1 | /* $NetBSD: clnt_bcast.c,v 1.26 2013/03/11 20:19:28 tron Exp $ */ |
2 | |
3 | /* |
4 | * Copyright (c) 2010, Oracle America, Inc. |
5 | * |
6 | * Redistribution and use in source and binary forms, with or without |
7 | * modification, are permitted provided that the following conditions are |
8 | * met: |
9 | * |
10 | * * Redistributions of source code must retain the above copyright |
11 | * notice, this list of conditions and the following disclaimer. |
12 | * * Redistributions in binary form must reproduce the above |
13 | * copyright notice, this list of conditions and the following |
14 | * disclaimer in the documentation and/or other materials |
15 | * provided with the distribution. |
16 | * * Neither the name of the "Oracle America, Inc." nor the names of its |
17 | * contributors may be used to endorse or promote products derived |
18 | * from this software without specific prior written permission. |
19 | * |
20 | * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS |
21 | * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT |
22 | * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS |
23 | * FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE |
24 | * COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, |
25 | * INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL |
26 | * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE |
27 | * GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS |
28 | * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, |
29 | * WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING |
30 | * NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE |
31 | * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
32 | */ |
33 | /* |
34 | * Copyright (c) 1986-1991 by Sun Microsystems Inc. |
35 | */ |
36 | |
37 | /* #ident "@(#)clnt_bcast.c 1.18 94/05/03 SMI" */ |
38 | |
39 | #include <sys/cdefs.h> |
40 | #if defined(LIBC_SCCS) && !defined(lint) |
41 | #if 0 |
42 | static char sccsid[] = "@(#)clnt_bcast.c 1.15 89/04/21 Copyr 1988 Sun Micro" ; |
43 | #else |
44 | __RCSID("$NetBSD: clnt_bcast.c,v 1.26 2013/03/11 20:19:28 tron Exp $" ); |
45 | #endif |
46 | #endif |
47 | |
48 | /* |
49 | * clnt_bcast.c |
50 | * Client interface to broadcast service. |
51 | * |
52 | * Copyright (C) 1988, Sun Microsystems, Inc. |
53 | * |
54 | * The following is kludged-up support for simple rpc broadcasts. |
55 | * Someday a large, complicated system will replace these routines. |
56 | */ |
57 | |
58 | #include "namespace.h" |
59 | #include <sys/types.h> |
60 | #include <sys/socket.h> |
61 | #include <sys/queue.h> |
62 | #include <net/if.h> |
63 | #include <netinet/in.h> |
64 | #include <ifaddrs.h> |
65 | #include <sys/poll.h> |
66 | #include <rpc/rpc.h> |
67 | #ifdef PORTMAP |
68 | #include <rpc/pmap_prot.h> |
69 | #include <rpc/pmap_clnt.h> |
70 | #include <rpc/pmap_rmt.h> |
71 | #endif |
72 | #include <rpc/nettype.h> |
73 | #include <arpa/inet.h> |
74 | #ifdef RPC_DEBUG |
75 | #include <stdio.h> |
76 | #endif |
77 | #include <assert.h> |
78 | #include <errno.h> |
79 | #include <stdlib.h> |
80 | #include <unistd.h> |
81 | #include <netdb.h> |
82 | #include <err.h> |
83 | #include <string.h> |
84 | |
85 | #include "rpc_internal.h" |
