Home | History | Annotate | Line # | Download | only in net
gethnamaddr.c revision 1.79.2.1
      1  1.79.2.1       tls /*	$NetBSD: gethnamaddr.c,v 1.79.2.1 2014/08/20 00:02:15 tls Exp $	*/
      2       1.2       mrg 
      3       1.1       mrg /*
      4       1.1       mrg  * ++Copyright++ 1985, 1988, 1993
      5       1.1       mrg  * -
      6       1.1       mrg  * Copyright (c) 1985, 1988, 1993
      7       1.1       mrg  *    The Regents of the University of California.  All rights reserved.
      8       1.1       mrg  *
      9       1.1       mrg  * Redistribution and use in source and binary forms, with or without
     10       1.1       mrg  * modification, are permitted provided that the following conditions
     11       1.1       mrg  * are met:
     12       1.1       mrg  * 1. Redistributions of source code must retain the above copyright
     13       1.1       mrg  *    notice, this list of conditions and the following disclaimer.
     14       1.1       mrg  * 2. Redistributions in binary form must reproduce the above copyright
     15       1.1       mrg  *    notice, this list of conditions and the following disclaimer in the
     16       1.1       mrg  *    documentation and/or other materials provided with the distribution.
     17      1.55       agc  * 3. Neither the name of the University nor the names of its contributors
     18       1.1       mrg  *    may be used to endorse or promote products derived from this software
     19       1.1       mrg  *    without specific prior written permission.
     20       1.1       mrg  *
     21       1.1       mrg  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
     22       1.1       mrg  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
     23       1.1       mrg  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
     24       1.1       mrg  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
     25       1.1       mrg  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
     26       1.1       mrg  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
     27       1.1       mrg  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
     28       1.1       mrg  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
     29       1.1       mrg  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
     30       1.1       mrg  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
     31       1.1       mrg  * SUCH DAMAGE.
     32       1.1       mrg  * -
     33       1.1       mrg  * Portions Copyright (c) 1993 by Digital Equipment Corporation.
     34       1.1       mrg  *
     35       1.1       mrg  * Permission to use, copy, modify, and distribute this software for any
     36       1.1       mrg  * purpose with or without fee is hereby granted, provided that the above
     37       1.1       mrg  * copyright notice and this permission notice appear in all copies, and that
     38       1.1       mrg  * the name of Digital Equipment Corporation not be used in advertising or
     39       1.1       mrg  * publicity pertaining to distribution of the document or software without
     40       1.1       mrg  * specific, written prior permission.
     41       1.1       mrg  *
     42       1.1       mrg  * THE SOFTWARE IS PROVIDED "AS IS" AND DIGITAL EQUIPMENT CORP. DISCLAIMS ALL
     43       1.1       mrg  * WARRANTIES WITH REGARD TO THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES
     44       1.1       mrg  * OF MERCHANTABILITY AND FITNESS.   IN NO EVENT SHALL DIGITAL EQUIPMENT
     45       1.1       mrg  * CORPORATION BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL
     46       1.1       mrg  * DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR
     47       1.1       mrg  * PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS
     48       1.1       mrg  * ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS
     49       1.1       mrg  * SOFTWARE.
     50       1.1       mrg  * -
     51       1.1       mrg  * --Copyright--
     52       1.1       mrg  */
     53       1.1       mrg 
     54       1.2       mrg #include <sys/cdefs.h>
     55       1.1       mrg #if defined(LIBC_SCCS) && !defined(lint)
     56       1.2       mrg #if 0
     57       1.1       mrg static char sccsid[] = "@(#)gethostnamadr.c	8.1 (Berkeley) 6/4/93";
     58       1.4     perry static char rcsid[] = "Id: gethnamaddr.c,v 8.21 1997/06/01 20:34:37 vixie Exp ";
     59       1.2       mrg #else
     60  1.79.2.1       tls __RCSID("$NetBSD: gethnamaddr.c,v 1.79.2.1 2014/08/20 00:02:15 tls Exp $");
     61       1.2       mrg #endif
     62       1.1       mrg #endif /* LIBC_SCCS and not lint */
     63       1.1       mrg 
     64       1.6    kleink #if defined(_LIBC)
     65       1.3   thorpej #include "namespace.h"
     66       1.6    kleink #endif
     67       1.1       mrg #include <sys/param.h>
     68       1.1       mrg #include <sys/socket.h>
     69       1.1       mrg #include <netinet/in.h>
     70       1.1       mrg #include <arpa/inet.h>
     71       1.1       mrg #include <arpa/nameser.h>
     72       1.1       mrg 
     73      1.25     lukem #include <assert.h>
     74      1.25     lukem #include <ctype.h>
     75      1.25     lukem #include <errno.h>
     76       1.1       mrg #include <netdb.h>
     77       1.1       mrg #include <resolv.h>
     78      1.44       wiz #include <stdarg.h>
     79      1.25     lukem #include <stdio.h>
     80       1.1       mrg #include <syslog.h>
     81       1.1       mrg 
     82       1.1       mrg #ifndef LOG_AUTH
     83       1.1       mrg # define LOG_AUTH 0
     84       1.1       mrg #endif
     85       1.1       mrg 
     86       1.1       mrg #define MULTI_PTRS_ARE_ALIASES 1	/* XXX - experimental */
     87       1.1       mrg 
     88       1.9     lukem #include <nsswitch.h>
     89       1.2       mrg #include <stdlib.h>
     90       1.2       mrg #include <string.h>
     91       1.1       mrg 
     92       1.2       mrg #ifdef YP
     93       1.2       mrg #include <rpc/rpc.h>
     94       1.2       mrg #include <rpcsvc/yp_prot.h>
     95       1.2       mrg #include <rpcsvc/ypclnt.h>
     96       1.5    kleink #endif
     97       1.5    kleink 
     98  1.79.2.1       tls #include "hostent.h"
     99  1.79.2.1       tls 
    100       1.6    kleink #if defined(_LIBC) && defined(__weak_alias)
    101      1.29   mycroft __weak_alias(gethostbyaddr,_gethostbyaddr)
    102      1.29   mycroft __weak_alias(gethostbyname,_gethostbyname)
    103      1.63  ginsbach __weak_alias(gethostent,_gethostent)
    104       1.1       mrg #endif
    105       1.1       mrg 
    106      1.79  christos #define maybe_ok(res, nm, ok) (((res)->options & RES_NOCHECKNAME) != 0U || \
    107      1.79  christos                                (ok)(nm) != 0)
    108      1.79  christos #define maybe_hnok(res, hn) maybe_ok((res), (hn), res_hnok)
    109      1.79  christos #define maybe_dnok(res, dn) maybe_ok((res), (dn), res_dnok)
    110      1.79  christos 
    111  1.79.2.1       tls #define addalias(d, s, arr, siz) do {			\
    112  1.79.2.1       tls 	if (d >= &arr[siz]) {				\
    113  1.79.2.1       tls 		char **xptr = realloc(arr, (siz + 10) * sizeof(*arr)); \
    114  1.79.2.1       tls 		if (xptr == NULL)			\
    115  1.79.2.1       tls 			goto nospc;			\
    116  1.79.2.1       tls 		d = xptr + (d - arr);			\
    117  1.79.2.1       tls 		arr = xptr;				\
    118  1.79.2.1       tls 		siz += 10;				\
    119  1.79.2.1       tls 	}						\
    120  1.79.2.1       tls 	*d++ = s;					\
    121  1.79.2.1       tls } while (/*CONSTCOND*/0)
    122  1.79.2.1       tls 
    123  1.79.2.1       tls #define setup(arr, siz) do {				\
    124  1.79.2.1       tls 	arr = malloc((siz = 10) * sizeof(*arr)); 	\
    125  1.79.2.1       tls 	if (arr == NULL)				\
    126  1.79.2.1       tls 		goto nospc;				\
    127  1.79.2.1       tls } while (/*CONSTCOND*/0)
    128      1.79  christos 
    129       1.1       mrg 
    130       1.1       mrg static const char AskedForGot[] =
    131  1.79.2.1       tls     "gethostby*.getanswer: asked for \"%s\", got \"%s\"";
    132       1.1       mrg 
    133       1.1       mrg 
    134       1.2       mrg #ifdef YP
    135       1.2       mrg static char *__ypdomain;
    136       1.2       mrg #endif
    137       1.2       mrg 
    138      1.52    itojun #define	MAXPACKET	(64*1024)
    139       1.1       mrg 
    140       1.1       mrg typedef union {
    141  1.79.2.1       tls 	HEADER hdr;
    142  1.79.2.1       tls 	u_char buf[MAXPACKET];
    143       1.1       mrg } querybuf;
    144       1.1       mrg 
    145       1.1       mrg typedef union {
    146  1.79.2.1       tls 	int32_t al;
    147  1.79.2.1       tls 	char ac;
    148       1.1       mrg } align;
    149       1.1       mrg 
    150       1.1       mrg #ifdef DEBUG
    151      1.76  christos static void debugprintf(const char *, res_state, ...)
    152      1.59  christos 	__attribute__((__format__(__printf__, 1, 3)));
    153       1.2       mrg #endif
    154      1.59  christos static struct hostent *getanswer(const querybuf *, int, const char *, int,
    155  1.79.2.1       tls     res_state, struct hostent *, char *, size_t, int *);
    156      1.59  christos static void map_v4v6_address(const char *, char *);
    157      1.59  christos static void map_v4v6_hostent(struct hostent *, char **, char *);
    158      1.66    tsarna static void addrsort(char **, int, res_state);
    159       1.2       mrg 
    160      1.59  christos void dns_service(void);
    161      1.39  christos #undef dn_skipname
    162      1.59  christos int dn_skipname(const u_char *, const u_char *);
    163  1.79.2.1       tls 
    164       1.2       mrg #ifdef YP
    165  1.79.2.1       tls static struct hostent *_yp_hostent(char *, int, struct getnamaddr *);
    166       1.2       mrg #endif
    167       1.2       mrg 
    168  1.79.2.1       tls static struct hostent *gethostbyname_internal(const char *, int, res_state,
    169  1.79.2.1       tls     struct hostent *, char *, size_t, int *);
    170      1.59  christos 
    171      1.12     lukem static const ns_src default_dns_files[] = {
    172      1.27     lukem 	{ NSSRC_FILES, 	NS_SUCCESS },
    173      1.11     lukem 	{ NSSRC_DNS, 	NS_SUCCESS },
    174      1.71  christos 	{ 0, 0 }
    175      1.11     lukem };
    176      1.11     lukem 
    177       1.2       mrg 
    178       1.2       mrg #ifdef DEBUG
    179       1.1       mrg static void
    180      1.76  christos debugprintf(const char *msg, res_state res, ...)
