1 /*-
2 * SPDX-License-Identifier: BSD-3-Clause
3 *
4 * Copyright (c) 2001-2007, by Cisco Systems, Inc. All rights reserved.
5 * Copyright (c) 2008-2012, by Randall Stewart. All rights reserved.
6 * Copyright (c) 2008-2012, by Michael Tuexen. All rights reserved.
7 *
8 * Redistribution and use in source and binary forms, with or without
9 * modification, are permitted provided that the following conditions are met:
10 *
11 * a) Redistributions of source code must retain the above copyright notice,
12 * this list of conditions and the following disclaimer.
13 *
14 * b) Redistributions in binary form must reproduce the above copyright
15 * notice, this list of conditions and the following disclaimer in
16 * the documentation and/or other materials provided with the distribution.
17 *
18 * c) Neither the name of Cisco Systems, Inc. nor the names of its
19 * contributors may be used to endorse or promote products derived
20 * from this software without specific prior written permission.
21 *
22 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
23 * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,
24 * THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
25 * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE
26 * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
27 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
28 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
29 * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
30 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
31 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
32 * THE POSSIBILITY OF SUCH DAMAGE.
33 */
34
35 #include <stdbool.h>
36 #include <stddef.h>
37 #include <stdio.h>
38 #include <string.h>
39 #include <errno.h>
40 #include <stdlib.h>
41 #include <unistd.h>
42 #include <sys/types.h>
43 #include <sys/socket.h>
44 #include <sys/errno.h>
45 #include <sys/syscall.h>
46 #include <sys/uio.h>
47 #include <netinet/in.h>
48 #include <arpa/inet.h>
49 #include <netinet/sctp_uio.h>
50 #include <netinet/sctp.h>
51
52 #ifndef IN6_IS_ADDR_V4MAPPED
53 #define IN6_IS_ADDR_V4MAPPED(a) \
54 ((*(const uint32_t *)(const void *)(&(a)->s6_addr[0]) == 0) && \
55 (*(const uint32_t *)(const void *)(&(a)->s6_addr[4]) == 0) && \
56 (*(const uint32_t *)(const void *)(&(a)->s6_addr[8]) == ntohl(0x0000ffff)))
57 #endif
58
59 #define SCTP_CONTROL_VEC_SIZE_RCV 16384
60
61
62 static void
in6_sin6_2_sin(struct sockaddr_in * sin,struct sockaddr_in6 * sin6)63 in6_sin6_2_sin(struct sockaddr_in *sin, struct sockaddr_in6 *sin6)
64 {
65 bzero(sin, sizeof(*sin));
66 sin->sin_len = sizeof(struct sockaddr_in);
67 sin->sin_family = AF_INET;
68 sin->sin_port = sin6->sin6_port;
69 sin->sin_addr.s_addr = sin6->sin6_addr.__u6_addr.__u6_addr32[3];
70 }
71
72 int
sctp_getaddrlen(sa_family_t family)73 sctp_getaddrlen(sa_family_t family)
74 {
75 int ret, sd;
76 socklen_t siz;
77 struct sctp_assoc_value av;
78
79 av.assoc_value = family;
80 siz = sizeof(av);
81 #if defined(AF_INET)
82 sd = socket(AF_INET, SOCK_SEQPACKET, IPPROTO_SCTP);
83 #elif defined(AF_INET6)
84 sd = socket(AF_INET6, SOCK_SEQPACKET, IPPROTO_SCTP);
85 #else
86 sd = -1;
87 #endif
88 if (sd == -1) {
89 return (-1);
90 }
91 ret = getsockopt(sd, IPPROTO_SCTP, SCTP_GET_ADDR_LEN, &av, &siz);
92 close(sd);
93 if (ret == 0) {
94 return ((int)av.assoc_value);
95 } else {
96 return (-1);
97 }
98 }
99
100 int
sctp_connectx(int sd,const struct sockaddr * addrs,int addrcnt,sctp_assoc_t * id)101 sctp_connectx(int sd, const struct sockaddr *addrs, int addrcnt,
102 sctp_assoc_t *id)
103 {
104 char *buf;
105 int i, ret, *aa;
106 char *cpto;
107 const struct sockaddr *at;
108 size_t len;
109
110 /* validate the address count and list */
111 if ((addrs == NULL) || (addrcnt <= 0)) {
112 errno = EINVAL;
113 return (-1);
114 }
115 if ((buf = malloc(sizeof(int) + (size_t)addrcnt * sizeof(struct sockaddr_in6))) == NULL) {
116 errno = E2BIG;
117 return (-1);
118 }
119 len = sizeof(int);
120 at = addrs;
121 cpto = buf + sizeof(int);
122 /* validate all the addresses and get the size */
123 for (i = 0; i < addrcnt; i++) {
124 switch (at->sa_family) {
125 case AF_INET:
126 if (at->sa_len != sizeof(struct sockaddr_in)) {
127 free(buf);
128 errno = EINVAL;
129 return (-1);
130 }
131 memcpy(cpto, at, sizeof(struct sockaddr_in));
132 cpto = ((caddr_t)cpto + sizeof(struct sockaddr_in));
133 len += sizeof(struct sockaddr_in);
134 break;
