Use tevent_req_oom
[ira/wip.git] / source3 / libsmb / namequery.c
index 20ba3410d50dd421d0216d1f22c60bfd9b461b8d..dca740d3e6bb8d737c1d95ad2b82f411f33774c4 100644 (file)
 */
 
 #include "includes.h"
+#include "../lib/util/tevent_ntstatus.h"
 #include "libads/sitename_cache.h"
-#include "../libcli/netlogon.h"
+#include "libads/dns.h"
+#include "../libcli/netlogon/netlogon.h"
+#include "lib/async_req/async_sock.h"
+#include "libsmb/nmblib.h"
 
 /* nmbd.c sets this to True. */
 bool global_in_nmbd = False;
@@ -193,6 +197,26 @@ char *saf_fetch( const char *domain )
        return server;
 }
 
+static void set_socket_addr_v4(struct sockaddr_storage *addr)
+{
+       if (!interpret_string_addr(addr, lp_socket_address(),
+                                  AI_NUMERICHOST|AI_PASSIVE)) {
+               zero_sockaddr(addr);
+       }
+       if (addr->ss_family != AF_INET) {
+               zero_sockaddr(addr);
+       }
+}
+
+static struct in_addr my_socket_addr_v4(void)
+{
+       struct sockaddr_storage my_addr;
+       struct sockaddr_in *in_addr = (struct sockaddr_in *)((char *)&my_addr);
+
+       set_socket_addr_v4(&my_addr);
+       return in_addr->sin_addr;
+}
+
 /****************************************************************************
  Generate a random trn_id.
 ****************************************************************************/
@@ -210,11 +234,11 @@ static int generate_trn_id(void)
  Parse a node status response into an array of structures.
 ****************************************************************************/
 
-static NODE_STATUS_STRUCT *parse_node_status(char *p,
+static struct node_status *parse_node_status(TALLOC_CTX *mem_ctx, char *p,
                                int *num_names,
                                struct node_status_extra *extra)
 {
-       NODE_STATUS_STRUCT *ret;
+       struct node_status *ret;
        int i;
 
        *num_names = CVAL(p,0);
@@ -222,7 +246,7 @@ static NODE_STATUS_STRUCT *parse_node_status(char *p,
        if (*num_names == 0)
                return NULL;
 
-       ret = SMB_MALLOC_ARRAY(NODE_STATUS_STRUCT,*num_names);
+       ret = talloc_array(mem_ctx, struct node_status,*num_names);
        if (!ret)
                return NULL;
 
@@ -245,33 +269,465 @@ static NODE_STATUS_STRUCT *parse_node_status(char *p,
        return ret;
 }
 
+struct sock_packet_read_state {
+       struct tevent_context *ev;
+       enum packet_type type;
+       int trn_id;
+
+       struct nb_packet_reader *reader;
+       struct tevent_req *reader_req;
+
+       int sock;
+       struct tevent_req *socket_req;
+       uint8_t buf[1024];
+       struct sockaddr_storage addr;
+       socklen_t addr_len;
+
+       bool (*validator)(struct packet_struct *p,
+                         void *private_data);
+       void *private_data;
+
+       struct packet_struct *packet;
+};
+
+static int sock_packet_read_state_destructor(struct sock_packet_read_state *s);
+static void sock_packet_read_got_packet(struct tevent_req *subreq);
+static void sock_packet_read_got_socket(struct tevent_req *subreq);
+
+static struct tevent_req *sock_packet_read_send(
+       TALLOC_CTX *mem_ctx,
+       struct tevent_context *ev,
+       int sock, /* dgram socket */
+       struct nb_packet_reader *reader,
+       enum packet_type type,
+       int trn_id,
+       bool (*validator)(struct packet_struct *p, void *private_data),
+       void *private_data)
+{
+       struct tevent_req *req;
+       struct sock_packet_read_state *state;
+
+       req = tevent_req_create(mem_ctx, &state,
+                               struct sock_packet_read_state);
+       if (req == NULL) {
+               return NULL;
+       }
+       talloc_set_destructor(state, sock_packet_read_state_destructor);
+       state->ev = ev;
+       state->reader = reader;
+       state->sock = sock;
+       state->type = type;
+       state->trn_id = trn_id;
+       state->validator = validator;
+       state->private_data = private_data;
+
+       if (reader != NULL) {
+               state->reader_req = nb_packet_read_send(state, ev, reader);
+               if (tevent_req_nomem(state->reader_req, req)) {
+                       return tevent_req_post(req, ev);
+               }
+               tevent_req_set_callback(
+                       state->reader_req, sock_packet_read_got_packet, req);
+       }
+
+       state->addr_len = sizeof(state->addr);
+       state->socket_req = recvfrom_send(state, ev, sock,
+                                         state->buf, sizeof(state->buf), 0,
+                                         &state->addr, &state->addr_len);
+       if (tevent_req_nomem(state->socket_req, req)) {
+               return tevent_req_post(req, ev);
+       }
+       tevent_req_set_callback(state->socket_req, sock_packet_read_got_socket,
+                               req);
+
+       return req;
+}
+
+static int sock_packet_read_state_destructor(struct sock_packet_read_state *s)
+{
+       if (s->packet != NULL) {
+               free_packet(s->packet);
+               s->packet = NULL;
+       }
+       return 0;
+}
+
+static void sock_packet_read_got_packet(struct tevent_req *subreq)
+{
+       struct tevent_req *req = tevent_req_callback_data(
+               subreq, struct tevent_req);
+       struct sock_packet_read_state *state = tevent_req_data(
+               req, struct sock_packet_read_state);
+       NTSTATUS status;
+
+       status = nb_packet_read_recv(subreq, &state->packet);
+
+       TALLOC_FREE(state->reader_req);
+
+       if (!NT_STATUS_IS_OK(status)) {
+               if (state->socket_req != NULL) {
+                       /*
+                        * Still waiting for socket
+                        */
+                       return;
+               }
+               /*
+                * Both socket and packet reader failed
+                */
+               tevent_req_nterror(req, status);
+               return;
+       }
+
+       if ((state->validator != NULL) &&
+           !state->validator(state->packet, state->private_data)) {
+               DEBUG(10, ("validator failed\n"));
+
+               free_packet(state->packet);
+               state->packet = NULL;
+
+               state->reader_req = nb_packet_read_send(state, state->ev,
+                                                       state->reader);
+               if (tevent_req_nomem(state->reader_req, req)) {
+                       return;
+               }
+               tevent_req_set_callback(
+                       state->reader_req, sock_packet_read_got_packet, req);
+               return;
+       }
+
+       TALLOC_FREE(state->socket_req);
+       tevent_req_done(req);
+}
+
+static void sock_packet_read_got_socket(struct tevent_req *subreq)
+{
+       struct tevent_req *req = tevent_req_callback_data(
+               subreq, struct tevent_req);
+       struct sock_packet_read_state *state = tevent_req_data(
+               req, struct sock_packet_read_state);
+       struct sockaddr_in *in_addr;
+       ssize_t received;
+       int err;
+
+       received = recvfrom_recv(subreq, &err);
+
+       TALLOC_FREE(state->socket_req);
+
+       if (received == -1) {
+               if (state->reader_req != NULL) {
+                       /*
+                        * Still waiting for reader
+                        */
+                       return;
+               }
+               /*
+                * Both socket and reader failed
+                */
+               tevent_req_nterror(req, map_nt_error_from_unix(err));
+               return;
+       }
+       if (state->addr.ss_family != AF_INET) {
+               goto retry;
+       }
+       in_addr = (struct sockaddr_in *)(void *)&state->addr;
+
+       state->packet = parse_packet((char *)state->buf, received, state->type,
+                                    in_addr->sin_addr, in_addr->sin_port);
+       if (state->packet == NULL) {
+               DEBUG(10, ("parse_packet failed\n"));
+               goto retry;
+       }
+       if ((state->trn_id != -1) &&
+           (state->trn_id != packet_trn_id(state->packet))) {
+               DEBUG(10, ("Expected transaction id %d, got %d\n",
+                          state->trn_id, packet_trn_id(state->packet)));
+               goto retry;
+       }
+
+       if ((state->validator != NULL) &&
+           !state->validator(state->packet, state->private_data)) {
+               DEBUG(10, ("validator failed\n"));
+               goto retry;
+       }
+
+       tevent_req_done(req);
+       return;
+
+retry:
+       if (state->packet != NULL) {
+               free_packet(state->packet);
+               state->packet = NULL;
+       }
+       state->socket_req = recvfrom_send(state, state->ev, state->sock,
+                                         state->buf, sizeof(state->buf), 0,
+                                         &state->addr, &state->addr_len);
+       if (tevent_req_nomem(state->socket_req, req)) {
+               return;
+       }
+       tevent_req_set_callback(state->socket_req, sock_packet_read_got_socket,
+                               req);
+}
+
+static NTSTATUS sock_packet_read_recv(struct tevent_req *req,
+                                     struct packet_struct **ppacket)
+{
+       struct sock_packet_read_state *state = tevent_req_data(
+               req, struct sock_packet_read_state);
+       NTSTATUS status;
+
+       if (tevent_req_is_nterror(req, &status)) {
+               return status;
+       }
+       *ppacket = state->packet;
+       state->packet = NULL;
+       return NT_STATUS_OK;
+}
+
+struct nb_trans_state {
+       struct tevent_context *ev;
+       int sock;
+       struct nb_packet_reader *reader;
+
+       const struct sockaddr_storage *dst_addr;
+       uint8_t *buf;
+       size_t buflen;
+       enum packet_type type;
+       int trn_id;
+
+       bool (*validator)(struct packet_struct *p,
+                         void *private_data);
+       void *private_data;
+
+       struct packet_struct *packet;
+};
+
+static int nb_trans_state_destructor(struct nb_trans_state *s);
+static void nb_trans_got_reader(struct tevent_req *subreq);
+static void nb_trans_done(struct tevent_req *subreq);
+static void nb_trans_sent(struct tevent_req *subreq);
+static void nb_trans_send_next(struct tevent_req *subreq);
+
+static struct tevent_req *nb_trans_send(
+       TALLOC_CTX *mem_ctx,
+       struct tevent_context *ev,
+       const struct sockaddr_storage *my_addr,
+       const struct sockaddr_storage *dst_addr,
+       bool bcast,
+       uint8_t *buf, size_t buflen,
+       enum packet_type type, int trn_id,
+       bool (*validator)(struct packet_struct *p,
+                         void *private_data),
+       void *private_data)
+{
+       struct tevent_req *req, *subreq;
+       struct nb_trans_state *state;
+
+       req = tevent_req_create(mem_ctx, &state, struct nb_trans_state);
+       if (req == NULL) {
+               return NULL;
+       }
+       talloc_set_destructor(state, nb_trans_state_destructor);
+       state->ev = ev;
+       state->dst_addr = dst_addr;
+       state->buf = buf;
+       state->buflen = buflen;
+       state->type = type;
+       state->trn_id = trn_id;
+       state->validator = validator;
+       state->private_data = private_data;
+
+       state->sock = open_socket_in(SOCK_DGRAM, 0, 3, my_addr, True);
+       if (state->sock == -1) {
+               tevent_req_nterror(req, map_nt_error_from_unix(errno));
+               DEBUG(10, ("open_socket_in failed: %s\n", strerror(errno)));
+               return tevent_req_post(req, ev);
+       }
+
+       if (bcast) {
+               set_socket_options(state->sock,"SO_BROADCAST");
+       }
+
+       subreq = nb_packet_reader_send(state, ev, type, state->trn_id, NULL);
+       if (tevent_req_nomem(subreq, req)) {
+               return tevent_req_post(req, ev);
+       }
+       tevent_req_set_callback(subreq, nb_trans_got_reader, req);
+       return req;
+}
+
+static int nb_trans_state_destructor(struct nb_trans_state *s)
+{
+       if (s->sock != -1) {
+               close(s->sock);
+               s->sock = -1;
+       }
+       if (s->packet != NULL) {
+               free_packet(s->packet);
+               s->packet = NULL;
+       }
+       return 0;
+}
+
+static void nb_trans_got_reader(struct tevent_req *subreq)
+{
+       struct tevent_req *req = tevent_req_callback_data(
+               subreq, struct tevent_req);
+       struct nb_trans_state *state = tevent_req_data(
+               req, struct nb_trans_state);
+       NTSTATUS status;
+
+       status = nb_packet_reader_recv(subreq, state, &state->reader);
+       TALLOC_FREE(subreq);
+
+       if (!NT_STATUS_IS_OK(status)) {
+               DEBUG(10, ("nmbd not around\n"));
+               state->reader = NULL;
+       }
+
+       subreq = sock_packet_read_send(
+               state, state->ev, state->sock,
+               state->reader, state->type, state->trn_id,
+               state->validator, state->private_data);
+       if (tevent_req_nomem(subreq, req)) {
+               return;
+       }
+       tevent_req_set_callback(subreq, nb_trans_done, req);
+
+       subreq = sendto_send(state, state->ev, state->sock,
+                            state->buf, state->buflen, 0, state->dst_addr);
+       if (tevent_req_nomem(subreq, req)) {
+               return;
+       }
+       tevent_req_set_callback(subreq, nb_trans_sent, req);
+}
+
+static void nb_trans_sent(struct tevent_req *subreq)
+{
+       struct tevent_req *req = tevent_req_callback_data(
+               subreq, struct tevent_req);
+       struct nb_trans_state *state = tevent_req_data(
+               req, struct nb_trans_state);
+       ssize_t sent;
+       int err;
+
+       sent = sendto_recv(subreq, &err);
+       TALLOC_FREE(subreq);
+       if (sent == -1) {
+               DEBUG(10, ("sendto failed: %s\n", strerror(err)));
+               tevent_req_nterror(req, map_nt_error_from_unix(err));
+               return;
+       }
+       subreq = tevent_wakeup_send(state, state->ev,
+                                   timeval_current_ofs(1, 0));
+       if (tevent_req_nomem(subreq, req)) {
+               return;
+       }
+       tevent_req_set_callback(subreq, nb_trans_send_next, req);
+}
+
+static void nb_trans_send_next(struct tevent_req *subreq)
+{
+       struct tevent_req *req = tevent_req_callback_data(
+               subreq, struct tevent_req);
+       struct nb_trans_state *state = tevent_req_data(
+               req, struct nb_trans_state);
+       bool ret;
+
+       ret = tevent_wakeup_recv(subreq);
+       TALLOC_FREE(subreq);
+       if (!ret) {
+               tevent_req_nterror(req, NT_STATUS_INTERNAL_ERROR);
+               return;
+       }
+       subreq = sendto_send(state, state->ev, state->sock,
+                            state->buf, state->buflen, 0, state->dst_addr);
+       if (tevent_req_nomem(subreq, req)) {
+               return;
+       }
+       tevent_req_set_callback(subreq, nb_trans_sent, req);
+}
+
+static void nb_trans_done(struct tevent_req *subreq)
+{
+       struct tevent_req *req = tevent_req_callback_data(
+               subreq, struct tevent_req);
+       struct nb_trans_state *state = tevent_req_data(
+               req, struct nb_trans_state);
+       NTSTATUS status;
+
+       status = sock_packet_read_recv(subreq, &state->packet);
+       TALLOC_FREE(subreq);
+       if (tevent_req_nterror(req, status)) {
+               return;
+       }
+       tevent_req_done(req);
+}
+
+static NTSTATUS nb_trans_recv(struct tevent_req *req,
+                             struct packet_struct **ppacket)
+{
+       struct nb_trans_state *state = tevent_req_data(
+               req, struct nb_trans_state);
+       NTSTATUS status;
+
+       if (tevent_req_is_nterror(req, &status)) {
+               return status;
+       }
+       *ppacket = state->packet;
+       state->packet = NULL;
+       return NT_STATUS_OK;
+}
 