    181       1.1       mrg {
    182      1.25     lukem 	_DIAGASSERT(msg != NULL);
    183      1.25     lukem 
    184      1.59  christos 	if (res->options & RES_DEBUG) {
    185       1.1       mrg 		int save = errno;
    186      1.38  sommerfe 		va_list ap;
    187       1.1       mrg 
    188      1.68  christos 		va_start (ap, res);
    189      1.38  sommerfe 		vprintf(msg, ap);
    190      1.38  sommerfe 		va_end (ap);
    191      1.38  sommerfe 
    192       1.1       mrg 		errno = save;
    193       1.1       mrg 	}
    194       1.1       mrg }
    195       1.1       mrg #else
    196      1.76  christos # define debugprintf(msg, res, num) /*nada*/
    197       1.1       mrg #endif
    198       1.1       mrg 
    199      1.32    itojun #define BOUNDED_INCR(x) \
    200      1.32    itojun 	do { \
    201      1.58     enami 		cp += (x); \
    202  1.79.2.1       tls 		if (cp > eom) \
    203  1.79.2.1       tls 			goto no_recovery; \
    204      1.34  christos 	} while (/*CONSTCOND*/0)
    205      1.32    itojun 
    206      1.32    itojun #define BOUNDS_CHECK(ptr, count) \
    207      1.32    itojun 	do { \
    208  1.79.2.1       tls 		if ((ptr) + (count) > eom) \
    209  1.79.2.1       tls 			goto no_recovery; \
    210      1.34  christos 	} while (/*CONSTCOND*/0)
    211      1.32    itojun 
    212       1.1       mrg static struct hostent *
    213      1.59  christos getanswer(const querybuf *answer, int anslen, const char *qname, int qtype,
    214  1.79.2.1       tls     res_state res, struct hostent *hent, char *buf, size_t buflen, int *he)
    215       1.1       mrg {
    216      1.25     lukem 	const HEADER *hp;
    217      1.25     lukem 	const u_char *cp;
    218      1.25     lukem 	int n;
    219  1.79.2.1       tls 	size_t qlen;
    220      1.32    itojun 	const u_char *eom, *erdata;
    221      1.46    itojun 	char *bp, **ap, **hap, *ep;
    222      1.46    itojun 	int type, class, ancount, qdcount;
    223       1.1       mrg 	int haveanswer, had_error;
    224       1.1       mrg 	int toobig = 0;
    225       1.1       mrg 	char tbuf[MAXDNAME];
    226  1.79.2.1       tls 	char **aliases;
    227  1.79.2.1       tls 	size_t maxaliases;
    228  1.79.2.1       tls 	char *addr_ptrs[MAXADDRS];
    229       1.1       mrg 	const char *tname;
    230      1.59  christos 	int (*name_ok)(const char *);
    231       1.1       mrg 
    232      1.25     lukem 	_DIAGASSERT(answer != NULL);
    233      1.25     lukem 	_DIAGASSERT(qname != NULL);
    234      1.25     lukem 
    235       1.1       mrg 	tname = qname;
    236  1.79.2.1       tls 	hent->h_name = NULL;
    237       1.1       mrg 	eom = answer->buf + anslen;
    238       1.1       mrg 	switch (qtype) {
    239       1.1       mrg 	case T_A:
    240       1.1       mrg 	case T_AAAA:
    241       1.1       mrg 		name_ok = res_hnok;
    242       1.1       mrg 		break;
    243       1.1       mrg 	case T_PTR:
    244       1.1       mrg 		name_ok = res_dnok;
    245       1.1       mrg 		break;
    246       1.1       mrg 	default:
    247      1.59  christos 		return NULL;	/* XXX should be abort(); */
    248       1.1       mrg 	}
    249  1.79.2.1       tls 
    250  1.79.2.1       tls 	setup(aliases, maxaliases);
    251       1.1       mrg 	/*
    252       1.1       mrg 	 * find first satisfactory answer
    253       1.1       mrg 	 */
    254       1.1       mrg 	hp = &answer->hdr;
    255       1.1       mrg 	ancount = ntohs(hp->ancount);
    256       1.1       mrg 	qdcount = ntohs(hp->qdcount);
    257  1.79.2.1       tls 	bp = buf;
    258  1.79.2.1       tls 	ep = buf + buflen;
    259      1.32    itojun 	cp = answer->buf;
    260      1.32    itojun 	BOUNDED_INCR(HFIXEDSZ);
    261  1.79.2.1       tls 	if (qdcount != 1)
    262  1.79.2.1       tls 		goto no_recovery;
    263  1.79.2.1       tls 
    264      1.78  christos 	n = dn_expand(answer->buf, eom, cp, bp, (int)(ep - bp));
    265  1.79.2.1       tls 	if ((n < 0) || !maybe_ok(res, bp, name_ok))
    266  1.79.2.1       tls 		goto no_recovery;
    267  1.79.2.1       tls 
    268      1.32    itojun 	BOUNDED_INCR(n + QFIXEDSZ);
    269       1.1       mrg 	if (qtype == T_A || qtype == T_AAAA) {
    270       1.1       mrg 		/* res_send() has already verified that the query name is the
    271       1.1       mrg 		 * same as the one we sent; this just gets the expanded name
    272       1.1       mrg 		 * (i.e., with the succeeding search-domain tacked on).
    273       1.1       mrg 		 */
    274      1.78  christos 		n = (int)strlen(bp) + 1;		/* for the \0 */
    275  1.79.2.1       tls 		if (n >= MAXHOSTNAMELEN)
    276  1.79.2.1       tls 			goto no_recovery;
    277  1.79.2.1       tls 		hent->h_name = bp;
    278       1.1       mrg 		bp += n;
    279       1.1       mrg 		/* The qname can be abbreviated, but h_name is now absolute. */
    280  1.79.2.1       tls 		qname = hent->h_name;
    281       1.1       mrg 	}
    282  1.79.2.1       tls 	hent->h_aliases = ap = aliases;
    283  1.79.2.1       tls 	hent->h_addr_list = hap = addr_ptrs;
    284       1.1       mrg 	*ap = NULL;
    285       1.1       mrg 	*hap = NULL;
    286       1.1       mrg 	haveanswer = 0;
    287       1.1       mrg 	had_error = 0;
    288       1.1       mrg 	while (ancount-- > 0 && cp < eom && !had_error) {
    289      1.78  christos 		n = dn_expand(answer->buf, eom, cp, bp, (int)(ep - bp));
    290      1.79  christos 		if ((n < 0) || !maybe_ok(res, bp, name_ok)) {
    291       1.1       mrg 			had_error++;
    292       1.1       mrg 			continue;
    293       1.1       mrg 		}
    294       1.1       mrg 		cp += n;			/* name */
    295      1.32    itojun 		BOUNDS_CHECK(cp, 3 * INT16SZ + INT32SZ);
    296       1.1       mrg 		type = _getshort(cp);
    297       1.1       mrg  		cp += INT16SZ;			/* type */
    298       1.1       mrg 		class = _getshort(cp);
    299       1.1       mrg  		cp += INT16SZ + INT32SZ;	/* class, TTL */
    300       1.1       mrg 		n = _getshort(cp);
    301       1.1       mrg 		cp += INT16SZ;			/* len */
    302      1.32    itojun 		BOUNDS_CHECK(cp, n);
    303      1.32    itojun 		erdata = cp + n;
    304       1.1       mrg 		if (class != C_IN) {
    305       1.1       mrg 			/* XXX - debug? syslog? */
    306       1.1       mrg 			cp += n;
    307       1.1       mrg 			continue;		/* XXX - had_error++ ? */
    308       1.1       mrg 		}
    309       1.1       mrg 		if ((qtype == T_A || qtype == T_AAAA) && type == T_CNAME) {
    310  1.79.2.1       tls 			n = dn_expand(answer->buf, eom, cp, tbuf,
    311  1.79.2.1       tls 			    (int)sizeof tbuf);
    312      1.79  christos 			if ((n < 0) || !maybe_ok(res, tbuf, name_ok)) {
    313       1.1       mrg 				had_error++;
    314       1.1       mrg 				continue;
    315       1.1       mrg 			}
    316       1.1       mrg 			cp += n;
    317  1.79.2.1       tls 			if (cp != erdata)
    318  1.79.2.1       tls 				goto no_recovery;
    319       1.1       mrg 			/* Store alias. */
    320  1.79.2.1       tls 			addalias(ap, bp, aliases, maxaliases);
    321      1.78  christos 			n = (int)strlen(bp) + 1;	/* for the \0 */
    322       1.1       mrg 			if (n >= MAXHOSTNAMELEN) {
    323       1.1       mrg 				had_error++;
    324       1.1       mrg 				continue;
    325       1.1       mrg 			}
    326       1.1       mrg 			bp += n;
    327       1.1       mrg 			/* Get canonical name. */
    328      1.78  christos 			n = (int)strlen(tbuf) + 1;	/* for the \0 */
    329      1.46    itojun 			if (n > ep - bp || n >= MAXHOSTNAMELEN) {
    330       1.1       mrg 				had_error++;
    331       1.1       mrg 				continue;
    332       1.1       mrg 			}
    333      1.54    itojun 			strlcpy(bp, tbuf, (size_t)(ep - bp));
    334  1.79.2.1       tls 			hent->h_name = bp;
    335       1.1       mrg 			bp += n;
    336       1.1       mrg 			continue;
    337       1.1       mrg 		}
    338       1.1       mrg 		if (qtype == T_PTR && type == T_CNAME) {
    339  1.79.2.1       tls 			n = dn_expand(answer->buf, eom, cp, tbuf,
    340  1.79.2.1       tls 			    (int)sizeof tbuf);
    341      1.79  christos 			if (n < 0 || !maybe_dnok(res, tbuf)) {
    342       1.1       mrg 				had_error++;
    343       1.1       mrg 				continue;
