1 /* $KAME: rrenumd.c,v 1.20 2000/11/08 02:40:53 itojun Exp $ */ 2 3 /* 4 * Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project. 5 * All rights reserved. 6 * 7 * Redistribution and use in source and binary forms, with or without 8 * modification, are permitted provided that the following conditions 9 * are met: 10 * 1. Redistributions of source code must retain the above copyright 11 * notice, this list of conditions and the following disclaimer. 12 * 2. Redistributions in binary form must reproduce the above copyright 13 * notice, this list of conditions and the following disclaimer in the 14 * documentation and/or other materials provided with the distribution. 15 * 3. Neither the name of the project nor the names of its contributors 16 * may be used to endorse or promote products derived from this software 17 * without specific prior written permission. 18 * 19 * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND 20 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 21 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 22 * ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE 23 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 24 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 25 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 26 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 27 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 28 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 29 * SUCH DAMAGE. 30 * 31 * $FreeBSD$ 32 */ 33 34 #include <sys/param.h> 35 #include <sys/socket.h> 36 #include <sys/uio.h> 37 #include <sys/time.h> 38 39 #include <string.h> 40 41 #include <net/route.h> 42 43 #include <netinet/in_systm.h> 44 #include <netinet/in.h> 45 #include <netinet/ip.h> 46 #include <netinet/ip6.h> 47 #include <netinet/icmp6.h> 48 49 #include <arpa/inet.h> 50 51 #ifdef IPSEC 52 #include <netipsec/ipsec.h> 53 #endif 54 55 #include <stdio.h> 56 #include <err.h> 57 #include <errno.h> 58 #include <stdlib.h> 59 #include <unistd.h> 60 #include <syslog.h> 61 62 #include "rrenumd.h" 63 64 #define LL_ALLROUTERS "ff02::2" 65 #define SL_ALLROUTERS "ff05::2" 66 67 #define RR_MCHLIM_DEFAULT 64 68 69 #ifndef IN6_IS_SCOPE_LINKLOCAL 70 #define IN6_IS_SCOPE_LINKLOCAL(a) \ 71 ((IN6_IS_ADDR_LINKLOCAL(a)) || \ 72 (IN6_IS_ADDR_MC_LINKLOCAL(a))) 73 #endif /* IN6_IS_SCOPE_LINKLOCAL */ 74 75 struct flags { 76 u_long debug : 1; 77 u_long fg : 1; 78 #ifdef IPSEC 79 #ifdef IPSEC_POLICY_IPSEC 80 u_long policy : 1; 81 #else /* IPSEC_POLICY_IPSEC */ 82 u_long auth : 1; 83 u_long encrypt : 1; 84 #endif /* IPSEC_POLICY_IPSEC */ 85 #endif /*IPSEC*/ 86 }; 87 88 struct msghdr sndmhdr; 89 struct msghdr rcvmhdr; 90 struct sockaddr_in6 from; 91 struct sockaddr_in6 sin6_ll_allrouters; 92 93 int s4, s6; 94 int with_v4dest, with_v6dest; 95 struct in6_addr prefix; /* ADHOC */ 96 int prefixlen = 64; /* ADHOC */ 97 98 extern int parse(FILE **); 