ee113eSDavid van Moolenbroek 	if (!quiet_interface_discovery)
425*83ee113eSDavid van Moolenbroek 		log_info ("Disabling input on Socket/%s%s%s",
426*83ee113eSDavid van Moolenbroek 		      info -> name,
427*83ee113eSDavid van Moolenbroek 		      (info -> shared_network ? "/" : ""),
428*83ee113eSDavid van Moolenbroek 		      (info -> shared_network ?
429*83ee113eSDavid van Moolenbroek 		       info -> shared_network -> name : ""));
430*83ee113eSDavid van Moolenbroek }
431*83ee113eSDavid van Moolenbroek #endif /* USE_SOCKET_RECEIVE */
432*83ee113eSDavid van Moolenbroek 
433*83ee113eSDavid van Moolenbroek 
434*83ee113eSDavid van Moolenbroek #ifdef DHCPv6
435*83ee113eSDavid van Moolenbroek /*
436*83ee113eSDavid van Moolenbroek  * This function joins the interface to DHCPv6 multicast groups so we will
437*83ee113eSDavid van Moolenbroek  * receive multicast messages.
438*83ee113eSDavid van Moolenbroek  */
439*83ee113eSDavid van Moolenbroek static void
if_register_multicast(struct interface_info * info)440*83ee113eSDavid van Moolenbroek if_register_multicast(struct interface_info *info) {
441*83ee113eSDavid van Moolenbroek 	int sock = info->rfdesc;
442*83ee113eSDavid van Moolenbroek 	struct ipv6_mreq mreq;
443*83ee113eSDavid van Moolenbroek 
444*83ee113eSDavid van Moolenbroek 	if (inet_pton(AF_INET6, All_DHCP_Relay_Agents_and_Servers,
445*83ee113eSDavid van Moolenbroek 		      &mreq.ipv6mr_multiaddr) <= 0) {
446*83ee113eSDavid van Moolenbroek 		log_fatal("inet_pton: unable to convert '%s'",
447*83ee113eSDavid van Moolenbroek 			  All_DHCP_Relay_Agents_and_Servers);
448*83ee113eSDavid van Moolenbroek 	}
449*83ee113eSDavid van Moolenbroek 	mreq.ipv6mr_interface = if_nametoindex(info->name);
450*83ee113eSDavid van Moolenbroek 	if (setsockopt(sock, IPPROTO_IPV6, IPV6_JOIN_GROUP,
451*83ee113eSDavid van Moolenbroek 		       &mreq, sizeof(mreq)) < 0) {
452*83ee113eSDavid van Moolenbroek 		log_fatal("setsockopt: IPV6_JOIN_GROUP: %m");
453*83ee113eSDavid van Moolenbroek 	}
454*83ee113eSDavid van Moolenbroek 
455*83ee113eSDavid van Moolenbroek 	/*
456*83ee113eSDavid van Moolenbroek 	 * The relay agent code sets the streams so you know which way
457*83ee113eSDavid van Moolenbroek 	 * is up and down.  But a relay agent shouldn't join to the
458*83ee113eSDavid van Moolenbroek 	 * Server address, or else you get fun loops.  So up or down
459*83ee113eSDavid van Moolenbroek 	 * doesn't matter, we're just using that config to sense this is
460*83ee113eSDavid van Moolenbroek 	 * a relay agent.
461*83ee113eSDavid van Moolenbroek 	 */
462*83ee113eSDavid van Moolenbroek 	if ((info->flags & INTERFACE_STREAMS) == 0) {
463*83ee113eSDavid van Moolenbroek 		if (inet_pton(AF_INET6, All_DHCP_Servers,
464*83ee113eSDavid van Moolenbroek 			      &mreq.ipv6mr_multiaddr) <= 0) {
465*83ee113eSDavid van Moolenbroek 			log_fatal("inet_pton: unable to convert '%s'",
466*83ee113eSDavid van Moolenbroek 				  All_DHCP_Servers);
467*83ee113eSDavid van Moolenbroek 		}
468*83ee113eSDavid van Moolenbroek 		mreq.ipv6mr_interface = if_nametoindex(info->name);
469*83ee113eSDavid van Moolenbroek 		if (setsockopt(sock, IPPROTO_IPV6, IPV6_JOIN_GROUP,
470*83ee113eSDavid van Moolenbroek 			       &mreq, sizeof(mreq)) < 0) {
471*83ee113eSDavid van Moolenbroek 			log_fatal("setsockopt: IPV6_JOIN_GROUP: %m");
472*83ee113eSDavid van Moolenbroek 		}
473*83ee113eSDavid van Moolenbroek 	}
474*83ee113eSDavid van Moolenbroek }
475*83ee113eSDavid van Moolenbroek 
476*83ee113eSDavid van Moolenbroek void
if_register6(struct interface_info * info,int do_multicast)477*83ee113eSDavid van Moolenbroek if_register6(struct interface_info *info, int do_multicast) {
478*83ee113eSDavid van Moolenbroek 	/* Bounce do_multicast to a stack variable because we may change it. */
479*83ee113eSDavid van Moolenbroek 	int req_multi = do_multicast;
480*83ee113eSDavid van Moolenbroek 
481*83ee113eSDavid van Moolenbroek 	if (no_global_v6_socket) {
482*83ee113eSDavid van Moolenbroek 		log_fatal("Impossible condition at %s:%d", MDL);
483*83ee113eSDavid van Moolenbroek 	}
484*83ee113eSDavid van Moolenbroek 
485*83ee113eSDavid van Moolenbroek 	if (global_v6_socket_references == 0) {
486*83ee113eSDavid van Moolenbroek 		global_v6_socket = if_register_socket(info, AF_INET6,
487*83ee113eSDavid van Moolenbroek 						      &req_multi, NULL);
488*83ee113eSDavid van Moolenbroek 		if (global_v6_socket < 0) {
489*83ee113eSDavid van Moolenbroek 			/*
490*83ee113eSDavid van Moolenbroek 			 * if_register_socket() fatally logs if it fails to
491*83ee113eSDavid van Moolenbroek 			 * create a socket, this is just a sanity check.
492*83ee113eSDavid van Moolenbroek 			 */
493*83ee113eSDavid van Moolenbroek 			log_fatal("Impossible condition at %s:%d", MDL);
494*83ee113eSDavid van Moolenbroek 		} else {
495*83ee113eSDavid van Moolenbroek 			log_info("Bound to *:%d", ntohs(local_port));
496*83ee113eSDavid van Moolenbroek 		}
497*83ee113eSDavid van Moolenbroek 	}
498*83ee113eSDavid van Moolenbroek 
499*83ee113eSDavid van Moolenbroek 	info->rfdesc = global_v6_socket;
500*83ee113eSDavid van Moolenbroek 	info->wfdesc = global_v6_socket;
501*83ee113eSDavid van Moolenbroek 	global_v6_socket_references++;
502*83ee113eSDavid van Moolenbroek 
503*83ee113eSDavid van Moolenbroek 	if (req_multi)
504*83ee113eSDavid van Moolenbroek 		if_register_multicast(info);
505*83ee113eSDavid van Moolenbroek 
506*83ee113eSDavid van Moolenbroek 	get_hw_addr(info->name, &info->hw_address);
507*83ee113eSDavid van Moolenbroek 
508*83ee113eSDavid van Moolenbroek 	if (!quiet_interface_discovery) {
509*83ee113eSDavid van Moolenbroek 		if (info->shared_network != NULL) {
510*83ee113eSDavid van Moolenbroek 			log_info("Listening on Socket/%d/%s/%s",
511*83ee113eSDavid van Moolenbroek 				 global_v6_socket, info->name,
512*83ee113eSDavid van Moolenbroek 				 info->shared_network->name);
513*83ee113eSDavid van Moolenbroek 			log_info("Sending on   Socket/%d/%s/%s",
514*83ee113eSDavid van Moolenbroek 				 global_v6_socket, info->name,
515*83ee113eSDavid van Moolenbroek 				 info->shared_network->name);
516*83ee113eSDavid van Moolenbroek 		} else {
517*83ee113eSDavid van Moolenbroek 			log_info("Listening on Socket/%s", info->name);
518*83ee113eSDavid van Moolenbroek 			log_info("Sending on   Socket/%s", info->name);
519*83ee113eSDavid van Moolenbroek 		}
520*83ee113eSDavid van Moolenbroek 	}
521*83ee113eSDavid van Moolenbroek }
522*83ee113eSDavid van Moolenbroek 
523*83ee113eSDavid van Moolenbroek /*
524*83ee113eSDavid van Moolenbroek  * Register an IPv6 socket bound to the link-local address of
525*83ee113eSDavid van Moolenbroek  * the argument interface (used by clients on a multiple interface box,
526*83ee113eSDavid van Moolenbroek  * vs. a server or a relay using the global IPv6 socket and running
527*83ee113eSDavid van Moolenbroek  * *only* in a single instance).
