/*	$NetBSD: getaddrinfo.c,v 1.1 2024/02/18 20:57:47 christos Exp $	*/
/*
 * Copyright (C) Internet Systems Consortium, Inc. ("ISC")
 *
 * SPDX-License-Identifier: MPL-2.0
 *
 * This Source Code Form is subject to the terms of the Mozilla Public
 * License, v. 2.0.  If a copy of the MPL was not distributed with this
 * file, you can obtain one at https://mozilla.org/MPL/2.0/.
 *
 * See the COPYRIGHT file distributed with this work for additional
 * information regarding copyright ownership.
 */
/*! \file */
/**
 *    getaddrinfo() is used to get a list of IP addresses and port
 *    numbers for host hostname and service servname as defined in RFC3493.
 *    hostname and servname are pointers to null-terminated strings
 *    or NULL. hostname is either a host name or a numeric host address
 *    string: a dotted decimal IPv4 address or an IPv6 address. servname is
 *    either a decimal port number or a service name as listed in
 *    /etc/services.
 *
 *    If the operating system does not provide a struct addrinfo, the
 *    following structure is used:
 *
 * \code
 * struct  addrinfo {
 *         int             ai_flags;       // AI_PASSIVE, AI_CANONNAME
 *         int             ai_family;      // PF_xxx
 *         int             ai_socktype;    // SOCK_xxx
 *         int             ai_protocol;    // 0 or IPPROTO_xxx for IPv4 and IPv6
 *         size_t          ai_addrlen;     // length of ai_addr
 *         char            *ai_canonname;  // canonical name for hostname
 *         struct sockaddr *ai_addr;       // binary address
 *         struct addrinfo *ai_next;       // next structure in linked list
 * };
 * \endcode
 *
 *
 *    hints is an optional pointer to a struct addrinfo. This structure can
 *    be used to provide hints concerning the type of socket that the caller
 *    supports or wishes to use. The caller can supply the following
 *    structure elements in *hints:
 *
 * 
 *    - ai_family:
 *           The protocol family that should be used. When ai_family is set
 *           to PF_UNSPEC, it means the caller will accept any protocol
 *           family supported by the operating system.
 
 *
 *    - ai_socktype:
 *           denotes the type of socket -- SOCK_STREAM, SOCK_DGRAM or
 *           SOCK_RAW -- that is wanted. When ai_socktype is zero the caller
 *           will accept any socket type.
 
 *
 *    - ai_protocol:
 *           indicates which transport protocol is wanted: IPPROTO_UDP or
 *           IPPROTO_TCP. If ai_protocol is zero the caller will accept any
 *           protocol.
 
 *
 *    - ai_flags:
 *           Flag bits. If the AI_CANONNAME bit is set, a successful call to
 *           getaddrinfo() will return a null-terminated string
 *           containing the canonical name of the specified hostname in
 *           ai_canonname of the first addrinfo structure returned. Setting
 *           the AI_PASSIVE bit indicates that the returned socket address
 *           structure is intended for used in a call to bind(2). In this
 *           case, if the hostname argument is a NULL pointer, then the IP
 *           address portion of the socket address structure will be set to
 *           INADDR_ANY for an IPv4 address or IN6ADDR_ANY_INIT for an IPv6
 *           address.
 *
 *           When ai_flags does not set the AI_PASSIVE bit, the returned
 *           socket address structure will be ready for use in a call to
 *           connect(2) for a connection-oriented protocol or connect(2),
 *           sendto(2), or sendmsg(2) if a connectionless protocol was
 *           chosen. The IP address portion of the socket address structure
 *           will be set to the loopback address if hostname is a NULL
 *           pointer and AI_PASSIVE is not set in ai_flags.
 *
 *           If ai_flags is set to AI_NUMERICHOST it indicates that hostname
 *           should be treated as a numeric string defining an IPv4 or IPv6
 *           address and no name resolution should be attempted.
 *  
 *
 *    All other elements of the struct addrinfo passed via hints must be
 *    zero.
 *
 *    A hints of NULL is treated as if the caller provided a struct addrinfo
 *    initialized to zero with ai_familyset to PF_UNSPEC.
 *
 *    After a successful call to getaddrinfo(), *res is a pointer to a
 *    linked list of one or more addrinfo structures. Each struct addrinfo
 *    in this list cn be processed by following the ai_next pointer, until a
 *    NULL pointer is encountered. The three members ai_family, ai_socktype,
 *    and ai_protocol in each returned addrinfo structure contain the
 *    corresponding arguments for a call to socket(2). For each addrinfo
 *    structure in the list, the ai_addr member points to a filled-in socket
 *    address structure of length ai_addrlen.
 *
 *    All of the information returned by getaddrinfo() is dynamically
 *    allocated: the addrinfo structures, and the socket address structures
 *    and canonical host name strings pointed to by the addrinfostructures.
 *    Memory allocated for the dynamically allocated structures created by a
 *    successful call to getaddrinfo() is released by freeaddrinfo().
 *    ai is a pointer to a struct addrinfo created by a call to getaddrinfo().
 *
 * \section irsreturn RETURN VALUES
 *
 *    getaddrinfo() returns zero on success or one of the error codes
 *    listed in gai_strerror() if an error occurs. If both hostname and
 *    servname are NULL getaddrinfo() returns #EAI_NONAME.