99 100 static void show_usage(void); 101 static void init_sin6(struct sockaddr_in6 *, const char *); 102 #if 0 103 static void join_multi(const char *); 104 #endif 105 static void init_globals(void); 106 static void config(FILE **); 107 #ifdef IPSEC_POLICY_IPSEC 108 static void sock6_open(struct flags *, char *); 109 static void sock4_open(struct flags *, char *); 110 #else 111 static void sock6_open(struct flags *); 112 static void sock4_open(struct flags *); 113 #endif 114 static void rrenum_output(struct payload_list *, struct dst_list *); 115 static void rrenum_snd_eachdst(struct payload_list *); 116 #if 0 117 static void rrenum_snd_fullsequence(void); 118 #endif 119 static void rrenum_input(int); 120 int main(int, char *[]); 121 122 123 /* Print usage. Don't call this after daemonized. */ 124 static void 125 show_usage() 126 { 127 fprintf(stderr, "usage: rrenumd [-c conf_file|-s] [-df" 128 #ifdef IPSEC 129 #ifdef IPSEC_POLICY_IPSEC 130 "] [-P policy" 131 #else /* IPSEC_POLICY_IPSEC */ 132 "AE" 133 #endif /* IPSEC_POLICY_IPSEC */ 134 #endif /* IPSEC */ 135 "]\n"); 136 exit(1); 137 } 138 139 static void 140 init_sin6(struct sockaddr_in6 *sin6, const char *addr_ascii) 141 { 142 memset(sin6, 0, sizeof(*sin6)); 143 sin6->sin6_len = sizeof(*sin6); 144 sin6->sin6_family = AF_INET6; 145 if (inet_pton(AF_INET6, addr_ascii, &sin6->sin6_addr) != 1) 146 ; /* XXX do something */ 147 } 148 149 #if 0 /* XXX: not necessary ?? */ 150 static void 151 join_multi(const char *addrname) 152 { 153 struct ipv6_mreq mreq; 154 155 if (inet_pton(AF_INET6, addrname, &mreq.ipv6mr_multiaddr.s6_addr) 156 != 1) { 157 syslog(LOG_ERR, "<%s> inet_pton failed(library bug?)", 158 __func__); 159 exit(1); 160 } 161 /* ADHOC: currently join only one */ 162 { 163 if ((mreq.ipv6mr_interface = if_nametoindex(ifname)) == 0) { 164 syslog(LOG_ERR, "<%s> ifname %s should be invalid: %s", 165 __func__, ifname, strerror(errno)); 166 exit(1); 167 } 168 if (setsockopt(s, IPPROTO_IPV6, IPV6_JOIN_GROUP, 169 &mreq, 170 sizeof(mreq)) < 0) { 171 syslog(LOG_ERR, "<%s> IPV6_JOIN_GROUP on %s: %s", 172 __func__, ifname, strerror(errno)); 173 exit(1); 174 } 175 } 176 } 177 #endif 178 179 static void 180 init_globals() 181 { 182 static struct iovec rcviov; 183 static u_char rprdata[4500]; /* maximal MTU of connected links */ 184 static u_char *rcvcmsgbuf = NULL; 185 static u_char *sndcmsgbuf = NULL; 186 int sndcmsglen, rcvcmsglen; 187 188 /* init ll_allrouters */ 189 init_sin6(&sin6_ll_allrouters, LL_ALLROUTERS); 190 191 /* initialize msghdr for receiving packets */ 192 rcviov.iov_base = (caddr_t)rprdata; 193 rcviov.iov_len = sizeof(rprdata); 194 rcvmhdr.msg_namelen = sizeof(struct sockaddr_in6); 195 rcvmhdr.msg_iov = &rcviov; 196 rcvmhdr.msg_iovlen = 1; 197 rcvcmsglen = CMSG_SPACE(sizeof(struct in6_pktinfo)) + 198 CMSG_SPACE(sizeof(int)); 199 if (rcvcmsgbuf == NULL && 200 (rcvcmsgbuf = (u_char *)malloc(rcvcmsglen)) == NULL) { 201 syslog(LOG_ERR, "<%s>: malloc failed", __func__); 202 exit(1); 203 } 204 rcvmhdr.msg_control = (caddr_t)rcvcmsgbuf; 205 rcvmhdr.msg_controllen = rcvcmsglen; 206 207 /* initialize msghdr for sending packets */ 208 sndmhdr.msg_namelen = sizeof(struct sockaddr_in6); 209 sndmhdr.msg_iovlen = 1; 210 sndcmsglen = CMSG_SPACE(sizeof(struct in6_pktinfo)) + 211 CMSG_SPACE(sizeof(int)); 212 if (sndcmsgbuf == NULL && 213 (sndcmsgbuf = (u_char *)malloc(sndcmsglen)) == NULL) { 214 syslog(LOG_ERR, "<%s>: malloc failed", __func__); 215 exit(1); 216 } 217 sndmhdr.msg_control = (caddr_t)sndcmsgbuf; 218 sndmhdr.msg_controllen = sndcmsglen; 219 } 220 221 static void 222 config(FILE **fpp) 223 { 224 struct payload_list *pl; 225 struct iovec *iov; 226 struct icmp6_router_renum *irr; 227 struct rr_pco_match *rpm; 228 229 if (parse(fpp) < 0) { 230 syslog(LOG_ERR, "<%s> parse failed", __func__); 231 exit(1); 232 } 233 234 /* initialize fields not configured by parser */ 235 for (pl = pl_head; pl; pl = pl->pl_next) { 236 iov = (struct iovec *)&pl->pl_sndiov; 237 irr = (struct icmp6_router_renum *)&pl->pl_irr; 238 rpm = (struct rr_pco_match *)&pl->pl_rpm; 239 240 irr->rr_type = ICMP6_ROUTER_RENUMBERING; 241 irr->rr_code = 0; 242 /* 243 * now we don't support multiple PCOs in a rr message. 244 * so segment number is not supported. 245 */ 246 /* TODO: rr flags config in parser */ 247 irr->rr_flags |= ICMP6_RR_FLAGS_SPECSITE; 248 /* TODO: max delay config in parser */ 249 250 /* 251 * means only 1 use_prefix is contained as router-renum-05.txt. 252 * now we don't support multiple PCOs in a rr message, 253 * nor multiple use_prefix in one PCO. 254 */ 255 rpm->rpm_len = 4*1 +3; 256 rpm->rpm_ordinal = 0; 257 iov->iov_base = (caddr_t)irr; 258 iov->iov_len = sizeof(struct icmp6_router_renum) 259 + sizeof(struct rr_pco_match) 260 + sizeof(struct rr_pco_use); 261 } 262 } 263 264 static void 265 sock6_open(struct flags *flags 266 #ifdef IPSEC_POLICY_IPSEC 267 , char *policy 268 #endif /* IPSEC_POLICY_IPSEC */ 269 ) 270 { 271 struct icmp6_filter filt; 272 int on; 273 #ifdef IPSEC 274 #ifndef IPSEC_POLICY_IPSEC 275 int optval; 276 #endif 277 #endif 278 279 if (with_v6dest == 0) 280 return; 281 if (with_v6dest && 282 (s6 = socket(AF_INET6, SOCK_RAW, IPPROTO_ICMPV6)) < 0) { 283 syslog(LOG_ERR, "<%s> socket(v6): %s", __func__, 284 strerror(errno)); 285 exit(1); 286 } 287 288 /* 289 * join all routers multicast addresses. 290 */ 291 #if 0 /* XXX: not necessary ?? */ 292 join_multi(LL_ALLROUTERS); 293 join_multi(SL_ALLROUTERS); 294 #endif 295 296 /* set icmpv6 filter */ 297 ICMP6_FILTER_SETBLOCKALL(&filt); 298 ICMP6_FILTER_SETPASS(ICMP6_ROUTER_RENUMBERING, &filt); 299 if (setsockopt(s6, IPPROTO_ICMPV6, ICMP6_FILTER, &filt, 300 sizeof(filt)) < 0) { 301 syslog(LOG_ERR, "<%s> IICMP6_FILTER: %s", 302 __func__, strerror(errno)); 303 exit(1); 304 } 305 306 /* specify to tell