 /****************************************************************************
  Do a NBT node status query on an open socket and return an array of
  structures holding the returned names or NULL if the query failed.
 **************************************************************************/
 
-NODE_STATUS_STRUCT *node_status_query(int fd,
-                                       struct nmb_name *name,
-                                       const struct sockaddr_storage *to_ss,
-                                       int *num_names,
-                                       struct node_status_extra *extra)
+struct node_status_query_state {
+       struct sockaddr_storage my_addr;
+       struct sockaddr_storage addr;
+       uint8_t buf[1024];
+       ssize_t buflen;
+       struct packet_struct *packet;
+};
+
+static int node_status_query_state_destructor(
+       struct node_status_query_state *s);
+static bool node_status_query_validator(struct packet_struct *p,
+                                       void *private_data);
+static void node_status_query_done(struct tevent_req *subreq);
+
+struct tevent_req *node_status_query_send(TALLOC_CTX *mem_ctx,
+                                         struct tevent_context *ev,
+                                         struct nmb_name *name,
+                                         const struct sockaddr_storage *addr)
 {
-       bool found=False;
-       int retries = 2;
-       int retry_time = 2000;
-       struct timeval tval;
+       struct tevent_req *req, *subreq;
+       struct node_status_query_state *state;
        struct packet_struct p;
-       struct packet_struct *p2;
        struct nmb_packet *nmb = &p.packet.nmb;
-       NODE_STATUS_STRUCT *ret;
+       struct sockaddr_in *in_addr;
 
-       ZERO_STRUCT(p);
+       req = tevent_req_create(mem_ctx, &state,
+                               struct node_status_query_state);
+       if (req == NULL) {
+               return NULL;
+       }
+       talloc_set_destructor(state, node_status_query_state_destructor);
 
-       if (to_ss->ss_family != AF_INET) {
+       if (addr->ss_family != AF_INET) {
                /* Can't do node status to IPv6 */
-               return NULL;
+               tevent_req_nterror(req, NT_STATUS_INVALID_ADDRESS);
+               return tevent_req_post(req, ev);
        }
+
+       state->addr = *addr;
+       in_addr = (struct sockaddr_in *)(void *)&state->addr;
+       in_addr->sin_port = htons(NMB_PORT);
+
+       set_socket_addr_v4(&state->my_addr);
+
+       ZERO_STRUCT(p);
        nmb->header.name_trn_id = generate_trn_id();
        nmb->header.opcode = 0;
        nmb->header.response = false;
@@ -289,56 +745,127 @@ NODE_STATUS_STRUCT *node_status_query(int fd,
        nmb->question.question_type = 0x21;
        nmb->question.question_class = 0x1;
 
-       p.ip = ((const struct sockaddr_in *)to_ss)->sin_addr;
-       p.port = NMB_PORT;
-       p.recv_fd = -1;
-       p.send_fd = fd;
-       p.timestamp = time(NULL);
-       p.packet_type = NMB_PACKET;
+       state->buflen = build_packet((char *)state->buf, sizeof(state->buf),
+                                    &p);
+       if (state->buflen == 0) {
+               tevent_req_nterror(req, NT_STATUS_INTERNAL_ERROR);
+               DEBUG(10, ("build_packet failed\n"));
+               return tevent_req_post(req, ev);
+       }
 
-       GetTimeOfDay(&tval);
+       subreq = nb_trans_send(state, ev, &state->my_addr, &state->addr, false,
+                              state->buf, state->buflen,
+                              NMB_PACKET, nmb->header.name_trn_id,
+                              node_status_query_validator, NULL);
+       if (tevent_req_nomem(subreq, req)) {
+               DEBUG(10, ("nb_trans_send failed\n"));
+               return tevent_req_post(req, ev);
+       }
+       if (!tevent_req_set_endtime(req, ev, timeval_current_ofs(10, 0))) {
+               return tevent_req_post(req, ev);
+       }
+       tevent_req_set_callback(subreq, node_status_query_done, req);
+       return req;
+}
 
-       if (!send_packet(&p))
-               return NULL;
+static bool node_status_query_validator(struct packet_struct *p,
+                                       void *private_data)
+{
+       struct nmb_packet *nmb = &p->packet.nmb;
+       debug_nmb_packet(p);
+
+       if (nmb->header.opcode != 0 ||
+           nmb->header.nm_flags.bcast ||
+           nmb->header.rcode ||
+           !nmb->header.ancount ||
+           nmb->answers->rr_type != 0x21) {
+               /*
+                * XXXX what do we do with this? could be a redirect,
+                * but we'll discard it for the moment
+                */
+               return false;
+       }
+       return true;
+}
 
-       retries--;
+static int node_status_query_state_destructor(
+       struct node_status_query_state *s)
+{
+       if (s->packet != NULL) {
+               free_packet(s->packet);
+               s->packet = NULL;
+       }
+       return 0;
+}
 