 *
 * \section irssee SEE ALSO
 *
 *    getaddrinfo(), freeaddrinfo(),
 *    gai_strerror(), RFC3493, getservbyname(3), connect(2),
 *    sendto(2), sendmsg(2), socket(2).
 */
#include 
#include 
#include 
#include 
#include 
#ifdef _WIN32
#include 
#include 
#include 
#endif /* ifdef _WIN32 */
#include 
#include 
#include 
#include 
#include 
#include 
#include 
#include 
#include 
#include 
#include 
#include 
#include 
#include 
#include 
#include 
#include 
#include 
#include 
#include 
#define SA(addr)     ((struct sockaddr *)(addr))
#define SIN(addr)    ((struct sockaddr_in *)(addr))
#define SIN6(addr)   ((struct sockaddr_in6 *)(addr))
#define SLOCAL(addr) ((struct sockaddr_un *)(addr))
/*! \struct addrinfo
 */
static struct addrinfo *
ai_concat(struct addrinfo *ai1, struct addrinfo *ai2),
	*ai_reverse(struct addrinfo *oai),
	*ai_clone(struct addrinfo *oai, int family),
	*ai_alloc(int family, int addrlen);
#ifdef AF_LOCAL
static int
get_local(const char *name, int socktype, struct addrinfo **res);
#endif /* ifdef AF_LOCAL */
static int
resolve_name(int family, const char *hostname, int flags, struct addrinfo **aip,
	     int socktype, int port);
static int
add_ipv4(const char *hostname, int flags, struct addrinfo **aip, int socktype,
	 int port);
static int
add_ipv6(const char *hostname, int flags, struct addrinfo **aip, int socktype,
	 int port);
static void
set_order(int, int (**)(const char *, int, struct addrinfo **, int, int));
static void
_freeaddrinfo(struct addrinfo *ai);
#define FOUND_IPV4 0x1
#define FOUND_IPV6 0x2
#define FOUND_MAX  2
/*%
 * Try converting the scope identifier in 'src' to a network interface index.
 * Upon success, return true and store the resulting index in 'dst'.  Upon
 * failure, return false.
 */
static bool
parse_scopeid(const char *src, uint32_t *dst) {
	uint32_t scopeid = 0;
	REQUIRE(src != NULL);
	REQUIRE(dst != NULL);
#ifdef HAVE_IF_NAMETOINDEX
	/*
	 * Try using if_nametoindex() first if it is available.  As it does not
	 * handle numeric scopes, we do not simply return if it fails.
	 */
	scopeid = (uint32_t)if_nametoindex(src);
#endif /* ifdef HAVE_IF_NAMETOINDEX */
	/*
	 * Fall back to numeric scope processing if if_nametoindex() either
	 * fails or is unavailable.
	 */
	if (scopeid == 0) {
		char *endptr = NULL;
		scopeid = (uint32_t)strtoul(src, &endptr, 10);
		/*
		 * The scope identifier must not be empty and no trailing
		 * characters are allowed after it.
		 */
		if (src == endptr || endptr == NULL || *endptr != '\0') {
			return (false);
		}
	}
	*dst = scopeid;
	return (true);
}
#define ISC_AI_MASK (AI_PASSIVE | AI_CANONNAME | AI_NUMERICHOST)
/*%
 * Get a list of IP addresses and port numbers for host hostname and
 * service servname.
 */
int
getaddrinfo(const char *hostname, const char *servname,
	    const struct addrinfo *hints, struct addrinfo **res) {
	struct servent *sp;
	const char *proto;
	int family, socktype, flags, protocol;
	struct addrinfo *ai, *ai_list;
	int err = 0;
	int port, i;
	int (*net_order[FOUND_MAX + 1])(const char *, int, struct addrinfo **,
					int, int);
	if (hostname == NULL && servname == NULL) {
		return (EAI_NONAME);
	}
	proto = NULL;
	if (hints != NULL) {
		if ((hints->ai_flags & ~(ISC_AI_MASK)) != 0) {
			return (EAI_BADFLAGS);
		}
		if (hints->ai_addrlen || hints->ai_canonname ||
		    hints->ai_addr || hints->ai_next)
		{
			errno = EINVAL;
			return (EAI_SYSTEM);
		}
		family = hints->ai_family;
		socktype = hints->ai_socktype;
		protocol = hints->ai_protocol;
		flags = hints->ai_flags;
		switch (family) {
		case AF_UNSPEC:
			switch (hints->ai_socktype) {
			case SOCK_STREAM:
				proto = "tcp";
				break;
			case SOCK_DGRAM:
				proto = "udp";
				break;
			}
			break;
		case AF_INET:
		case AF_INET6:
			switch (hints->ai_socktype) {
			case 0:
				break;
			case SOCK_STREAM:
				proto = "tcp";
				break;
			case SOCK_DGRAM:
				proto = "udp";
				break;
			case SOCK_RAW:
				break;
			default:
				return (EAI_SOCKTYPE);
			}
			break;
#ifdef AF_LOCAL
		case AF_LOCAL:
			switch (hints->ai_socktype) {
			case 0:
				break;
			case SOCK_STREAM:
				break;
			case SOCK_DGRAM:
				break;
			default:
				return (EAI_SOCKTYPE);
			}
			break;
#endif /* ifdef AF_LOCAL */
		default:
			return (EAI_FAMILY);
		}
	} else {
		protocol = 0;
		family = 0;
		socktype = 0;
		flags = 0;
	}
#ifdef AF_LOCAL
	/*!