528*83ee113eSDavid van Moolenbroek  */
529*83ee113eSDavid van Moolenbroek void
if_register_linklocal6(struct interface_info * info)530*83ee113eSDavid van Moolenbroek if_register_linklocal6(struct interface_info *info) {
531*83ee113eSDavid van Moolenbroek 	int sock;
532*83ee113eSDavid van Moolenbroek 	int count;
533*83ee113eSDavid van Moolenbroek 	struct in6_addr *addr6 = NULL;
534*83ee113eSDavid van Moolenbroek 	int req_multi = 0;
535*83ee113eSDavid van Moolenbroek 
536*83ee113eSDavid van Moolenbroek 	if (global_v6_socket >= 0) {
537*83ee113eSDavid van Moolenbroek 		log_fatal("Impossible condition at %s:%d", MDL);
538*83ee113eSDavid van Moolenbroek 	}
539*83ee113eSDavid van Moolenbroek 
540*83ee113eSDavid van Moolenbroek 	no_global_v6_socket = 1;
541*83ee113eSDavid van Moolenbroek 
542*83ee113eSDavid van Moolenbroek 	/* get the (?) link-local address */
543*83ee113eSDavid van Moolenbroek 	for (count = 0; count < info->v6address_count; count++) {
544*83ee113eSDavid van Moolenbroek 		addr6 = &info->v6addresses[count];
545*83ee113eSDavid van Moolenbroek 		if (IN6_IS_ADDR_LINKLOCAL(addr6))
546*83ee113eSDavid van Moolenbroek 			break;
547*83ee113eSDavid van Moolenbroek 	}
548*83ee113eSDavid van Moolenbroek 
549*83ee113eSDavid van Moolenbroek 	if (!addr6) {
550*83ee113eSDavid van Moolenbroek 		log_fatal("no link-local IPv6 address for %s", info->name);
551*83ee113eSDavid van Moolenbroek 	}
552*83ee113eSDavid van Moolenbroek 
553*83ee113eSDavid van Moolenbroek 	sock = if_register_socket(info, AF_INET6, &req_multi, addr6);
554*83ee113eSDavid van Moolenbroek 
555*83ee113eSDavid van Moolenbroek 	if (sock < 0) {
556*83ee113eSDavid van Moolenbroek 		log_fatal("if_register_socket for %s fails", info->name);
557*83ee113eSDavid van Moolenbroek 	}
558*83ee113eSDavid van Moolenbroek 
559*83ee113eSDavid van Moolenbroek 	info->rfdesc = sock;
560*83ee113eSDavid van Moolenbroek 	info->wfdesc = sock;
561*83ee113eSDavid van Moolenbroek 
562*83ee113eSDavid van Moolenbroek 	get_hw_addr(info->name, &info->hw_address);
563*83ee113eSDavid van Moolenbroek 
564*83ee113eSDavid van Moolenbroek 	if (!quiet_interface_discovery) {
565*83ee113eSDavid van Moolenbroek 		if (info->shared_network != NULL) {
566*83ee113eSDavid van Moolenbroek 			log_info("Listening on Socket/%d/%s/%s",
567*83ee113eSDavid van Moolenbroek 				 global_v6_socket, info->name,
568*83ee113eSDavid van Moolenbroek 				 info->shared_network->name);
569*83ee113eSDavid van Moolenbroek 			log_info("Sending on   Socket/%d/%s/%s",
570*83ee113eSDavid van Moolenbroek 				 global_v6_socket, info->name,
571*83ee113eSDavid van Moolenbroek 				 info->shared_network->name);
572*83ee113eSDavid van Moolenbroek 		} else {
573*83ee113eSDavid van Moolenbroek 			log_info("Listening on Socket/%s", info->name);
574*83ee113eSDavid van Moolenbroek 			log_info("Sending on   Socket/%s", info->name);
575*83ee113eSDavid van Moolenbroek 		}
576*83ee113eSDavid van Moolenbroek 	}
577*83ee113eSDavid van Moolenbroek }
578*83ee113eSDavid van Moolenbroek 
579*83ee113eSDavid van Moolenbroek void
if_deregister6(struct interface_info * info)580*83ee113eSDavid van Moolenbroek if_deregister6(struct interface_info *info) {
581*83ee113eSDavid van Moolenbroek 	/* client case */
582*83ee113eSDavid van Moolenbroek 	if (no_global_v6_socket) {
583*83ee113eSDavid van Moolenbroek 		close(info->rfdesc);
584*83ee113eSDavid van Moolenbroek 		info->rfdesc = -1;
585*83ee113eSDavid van Moolenbroek 		info->wfdesc = -1;
586*83ee113eSDavid van Moolenbroek 	} else if ((info->rfdesc == global_v6_socket) &&
587*83ee113eSDavid van Moolenbroek 		   (info->wfdesc == global_v6_socket) &&
588*83ee113eSDavid van Moolenbroek 		   (global_v6_socket_references > 0)) {
589*83ee113eSDavid van Moolenbroek 		/* Dereference the global v6 socket. */
590*83ee113eSDavid van Moolenbroek 		global_v6_socket_references--;
591*83ee113eSDavid van Moolenbroek 		info->rfdesc = -1;
592*83ee113eSDavid van Moolenbroek 		info->wfdesc = -1;
593*83ee113eSDavid van Moolenbroek 	} else {
594*83ee113eSDavid van Moolenbroek 		log_fatal("Impossible condition at %s:%d", MDL);
595*83ee113eSDavid van Moolenbroek 	}
596*83ee113eSDavid van Moolenbroek 
597*83ee113eSDavid van Moolenbroek 	if (!quiet_interface_discovery) {
598*83ee113eSDavid van Moolenbroek 		if (info->shared_network != NULL) {
599*83ee113eSDavid van Moolenbroek 			log_info("Disabling input on  Socket/%s/%s", info->name,
600*83ee113eSDavid van Moolenbroek 		       		 info->shared_network->name);
601*83ee113eSDavid van Moolenbroek 			log_info("Disabling output on Socket/%s/%s", info->name,
602*83ee113eSDavid van Moolenbroek 		       		 info->shared_network->name);
603*83ee113eSDavid van Moolenbroek 		} else {
604*83ee113eSDavid van Moolenbroek 			log_info("Disabling input on  Socket/%s", info->name);
605*83ee113eSDavid van Moolenbroek 			log_info("Disabling output on Socket/%s", info->name);
606*83ee113eSDavid van Moolenbroek 		}
607*83ee113eSDavid van Moolenbroek 	}
608*83ee113eSDavid van Moolenbroek 
609*83ee113eSDavid van Moolenbroek 	if (!no_global_v6_socket &&
610*83ee113eSDavid van Moolenbroek 	    (global_v6_socket_references == 0)) {
611*83ee113eSDavid van Moolenbroek 		close(global_v6_socket);
612*83ee113eSDavid van Moolenbroek 		global_v6_socket = -1;
613*83ee113eSDavid van Moolenbroek 
614*83ee113eSDavid van Moolenbroek 		log_info("Unbound from *:%d", ntohs(local_port));
615*83ee113eSDavid van Moolenbroek 	}
616*83ee113eSDavid van Moolenbroek }
617*83ee113eSDavid van Moolenbroek #endif /* DHCPv6 */
618*83ee113eSDavid van Moolenbroek 
619*83ee113eSDavid van Moolenbroek #if defined (USE_SOCKET_SEND) || defined (USE_SOCKET_FALLBACK)
send_packet(interface,packet,raw,len,from,to,hto)620*83ee113eSDavid van Moolenbroek ssize_t send_packet (interface, packet, raw, len, from, to, hto)
621*83ee113eSDavid van Moolenbroek 	struct interface_info *interface;
622*83ee113eSDavid van Moolenbroek 	struct packet *packet;
623*83ee113eSDavid van Moolenbroek 	struct dhcp_packet *raw;
624*83ee113eSDavid van Moolenbroek 	size_t len;
625*83ee113eSDavid van Moolenbroek 	struct in_addr from;