-       while (1) {
-               struct timeval tval2;
-               GetTimeOfDay(&tval2);
-               if (TvalDiff(&tval,&tval2) > retry_time) {
-                       if (!retries)
-                               break;
-                       if (!found && !send_packet(&p))
-                               return NULL;
-                       GetTimeOfDay(&tval);
-                       retries--;
-               }
+static void node_status_query_done(struct tevent_req *subreq)
+{
+       struct tevent_req *req = tevent_req_callback_data(
+               subreq, struct tevent_req);
+       struct node_status_query_state *state = tevent_req_data(
+               req, struct node_status_query_state);
+       NTSTATUS status;
 
-               if ((p2=receive_nmb_packet(fd,90,nmb->header.name_trn_id))) {
-                       struct nmb_packet *nmb2 = &p2->packet.nmb;
-                       debug_nmb_packet(p2);
-
-                       if (nmb2->header.opcode != 0 ||
-                           nmb2->header.nm_flags.bcast ||
-                           nmb2->header.rcode ||
-                           !nmb2->header.ancount ||
-                           nmb2->answers->rr_type != 0x21) {
-                               /* XXXX what do we do with this? could be a
-                                  redirect, but we'll discard it for the
-                                  moment */
-                               free_packet(p2);
-                               continue;
-                       }
+       status = nb_trans_recv(subreq, &state->packet);
+       TALLOC_FREE(subreq);
+       if (tevent_req_nterror(req, status)) {
+               return;
+       }
+       tevent_req_done(req);
+}
 
-                       ret = parse_node_status(&nmb2->answers->rdata[0],
-                                       num_names, extra);
-                       free_packet(p2);
-                       return ret;
-               }
+NTSTATUS node_status_query_recv(struct tevent_req *req, TALLOC_CTX *mem_ctx,
+                               struct node_status **pnode_status,
+                               int *pnum_names,
+                               struct node_status_extra *extra)
+{
+       struct node_status_query_state *state = tevent_req_data(
+               req, struct node_status_query_state);
+       struct node_status *node_status;
+       int num_names;
+       NTSTATUS status;
+
+       if (tevent_req_is_nterror(req, &status)) {
+               return status;
        }
+       node_status = parse_node_status(
+               mem_ctx, &state->packet->packet.nmb.answers->rdata[0],
+               &num_names, extra);
+       if (node_status == NULL) {
+               return NT_STATUS_NO_MEMORY;
+       }
+       *pnode_status = node_status;
+       *pnum_names = num_names;
+       return NT_STATUS_OK;
+}
 
-       return NULL;
+NTSTATUS node_status_query(TALLOC_CTX *mem_ctx, struct nmb_name *name,
+                          const struct sockaddr_storage *addr,
+                          struct node_status **pnode_status,
+                          int *pnum_names,
+                          struct node_status_extra *extra)
+{
+       TALLOC_CTX *frame = talloc_stackframe();
+       struct tevent_context *ev;
+       struct tevent_req *req;
+       NTSTATUS status = NT_STATUS_NO_MEMORY;
+
+       ev = tevent_context_init(frame);
+       if (ev == NULL) {
+               goto fail;
+       }
+       req = node_status_query_send(ev, ev, name, addr);
+       if (req == NULL) {
+               goto fail;
+       }
+       if (!tevent_req_poll_ntstatus(req, ev, &status)) {
+               goto fail;
+       }
+       status = node_status_query_recv(req, mem_ctx, pnode_status,
+                                       pnum_names, extra);
+ fail:
+       TALLOC_FREE(frame);
+       return status;
 }
 
 /****************************************************************************
@@ -354,11 +881,11 @@ bool name_status_find(const char *q_name,
 {
        char addr[INET6_ADDRSTRLEN];
        struct sockaddr_storage ss;
-       NODE_STATUS_STRUCT *status = NULL;
+       struct node_status *addrs = NULL;
        struct nmb_name nname;
        int count, i;
-       int sock;
        bool result = false;
+       NTSTATUS status;
 
        if (lp_disable_netbios()) {
                DEBUG(5,("name_status_find(%s#%02x): netbios is disabled\n",
@@ -382,31 +909,25 @@ bool name_status_find(const char *q_name,
                return false;
        }
 
-       if (!interpret_string_addr(&ss, lp_socket_address(),
-                               AI_NUMERICHOST|AI_PASSIVE)) {
-               zero_sockaddr(&ss);
-       }
-
-       sock = open_socket_in(SOCK_DGRAM, 0, 3, &ss, True);
-       if (sock == -1)
-               goto done;
+       set_socket_addr_v4(&ss);
 
        /* W2K PDC's seem not to respond to '*'#0. JRA */
        make_nmb_name(&nname, q_name, q_type);
-       status = node_status_query(sock, &nname, to_ss, &count, NULL);
-       close(sock);
-       if (!status)
+       status = node_status_query(talloc_tos(), &nname, to_ss,
+                                  &addrs, &count, NULL);
+       if (!NT_STATUS_IS_OK(status)) {
                goto done;
+       }
 
        for (i=0;i<count;i++) {
                 /* Find first one of the requested type that's not a GROUP. */
-               if (status[i].type == type && ! (status[i].flags & 0x80))
+               if (addrs[i].type == type && ! (addrs[i].flags & 0x80))
                        break;
        }
        if (i == count)
                goto done;
 
-       pull_ascii_nstring(name, sizeof(fstring), status[i].name);
+       pull_ascii_nstring(name, sizeof(fstring), addrs[i].name);
 
        /* Store the result in the cache. */
        /* but don't store an entry for 0x1c names here.  Here we have
@@ -419,7 +940,7 @@ bool name_status_find(const char *q_name,
        result = true;
 
  done:
-       SAFE_FREE(status);
+       TALLOC_FREE(addrs);
 
        DEBUG(10, ("name_status_find: name %sfound", result ? "" : "not "));
 
@@ -456,9 +977,9 @@ static int addr_compare(const struct sockaddr_storage *ss1,
 
        for (i=0;i<num_interfaces;i++) {
                const struct sockaddr_storage *pss = iface_n_bcast(i);
-               unsigned char *p_ss1 = NULL;
-               unsigned char *p_ss2 = NULL;
-               unsigned char *p_if = NULL;
+               const unsigned char *p_ss1 = NULL;
+               const unsigned char *p_ss2 = NULL;
+               const unsigned char *p_if = NULL;
                size_t len = 0;
                int bits1, bits2;
 
@@ -467,21 +988,21 @@ static int addr_compare(const struct sockaddr_storage *ss1,
                        continue;
                }
                if (pss->ss_family == AF_INET) {
-                       p_if = (unsigned char *)
+                       p_if = (const unsigned char *)
                                &((const struct sockaddr_in *)pss)->sin_addr;
-                       p_ss1 = (unsigned char *)
+                       p_ss1 = (const unsigned char *)
                                &((const struct sockaddr_in *)ss1)->sin_addr;
-                       p_ss2 = (unsigned char *)
+                       p_ss2 = (const unsigned char *)
                                &((const struct sockaddr_in *)ss2)->sin_addr;
                        len = 4;
                }
 #if defined(HAVE_IPV6)
                if (pss->ss_family == AF_INET6) {
-                       p_if = (unsigned char *)
+                       p_if = (const unsigned char *)
                                &((const struct sockaddr_in6 *)pss)->sin6_addr;
-                       p_ss1 = (unsigned char *)
+                       p_ss1 = (const unsigned char *)
                                &((const struct sockaddr_in6 *)ss1)->sin6_addr;
-                       p_ss2 = (unsigned char *)
+                       p_ss2 = (const unsigned char *)
                                &((const struct sockaddr_in6 *)ss2)->sin6_addr;
                        len = 16;
                }
@@ -496,14 +1017,14 @@ static int addr_compare(const struct sockaddr_storage *ss1,
        }
 
        /* Bias towards directly reachable IPs */
-       if (iface_local((struct sockaddr *)ss1)) {
+       if (iface_local((const struct sockaddr *)ss1)) {
                if (ss1->ss_family == AF_INET) {
                        max_bits1 += 32;
                } else {
                        max_bits1 += 128;
                }
        }
-       if (iface_local((struct sockaddr *)ss2)) {
+       if (iface_local((const struct sockaddr *)ss2)) {
                if (ss2->ss_family == AF_INET) {
                        max_bits2 += 32;
                } else {
@@ -573,12 +1094,13 @@ static int remove_duplicate_addrs2(struct ip_service *iplist, int count )
 
        /* one loop to remove duplicates */
        for ( i=0; i<count; i++ ) {
-               if ( is_zero_addr((struct sockaddr *)&iplist[i].ss)) {
+               if ( is_zero_addr(&iplist[i].ss)) {
                        continue;
                }
 
                for ( j=i+1; j<count; j++ ) {
-                       if (sockaddr_equal((struct sockaddr *)&iplist[i].ss, (struct sockaddr *)&iplist[j].ss) &&
+                       if (sockaddr_equal((struct sockaddr *)(void *)&iplist[i].ss,
+                                          (struct sockaddr *)(void *)&iplist[j].ss) &&
                                        iplist[i].port == iplist[j].port) {
                                zero_sockaddr(&iplist[j].ss);
                        }
@@ -588,7 +1110,7 @@ static int remove_duplicate_addrs2(struct ip_service *iplist, int count )
        /* one loop to clean up any holes we left */
        /* first ip should never be a zero_ip() */
        for (i = 0; i<count; ) {
-               if (is_zero_addr((struct sockaddr *)&iplist[i].ss) ) {
+               if (is_zero_addr(&iplist[i].ss) ) {
                        if (i != count-1) {
                                memmove(&iplist[i], &iplist[i+1],
                                        (count - i - 1)*sizeof(iplist[i]));
@@ -605,7 +1127,7 @@ static int remove_duplicate_addrs2(struct ip_service *iplist, int count )
 static bool prioritize_ipv4_list(struct ip_service *iplist, int count)
 {
        TALLOC_CTX *frame = talloc_stackframe();
-       struct ip_service *iplist_new = TALLOC_ARRAY(frame, struct ip_service, count);
+       struct ip_service *iplist_new = talloc_array(frame, struct ip_service, count);
        int i, j;
 
        if (iplist_new == NULL) {
@@ -641,43 +1163,63 @@ static bool prioritize_ipv4_list(struct ip_service *iplist, int count)
  *timed_out is set if we failed by timing out
 ****************************************************************************/
 