receiving interface */ 307 on = 1; 308 if (setsockopt(s6, IPPROTO_IPV6, IPV6_RECVPKTINFO, &on, 309 sizeof(on)) < 0) { 310 syslog(LOG_ERR, "<%s> IPV6_RECVPKTINFO: %s", 311 __func__, strerror(errno)); 312 exit(1); 313 } 314 315 #ifdef IPSEC 316 #ifdef IPSEC_POLICY_IPSEC 317 if (flags->policy) { 318 char *buf; 319 buf = ipsec_set_policy(policy, strlen(policy)); 320 if (buf == NULL) 321 errx(1, "%s", ipsec_strerror()); 322 /* XXX should handle in/out bound policy. */ 323 if (setsockopt(s6, IPPROTO_IPV6, IPV6_IPSEC_POLICY, 324 buf, ipsec_get_policylen(buf)) < 0) 325 err(1, "setsockopt(IPV6_IPSEC_POLICY)"); 326 free(buf); 327 } 328 #else /* IPSEC_POLICY_IPSEC */ 329 if (flags->auth) { 330 optval = IPSEC_LEVEL_REQUIRE; 331 if (setsockopt(s6, IPPROTO_IPV6, IPV6_AUTH_TRANS_LEVEL, 332 &optval, sizeof(optval)) == -1) { 333 syslog(LOG_ERR, "<%s> IPV6_AUTH_TRANS_LEVEL: %s", 334 __func__, strerror(errno)); 335 exit(1); 336 } 337 } 338 if (flags->encrypt) { 339 optval = IPSEC_LEVEL_REQUIRE; 340 if (setsockopt(s6, IPPROTO_IPV6, IPV6_ESP_TRANS_LEVEL, 341 &optval, sizeof(optval)) == -1) { 342 syslog(LOG_ERR, "<%s> IPV6_ESP_TRANS_LEVEL: %s", 343 __func__, strerror(errno)); 344 exit(1); 345 } 346 } 347 #endif /* IPSEC_POLICY_IPSEC */ 348 #endif /* IPSEC */ 349 350 return; 351 } 352 353 static void 354 sock4_open(struct flags *flags 355 #ifdef IPSEC_POLICY_IPSEC 356 , char *policy 357 #endif /* IPSEC_POLICY_IPSEC */ 358 ) 359 { 360 #ifdef IPSEC 361 #ifndef IPSEC_POLICY_IPSEC 362 int optval; 363 #endif 364 #endif 365 366 if (with_v4dest == 0) 367 return; 368 if ((s4 = socket(AF_INET, SOCK_RAW, IPPROTO_ICMPV6)) < 0) { 369 syslog(LOG_ERR, "<%s> socket(v4): %s", __func__, 370 strerror(errno)); 371 exit(1); 372 } 373 374 #if 0 /* XXX: not necessary ?? */ 375 /* 376 * join all routers multicast addresses. 377 */ 378 some_join_function(); 379 #endif 380 381 #ifdef IPSEC 382 #ifdef IPSEC_POLICY_IPSEC 383 if (flags->policy) { 384 char *buf; 385 buf = ipsec_set_policy(policy, strlen(policy)); 386 if (buf == NULL) 387 errx(1, "%s", ipsec_strerror()); 388 /* XXX should handle in/out bound policy. */ 389 if (setsockopt(s4, IPPROTO_IP, IP_IPSEC_POLICY, 390 buf, ipsec_get_policylen(buf)) < 0) 391 err(1, "setsockopt(IP_IPSEC_POLICY)"); 392 free(buf); 393 } 394 #else /* IPSEC_POLICY_IPSEC */ 395 if (flags->auth) { 396 optval = IPSEC_LEVEL_REQUIRE; 397 if (setsockopt(s4, IPPROTO_IP, IP_AUTH_TRANS_LEVEL, 398 &optval, sizeof(optval)) == -1) { 399 syslog(LOG_ERR, "<%s> IP_AUTH_TRANS_LEVEL: %s", 400 __func__, strerror(errno)); 401 exit(1); 402 } 403 } 404 if (flags->encrypt) { 405 optval = IPSEC_LEVEL_REQUIRE; 406 if (setsockopt(s4, IPPROTO_IP, IP_ESP_TRANS_LEVEL, 407 &optval, sizeof(optval)) == -1) { 408 syslog(LOG_ERR, "<%s> IP_ESP_TRANS_LEVEL: %s", 409 __func__, strerror(errno)); 410 exit(1); 411 } 412 } 413 #endif /* IPSEC_POLICY_IPSEC */ 414 #endif /* IPSEC */ 415 416 return; 417 } 418 419 static