86 | #include "svc_fdset.h" |
87 | |
88 | #define MAXBCAST 20 /* Max no of broadcasting transports */ |
89 | #define INITTIME 4000 /* Time to wait initially */ |
90 | #define WAITTIME 8000 /* Maximum time to wait */ |
91 | |
92 | /* |
93 | * If nettype is NULL, it broadcasts on all the available |
94 | * datagram_n transports. May potentially lead to broadacst storms |
95 | * and hence should be used with caution, care and courage. |
96 | * |
97 | * The current parameter xdr packet size is limited by the max tsdu |
98 | * size of the transport. If the max tsdu size of any transport is |
99 | * smaller than the parameter xdr packet, then broadcast is not |
100 | * sent on that transport. |
101 | * |
102 | * Also, the packet size should be less the packet size of |
103 | * the data link layer (for ethernet it is 1400 bytes). There is |
104 | * no easy way to find out the max size of the data link layer and |
105 | * we are assuming that the args would be smaller than that. |
106 | * |
107 | * The result size has to be smaller than the transport tsdu size. |
108 | * |
109 | * If PORTMAP has been defined, we send two packets for UDP, one for |
110 | * rpcbind and one for portmap. For those machines which support |
111 | * both rpcbind and portmap, it will cause them to reply twice, and |
112 | * also here it will get two responses ... inefficient and clumsy. |
113 | */ |
114 | |
115 | #ifdef __weak_alias |
116 | __weak_alias(rpc_broadcast_exp,_rpc_broadcast_exp) |
117 | __weak_alias(rpc_broadcast,_rpc_broadcast) |
118 | #endif |
119 | |
120 | struct broadif { |
121 | int index; |
122 | struct sockaddr_storage broadaddr; |
123 | TAILQ_ENTRY(broadif) link; |
124 | }; |
125 | |
126 | typedef TAILQ_HEAD(, broadif) broadlist_t; |
127 | |
128 | int __rpc_getbroadifs(int, int, int, broadlist_t *); |
129 | void __rpc_freebroadifs(broadlist_t *); |
130 | int __rpc_broadenable(int, int, struct broadif *); |
131 | |
132 | int __rpc_lowvers = 0; |
133 | |
134 | int |
135 | __rpc_getbroadifs(int af, int proto, int socktype, broadlist_t *list) |
136 | { |
137 | int count = 0; |
138 | struct broadif *bip; |
139 | struct ifaddrs *ifap, *ifp; |
140 | #ifdef INET6 |
141 | struct sockaddr_in6 *sin6; |
142 | #endif |
143 | struct sockaddr_in *gbsin; |
144 | struct addrinfo hints, *res; |
145 | |
146 | _DIAGASSERT(list != NULL); |
147 | |
148 | if (getifaddrs(&ifp) < 0) |
149 | return 0; |
150 | |
151 | memset(&hints, 0, sizeof hints); |
152 | |
153 | hints.ai_family = af; |
154 | hints.ai_protocol = proto; |
155 | hints.ai_socktype = socktype; |
156 | |
157 | if (getaddrinfo(NULL, "sunrpc" , &hints, &res) != 0) { |
158 | freeifaddrs(ifp); |
159 | return 0; |
160 | } |
161 | |
162 | for (ifap = ifp; ifap != NULL; ifap = ifap->ifa_next) { |
163 | if (ifap->ifa_addr->sa_family != af || |
164 | !(ifap->ifa_flags & IFF_UP)) |
165 | continue; |
166 | bip = malloc(sizeof(*bip)); |
167 | if (bip == NULL) |
168 | break; |
169 | bip->index = if_nametoindex(ifap->ifa_name); |
170 | if ( |
171 | #ifdef INET6 |
172 | af != AF_INET6 && |
173 | #endif |
174 | (ifap->ifa_flags & IFF_BROADCAST) && |
175 | ifap->ifa_broadaddr) { |
176 | memcpy(&bip->broadaddr, ifap->ifa_broadaddr, |
177 | (size_t)ifap->ifa_broadaddr->sa_len); |