-struct sockaddr_storage *name_query(int fd,
-                       const char *name,
-                       int name_type,
-                       bool bcast,
-                       bool recurse,
-                       const struct sockaddr_storage *to_ss,
-                       int *count,
-                       int *flags,
-                       bool *timed_out)
+struct name_query_state {
+       struct sockaddr_storage my_addr;
+       struct sockaddr_storage addr;
+       bool bcast;
+
+
+       uint8_t buf[1024];
+       ssize_t buflen;
+
+       NTSTATUS validate_error;
+       uint8_t flags;
+
+       struct sockaddr_storage *addrs;
+       int num_addrs;
+};
+
+static bool name_query_validator(struct packet_struct *p, void *private_data);
+static void name_query_done(struct tevent_req *subreq);
+
+struct tevent_req *name_query_send(TALLOC_CTX *mem_ctx,
+                                  struct tevent_context *ev,
+                                  const char *name, int name_type,
+                                  bool bcast, bool recurse,
+                                  const struct sockaddr_storage *addr)
 {
-       bool found=false;
-       int i, retries = 3;
-       int retry_time = bcast?250:2000;
-       struct timeval tval;
+       struct tevent_req *req, *subreq;
+       struct name_query_state *state;
        struct packet_struct p;
-       struct packet_struct *p2;
        struct nmb_packet *nmb = &p.packet.nmb;
-       struct sockaddr_storage *ss_list = NULL;
+       struct sockaddr_in *in_addr;
 
-       if (lp_disable_netbios()) {
-               DEBUG(5,("name_query(%s#%02x): netbios is disabled\n",
-                                       name, name_type));
+       req = tevent_req_create(mem_ctx, &state, struct name_query_state);
+       if (req == NULL) {
                return NULL;
        }
+       state->bcast = bcast;
 
-       if (to_ss->ss_family != AF_INET) {
-               return NULL;
+       if (addr->ss_family != AF_INET) {
+               /* Can't do node status to IPv6 */
+               tevent_req_nterror(req, NT_STATUS_INVALID_ADDRESS);
+               return tevent_req_post(req, ev);
        }
 
-       if (timed_out) {
-               *timed_out = false;
+       if (lp_disable_netbios()) {
+               DEBUG(5,("name_query(%s#%02x): netbios is disabled\n",
+                                       name, name_type));
+               tevent_req_nterror(req, NT_STATUS_NOT_SUPPORTED);
+               return tevent_req_post(req, ev);
        }
 
-       memset((char *)&p,'\0',sizeof(p));
-       (*count) = 0;
-       (*flags) = 0;
+       state->addr = *addr;
+       in_addr = (struct sockaddr_in *)(void *)&state->addr;
+       in_addr->sin_port = htons(NMB_PORT);
 
+       set_socket_addr_v4(&state->my_addr);
+
+       ZERO_STRUCT(p);
        nmb->header.name_trn_id = generate_trn_id();
        nmb->header.opcode = 0;
        nmb->header.response = false;
@@ -697,155 +1239,261 @@ struct sockaddr_storage *name_query(int fd,
        nmb->question.question_type = 0x20;
        nmb->question.question_class = 0x1;
 
-       p.ip = ((struct sockaddr_in *)to_ss)->sin_addr;
-       p.port = NMB_PORT;
-       p.recv_fd = -1;
-       p.send_fd = fd;
-       p.timestamp = time(NULL);
-       p.packet_type = NMB_PACKET;
-
-       GetTimeOfDay(&tval);
+       state->buflen = build_packet((char *)state->buf, sizeof(state->buf),
+                                    &p);
+       if (state->buflen == 0) {
+               tevent_req_nterror(req, NT_STATUS_INTERNAL_ERROR);
+               DEBUG(10, ("build_packet failed\n"));
+               return tevent_req_post(req, ev);
+       }
 
-       if (!send_packet(&p))
-               return NULL;
+       subreq = nb_trans_send(state, ev, &state->my_addr, &state->addr, bcast,
+                              state->buf, state->buflen,
+                              NMB_PACKET, nmb->header.name_trn_id,
+                              name_query_validator, state);
+       if (tevent_req_nomem(subreq, req)) {
+               DEBUG(10, ("nb_trans_send failed\n"));
+               return tevent_req_post(req, ev);
+       }
+       tevent_req_set_callback(subreq, name_query_done, req);
+       return req;
+}
 
-       retries--;
+static bool name_query_validator(struct packet_struct *p, void *private_data)
+{
+       struct name_query_state *state = talloc_get_type_abort(
+               private_data, struct name_query_state);
+       struct nmb_packet *nmb = &p->packet.nmb;
+       struct sockaddr_storage *tmp_addrs;
+       bool got_unique_netbios_name = false;
+       int i;
 
-       while (1) {
-               struct timeval tval2;
+       debug_nmb_packet(p);
 
-               GetTimeOfDay(&tval2);
-               if (TvalDiff(&tval,&tval2) > retry_time) {
-                       if (!retries)
+       /*
+        * If we get a Negative Name Query Response from a WINS
+        * server, we should report it and give up.
+        */
+       if( 0 == nmb->header.opcode     /* A query response   */
+           && !state->bcast            /* from a WINS server */
+           && nmb->header.rcode        /* Error returned     */
+               ) {
+
+               if( DEBUGLVL( 3 ) ) {
+                       /* Only executed if DEBUGLEVEL >= 3 */
+                       dbgtext( "Negative name query "
+                                "response, rcode 0x%02x: ",
+                                nmb->header.rcode );
+                       switch( nmb->header.rcode ) {
+                       case 0x01:
+                               dbgtext("Request was invalidly formatted.\n");
+                               break;
+                       case 0x02:
+                               dbgtext("Problem with NBNS, cannot process "
+                                       "name.\n");
+                               break;
+                       case 0x03:
+                               dbgtext("The name requested does not "
+                                       "exist.\n");
                                break;
-                       if (!found && !send_packet(&p))
-                               return NULL;
-                       GetTimeOfDay(&tval);
-                       retries--;
+                       case 0x04:
+                               dbgtext("Unsupported request error.\n");
+                               break;
+                       case 0x05:
+                               dbgtext("Query refused error.\n");
+                               break;
+                       default:
+                               dbgtext("Unrecognized error code.\n" );
+                               break;
+                       }
                }
 
-               if ((p2=receive_nmb_packet(fd,90,nmb->header.name_trn_id))) {
-                       struct nmb_packet *nmb2 = &p2->packet.nmb;
-                       debug_nmb_packet(p2);
+               /*
+                * We accept this packet as valid, but tell the upper
+                * layers that it's a negative response.
+                */
+               state->validate_error = NT_STATUS_NOT_FOUND;
+               return true;
+       }
 
-                       /* If we get a Negative Name Query Response from a WINS
-                        * server, we should report it and give up.
-                        */
-                       if( 0 == nmb2->header.opcode    /* A query response   */
-                           && !(bcast)                 /* from a WINS server */
-                           && nmb2->header.rcode       /* Error returned     */
-                               ) {
-
-                               if( DEBUGLVL( 3 ) ) {
-                                       /* Only executed if DEBUGLEVEL >= 3 */
-                                       dbgtext( "Negative name query "
-                                               "response, rcode 0x%02x: ",
-                                               nmb2->header.rcode );
-                                       switch( nmb2->header.rcode ) {
-                                       case 0x01:
-                                               dbgtext( "Request "
-                                               "was invalidly formatted.\n" );
-                                               break;
-                                       case 0x02:
-                                               dbgtext( "Problem with NBNS, "
-                                               "cannot process name.\n");
-                                               break;
-                                       case 0x03:
-                                               dbgtext( "The name requested "
-                                               "does not exist.\n" );
-                                               break;
-                                       case 0x04:
-                                               dbgtext( "Unsupported request "
-                                               "error.\n" );
-                                               break;
-                                       case 0x05:
-                                               dbgtext( "Query refused "
-                                               "error.\n" );
-                                               break;
-                                       default:
-                                               dbgtext( "Unrecognized error "
-                                               "code.\n" );
-                                               break;
-                                       }
-                               }
-                               free_packet(p2);
-                               return( NULL );
-                       }
+       if (nmb->header.opcode != 0 ||
+           nmb->header.nm_flags.bcast ||
+           nmb->header.rcode ||
+           !nmb->header.ancount) {
+               /*
+                * XXXX what do we do with this? Could be a redirect,
+                * but we'll discard it for the moment.
+                */
+               return false;
+       }
 
-                       if (nmb2->header.opcode != 0 ||
-                           nmb2->header.nm_flags.bcast ||
-                           nmb2->header.rcode ||
-                           !nmb2->header.ancount) {
-                               /*
-                                * XXXX what do we do with this? Could be a
-                                * redirect, but we'll discard it for the
-                                * moment.
-                                */
-                               free_packet(p2);
-                               continue;
-                       }
+       tmp_addrs = talloc_realloc(
+               state, state->addrs, struct sockaddr_storage,
+               state->num_addrs + nmb->answers->rdlength/6);
+       if (tmp_addrs == NULL) {
+               state->validate_error = NT_STATUS_NO_MEMORY;
+               return true;
+       }
+       state->addrs = tmp_addrs;
 
-                       ss_list = SMB_REALLOC_ARRAY(ss_list,
-                                               struct sockaddr_storage,
-                                               (*count) +
-                                               nmb2->answers->rdlength/6);
+       DEBUG(2,("Got a positive name query response "
+                "from %s ( ", inet_ntoa(p->ip)));
 
-                       if (!ss_list) {
-                               DEBUG(0,("name_query: Realloc failed.\n"));
-                               free_packet(p2);
-                               return NULL;
-                       }
+       for (i=0; i<nmb->answers->rdlength/6; i++) {
+               uint16_t flags;
+               struct in_addr ip;
+               struct sockaddr_storage addr;
+               int j;
 