626*83ee113eSDavid van Moolenbroek 	struct sockaddr_in *to;
627*83ee113eSDavid van Moolenbroek 	struct hardware *hto;
628*83ee113eSDavid van Moolenbroek {
629*83ee113eSDavid van Moolenbroek 	int result;
630*83ee113eSDavid van Moolenbroek #ifdef IGNORE_HOSTUNREACH
631*83ee113eSDavid van Moolenbroek 	int retry = 0;
632*83ee113eSDavid van Moolenbroek 	do {
633*83ee113eSDavid van Moolenbroek #endif
634*83ee113eSDavid van Moolenbroek #if defined(IP_PKTINFO) && defined(IP_RECVPKTINFO) && defined(USE_V4_PKTINFO)
635*83ee113eSDavid van Moolenbroek 		struct in_pktinfo pktinfo;
636*83ee113eSDavid van Moolenbroek 
637*83ee113eSDavid van Moolenbroek 		if (interface->ifp != NULL) {
638*83ee113eSDavid van Moolenbroek 			memset(&pktinfo, 0, sizeof (pktinfo));
639*83ee113eSDavid van Moolenbroek 			pktinfo.ipi_ifindex = interface->ifp->ifr_index;
640*83ee113eSDavid van Moolenbroek 			if (setsockopt(interface->wfdesc, IPPROTO_IP,
641*83ee113eSDavid van Moolenbroek 				       IP_PKTINFO, (char *)&pktinfo,
642*83ee113eSDavid van Moolenbroek 				       sizeof(pktinfo)) < 0)
643*83ee113eSDavid van Moolenbroek 				log_fatal("setsockopt: IP_PKTINFO: %m");
644*83ee113eSDavid van Moolenbroek 		}
645*83ee113eSDavid van Moolenbroek #endif
646*83ee113eSDavid van Moolenbroek 		result = sendto (interface -> wfdesc, (char *)raw, len, 0,
647*83ee113eSDavid van Moolenbroek 				 (struct sockaddr *)to, sizeof *to);
648*83ee113eSDavid van Moolenbroek #ifdef IGNORE_HOSTUNREACH
649*83ee113eSDavid van Moolenbroek 	} while (to -> sin_addr.s_addr == htonl (INADDR_BROADCAST) &&
650*83ee113eSDavid van Moolenbroek 		 result < 0 &&
651*83ee113eSDavid van Moolenbroek 		 (errno == EHOSTUNREACH ||
652*83ee113eSDavid van Moolenbroek 		  errno == ECONNREFUSED) &&
653*83ee113eSDavid van Moolenbroek 		 retry++ < 10);
654*83ee113eSDavid van Moolenbroek #endif
655*83ee113eSDavid van Moolenbroek 	if (result < 0) {
656*83ee113eSDavid van Moolenbroek 		log_error ("send_packet: %m");
657*83ee113eSDavid van Moolenbroek 		if (errno == ENETUNREACH)
658*83ee113eSDavid van Moolenbroek 			log_error ("send_packet: please consult README file%s",
659*83ee113eSDavid van Moolenbroek 				   " regarding broadcast address.");
660*83ee113eSDavid van Moolenbroek 	}
661*83ee113eSDavid van Moolenbroek 	return result;
662*83ee113eSDavid van Moolenbroek }
663*83ee113eSDavid van Moolenbroek 
664*83ee113eSDavid van Moolenbroek #endif /* USE_SOCKET_SEND || USE_SOCKET_FALLBACK */
665*83ee113eSDavid van Moolenbroek 
666*83ee113eSDavid van Moolenbroek #ifdef DHCPv6
667*83ee113eSDavid van Moolenbroek /*
668*83ee113eSDavid van Moolenbroek  * Solaris 9 is missing the CMSG_LEN and CMSG_SPACE macros, so we will
669*83ee113eSDavid van Moolenbroek  * synthesize them (based on the BIND 9 technique).
670*83ee113eSDavid van Moolenbroek  */
671*83ee113eSDavid van Moolenbroek 
672*83ee113eSDavid van Moolenbroek #ifndef CMSG_LEN
CMSG_LEN(size_t len)673*83ee113eSDavid van Moolenbroek static size_t CMSG_LEN(size_t len) {
674*83ee113eSDavid van Moolenbroek 	size_t hdrlen;
675*83ee113eSDavid van Moolenbroek 	/*
676*83ee113eSDavid van Moolenbroek 	 * Cast NULL so that any pointer arithmetic performed by CMSG_DATA
677*83ee113eSDavid van Moolenbroek 	 * is correct.
678*83ee113eSDavid van Moolenbroek 	 */
679*83ee113eSDavid van Moolenbroek 	hdrlen = (size_t)CMSG_DATA(((struct cmsghdr *)NULL));
680*83ee113eSDavid van Moolenbroek 	return hdrlen + len;
681*83ee113eSDavid van Moolenbroek }
682*83ee113eSDavid van Moolenbroek #endif /* !CMSG_LEN */
683*83ee113eSDavid van Moolenbroek 
684*83ee113eSDavid van Moolenbroek #ifndef CMSG_SPACE
CMSG_SPACE(size_t len)685*83ee113eSDavid van Moolenbroek static size_t CMSG_SPACE(size_t len) {
686*83ee113eSDavid van Moolenbroek 	struct msghdr msg;
687*83ee113eSDavid van Moolenbroek 	struct cmsghdr *cmsgp;
688*83ee113eSDavid van Moolenbroek 
689*83ee113eSDavid van Moolenbroek 	/*
690*83ee113eSDavid van Moolenbroek 	 * XXX: The buffer length is an ad-hoc value, but should be enough
691*83ee113eSDavid van Moolenbroek 	 * in a practical sense.
692*83ee113eSDavid van Moolenbroek 	 */
693*83ee113eSDavid van Moolenbroek 	union {
694*83ee113eSDavid van Moolenbroek 		struct cmsghdr cmsg_sizer;
695*83ee113eSDavid van Moolenbroek 		u_int8_t pktinfo_sizer[sizeof(struct cmsghdr) + 1024];
696*83ee113eSDavid van Moolenbroek 	} dummybuf;
697*83ee113eSDavid van Moolenbroek 
698*83ee113eSDavid van Moolenbroek 	memset(&msg, 0, sizeof(msg));
699*83ee113eSDavid van Moolenbroek 	msg.msg_control = &dummybuf;
700*83ee113eSDavid van Moolenbroek 	msg.msg_controllen = sizeof(dummybuf);
701*83ee113eSDavid van Moolenbroek 
702*83ee113eSDavid van Moolenbroek 	cmsgp = (struct cmsghdr *)&dummybuf;
703*83ee113eSDavid van Moolenbroek 	cmsgp->cmsg_len = CMSG_LEN(len);
704*83ee113eSDavid van Moolenbroek 
705*83ee113eSDavid van Moolenbroek 	cmsgp = CMSG_NXTHDR(&msg, cmsgp);
706*83ee113eSDavid van Moolenbroek 	if (cmsgp != NULL) {
707*83ee113eSDavid van Moolenbroek 		return (char *)cmsgp - (char *)msg.msg_control;
708*83ee113eSDavid van Moolenbroek 	} else {
709*83ee113eSDavid van Moolenbroek 		return 0;
710*83ee113eSDavid van Moolenbroek 	}
711*83ee113eSDavid van Moolenbroek }
712*83ee113eSDavid van Moolenbroek #endif /* !CMSG_SPACE */
713*83ee113eSDavid van Moolenbroek 
714*83ee113eSDavid van Moolenbroek #endif /* DHCPv6 */
715*83ee113eSDavid van Moolenbroek 
716*83ee113eSDavid van Moolenbroek #if defined(DHCPv6) || \
717*83ee113eSDavid van Moolenbroek 	(defined(IP_PKTINFO) && defined(IP_RECVPKTINFO) && \
718*83ee113eSDavid van Moolenbroek 	 defined(USE_V4_PKTINFO))
719*83ee113eSDavid van Moolenbroek /*
720*83ee113eSDavid van Moolenbroek  * For both send_packet6() and receive_packet6() we need to allocate
721*83ee113eSDavid van Moolenbroek  * space for the cmsg header information.  We do this once and reuse
722*83ee113eSDavid van Moolenbroek  * the buffer.  We also need the control buf for send_packet() and
723*83ee113eSDavid van Moolenbroek  * receive_packet() when we use a single socket and IP_PKTINFO to
724*83ee113eSDavid van Moolenbroek  * send the packet out the correct interface.