135 case AF_INET6:
136 if (at->sa_len != sizeof(struct sockaddr_in6)) {
137 free(buf);
138 errno = EINVAL;
139 return (-1);
140 }
141 if (IN6_IS_ADDR_V4MAPPED(&((struct sockaddr_in6 *)at)->sin6_addr)) {
142 in6_sin6_2_sin((struct sockaddr_in *)cpto, (struct sockaddr_in6 *)at);
143 cpto = ((caddr_t)cpto + sizeof(struct sockaddr_in));
144 len += sizeof(struct sockaddr_in);
145 } else {
146 memcpy(cpto, at, sizeof(struct sockaddr_in6));
147 cpto = ((caddr_t)cpto + sizeof(struct sockaddr_in6));
148 len += sizeof(struct sockaddr_in6);
149 }
150 break;
151 default:
152 free(buf);
153 errno = EINVAL;
154 return (-1);
155 }
156 at = (struct sockaddr *)((caddr_t)at + at->sa_len);
157 }
158 aa = (int *)buf;
159 *aa = addrcnt;
160 ret = setsockopt(sd, IPPROTO_SCTP, SCTP_CONNECT_X, (void *)buf,
161 (socklen_t)len);
162 if ((ret == 0) && (id != NULL)) {
163 *id = *(sctp_assoc_t *)buf;
164 }
165 free(buf);
166 return (ret);
167 }
168
169 int
sctp_bindx(int sd,struct sockaddr * addrs,int addrcnt,int flags)170 sctp_bindx(int sd, struct sockaddr *addrs, int addrcnt, int flags)
171 {
172 struct sockaddr *sa;
173 struct sockaddr_in *sin;
174 struct sockaddr_in6 *sin6;
175 int i;
176 uint16_t sport;
177 bool fix_port;
178
179 /* validate the flags */
180 if ((flags != SCTP_BINDX_ADD_ADDR) &&
181 (flags != SCTP_BINDX_REM_ADDR)) {
182 errno = EFAULT;
183 return (-1);
184 }
185 /* validate the address count and list */
186 if ((addrcnt <= 0) || (addrs == NULL)) {
187 errno = EINVAL;
188 return (-1);
189 }
190 sport = 0;
191 fix_port = false;
192 /* First pre-screen the addresses */
193 sa = addrs;
194 for (i = 0; i < addrcnt; i++) {
195 switch (sa->sa_family) {
196 case AF_INET:
197 if (sa->sa_len != sizeof(struct sockaddr_in)) {
198 errno = EINVAL;
199 return (-1);
200 }
201 sin = (struct sockaddr_in *)sa;
202 if (sin->sin_port) {
203 /* non-zero port, check or save */
204 if (sport) {
205 /* Check against our port */
206 if (sport != sin->sin_port) {
207 errno = EINVAL;
208 return (-1);
209 }
210 } else {
211 /* save off the port */
212 sport = sin->sin_port;
213 fix_port = (i > 0);
214 }
215 }
216 break;
217 case AF_INET6:
218 if (sa->sa_len != sizeof(struct sockaddr_in6)) {
219 errno = EINVAL;
220 return (-1);
221 }
222 sin6 = (struct sockaddr_in6 *)sa;
223 if (sin6->sin6_port) {
224 /* non-zero port, check or save */
225 if (sport) {
226 /* Check against our port */
227 if (sport != sin6->sin6_port) {
228 errno = EINVAL;
229 return (-1);
230 }
231 } else {
232 /* save off the port */
233 sport = sin6->sin6_port;
234 fix_port = (i > 0);
235 }
236 }
237 break;
238 default:
239 /* Invalid address family specified. */
240 errno = EAFNOSUPPORT;
241 return (-1);
242 }
243 sa = (struct sockaddr *)((caddr_t)sa + sa->sa_len);
244 }
245 sa = addrs;
246 for (i = 0; i < addrcnt; i++) {
247 /*
248 * Now, if there was a port mentioned, assure that the first
249 * address has that port to make sure it fails or succeeds
250 * correctly.
251 */
252 if (fix_port) {
253 switch (sa->sa_family) {
254 case AF_INET:
255 ((struct sockaddr_in *)sa)->sin_port = sport;
256 break;
257 case AF_INET6:
258 ((struct sockaddr_in6 *)sa)->sin6_port = sport;
259 break;
260 }
261 fix_port = false;
262 }
263 if (setsockopt(sd, IPPROTO_SCTP, flags, sa, sa->sa_len) != 0) {
264 return (-1);
265 }
266 sa = (struct sockaddr *)((caddr_t)sa + sa->sa_len);
267 }
268 return (0);
269 }
270
271 int
sctp_opt_info(int sd,sctp_assoc_t id,int opt,void * arg,socklen_t * size)272 sctp_opt_info(int sd, sctp_assoc_t id, int opt, void *arg, socklen_t *size)
273 {
274 if (arg == NULL) {
275 errno = EINVAL;
276 return (-1);
277 }
278 if ((id == SCTP_CURRENT_ASSOC) ||
279 (id == SCTP_ALL_ASSOC)) {
280 errno = EINVAL;
281 return (-1);
282 }
283 switch (opt) {
284 case SCTP_RTOINFO:
285 ((struct sctp_rtoinfo *)arg)->srto_assoc_id = id;
286 break;
287 case SCTP_ASSOCINFO:
288 ((struct sctp_assocparams *)arg)->sasoc_assoc_id = id;
289 break;
290 case SCTP_DEFAULT_SEND_PARAM:
291 ((struct sctp_assocparams *)arg)->sasoc_assoc_id = id;
292 break;
293 case SCTP_PRIMARY_ADDR:
294 ((struct sctp_setprim *)arg)->ssp_assoc_id = id;
295 break;
296 case SCTP_PEER_ADDR_PARAMS:
297 ((struct sctp_paddrparams *)arg)->spp_assoc_id = id;
298 break;
299 case SCTP_MAXSEG:
300 ((struct sctp_assoc_value *)arg)->assoc_id = id;
301 break;
302 case SCTP_AUTH_KEY:
303 ((struct sctp_authkey *)arg)->sca_assoc_id = id;