-                       DEBUG(2,("Got a positive name query response "
-                                       "from %s ( ",
-                                       inet_ntoa(p2->ip)));
-
-                       for (i=0;i<nmb2->answers->rdlength/6;i++) {
-                               struct in_addr ip;
-                               putip((char *)&ip,&nmb2->answers->rdata[2+i*6]);
-                               in_addr_to_sockaddr_storage(&ss_list[(*count)],
-                                               ip);
-                               DEBUGADD(2,("%s ",inet_ntoa(ip)));
-                               (*count)++;
+               flags = RSVAL(&nmb->answers->rdata[i*6], 0);
+               got_unique_netbios_name |= ((flags & 0x8000) == 0);
+
+               putip((char *)&ip,&nmb->answers->rdata[2+i*6]);
+               in_addr_to_sockaddr_storage(&addr, ip);
+
+               for (j=0; j<state->num_addrs; j++) {
+                       if (sockaddr_equal(
+                                   (struct sockaddr *)(void *)&addr,
+                                   (struct sockaddr *)(void *)&state->addrs[j])) {
+                               break;
                        }
-                       DEBUGADD(2,(")\n"));
-
-                       found=true;
-                       retries=0;
-                       /* We add the flags back ... */
-                       if (nmb2->header.response)
-                               (*flags) |= NM_FLAGS_RS;
-                       if (nmb2->header.nm_flags.authoritative)
-                               (*flags) |= NM_FLAGS_AA;
-                       if (nmb2->header.nm_flags.trunc)
-                               (*flags) |= NM_FLAGS_TC;
-                       if (nmb2->header.nm_flags.recursion_desired)
-                               (*flags) |= NM_FLAGS_RD;
-                       if (nmb2->header.nm_flags.recursion_available)
-                               (*flags) |= NM_FLAGS_RA;
-                       if (nmb2->header.nm_flags.bcast)
-                               (*flags) |= NM_FLAGS_B;
-                       free_packet(p2);
+               }
+               if (j < state->num_addrs) {
+                       /* Already got it */
+                       continue;
+               }
+
+               DEBUGADD(2,("%s ",inet_ntoa(ip)));
+
+               state->addrs[state->num_addrs] = addr;
+               state->num_addrs += 1;
+       }
+       DEBUGADD(2,(")\n"));
+
+       /* We add the flags back ... */
+       if (nmb->header.response)
+               state->flags |= NM_FLAGS_RS;
+       if (nmb->header.nm_flags.authoritative)
+               state->flags |= NM_FLAGS_AA;
+       if (nmb->header.nm_flags.trunc)
+               state->flags |= NM_FLAGS_TC;
+       if (nmb->header.nm_flags.recursion_desired)
+               state->flags |= NM_FLAGS_RD;
+       if (nmb->header.nm_flags.recursion_available)
+               state->flags |= NM_FLAGS_RA;
+       if (nmb->header.nm_flags.bcast)
+               state->flags |= NM_FLAGS_B;
+
+       if (state->bcast) {
+               /*
+                * We have to collect all entries coming in from broadcast
+                * queries. If we got a unique name, we're done.
+                */
+               return got_unique_netbios_name;
+       }
+       /*
+        * WINS responses are accepted when they are received
+        */
+       return true;
+}
+
+static void name_query_done(struct tevent_req *subreq)
+{
+       struct tevent_req *req = tevent_req_callback_data(
+               subreq, struct tevent_req);
+       struct name_query_state *state = tevent_req_data(
+               req, struct name_query_state);
+       NTSTATUS status;
+       struct packet_struct *p = NULL;
+
+       status = nb_trans_recv(subreq, &p);
+       TALLOC_FREE(subreq);
+       if (tevent_req_nterror(req, status)) {
+               return;
+       }
+       if (!NT_STATUS_IS_OK(state->validate_error)) {
+               tevent_req_nterror(req, state->validate_error);
+               return;
+       }
+       if (p != NULL) {
+               /*
+                * Free the packet here, we've collected the response in the
+                * validator
+                */
+               free_packet(p);
+       }
+       tevent_req_done(req);
+}
+
+NTSTATUS name_query_recv(struct tevent_req *req, TALLOC_CTX *mem_ctx,
+                        struct sockaddr_storage **addrs, int *num_addrs,
+                        uint8_t *flags)
+{
+       struct name_query_state *state = tevent_req_data(
+               req, struct name_query_state);
+       NTSTATUS status;
+
+       if (tevent_req_is_nterror(req, &status)) {
+               if (state->bcast &&
+                   NT_STATUS_EQUAL(status, NT_STATUS_IO_TIMEOUT)) {
                        /*
-                        * If we're doing a unicast lookup we only
-                        * expect one reply. Don't wait the full 2
-                        * seconds if we got one. JRA.
+                        * In the broadcast case we collect replies until the
+                        * timeout.
                         */
-                       if(!bcast && found)
-                               break;
+                       status = NT_STATUS_OK;
+               }
+               if (!NT_STATUS_IS_OK(status)) {
+                       return status;
                }
        }
-
-       /* only set timed_out if we didn't fund what we where looking for*/
-
-       if ( !found && timed_out ) {
-               *timed_out = true;
+       if (state->num_addrs == 0) {
+               return NT_STATUS_NOT_FOUND;
        }
+       *addrs = talloc_move(mem_ctx, &state->addrs);
+       sort_addr_list(*addrs, state->num_addrs);
+       *num_addrs = state->num_addrs;
+       if (flags != NULL) {
+               *flags = state->flags;
+       }
+       return NT_STATUS_OK;
+}
 
-       /* sort the ip list so we choose close servers first if possible */
-       sort_addr_list(ss_list, *count);
+NTSTATUS name_query(const char *name, int name_type,
+                   bool bcast, bool recurse,
+                   const struct sockaddr_storage *to_ss,
+                   TALLOC_CTX *mem_ctx,
+                   struct sockaddr_storage **addrs,
+                   int *num_addrs, uint8_t *flags)
+{
+       TALLOC_CTX *frame = talloc_stackframe();
+       struct tevent_context *ev;
+       struct tevent_req *req;
+       struct timeval timeout;
+       NTSTATUS status = NT_STATUS_NO_MEMORY;
 
-       return ss_list;
+       ev = tevent_context_init(frame);
+       if (ev == NULL) {
+               goto fail;
+       }
+       req = name_query_send(ev, ev, name, name_type, bcast, recurse, to_ss);
+       if (req == NULL) {
+               goto fail;
+       }
+       if (bcast) {
+               timeout = timeval_current_ofs(0, 250000);
+       } else {
+               timeout = timeval_current_ofs(2, 0);
+       }
+       if (!tevent_req_set_endtime(req, ev, timeout)) {
+               goto fail;
+       }
+       if (!tevent_req_poll_ntstatus(req, ev, &status)) {
+               goto fail;
+       }
+       status = name_query_recv(req, mem_ctx, addrs, num_addrs, flags);
+ fail:
+       TALLOC_FREE(frame);
+       return status;
 }
 
 /********************************************************
@@ -878,122 +1526,507 @@ static bool convert_ss2service(struct ip_service **return_iplist,
        return true;
 }
 
+struct name_queries_state {
+       struct tevent_context *ev;
+       const char *name;
+       int name_type;
+       bool bcast;
+       bool recurse;
+       const struct sockaddr_storage *addrs;
+       int num_addrs;
+       int wait_msec;
+       int timeout_msec;
+
+       struct tevent_req **subreqs;
+       int num_received;
+       int num_sent;
+
+       int received_index;
+       struct sockaddr_storage *result_addrs;
+       int num_result_addrs;
+       uint8_t flags;
+};
+
+static void name_queries_done(struct tevent_req *subreq);
+static void name_queries_next(struct tevent_req *subreq);
+
+/*
+ * Send a name query to multiple destinations with a wait time in between
+ */
+
+static struct tevent_req *name_queries_send(
+       TALLOC_CTX *mem_ctx, struct tevent_context *ev,
+       const char *name, int name_type,
+       bool bcast, bool recurse,
+       const struct sockaddr_storage *addrs,
+       int num_addrs, int wait_msec, int timeout_msec)
+{
+       struct tevent_req *req, *subreq;
+       struct name_queries_state *state;
+
+       req = tevent_req_create(mem_ctx, &state,
+                               struct name_queries_state);
+       if (req == NULL) {
+               return NULL;
+       }
+       state->ev = ev;
+       state->name = name;
+       state->name_type = name_type;
+       state->bcast = bcast;
+       state->recurse = recurse;
+       state->addrs = addrs;
+       state->num_addrs = num_addrs;
+       state->wait_msec = wait_msec;
+       state->timeout_msec = timeout_msec;
+
+       state->subreqs = talloc_zero_array(
+               state, struct tevent_req *, num_addrs);
+       if (tevent_req_nomem(state->subreqs, req)) {
+               return tevent_req_post(req, ev);
+       }
+       state->num_sent = 0;
+
+       subreq = name_query_send(
+               state->subreqs, state->ev, name, name_type, bcast, recurse,
+               &state->addrs[state->num_sent]);
+       if (tevent_req_nomem(subreq, req)) {
+               return tevent_req_post(req, ev);
+       }
+       if (!tevent_req_set_endtime(
+                   subreq, state->ev,
+                   timeval_current_ofs(0, state->timeout_msec * 1000))) {
+               tevent_req_oom(req);
+               return tevent_req_post(req, ev);
+       }
+       tevent_req_set_callback(subreq, name_queries_done, req);
+
+       state->subreqs[state->num_sent] = subreq;
+       state->num_sent += 1;
+
+       if (state->num_sent < state->num_addrs) {
+               subreq = tevent_wakeup_send(
+                       state, state->ev,
+                       timeval_current_ofs(0, state->wait_msec * 1000));
+               if (tevent_req_nomem(subreq, req)) {
+                       return tevent_req_post(req, ev);
+               }
+               tevent_req_set_callback(subreq, name_queries_next, req);
+       }
+       return req;
+}
+
+static void name_queries_done(struct tevent_req *subreq)
+{
+       struct tevent_req *req = tevent_req_callback_data(
+               subreq, struct tevent_req);
+       struct name_queries_state *state = tevent_req_data(
+               req, struct name_queries_state);
+       int i;
+       NTSTATUS status;
+
+       status = name_query_recv(subreq, state, &state->result_addrs,
+                                &state->num_result_addrs, &state->flags);
+
+       for (i=0; i<state->num_sent; i++) {
+               if (state->subreqs[i] == subreq) {
+                       break;
+               }
+       }
+       if (i == state->num_sent) {
+               tevent_req_nterror(req, NT_STATUS_INTERNAL_ERROR);
+               return;
+       }
+       TALLOC_FREE(state->subreqs[i]);
+
+       state->num_received += 1;
+
+       if (!NT_STATUS_IS_OK(status)) {
+
+               if (state->num_received >= state->num_addrs) {
+                       tevent_req_nterror(req, status);
+                       return;
+               }
+               /*
+                * Still outstanding requests, just wait
+                */
+               return;
+       }
+       state->received_index = i;
+       tevent_req_done(req);
+}
+
+static void name_queries_next(struct tevent_req *subreq)
+{
+       struct tevent_req *req = tevent_req_callback_data(
+               subreq, struct tevent_req);
+       struct name_queries_state *state = tevent_req_data(
+               req, struct name_queries_state);
+
+       if (!tevent_wakeup_recv(subreq)) {
+               tevent_req_nterror(req, NT_STATUS_INTERNAL_ERROR);
+               return;
+       }
+
+       subreq = name_query_send(
+               state->subreqs, state->ev,
+               state->name, state->name_type, state->bcast, state->recurse,
+               &state->addrs[state->num_sent]);
+       if (tevent_req_nomem(subreq, req)) {
+               return;
+       }
+       tevent_req_set_callback(subreq, name_queries_done, req);
+       if (!tevent_req_set_endtime(
+                   subreq, state->ev,
+                   timeval_current_ofs(0, state->timeout_msec * 1000))) {
+               tevent_req_oom(req);
+               return;
+       }
+       state->subreqs[state->num_sent] = subreq;
+       state->num_sent += 1;
+
+       if (state->num_sent < state->num_addrs) {
+               subreq = tevent_wakeup_send(
+                       state, state->ev,
+                       timeval_current_ofs(0, state->wait_msec * 1000));
+               if (tevent_req_nomem(subreq, req)) {
+                       return;
+               }
+               tevent_req_set_callback(subreq, name_queries_next, req);
+       }
+}
+
+static NTSTATUS name_queries_recv(struct tevent_req *req, TALLOC_CTX *mem_ctx,
+                                 struct sockaddr_storage **result_addrs,
+                                 int *num_result_addrs, uint8_t *flags,
+                                 int *received_index)
+{
+       struct name_queries_state *state = tevent_req_data(
+               req, struct name_queries_state);
+       NTSTATUS status;
+
+       if (tevent_req_is_nterror(req, &status)) {
+               return status;
+       }
+
+       if (result_addrs != NULL) {
+               *result_addrs = talloc_move(mem_ctx, &state->result_addrs);
+       }
+       if (num_result_addrs != NULL) {
+               *num_result_addrs = state->num_result_addrs;
+       }
+       if (flags != NULL) {
+               *flags = state->flags;
+       }
+       if (received_index != NULL) {
+               *received_index = state->received_index;
+       }
+       return NT_STATUS_OK;
+}
+
 /********************************************************
  Resolve via "bcast" method.
 *********************************************************/
 