178 | gbsin = (struct sockaddr_in *)(void *)&bip->broadaddr; |
179 | gbsin->sin_port = |
180 | ((struct sockaddr_in *) |
181 | (void *)res->ai_addr)->sin_port; |
182 | } else |
183 | #ifdef INET6 |
184 | if (af == AF_INET6 && (ifap->ifa_flags & IFF_MULTICAST)) { |
185 | sin6 = (struct sockaddr_in6 *)(void *)&bip->broadaddr; |
186 | inet_pton(af, RPCB_MULTICAST_ADDR, &sin6->sin6_addr); |
187 | sin6->sin6_family = af; |
188 | sin6->sin6_len = sizeof *sin6; |
189 | sin6->sin6_port = |
190 | ((struct sockaddr_in6 *) |
191 | (void *)res->ai_addr)->sin6_port; |
192 | sin6->sin6_scope_id = bip->index; |
193 | } else |
194 | #endif |
195 | { |
196 | free(bip); |
197 | continue; |
198 | } |
199 | TAILQ_INSERT_TAIL(list, bip, link); |
200 | count++; |
201 | } |
202 | freeifaddrs(ifp); |
203 | freeaddrinfo(res); |
204 | |
205 | return count; |
206 | } |
207 | |
208 | void |
209 | __rpc_freebroadifs(broadlist_t *list) |
210 | { |
211 | struct broadif *bip, *next; |
212 | |
213 | _DIAGASSERT(list != NULL); |
214 | |
215 | bip = TAILQ_FIRST(list); |
216 | |
217 | while (bip != NULL) { |
218 | next = TAILQ_NEXT(bip, link); |
219 | free(bip); |
220 | bip = next; |
221 | } |
222 | } |
223 | |
224 | int |
225 | /*ARGSUSED*/ |
226 | __rpc_broadenable(int af, int s, struct broadif *bip) |
227 | { |
228 | int o = 1; |
229 | |
230 | #if 0 |
231 | _DIAGASSERT(bip != NULL); |
232 | |
233 | if (af == AF_INET6) { |
234 | fprintf(stderr, "set v6 multicast if to %d\n" , bip->index); |
235 | if (setsockopt(s, IPPROTO_IPV6, IPV6_MULTICAST_IF, &bip->index, |
236 | sizeof bip->index) < 0) |
237 | return -1; |
238 | } else |
239 | #endif |
240 | if (setsockopt(s, SOL_SOCKET, SO_BROADCAST, &o, |
241 | (socklen_t)sizeof(o)) == -1) |
242 | return -1; |
243 | |
244 | return 0; |
245 | } |
246 | |
247 | |
248 | enum clnt_stat |
249 | rpc_broadcast_exp( |
250 | rpcprog_t prog, /* program number */ |
251 | rpcvers_t vers, /* version number */ |
252 | rpcproc_t proc, /* procedure number */ |
253 | xdrproc_t xargs, /* xdr routine for args */ |
254 | const char * argsp, /* pointer to args */ |
255 | xdrproc_t xresults, /* xdr routine for results */ |
256 | caddr_t resultsp, /* pointer to results */ |
257 | resultproc_t eachresult, /* call with each result obtained */ |
258 | int inittime, /* how long to wait initially */ |
259 | int waittime, /* maximum time to wait */ |
260 | const char * nettype) /* transport type */ |
261 | { |
262 | enum clnt_stat stat = RPC_SUCCESS; /* Return status */ |
263 | XDR xdr_stream; /* XDR stream */ |
264 | XDR *xdrs = &xdr_stream; |
265 | struct rpc_msg msg; /* RPC message */ |
266 | char *outbuf = NULL; /* Broadcast msg buffer */ |
267 | char *inbuf = NULL; /* Reply buf */ |
268 | ssize_t inlen; |
269 | u_int maxbufsize = 0; |
270 | AUTH *sys_auth = authunix_create_default(); |
271 | size_t i; |
272 | void *handle; |
273 | char uaddress[1024]; /* A self imposed limit */ |
274 | char *uaddrp = uaddress; |
275 | int pmap_reply_flag; /* reply recvd from PORTMAP */ |
276 | /* An array of all the suitable broadcast transports */ |
277 | struct { |
278 | int fd; /* File descriptor */ |
279 | int af; |
280 | int proto; |
281 | struct netconfig *nconf; /* Netconfig structure */ |