    344       1.1       mrg 			}
    345       1.1       mrg 			cp += n;
    346  1.79.2.1       tls 			if (cp != erdata)
    347  1.79.2.1       tls 				goto no_recovery;
    348       1.1       mrg 			/* Get canonical name. */
    349      1.78  christos 			n = (int)strlen(tbuf) + 1;	/* for the \0 */
    350      1.46    itojun 			if (n > ep - bp || n >= MAXHOSTNAMELEN) {
    351       1.1       mrg 				had_error++;
    352       1.1       mrg 				continue;
    353       1.1       mrg 			}
    354      1.54    itojun 			strlcpy(bp, tbuf, (size_t)(ep - bp));
    355       1.1       mrg 			tname = bp;
    356       1.1       mrg 			bp += n;
    357       1.1       mrg 			continue;
    358       1.1       mrg 		}
    359       1.1       mrg 		if (type != qtype) {
    360      1.28     assar 			if (type != T_KEY && type != T_SIG)
    361      1.28     assar 				syslog(LOG_NOTICE|LOG_AUTH,
    362       1.1       mrg 	       "gethostby*.getanswer: asked for \"%s %s %s\", got type \"%s\"",
    363      1.28     assar 				       qname, p_class(C_IN), p_type(qtype),
    364      1.28     assar 				       p_type(type));
    365       1.1       mrg 			cp += n;
    366       1.1       mrg 			continue;		/* XXX - had_error++ ? */
    367       1.1       mrg 		}
    368       1.1       mrg 		switch (type) {
    369       1.1       mrg 		case T_PTR:
    370       1.1       mrg 			if (strcasecmp(tname, bp) != 0) {
    371       1.1       mrg 				syslog(LOG_NOTICE|LOG_AUTH,
    372       1.1       mrg 				       AskedForGot, qname, bp);
    373       1.1       mrg 				cp += n;
    374       1.1       mrg 				continue;	/* XXX - had_error++ ? */
    375       1.1       mrg 			}
    376      1.78  christos 			n = dn_expand(answer->buf, eom, cp, bp, (int)(ep - bp));
    377      1.79  christos 			if ((n < 0) || !maybe_hnok(res, bp)) {
    378       1.1       mrg 				had_error++;
    379       1.1       mrg 				break;
    380       1.1       mrg 			}
    381       1.1       mrg #if MULTI_PTRS_ARE_ALIASES
    382       1.1       mrg 			cp += n;
    383  1.79.2.1       tls 			if (cp != erdata)
    384  1.79.2.1       tls 				goto no_recovery;
    385       1.1       mrg 			if (!haveanswer)
    386  1.79.2.1       tls 				hent->h_name = bp;
    387       1.1       mrg 			else
    388  1.79.2.1       tls 				addalias(ap, bp, aliases, maxaliases);
    389       1.1       mrg 			if (n != -1) {
    390      1.78  christos 				n = (int)strlen(bp) + 1;	/* for the \0 */
    391       1.1       mrg 				if (n >= MAXHOSTNAMELEN) {
    392       1.1       mrg 					had_error++;
    393       1.1       mrg 					break;
    394       1.1       mrg 				}
    395       1.1       mrg 				bp += n;
    396       1.1       mrg 			}
    397       1.1       mrg 			break;
    398       1.1       mrg #else
    399  1.79.2.1       tls 			hent->h_name = bp;
    400      1.59  christos 			if (res->options & RES_USE_INET6) {
    401       1.1       mrg 				n = strlen(bp) + 1;	/* for the \0 */
    402       1.1       mrg 				if (n >= MAXHOSTNAMELEN) {
    403       1.1       mrg 					had_error++;
    404       1.1       mrg 					break;
    405       1.1       mrg 				}
    406       1.1       mrg 				bp += n;
    407  1.79.2.1       tls 				map_v4v6_hostent(hent, &bp, ep);
    408       1.1       mrg 			}
    409  1.79.2.1       tls 			goto success;
    410       1.1       mrg #endif
    411       1.1       mrg 		case T_A:
    412       1.1       mrg 		case T_AAAA:
    413  1.79.2.1       tls 			if (strcasecmp(hent->h_name, bp) != 0) {
    414       1.1       mrg 				syslog(LOG_NOTICE|LOG_AUTH,
    415  1.79.2.1       tls 				       AskedForGot, hent->h_name, bp);
    416       1.1       mrg 				cp += n;
    417       1.1       mrg 				continue;	/* XXX - had_error++ ? */
    418       1.1       mrg 			}
    419  1.79.2.1       tls 			if (n != hent->h_length) {
    420       1.1       mrg 				cp += n;
    421       1.1       mrg 				continue;
    422      1.51    itojun 			}
    423      1.51    itojun 			if (type == T_AAAA) {
    424      1.51    itojun 				struct in6_addr in6;
    425  1.79.2.1       tls 				memcpy(&in6, cp, NS_IN6ADDRSZ);
    426      1.51    itojun 				if (IN6_IS_ADDR_V4MAPPED(&in6)) {
    427      1.51    itojun 					cp += n;
    428      1.51    itojun 					continue;
    429      1.51    itojun 				}
    430       1.1       mrg 			}
    431       1.1       mrg 			if (!haveanswer) {
    432      1.25     lukem 				int nn;
    433       1.1       mrg 
    434  1.79.2.1       tls 				hent->h_name = bp;
    435      1.78  christos 				nn = (int)strlen(bp) + 1;	/* for the \0 */
    436       1.1       mrg 				bp += nn;
    437       1.1       mrg 			}
    438       1.1       mrg 
    439      1.14     lukem 			bp += sizeof(align) -
    440      1.14     lukem 			    (size_t)((u_long)bp % sizeof(align));
    441       1.1       mrg 
    442  1.79.2.1       tls 			if (bp + n >= ep) {
    443      1.76  christos 				debugprintf("size (%d) too big\n", res, n);
    444       1.1       mrg 				had_error++;
    445       1.1       mrg 				continue;
    446       1.1       mrg 			}
    447  1.79.2.1       tls 			if (hap >= &addr_ptrs[MAXADDRS - 1]) {
    448      1.71  christos 				if (!toobig++) {
    449      1.76  christos 					debugprintf("Too many addresses (%d)\n",
    450      1.59  christos 						res, MAXADDRS);
    451      1.71  christos 				}
    452       1.1       mrg 				cp += n;
    453       1.1       mrg 				continue;
    454       1.1       mrg 			}
    455       1.7    kleink 			(void)memcpy(*hap++ = bp, cp, (size_t)n);
    456       1.1       mrg 			bp += n;
    457       1.1       mrg 			cp += n;
    458  1.79.2.1       tls 			if (cp != erdata)
    459  1.79.2.1       tls 				goto no_recovery;
    460       1.1       mrg 			break;
    461       1.1       mrg 		default:
    462       1.1       mrg 			abort();
    463       1.1       mrg 		}
    464       1.1       mrg 		if (!had_error)
    465       1.1       mrg 			haveanswer++;
    466       1.1       mrg 	}
    467       1.1       mrg 	if (haveanswer) {
    468       1.1       mrg 		*ap = NULL;
    469       1.1       mrg 		*hap = NULL;
    470       1.1       mrg 		/*
    471       1.1       mrg 		 * Note: we sort even if host can take only one address
    472       1.1       mrg 		 * in its return structures - should give it the "best"
    473       1.1       mrg 		 * address in that case, not some random one
    474       1.1       mrg 		 */
    475      1.59  christos 		if (res->nsort && haveanswer > 1 && qtype == T_A)
    476  1.79.2.1       tls 			addrsort(addr_ptrs, haveanswer, res);
    477  1.79.2.1       tls 		if (!hent->h_name) {
    478      1.78  christos 			n = (int)strlen(qname) + 1;	/* for the \0 */
    479      1.46    itojun 			if (n > ep - bp || n >= MAXHOSTNAMELEN)
    480       1.1       mrg 				goto no_recovery;
    481      1.54    itojun 			strlcpy(bp, qname, (size_t)(ep - bp));
    482  1.79.2.1       tls 			hent->h_name = bp;
    483       1.1       mrg 			bp += n;
    484       1.1       mrg 		}
    485      1.59  christos 		if (res->options & RES_USE_INET6)
    486  1.79.2.1       tls 			map_v4v6_hostent(hent, &bp, ep);
    487  1.79.2.1       tls 	    	goto success;
    488       1.1       mrg 	}
    489  1.79.2.1       tls no_recovery:
    490  1.79.2.1       tls 	free(aliases);
    491  1.79.2.1       tls 	*he = NO_RECOVERY;
    492  1.79.2.1       tls 	return NULL;
    493  1.79.2.1       tls success:
    494  1.79.2.1       tls 	bp = (char *)ALIGN(bp);
    495  1.79.2.1       tls 	n = (int)(ap - aliases);
    496  1.79.2.1       tls 	qlen = (n + 1) * sizeof(*hent->h_aliases);
    497  1.79.2.1       tls 	if ((size_t)(ep - bp) < qlen)
    498  1.79.2.1       tls 		goto nospc;
    499  1.79.2.1       tls 	hent->h_aliases = (void *)bp;
    500  1.79.2.1       tls 	memcpy(bp, aliases, qlen);
    501  1.79.2.1       tls 	free(aliases);
    502  1.79.2.1       tls 	aliases = NULL;
    503  1.79.2.1       tls 
    504  1.79.2.1       tls 	bp += qlen;
    505  1.79.2.1       tls 	n = (int)(hap - addr_ptrs);
    506  1.79.2.1       tls 	qlen = (n + 1) * sizeof(*hent->h_addr_list);
    507  1.79.2.1       tls 	if ((size_t)(ep - bp) < qlen)
    508  1.79.2.1       tls 		goto nospc;