	 * First, deal with AF_LOCAL.  If the family was not set,
	 * then assume AF_LOCAL if the first character of the
	 * hostname/servname is '/'.
	 */
	if (hostname != NULL &&
	    (family == AF_LOCAL || (family == 0 && *hostname == '/')))
	{
		return (get_local(hostname, socktype, res));
	}
	if (servname != NULL &&
	    (family == AF_LOCAL || (family == 0 && *servname == '/')))
	{
		return (get_local(servname, socktype, res));
	}
#endif /* ifdef AF_LOCAL */
	/*
	 * Ok, only AF_INET and AF_INET6 left.
	 */
	ai_list = NULL;
	/*
	 * First, look up the service name (port) if it was
	 * requested.  If the socket type wasn't specified, then
	 * try and figure it out.
	 */
	if (servname != NULL) {
		char *e;
		port = strtol(servname, &e, 10);
		if (*e == '\0') {
			if (socktype == 0) {
				return (EAI_SOCKTYPE);
			}
			if (port < 0 || port > 65535) {
				return (EAI_SERVICE);
			}
			port = htons((unsigned short)port);
		} else {
#ifdef _WIN32
			WORD wVersionRequested;
			WSADATA wsaData;
			wVersionRequested = MAKEWORD(2, 0);
			err = WSAStartup(wVersionRequested, &wsaData);
			if (err != 0) {
				return (EAI_FAIL);
			}
#endif /* ifdef _WIN32 */
			sp = getservbyname(servname, proto);
			if (sp != NULL) {
				port = sp->s_port;
			}
#ifdef _WIN32
			WSACleanup();
#endif /* ifdef _WIN32 */
			if (sp == NULL) {
				return (EAI_SERVICE);
			}
			if (socktype == 0) {
				if (strcmp(sp->s_proto, "tcp") == 0) {
					socktype = SOCK_STREAM;
				} else if (strcmp(sp->s_proto, "udp") == 0) {
					socktype = SOCK_DGRAM;
				}
			}
		}
	} else {
		port = 0;
	}
	/*
	 * Next, deal with just a service name, and no hostname.
	 * (we verified that one of them was non-null up above).
	 */
	if (hostname == NULL && (flags & AI_PASSIVE) != 0) {
		if (family == AF_INET || family == 0) {
			ai = ai_alloc(AF_INET, sizeof(struct sockaddr_in));
			if (ai == NULL) {
				return (EAI_MEMORY);
			}
			ai->ai_socktype = socktype;
			ai->ai_protocol = protocol;
			SIN(ai->ai_addr)->sin_port = port;
			ai->ai_next = ai_list;
			ai_list = ai;
		}
		if (family == AF_INET6 || family == 0) {
			ai = ai_alloc(AF_INET6, sizeof(struct sockaddr_in6));
			if (ai == NULL) {
				_freeaddrinfo(ai_list);
				return (EAI_MEMORY);
			}
			ai->ai_socktype = socktype;
			ai->ai_protocol = protocol;
			SIN6(ai->ai_addr)->sin6_port = port;
			ai->ai_next = ai_list;
			ai_list = ai;
		}
		*res = ai_list;
		return (0);
	}
	/*
	 * If the family isn't specified or AI_NUMERICHOST specified, check
	 * first to see if it is a numeric address.
	 * Though the gethostbyname2() routine will recognize numeric addresses,
	 * it will only recognize the format that it is being called for.  Thus,
	 * a numeric AF_INET address will be treated by the AF_INET6 call as
	 * a domain name, and vice versa.  Checking for both numerics here
	 * avoids that.
	 */
	if (hostname != NULL && (family == 0 || (flags & AI_NUMERICHOST) != 0))
	{
		char abuf[sizeof(struct in6_addr)];
		char nbuf[NI_MAXHOST];
		int addrsize, addroff;
		char ntmp[NI_MAXHOST];
		uint32_t scopeid = 0;
		/*
		 * Scope identifier portion.
		 */
		ntmp[0] = '\0';
		if (strchr(hostname, '%') != NULL) {
			char *p;
			strlcpy(ntmp, hostname, sizeof(ntmp));
			p = strchr(ntmp, '%');
			if (p != NULL && parse_scopeid(p + 1, &scopeid)) {
				*p = '\0';
			} else {
				ntmp[0] = '\0';
			}
		}
		if (inet_pton(AF_INET, hostname, (struct in_addr *)abuf) == 1) {
			if (family == AF_INET6) {
				/*
				 * Convert to a V4 mapped address.