304 break;
305 case SCTP_AUTH_ACTIVE_KEY:
306 ((struct sctp_authkeyid *)arg)->scact_assoc_id = id;
307 break;
308 case SCTP_DELAYED_SACK:
309 ((struct sctp_sack_info *)arg)->sack_assoc_id = id;
310 break;
311 case SCTP_CONTEXT:
312 ((struct sctp_assoc_value *)arg)->assoc_id = id;
313 break;
314 case SCTP_STATUS:
315 ((struct sctp_status *)arg)->sstat_assoc_id = id;
316 break;
317 case SCTP_GET_PEER_ADDR_INFO:
318 ((struct sctp_paddrinfo *)arg)->spinfo_assoc_id = id;
319 break;
320 case SCTP_PEER_AUTH_CHUNKS:
321 ((struct sctp_authchunks *)arg)->gauth_assoc_id = id;
322 break;
323 case SCTP_LOCAL_AUTH_CHUNKS:
324 ((struct sctp_authchunks *)arg)->gauth_assoc_id = id;
325 break;
326 case SCTP_TIMEOUTS:
327 ((struct sctp_timeouts *)arg)->stimo_assoc_id = id;
328 break;
329 case SCTP_EVENT:
330 ((struct sctp_event *)arg)->se_assoc_id = id;
331 break;
332 case SCTP_DEFAULT_SNDINFO:
333 ((struct sctp_sndinfo *)arg)->snd_assoc_id = id;
334 break;
335 case SCTP_DEFAULT_PRINFO:
336 ((struct sctp_default_prinfo *)arg)->pr_assoc_id = id;
337 break;
338 case SCTP_PEER_ADDR_THLDS:
339 ((struct sctp_paddrthlds *)arg)->spt_assoc_id = id;
340 break;
341 case SCTP_REMOTE_UDP_ENCAPS_PORT:
342 ((struct sctp_udpencaps *)arg)->sue_assoc_id = id;
343 break;
344 case SCTP_ECN_SUPPORTED:
345 ((struct sctp_assoc_value *)arg)->assoc_id = id;
346 break;
347 case SCTP_PR_SUPPORTED:
348 ((struct sctp_assoc_value *)arg)->assoc_id = id;
349 break;
350 case SCTP_AUTH_SUPPORTED:
351 ((struct sctp_assoc_value *)arg)->assoc_id = id;
352 break;
353 case SCTP_ASCONF_SUPPORTED:
354 ((struct sctp_assoc_value *)arg)->assoc_id = id;
355 break;
356 case SCTP_RECONFIG_SUPPORTED:
357 ((struct sctp_assoc_value *)arg)->assoc_id = id;
358 break;
359 case SCTP_NRSACK_SUPPORTED:
360 ((struct sctp_assoc_value *)arg)->assoc_id = id;
361 break;
362 case SCTP_PKTDROP_SUPPORTED:
363 ((struct sctp_assoc_value *)arg)->assoc_id = id;
364 break;
365 case SCTP_MAX_BURST:
366 ((struct sctp_assoc_value *)arg)->assoc_id = id;
367 break;
368 case SCTP_ENABLE_STREAM_RESET:
369 ((struct sctp_assoc_value *)arg)->assoc_id = id;
370 break;
371 case SCTP_PR_STREAM_STATUS:
372 ((struct sctp_prstatus *)arg)->sprstat_assoc_id = id;
373 break;
374 case SCTP_PR_ASSOC_STATUS:
375 ((struct sctp_prstatus *)arg)->sprstat_assoc_id = id;
376 break;
377 case SCTP_MAX_CWND:
378 ((struct sctp_assoc_value *)arg)->assoc_id = id;
379 break;
380 default:
381 break;
382 }
383 return (getsockopt(sd, IPPROTO_SCTP, opt, arg, size));
384 }
385
386 int
sctp_getpaddrs(int sd,sctp_assoc_t id,struct sockaddr ** raddrs)387 sctp_getpaddrs(int sd, sctp_assoc_t id, struct sockaddr **raddrs)
388 {
389 struct sctp_getaddresses *addrs;
390 struct sockaddr *sa;
391 caddr_t lim;
392 socklen_t opt_len;
393 uint32_t size_of_addresses;
394 int cnt;
395
396 if (raddrs == NULL) {
397 errno = EFAULT;
398 return (-1);
399 }
400 /* When calling getsockopt(), the value contains the assoc_id. */
401 size_of_addresses = (uint32_t)id;
402 opt_len = (socklen_t)sizeof(uint32_t);
403 if (getsockopt(sd, IPPROTO_SCTP, SCTP_GET_REMOTE_ADDR_SIZE,
404 &size_of_addresses, &opt_len) != 0) {
405 if (errno == ENOENT) {
406 return (0);
407 } else {
408 return (-1);
409 }
410 }
411 opt_len = (socklen_t)((size_t)size_of_addresses + sizeof(struct sctp_getaddresses));
412 addrs = calloc(1, (size_t)opt_len);
413 if (addrs == NULL) {
414 errno = ENOMEM;
415 return (-1);
416 }
417 addrs->sget_assoc_id = id;
418 /* Now lets get the array of addresses */
419 if (getsockopt(sd, IPPROTO_SCTP, SCTP_GET_PEER_ADDRESSES,
420 addrs, &opt_len) != 0) {
421 free(addrs);
422 return (-1);
423 }
424 *raddrs = &addrs->addr[0].sa;
425 cnt = 0;
426 sa = &addrs->addr[0].sa;
427 lim = (caddr_t)addrs + opt_len;
428 while (((caddr_t)sa < lim) && (sa->sa_len > 0)) {
429 sa = (struct sockaddr *)((caddr_t)sa + sa->sa_len);
430 cnt++;
431 }
432 return (cnt);
433 }
434
435 void
sctp_freepaddrs(struct sockaddr * addrs)436 sctp_freepaddrs(struct sockaddr *addrs)
437 {
438 void *fr_addr;
439
440 /* Take away the hidden association id */
441 fr_addr = (void *)((caddr_t)addrs - offsetof(struct sctp_getaddresses, addr));
442 /* Now free it */
443 free(fr_addr);
444 }
445
446 int
sctp_getladdrs(int sd,sctp_assoc_t id,struct sockaddr ** raddrs)447 sctp_getladdrs(int sd, sctp_assoc_t id, struct sockaddr **raddrs)
448 {
449 struct sctp_getaddresses *addrs;
450 struct sockaddr *sa;
451 caddr_t lim;