725*83ee113eSDavid van Moolenbroek  */
726*83ee113eSDavid van Moolenbroek static void   *control_buf = NULL;
727*83ee113eSDavid van Moolenbroek static size_t  control_buf_len = 0;
728*83ee113eSDavid van Moolenbroek 
729*83ee113eSDavid van Moolenbroek static void
allocate_cmsg_cbuf(void)730*83ee113eSDavid van Moolenbroek allocate_cmsg_cbuf(void) {
731*83ee113eSDavid van Moolenbroek 	control_buf_len = CMSG_SPACE(sizeof(struct in6_pktinfo));
732*83ee113eSDavid van Moolenbroek 	control_buf = dmalloc(control_buf_len, MDL);
733*83ee113eSDavid van Moolenbroek 	return;
734*83ee113eSDavid van Moolenbroek }
735*83ee113eSDavid van Moolenbroek #endif /* DHCPv6, IP_PKTINFO ... */
736*83ee113eSDavid van Moolenbroek 
737*83ee113eSDavid van Moolenbroek #ifdef DHCPv6
738*83ee113eSDavid van Moolenbroek /*
739*83ee113eSDavid van Moolenbroek  * For both send_packet6() and receive_packet6() we need to use the
740*83ee113eSDavid van Moolenbroek  * sendmsg()/recvmsg() functions rather than the simpler send()/recv()
741*83ee113eSDavid van Moolenbroek  * functions.
742*83ee113eSDavid van Moolenbroek  *
743*83ee113eSDavid van Moolenbroek  * In the case of send_packet6(), we need to do this in order to insure
744*83ee113eSDavid van Moolenbroek  * that the reply packet leaves on the same interface that it arrived
745*83ee113eSDavid van Moolenbroek  * on.
746*83ee113eSDavid van Moolenbroek  *
747*83ee113eSDavid van Moolenbroek  * In the case of receive_packet6(), we need to do this in order to
748*83ee113eSDavid van Moolenbroek  * get the IP address the packet was sent to. This is used to identify
749*83ee113eSDavid van Moolenbroek  * whether a packet is multicast or unicast.
750*83ee113eSDavid van Moolenbroek  *
751*83ee113eSDavid van Moolenbroek  * Helpful man pages: recvmsg, readv (talks about the iovec stuff), cmsg.
752*83ee113eSDavid van Moolenbroek  *
753*83ee113eSDavid van Moolenbroek  * Also see the sections in RFC 3542 about IPV6_PKTINFO.
754*83ee113eSDavid van Moolenbroek  */
755*83ee113eSDavid van Moolenbroek 
756*83ee113eSDavid van Moolenbroek /* Send an IPv6 packet */
send_packet6(struct interface_info * interface,const unsigned char * raw,size_t len,struct sockaddr_in6 * to)757*83ee113eSDavid van Moolenbroek ssize_t send_packet6(struct interface_info *interface,
758*83ee113eSDavid van Moolenbroek 		     const unsigned char *raw, size_t len,
759*83ee113eSDavid van Moolenbroek 		     struct sockaddr_in6 *to) {
760*83ee113eSDavid van Moolenbroek 	struct msghdr m;
761*83ee113eSDavid van Moolenbroek 	struct iovec v;
762*83ee113eSDavid van Moolenbroek 	struct sockaddr_in6 dst;
763*83ee113eSDavid van Moolenbroek 	int result;
764*83ee113eSDavid van Moolenbroek 	struct in6_pktinfo *pktinfo;
765*83ee113eSDavid van Moolenbroek 	struct cmsghdr *cmsg;
766*83ee113eSDavid van Moolenbroek 	unsigned int ifindex;
767*83ee113eSDavid van Moolenbroek 
768*83ee113eSDavid van Moolenbroek 	/*
769*83ee113eSDavid van Moolenbroek 	 * If necessary allocate space for the control message header.
770*83ee113eSDavid van Moolenbroek 	 * The space is common between send and receive.
771*83ee113eSDavid van Moolenbroek 	 */
772*83ee113eSDavid van Moolenbroek 
773*83ee113eSDavid van Moolenbroek 	if (control_buf == NULL) {
774*83ee113eSDavid van Moolenbroek 		allocate_cmsg_cbuf();
775*83ee113eSDavid van Moolenbroek 		if (control_buf == NULL) {
776*83ee113eSDavid van Moolenbroek 			log_error("send_packet6: unable to allocate cmsg header");
777*83ee113eSDavid van Moolenbroek 			return(ENOMEM);
778*83ee113eSDavid van Moolenbroek 		}
779*83ee113eSDavid van Moolenbroek 	}
780*83ee113eSDavid van Moolenbroek 	memset(control_buf, 0, control_buf_len);
781*83ee113eSDavid van Moolenbroek 
782*83ee113eSDavid van Moolenbroek 	/*
783*83ee113eSDavid van Moolenbroek 	 * Initialize our message header structure.
784*83ee113eSDavid van Moolenbroek 	 */
785*83ee113eSDavid van Moolenbroek 	memset(&m, 0, sizeof(m));
786*83ee113eSDavid van Moolenbroek 
787*83ee113eSDavid van Moolenbroek 	/*
788*83ee113eSDavid van Moolenbroek 	 * Set the target address we're sending to.
789*83ee113eSDavid van Moolenbroek 	 * Enforce the scope ID for bogus BSDs.
790*83ee113eSDavid van Moolenbroek 	 */
791*83ee113eSDavid van Moolenbroek 	memcpy(&dst, to, sizeof(dst));
792*83ee113eSDavid van Moolenbroek 	m.msg_name = &dst;
793*83ee113eSDavid van Moolenbroek 	m.msg_namelen = sizeof(dst);
794*83ee113eSDavid van Moolenbroek 	ifindex = if_nametoindex(interface->name);
795*83ee113eSDavid van Moolenbroek 	if (no_global_v6_socket)
796*83ee113eSDavid van Moolenbroek 		dst.sin6_scope_id = ifindex;
797*83ee113eSDavid van Moolenbroek 
798*83ee113eSDavid van Moolenbroek 	/*
799*83ee113eSDavid van Moolenbroek 	 * Set the data buffer we're sending. (Using this wacky
800*83ee113eSDavid van Moolenbroek 	 * "scatter-gather" stuff... we only have a single chunk
801*83ee113eSDavid van Moolenbroek 	 * of data to send, so we declare a single vector entry.)
802*83ee113eSDavid van Moolenbroek 	 */
803*83ee113eSDavid van Moolenbroek 	v.iov_base = (char *)raw;
804*83ee113eSDavid van Moolenbroek 	v.iov_len = len;
805*83ee113eSDavid van Moolenbroek 	m.msg_iov = &v;
806*83ee113eSDavid van Moolenbroek 	m.msg_iovlen = 1;
807*83ee113eSDavid van Moolenbroek 
808*83ee113eSDavid van Moolenbroek 	/*
809*83ee113eSDavid van Moolenbroek 	 * Setting the interface is a bit more involved.
810*83ee113eSDavid van Moolenbroek 	 *
811*83ee113eSDavid van Moolenbroek 	 * We have to create a "control message", and set that to
812*83ee113eSDavid van Moolenbroek 	 * define the IPv6 packet information. We could set the
813*83ee113eSDavid van Moolenbroek 	 * source address if we wanted, but we can safely let the
814*83ee113eSDavid van Moolenbroek 	 * kernel decide what that should be.