void 420 rrenum_output(struct payload_list *pl, struct dst_list *dl) 421 { 422 int i, msglen = 0; 423 struct cmsghdr *cm; 424 struct in6_pktinfo *pi; 425 struct sockaddr_in6 *sin6 = NULL; 426 427 sndmhdr.msg_name = (caddr_t)dl->dl_dst; 428 if (dl->dl_dst->sa_family == AF_INET6) 429 sin6 = (struct sockaddr_in6 *)dl->dl_dst; 430 431 if (sin6 != NULL && 432 IN6_IS_ADDR_MULTICAST(&sin6->sin6_addr)) { 433 int hoplimit = RR_MCHLIM_DEFAULT; 434 435 cm = CMSG_FIRSTHDR(&sndmhdr); 436 /* specify the outgoing interface */ 437 cm->cmsg_level = IPPROTO_IPV6; 438 cm->cmsg_type = IPV6_PKTINFO; 439 cm->cmsg_len = CMSG_LEN(sizeof(struct in6_pktinfo)); 440 pi = (struct in6_pktinfo *)CMSG_DATA(cm); 441 memset(&pi->ipi6_addr, 0, sizeof(pi->ipi6_addr)); /*XXX*/ 442 pi->ipi6_ifindex = sin6->sin6_scope_id; 443 msglen += CMSG_LEN(sizeof(struct in6_pktinfo)); 444 445 /* specify the hop limit of the packet if dest is link local */ 446 /* not defined by router-renum-05.txt, but maybe its OK */ 447 cm = CMSG_NXTHDR(&sndmhdr, cm); 448 cm->cmsg_level = IPPROTO_IPV6; 449 cm->cmsg_type = IPV6_HOPLIMIT; 450 cm->cmsg_len = CMSG_LEN(sizeof(int)); 451 memcpy(CMSG_DATA(cm), &hoplimit, sizeof(int)); 452 msglen += CMSG_LEN(sizeof(int)); 453 } 454 sndmhdr.msg_controllen = msglen; 455 if (sndmhdr.msg_controllen == 0) 456 sndmhdr.msg_control = 0; 457 458 sndmhdr.msg_iov = &pl->pl_sndiov; 459 i = sendmsg(dl->dl_dst->sa_family == AF_INET ? s4 : s6, &sndmhdr, 0); 460 461 if (i < 0 || i != sndmhdr.msg_iov->iov_len) 462 syslog(LOG_ERR, "<%s> sendmsg: %s", __func__, 463 strerror(errno)); 464 } 465 466 static void 467 rrenum_snd_eachdst(struct payload_list *pl) 468 { 469 struct dst_list *dl; 470 471 for (dl = dl_head; dl; dl = dl->dl_next) { 472 rrenum_output(pl, dl); 473 } 474 } 475 476 #if 0 477 static void 478 rrenum_snd_fullsequence() 479 { 480 struct payload_list *pl; 481 482 for (pl = pl_head; pl; pl = pl->pl_next) { 483 rrenum_snd_eachdst(pl); 484 } 485 } 486 #endif 487 488 static void 489 rrenum_input(int s) 490 { 491 int i; 492 struct icmp6_router_renum *rr; 493 494 /* get message */ 495 if ((i = recvmsg(s, &rcvmhdr, 0)) < 0) { 496 syslog(LOG_ERR, "<%s> recvmsg: %s", __func__, 497 strerror(errno)); 498 return; 499 } 500 if (s == s4) 501 i -= sizeof(struct ip); 502 if (i < sizeof(struct icmp6_router_renum)) { 503 syslog(LOG_ERR, "<%s> packet size(%d) is too short", 504 __func__, i); 505 return; 506 } 507 if (s == s4) { 508 struct ip *ip = (struct ip *)rcvmhdr.msg_iov->iov_base; 509 510 rr = (struct icmp6_router_renum *)(ip + 1); 511 } else /* s == s6 */ 512 rr = (struct icmp6_router_renum *)rcvmhdr.msg_iov->iov_base; 513 514 switch(rr->rr_code) { 515 case ICMP6_ROUTER_RENUMBERING_COMMAND: 516 /* COMMAND will be processed by rtadvd */ 517 break; 518 case ICMP6_ROUTER_RENUMBERING_RESULT: 519 /* TODO: receiving result message */ 520 break; 521 default: 522 syslog(LOG_ERR, "<%s> received unknown