    509  1.79.2.1       tls 	hent->h_addr_list = (void *)bp;
    510  1.79.2.1       tls 	memcpy(bp, addr_ptrs, qlen);
    511  1.79.2.1       tls 	*he = NETDB_SUCCESS;
    512  1.79.2.1       tls 	return hent;
    513  1.79.2.1       tls nospc:
    514  1.79.2.1       tls 	free(aliases);
    515  1.79.2.1       tls 	errno = ENOSPC;
    516  1.79.2.1       tls 	*he = NETDB_INTERNAL;
    517      1.59  christos 	return NULL;
    518       1.1       mrg }
    519       1.1       mrg 
    520       1.1       mrg struct hostent *
    521  1.79.2.1       tls gethostbyname_r(const char *name, struct hostent *hp, char *buf, size_t buflen,
    522  1.79.2.1       tls     int *he)
    523       1.1       mrg {
    524      1.59  christos 	res_state res = __res_get_state();
    525       1.1       mrg 
    526  1.79.2.1       tls 	if (res == NULL) {
    527  1.79.2.1       tls 		*he = NETDB_INTERNAL;
    528      1.60  christos 		return NULL;
    529  1.79.2.1       tls 	}
    530      1.60  christos 
    531      1.25     lukem 	_DIAGASSERT(name != NULL);
    532      1.25     lukem 
    533      1.59  christos 	if (res->options & RES_USE_INET6) {
    534  1.79.2.1       tls 		struct hostent *nhp = gethostbyname_internal(name, AF_INET6,
    535  1.79.2.1       tls 		    res, hp, buf, buflen, he);
    536  1.79.2.1       tls 		if (nhp) {
    537      1.59  christos 			__res_put_state(res);
    538  1.79.2.1       tls 			return nhp;
    539      1.59  christos 		}
    540       1.1       mrg 	}
    541  1.79.2.1       tls 	hp = gethostbyname_internal(name, AF_INET, res, hp, buf, buflen, he);
    542      1.59  christos 	__res_put_state(res);
    543      1.59  christos 	return hp;
    544       1.1       mrg }
    545       1.1       mrg 
    546       1.1       mrg struct hostent *
    547  1.79.2.1       tls gethostbyname2_r(const char *name, int af, struct hostent *hp, char *buf,
    548  1.79.2.1       tls     size_t buflen, int *he)
    549      1.59  christos {
    550      1.59  christos 	res_state res = __res_get_state();
    551      1.60  christos 
    552  1.79.2.1       tls 	if (res == NULL) {
    553  1.79.2.1       tls 		*he = NETDB_INTERNAL;
    554      1.60  christos 		return NULL;
    555  1.79.2.1       tls 	}
    556  1.79.2.1       tls 	hp = gethostbyname_internal(name, af, res, hp, buf, buflen, he);
    557      1.59  christos 	__res_put_state(res);
    558      1.59  christos 	return hp;
    559      1.59  christos }
    560      1.59  christos 
    561      1.59  christos static struct hostent *
    562  1.79.2.1       tls gethostbyname_internal(const char *name, int af, res_state res,
    563  1.79.2.1       tls     struct hostent *hp, char *buf, size_t buflen, int *he)
    564       1.1       mrg {
    565       1.2       mrg 	const char *cp;
    566  1.79.2.1       tls 	struct getnamaddr info;
    567  1.79.2.1       tls 	char hbuf[MAXHOSTNAMELEN];
    568  1.79.2.1       tls 	size_t size;
    569      1.12     lukem 	static const ns_dtab dtab[] = {
    570  1.79.2.1       tls 		NS_FILES_CB(_hf_gethtbyname, NULL)
    571       1.9     lukem 		{ NSSRC_DNS, _dns_gethtbyname, NULL },	/* force -DHESIOD */
    572      1.11     lukem 		NS_NIS_CB(_yp_gethtbyname, NULL)
    573      1.71  christos 		NS_NULL_CB
    574       1.9     lukem 	};
    575       1.1       mrg 
    576      1.25     lukem 	_DIAGASSERT(name != NULL);
    577      1.25     lukem 
    578       1.1       mrg 	switch (af) {
    579       1.1       mrg 	case AF_INET:
    580  1.79.2.1       tls 		size = NS_INADDRSZ;
    581       1.1       mrg 		break;
    582       1.1       mrg 	case AF_INET6:
    583  1.79.2.1       tls 		size = NS_IN6ADDRSZ;
    584       1.1       mrg 		break;
    585       1.1       mrg 	default:
    586  1.79.2.1       tls 		*he = NETDB_INTERNAL;
    587       1.1       mrg 		errno = EAFNOSUPPORT;
    588      1.59  christos 		return NULL;
    589       1.1       mrg 	}
    590  1.79.2.1       tls 	if (buflen < size)
    591  1.79.2.1       tls 		goto nospc;
    592       1.1       mrg 
    593  1.79.2.1       tls 	hp->h_addrtype = af;
    594  1.79.2.1       tls 	hp->h_length = (int)size;
    595       1.1       mrg 
    596       1.1       mrg 	/*
    597      1.75       wiz 	 * if there aren't any dots, it could be a user-level alias.
    598      1.59  christos 	 * this is also done in res_nquery() since we are not the only
    599       1.1       mrg 	 * function that looks up host names.
    600       1.1       mrg 	 */
    601  1.79.2.1       tls 	if (!strchr(name, '.') && (cp = res_hostalias(res, name,
    602  1.79.2.1       tls 	    hbuf, sizeof(hbuf))))
    603       1.1       mrg 		name = cp;
    604       1.1       mrg 
    605       1.1       mrg 	/*
    606       1.1       mrg 	 * disallow names consisting only of digits/dots, unless
    607       1.1       mrg 	 * they end in a dot.
    608       1.1       mrg 	 */
    609      1.35     itohy 	if (isdigit((u_char) name[0]))
    610       1.1       mrg 		for (cp = name;; ++cp) {
    611       1.1       mrg 			if (!*cp) {
    612       1.1       mrg 				if (*--cp == '.')
    613       1.1       mrg 					break;
    614       1.1       mrg 				/*
    615       1.1       mrg 				 * All-numeric, no dot at the end.
    616       1.1       mrg 				 * Fake up a hostent as if we'd actually
    617       1.1       mrg 				 * done a lookup.
    618       1.1       mrg 				 */
    619  1.79.2.1       tls 				goto fake;
    620       1.1       mrg 			}
    621      1.35     itohy 			if (!isdigit((u_char) *cp) && *cp != '.')
    622       1.1       mrg 				break;
    623       1.1       mrg 		}
    624      1.35     itohy 	if ((isxdigit((u_char) name[0]) && strchr(name, ':') != NULL) ||
    625       1.1       mrg 	    name[0] == ':')
    626       1.1       mrg 		for (cp = name;; ++cp) {
    627       1.1       mrg 			if (!*cp) {
    628       1.1       mrg 				if (*--cp == '.')
    629       1.1       mrg 					break;
    630       1.1       mrg 				/*
    631       1.1       mrg 				 * All-IPv6-legal, no dot at the end.
    632       1.1       mrg 				 * Fake up a hostent as if we'd actually
    633       1.1       mrg 				 * done a lookup.
    634       1.1       mrg 				 */
    635  1.79.2.1       tls 				goto fake;
    636       1.1       mrg 			}
    637      1.35     itohy 			if (!isxdigit((u_char) *cp) && *cp != ':' && *cp != '.')
    638       1.1       mrg 				break;
    639       1.1       mrg 		}
    640       1.1       mrg 
    641  1.79.2.1       tls 	*he = NETDB_INTERNAL;
    642  1.79.2.1       tls 	info.hp = hp;
    643  1.79.2.1       tls 	info.buf = buf;
    644  1.79.2.1       tls 	info.buflen = buflen;
    645  1.79.2.1       tls 	info.he = he;
    646  1.79.2.1       tls 	if (nsdispatch(&info, dtab, NSDB_HOSTS, "gethostbyname",
    647      1.45    itojun 	    default_dns_files, name, strlen(name), af) != NS_SUCCESS)
    648      1.59  christos 		return NULL;
    649  1.79.2.1       tls 	*he = NETDB_SUCCESS;
    650  1.79.2.1       tls 	return hp;
    651  1.79.2.1       tls nospc:
    652  1.79.2.1       tls 	*he = NETDB_INTERNAL;
    653  1.79.2.1       tls 	errno = ENOSPC;
    654  1.79.2.1       tls 	return NULL;
    655  1.79.2.1       tls fake:
    656  1.79.2.1       tls 	HENT_ARRAY(hp->h_addr_list, 1, buf, buflen);
    657  1.79.2.1       tls 	HENT_ARRAY(hp->h_aliases, 0, buf, buflen);
    658  1.79.2.1       tls 
    659  1.79.2.1       tls 	hp->h_aliases[0] = NULL;
    660  1.79.2.1       tls 	if (size > buflen)
    661  1.79.2.1       tls 		goto nospc;
    662  1.79.2.1       tls 
    663  1.79.2.1       tls 	if (inet_pton(af, name, buf) <= 0) {
    664  1.79.2.1       tls 		*he = HOST_NOT_FOUND;
    665  1.79.2.1       tls 		return NULL;
    666  1.79.2.1       tls 	}
    667  1.79.2.1       tls 	hp->h_addr_list[0] = buf;
    668  1.79.2.1       tls 	hp->h_addr_list[1] = NULL;
    669  1.79.2.1       tls 	buf += size;
    670  1.79.2.1       tls 	buflen -= size;
    671  1.79.2.1       tls 	HENT_SCOPY(hp->h_name, name, buf, buflen);
    672  1.79.2.1       tls 	if (res->options & RES_USE_INET6)
    673  1.79.2.1       tls 		map_v4v6_hostent(hp, &buf, buf + buflen);
    674  1.79.2.1       tls 	*he = NETDB_SUCCESS;
    675      1.59  christos 	return hp;
    676       1.1       mrg }
    677       1.1       mrg 