452 socklen_t opt_len;
453 uint32_t size_of_addresses;
454 int cnt;
455
456 if (raddrs == NULL) {
457 errno = EFAULT;
458 return (-1);
459 }
460 size_of_addresses = 0;
461 opt_len = (socklen_t)sizeof(uint32_t);
462 if (getsockopt(sd, IPPROTO_SCTP, SCTP_GET_LOCAL_ADDR_SIZE,
463 &size_of_addresses, &opt_len) != 0) {
464 return (-1);
465 }
466 opt_len = (socklen_t)((size_t)size_of_addresses + sizeof(struct sctp_getaddresses));
467 addrs = calloc(1, (size_t)opt_len);
468 if (addrs == NULL) {
469 errno = ENOMEM;
470 return (-1);
471 }
472 addrs->sget_assoc_id = id;
473 /* Now lets get the array of addresses */
474 if (getsockopt(sd, IPPROTO_SCTP, SCTP_GET_LOCAL_ADDRESSES, addrs,
475 &opt_len) != 0) {
476 free(addrs);
477 return (-1);
478 }
479 if (size_of_addresses == 0) {
480 free(addrs);
481 return (0);
482 }
483 *raddrs = &addrs->addr[0].sa;
484 cnt = 0;
485 sa = &addrs->addr[0].sa;
486 lim = (caddr_t)addrs + opt_len;
487 while (((caddr_t)sa < lim) && (sa->sa_len > 0)) {
488 sa = (struct sockaddr *)((caddr_t)sa + sa->sa_len);
489 cnt++;
490 }
491 return (cnt);
492 }
493
494 void
sctp_freeladdrs(struct sockaddr * addrs)495 sctp_freeladdrs(struct sockaddr *addrs)
496 {
497 void *fr_addr;
498
499 /* Take away the hidden association id */
500 fr_addr = (void *)((caddr_t)addrs - offsetof(struct sctp_getaddresses, addr));
501 /* Now free it */
502 free(fr_addr);
503 }
504
505 ssize_t
sctp_sendmsg(int s,const void * data,size_t len,const struct sockaddr * to,socklen_t tolen,uint32_t ppid,uint32_t flags,uint16_t stream_no,uint32_t timetolive,uint32_t context)506 sctp_sendmsg(int s,
507 const void *data,
508 size_t len,
509 const struct sockaddr *to,
510 socklen_t tolen,
511 uint32_t ppid,
512 uint32_t flags,
513 uint16_t stream_no,
514 uint32_t timetolive,
515 uint32_t context)
516 {
517 #ifdef SYS_sctp_generic_sendmsg
518 struct sctp_sndrcvinfo sinfo;
519
520 memset(&sinfo, 0, sizeof(struct sctp_sndrcvinfo));
521 sinfo.sinfo_ppid = ppid;
522 sinfo.sinfo_flags = flags;
523 sinfo.sinfo_stream = stream_no;
524 sinfo.sinfo_timetolive = timetolive;
525 sinfo.sinfo_context = context;
526 sinfo.sinfo_assoc_id = 0;
527 return (syscall(SYS_sctp_generic_sendmsg, s,
528 data, len, to, tolen, &sinfo, 0));
529 #else
530 struct msghdr msg;
531 struct sctp_sndrcvinfo *sinfo;
532 struct iovec iov;
533 char cmsgbuf[CMSG_SPACE(sizeof(struct sctp_sndrcvinfo))];
534 struct cmsghdr *cmsg;
535 struct sockaddr *who = NULL;
536 union {
537 struct sockaddr_in in;
538 struct sockaddr_in6 in6;
539 } addr;
540
541 if ((tolen > 0) &&
542 ((to == NULL) || (tolen < sizeof(struct sockaddr)))) {
543 errno = EINVAL;
544 return (-1);
545 }
546 if ((to != NULL) && (tolen > 0)) {
547 switch (to->sa_family) {
548 case AF_INET:
549 if (tolen != sizeof(struct sockaddr_in)) {
550 errno = EINVAL;
551 return (-1);
552 }
553 if ((to->sa_len > 0) &&
554 (to->sa_len != sizeof(struct sockaddr_in))) {
555 errno = EINVAL;
556 return (-1);
557 }
558 memcpy(&addr, to, sizeof(struct sockaddr_in));
559 addr.in.sin_len = sizeof(struct sockaddr_in);
560 break;
561 case AF_INET6:
562 if (tolen != sizeof(struct sockaddr_in6)) {
563 errno = EINVAL;
564 return (-1);
565 }
566 if ((to->sa_len > 0) &&
567 (to->sa_len != sizeof(struct sockaddr_in6))) {
568 errno = EINVAL;
569 return (-1);
570 }
571 memcpy(&addr, to, sizeof(struct sockaddr_in6));
572 addr.in6.sin6_len = sizeof(struct sockaddr_in6);
573 break;
574 default:
575 errno = EAFNOSUPPORT;
576 return (-1);
577 }
578 who = (struct sockaddr *)&addr;
579 }
580
581 iov.iov_base = (char *)data;
582 iov.iov_len = len;
583
584 if (who) {
585 msg.msg_name = (caddr_t)who;
586 msg.msg_namelen = who->sa_len;
587 } else {
588 msg.msg_name = (caddr_t)NULL;
589 msg.msg_namelen = 0;
590 }
591 msg.msg_iov = &iov;
592 msg.msg_iovlen = 1;
593 msg.msg_control = cmsgbuf;
594 msg.msg_controllen = CMSG_SPACE(sizeof(struct sctp_sndrcvinfo));
595 msg.msg_flags = 0;
596 cmsg = (struct cmsghdr *)cmsgbuf;
597 cmsg->cmsg_level = IPPROTO_SCTP;
598 cmsg->cmsg_type = SCTP_SNDRCV;
599 cmsg->cmsg_len = CMSG_LEN(sizeof(struct sctp_sndrcvinfo));
600 sinfo = (struct sctp_sndrcvinfo *)CMSG_DATA(cmsg);
601 memset(sinfo, 0, sizeof(struct sctp_sndrcvinfo));
602 sinfo->sinfo_stream = stream_no;
603 sinfo->sinfo_ssn = 0;
604 sinfo->sinfo_flags = flags;
605 sinfo->sinfo_ppid = ppid;
606 sinfo->sinfo_context = context;
607 sinfo->sinfo_assoc_id = 0;