815*83ee113eSDavid van Moolenbroek 	 */
816*83ee113eSDavid van Moolenbroek 	m.msg_control = control_buf;
817*83ee113eSDavid van Moolenbroek 	m.msg_controllen = control_buf_len;
818*83ee113eSDavid van Moolenbroek 	cmsg = CMSG_FIRSTHDR(&m);
819*83ee113eSDavid van Moolenbroek 	INSIST(cmsg != NULL);
820*83ee113eSDavid van Moolenbroek 	cmsg->cmsg_level = IPPROTO_IPV6;
821*83ee113eSDavid van Moolenbroek 	cmsg->cmsg_type = IPV6_PKTINFO;
822*83ee113eSDavid van Moolenbroek 	cmsg->cmsg_len = CMSG_LEN(sizeof(*pktinfo));
823*83ee113eSDavid van Moolenbroek 	pktinfo = (struct in6_pktinfo *)CMSG_DATA(cmsg);
824*83ee113eSDavid van Moolenbroek 	memset(pktinfo, 0, sizeof(*pktinfo));
825*83ee113eSDavid van Moolenbroek 	pktinfo->ipi6_ifindex = ifindex;
826*83ee113eSDavid van Moolenbroek 	m.msg_controllen = cmsg->cmsg_len;
827*83ee113eSDavid van Moolenbroek 
828*83ee113eSDavid van Moolenbroek 	result = sendmsg(interface->wfdesc, &m, 0);
829*83ee113eSDavid van Moolenbroek 	if (result < 0) {
830*83ee113eSDavid van Moolenbroek 		log_error("send_packet6: %m");
831*83ee113eSDavid van Moolenbroek 	}
832*83ee113eSDavid van Moolenbroek 	return result;
833*83ee113eSDavid van Moolenbroek }
834*83ee113eSDavid van Moolenbroek #endif /* DHCPv6 */
835*83ee113eSDavid van Moolenbroek 
836*83ee113eSDavid van Moolenbroek #ifdef USE_SOCKET_RECEIVE
receive_packet(interface,buf,len,from,hfrom)837*83ee113eSDavid van Moolenbroek ssize_t receive_packet (interface, buf, len, from, hfrom)
838*83ee113eSDavid van Moolenbroek 	struct interface_info *interface;
839*83ee113eSDavid van Moolenbroek 	unsigned char *buf;
840*83ee113eSDavid van Moolenbroek 	size_t len;
841*83ee113eSDavid van Moolenbroek 	struct sockaddr_in *from;
842*83ee113eSDavid van Moolenbroek 	struct hardware *hfrom;
843*83ee113eSDavid van Moolenbroek {
844*83ee113eSDavid van Moolenbroek #if !(defined(IP_PKTINFO) && defined(IP_RECVPKTINFO) && defined(USE_V4_PKTINFO))
845*83ee113eSDavid van Moolenbroek 	SOCKLEN_T flen = sizeof *from;
846*83ee113eSDavid van Moolenbroek #endif
847*83ee113eSDavid van Moolenbroek 	int result;
848*83ee113eSDavid van Moolenbroek 
849*83ee113eSDavid van Moolenbroek 	/*
850*83ee113eSDavid van Moolenbroek 	 * The normal Berkeley socket interface doesn't give us any way
851*83ee113eSDavid van Moolenbroek 	 * to know what hardware interface we received the message on,
852*83ee113eSDavid van Moolenbroek 	 * but we should at least make sure the structure is emptied.
853*83ee113eSDavid van Moolenbroek 	 */
854*83ee113eSDavid van Moolenbroek 	memset(hfrom, 0, sizeof(*hfrom));
855*83ee113eSDavid van Moolenbroek 
856*83ee113eSDavid van Moolenbroek #ifdef IGNORE_HOSTUNREACH
857*83ee113eSDavid van Moolenbroek 	int retry = 0;
858*83ee113eSDavid van Moolenbroek 	do {
859*83ee113eSDavid van Moolenbroek #endif
860*83ee113eSDavid van Moolenbroek 
861*83ee113eSDavid van Moolenbroek #if defined(IP_PKTINFO) && defined(IP_RECVPKTINFO) && defined(USE_V4_PKTINFO)
862*83ee113eSDavid van Moolenbroek 	struct msghdr m;
863*83ee113eSDavid van Moolenbroek 	struct iovec v;
864*83ee113eSDavid van Moolenbroek 	struct cmsghdr *cmsg;
865*83ee113eSDavid van Moolenbroek 	struct in_pktinfo *pktinfo;
866*83ee113eSDavid van Moolenbroek 	unsigned int ifindex;
867*83ee113eSDavid van Moolenbroek 
868*83ee113eSDavid van Moolenbroek 	/*
869*83ee113eSDavid van Moolenbroek 	 * If necessary allocate space for the control message header.
870*83ee113eSDavid van Moolenbroek 	 * The space is common between send and receive.
871*83ee113eSDavid van Moolenbroek 	 */
872*83ee113eSDavid van Moolenbroek 	if (control_buf == NULL) {
873*83ee113eSDavid van Moolenbroek 		allocate_cmsg_cbuf();
874*83ee113eSDavid van Moolenbroek 		if (control_buf == NULL) {
875*83ee113eSDavid van Moolenbroek 			log_error("receive_packet: unable to allocate cmsg "
876*83ee113eSDavid van Moolenbroek 				  "header");
877*83ee113eSDavid van Moolenbroek 			return(ENOMEM);
878*83ee113eSDavid van Moolenbroek 		}
879*83ee113eSDavid van Moolenbroek 	}
880*83ee113eSDavid van Moolenbroek 	memset(control_buf, 0, control_buf_len);
881*83ee113eSDavid van Moolenbroek 
882*83ee113eSDavid van Moolenbroek 	/*
883*83ee113eSDavid van Moolenbroek 	 * Initialize our message header structure.
884*83ee113eSDavid van Moolenbroek 	 */
885*83ee113eSDavid van Moolenbroek 	memset(&m, 0, sizeof(m));
886*83ee113eSDavid van Moolenbroek 
887*83ee113eSDavid van Moolenbroek 	/*
888*83ee113eSDavid van Moolenbroek 	 * Point so we can get the from address.
889*83ee113eSDavid van Moolenbroek 	 */
890*83ee113eSDavid van Moolenbroek 	m.msg_name = from;
891*83ee113eSDavid van Moolenbroek 	m.msg_namelen = sizeof(*from);
892*83ee113eSDavid van Moolenbroek 
893*83ee113eSDavid van Moolenbroek 	/*
894*83ee113eSDavid van Moolenbroek 	 * Set the data buffer we're receiving. (Using this wacky
895*83ee113eSDavid van Moolenbroek 	 * "scatter-gather" stuff... but we that doesn't really make
896*83ee113eSDavid van Moolenbroek 	 * sense for us, so we use a single vector entry.)
897*83ee113eSDavid van Moolenbroek 	 */
898*83ee113eSDavid van Moolenbroek 	v.iov_base = buf;
899*83ee113eSDavid van Moolenbroek 	v.iov_len = len;
900*83ee113eSDavid van Moolenbroek 	m.msg_iov = &v;
901*83ee113eSDavid van Moolenbroek 	m.msg_iovlen = 1;
902*83ee113eSDavid van Moolenbroek 
903*83ee113eSDavid van Moolenbroek 	/*
904*83ee113eSDavid van Moolenbroek 	 * Getting the interface is a bit more involved.
905*83ee113eSDavid van Moolenbroek 	 *
906*83ee113eSDavid van Moolenbroek 	 * We set up some space for a "control message". We have
907*83ee113eSDavid van Moolenbroek 	 * previously asked the kernel to give us packet
908*83ee113eSDavid van Moolenbroek 	 * information (when we initialized the interface), so we
909*83ee113eSDavid van Moolenbroek 	 * should get the interface index from that.
910*83ee113eSDavid van Moolenbroek 	 */
911*83ee113eSDavid van Moolenbroek 	m.msg_control = control_buf;
912*83ee113eSDavid van Moolenbroek 	m.msg_controllen = control_buf_len;
913*83ee113eSDavid van Moolenbroek 
914*83ee113eSDavid van Moolenbroek 	result = recvmsg(interface->rfdesc, &m, 0);
915*83ee113eSDavid van Moolenbroek 
916*83ee113eSDavid van Moolenbroek 	if (result >= 0) {
917*83ee113eSDavid van Moolenbroek 		/*
918*83ee113eSDavid van Moolenbroek 		 * If we did read successfully, then we need to loop
919*83ee113eSDavid van Moolenbroek 		 * through the control messages we received and
920*83ee113eSDavid van Moolenbroek 		 * find the one with our inteface index.