				 */
				struct in6_addr *a6 = (struct in6_addr *)abuf;
				memmove(&a6->s6_addr[12], &a6->s6_addr[0], 4);
				memset(&a6->s6_addr[10], 0xff, 2);
				memset(&a6->s6_addr[0], 0, 10);
				goto inet6_addr;
			}
			addrsize = sizeof(struct in_addr);
			addroff = offsetof(struct sockaddr_in, sin_addr);
			family = AF_INET;
			goto common;
		} else if (ntmp[0] != '\0' &&
			   inet_pton(AF_INET6, ntmp, abuf) == 1)
		{
			if (family && family != AF_INET6) {
				return (EAI_NONAME);
			}
			addrsize = sizeof(struct in6_addr);
			addroff = offsetof(struct sockaddr_in6, sin6_addr);
			family = AF_INET6;
			goto common;
		} else if (inet_pton(AF_INET6, hostname, abuf) == 1) {
			if (family != 0 && family != AF_INET6) {
				return (EAI_NONAME);
			}
		inet6_addr:
			addrsize = sizeof(struct in6_addr);
			addroff = offsetof(struct sockaddr_in6, sin6_addr);
			family = AF_INET6;
		common:
			ai = ai_alloc(family,
				      ((family == AF_INET6)
					       ? sizeof(struct sockaddr_in6)
					       : sizeof(struct sockaddr_in)));
			if (ai == NULL) {
				return (EAI_MEMORY);
			}
			ai_list = ai;
			ai->ai_socktype = socktype;
			SIN(ai->ai_addr)->sin_port = port;
			memmove((char *)ai->ai_addr + addroff, abuf, addrsize);
			if (ai->ai_family == AF_INET6) {
				SIN6(ai->ai_addr)->sin6_scope_id = scopeid;
			}
			if ((flags & AI_CANONNAME) != 0) {
				if (getnameinfo(ai->ai_addr,
						(socklen_t)ai->ai_addrlen, nbuf,
						sizeof(nbuf), NULL, 0,
						NI_NUMERICHOST) == 0)
				{
					ai->ai_canonname = strdup(nbuf);
					if (ai->ai_canonname == NULL) {
						_freeaddrinfo(ai);
						return (EAI_MEMORY);
					}
				} else {
					/* XXX raise error? */
					ai->ai_canonname = NULL;
				}
			}
			goto done;
		} else if ((flags & AI_NUMERICHOST) != 0) {
			return (EAI_NONAME);
		}
	}
	if (hostname == NULL && (flags & AI_PASSIVE) == 0) {
		set_order(family, net_order);
		for (i = 0; i < FOUND_MAX; i++) {
			if (net_order[i] == NULL) {
				break;
			}
			err = (net_order[i])(hostname, flags, &ai_list,
					     socktype, port);
			if (err != 0) {
				if (ai_list != NULL) {
					_freeaddrinfo(ai_list);
					ai_list = NULL;
				}
				break;
			}
		}
	} else {
		err = resolve_name(family, hostname, flags, &ai_list, socktype,
				   port);
	}
	if (ai_list == NULL) {
		if (err == 0) {
			err = EAI_NONAME;
		}
		return (err);
	}
done:
	ai_list = ai_reverse(ai_list);
	*res = ai_list;
	return (0);
}
typedef struct gai_restrans {
	dns_clientrestrans_t *xid;
	bool is_inprogress;
	int error;
	struct addrinfo ai_sentinel;
	struct gai_resstate *resstate;
} gai_restrans_t;
typedef struct gai_resstate {
	isc_mem_t *mctx;
	struct gai_statehead *head;
	dns_fixedname_t fixedname;
	dns_name_t *qname;
	gai_restrans_t *trans4;
	gai_restrans_t *trans6;
	ISC_LINK(struct gai_resstate) link;
} gai_resstate_t;
typedef struct gai_statehead {
	int ai_family;
	int ai_flags;
	int ai_socktype;
	int ai_port;
	isc_appctx_t *actx;
	dns_client_t *dnsclient;
	isc_mutex_t list_lock;
	ISC_LIST(struct gai_resstate) resstates;
	unsigned int activestates;
} gai_statehead_t;
static isc_result_t
make_resstate(isc_mem_t *mctx, gai_statehead_t *head, const char *hostname,
	      const char *domain, gai_resstate_t **statep) {
	isc_result_t result;
	gai_resstate_t *state;
	dns_fixedname_t fixeddomain;
	dns_name_t *qdomain;
	unsigned int namelen;
	isc_buffer_t b;
	bool need_v4 = false;
	bool need_v6 = false;
	state = isc_mem_get(mctx, sizeof(*state));
	/* Construct base domain name */
	namelen = strlen(domain);
	isc_buffer_constinit(&b, domain, namelen);
	isc_buffer_add(&b, namelen);
	qdomain = dns_fixedname_initname(&fixeddomain);
	result = dns_name_fromtext(qdomain, &b, dns_rootname, 0, NULL);
	if (result != ISC_R_SUCCESS) {
		isc_mem_put(mctx, state, sizeof(*state));
		return (result);
	}
	/* Construct query name */
	namelen = strlen(hostname);
	isc_buffer_constinit(&b, hostname, namelen);
	isc_buffer_add(&b, namelen);
	state->qname = dns_fixedname_initname(&state->fixedname);
	result = dns_name_fromtext(state->qname, &b, qdomain, 0, NULL);
	if (result != ISC_R_SUCCESS) {
		isc_mem_put(mctx, state, sizeof(*state));
		return (result);
	}
	if (head->ai_family == AF_UNSPEC || head->ai_family == AF_INET) {
		need_v4 = true;
	}
	if (head->ai_family == AF_UNSPEC || head->ai_family == AF_INET6) {
		need_v6 = true;
	}
	state->trans6 = NULL;
	state->trans4 = NULL;
	if (need_v4) {
		state->trans4 = isc_mem_get(mctx, sizeof(gai_restrans_t));
		state->trans4->error = 0;
		state->trans4->xid = NULL;
		state->trans4->resstate = state;
		state->trans4->is_inprogress = true;
		state->trans4->ai_sentinel.ai_next = NULL;
	}
	if (need_v6) {
		state->trans6 = isc_mem_get(mctx, sizeof(gai_restrans_t));
		state->trans6->error = 0;
		state->trans6->xid = NULL;
		state->trans6->resstate = state;
		state->trans6->is_inprogress = true;
		state->trans6->ai_sentinel.ai_next = NULL;
	}
	state->mctx = mctx;
	state->head = head;
	ISC_LINK_INIT(state, link);
	*statep = state;
	return (ISC_R_SUCCESS);
}
static isc_result_t
make_resstates(isc_mem_t *mctx, const char *hostname, gai_statehead_t *head,
	       irs_resconf_t *resconf) {
	isc_result_t result;
	irs_resconf_searchlist_t *searchlist;
	irs_resconf_search_t *searchent;
	gai_resstate_t *resstate, *resstate0;
	resstate0 = NULL;
	result = make_resstate(mctx, head, hostname, ".", &resstate0);
	if (result != ISC_R_SUCCESS) {
		return (result);
	}
	searchlist = irs_resconf_getsearchlist(resconf);
	for (searchent = ISC_LIST_HEAD(*searchlist); searchent != NULL;
	     searchent = ISC_LIST_NEXT(searchent, link))
	{
		resstate = NULL;
		result = make_resstate(mctx, head, hostname,
				       (const char *)searchent->domain,
				       &resstate);
		if (result != ISC_R_SUCCESS) {
			break;
		}
		ISC_LIST_APPEND(head->resstates, resstate, link);
		head->activestates++;
	}
	/*
	 * Insert the original hostname either at the head or the tail of the
	 * state list, depending on the number of labels contained in the
	 * original name and the 'ndots' configuration parameter.