    678       1.1       mrg struct hostent *
    679  1.79.2.1       tls gethostbyaddr_r(const void *addr, socklen_t len, int af, struct hostent *hp,
    680  1.79.2.1       tls     char *buf, size_t buflen, int *he)
    681       1.1       mrg {
    682       1.1       mrg 	const u_char *uaddr = (const u_char *)addr;
    683      1.53   thorpej 	socklen_t size;
    684  1.79.2.1       tls 	struct getnamaddr info;
    685      1.12     lukem 	static const ns_dtab dtab[] = {
    686  1.79.2.1       tls 		NS_FILES_CB(_hf_gethtbyaddr, NULL)
    687       1.9     lukem 		{ NSSRC_DNS, _dns_gethtbyaddr, NULL },	/* force -DHESIOD */
    688      1.11     lukem 		NS_NIS_CB(_yp_gethtbyaddr, NULL)
    689      1.71  christos 		NS_NULL_CB
    690       1.9     lukem 	};
    691       1.1       mrg 
    692      1.25     lukem 	_DIAGASSERT(addr != NULL);
    693      1.25     lukem 
    694  1.79.2.1       tls 	if (af == AF_INET6 && len == NS_IN6ADDRSZ &&
    695  1.79.2.1       tls 	    (IN6_IS_ADDR_LINKLOCAL((const struct in6_addr *)addr) ||
    696  1.79.2.1       tls 	     IN6_IS_ADDR_SITELOCAL((const struct in6_addr *)addr))) {
    697  1.79.2.1       tls 		*he = HOST_NOT_FOUND;
    698      1.59  christos 		return NULL;
    699      1.41    itojun 	}
    700  1.79.2.1       tls 	if (af == AF_INET6 && len == NS_IN6ADDRSZ &&
    701  1.79.2.1       tls 	    (IN6_IS_ADDR_V4MAPPED((const struct in6_addr *)addr) ||
    702  1.79.2.1       tls 	     IN6_IS_ADDR_V4COMPAT((const struct in6_addr *)addr))) {
    703       1.1       mrg 		/* Unmap. */
    704  1.79.2.1       tls 		uaddr += NS_IN6ADDRSZ - NS_INADDRSZ;
    705  1.79.2.1       tls 		addr = uaddr;
    706       1.1       mrg 		af = AF_INET;
    707  1.79.2.1       tls 		len = NS_INADDRSZ;
    708       1.1       mrg 	}
    709       1.1       mrg 	switch (af) {
    710       1.1       mrg 	case AF_INET:
    711  1.79.2.1       tls 		size = NS_INADDRSZ;
    712       1.1       mrg 		break;
    713       1.1       mrg 	case AF_INET6:
    714  1.79.2.1       tls 		size = NS_IN6ADDRSZ;
    715       1.1       mrg 		break;
    716       1.1       mrg 	default:
    717       1.1       mrg 		errno = EAFNOSUPPORT;
    718  1.79.2.1       tls 		*he = NETDB_INTERNAL;
    719      1.59  christos 		return NULL;
    720       1.1       mrg 	}
    721       1.1       mrg 	if (size != len) {
    722       1.1       mrg 		errno = EINVAL;
    723  1.79.2.1       tls 		*he = NETDB_INTERNAL;
    724      1.59  christos 		return NULL;
    725       1.1       mrg 	}
    726  1.79.2.1       tls 	info.hp = hp;
    727  1.79.2.1       tls 	info.buf = buf;
    728  1.79.2.1       tls 	info.buflen = buflen;
    729  1.79.2.1       tls 	info.he = he;
    730  1.79.2.1       tls 	*he = NETDB_INTERNAL;
    731  1.79.2.1       tls 	if (nsdispatch(&info, dtab, NSDB_HOSTS, "gethostbyaddr",
    732      1.11     lukem 	    default_dns_files, uaddr, len, af) != NS_SUCCESS)
    733      1.59  christos 		return NULL;
    734  1.79.2.1       tls 	*he = NETDB_SUCCESS;
    735      1.59  christos 	return hp;
    736       1.1       mrg }
    737       1.1       mrg 
    738       1.1       mrg struct hostent *
    739  1.79.2.1       tls gethostent_r(FILE *hf, struct hostent *hent, char *buf, size_t buflen, int *he)
    740       1.1       mrg {
    741  1.79.2.1       tls 	char *p, *name;
    742      1.25     lukem 	char *cp, **q;
    743       1.1       mrg 	int af, len;
    744  1.79.2.1       tls 	size_t anum;
    745  1.79.2.1       tls 	char **aliases;
    746  1.79.2.1       tls 	size_t maxaliases;
    747  1.79.2.1       tls 	struct in6_addr host_addr;
    748       1.1       mrg 
    749  1.79.2.1       tls 	if (hf == NULL) {
    750  1.79.2.1       tls 		*he = NETDB_INTERNAL;
    751  1.79.2.1       tls 		errno = EINVAL;
    752      1.59  christos 		return NULL;
    753       1.1       mrg 	}
    754  1.79.2.1       tls 	p = NULL;
    755  1.79.2.1       tls 	setup(aliases, maxaliases);
    756  1.79.2.1       tls 	for (;;) {
    757  1.79.2.1       tls 		free(p);
    758  1.79.2.1       tls 		p = fparseln(hf, NULL, NULL, NULL, FPARSELN_UNESCALL);
    759  1.79.2.1       tls 		if (p == NULL) {
    760  1.79.2.1       tls 			free(aliases);
    761  1.79.2.1       tls 			*he = HOST_NOT_FOUND;
    762      1.60  christos 			return NULL;
    763       1.1       mrg 		}
    764  1.79.2.1       tls 		if (!(cp = strpbrk(p, " \t")))
    765       1.1       mrg 			continue;
    766  1.79.2.1       tls 		*cp++ = '\0';
    767  1.79.2.1       tls 		if (inet_pton(AF_INET6, p, &host_addr) > 0) {
    768  1.79.2.1       tls 			af = AF_INET6;
    769  1.79.2.1       tls 			len = NS_IN6ADDRSZ;
    770  1.79.2.1       tls 		} else {
    771  1.79.2.1       tls 			if (inet_pton(AF_INET, p, &host_addr) <= 0)
    772  1.79.2.1       tls 				continue;
    773      1.18      tron 
    774  1.79.2.1       tls 			res_state res = __res_get_state();
    775  1.79.2.1       tls 			if (res == NULL)
    776  1.79.2.1       tls 				goto nospc;
    777  1.79.2.1       tls 			if (res->options & RES_USE_INET6) {
    778  1.79.2.1       tls 				map_v4v6_address(buf, buf);
    779  1.79.2.1       tls 				af = AF_INET6;
    780  1.79.2.1       tls 				len = NS_IN6ADDRSZ;
    781  1.79.2.1       tls 			} else {
    782  1.79.2.1       tls 				af = AF_INET;
    783  1.79.2.1       tls 				len = NS_INADDRSZ;
    784  1.79.2.1       tls 			}
    785  1.79.2.1       tls 			__res_put_state(res);
    786      1.18      tron 		}
    787      1.18      tron 
    788  1.79.2.1       tls 		/* if this is not something we're looking for, skip it. */
    789  1.79.2.1       tls 		if (hent->h_addrtype != 0 && hent->h_addrtype != af)
    790  1.79.2.1       tls 			continue;
    791  1.79.2.1       tls 		if (hent->h_length != 0 && hent->h_length != len)
    792  1.79.2.1       tls 			continue;
    793      1.18      tron 
    794  1.79.2.1       tls 		while (*cp == ' ' || *cp == '\t')
    795  1.79.2.1       tls 			cp++;
    796  1.79.2.1       tls 		if ((cp = strpbrk(name = cp, " \t")) != NULL)
    797  1.79.2.1       tls 			*cp++ = '\0';
    798  1.79.2.1       tls 		q = aliases;
    799  1.79.2.1       tls 		while (cp && *cp) {
    800  1.79.2.1       tls 			if (*cp == ' ' || *cp == '\t') {
    801  1.79.2.1       tls 				cp++;
    802  1.79.2.1       tls 				continue;
    803      1.18      tron 			}
    804  1.79.2.1       tls 			addalias(q, cp, aliases, maxaliases);
    805  1.79.2.1       tls 			if ((cp = strpbrk(cp, " \t")) != NULL)
    806  1.79.2.1       tls 				*cp++ = '\0';
    807      1.18      tron 		}
    808  1.79.2.1       tls 		break;
    809       1.9     lukem 	}
    810  1.79.2.1       tls 	hent->h_length = len;
    811  1.79.2.1       tls 	hent->h_addrtype = af;
    812  1.79.2.1       tls 	HENT_ARRAY(hent->h_addr_list, 1, buf, buflen);
    813  1.79.2.1       tls 	anum = (size_t)(q - aliases);
    814  1.79.2.1       tls 	HENT_ARRAY(hent->h_aliases, anum, buf, buflen);
    815  1.79.2.1       tls 	HENT_COPY(hent->h_addr_list[0], &host_addr, hent->h_length, buf,
    816  1.79.2.1       tls 	    buflen);
    817  1.79.2.1       tls 	hent->h_addr_list[1] = NULL;
    818  1.79.2.1       tls 
    819  1.79.2.1       tls 	HENT_SCOPY(hent->h_name, name, buf, buflen);
    820  1.79.2.1       tls 	for (size_t i = 0; i < anum; i++)
    821  1.79.2.1       tls 		HENT_SCOPY(hent->h_aliases[i], aliases[i], buf, buflen);
    822  1.79.2.1       tls 	hent->h_aliases[anum] = NULL;
    823  1.79.2.1       tls 
    824  1.79.2.1       tls 	*he = NETDB_SUCCESS;
    825  1.79.2.1       tls 	free(p);
    826  1.79.2.1       tls 	free(aliases);
    827  1.79.2.1       tls 	return hent;
    828  1.79.2.1       tls nospc:
    829  1.79.2.1       tls 	free(p);
    830  1.79.2.1       tls 	free(aliases);
    831  1.79.2.1       tls 	errno = ENOSPC;
    832  1.79.2.1       tls 	*he = NETDB_INTERNAL;
    833  1.79.2.1       tls 	return NULL;
    834       1.1       mrg }
    835       1.1       mrg 
    836       1.1       mrg static void
    837      1.59  christos map_v4v6_address(const char *src, char *dst)
    838       1.1       mrg {
    839       1.1       mrg 	u_char *p = (u_char *)dst;
    840  1.79.2.1       tls 	char tmp[NS_INADDRSZ];
    841       1.1       mrg 	int i;
    842       1.1       mrg 