282 | u_int asize; /* Size of the addr buf */ |
283 | u_int dsize; /* Size of the data buf */ |
284 | struct sockaddr_storage raddr; /* Remote address */ |
285 | broadlist_t nal; |
286 | } fdlist[MAXBCAST]; |
287 | struct pollfd pfd[MAXBCAST]; |
288 | nfds_t fdlistno = 0; |
289 | struct r_rpcb_rmtcallargs barg; /* Remote arguments */ |
290 | struct r_rpcb_rmtcallres bres; /* Remote results */ |
291 | size_t outlen; |
292 | struct netconfig *nconf; |
293 | int msec; |
294 | int pollretval; |
295 | int fds_found; |
296 | struct timespec ts; |
297 | |
298 | #ifdef PORTMAP |
299 | size_t outlen_pmap = 0; |
300 | u_long port; /* Remote port number */ |
301 | int pmap_flag = 0; /* UDP exists ? */ |
302 | char *outbuf_pmap = NULL; |
303 | struct rmtcallargs barg_pmap; /* Remote arguments */ |
304 | struct rmtcallres bres_pmap; /* Remote results */ |
305 | u_int udpbufsz = 0; |
306 | #endif /* PORTMAP */ |
307 | |
308 | if (sys_auth == NULL) { |
309 | return (RPC_SYSTEMERROR); |
310 | } |
311 | /* |
312 | * initialization: create a fd, a broadcast address, and send the |
313 | * request on the broadcast transport. |
314 | * Listen on all of them and on replies, call the user supplied |
315 | * function. |
316 | */ |
317 | |
318 | if (nettype == NULL) |
319 | nettype = "datagram_n" ; |
320 | if ((handle = __rpc_setconf(nettype)) == NULL) { |
321 | AUTH_DESTROY(sys_auth); |
322 | return (RPC_UNKNOWNPROTO); |
323 | } |
324 | while ((nconf = __rpc_getconf(handle)) != NULL) { |
325 | int fd; |
326 | struct __rpc_sockinfo si; |
327 | |
328 | if (nconf->nc_semantics != NC_TPI_CLTS) |
329 | continue; |
330 | if (fdlistno >= MAXBCAST) |
331 | break; /* No more slots available */ |
332 | if (!__rpc_nconf2sockinfo(nconf, &si)) |
333 | continue; |
334 | |
335 | TAILQ_INIT(&fdlist[fdlistno].nal); |
336 | if (__rpc_getbroadifs(si.si_af, si.si_proto, si.si_socktype, |
337 | &fdlist[fdlistno].nal) == 0) |
338 | continue; |
339 | |
340 | fd = socket(si.si_af, si.si_socktype, si.si_proto); |
341 | if (fd < 0) { |
342 | stat = RPC_CANTSEND; |
343 | continue; |
344 | } |
345 | fdlist[fdlistno].af = si.si_af; |
346 | fdlist[fdlistno].proto = si.si_proto; |
347 | fdlist[fdlistno].fd = fd; |
348 | fdlist[fdlistno].nconf = nconf; |
349 | fdlist[fdlistno].asize = __rpc_get_a_size(si.si_af); |
350 | pfd[fdlistno].events = POLLIN | POLLPRI | |
351 | POLLRDNORM | POLLRDBAND; |
352 | pfd[fdlistno].fd = fdlist[fdlistno].fd = fd; |
353 | fdlist[fdlistno].dsize = __rpc_get_t_size(si.si_af, si.si_proto, |
354 | 0); |
355 | |
356 | if (maxbufsize <= fdlist[fdlistno].dsize) |
357 | maxbufsize = fdlist[fdlistno].dsize; |
358 | |
359 | #ifdef PORTMAP |
360 | if (si.si_af == AF_INET && si.si_proto == IPPROTO_UDP) { |
361 | udpbufsz = fdlist[fdlistno].dsize; |
362 | if ((outbuf_pmap = malloc(udpbufsz)) == NULL) { |
363 | close(fd); |
364 | stat = RPC_SYSTEMERROR; |
365 | goto done_broad; |
366 | } |
367 | pmap_flag = 1; |
368 | } |
369 | #endif |
370 | fdlistno++; |
371 | } |
372 | |
373 | if (fdlistno == 0) { |
374 | if (stat == RPC_SUCCESS) |
375 | stat = RPC_UNKNOWNPROTO; |
376 | goto done_broad; |
377 | } |
378 | if (maxbufsize == 0) { |
379 | if (stat == RPC_SUCCESS) |
380 | stat = RPC_CANTSEND; |