-NTSTATUS name_resolve_bcast(const char *name,
-                       int name_type,
-                       struct ip_service **return_iplist,
-                       int *return_count)
+struct name_resolve_bcast_state {
+       struct sockaddr_storage *addrs;
+       int num_addrs;
+};
+
+static void name_resolve_bcast_done(struct tevent_req *subreq);
+
+struct tevent_req *name_resolve_bcast_send(TALLOC_CTX *mem_ctx,
+                                          struct tevent_context *ev,
+                                          const char *name,
+                                          int name_type)
 {
-       int sock, i;
-       int num_interfaces = iface_count();
-       struct sockaddr_storage *ss_list;
-       struct sockaddr_storage ss;
-       NTSTATUS status;
+       struct tevent_req *req, *subreq;
+       struct name_resolve_bcast_state *state;
+       struct sockaddr_storage *bcast_addrs;
+       int i, num_addrs, num_bcast_addrs;
+
+       req = tevent_req_create(mem_ctx, &state,
+                               struct name_resolve_bcast_state);
+       if (req == NULL) {
+               return NULL;
+       }
 
        if (lp_disable_netbios()) {
-               DEBUG(5,("name_resolve_bcast(%s#%02x): netbios is disabled\n",
-                                       name, name_type));
-               return NT_STATUS_INVALID_PARAMETER;
+               DEBUG(5, ("name_resolve_bcast(%s#%02x): netbios is disabled\n",
+                         name, name_type));
+               tevent_req_nterror(req, NT_STATUS_INVALID_PARAMETER);
+               return tevent_req_post(req, ev);
        }
 
-       *return_iplist = NULL;
-       *return_count = 0;
-
        /*
         * "bcast" means do a broadcast lookup on all the local interfaces.
         */
 
-       DEBUG(3,("name_resolve_bcast: Attempting broadcast lookup "
-               "for name %s<0x%x>\n", name, name_type));
-
-       if (!interpret_string_addr(&ss, lp_socket_address(),
-                               AI_NUMERICHOST|AI_PASSIVE)) {
-               zero_sockaddr(&ss);
-       }
+       DEBUG(3, ("name_resolve_bcast: Attempting broadcast lookup "
+                 "for name %s<0x%x>\n", name, name_type));
 
-       sock = open_socket_in( SOCK_DGRAM, 0, 3, &ss, true );
-       if (sock == -1) {
-               return NT_STATUS_UNSUCCESSFUL;
+       num_addrs = iface_count();
+       bcast_addrs = talloc_array(state, struct sockaddr_storage, num_addrs);
+       if (tevent_req_nomem(bcast_addrs, req)) {
+               return tevent_req_post(req, ev);
        }
 
-       set_socket_options(sock,"SO_BROADCAST");
        /*
         * Lookup the name on all the interfaces, return on
         * the first successful match.
         */
-       for( i = num_interfaces-1; i >= 0; i--) {
+       num_bcast_addrs = 0;
+
+       for (i=0; i<num_addrs; i++) {
                const struct sockaddr_storage *pss = iface_n_bcast(i);
-               int flags;
 
-               /* Done this way to fix compiler error on IRIX 5.x */
-               if (!pss) {
+               if (pss->ss_family != AF_INET) {
                        continue;
                }
-               ss_list = name_query(sock, name, name_type, true,
-                                   true, pss, return_count, &flags, NULL);
-               if (ss_list) {
-                       goto success;
-               }
+               bcast_addrs[num_bcast_addrs] = *pss;
+               num_bcast_addrs += 1;
        }
 
-       /* failed - no response */
+       subreq = name_queries_send(state, ev, name, name_type, true, true,
+                                  bcast_addrs, num_bcast_addrs, 0, 1000);
+       if (tevent_req_nomem(subreq, req)) {
+               return tevent_req_post(req, ev);
+       }
+       tevent_req_set_callback(subreq, name_resolve_bcast_done, req);
+       return req;
+}
 
-       close(sock);
-       return NT_STATUS_UNSUCCESSFUL;
+static void name_resolve_bcast_done(struct tevent_req *subreq)
+{
+       struct tevent_req *req = tevent_req_callback_data(
+               subreq, struct tevent_req);
+       struct name_resolve_bcast_state *state = tevent_req_data(
+               req, struct name_resolve_bcast_state);
+       NTSTATUS status;
 
-success:
+       status = name_queries_recv(subreq, state,
+                                  &state->addrs, &state->num_addrs,
+                                  NULL, NULL);
+       TALLOC_FREE(subreq);
+       if (tevent_req_nterror(req, status)) {
+               return;
+       }
+       tevent_req_done(req);
+}
 
-       status = NT_STATUS_OK;
-       if (!convert_ss2service(return_iplist, ss_list, *return_count) )
-               status = NT_STATUS_INVALID_PARAMETER;
+NTSTATUS name_resolve_bcast_recv(struct tevent_req *req, TALLOC_CTX *mem_ctx,
+                                struct sockaddr_storage **addrs,
+                                int *num_addrs)
+{
+       struct name_resolve_bcast_state *state = tevent_req_data(
+               req, struct name_resolve_bcast_state);
+       NTSTATUS status;
 
-       SAFE_FREE(ss_list);
-       close(sock);
+       if (tevent_req_is_nterror(req, &status)) {
+               return status;
+       }
+       *addrs = talloc_move(mem_ctx, &state->addrs);
+       *num_addrs = state->num_addrs;
+       return NT_STATUS_OK;
+}
+
+NTSTATUS name_resolve_bcast(const char *name,
+                       int name_type,
+                       TALLOC_CTX *mem_ctx,
+                       struct sockaddr_storage **return_iplist,
+                       int *return_count)
+{
+       TALLOC_CTX *frame = talloc_stackframe();
+       struct event_context *ev;
+       struct tevent_req *req;
+       NTSTATUS status = NT_STATUS_NO_MEMORY;
+
+       ev = event_context_init(frame);
+       if (ev == NULL) {
+               goto fail;
+       }
+       req = name_resolve_bcast_send(frame, ev, name, name_type);
+       if (req == NULL) {
+               goto fail;
+       }
+       if (!tevent_req_poll_ntstatus(req, ev, &status)) {
+               goto fail;
+       }
+       status = name_resolve_bcast_recv(req, mem_ctx, return_iplist,
+                                        return_count);
+ fail:
+       TALLOC_FREE(frame);
        return status;
 }
 
-/********************************************************
- Resolve via "wins" method.
-*********************************************************/
+struct query_wins_list_state {
+       struct tevent_context *ev;
+       const char *name;
+       uint8_t name_type;
+       struct in_addr *servers;
+       uint32_t num_servers;
+       struct sockaddr_storage server;
+       uint32_t num_sent;
 