code %d", 523 __func__, rr->rr_code); 524 break; 525 } 526 } 527 528 int 529 main(int argc, char *argv[]) 530 { 531 FILE *fp = stdin; 532 fd_set fdset; 533 struct timeval timeout; 534 int ch, i, maxfd = 0, send_counter = 0; 535 struct flags flags; 536 struct payload_list *pl; 537 #ifdef IPSEC_POLICY_IPSEC 538 char *policy = NULL; 539 #endif 540 541 memset(&flags, 0, sizeof(flags)); 542 openlog("rrenumd", LOG_PID, LOG_DAEMON); 543 544 /* get options */ 545 while ((ch = getopt(argc, argv, "c:sdf" 546 #ifdef IPSEC 547 #ifdef IPSEC_POLICY_IPSEC 548 "P:" 549 #else /* IPSEC_POLICY_IPSEC */ 550 "AE" 551 #endif /* IPSEC_POLICY_IPSEC */ 552 #endif /* IPSEC */ 553 )) != -1){ 554 switch (ch) { 555 case 'c': 556 if((fp = fopen(optarg, "r")) == NULL) { 557 syslog(LOG_ERR, 558 "<%s> config file %s open failed", 559 __func__, optarg); 560 exit(1); 561 } 562 break; 563 case 's': 564 fp = stdin; 565 break; 566 case 'd': 567 flags.debug = 1; 568 break; 569 case 'f': 570 flags.fg = 1; 571 break; 572 #ifdef IPSEC 573 #ifdef IPSEC_POLICY_IPSEC 574 case 'P': 575 flags.policy = 1; 576 policy = strdup(optarg); 577 break; 578 #else /* IPSEC_POLICY_IPSEC */ 579 case 'A': 580 flags.auth = 1; 581 break; 582 case 'E': 583 flags.encrypt = 1; 584 break; 585 #endif /* IPSEC_POLICY_IPSEC */ 586 #endif /*IPSEC*/ 587 default: 588 show_usage(); 589 } 590 } 591 argc -= optind; 592 argv += optind; 593 594 /* set log level */ 595 if (flags.debug == 0) 596 (void)setlogmask(LOG_UPTO(LOG_ERR)); 597 if (flags.debug == 1) 598 (void)setlogmask(LOG_UPTO(LOG_INFO)); 599 600 /* init global variables */ 601 init_globals(); 602 603 config(&fp); 604 605 sock6_open(&flags 606 #ifdef IPSEC_POLICY_IPSEC 607 , policy 608 #endif /* IPSEC_POLICY_IPSEC */ 609 ); 610 sock4_open(&flags 611 #ifdef IPSEC_POLICY_IPSEC 612 , policy 613 #endif /* IPSEC_POLICY_IPSEC */ 614 ); 615 616 if (!flags.fg) 617 daemon(0, 0); 618 619 FD_ZERO(&fdset); 620 if (with_v6dest) { 621 FD_SET(s6, &fdset); 622 if (s6 > maxfd) 623 maxfd = s6; 624 } 625 if (with_v4dest) { 626 FD_SET(s4, &fdset); 627 if (s4 > maxfd) 628 maxfd = s4; 629 } 630 631 /* ADHOC: timeout each 30seconds */ 632 memset(&timeout, 0, sizeof(timeout)); 633 634 /* init temporary payload_list and send_counter*/ 635 pl = pl_head; 636 send_counter = retry + 1; 637 while (1) { 638 struct fd_set select_fd = fdset; /* reinitialize */ 639 640 if ((i = select(maxfd + 1, &select_fd, NULL, NULL, 641 &timeout)) < 0){ 642 syslog(LOG_ERR, "<%s> select: %s", 643 __func__, strerror(errno)); 644 continue; 645 } 646 if (i == 0) { /* timeout */ 647 if (pl == NULL) 648 exit(0); 649 rrenum_snd_eachdst(pl); 650 send_counter--; 651 timeout.tv_sec = 30; 652 if (send_counter == 0) { 653 timeout.tv_sec = 0; 654 pl = pl->pl_next; 655 send_counter = retry + 1; 656 } 657 } 658 if (FD_ISSET(s4, &select_fd)) 659 rrenum_input(s4); 660 if (FD_ISSET(s6, &select_fd)) 661 rrenum_input(s6); 662 } 663 } 664