    843      1.25     lukem 	_DIAGASSERT(src != NULL);
    844      1.25     lukem 	_DIAGASSERT(dst != NULL);
    845      1.25     lukem 
    846       1.1       mrg 	/* Stash a temporary copy so our caller can update in place. */
    847  1.79.2.1       tls 	(void)memcpy(tmp, src, NS_INADDRSZ);
    848       1.1       mrg 	/* Mark this ipv6 addr as a mapped ipv4. */
    849       1.1       mrg 	for (i = 0; i < 10; i++)
    850       1.1       mrg 		*p++ = 0x00;
    851       1.1       mrg 	*p++ = 0xff;
    852       1.1       mrg 	*p++ = 0xff;
    853       1.1       mrg 	/* Retrieve the saved copy and we're done. */
    854  1.79.2.1       tls 	(void)memcpy(p, tmp, NS_INADDRSZ);
    855       1.1       mrg }
    856       1.1       mrg 
    857       1.1       mrg static void
    858      1.59  christos map_v4v6_hostent(struct hostent *hp, char **bpp, char *ep)
    859       1.1       mrg {
    860       1.1       mrg 	char **ap;
    861       1.1       mrg 
    862      1.25     lukem 	_DIAGASSERT(hp != NULL);
    863      1.25     lukem 	_DIAGASSERT(bpp != NULL);
    864      1.47    itojun 	_DIAGASSERT(ep != NULL);
    865      1.25     lukem 
    866  1.79.2.1       tls 	if (hp->h_addrtype != AF_INET || hp->h_length != NS_INADDRSZ)
    867       1.1       mrg 		return;
    868       1.1       mrg 	hp->h_addrtype = AF_INET6;
    869  1.79.2.1       tls 	hp->h_length = NS_IN6ADDRSZ;
    870       1.1       mrg 	for (ap = hp->h_addr_list; *ap; ap++) {
    871      1.78  christos 		int i = (int)(sizeof(align) -
    872      1.78  christos 		    (size_t)((u_long)*bpp % sizeof(align)));
    873       1.1       mrg 
    874  1.79.2.1       tls 		if (ep - *bpp < (i + NS_IN6ADDRSZ)) {
    875       1.1       mrg 			/* Out of memory.  Truncate address list here.  XXX */
    876       1.1       mrg 			*ap = NULL;
    877       1.1       mrg 			return;
    878       1.1       mrg 		}
    879       1.1       mrg 		*bpp += i;
    880       1.1       mrg 		map_v4v6_address(*ap, *bpp);
    881       1.1       mrg 		*ap = *bpp;
    882  1.79.2.1       tls 		*bpp += NS_IN6ADDRSZ;
    883       1.1       mrg 	}
    884       1.1       mrg }
    885       1.1       mrg 
    886       1.1       mrg static void
    887      1.59  christos addrsort(char **ap, int num, res_state res)
    888       1.1       mrg {
    889       1.1       mrg 	int i, j;
    890       1.1       mrg 	char **p;
    891       1.1       mrg 	short aval[MAXADDRS];
    892       1.1       mrg 	int needsort = 0;
    893       1.1       mrg 
    894      1.25     lukem 	_DIAGASSERT(ap != NULL);
    895      1.25     lukem 
    896       1.1       mrg 	p = ap;
    897       1.1       mrg 	for (i = 0; i < num; i++, p++) {
    898      1.59  christos 	    for (j = 0 ; (unsigned)j < res->nsort; j++)
    899      1.59  christos 		if (res->sort_list[j].addr.s_addr ==
    900      1.14     lukem 		    (((struct in_addr *)(void *)(*p))->s_addr &
    901      1.59  christos 		    res->sort_list[j].mask))
    902       1.1       mrg 			break;
    903       1.1       mrg 	    aval[i] = j;
    904       1.1       mrg 	    if (needsort == 0 && i > 0 && j < aval[i-1])
    905       1.1       mrg 		needsort = i;
    906       1.1       mrg 	}
    907       1.1       mrg 	if (!needsort)
    908       1.1       mrg 	    return;
    909       1.1       mrg 
    910       1.1       mrg 	while (needsort < num) {
    911       1.1       mrg 	    for (j = needsort - 1; j >= 0; j--) {
    912       1.1       mrg 		if (aval[j] > aval[j+1]) {
    913       1.1       mrg 		    char *hp;
    914       1.1       mrg 
    915       1.1       mrg 		    i = aval[j];
    916       1.1       mrg 		    aval[j] = aval[j+1];
    917       1.1       mrg 		    aval[j+1] = i;
    918       1.1       mrg 
    919       1.1       mrg 		    hp = ap[j];
    920       1.1       mrg 		    ap[j] = ap[j+1];
    921       1.1       mrg 		    ap[j+1] = hp;
    922       1.1       mrg 		} else
    923       1.1       mrg 		    break;
    924       1.1       mrg 	    }
    925       1.1       mrg 	    needsort++;
    926       1.1       mrg 	}
    927       1.1       mrg }
    928       1.1       mrg 
    929       1.1       mrg 
    930      1.13  christos /*ARGSUSED*/
    931       1.9     lukem int
    932      1.61  ginsbach _dns_gethtbyname(void *rv, void *cb_data, va_list ap)
    933       1.9     lukem {
    934      1.52    itojun 	querybuf *buf;
    935       1.9     lukem 	int n, type;
    936       1.9     lukem 	struct hostent *hp;
    937       1.9     lukem 	const char *name;
    938      1.59  christos 	res_state res;
    939  1.79.2.1       tls 	struct getnamaddr *info = rv;
    940       1.9     lukem 
    941      1.25     lukem 	_DIAGASSERT(rv != NULL);
    942      1.25     lukem 
    943       1.9     lukem 	name = va_arg(ap, char *);
    944  1.79.2.1       tls 	/* NOSTRICT skip string len */(void)va_arg(ap, int);
    945  1.79.2.1       tls 	info->hp->h_addrtype = va_arg(ap, int);
    946       1.9     lukem 
    947  1.79.2.1       tls 	switch (info->hp->h_addrtype) {
    948       1.9     lukem 	case AF_INET:
    949  1.79.2.1       tls 		info->hp->h_length = NS_INADDRSZ;
    950       1.9     lukem 		type = T_A;
    951       1.9     lukem 		break;
    952       1.9     lukem 	case AF_INET6:
    953  1.79.2.1       tls 		info->hp->h_length = NS_IN6ADDRSZ;
    954       1.9     lukem 		type = T_AAAA;
    955       1.9     lukem 		break;
    956       1.9     lukem 	default:
    957       1.9     lukem 		return NS_UNAVAIL;
    958       1.9     lukem 	}
    959      1.52    itojun 	buf = malloc(sizeof(*buf));
    960      1.52    itojun 	if (buf == NULL) {
    961  1.79.2.1       tls 		*info->he = NETDB_INTERNAL;
    962      1.52    itojun 		return NS_NOTFOUND;
    963      1.52    itojun 	}
    964      1.59  christos 	res = __res_get_state();
    965      1.69  christos 	if (res == NULL) {
    966      1.69  christos 		free(buf);
    967      1.60  christos 		return NS_NOTFOUND;
    968      1.69  christos 	}
    969      1.78  christos 	n = res_nsearch(res, name, C_IN, type, buf->buf, (int)sizeof(buf->buf));
    970      1.52    itojun 	if (n < 0) {
    971      1.52    itojun 		free(buf);
    972      1.76  christos 		debugprintf("res_nsearch failed (%d)\n", res, n);
    973      1.59  christos 		__res_put_state(res);
    974       1.9     lukem 		return NS_NOTFOUND;
    975       1.9     lukem 	}
    976  1.79.2.1       tls 	hp = getanswer(buf, n, name, type, res, info->hp, info->buf,
    977  1.79.2.1       tls 	    info->buflen, info->he);
    978      1.52    itojun 	free(buf);
    979      1.59  christos 	__res_put_state(res);
    980       1.9     lukem 	if (hp == NULL)
    981       1.9     lukem 		switch (h_errno) {
    982       1.9     lukem 		case HOST_NOT_FOUND:
    983       1.9     lukem 			return NS_NOTFOUND;
    984       1.9     lukem 		case TRY_AGAIN:
    985       1.9     lukem 			return NS_TRYAGAIN;
    986       1.9     lukem 		default:
    987       1.9     lukem 			return NS_UNAVAIL;
    988       1.9     lukem 		}
    989       1.9     lukem 	return NS_SUCCESS;
    990       1.9     lukem }
    991       1.9     lukem 
    992      1.13  christos /*ARGSUSED*/
    993       1.9     lukem int
    994      1.59  christos _dns_gethtbyaddr(void *rv, void	*cb_data, va_list ap)
    995       1.9     lukem {
    996      1.49    itojun 	char qbuf[MAXDNAME + 1], *qp, *ep;
    997       1.9     lukem 	int n;
    998      1.52    itojun 	querybuf *buf;
    999       1.9     lukem 	struct hostent *hp;
   1000       1.9     lukem 	const unsigned char *uaddr;
   1001  1.79.2.1       tls 	int advance;
   1002      1.59  christos 	res_state res;
   1003  1.79.2.1       tls 	char *bf;
   1004  1.79.2.1       tls 	size_t blen;
   1005  1.79.2.1       tls 	struct getnamaddr *info = rv;
   1006       1.9     lukem 
   1007      1.25     lukem 	_DIAGASSERT(rv != NULL);
   1008      1.25     lukem 
   1009       1.9     lukem 	uaddr = va_arg(ap, unsigned char *);
   1010  1.79.2.1       tls 	info->hp->h_length = va_arg(ap, int);
   1011  1.79.2.1       tls 	info->hp->h_addrtype = va_arg(ap, int);
   1012       1.9     lukem 
   1013  1.79.2.1       tls 	switch (info->hp->h_addrtype) {
   1014       1.9     lukem 	case AF_INET:
   1015      1.43    itojun 		(void)snprintf(qbuf, sizeof(qbuf), "%u.%u.%u.%u.in-addr.arpa",
   1016      1.43    itojun 		    (uaddr[3] & 0xff), (uaddr[2] & 0xff),
   1017      1.43    itojun 		    (uaddr[1] & 0xff), (uaddr[0] & 0xff));
   1018       1.9     lukem 		break;
   1019       1.9     lukem 
   1020       1.9     lukem 	case AF_INET6:
   1021       1.9     lukem 		qp = qbuf;
   1022      1.49    itojun 		ep = qbuf + sizeof(qbuf) - 1;
   1023  1.79.2.1       tls 		for (n = NS_IN6ADDRSZ - 1; n >= 0; n--) {
   1024      1.49    itojun 			advance = snprintf(qp, (size_t)(ep - qp), "%x.%x.",
   1025      1.49    itojun 			    uaddr[n] & 0xf,
   1026      1.43    itojun 			    ((unsigned int)uaddr[n] >> 4) & 0xf);
   1027      1.49    itojun 			if (advance > 0 && qp + advance < ep)
   1028      1.43    itojun 				qp += advance;
   1029      1.50    itojun 			else {
   1030  1.79.2.1       tls 				*info->he = NETDB_INTERNAL;
   1031      1.43    itojun 				return NS_NOTFOUND;
   1032      1.50    itojun 			}
   1033       1.9     lukem 		}
   1034      1.50    itojun 		if (strlcat(qbuf, "ip6.arpa", sizeof(qbuf)) >= sizeof(qbuf)) {
   1035  1.79.2.1       tls 			*info->he = NETDB_INTERNAL;
   1036      1.49    itojun 			return NS_NOTFOUND;
   1037      1.50    itojun 		}
   1038       1.9     lukem 		break;
   1039       1.9     lukem 	default:
   1040  1.79.2.1       tls 		return NS_UNAVAIL;
   1041       1.9     lukem 	}
   1042       1.9     lukem 
   1043      1.52    itojun 	buf = malloc(sizeof(*buf));
   1044      1.52    itojun 	if (buf == NULL) {
   1045  1.79.2.1       tls 		*info->he = NETDB_INTERNAL;
   1046      1.52    itojun 		return NS_NOTFOUND;
   1047      1.52    itojun 	}
   1048      1.59  christos 	res = __res_get_state();
   1049      1.70  christos 	if (res == NULL) {
   1050      1.70  christos 		free(buf);
   1051      1.60  christos 		return NS_NOTFOUND;
   1052      1.70  christos 	}
   1053      1.78  christos 	n = res_nquery(res, qbuf, C_IN, T_PTR, buf->buf, (int)sizeof(buf->buf));
   1054       1.9     lukem 	if (n < 0) {
   1055      1.52    itojun 		free(buf);
   1056      1.76  christos 		debugprintf("res_nquery failed (%d)\n", res, n);
   1057      1.59  christos 		__res_put_state(res);
   1058       1.9     lukem 		return NS_NOTFOUND;
   1059       1.9     lukem 	}
   1060  1.79.2.1       tls 	hp = getanswer(buf, n, qbuf, T_PTR, res, info->hp, info->buf,
   1061  1.79.2.1       tls 	    info->buflen, info->he);
   1062      1.52    itojun 	free(buf);
   1063      1.59  christos 	if (hp == NULL) {
   1064      1.59  christos 		__res_put_state(res);
   1065  1.79.2.1       tls 		switch (*info->he) {
   1066       1.9     lukem 		case HOST_NOT_FOUND:
   1067       1.9     lukem 			return NS_NOTFOUND;
   1068       1.9     lukem 		case TRY_AGAIN:
   1069       1.9     lukem 			return NS_TRYAGAIN;
   1070       1.9     lukem 		default:
   1071       1.9     lukem 			return NS_UNAVAIL;
   1072       1.9     lukem 		}
   1073      1.59  christos 	}
   1074  1.79.2.1       tls 
   1075  1.79.2.1       tls 	bf = (void *)(hp->h_addr_list + 2);
   1076  1.79.2.1       tls 	blen = (size_t)(bf - info->buf);
   1077  1.79.2.1       tls 	if (blen + info->hp->h_length > info->buflen)
   1078  1.79.2.1       tls 		goto nospc;
   1079  1.79.2.1       tls 	hp->h_addr_list[0] = bf;
   1080  1.79.2.1       tls 	hp->h_addr_list[1] = NULL;
   1081  1.79.2.1       tls 	(void)memcpy(bf, uaddr, (size_t)info->hp->h_length);
   1082  1.79.2.1       tls 	if (info->hp->h_addrtype == AF_INET && (res->options & RES_USE_INET6)) {
   1083  1.79.2.1       tls 		if (blen + NS_IN6ADDRSZ > info->buflen)
   1084  1.79.2.1       tls 			goto nospc;
   1085  1.79.2.1       tls 		map_v4v6_address(bf, bf);
   1086       1.9     lukem 		hp->h_addrtype = AF_INET6;
   1087  1.79.2.1       tls 		hp->h_length = NS_IN6ADDRSZ;
   1088       1.9     lukem 	}
   1089       1.9     lukem 
   1090      1.59  christos 	__res_put_state(res);
   1091  1.79.2.1       tls 	*info->he = NETDB_SUCCESS;
   1092       1.9     lukem 	return NS_SUCCESS;
   1093  1.79.2.1       tls nospc:
   1094  1.79.2.1       tls 	*info->he = NETDB_INTERNAL;
   1095  1.79.2.1       tls 	return NS_UNAVAIL;
   1096       1.9     lukem }
   1097       1.9     lukem 
   1098       1.2       mrg #ifdef YP
   1099      1.13  christos /*ARGSUSED*/
   1100  1.79.2.1       tls static struct hostent *
   1101  1.79.2.1       tls _yp_hostent(char *line, int af, struct getnamaddr *info)
   1102       1.2       mrg {
   1103  1.79.2.1       tls 	struct in6_addr host_addrs[MAXADDRS];
   1104  1.79.2.1       tls 	char **aliases;
   1105  1.79.2.1       tls 	size_t maxaliases;
   1106       1.2       mrg 	char *p = line;
   1107  1.79.2.1       tls 	char *cp, **q, *ptr;
   1108  1.79.2.1       tls 	size_t len, anum, i;
   1109      1.37    itojun 	int addrok;
   1110       1.2       mrg 	int more;
   1111      1.53   thorpej 	size_t naddrs;
   1112  1.79.2.1       tls 	struct hostent *hp = info->hp;
   1113       1.2       mrg 
   1114      1.25     lukem 	_DIAGASSERT(line != NULL);
   1115      1.25     lukem 
   1116  1.79.2.1       tls 	hp->h_name = NULL;
   1117  1.79.2.1       tls 	hp->h_addrtype = af;
   1118      1.37    itojun 	switch (af) {
   1119      1.37    itojun 	case AF_INET:
   1120  1.79.2.1       tls 		hp->h_length = NS_INADDRSZ;
   1121      1.37    itojun 		break;
   1122      1.37    itojun 	case AF_INET6:
   1123  1.79.2.1       tls 		hp->h_length = NS_IN6ADDRSZ;
   1124      1.37    itojun 		break;
   1125      1.37    itojun 	default:
   1126      1.59  christos 		return NULL;
   1127      1.37    itojun 	}
   1128  1.79.2.1       tls 	setup(aliases, maxaliases);
   1129      1.37    itojun 	naddrs = 0;
   1130  1.79.2.1       tls 	q = aliases;
   1131       1.2       mrg 
   1132       1.2       mrg nextline:
   1133      1.36    itojun 	/* check for host_addrs overflow */
   1134  1.79.2.1       tls 	if (naddrs >= __arraycount(host_addrs))
   1135      1.36    itojun 		goto done;
   1136      1.36    itojun 
   1137       1.2       mrg 	more = 0;
   1138       1.2       mrg 	cp = strpbrk(p, " \t");
   1139      1.36    itojun 	if (cp == NULL)
   1140      1.36    itojun 		goto done;
   1141       1.2       mrg 	*cp++ = '\0';
   1142       1.2       mrg 
   1143      1.37    itojun 	/* p has should have an address */
   1144  1.79.2.1       tls 	addrok = inet_pton(af, p, &host_addrs[naddrs]);
   1145      1.37    itojun 	if (addrok != 1) {
   1146      1.37    itojun 		/* skip to the next line */
   1147      1.37    itojun 		while (cp && *cp) {
   1148      1.37    itojun 			if (*cp == '\n') {
   1149      1.37    itojun 				cp++;
   1150      1.37    itojun 				goto nextline;
   1151      1.37    itojun 			}
   1152      1.37    itojun 			cp++;
   1153      1.37    itojun 		}
   1154      1.37    itojun 		goto done;
   1155      1.37    itojun 	}
   1156  1.79.2.1       tls 	naddrs++;
   1157       1.2       mrg 
   1158       1.2       mrg 	while (*cp == ' ' || *cp == '\t')
   1159       1.2       mrg 		cp++;
   1160       1.2       mrg 	p = cp;
   1161       1.2       mrg 	cp = strpbrk(p, " \t\n");
   1162       1.2       mrg 	if (cp != NULL) {
   1163       1.2       mrg 		if (*cp == '\n')
   1164       1.2       mrg 			more = 1;
   1165       1.2       mrg 		*cp++ = '\0';
   1166       1.2       mrg 	}
   1167  1.79.2.1       tls 	if (!hp->h_name)
   1168  1.79.2.1       tls 		hp->h_name = p;
   1169  1.79.2.1       tls 	else if (strcmp(hp->h_name, p) == 0)
   1170       1.2       mrg 		;
   1171  1.79.2.1       tls 	else
   1172  1.79.2.1       tls 		addalias(q, p, aliases, maxaliases);
   1173       1.2       mrg 	p = cp;
   1174       1.2       mrg 	if (more)
   1175       1.2       mrg 		goto nextline;
   1176       1.2       mrg 
   1177       1.2       mrg 	while (cp && *cp) {
   1178       1.2       mrg 		if (*cp == ' ' || *cp == '\t') {
   1179       1.2       mrg 			cp++;
   1180       1.2       mrg 			continue;
   1181       1.2       mrg 		}
   1182       1.2       mrg 		if (*cp == '\n') {
   1183       1.2       mrg 			cp++;
   1184       1.2       mrg 			goto nextline;
   1185       1.2       mrg 		}
   1186  1.79.2.1       tls 		addalias(q, cp, aliases, maxaliases);
   1187       1.2       mrg 		cp = strpbrk(cp, " \t");