608 sinfo->sinfo_timetolive = timetolive;
609 return (sendmsg(s, &msg, 0));
610 #endif
611 }
612
613
614 sctp_assoc_t
sctp_getassocid(int sd,struct sockaddr * sa)615 sctp_getassocid(int sd, struct sockaddr *sa)
616 {
617 struct sctp_paddrinfo sp;
618 socklen_t siz;
619
620 /* First get the assoc id */
621 siz = sizeof(sp);
622 memset(&sp, 0, sizeof(sp));
623 memcpy((caddr_t)&sp.spinfo_address, sa, sa->sa_len);
624 if (getsockopt(sd, IPPROTO_SCTP,
625 SCTP_GET_PEER_ADDR_INFO, &sp, &siz) != 0) {
626 /* We depend on the fact that 0 can never be returned */
627 return ((sctp_assoc_t)0);
628 }
629 return (sp.spinfo_assoc_id);
630 }
631
632 ssize_t
sctp_send(int sd,const void * data,size_t len,const struct sctp_sndrcvinfo * sinfo,int flags)633 sctp_send(int sd, const void *data, size_t len,
634 const struct sctp_sndrcvinfo *sinfo,
635 int flags)
636 {
637
638 #ifdef SYS_sctp_generic_sendmsg
639 struct sockaddr *to = NULL;
640
641 return (syscall(SYS_sctp_generic_sendmsg, sd,
642 data, len, to, 0, sinfo, flags));
643 #else
644 struct msghdr msg;
645 struct iovec iov;
646 char cmsgbuf[CMSG_SPACE(sizeof(struct sctp_sndrcvinfo))];
647 struct cmsghdr *cmsg;
648
649 if (sinfo == NULL) {
650 errno = EINVAL;
651 return (-1);
652 }
653 iov.iov_base = (char *)data;
654 iov.iov_len = len;
655
656 msg.msg_name = NULL;
657 msg.msg_namelen = 0;
658 msg.msg_iov = &iov;
659 msg.msg_iovlen = 1;
660 msg.msg_control = cmsgbuf;
661 msg.msg_controllen = CMSG_SPACE(sizeof(struct sctp_sndrcvinfo));
662 msg.msg_flags = 0;
663 cmsg = (struct cmsghdr *)cmsgbuf;
664 cmsg->cmsg_level = IPPROTO_SCTP;
665 cmsg->cmsg_type = SCTP_SNDRCV;
666 cmsg->cmsg_len = CMSG_LEN(sizeof(struct sctp_sndrcvinfo));
667 memcpy(CMSG_DATA(cmsg), sinfo, sizeof(struct sctp_sndrcvinfo));
668 return (sendmsg(sd, &msg, flags));
669 #endif
670 }
671
672
673
674 ssize_t
sctp_sendx(int sd,const void * msg,size_t msg_len,struct sockaddr * addrs,int addrcnt,struct sctp_sndrcvinfo * sinfo,int flags)675 sctp_sendx(int sd, const void *msg, size_t msg_len,
676 struct sockaddr *addrs, int addrcnt,
677 struct sctp_sndrcvinfo *sinfo,
678 int flags)
679 {
680 struct sctp_sndrcvinfo __sinfo;
681 ssize_t ret;
682 int i, cnt, *aa, saved_errno;
683 char *buf;
684 int no_end_cx = 0;
685 size_t len, add_len;
686 struct sockaddr *at;
687
688 if (addrs == NULL) {
689 errno = EINVAL;
690 return (-1);
691 }
692 #ifdef SYS_sctp_generic_sendmsg
693 if (addrcnt == 1) {
694 socklen_t l;
695 ssize_t ret;
696
697 /*
698 * Quick way, we don't need to do a connectx so lets use the
699 * syscall directly.
700 */
701 l = addrs->sa_len;
702 ret = syscall(SYS_sctp_generic_sendmsg, sd,
703 msg, msg_len, addrs, l, sinfo, flags);
704 if ((ret >= 0) && (sinfo != NULL)) {
705 sinfo->sinfo_assoc_id = sctp_getassocid(sd, addrs);
706 }
707 return (ret);
708 }
709 #endif
710
711 len = sizeof(int);
712 at = addrs;
713 cnt = 0;
714 /* validate all the addresses and get the size */
715 for (i = 0; i < addrcnt; i++) {
716 if (at->sa_family == AF_INET) {
717 add_len = sizeof(struct sockaddr_in);
718 } else if (at->sa_family == AF_INET6) {
719 add_len = sizeof(struct sockaddr_in6);
720 } else {
721 errno = EINVAL;
722 return (-1);
723 }
724 len += add_len;
725 at = (struct sockaddr *)((caddr_t)at + add_len);
726 cnt++;
727 }
728 /* do we have any? */
729 if (cnt == 0) {
730 errno = EINVAL;
731 return (-1);
732 }
733 buf = malloc(len);
734 if (buf == NULL) {
735 errno = ENOMEM;
736 return (-1);
737 }
738 aa = (int *)buf;
739 *aa = cnt;
740 aa++;
741 memcpy((caddr_t)aa, addrs, (size_t)(len - sizeof(int)));
742 ret = setsockopt(sd, IPPROTO_SCTP, SCTP_CONNECT_X_DELAYED, (void *)buf,
743 (socklen_t)len);
744
745 free(buf);
746 if (ret != 0) {
747 if (errno == EALREADY) {
748 no_end_cx = 1;
749 goto continue_send;
750 }
751 return (ret);
752 }
753 continue_send:
754 if (sinfo == NULL) {
755 sinfo = &__sinfo;
756 memset(&__sinfo, 0, sizeof(__sinfo));
757 }
758 sinfo->sinfo_assoc_id = sctp_getassocid(sd, addrs);
759 if (sinfo->sinfo_assoc_id == 0) {
760 (void)setsockopt(sd, IPPROTO_SCTP, SCTP_CONNECT_X_COMPLETE, (void *)addrs,
761 (socklen_t)addrs->sa_len);
762 errno = ENOENT;
763 return (-1);
764 }
765 ret = sctp_send(sd, msg, msg_len, sinfo, flags);
766 saved_errno = errno;
767 if (no_end_cx == 0)
768 (void)setsockopt(sd, IPPROTO_SCTP, SCTP_CONNECT_X_COMPLETE, (void *)addrs,
769 (socklen_t)addrs->sa_len);
770
771 errno = saved_errno;
772 return (ret);