381 | goto done_broad; |
382 | } |
383 | inbuf = malloc(maxbufsize); |
384 | outbuf = malloc(maxbufsize); |
385 | if ((inbuf == NULL) || (outbuf == NULL)) { |
386 | stat = RPC_SYSTEMERROR; |
387 | goto done_broad; |
388 | } |
389 | |
390 | /* Serialize all the arguments which have to be sent */ |
391 | msg.rm_xid = __RPC_GETXID(); |
392 | msg.rm_direction = CALL; |
393 | msg.rm_call.cb_rpcvers = RPC_MSG_VERSION; |
394 | msg.rm_call.cb_prog = RPCBPROG; |
395 | msg.rm_call.cb_vers = RPCBVERS; |
396 | msg.rm_call.cb_proc = RPCBPROC_CALLIT; |
397 | barg.prog = prog; |
398 | barg.vers = vers; |
399 | barg.proc = proc; |
400 | barg.args.args_val = argsp; |
401 | barg.xdr_args = xargs; |
402 | bres.addr = uaddrp; |
403 | bres.results.results_val = resultsp; |
404 | bres.xdr_res = xresults; |
405 | msg.rm_call.cb_cred = sys_auth->ah_cred; |
406 | msg.rm_call.cb_verf = sys_auth->ah_verf; |
407 | xdrmem_create(xdrs, outbuf, maxbufsize, XDR_ENCODE); |
408 | if ((!xdr_callmsg(xdrs, &msg)) || |
409 | (!xdr_rpcb_rmtcallargs(xdrs, |
410 | (struct rpcb_rmtcallargs *)(void *)&barg))) { |
411 | stat = RPC_CANTENCODEARGS; |
412 | goto done_broad; |
413 | } |
414 | outlen = xdr_getpos(xdrs); |
415 | xdr_destroy(xdrs); |
416 | |
417 | #ifdef PORTMAP |
418 | /* Prepare the packet for version 2 PORTMAP */ |
419 | if (pmap_flag) { |
420 | msg.rm_xid++; /* One way to distinguish */ |
421 | msg.rm_call.cb_prog = PMAPPROG; |
422 | msg.rm_call.cb_vers = PMAPVERS; |
423 | msg.rm_call.cb_proc = PMAPPROC_CALLIT; |
424 | barg_pmap.prog = prog; |
425 | barg_pmap.vers = vers; |
426 | barg_pmap.proc = proc; |
427 | barg_pmap.args_ptr = argsp; |
428 | barg_pmap.xdr_args = xargs; |
429 | bres_pmap.port_ptr = &port; |
430 | bres_pmap.xdr_results = xresults; |
431 | bres_pmap.results_ptr = resultsp; |
432 | xdrmem_create(xdrs, outbuf_pmap, udpbufsz, XDR_ENCODE); |
433 | if ((! xdr_callmsg(xdrs, &msg)) || |
434 | (! xdr_rmtcall_args(xdrs, &barg_pmap))) { |
435 | stat = RPC_CANTENCODEARGS; |
436 | goto done_broad; |
437 | } |
438 | outlen_pmap = xdr_getpos(xdrs); |
439 | xdr_destroy(xdrs); |
440 | } |
441 | #endif /* PORTMAP */ |
442 | |
443 | /* |
444 | * Basic loop: broadcast the packets to transports which |
445 | * support data packets of size such that one can encode |
446 | * all the arguments. |
447 | * Wait a while for response(s). |
448 | * The response timeout grows larger per iteration. |
449 | */ |
450 | for (msec = inittime; msec <= waittime; msec += msec) { |
451 | struct broadif *bip; |
452 | |
453 | /* Broadcast all the packets now */ |
454 | for (i = 0; i < fdlistno; i++) { |
455 | if (fdlist[i].dsize < outlen) { |
456 | stat = RPC_CANTSEND; |
457 | continue; |
458 | } |
459 | for (bip = TAILQ_FIRST(&fdlist[i].nal); bip != NULL; |
460 | bip = TAILQ_NEXT(bip, link)) { |
461 | void *addr; |
462 | |
463 | addr = &bip->broadaddr; |
464 | |
465 | __rpc_broadenable(fdlist[i].af, fdlist[i].fd, |
466 | bip); |
467 | |
468 | /* |
469 | * Only use version 3 if lowvers is not set |
470 | */ |
471 | |
472 | if (!__rpc_lowvers) |
473 | if ((size_t)sendto(fdlist[i].fd, outbuf, |
474 | outlen, 0, (struct sockaddr*)addr, |
475 | (socklen_t)fdlist[i].asize) != |
476 | outlen) { |
477 | warn("clnt_bcast: cannot send" |