921*83ee113eSDavid van Moolenbroek 		 */
922*83ee113eSDavid van Moolenbroek 		cmsg = CMSG_FIRSTHDR(&m);
923*83ee113eSDavid van Moolenbroek 		while (cmsg != NULL) {
924*83ee113eSDavid van Moolenbroek 			if ((cmsg->cmsg_level == IPPROTO_IP) &&
925*83ee113eSDavid van Moolenbroek 			    (cmsg->cmsg_type == IP_PKTINFO)) {
926*83ee113eSDavid van Moolenbroek 				pktinfo = (struct in_pktinfo *)CMSG_DATA(cmsg);
927*83ee113eSDavid van Moolenbroek 				ifindex = pktinfo->ipi_ifindex;
928*83ee113eSDavid van Moolenbroek 				/*
929*83ee113eSDavid van Moolenbroek 				 * We pass the ifindex back to the caller
930*83ee113eSDavid van Moolenbroek 				 * using the unused hfrom parameter avoiding
931*83ee113eSDavid van Moolenbroek 				 * interface changes between sockets and
932*83ee113eSDavid van Moolenbroek 				 * the discover code.
933*83ee113eSDavid van Moolenbroek 				 */
934*83ee113eSDavid van Moolenbroek 				memcpy(hfrom->hbuf, &ifindex, sizeof(ifindex));
935*83ee113eSDavid van Moolenbroek 				return (result);
936*83ee113eSDavid van Moolenbroek 			}
937*83ee113eSDavid van Moolenbroek 			cmsg = CMSG_NXTHDR(&m, cmsg);
938*83ee113eSDavid van Moolenbroek 		}
939*83ee113eSDavid van Moolenbroek 
940*83ee113eSDavid van Moolenbroek 		/*
941*83ee113eSDavid van Moolenbroek 		 * We didn't find the necessary control message
942*83ee113eSDavid van Moolenbroek 		 * flag it as an error
943*83ee113eSDavid van Moolenbroek 		 */
944*83ee113eSDavid van Moolenbroek 		result = -1;
945*83ee113eSDavid van Moolenbroek 		errno = EIO;
946*83ee113eSDavid van Moolenbroek 	}
947*83ee113eSDavid van Moolenbroek #else
948*83ee113eSDavid van Moolenbroek 		result = recvfrom(interface -> rfdesc, (char *)buf, len, 0,
949*83ee113eSDavid van Moolenbroek 				  (struct sockaddr *)from, &flen);
950*83ee113eSDavid van Moolenbroek #endif /* IP_PKTINFO ... */
951*83ee113eSDavid van Moolenbroek #ifdef IGNORE_HOSTUNREACH
952*83ee113eSDavid van Moolenbroek 	} while (result < 0 &&
953*83ee113eSDavid van Moolenbroek 		 (errno == EHOSTUNREACH ||
954*83ee113eSDavid van Moolenbroek 		  errno == ECONNREFUSED) &&
955*83ee113eSDavid van Moolenbroek 		 retry++ < 10);
956*83ee113eSDavid van Moolenbroek #endif
957*83ee113eSDavid van Moolenbroek 	return (result);
958*83ee113eSDavid van Moolenbroek }
959*83ee113eSDavid van Moolenbroek 
960*83ee113eSDavid van Moolenbroek #endif /* USE_SOCKET_RECEIVE */
961*83ee113eSDavid van Moolenbroek 
962*83ee113eSDavid van Moolenbroek #ifdef DHCPv6
963*83ee113eSDavid van Moolenbroek ssize_t
receive_packet6(struct interface_info * interface,unsigned char * buf,size_t len,struct sockaddr_in6 * from,struct in6_addr * to_addr,unsigned int * if_idx)964*83ee113eSDavid van Moolenbroek receive_packet6(struct interface_info *interface,
965*83ee113eSDavid van Moolenbroek 		unsigned char *buf, size_t len,
966*83ee113eSDavid van Moolenbroek 		struct sockaddr_in6 *from, struct in6_addr *to_addr,
967*83ee113eSDavid van Moolenbroek 		unsigned int *if_idx)
968*83ee113eSDavid van Moolenbroek {
969*83ee113eSDavid van Moolenbroek 	struct msghdr m;
970*83ee113eSDavid van Moolenbroek 	struct iovec v;
971*83ee113eSDavid van Moolenbroek 	int result;
972*83ee113eSDavid van Moolenbroek 	struct cmsghdr *cmsg;
973*83ee113eSDavid van Moolenbroek 	struct in6_pktinfo *pktinfo;
974*83ee113eSDavid van Moolenbroek 
975*83ee113eSDavid van Moolenbroek 	/*
976*83ee113eSDavid van Moolenbroek 	 * If necessary allocate space for the control message header.
977*83ee113eSDavid van Moolenbroek 	 * The space is common between send and receive.
978*83ee113eSDavid van Moolenbroek 	 */
979*83ee113eSDavid van Moolenbroek 	if (control_buf == NULL) {
980*83ee113eSDavid van Moolenbroek 		allocate_cmsg_cbuf();
981*83ee113eSDavid van Moolenbroek 		if (control_buf == NULL) {
982*83ee113eSDavid van Moolenbroek 			log_error("receive_packet6: unable to allocate cmsg "
983*83ee113eSDavid van Moolenbroek 				  "header");
984*83ee113eSDavid van Moolenbroek 			return(ENOMEM);
985*83ee113eSDavid van Moolenbroek 		}
986*83ee113eSDavid van Moolenbroek 	}
987*83ee113eSDavid van Moolenbroek 	memset(control_buf, 0, control_buf_len);
988*83ee113eSDavid van Moolenbroek 
989*83ee113eSDavid van Moolenbroek 	/*
990*83ee113eSDavid van Moolenbroek 	 * Initialize our message header structure.
991*83ee113eSDavid van Moolenbroek 	 */
992*83ee113eSDavid van Moolenbroek 	memset(&m, 0, sizeof(m));
993*83ee113eSDavid van Moolenbroek 
994*83ee113eSDavid van Moolenbroek 	/*
995*83ee113eSDavid van Moolenbroek 	 * Point so we can get the from address.
996*83ee113eSDavid van Moolenbroek 	 */
997*83ee113eSDavid van Moolenbroek 	m.msg_name = from;
998*83ee113eSDavid van Moolenbroek 	m.msg_namelen = sizeof(*from);
999*83ee113eSDavid van Moolenbroek 
1000*83ee113eSDavid van Moolenbroek 	/*
1001*83ee113eSDavid van Moolenbroek 	 * Set the data buffer we're receiving. (Using this wacky
1002*83ee113eSDavid van Moolenbroek 	 * "scatter-gather" stuff... but we that doesn't really make
1003*83ee113eSDavid van Moolenbroek 	 * sense for us, so we use a single vector entry.)
1004*83ee113eSDavid van Moolenbroek 	 */
1005*83ee113eSDavid van Moolenbroek 	v.iov_base = buf;
1006*83ee113eSDavid van Moolenbroek 	v.iov_len = len;
1007*83ee113eSDavid van Moolenbroek 	m.msg_iov = &v;
1008*83ee113eSDavid van Moolenbroek 	m.msg_iovlen = 1;
1009*83ee113eSDavid van Moolenbroek 
1010*83ee113eSDavid van Moolenbroek 	/*
1011*83ee113eSDavid van Moolenbroek 	 * Getting the interface is a bit more involved.
1012*83ee113eSDavid van Moolenbroek 	 *
1013*83ee113eSDavid van Moolenbroek 	 * We set up some space for a "control message". We have
1014*83ee113eSDavid van Moolenbroek 	 * previously asked the kernel to give us packet
1015*83ee113eSDavid van Moolenbroek 	 * information (when we initialized the interface), so we
1016*83ee113eSDavid van Moolenbroek 	 * should get the destination address from that.
1017*83ee113eSDavid van Moolenbroek 	 */
1018*83ee113eSDavid van Moolenbroek 	m.msg_control = control_buf;
1019*83ee113eSDavid van Moolenbroek 	m.msg_controllen = control_buf_len;
1020*83ee113eSDavid van Moolenbroek 
1021*83ee113eSDavid van Moolenbroek 	result = recvmsg(interface->rfdesc, &m, 0);
1022*83ee113eSDavid van Moolenbroek 
1023*83ee113eSDavid van Moolenbroek 	if (result >= 0) {
1024*83ee113eSDavid van Moolenbroek 		/*
1025*83ee113eSDavid van Moolenbroek 		 * If we did read successfully, then we need to loop
1026*83ee113eSDavid van Moolenbroek 		 * through the control messages we received and
1027*83ee113eSDavid van Moolenbroek 		 * find the one with our destination address.