-NTSTATUS resolve_wins(const char *name,
-               int name_type,
-               struct ip_service **return_iplist,
-               int *return_count)
+       struct sockaddr_storage *addrs;
+       int num_addrs;
+       uint8_t flags;
+};
+
+static void query_wins_list_done(struct tevent_req *subreq);
+
+/*
+ * Query a list of (replicating) wins servers in sequence, call them
+ * dead if they don't reply
+ */
+
+static struct tevent_req *query_wins_list_send(
+       TALLOC_CTX *mem_ctx, struct tevent_context *ev,
+       struct in_addr src_ip, const char *name, uint8_t name_type,
+       struct in_addr *servers, int num_servers)
 {
-       int sock, t, i;
-       char **wins_tags;
-       struct sockaddr_storage src_ss, *ss_list = NULL;
-       struct in_addr src_ip;
+       struct tevent_req *req, *subreq;
+       struct query_wins_list_state *state;
+
+       req = tevent_req_create(mem_ctx, &state,
+                               struct query_wins_list_state);
+       if (req == NULL) {
+               return NULL;
+       }
+       state->ev = ev;
+       state->name = name;
+       state->name_type = name_type;
+       state->servers = servers;
+       state->num_servers = num_servers;
+
+       if (state->num_servers == 0) {
+               tevent_req_nterror(req, NT_STATUS_NOT_FOUND);
+               return tevent_req_post(req, ev);
+       }
+
+       in_addr_to_sockaddr_storage(
+               &state->server, state->servers[state->num_sent]);
+
+       subreq = name_query_send(state, state->ev,
+                                state->name, state->name_type,
+                                false, true, &state->server);
+       state->num_sent += 1;
+       if (tevent_req_nomem(subreq, req)) {
+               return tevent_req_post(req, ev);
+       }
+       if (!tevent_req_set_endtime(subreq, state->ev,
+                                   timeval_current_ofs(2, 0))) {
+               tevent_req_oom(req);
+               return tevent_req_post(req, ev);
+       }
+       tevent_req_set_callback(subreq, query_wins_list_done, req);
+       return req;
+}
+
+static void query_wins_list_done(struct tevent_req *subreq)
+{
+       struct tevent_req *req = tevent_req_callback_data(
+               subreq, struct tevent_req);
+       struct query_wins_list_state *state = tevent_req_data(
+               req, struct query_wins_list_state);
        NTSTATUS status;
 
-       if (lp_disable_netbios()) {
-               DEBUG(5,("resolve_wins(%s#%02x): netbios is disabled\n",
-                                       name, name_type));
-               return NT_STATUS_INVALID_PARAMETER;
+       status = name_query_recv(subreq, state,
+                                &state->addrs, &state->num_addrs,
+                                &state->flags);
+       TALLOC_FREE(subreq);
+       if (NT_STATUS_IS_OK(status)) {
+               tevent_req_done(req);
+               return;
+       }
+       if (!NT_STATUS_EQUAL(status, NT_STATUS_IO_TIMEOUT)) {
+               tevent_req_nterror(req, status);
+               return;
        }
+       wins_srv_died(state->servers[state->num_sent-1],
+                     my_socket_addr_v4());
 
-       *return_iplist = NULL;
-       *return_count = 0;
+       if (state->num_sent == state->num_servers) {
+               tevent_req_nterror(req, NT_STATUS_NOT_FOUND);
+               return;
+       }
 
-       DEBUG(3,("resolve_wins: Attempting wins lookup for name %s<0x%x>\n",
-                               name, name_type));
+       in_addr_to_sockaddr_storage(
+               &state->server, state->servers[state->num_sent]);
 
-       if (wins_srv_count() < 1) {
-               DEBUG(3,("resolve_wins: WINS server resolution selected "
-                       "and no WINS servers listed.\n"));
-               return NT_STATUS_INVALID_PARAMETER;
+       subreq = name_query_send(state, state->ev,
+                                state->name, state->name_type,
+                                false, true, &state->server);
+       state->num_sent += 1;
+       if (tevent_req_nomem(subreq, req)) {
+               return;
+       }
+       if (!tevent_req_set_endtime(subreq, state->ev,
+                                   timeval_current_ofs(2, 0))) {
+               tevent_req_oom(req);
+               return;
        }
+       tevent_req_set_callback(subreq, query_wins_list_done, req);
+}
 
-       /* we try a lookup on each of the WINS tags in turn */
-       wins_tags = wins_srv_tags();
+static NTSTATUS query_wins_list_recv(struct tevent_req *req,
+                                    TALLOC_CTX *mem_ctx,
+                                    struct sockaddr_storage **addrs,
+                                    int *num_addrs,
+                                    uint8_t *flags)
+{
+       struct query_wins_list_state *state = tevent_req_data(
+               req, struct query_wins_list_state);
+       NTSTATUS status;
 
-       if (!wins_tags) {
-               /* huh? no tags?? give up in disgust */
-               return NT_STATUS_INVALID_PARAMETER;
+       if (tevent_req_is_nterror(req, &status)) {
+               return status;
+       }
+       if (addrs != NULL) {
+               *addrs = talloc_move(mem_ctx, &state->addrs);
+       }
+       if (num_addrs != NULL) {
+               *num_addrs = state->num_addrs;
+       }
+       if (flags != NULL) {
+               *flags = state->flags;
+       }
+       return NT_STATUS_OK;
+}
+
+struct resolve_wins_state {
+       int num_sent;
+       int num_received;
+
+       struct sockaddr_storage *addrs;
+       int num_addrs;
+       uint8_t flags;
+};
+
+static void resolve_wins_done(struct tevent_req *subreq);
+
+struct tevent_req *resolve_wins_send(TALLOC_CTX *mem_ctx,
+                                    struct tevent_context *ev,
+                                    const char *name,
+                                    int name_type)
+{
+       struct tevent_req *req, *subreq;
+       struct resolve_wins_state *state;
+       char **wins_tags = NULL;
+       struct sockaddr_storage src_ss;
+       struct in_addr src_ip;
+       int i, num_wins_tags;
+
+       req = tevent_req_create(mem_ctx, &state,
+                               struct resolve_wins_state);
+       if (req == NULL) {
+               return NULL;
+       }
+
+       if (wins_srv_count() < 1) {
+               DEBUG(3,("resolve_wins: WINS server resolution selected "
+                       "and no WINS servers listed.\n"));
+               tevent_req_nterror(req, NT_STATUS_INVALID_PARAMETER);
+               goto fail;
        }
 
        /* the address we will be sending from */
@@ -1008,87 +2041,164 @@ NTSTATUS resolve_wins(const char *name,
                DEBUG(3,("resolve_wins: cannot receive WINS replies "
                        "on IPv6 address %s\n",
                        addr));
-               wins_srv_tags_free(wins_tags);
-               return NT_STATUS_INVALID_PARAMETER;
+               tevent_req_nterror(req, NT_STATUS_INVALID_PARAMETER);
+               goto fail;
+       }
+
+       src_ip = ((const struct sockaddr_in *)(void *)&src_ss)->sin_addr;
+
+       wins_tags = wins_srv_tags();
+       if (wins_tags == NULL) {
+               tevent_req_nterror(req, NT_STATUS_INVALID_PARAMETER);
+               goto fail;
+       }
+
+       num_wins_tags = 0;
+       while (wins_tags[num_wins_tags] != NULL) {
+               num_wins_tags += 1;
        }
 
-       src_ip = ((struct sockaddr_in *)&src_ss)->sin_addr;
+       for (i=0; i<num_wins_tags; i++) {
+               int num_servers, num_alive;
+               struct in_addr *servers, *alive;
+               int j;
+
+               if (!wins_server_tag_ips(wins_tags[i], talloc_tos(),
+                                        &servers, &num_servers)) {
+                       DEBUG(10, ("wins_server_tag_ips failed for tag %s\n",
+                                  wins_tags[i]));
+                       continue;
+               }
 
-       /* in the worst case we will try every wins server with every
-          tag! */
-       for (t=0; wins_tags && wins_tags[t]; t++) {
-               int srv_count = wins_srv_count_tag(wins_tags[t]);
-               for (i=0; i<srv_count; i++) {
-                       struct sockaddr_storage wins_ss;
-                       struct in_addr wins_ip;
-                       int flags;
-                       bool timed_out;
+               alive = talloc_array(state, struct in_addr, num_servers);
+               if (tevent_req_nomem(alive, req)) {
+                       goto fail;
+               }
 
-                       wins_ip = wins_srv_ip_tag(wins_tags[t], src_ip);
+               num_alive = 0;
+               for (j=0; j<num_servers; j++) {
+                       struct in_addr wins_ip = servers[j];
 
                        if (global_in_nmbd && ismyip_v4(wins_ip)) {
                                /* yikes! we'll loop forever */
                                continue;
                        }
-
                        /* skip any that have been unresponsive lately */
                        if (wins_srv_is_dead(wins_ip, src_ip)) {
                                continue;
                        }
+                       DEBUG(3, ("resolve_wins: using WINS server %s "
+                                "and tag '%s'\n",
+                                 inet_ntoa(wins_ip), wins_tags[i]));
+                       alive[num_alive] = wins_ip;
+                       num_alive += 1;
+               }
+               TALLOC_FREE(servers);
+
+               if (num_alive == 0) {
+                       continue;
+               }
 
-                       DEBUG(3,("resolve_wins: using WINS server %s "
-                               "and tag '%s'\n",
-                               inet_ntoa(wins_ip), wins_tags[t]));
+               subreq = query_wins_list_send(
+                       state, ev, src_ip, name, name_type,
+                       alive, num_alive);
+               if (tevent_req_nomem(subreq, req)) {
+                       goto fail;
+               }
+               tevent_req_set_callback(subreq, resolve_wins_done, req);
+               state->num_sent += 1;
+       }
 
-                       sock = open_socket_in(SOCK_DGRAM, 0, 3, &src_ss, true);
-                       if (sock == -1) {
-                               continue;
-                       }
+       if (state->num_sent == 0) {
+               tevent_req_nterror(req, NT_STATUS_NOT_FOUND);
+               goto fail;
+       }
 
-                       in_addr_to_sockaddr_storage(&wins_ss, wins_ip);
-                       ss_list = name_query(sock,
-                                               name,
-                                               name_type,
-                                               false,
-                                               true,
-                                               &wins_ss,
-                                               return_count,
-                                               &flags,
-                                               &timed_out);
+       wins_srv_tags_free(wins_tags);
+       return req;
+fail:
+       wins_srv_tags_free(wins_tags);
+       return tevent_req_post(req, ev);
+}
 
-                       /* exit loop if we got a list of addresses */
+static void resolve_wins_done(struct tevent_req *subreq)
+{
+       struct tevent_req *req = tevent_req_callback_data(
+               subreq, struct tevent_req);
+       struct resolve_wins_state *state = tevent_req_data(
+               req, struct resolve_wins_state);
+       NTSTATUS status;
 
-                       if (ss_list)
-                               goto success;
+       status = query_wins_list_recv(subreq, state, &state->addrs,
+                                     &state->num_addrs, &state->flags);
+       if (NT_STATUS_IS_OK(status)) {
+               tevent_req_done(req);
+               return;
+       }
 
-                       close(sock);
+       state->num_received += 1;
 