	 */
	if (dns_name_countlabels(resstate0->qname) >
	    irs_resconf_getndots(resconf) + 1)
	{
		ISC_LIST_PREPEND(head->resstates, resstate0, link);
	} else {
		ISC_LIST_APPEND(head->resstates, resstate0, link);
	}
	head->activestates++;
	if (result != ISC_R_SUCCESS) {
		while ((resstate = ISC_LIST_HEAD(head->resstates)) != NULL) {
			ISC_LIST_UNLINK(head->resstates, resstate, link);
			if (resstate->trans4 != NULL) {
				isc_mem_put(mctx, resstate->trans4,
					    sizeof(*resstate->trans4));
			}
			if (resstate->trans6 != NULL) {
				isc_mem_put(mctx, resstate->trans6,
					    sizeof(*resstate->trans6));
			}
			isc_mem_put(mctx, resstate, sizeof(*resstate));
		}
	}
	return (result);
}
static void
process_answer(isc_task_t *task, isc_event_t *event) {
	int error = 0, family;
	gai_restrans_t *trans = event->ev_arg;
	gai_resstate_t *resstate;
	dns_clientresevent_t *rev = (dns_clientresevent_t *)event;
	dns_rdatatype_t qtype;
	dns_name_t *name;
	bool wantcname;
	REQUIRE(trans != NULL);
	resstate = trans->resstate;
	REQUIRE(resstate != NULL);
	REQUIRE(task != NULL);
	if (trans == resstate->trans4) {
		family = AF_INET;
		qtype = dns_rdatatype_a;
	} else {
		INSIST(trans == resstate->trans6);
		family = AF_INET6;
		qtype = dns_rdatatype_aaaa;
	}
	INSIST(trans->is_inprogress);
	trans->is_inprogress = false;
	switch (rev->result) {
	case ISC_R_SUCCESS:
	case DNS_R_NCACHENXDOMAIN: /* treat this as a fatal error? */
	case DNS_R_NCACHENXRRSET:
		break;
	default:
		switch (rev->vresult) {
		case DNS_R_SIGINVALID:
		case DNS_R_SIGEXPIRED:
		case DNS_R_SIGFUTURE:
		case DNS_R_KEYUNAUTHORIZED:
		case DNS_R_MUSTBESECURE:
		case DNS_R_COVERINGNSEC:
		case DNS_R_NOTAUTHORITATIVE:
		case DNS_R_NOVALIDKEY:
		case DNS_R_NOVALIDDS:
		case DNS_R_NOVALIDSIG:
			error = EAI_INSECUREDATA;
			break;
		default:
			error = EAI_FAIL;
		}
		goto done;
	}
	wantcname = ((resstate->head->ai_flags & AI_CANONNAME) != 0);
	/* Parse the response and construct the addrinfo chain */
	for (name = ISC_LIST_HEAD(rev->answerlist); name != NULL;
	     name = ISC_LIST_NEXT(name, link))
	{
		isc_result_t result;
		dns_rdataset_t *rdataset;
		char cname[1024];
		if (wantcname) {
			isc_buffer_t b;
			isc_buffer_init(&b, cname, sizeof(cname));
			result = dns_name_totext(name, true, &b);
			if (result != ISC_R_SUCCESS) {
				error = EAI_FAIL;
				goto done;
			}
			isc_buffer_putuint8(&b, '\0');
		}
		for (rdataset = ISC_LIST_HEAD(name->list); rdataset != NULL;
		     rdataset = ISC_LIST_NEXT(rdataset, link))
		{
			if (!dns_rdataset_isassociated(rdataset)) {
				continue;
			}
			if (rdataset->type != qtype) {
				continue;
			}
			for (result = dns_rdataset_first(rdataset);
			     result == ISC_R_SUCCESS;
			     result = dns_rdataset_next(rdataset))
			{
				struct addrinfo *ai;
				dns_rdata_t rdata;
				dns_rdata_in_a_t rdata_a;
				dns_rdata_in_aaaa_t rdata_aaaa;
				ai = ai_alloc(
					family,
					((family == AF_INET6)
						 ? sizeof(struct sockaddr_in6)
						 : sizeof(struct sockaddr_in)));
				if (ai == NULL) {
					error = EAI_MEMORY;
					goto done;
				}