1028*83ee113eSDavid van Moolenbroek 		 */
1029*83ee113eSDavid van Moolenbroek 		cmsg = CMSG_FIRSTHDR(&m);
1030*83ee113eSDavid van Moolenbroek 		while (cmsg != NULL) {
1031*83ee113eSDavid van Moolenbroek 			if ((cmsg->cmsg_level == IPPROTO_IPV6) &&
1032*83ee113eSDavid van Moolenbroek 			    (cmsg->cmsg_type == IPV6_PKTINFO)) {
1033*83ee113eSDavid van Moolenbroek 				pktinfo = (struct in6_pktinfo *)CMSG_DATA(cmsg);
1034*83ee113eSDavid van Moolenbroek 				*to_addr = pktinfo->ipi6_addr;
1035*83ee113eSDavid van Moolenbroek 				*if_idx = pktinfo->ipi6_ifindex;
1036*83ee113eSDavid van Moolenbroek 
1037*83ee113eSDavid van Moolenbroek 				return (result);
1038*83ee113eSDavid van Moolenbroek 			}
1039*83ee113eSDavid van Moolenbroek 			cmsg = CMSG_NXTHDR(&m, cmsg);
1040*83ee113eSDavid van Moolenbroek 		}
1041*83ee113eSDavid van Moolenbroek 
1042*83ee113eSDavid van Moolenbroek 		/*
1043*83ee113eSDavid van Moolenbroek 		 * We didn't find the necessary control message
1044*83ee113eSDavid van Moolenbroek 		 * flag is as an error
1045*83ee113eSDavid van Moolenbroek 		 */
1046*83ee113eSDavid van Moolenbroek 		result = -1;
1047*83ee113eSDavid van Moolenbroek 		errno = EIO;
1048*83ee113eSDavid van Moolenbroek 	}
1049*83ee113eSDavid van Moolenbroek 
1050*83ee113eSDavid van Moolenbroek 	return (result);
1051*83ee113eSDavid van Moolenbroek }
1052*83ee113eSDavid van Moolenbroek #endif /* DHCPv6 */
1053*83ee113eSDavid van Moolenbroek 
1054*83ee113eSDavid van Moolenbroek #if defined (USE_SOCKET_FALLBACK)
1055*83ee113eSDavid van Moolenbroek /* This just reads in a packet and silently discards it. */
1056*83ee113eSDavid van Moolenbroek 
fallback_discard(object)1057*83ee113eSDavid van Moolenbroek isc_result_t fallback_discard (object)
1058*83ee113eSDavid van Moolenbroek 	omapi_object_t *object;
1059*83ee113eSDavid van Moolenbroek {
1060*83ee113eSDavid van Moolenbroek 	char buf [1540];
1061*83ee113eSDavid van Moolenbroek 	struct sockaddr_in from;
1062*83ee113eSDavid van Moolenbroek 	SOCKLEN_T flen = sizeof from;
1063*83ee113eSDavid van Moolenbroek 	int status;
1064*83ee113eSDavid van Moolenbroek 	struct interface_info *interface;
1065*83ee113eSDavid van Moolenbroek 
1066*83ee113eSDavid van Moolenbroek 	if (object -> type != dhcp_type_interface)
1067*83ee113eSDavid van Moolenbroek 		return DHCP_R_INVALIDARG;
1068*83ee113eSDavid van Moolenbroek 	interface = (struct interface_info *)object;
1069*83ee113eSDavid van Moolenbroek 
1070*83ee113eSDavid van Moolenbroek 	status = recvfrom (interface -> wfdesc, buf, sizeof buf, 0,
1071*83ee113eSDavid van Moolenbroek 			   (struct sockaddr *)&from, &flen);
1072*83ee113eSDavid van Moolenbroek #if defined (DEBUG)
1073*83ee113eSDavid van Moolenbroek 	/* Only report fallback discard errors if we're debugging. */
1074*83ee113eSDavid van Moolenbroek 	if (status < 0) {
1075*83ee113eSDavid van Moolenbroek 		log_error ("fallback_discard: %m");
1076*83ee113eSDavid van Moolenbroek 		return ISC_R_UNEXPECTED;
1077*83ee113eSDavid van Moolenbroek 	}
1078*83ee113eSDavid van Moolenbroek #else
1079*83ee113eSDavid van Moolenbroek         /* ignore the fact that status value is never used */
1080*83ee113eSDavid van Moolenbroek         IGNORE_UNUSED(status);
1081*83ee113eSDavid van Moolenbroek #endif
1082*83ee113eSDavid van Moolenbroek 	return ISC_R_SUCCESS;
1083*83ee113eSDavid van Moolenbroek }
1084*83ee113eSDavid van Moolenbroek #endif /* USE_SOCKET_FALLBACK */
1085*83ee113eSDavid van Moolenbroek 
1086*83ee113eSDavid van Moolenbroek #if defined (USE_SOCKET_SEND)
can_unicast_without_arp(ip)1087*83ee113eSDavid van Moolenbroek int can_unicast_without_arp (ip)
1088*83ee113eSDavid van Moolenbroek 	struct interface_info *ip;
1089*83ee113eSDavid van Moolenbroek {
1090*83ee113eSDavid van Moolenbroek 	return 0;
1091*83ee113eSDavid van Moolenbroek }
1092*83ee113eSDavid van Moolenbroek 
can_receive_unicast_unconfigured(ip)1093*83ee113eSDavid van Moolenbroek int can_receive_unicast_unconfigured (ip)
1094*83ee113eSDavid van Moolenbroek 	struct interface_info *ip;
1095*83ee113eSDavid van Moolenbroek {
1096*83ee113eSDavid van Moolenbroek #if defined (SOCKET_CAN_RECEIVE_UNICAST_UNCONFIGURED)
1097*83ee113eSDavid van Moolenbroek 	return 1;
1098*83ee113eSDavid van Moolenbroek #else
1099*83ee113eSDavid van Moolenbroek 	return 0;
1100*83ee113eSDavid van Moolenbroek #endif
1101*83ee113eSDavid van Moolenbroek }
1102*83ee113eSDavid van Moolenbroek 
supports_multiple_interfaces(ip)1103*83ee113eSDavid van Moolenbroek int supports_multiple_interfaces (ip)
1104*83ee113eSDavid van Moolenbroek 	struct interface_info *ip;
1105*83ee113eSDavid van Moolenbroek {
1106*83ee113eSDavid van Moolenbroek #if defined(SO_BINDTODEVICE) || \
1107*83ee113eSDavid van Moolenbroek 	(defined(IP_PKTINFO) && defined(IP_RECVPKTINFO) && \
1108*83ee113eSDavid van Moolenbroek 	 defined(USE_V4_PKTINFO))
1109*83ee113eSDavid van Moolenbroek 	return(1);
1110*83ee113eSDavid van Moolenbroek #else
1111*83ee113eSDavid van Moolenbroek 	return(0);
1112*83ee113eSDavid van Moolenbroek #endif
1113*83ee113eSDavid van Moolenbroek }
1114*83ee113eSDavid van Moolenbroek 
1115*83ee113eSDavid van Moolenbroek /* If we have SO_BINDTODEVICE, set up a fallback interface; otherwise,
1116*83ee113eSDavid van Moolenbroek    do not. */
1117*83ee113eSDavid van Moolenbroek 
maybe_setup_fallback()1118*83ee113eSDavid van Moolenbroek void maybe_setup_fallback ()
1119*83ee113eSDavid van Moolenbroek {
1120*83ee113eSDavid van Moolenbroek #if defined (USE_SOCKET_FALLBACK)
1121*83ee113eSDavid van Moolenbroek 	isc_result_t status;
1122*83ee113eSDavid van Moolenbroek 	struct interface_info *fbi = (struct interface_info *)0;
1123*83ee113eSDavid van Moolenbroek 	if (setup_fallback (&fbi, MDL)) {
1124*83ee113eSDavid van Moolenbroek 		fbi -> wfdesc = if_register_socket (fbi, AF_INET, 0, NULL);
1125*83ee113eSDavid van Moolenbroek 		fbi -> rfdesc = fbi -> wfdesc;
1126*83ee113eSDavid van Moolenbroek 		log_info ("Sending on   Socket/%s%s%s",
1127*83ee113eSDavid van Moolenbroek 		      fbi -> name,
1128*83ee113eSDavid van Moolenbroek 		      (fbi -> shared_network ? "/" : ""),
1129*83ee113eSDavid van Moolenbroek 		      (fbi -> shared_network ?