-                       if (timed_out) {
-                               /* Timed out wating for WINS server to respond.
-                                * Mark it dead. */
-                               wins_srv_died(wins_ip, src_ip);
-                       } else {
-                               /* The name definately isn't in this
-                                  group of WINS servers.
-                                  goto the next group  */
-                               break;
-                       }
-               }
+       if (state->num_received < state->num_sent) {
+               /*
+                * Wait for the others
+                */
+               return;
        }
+       tevent_req_nterror(req, status);
+}
 
-       wins_srv_tags_free(wins_tags);
-       return NT_STATUS_NO_LOGON_SERVERS;
+NTSTATUS resolve_wins_recv(struct tevent_req *req, TALLOC_CTX *mem_ctx,
+                          struct sockaddr_storage **addrs,
+                          int *num_addrs, uint8_t *flags)
+{
+       struct resolve_wins_state *state = tevent_req_data(
+               req, struct resolve_wins_state);
+       NTSTATUS status;
 
-success:
+       if (tevent_req_is_nterror(req, &status)) {
+               return status;
+       }
+       if (addrs != NULL) {
+               *addrs = talloc_move(mem_ctx, &state->addrs);
+       }
+       if (num_addrs != NULL) {
+               *num_addrs = state->num_addrs;
+       }
+       if (flags != NULL) {
+               *flags = state->flags;
+       }
+       return NT_STATUS_OK;
+}
 
-       status = NT_STATUS_OK;
-       if (!convert_ss2service(return_iplist, ss_list, *return_count))
-               status = NT_STATUS_INVALID_PARAMETER;
+/********************************************************
+ Resolve via "wins" method.
+*********************************************************/
 
-       SAFE_FREE(ss_list);
-       wins_srv_tags_free(wins_tags);
-       close(sock);
+NTSTATUS resolve_wins(const char *name,
+               int name_type,
+               TALLOC_CTX *mem_ctx,
+               struct sockaddr_storage **return_iplist,
+               int *return_count)
+{
+       struct tevent_context *ev;
+       struct tevent_req *req;
+       NTSTATUS status = NT_STATUS_NO_MEMORY;
 
+       ev = tevent_context_init(talloc_tos());
+       if (ev == NULL) {
+               goto fail;
+       }
+       req = resolve_wins_send(ev, ev, name, name_type);
+       if (req == NULL) {
+               goto fail;
+       }
+       if (!tevent_req_poll_ntstatus(req, ev, &status)) {
+               goto fail;
+       }
+       status = resolve_wins_recv(req, mem_ctx, return_iplist, return_count,
+                                  NULL);
+fail:
+       TALLOC_FREE(ev);
        return status;
 }
 
@@ -1156,6 +2266,7 @@ static NTSTATUS resolve_hosts(const char *name, int name_type,
        struct addrinfo *res = NULL;
        int ret = -1;
        int i = 0;
+       const char *dns_hosts_file;
 
        if ( name_type != 0x20 && name_type != 0x0) {
                DEBUG(5, ("resolve_hosts: not appropriate "
@@ -1180,6 +2291,32 @@ static NTSTATUS resolve_hosts(const char *name, int name_type,
        hints.ai_family = AF_INET;
 #endif
 
+       dns_hosts_file = lp_parm_const_string(-1, "resolv", "host file", NULL);
+       if (dns_hosts_file) {
+               struct sockaddr_storage *ss_list;
+               NTSTATUS status;
+               TALLOC_CTX *ctx = talloc_stackframe();
+               if (!ctx) {
+                       return NT_STATUS_NO_MEMORY;
+               }
+
+               status = resolve_dns_hosts_file_as_sockaddr(dns_hosts_file, name, false,
+                                                           ctx, &ss_list, return_count);
+               if (NT_STATUS_IS_OK(status)) {
+                       if (convert_ss2service(return_iplist,
+                                              ss_list,
+                                              *return_count)) {
+                               talloc_free(ctx);
+                               return NT_STATUS_OK;
+                       } else {
+                               talloc_free(ctx);
+                               return NT_STATUS_NO_MEMORY;
+                       }
+               }
+               talloc_free(ctx);
+               return NT_STATUS_UNSUCCESSFUL;
+       }
+
        ret = getaddrinfo(name,
                        NULL,
                        &hints,
@@ -1227,6 +2364,9 @@ static NTSTATUS resolve_hosts(const char *name, int name_type,
  Resolve via "ADS" method.
 *********************************************************/
 
+/* Special name type used to cause a _kerberos DNS lookup. */
+#define KDC_NAME_TYPE 0xDCDC
+
 static NTSTATUS resolve_ads(const char *name,
                            int name_type,
                            const char *sitename,
@@ -1330,7 +2470,7 @@ static NTSTATUS resolve_ads(const char *name,
                 * for falling back to netbios lookups is that our DNS server
                 * doesn't know anything about the DC's   -- jerry */
 
-               if (!is_zero_addr((struct sockaddr *)&r->ss)) {
+               if (!is_zero_addr(&r->ss)) {
                        (*return_count)++;
                }
        }
@@ -1453,19 +2593,32 @@ NTSTATUS internal_resolve_name(const char *name,
                        }
                } else if(strequal( tok, "wins")) {
                        /* don't resolve 1D via WINS */
+                       struct sockaddr_storage *ss_list;
                        if (name_type != 0x1D) {
                                status = resolve_wins(name, name_type,
-                                                     return_iplist,
+                                                     talloc_tos(),
+                                                     &ss_list,
                                                      return_count);
                                if (NT_STATUS_IS_OK(status)) {
+                                       if (!convert_ss2service(return_iplist,
+                                                               ss_list,
+                                                               *return_count)) {
+                                               status = NT_STATUS_NO_MEMORY;
+                                       }
                                        goto done;
                                }
                        }
                } else if(strequal( tok, "bcast")) {
-                       status = name_resolve_bcast(name, name_type,
-                                                   return_iplist,
-                                                   return_count);
+                       struct sockaddr_storage *ss_list;
+                       status = name_resolve_bcast(
+                               name, name_type, talloc_tos(),
+                               &ss_list, return_count);
                        if (NT_STATUS_IS_OK(status)) {
+                               if (!convert_ss2service(return_iplist,
+                                                       ss_list,
+                                                       *return_count)) {
+                                       status = NT_STATUS_NO_MEMORY;
+                               }
                                goto done;
                        }
                } else {
@@ -1560,8 +2713,8 @@ bool resolve_name(const char *name,
 
                if (prefer_ipv4) {
                        for (i=0; i<count; i++) {
-                               if (!is_zero_addr((struct sockaddr *)&ss_list[i].ss) &&
-                                               !is_broadcast_addr((struct sockaddr *)&ss_list[i].ss) &&
+                               if (!is_zero_addr(&ss_list[i].ss) &&
+                                   !is_broadcast_addr((struct sockaddr *)(void *)&ss_list[i].ss) &&
                                                (ss_list[i].ss.ss_family == AF_INET)) {
                                        *return_ss = ss_list[i].ss;
                                        SAFE_FREE(ss_list);
@@ -1573,8 +2726,8 @@ bool resolve_name(const char *name,
 
                /* only return valid addresses for TCP connections */
                for (i=0; i<count; i++) {
-                       if (!is_zero_addr((struct sockaddr *)&ss_list[i].ss) &&
-                                       !is_broadcast_addr((struct sockaddr *)&ss_list[i].ss)) {
+                       if (!is_zero_addr(&ss_list[i].ss) &&
+                           !is_broadcast_addr((struct sockaddr *)(void *)&ss_list[i].ss)) {
                                *return_ss = ss_list[i].ss;
                                SAFE_FREE(ss_list);
                                SAFE_FREE(sitename);
@@ -1612,7 +2765,7 @@ NTSTATUS resolve_name_list(TALLOC_CTX *ctx,
        *return_ss_arr = NULL;
 
        if (is_ipaddress(name)) {
-               *return_ss_arr = TALLOC_P(ctx, struct sockaddr_storage);
+               *return_ss_arr = talloc(ctx, struct sockaddr_storage);
                if (!*return_ss_arr) {
                        return NT_STATUS_NO_MEMORY;
                }
@@ -1637,8 +2790,8 @@ NTSTATUS resolve_name_list(TALLOC_CTX *ctx,
 
        /* only return valid addresses for TCP connections */
        for (i=0, num_entries = 0; i<count; i++) {
-               if (!is_zero_addr((struct sockaddr *)&ss_list[i].ss) &&
-                               !is_broadcast_addr((struct sockaddr *)&ss_list[i].ss)) {
+               if (!is_zero_addr(&ss_list[i].ss) &&
+                   !is_broadcast_addr((struct sockaddr *)(void *)&ss_list[i].ss)) {
                        num_entries++;
                }
        }
@@ -1647,7 +2800,7 @@ NTSTATUS resolve_name_list(TALLOC_CTX *ctx,
                return NT_STATUS_BAD_NETWORK_NAME;
        }
 
-       *return_ss_arr = TALLOC_ARRAY(ctx,
+       *return_ss_arr = talloc_array(ctx,
                                struct sockaddr_storage,
                                num_entries);
        if (!(*return_ss_arr)) {
@@ -1656,8 +2809,8 @@ NTSTATUS resolve_name_list(TALLOC_CTX *ctx,
        }
 
        for (i=0, num_entries = 0; i<count; i++) {
-               if (!is_zero_addr((struct sockaddr *)&ss_list[i].ss) &&
-                               !is_broadcast_addr((struct sockaddr *)&ss_list[i].ss)) {
+               if (!is_zero_addr(&ss_list[i].ss) &&
+                   !is_broadcast_addr((struct sockaddr *)(void *)&ss_list[i].ss)) {
                        (*return_ss_arr)[num_entries++] = ss_list[i].ss;
                }
        }
@@ -1824,11 +2977,11 @@ static NTSTATUS get_dc_list(const char *domain,
        saf_servername = saf_fetch( domain);
 
        if (strequal(domain, lp_workgroup()) || strequal(domain, lp_realm())) {
-               pserver = talloc_asprintf(NULL, "%s, %s",
+               pserver = talloc_asprintf(ctx, "%s, %s",
                        saf_servername ? saf_servername : "",
                        lp_passwordserver());
        } else {
-               pserver = talloc_asprintf(NULL, "%s, *",
+               pserver = talloc_asprintf(ctx, "%s, *",
                        saf_servername ? saf_servername : "");
        }