478 | " broadcast packet" ); |
479 | stat = RPC_CANTSEND; |
480 | continue; |
481 | } |
482 | #ifdef RPC_DEBUG |
483 | if (!__rpc_lowvers) |
484 | fprintf(stderr, "Broadcast packet sent " |
485 | "for %s\n" , |
486 | fdlist[i].nconf->nc_netid); |
487 | #endif |
488 | #ifdef PORTMAP |
489 | /* |
490 | * Send the version 2 packet also |
491 | * for UDP/IP |
492 | */ |
493 | if (pmap_flag && |
494 | fdlist[i].proto == IPPROTO_UDP) { |
495 | if ((size_t)sendto(fdlist[i].fd, |
496 | outbuf_pmap, outlen_pmap, 0, addr, |
497 | (socklen_t)fdlist[i].asize) != |
498 | outlen_pmap) { |
499 | warnx("clnt_bcast: " |
500 | "Cannot send " |
501 | "broadcast packet" ); |
502 | stat = RPC_CANTSEND; |
503 | continue; |
504 | } |
505 | } |
506 | #ifdef RPC_DEBUG |
507 | fprintf(stderr, "PMAP Broadcast packet " |
508 | "sent for %s\n" , |
509 | fdlist[i].nconf->nc_netid); |
510 | #endif |
511 | #endif /* PORTMAP */ |
512 | } |
513 | /* End for sending all packets on this transport */ |
514 | } /* End for sending on all transports */ |
515 | |
516 | if (eachresult == NULL) { |
517 | stat = RPC_SUCCESS; |
518 | goto done_broad; |
519 | } |
520 | |
521 | /* |
522 | * Get all the replies from these broadcast requests |
523 | */ |
524 | recv_again: |
525 | ts.tv_sec = msec / 1000; |
526 | ts.tv_nsec = (msec % 1000) * 1000000; |
527 | |
528 | switch (pollretval = pollts(pfd, fdlistno, &ts, NULL)) { |
529 | case 0: /* timed out */ |
530 | stat = RPC_TIMEDOUT; |
531 | continue; |
532 | case -1: /* some kind of error - we ignore it */ |
533 | goto recv_again; |
534 | } /* end of poll results switch */ |
535 | |
536 | for (i = fds_found = 0; |
537 | i < fdlistno && fds_found < pollretval; i++) { |
538 | bool_t done = FALSE; |
539 | |
540 | if (pfd[i].revents == 0) |
541 | continue; |
542 | else if (pfd[i].revents & POLLNVAL) { |
543 | /* |
544 | * Something bad has happened to this descri- |
545 | * ptor. We can cause pollts() to ignore |
546 | * it simply by using a negative fd. We do that |
547 | * rather than compacting the pfd[] and fdlist[] |
548 | * arrays. |
549 | */ |
550 | pfd[i].fd = -1; |
551 | fds_found++; |
552 | continue; |
553 | } else |
554 | fds_found++; |
555 | #ifdef RPC_DEBUG |
556 | fprintf(stderr, "response for %s\n" , |
557 | fdlist[i].nconf->nc_netid); |
558 | #endif |
559 | try_again: |
560 | inlen = recvfrom(fdlist[i].fd, inbuf, fdlist[i].dsize, |
561 | 0, (struct sockaddr *)(void *)&fdlist[i].raddr, |
562 | &fdlist[i].asize); |
563 | if (inlen < 0) { |
564 | if (errno == EINTR) |
565 | goto try_again; |
566 | warnx("clnt_bcast: Cannot receive reply to " |
567 | "broadcast" ); |
568 | stat = RPC_CANTRECV; |
569 | continue; |
570 | } |
571 | if (inlen < (ssize_t)sizeof(u_int32_t)) |
572 | continue; /* Drop that and go ahead */ |
573 | /* |
574 | * see if reply transaction id matches sent id. |
575 | * If so, decode the results. If return id is xid + 1 |
576 | * it was a PORTMAP reply |
577 | */ |
578 | if (*((u_int32_t *)(void *)(inbuf)) == |
579 | *((u_int32_t *)(void *)(outbuf))) { |
580 | pmap_reply_flag = 0; |
581 | msg.acpted_rply.ar_verf = _null_auth; |
582 | msg.acpted_rply.ar_results.where = |
583 | (caddr_t)(void *)&bres; |
584 | msg.acpted_rply.ar_results.proc = |