1130*83ee113eSDavid van Moolenbroek 		       fbi -> shared_network -> name : ""));
1131*83ee113eSDavid van Moolenbroek 
1132*83ee113eSDavid van Moolenbroek 		status = omapi_register_io_object ((omapi_object_t *)fbi,
1133*83ee113eSDavid van Moolenbroek 						   if_readsocket, 0,
1134*83ee113eSDavid van Moolenbroek 						   fallback_discard, 0, 0);
1135*83ee113eSDavid van Moolenbroek 		if (status != ISC_R_SUCCESS)
1136*83ee113eSDavid van Moolenbroek 			log_fatal ("Can't register I/O handle for %s: %s",
1137*83ee113eSDavid van Moolenbroek 				   fbi -> name, isc_result_totext (status));
1138*83ee113eSDavid van Moolenbroek 		interface_dereference (&fbi, MDL);
1139*83ee113eSDavid van Moolenbroek 	}
1140*83ee113eSDavid van Moolenbroek #endif
1141*83ee113eSDavid van Moolenbroek }
1142*83ee113eSDavid van Moolenbroek 
1143*83ee113eSDavid van Moolenbroek 
1144*83ee113eSDavid van Moolenbroek #if defined(sun) && defined(USE_V4_PKTINFO)
1145*83ee113eSDavid van Moolenbroek /* This code assumes the existence of SIOCGLIFHWADDR */
1146*83ee113eSDavid van Moolenbroek void
get_hw_addr(const char * name,struct hardware * hw)1147*83ee113eSDavid van Moolenbroek get_hw_addr(const char *name, struct hardware *hw) {
1148*83ee113eSDavid van Moolenbroek 	struct sockaddr_dl *dladdrp;
1149*83ee113eSDavid van Moolenbroek 	int sock, i;
1150*83ee113eSDavid van Moolenbroek 	struct lifreq lifr;
1151*83ee113eSDavid van Moolenbroek 
1152*83ee113eSDavid van Moolenbroek 	memset(&lifr, 0, sizeof (lifr));
1153*83ee113eSDavid van Moolenbroek 	(void) strlcpy(lifr.lifr_name, name, sizeof (lifr.lifr_name));
1154*83ee113eSDavid van Moolenbroek 	/*
1155*83ee113eSDavid van Moolenbroek 	 * Check if the interface is a virtual or IPMP interface - in those
1156*83ee113eSDavid van Moolenbroek 	 * cases it has no hw address, so generate a random one.
1157*83ee113eSDavid van Moolenbroek 	 */
1158*83ee113eSDavid van Moolenbroek 	if ((sock = socket(AF_INET, SOCK_DGRAM, 0)) < 0 ||
1159*83ee113eSDavid van Moolenbroek 	    ioctl(sock, SIOCGLIFFLAGS, &lifr) < 0) {
1160*83ee113eSDavid van Moolenbroek 		if (sock != -1)
1161*83ee113eSDavid van Moolenbroek 			(void) close(sock);
1162*83ee113eSDavid van Moolenbroek 
1163*83ee113eSDavid van Moolenbroek #ifdef DHCPv6
1164*83ee113eSDavid van Moolenbroek 		/*
1165*83ee113eSDavid van Moolenbroek 		 * If approrpriate try this with an IPv6 socket
1166*83ee113eSDavid van Moolenbroek 		 */
1167*83ee113eSDavid van Moolenbroek 		if ((sock = socket(AF_INET6, SOCK_DGRAM, 0)) >= 0 &&
1168*83ee113eSDavid van Moolenbroek 		    ioctl(sock, SIOCGLIFFLAGS, &lifr) >= 0) {
1169*83ee113eSDavid van Moolenbroek 			goto flag_check;
1170*83ee113eSDavid van Moolenbroek 		}
1171*83ee113eSDavid van Moolenbroek 		if (sock != -1)
1172*83ee113eSDavid van Moolenbroek 			(void) close(sock);
1173*83ee113eSDavid van Moolenbroek #endif
1174*83ee113eSDavid van Moolenbroek 		log_fatal("Couldn't get interface flags for %s: %m", name);
1175*83ee113eSDavid van Moolenbroek 
1176*83ee113eSDavid van Moolenbroek 	}
1177*83ee113eSDavid van Moolenbroek 
1178*83ee113eSDavid van Moolenbroek  flag_check:
1179*83ee113eSDavid van Moolenbroek 	if (lifr.lifr_flags & (IFF_VIRTUAL|IFF_IPMP)) {
1180*83ee113eSDavid van Moolenbroek 		hw->hlen = sizeof (hw->hbuf);
1181*83ee113eSDavid van Moolenbroek 		srandom((long)gethrtime());
1182*83ee113eSDavid van Moolenbroek 
1183*83ee113eSDavid van Moolenbroek 		hw->hbuf[0] = HTYPE_IPMP;
1184*83ee113eSDavid van Moolenbroek 		for (i = 1; i < hw->hlen; ++i) {
1185*83ee113eSDavid van Moolenbroek 			hw->hbuf[i] = random() % 256;
1186*83ee113eSDavid van Moolenbroek 		}
1187*83ee113eSDavid van Moolenbroek 
1188*83ee113eSDavid van Moolenbroek 		if (sock != -1)
1189*83ee113eSDavid van Moolenbroek 			(void) close(sock);
1190*83ee113eSDavid van Moolenbroek 		return;
1191*83ee113eSDavid van Moolenbroek 	}
1192*83ee113eSDavid van Moolenbroek 
1193*83ee113eSDavid van Moolenbroek 	if (ioctl(sock, SIOCGLIFHWADDR, &lifr) < 0)
1194*83ee113eSDavid van Moolenbroek 		log_fatal("Couldn't get interface hardware address for %s: %m",
1195*83ee113eSDavid van Moolenbroek 			  name);
1196*83ee113eSDavid van Moolenbroek 	dladdrp = (struct sockaddr_dl *)&lifr.lifr_addr;
1197*83ee113eSDavid van Moolenbroek 	hw->hlen = dladdrp->sdl_alen+1;
1198*83ee113eSDavid van Moolenbroek 	switch (dladdrp->sdl_type) {
1199*83ee113eSDavid van Moolenbroek 		case DL_CSMACD: /* IEEE 802.3 */
1200*83ee113eSDavid van Moolenbroek 		case DL_ETHER:
1201*83ee113eSDavid van Moolenbroek 			hw->hbuf[0] = HTYPE_ETHER;
1202*83ee113eSDavid van Moolenbroek 			break;
1203*83ee113eSDavid van Moolenbroek 		case DL_TPR:
1204*83ee113eSDavid van Moolenbroek 			hw->hbuf[0] = HTYPE_IEEE802;
1205*83ee113eSDavid van Moolenbroek 			break;
1206*83ee113eSDavid van Moolenbroek 		case DL_FDDI:
1207*83ee113eSDavid van Moolenbroek 			hw->hbuf[0] = HTYPE_FDDI;
1208*83ee113eSDavid van Moolenbroek 			break;
1209*83ee113eSDavid van Moolenbroek 		case DL_IB:
1210*83ee113eSDavid van Moolenbroek 			hw->hbuf[0] = HTYPE_INFINIBAND;
1211*83ee113eSDavid van Moolenbroek 			break;
1212*83ee113eSDavid van Moolenbroek 		default:
1213*83ee113eSDavid van Moolenbroek 			log_fatal("%s: unsupported DLPI MAC type %lu", name,
1214*83ee113eSDavid van Moolenbroek 				  (unsigned long)dladdrp->sdl_type);
1215*83ee113eSDavid van Moolenbroek 	}
1216*83ee113eSDavid van Moolenbroek 
1217*83ee113eSDavid van Moolenbroek 	memcpy(hw->hbuf+1, LLADDR(dladdrp), hw->hlen-1);
1218*83ee113eSDavid van Moolenbroek 
1219*83ee113eSDavid van Moolenbroek 	if (sock != -1)
1220*83ee113eSDavid van Moolenbroek 		(void) close(sock);
1221*83ee113eSDavid van Moolenbroek }
1222*83ee113eSDavid van Moolenbroek #endif /* defined(sun) */
1223*83ee113eSDavid van Moolenbroek 
1224*83ee113eSDavid van Moolenbroek #endif /* USE_SOCKET_SEND */
1225