773 }
774
775 ssize_t
sctp_sendmsgx(int sd,const void * msg,size_t len,struct sockaddr * addrs,int addrcnt,uint32_t ppid,uint32_t flags,uint16_t stream_no,uint32_t timetolive,uint32_t context)776 sctp_sendmsgx(int sd,
777 const void *msg,
778 size_t len,
779 struct sockaddr *addrs,
780 int addrcnt,
781 uint32_t ppid,
782 uint32_t flags,
783 uint16_t stream_no,
784 uint32_t timetolive,
785 uint32_t context)
786 {
787 struct sctp_sndrcvinfo sinfo;
788
789 memset((void *)&sinfo, 0, sizeof(struct sctp_sndrcvinfo));
790 sinfo.sinfo_ppid = ppid;
791 sinfo.sinfo_flags = flags;
792 sinfo.sinfo_stream = stream_no;
793 sinfo.sinfo_timetolive = timetolive;
794 sinfo.sinfo_context = context;
795 return (sctp_sendx(sd, msg, len, addrs, addrcnt, &sinfo, 0));
796 }
797
798 ssize_t
sctp_recvmsg(int s,void * dbuf,size_t len,struct sockaddr * from,socklen_t * fromlen,struct sctp_sndrcvinfo * sinfo,int * msg_flags)799 sctp_recvmsg(int s,
800 void *dbuf,
801 size_t len,
802 struct sockaddr *from,
803 socklen_t *fromlen,
804 struct sctp_sndrcvinfo *sinfo,
805 int *msg_flags)
806 {
807 #ifdef SYS_sctp_generic_recvmsg
808 struct iovec iov;
809
810 iov.iov_base = dbuf;
811 iov.iov_len = len;
812 return (syscall(SYS_sctp_generic_recvmsg, s,
813 &iov, 1, from, fromlen, sinfo, msg_flags));
814 #else
815 ssize_t sz;
816 struct msghdr msg;
817 struct iovec iov;
818 char cmsgbuf[SCTP_CONTROL_VEC_SIZE_RCV];
819 struct cmsghdr *cmsg;
820
821 if (msg_flags == NULL) {
822 errno = EINVAL;
823 return (-1);
824 }
825 iov.iov_base = dbuf;
826 iov.iov_len = len;
827 msg.msg_name = (caddr_t)from;
828 if (fromlen == NULL)
829 msg.msg_namelen = 0;
830 else
831 msg.msg_namelen = *fromlen;
832 msg.msg_iov = &iov;
833 msg.msg_iovlen = 1;
834 msg.msg_control = cmsgbuf;
835 msg.msg_controllen = sizeof(cmsgbuf);
836 msg.msg_flags = 0;
837 sz = recvmsg(s, &msg, *msg_flags);
838 *msg_flags = msg.msg_flags;
839 if (sz <= 0) {
840 return (sz);
841 }
842 if (sinfo) {
843 sinfo->sinfo_assoc_id = 0;
844 }
845 if ((msg.msg_controllen > 0) && (sinfo != NULL)) {
846 /*
847 * parse through and see if we find the sctp_sndrcvinfo (if
848 * the user wants it).
849 */
850 for (cmsg = CMSG_FIRSTHDR(&msg); cmsg; cmsg = CMSG_NXTHDR(&msg, cmsg)) {
851 if (cmsg->cmsg_level != IPPROTO_SCTP) {
852 continue;
853 }
854 if (cmsg->cmsg_type == SCTP_SNDRCV) {
855 memcpy(sinfo, CMSG_DATA(cmsg), sizeof(struct sctp_sndrcvinfo));
856 break;
857 }
858 if (cmsg->cmsg_type == SCTP_EXTRCV) {
859 /*
860 * Let's hope that the user provided enough
861 * enough memory. At least he asked for more
862 * information.
863 */
864 memcpy(sinfo, CMSG_DATA(cmsg), sizeof(struct sctp_extrcvinfo));
865 break;
866 }
867 }
868 }
869 return (sz);
870 #endif
871 }
872
873 ssize_t
sctp_recvv(int sd,const struct iovec * iov,int iovlen,struct sockaddr * from,socklen_t * fromlen,void * info,socklen_t * infolen,unsigned int * infotype,int * flags)874 sctp_recvv(int sd,
875 const struct iovec *iov,
876 int iovlen,
877 struct sockaddr *from,
878 socklen_t *fromlen,
879 void *info,
880 socklen_t *infolen,
881 unsigned int *infotype,
882 int *flags)
883 {
884 char cmsgbuf[SCTP_CONTROL_VEC_SIZE_RCV];
885 struct msghdr msg;
886 struct cmsghdr *cmsg;
887 ssize_t ret;
888 struct sctp_rcvinfo *rcvinfo;
889 struct sctp_nxtinfo *nxtinfo;
890
891 if (((info != NULL) && (infolen == NULL)) ||
892 ((info == NULL) && (infolen != NULL) && (*infolen != 0)) ||
893 ((info != NULL) && (infotype == NULL))) {
894 errno = EINVAL;
895 return (-1);
896 }
897 if (infotype) {
898 *infotype = SCTP_RECVV_NOINFO;
899 }
900 msg.msg_name = from;
901 if (fromlen == NULL) {
902 msg.msg_namelen = 0;
903 } else {
904 msg.msg_namelen = *fromlen;
905 }
906 msg.msg_iov = (struct iovec *)iov;
907 msg.msg_iovlen = iovlen;
908 msg.msg_control = cmsgbuf;
909 msg.msg_controllen = sizeof(cmsgbuf);
910 msg.msg_flags = 0;
911 ret = recvmsg(sd, &msg, *flags);
912 *flags = msg.msg_flags;
913 if ((ret > 0) &&
914 (msg.msg_controllen > 0) &&
915 (infotype != NULL) &&
916 (infolen != NULL) &&
917 (*infolen > 0)) {
918 rcvinfo = NULL;
919 nxtinfo = NULL;
920 for (cmsg = CMSG_FIRSTHDR(&msg); cmsg; cmsg = CMSG_NXTHDR(&msg, cmsg)) {
921 if (cmsg->cmsg_level != IPPROTO_SCTP) {
922 continue;
923 }
924 if (cmsg->cmsg_type == SCTP_RCVINFO) {
925 rcvinfo = (struct sctp_rcvinfo *)CMSG_DATA(cmsg);
926 if (nxtinfo != NULL) {
927 break;
928 } else {
929 continue;
930 }
931 }