				ai->ai_socktype = resstate->head->ai_socktype;
				ai->ai_next = trans->ai_sentinel.ai_next;
				trans->ai_sentinel.ai_next = ai;
				/*
				 * Set AF-specific parameters
				 * (IPv4/v6 address/port)
				 */
				dns_rdata_init(&rdata);
				switch (family) {
				case AF_INET:
					dns_rdataset_current(rdataset, &rdata);
					result = dns_rdata_tostruct(
						&rdata, &rdata_a, NULL);
					RUNTIME_CHECK(result == ISC_R_SUCCESS);
					SIN(ai->ai_addr)->sin_port =
						resstate->head->ai_port;
					memmove(&SIN(ai->ai_addr)->sin_addr,
						&rdata_a.in_addr, 4);
					dns_rdata_freestruct(&rdata_a);
					break;
				case AF_INET6:
					dns_rdataset_current(rdataset, &rdata);
					result = dns_rdata_tostruct(
						&rdata, &rdata_aaaa, NULL);
					RUNTIME_CHECK(result == ISC_R_SUCCESS);
					SIN6(ai->ai_addr)->sin6_port =
						resstate->head->ai_port;
					memmove(&SIN6(ai->ai_addr)->sin6_addr,
						&rdata_aaaa.in6_addr, 16);
					dns_rdata_freestruct(&rdata_aaaa);
					break;
				}
				if (wantcname) {
					ai->ai_canonname = strdup(cname);
					if (ai->ai_canonname == NULL) {
						error = EAI_MEMORY;
						goto done;
					}
				}
			}
		}
	}
done:
	dns_client_freeresanswer(resstate->head->dnsclient, &rev->answerlist);
	dns_client_destroyrestrans(&trans->xid);
	isc_event_free(&event);
	/* Make sure that error == 0 iff we have a non-empty list */
	if (error == 0) {
		if (trans->ai_sentinel.ai_next == NULL) {
			error = EAI_NONAME;
		}
	} else {
		if (trans->ai_sentinel.ai_next != NULL) {
			_freeaddrinfo(trans->ai_sentinel.ai_next);
			trans->ai_sentinel.ai_next = NULL;
		}
	}
	trans->error = error;
	/* Check whether we are done */
	if ((resstate->trans4 == NULL || !resstate->trans4->is_inprogress) &&
	    (resstate->trans6 == NULL || !resstate->trans6->is_inprogress))
	{
		/*
		 * We're done for this state.  If there is no other outstanding
		 * state, we can exit.
		 */
		resstate->head->activestates--;
		if (resstate->head->activestates == 0) {
			isc_app_ctxsuspend(resstate->head->actx);
			return;
		}
		/*
		 * There are outstanding states, but if we are at the head
		 * of the state list (i.e., at the highest search priority)
		 * and have any answer, we can stop now by canceling the
		 * others.
		 */
		LOCK(&resstate->head->list_lock);
		if (resstate == ISC_LIST_HEAD(resstate->head->resstates)) {
			if ((resstate->trans4 != NULL &&
			     resstate->trans4->ai_sentinel.ai_next != NULL) ||
			    (resstate->trans6 != NULL &&
			     resstate->trans6->ai_sentinel.ai_next != NULL))
			{
				gai_resstate_t *rest;
				for (rest = ISC_LIST_NEXT(resstate, link);
				     rest != NULL;
				     rest = ISC_LIST_NEXT(rest, link))
				{
					if (rest->trans4 != NULL &&
					    rest->trans4->xid != NULL)
					{
						dns_client_cancelresolve(
							rest->trans4->xid);
					}
					if (rest->trans6 != NULL &&
					    rest->trans6->xid != NULL)
					{
						dns_client_cancelresolve(
							rest->trans6->xid);
					}
				}
			} else {
				/*
				 * This search fails, so we move to the tail
				 * of the list so that the next entry will
				 * have the highest priority.