585 | (xdrproc_t)xdr_rpcb_rmtcallres; |
586 | #ifdef PORTMAP |
587 | } else if (pmap_flag && |
588 | *((u_int32_t *)(void *)(inbuf)) == |
589 | *((u_int32_t *)(void *)(outbuf_pmap))) { |
590 | pmap_reply_flag = 1; |
591 | msg.acpted_rply.ar_verf = _null_auth; |
592 | msg.acpted_rply.ar_results.where = |
593 | (caddr_t)(void *)&bres_pmap; |
594 | msg.acpted_rply.ar_results.proc = |
595 | (xdrproc_t)xdr_rmtcallres; |
596 | #endif /* PORTMAP */ |
597 | } else |
598 | continue; |
599 | xdrmem_create(xdrs, inbuf, (u_int)inlen, XDR_DECODE); |
600 | if (xdr_replymsg(xdrs, &msg)) { |
601 | if ((msg.rm_reply.rp_stat == MSG_ACCEPTED) && |
602 | (msg.acpted_rply.ar_stat == SUCCESS)) { |
603 | struct netbuf taddr, *np; |
604 | struct sockaddr_in *bsin; |
605 | |
606 | #ifdef PORTMAP |
607 | if (pmap_flag && pmap_reply_flag) { |
608 | bsin = (struct sockaddr_in *) |
609 | (void *)&fdlist[i].raddr; |
610 | bsin->sin_port = |
611 | htons((u_short)port); |
612 | taddr.len = taddr.maxlen = |
613 | fdlist[i].raddr.ss_len; |
614 | taddr.buf = &fdlist[i].raddr; |
615 | done = (*eachresult)(resultsp, |
616 | &taddr, fdlist[i].nconf); |
617 | } else { |
618 | #endif |
619 | #ifdef RPC_DEBUG |
620 | fprintf(stderr, "uaddr %s\n" , |
621 | uaddrp); |
622 | #endif |
623 | np = uaddr2taddr( |
624 | fdlist[i].nconf, uaddrp); |
625 | done = (*eachresult)(resultsp, |
626 | np, fdlist[i].nconf); |
627 | free(np); |
628 | #ifdef PORTMAP |
629 | } |
630 | #endif |
631 | } |
632 | /* otherwise, we just ignore the errors ... */ |
633 | } |
634 | /* else some kind of deserialization problem ... */ |
635 | |
636 | xdrs->x_op = XDR_FREE; |
637 | msg.acpted_rply.ar_results.proc = (xdrproc_t) xdr_void; |
638 | (void) xdr_replymsg(xdrs, &msg); |
639 | (void) (*xresults)(xdrs, resultsp); |
640 | XDR_DESTROY(xdrs); |
641 | if (done) { |
642 | stat = RPC_SUCCESS; |
643 | goto done_broad; |
644 | } else { |
645 | goto recv_again; |
646 | } |
647 | } /* The recv for loop */ |
648 | } /* The giant for loop */ |
649 | |
650 | done_broad: |
651 | if (inbuf) |
652 | (void) free(inbuf); |
653 | if (outbuf) |
654 | (void) free(outbuf); |
655 | #ifdef PORTMAP |
656 | if (outbuf_pmap) |
657 | (void) free(outbuf_pmap); |
658 | #endif |
659 | for (i = 0; i < fdlistno; i++) { |
660 | (void) close(fdlist[i].fd); |
661 | __rpc_freebroadifs(&fdlist[i].nal); |
662 | } |
663 | AUTH_DESTROY(sys_auth); |
664 | (void) __rpc_endconf(handle); |
665 | |
666 | return (stat); |
667 | } |
668 | |
669 | |
670 | enum clnt_stat |
671 | rpc_broadcast( |
672 | rpcprog_t prog, /* program number */ |
673 | rpcvers_t vers, /* version number */ |
674 | rpcproc_t proc, /* procedure number */ |
675 | xdrproc_t xargs, /* xdr routine for args */ |
676 | const char * argsp, /* pointer to args */ |
677 | xdrproc_t xresults, /* xdr routine for results */ |
678 | caddr_t resultsp, /* pointer to results */ |
679 | resultproc_t eachresult, /* call with each result obtained */ |
680 | const char * nettype) /* transport type */ |
681 | { |
682 | enum clnt_stat dummy; |
683 | |
684 | dummy = rpc_broadcast_exp(prog, vers, proc, xargs, argsp, |
685 | xresults, resultsp, eachresult, |
686 | INITTIME, WAITTIME, nettype); |
687 | return (dummy); |
688 | } |
689 | |