932 if (cmsg->cmsg_type == SCTP_NXTINFO) {
933 nxtinfo = (struct sctp_nxtinfo *)CMSG_DATA(cmsg);
934 if (rcvinfo != NULL) {
935 break;
936 } else {
937 continue;
938 }
939 }
940 }
941 if (rcvinfo != NULL) {
942 if ((nxtinfo != NULL) && (*infolen >= sizeof(struct sctp_recvv_rn))) {
943 struct sctp_recvv_rn *rn_info;
944
945 rn_info = (struct sctp_recvv_rn *)info;
946 rn_info->recvv_rcvinfo = *rcvinfo;
947 rn_info->recvv_nxtinfo = *nxtinfo;
948 *infolen = (socklen_t)sizeof(struct sctp_recvv_rn);
949 *infotype = SCTP_RECVV_RN;
950 } else if (*infolen >= sizeof(struct sctp_rcvinfo)) {
951 memcpy(info, rcvinfo, sizeof(struct sctp_rcvinfo));
952 *infolen = (socklen_t)sizeof(struct sctp_rcvinfo);
953 *infotype = SCTP_RECVV_RCVINFO;
954 }
955 } else if (nxtinfo != NULL) {
956 if (*infolen >= sizeof(struct sctp_nxtinfo)) {
957 memcpy(info, nxtinfo, sizeof(struct sctp_nxtinfo));
958 *infolen = (socklen_t)sizeof(struct sctp_nxtinfo);
959 *infotype = SCTP_RECVV_NXTINFO;
960 }
961 }
962 }
963 return (ret);
964 }
965
966 ssize_t
sctp_sendv(int sd,const struct iovec * iov,int iovcnt,struct sockaddr * addrs,int addrcnt,void * info,socklen_t infolen,unsigned int infotype,int flags)967 sctp_sendv(int sd,
968 const struct iovec *iov, int iovcnt,
969 struct sockaddr *addrs, int addrcnt,
970 void *info, socklen_t infolen, unsigned int infotype,
971 int flags)
972 {
973 ssize_t ret;
974 int i;
975 socklen_t addr_len;
976 struct msghdr msg;
977 in_port_t port;
978 struct sctp_sendv_spa *spa_info;
979 struct cmsghdr *cmsg;
980 char *cmsgbuf;
981 struct sockaddr *addr;
982 struct sockaddr_in *addr_in;
983 struct sockaddr_in6 *addr_in6;
984 sctp_assoc_t *assoc_id;
985
986 if ((addrcnt < 0) ||
987 (iovcnt < 0) ||
988 ((addrs == NULL) && (addrcnt > 0)) ||
989 ((addrs != NULL) && (addrcnt == 0)) ||
990 ((iov == NULL) && (iovcnt > 0)) ||
991 ((iov != NULL) && (iovcnt == 0))) {
992 errno = EINVAL;
993 return (-1);
994 }
995 cmsgbuf = malloc(CMSG_SPACE(sizeof(struct sctp_sndinfo)) +
996 CMSG_SPACE(sizeof(struct sctp_prinfo)) +
997 CMSG_SPACE(sizeof(struct sctp_authinfo)) +
998 (size_t)addrcnt * CMSG_SPACE(sizeof(struct in6_addr)));
999 if (cmsgbuf == NULL) {
1000 errno = ENOMEM;
1001 return (-1);
1002 }
1003 assoc_id = NULL;
1004 msg.msg_control = cmsgbuf;
1005 msg.msg_controllen = 0;
1006 cmsg = (struct cmsghdr *)cmsgbuf;
1007 switch (infotype) {
1008 case SCTP_SENDV_NOINFO:
1009 if ((infolen != 0) || (info != NULL)) {
1010 free(cmsgbuf);
1011 errno = EINVAL;
1012 return (-1);
1013 }
1014 break;
1015 case SCTP_SENDV_SNDINFO:
1016 if ((info == NULL) || (infolen < sizeof(struct sctp_sndinfo))) {
1017 free(cmsgbuf);
1018 errno = EINVAL;
1019 return (-1);
1020 }
1021 cmsg->cmsg_level = IPPROTO_SCTP;
1022 cmsg->cmsg_type = SCTP_SNDINFO;
1023 cmsg->cmsg_len = CMSG_LEN(sizeof(struct sctp_sndinfo));
1024 memcpy(CMSG_DATA(cmsg), info, sizeof(struct sctp_sndinfo));
1025 msg.msg_controllen += CMSG_SPACE(sizeof(struct sctp_sndinfo));
1026 cmsg = (struct cmsghdr *)((caddr_t)cmsg + CMSG_SPACE(sizeof(struct sctp_sndinfo)));
1027 assoc_id = &(((struct sctp_sndinfo *)info)->snd_assoc_id);
1028 break;
1029 case SCTP_SENDV_PRINFO:
1030 if ((info == NULL) || (infolen < sizeof(struct sctp_prinfo))) {
1031 free(cmsgbuf);
1032 errno = EINVAL;
1033 return (-1);
1034 }
1035 cmsg->cmsg_level = IPPROTO_SCTP;
1036 cmsg->cmsg_type = SCTP_PRINFO;
1037 cmsg->cmsg_len = CMSG_LEN(sizeof(struct sctp_prinfo));
1038 memcpy(CMSG_DATA(cmsg), info, sizeof(struct sctp_prinfo));
1039 msg.msg_controllen += CMSG_SPACE(sizeof(struct sctp_prinfo));
1040 cmsg = (struct cmsghdr *)((caddr_t)cmsg + CMSG_SPACE(sizeof(struct sctp_prinfo)));
1041 break;
1042 case SCTP_SENDV_AUTHINFO:
1043 if ((info == NULL) || (infolen < sizeof(struct sctp_authinfo))) {
1044 free(cmsgbuf);
1045 errno = EINVAL;
1046 return (-1);
1047 }
1048 cmsg->cmsg_level = IPPROTO_SCTP;
1049 cmsg->cmsg_type = SCTP_AUTHINFO;
1050 cmsg->cmsg_len = CMSG_LEN(sizeof(struct sctp_authinfo));
1051 memcpy(CMSG_DATA(cmsg), info, sizeof(struct sctp_authinfo));
1052 msg.msg_controllen += CMSG_SPACE(sizeof(struct sctp_authinfo));
1053 cmsg = (struct cmsghdr *)((caddr_t)cmsg + CMSG_SPACE(sizeof(struct sctp_authinfo)));
1054 break;
1055 case SCTP_SENDV_SPA:
1056 if ((info == NULL) || (infolen < sizeof(struct sctp_sendv_spa))) {
1057 free(cmsgbuf);
1058 errno = EINVAL;
1059 return (-1);
1060 }
1061 spa_info = (struct sctp_sendv_spa *)info;