				 */
				ISC_LIST_UNLINK(resstate->head->resstates,
						resstate, link);
				ISC_LIST_APPEND(resstate->head->resstates,
						resstate, link);
			}
		}
		UNLOCK(&resstate->head->list_lock);
	}
}
static int
resolve_name(int family, const char *hostname, int flags, struct addrinfo **aip,
	     int socktype, int port) {
	isc_result_t result;
	irs_context_t *irsctx;
	irs_resconf_t *conf;
	isc_mem_t *mctx;
	isc_appctx_t *actx;
	isc_task_t *task;
	int terror = 0;
	int error = 0;
	dns_client_t *client;
	gai_resstate_t *resstate;
	gai_statehead_t head;
	bool all_fail = true;
	/* get IRS context and the associated parameters */
	irsctx = NULL;
	result = irs_context_get(&irsctx);
	if (result != ISC_R_SUCCESS) {
		return (EAI_FAIL);
	}
	actx = irs_context_getappctx(irsctx);
	mctx = irs_context_getmctx(irsctx);
	task = irs_context_gettask(irsctx);
	conf = irs_context_getresconf(irsctx);
	client = irs_context_getdnsclient(irsctx);
	/* construct resolution states */
	head.activestates = 0;
	head.ai_family = family;
	head.ai_socktype = socktype;
	head.ai_flags = flags;
	head.ai_port = port;
	head.actx = actx;
	head.dnsclient = client;
	isc_mutex_init(&head.list_lock);
	ISC_LIST_INIT(head.resstates);
	result = make_resstates(mctx, hostname, &head, conf);
	if (result != ISC_R_SUCCESS) {
		isc_mutex_destroy(&head.list_lock);
		return (EAI_FAIL);
	}
	LOCK(&head.list_lock);
	for (resstate = ISC_LIST_HEAD(head.resstates); resstate != NULL;
	     resstate = ISC_LIST_NEXT(resstate, link))
	{
		if (resstate->trans4 != NULL) {
			result = dns_client_startresolve(
				client, resstate->qname, dns_rdataclass_in,
				dns_rdatatype_a, 0, task, process_answer,
				resstate->trans4, &resstate->trans4->xid);
			if (result == ISC_R_SUCCESS) {
				resstate->trans4->is_inprogress = true;
				all_fail = false;
			} else {
				resstate->trans4->is_inprogress = false;
			}
		}
		if (resstate->trans6 != NULL) {
			result = dns_client_startresolve(
				client, resstate->qname, dns_rdataclass_in,
				dns_rdatatype_aaaa, 0, task, process_answer,
				resstate->trans6, &resstate->trans6->xid);
			if (result == ISC_R_SUCCESS) {
				resstate->trans6->is_inprogress = true;
				all_fail = false;
			} else {
				resstate->trans6->is_inprogress = false;
			}
		}
	}
	UNLOCK(&head.list_lock);
	if (!all_fail) {
		/* Start all the events */
		isc_app_ctxrun(actx);
	} else {
		error = EAI_FAIL;
	}
	/* Cleanup */
	while ((resstate = ISC_LIST_HEAD(head.resstates)) != NULL) {
		int terror4 = 0, terror6 = 0;
		ISC_LIST_UNLINK(head.resstates, resstate, link);
		if (*aip == NULL) {
			struct addrinfo *sentinel4 = NULL;
			struct addrinfo *sentinel6 = NULL;
			if (resstate->trans4 != NULL) {
				sentinel4 =
					resstate->trans4->ai_sentinel.ai_next;
				resstate->trans4->ai_sentinel.ai_next = NULL;
			}
			if (resstate->trans6 != NULL) {
				sentinel6 =
					resstate->trans6->ai_sentinel.ai_next;
				resstate->trans6->ai_sentinel.ai_next = NULL;
			}
			*aip = ai_concat(sentinel4, sentinel6);
		}
		if (resstate->trans4 != NULL) {
			INSIST(resstate->trans4->xid == NULL);
			terror4 = resstate->trans4->error;
			isc_mem_put(mctx, resstate->trans4,
				    sizeof(*resstate->trans4));
		}
		if (resstate->trans6 != NULL) {
			INSIST(resstate->trans6->xid == NULL);
			terror6 = resstate->trans6->error;
			isc_mem_put(mctx, resstate->trans6,
				    sizeof(*resstate->trans6));
		}
		/*
		 * If the entire lookup fails, we need to choose an appropriate
		 * error code from individual codes.  We'll try to provide as
		 * specific a code as possible.  In general, we are going to
		 * find an error code other than EAI_NONAME (which is too
		 * generic and may actually not be problematic in some cases).
		 * EAI_NONAME will be set below if no better code is found.
		 */
		if (terror == 0 || terror == EAI_NONAME) {
			if (terror4 != 0 && terror4 != EAI_NONAME) {
				terror = terror4;
			} else if (terror6 != 0 && terror6 != EAI_NONAME) {
				terror = terror6;
			}
		}
		isc_mem_put(mctx, resstate, sizeof(*resstate));
	}
	if (*aip == NULL) {
		error = terror;
		if (error == 0) {
			error = EAI_NONAME;
		}
	}
#if 1 /*  XXX: enabled for finding leaks.  should be cleaned up later. */
	isc_app_ctxfinish(actx);
	irs_context_destroy(&irsctx);
#endif /* if 1 */
	isc_mutex_destroy(&head.list_lock);
	return (error);
}
static void
set_order(int family,
	  int (**net_order)(const char *, int, struct addrinfo **, int, int)) {
	char *order, *tok, *last;
	int found;
	if (family) {
		switch (family) {
		case AF_INET:
			*net_order++ = add_ipv4;
			break;
		case AF_INET6:
			*net_order++ = add_ipv6;
			break;
		}
	} else {
		order = getenv("NET_ORDER");
		found = 0;
		if (order != NULL) {
			last = NULL;
			for (tok = strtok_r(order, ":", &last); tok;
			     tok = strtok_r(NULL, ":", &last))
			{
				if (strcasecmp(tok, "inet6") == 0) {
					if ((found & FOUND_IPV6) == 0) {
						*net_order++ = add_ipv6;
					}
					found |= FOUND_IPV6;
				} else if (strcasecmp(tok, "inet") == 0 ||
					   strcasecmp(tok, "inet4") == 0)
				{
					if ((found & FOUND_IPV4) == 0) {
						*net_order++ = add_ipv4;
					}
					found |= FOUND_IPV4;
				}
			}
		}
		/*
		 * Add in anything that we didn't find.