   1188       1.2       mrg 		if (cp != NULL)
   1189       1.2       mrg 			*cp++ = '\0';
   1190       1.2       mrg 	}
   1191      1.37    itojun 
   1192       1.2       mrg done:
   1193  1.79.2.1       tls 	if (hp->h_name == NULL) {
   1194  1.79.2.1       tls 		free(aliases);
   1195      1.59  christos 		return NULL;
   1196  1.79.2.1       tls 	}
   1197  1.79.2.1       tls 
   1198  1.79.2.1       tls 	ptr = info->buf;
   1199  1.79.2.1       tls 	len = info->buflen;
   1200  1.79.2.1       tls 
   1201  1.79.2.1       tls 	anum = (size_t)(q - aliases);
   1202  1.79.2.1       tls 	HENT_ARRAY(hp->h_addr_list, naddrs, ptr, len);
   1203  1.79.2.1       tls 	HENT_ARRAY(hp->h_aliases, anum, ptr, len);
   1204  1.79.2.1       tls 
   1205  1.79.2.1       tls 	for (i = 0; i < naddrs; i++)
   1206  1.79.2.1       tls 		HENT_COPY(hp->h_addr_list[i], &host_addrs[i], hp->h_length,
   1207  1.79.2.1       tls 		    ptr, len);
   1208  1.79.2.1       tls 	hp->h_addr_list[naddrs] = NULL;
   1209  1.79.2.1       tls 
   1210  1.79.2.1       tls 	HENT_SCOPY(hp->h_name, hp->h_name, ptr, len);
   1211  1.79.2.1       tls 
   1212  1.79.2.1       tls 	for (i = 0; i < anum; i++)
   1213  1.79.2.1       tls 		HENT_SCOPY(hp->h_aliases[i], aliases[i], ptr, len);
   1214  1.79.2.1       tls 	hp->h_aliases[anum] = NULL;
   1215  1.79.2.1       tls 	free(aliases);
   1216  1.79.2.1       tls 
   1217  1.79.2.1       tls 	return hp;
   1218  1.79.2.1       tls nospc:
   1219  1.79.2.1       tls 	free(aliases);
   1220  1.79.2.1       tls 	*info->he = NETDB_INTERNAL;
   1221  1.79.2.1       tls 	errno = ENOSPC;
   1222  1.79.2.1       tls 	return NULL;
   1223       1.2       mrg }
   1224       1.2       mrg 
   1225      1.13  christos /*ARGSUSED*/
   1226       1.9     lukem int
   1227      1.59  christos _yp_gethtbyaddr(void *rv, void *cb_data, va_list ap)
   1228       1.2       mrg {
   1229      1.59  christos 	struct hostent *hp = NULL;
   1230  1.79.2.1       tls 	char *ypcurrent;
   1231  1.79.2.1       tls 	int ypcurrentlen, r;
   1232      1.37    itojun 	char name[INET6_ADDRSTRLEN];	/* XXX enough? */
   1233       1.9     lukem 	const unsigned char *uaddr;
   1234      1.17  christos 	int af;
   1235      1.37    itojun 	const char *map;
   1236  1.79.2.1       tls 	struct getnamaddr *info = rv;
   1237       1.9     lukem 
   1238      1.25     lukem 	_DIAGASSERT(rv != NULL);
   1239      1.25     lukem 
   1240       1.9     lukem 	uaddr = va_arg(ap, unsigned char *);
   1241      1.17  christos 	/* NOSTRICT skip len */(void)va_arg(ap, int);
   1242       1.9     lukem 	af = va_arg(ap, int);
   1243       1.2       mrg 
   1244       1.2       mrg 	if (!__ypdomain) {
   1245       1.2       mrg 		if (_yp_check(&__ypdomain) == 0)
   1246       1.9     lukem 			return NS_UNAVAIL;
   1247       1.2       mrg 	}
   1248       1.9     lukem 	/*
   1249      1.37    itojun 	 * XXX unfortunately, we cannot support IPv6 extended scoped address
   1250      1.37    itojun 	 * notation here.  gethostbyaddr() is not scope-aware.  too bad.
   1251       1.9     lukem 	 */
   1252      1.78  christos 	if (inet_ntop(af, uaddr, name, (socklen_t)sizeof(name)) == NULL)
   1253      1.37    itojun 		return NS_UNAVAIL;
   1254      1.37    itojun 	switch (af) {
   1255      1.37    itojun 	case AF_INET:
   1256      1.37    itojun 		map = "hosts.byaddr";
   1257      1.37    itojun 		break;
   1258      1.37    itojun 	default:
   1259      1.37    itojun 		map = "ipnodes.byaddr";
   1260      1.37    itojun 		break;
   1261      1.37    itojun 	}
   1262  1.79.2.1       tls 	ypcurrent = NULL;
   1263      1.37    itojun 	r = yp_match(__ypdomain, map, name,
   1264  1.79.2.1       tls 		(int)strlen(name), &ypcurrent, &ypcurrentlen);
   1265      1.59  christos 	if (r == 0)
   1266  1.79.2.1       tls 		hp = _yp_hostent(ypcurrent, af, info);
   1267  1.79.2.1       tls 	else
   1268  1.79.2.1       tls 		hp = NULL;
   1269  1.79.2.1       tls 	free(ypcurrent);
   1270      1.59  christos 	if (hp == NULL) {
   1271  1.79.2.1       tls 		*info->he = HOST_NOT_FOUND;
   1272       1.9     lukem 		return NS_NOTFOUND;
   1273       1.9     lukem 	}
   1274       1.9     lukem 	return NS_SUCCESS;
   1275       1.2       mrg }
   1276       1.2       mrg 
   1277      1.13  christos /*ARGSUSED*/
   1278       1.9     lukem int
   1279      1.59  christos _yp_gethtbyname(void *rv, void *cb_data, va_list ap)
   1280       1.2       mrg {
   1281  1.79.2.1       tls 	struct hostent *hp;
   1282  1.79.2.1       tls 	char *ypcurrent;
   1283  1.79.2.1       tls 	int ypcurrentlen, r;
   1284       1.9     lukem 	const char *name;
   1285      1.17  christos 	int af;
   1286      1.37    itojun 	const char *map;
   1287  1.79.2.1       tls 	struct getnamaddr *info = rv;
   1288      1.25     lukem 
   1289      1.25     lukem 	_DIAGASSERT(rv != NULL);
   1290       1.9     lukem 
   1291       1.9     lukem 	name = va_arg(ap, char *);
   1292  1.79.2.1       tls 	/* NOSTRICT skip string len */(void)va_arg(ap, int);
   1293       1.9     lukem 	af = va_arg(ap, int);
   1294       1.2       mrg 
   1295       1.2       mrg 	if (!__ypdomain) {
   1296       1.2       mrg 		if (_yp_check(&__ypdomain) == 0)
   1297       1.9     lukem 			return NS_UNAVAIL;
   1298       1.2       mrg 	}
   1299      1.37    itojun 	switch (af) {
   1300      1.37    itojun 	case AF_INET:
   1301      1.37    itojun 		map = "hosts.byname";
   1302      1.37    itojun 		break;
   1303      1.37    itojun 	default:
   1304      1.37    itojun 		map = "ipnodes.byname";
   1305      1.37    itojun 		break;
   1306      1.37    itojun 	}
   1307  1.79.2.1       tls 	ypcurrent = NULL;
   1308      1.37    itojun 	r = yp_match(__ypdomain, map, name,
   1309  1.79.2.1       tls 		(int)strlen(name), &ypcurrent, &ypcurrentlen);
   1310      1.59  christos 	if (r == 0)
   1311  1.79.2.1       tls 		hp = _yp_hostent(ypcurrent, af, info);
   1312  1.79.2.1       tls 	else
   1313  1.79.2.1       tls 		hp = NULL;
   1314  1.79.2.1       tls 	free(ypcurrent);
   1315      1.59  christos 	if (hp == NULL) {
   1316  1.79.2.1       tls 		*info->he = HOST_NOT_FOUND;
   1317       1.9     lukem 		return NS_NOTFOUND;
   1318       1.9     lukem 	}
   1319       1.9     lukem 	return NS_SUCCESS;
   1320       1.2       mrg }
   1321       1.2       mrg #endif
   1322  1.79.2.1       tls 
   1323  1.79.2.1       tls /*
   1324  1.79.2.1       tls  * Non-reentrant versions.
   1325  1.79.2.1       tls  */
   1326  1.79.2.1       tls FILE *_h_file;
   1327  1.79.2.1       tls static struct hostent h_ent;
   1328  1.79.2.1       tls static char h_buf[16384];
   1329  1.79.2.1       tls 
   1330  1.79.2.1       tls struct hostent *
   1331  1.79.2.1       tls gethostbyaddr(const void *addr, socklen_t len, int af) {
   1332  1.79.2.1       tls 	return gethostbyaddr_r(addr, len, af, &h_ent, h_buf, sizeof(h_buf),
   1333  1.79.2.1       tls 	    &h_errno);
   1334  1.79.2.1       tls }
   1335  1.79.2.1       tls 
   1336  1.79.2.1       tls struct hostent *
   1337  1.79.2.1       tls gethostbyname(const char *name) {
   1338  1.79.2.1       tls 	return gethostbyname_r(name, &h_ent, h_buf, sizeof(h_buf), &h_errno);
   1339  1.79.2.1       tls }
   1340  1.79.2.1       tls 
   1341  1.79.2.1       tls struct hostent *
   1342  1.79.2.1       tls gethostbyname2(const char *name, int af) {
   1343  1.79.2.1       tls 	return gethostbyname2_r(name, af, &h_ent, h_buf, sizeof(h_buf),
   1344  1.79.2.1       tls 	    &h_errno);
   1345  1.79.2.1       tls }
   1346  1.79.2.1       tls 
   1347  1.79.2.1       tls struct hostent *
   1348  1.79.2.1       tls gethostent(void)
   1349  1.79.2.1       tls {
   1350  1.79.2.1       tls 	if (_h_file == NULL) {
   1351  1.79.2.1       tls 		sethostent_r(&_h_file);
   1352  1.79.2.1       tls 		if (_h_file == NULL) {
   1353  1.79.2.1       tls 			h_errno = NETDB_INTERNAL;
   1354  1.79.2.1       tls 			return NULL;
   1355  1.79.2.1       tls 		}
   1356  1.79.2.1       tls 	}
   1357  1.79.2.1       tls 	memset(&h_ent, 0, sizeof(h_ent));
   1358  1.79.2.1       tls 	return gethostent_r(_h_file, &h_ent, h_buf, sizeof(h_buf), &h_errno);
   1359  1.79.2.1       tls }
   1360  1.79.2.1       tls 
   1361