1062 if (spa_info->sendv_flags & SCTP_SEND_SNDINFO_VALID) {
1063 cmsg->cmsg_level = IPPROTO_SCTP;
1064 cmsg->cmsg_type = SCTP_SNDINFO;
1065 cmsg->cmsg_len = CMSG_LEN(sizeof(struct sctp_sndinfo));
1066 memcpy(CMSG_DATA(cmsg), &spa_info->sendv_sndinfo, sizeof(struct sctp_sndinfo));
1067 msg.msg_controllen += CMSG_SPACE(sizeof(struct sctp_sndinfo));
1068 cmsg = (struct cmsghdr *)((caddr_t)cmsg + CMSG_SPACE(sizeof(struct sctp_sndinfo)));
1069 assoc_id = &(spa_info->sendv_sndinfo.snd_assoc_id);
1070 }
1071 if (spa_info->sendv_flags & SCTP_SEND_PRINFO_VALID) {
1072 cmsg->cmsg_level = IPPROTO_SCTP;
1073 cmsg->cmsg_type = SCTP_PRINFO;
1074 cmsg->cmsg_len = CMSG_LEN(sizeof(struct sctp_prinfo));
1075 memcpy(CMSG_DATA(cmsg), &spa_info->sendv_prinfo, sizeof(struct sctp_prinfo));
1076 msg.msg_controllen += CMSG_SPACE(sizeof(struct sctp_prinfo));
1077 cmsg = (struct cmsghdr *)((caddr_t)cmsg + CMSG_SPACE(sizeof(struct sctp_prinfo)));
1078 }
1079 if (spa_info->sendv_flags & SCTP_SEND_AUTHINFO_VALID) {
1080 cmsg->cmsg_level = IPPROTO_SCTP;
1081 cmsg->cmsg_type = SCTP_AUTHINFO;
1082 cmsg->cmsg_len = CMSG_LEN(sizeof(struct sctp_authinfo));
1083 memcpy(CMSG_DATA(cmsg), &spa_info->sendv_authinfo, sizeof(struct sctp_authinfo));
1084 msg.msg_controllen += CMSG_SPACE(sizeof(struct sctp_authinfo));
1085 cmsg = (struct cmsghdr *)((caddr_t)cmsg + CMSG_SPACE(sizeof(struct sctp_authinfo)));
1086 }
1087 break;
1088 default:
1089 free(cmsgbuf);
1090 errno = EINVAL;
1091 return (-1);
1092 }
1093 addr = addrs;
1094 msg.msg_name = NULL;
1095 msg.msg_namelen = 0;
1096
1097 for (i = 0; i < addrcnt; i++) {
1098 switch (addr->sa_family) {
1099 case AF_INET:
1100 addr_len = (socklen_t)sizeof(struct sockaddr_in);
1101 addr_in = (struct sockaddr_in *)addr;
1102 if (addr_in->sin_len != addr_len) {
1103 free(cmsgbuf);
1104 errno = EINVAL;
1105 return (-1);
1106 }
1107 if (i == 0) {
1108 port = addr_in->sin_port;
1109 } else {
1110 if (port == addr_in->sin_port) {
1111 cmsg->cmsg_level = IPPROTO_SCTP;
1112 cmsg->cmsg_type = SCTP_DSTADDRV4;
1113 cmsg->cmsg_len = CMSG_LEN(sizeof(struct in_addr));
1114 memcpy(CMSG_DATA(cmsg), &addr_in->sin_addr, sizeof(struct in_addr));
1115 msg.msg_controllen += CMSG_SPACE(sizeof(struct in_addr));
1116 cmsg = (struct cmsghdr *)((caddr_t)cmsg + CMSG_SPACE(sizeof(struct in_addr)));
1117 } else {
1118 free(cmsgbuf);
1119 errno = EINVAL;
1120 return (-1);
1121 }
1122 }
1123 break;
1124 case AF_INET6:
1125 addr_len = (socklen_t)sizeof(struct sockaddr_in6);
1126 addr_in6 = (struct sockaddr_in6 *)addr;
1127 if (addr_in6->sin6_len != addr_len) {
1128 free(cmsgbuf);
1129 errno = EINVAL;
1130 return (-1);
1131 }
1132 if (i == 0) {
1133 port = addr_in6->sin6_port;
1134 } else {
1135 if (port == addr_in6->sin6_port) {
1136 cmsg->cmsg_level = IPPROTO_SCTP;
1137 cmsg->cmsg_type = SCTP_DSTADDRV6;
1138 cmsg->cmsg_len = CMSG_LEN(sizeof(struct in6_addr));
1139 memcpy(CMSG_DATA(cmsg), &addr_in6->sin6_addr, sizeof(struct in6_addr));
1140 msg.msg_controllen += CMSG_SPACE(sizeof(struct in6_addr));
1141 cmsg = (struct cmsghdr *)((caddr_t)cmsg + CMSG_SPACE(sizeof(struct in6_addr)));
1142 } else {
1143 free(cmsgbuf);
1144 errno = EINVAL;
1145 return (-1);
1146 }
1147 }
1148 break;
1149 default:
1150 free(cmsgbuf);
1151 errno = EINVAL;
1152 return (-1);
1153 }
1154 if (i == 0) {
1155 msg.msg_name = addr;
1156 msg.msg_namelen = addr_len;
1157 }
1158 addr = (struct sockaddr *)((caddr_t)addr + addr_len);
1159 }
1160 if (msg.msg_controllen == 0) {
1161 msg.msg_control = NULL;
1162 }
1163 msg.msg_iov = (struct iovec *)iov;
1164 msg.msg_iovlen = iovcnt;
1165 msg.msg_flags = 0;
1166 ret = sendmsg(sd, &msg, flags);
1167 free(cmsgbuf);
1168 if ((ret >= 0) && (addrs != NULL) && (assoc_id != NULL)) {
1169 *assoc_id = sctp_getassocid(sd, addrs);
1170 }
1171 return (ret);
1172 }
1173
1174
1175 #if !defined(SYS_sctp_peeloff) && !defined(HAVE_SCTP_PEELOFF_SOCKOPT)
1176
1177 int
sctp_peeloff(int sd,sctp_assoc_t assoc_id)1178 sctp_peeloff(int sd, sctp_assoc_t assoc_id)
1179 {
1180 /* NOT supported, return invalid sd */
1181 errno = ENOTSUP;
1182 return (-1);
1183 }
1184
1185 #endif
1186 #if defined(SYS_sctp_peeloff) && !defined(HAVE_SCTP_PEELOFF_SOCKOPT)
1187 int
sctp_peeloff(int sd,sctp_assoc_t assoc_id)1188 sctp_peeloff(int sd, sctp_assoc_t assoc_id)
1189 {
1190 return (syscall(SYS_sctp_peeloff, sd, assoc_id));
1191 }
1192
1193 #endif
1194
1195 #undef SCTP_CONTROL_VEC_SIZE_RCV
1196