		 */
		if ((found & FOUND_IPV4) == 0) {
			*net_order++ = add_ipv4;
		}
		if ((found & FOUND_IPV6) == 0) {
			*net_order++ = add_ipv6;
		}
	}
	*net_order = NULL;
	return;
}
static char v4_loop[4] = { 127, 0, 0, 1 };
static int
add_ipv4(const char *hostname, int flags, struct addrinfo **aip, int socktype,
	 int port) {
	struct addrinfo *ai;
	UNUSED(hostname);
	UNUSED(flags);
	ai = ai_clone(*aip, AF_INET); /* don't use ai_clone() */
	if (ai == NULL) {
		return (EAI_MEMORY);
	}
	*aip = ai;
	ai->ai_socktype = socktype;
	SIN(ai->ai_addr)->sin_port = port;
	memmove(&SIN(ai->ai_addr)->sin_addr, v4_loop, 4);
	return (0);
}
static char v6_loop[16] = { 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1 };
static int
add_ipv6(const char *hostname, int flags, struct addrinfo **aip, int socktype,
	 int port) {
	struct addrinfo *ai;
	UNUSED(hostname);
	UNUSED(flags);
	ai = ai_clone(*aip, AF_INET6); /* don't use ai_clone() */
	if (ai == NULL) {
		return (EAI_MEMORY);
	}
	*aip = ai;
	ai->ai_socktype = socktype;
	SIN6(ai->ai_addr)->sin6_port = port;
	memmove(&SIN6(ai->ai_addr)->sin6_addr, v6_loop, 16);
	return (0);
}
/*% Free address info. */
void
freeaddrinfo(struct addrinfo *ai) {
	_freeaddrinfo(ai);
}
static void
_freeaddrinfo(struct addrinfo *ai) {
	struct addrinfo *ai_next;
	while (ai != NULL) {
		ai_next = ai->ai_next;
		if (ai->ai_addr != NULL) {
			free(ai->ai_addr);
		}
		if (ai->ai_canonname) {
			free(ai->ai_canonname);
		}
		free(ai);
		ai = ai_next;
	}
}
#ifdef AF_LOCAL
static int
get_local(const char *name, int socktype, struct addrinfo **res) {
	struct addrinfo *ai;
	struct sockaddr_un *slocal;
	if (socktype == 0) {
		return (EAI_SOCKTYPE);
	}
	ai = ai_alloc(AF_LOCAL, sizeof(*slocal));
	if (ai == NULL) {
		return (EAI_MEMORY);
	}
	slocal = SLOCAL(ai->ai_addr);
	strlcpy(slocal->sun_path, name, sizeof(slocal->sun_path));
	ai->ai_socktype = socktype;
	/*
	 * ai->ai_flags, ai->ai_protocol, ai->ai_canonname,
	 * and ai->ai_next were initialized to zero.
	 */
	*res = ai;
	return (0);
}
#endif /* ifdef AF_LOCAL */
/*!
 * Allocate an addrinfo structure, and a sockaddr structure
 * of the specified length.  We initialize:
 *	ai_addrlen
 *	ai_family
 *	ai_addr
 *	ai_addr->sa_family
 *	ai_addr->sa_len	(IRS_PLATFORM_HAVESALEN)
 * and everything else is initialized to zero.
 */
static struct addrinfo *
ai_alloc(int family, int addrlen) {
	struct addrinfo *ai;
	ai = (struct addrinfo *)calloc(1, sizeof(*ai));
	if (ai == NULL) {
		return (NULL);
	}
	ai->ai_addr = SA(calloc(1, addrlen));
	if (ai->ai_addr == NULL) {
		free(ai);
		return (NULL);
	}
	ai->ai_addrlen = addrlen;
	ai->ai_family = family;
	ai->ai_addr->sa_family = family;
#ifdef IRS_PLATFORM_HAVESALEN
	ai->ai_addr->sa_len = addrlen;
#endif /* ifdef IRS_PLATFORM_HAVESALEN */
	return (ai);
}
static struct addrinfo *
ai_clone(struct addrinfo *oai, int family) {
	struct addrinfo *ai;
	ai = ai_alloc(family,
		      ((family == AF_INET6) ? sizeof(struct sockaddr_in6)
					    : sizeof(struct sockaddr_in)));
	if (ai == NULL) {
		return (NULL);
	}
	if (oai == NULL) {
		return (ai);
	}
	ai->ai_flags = oai->ai_flags;
	ai->ai_socktype = oai->ai_socktype;
	ai->ai_protocol = oai->ai_protocol;
	ai->ai_canonname = NULL;
	ai->ai_next = oai;
	return (ai);
}
static struct addrinfo *
ai_reverse(struct addrinfo *oai) {
	struct addrinfo *nai, *tai;
	nai = NULL;
	while (oai != NULL) {
		/*
		 * Grab one off the old list.
		 */
		tai = oai;
		oai = oai->ai_next;
		/*
		 * Put it on the front of the new list.
		 */
		tai->ai_next = nai;
		nai = tai;
	}
	return (nai);
}
static struct addrinfo *
ai_concat(struct addrinfo *ai1, struct addrinfo *ai2) {
	struct addrinfo *ai_tmp;
	if (ai1 == NULL) {
		return (ai2);
	} else if (ai2 == NULL) {
		return (ai1);
	}
	for (ai_tmp = ai1; ai_tmp != NULL && ai_tmp->ai_next != NULL;
	     ai_tmp = ai_tmp->ai_next)
	{
	}
	ai_tmp->ai_next = ai2;
	return (ai1);
}