148f65f00SMichael Tuexen /*- 248f65f00SMichael Tuexen * Copyright (c) 2001-2007, by Cisco Systems, Inc. All rights reserved. 343dc9e2fSMichael Tuexen * Copyright (c) 2008-2012, by Randall Stewart. All rights reserved. 443dc9e2fSMichael Tuexen * Copyright (c) 2008-2012, by Michael Tuexen. All rights reserved. 5d6dda9b2SRandall Stewart * 6d6dda9b2SRandall Stewart * Redistribution and use in source and binary forms, with or without 748f65f00SMichael Tuexen * modification, are permitted provided that the following conditions are met: 8d6dda9b2SRandall Stewart * 948f65f00SMichael Tuexen * a) Redistributions of source code must retain the above copyright notice, 1048f65f00SMichael Tuexen * this list of conditions and the following disclaimer. 1148f65f00SMichael Tuexen * 1248f65f00SMichael Tuexen * b) Redistributions in binary form must reproduce the above copyright 1348f65f00SMichael Tuexen * notice, this list of conditions and the following disclaimer in 1448f65f00SMichael Tuexen * the documentation and/or other materials provided with the distribution. 1548f65f00SMichael Tuexen * 1648f65f00SMichael Tuexen * c) Neither the name of Cisco Systems, Inc. nor the names of its 1748f65f00SMichael Tuexen * contributors may be used to endorse or promote products derived 1848f65f00SMichael Tuexen * from this software without specific prior written permission. 1948f65f00SMichael Tuexen * 2048f65f00SMichael Tuexen * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS 2148f65f00SMichael Tuexen * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, 2248f65f00SMichael Tuexen * THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 2348f65f00SMichael Tuexen * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE 2448f65f00SMichael Tuexen * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR 2548f65f00SMichael Tuexen * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF 2648f65f00SMichael Tuexen * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS 2748f65f00SMichael Tuexen * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN 2848f65f00SMichael Tuexen * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) 2948f65f00SMichael Tuexen * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF 3048f65f00SMichael Tuexen * THE POSSIBILITY OF SUCH DAMAGE. 31d6dda9b2SRandall Stewart */ 3248f65f00SMichael Tuexen 33d6dda9b2SRandall Stewart #include <sys/cdefs.h> 34d6dda9b2SRandall Stewart __FBSDID("$FreeBSD$"); 3543dc9e2fSMichael Tuexen 36d6dda9b2SRandall Stewart #include <stdio.h> 37d6dda9b2SRandall Stewart #include <string.h> 38d6dda9b2SRandall Stewart #include <errno.h> 39d6dda9b2SRandall Stewart #include <stdlib.h> 40d6dda9b2SRandall Stewart #include <unistd.h> 41d6dda9b2SRandall Stewart #include <sys/types.h> 42d6dda9b2SRandall Stewart #include <sys/socket.h> 43d6dda9b2SRandall Stewart #include <sys/errno.h> 44d6dda9b2SRandall Stewart #include <sys/syscall.h> 45d6dda9b2SRandall Stewart #include <sys/uio.h> 46d6dda9b2SRandall Stewart #include <netinet/in.h> 47d6dda9b2SRandall Stewart #include <arpa/inet.h> 48d6dda9b2SRandall Stewart #include <netinet/sctp_uio.h> 49d6dda9b2SRandall Stewart #include <netinet/sctp.h> 50d6dda9b2SRandall Stewart 51d6dda9b2SRandall Stewart #ifndef IN6_IS_ADDR_V4MAPPED 52d6dda9b2SRandall Stewart #define IN6_IS_ADDR_V4MAPPED(a) \ 533d36ac98SRebecca Cran ((*(const uint32_t *)(const void *)(&(a)->s6_addr[0]) == 0) && \ 543d36ac98SRebecca Cran (*(const uint32_t *)(const void *)(&(a)->s6_addr[4]) == 0) && \ 553d36ac98SRebecca Cran (*(const uint32_t *)(const void *)(&(a)->s6_addr[8]) == ntohl(0x0000ffff))) 56d6dda9b2SRandall Stewart #endif 57d6dda9b2SRandall Stewart 58d6dda9b2SRandall Stewart #define SCTP_CONTROL_VEC_SIZE_RCV 16384 59d6dda9b2SRandall Stewart 60d6dda9b2SRandall Stewart 61d6dda9b2SRandall Stewart static void 62d6dda9b2SRandall Stewart in6_sin6_2_sin(struct sockaddr_in *sin, struct sockaddr_in6 *sin6) 63d6dda9b2SRandall Stewart { 64d6dda9b2SRandall Stewart bzero(sin, sizeof(*sin)); 65d6dda9b2SRandall Stewart sin->sin_len = sizeof(struct sockaddr_in); 66d6dda9b2SRandall Stewart sin->sin_family = AF_INET; 67d6dda9b2SRandall Stewart sin->sin_port = sin6->sin6_port; 68d6dda9b2SRandall Stewart sin->sin_addr.s_addr = sin6->sin6_addr.__u6_addr.__u6_addr32[3]; 69d6dda9b2SRandall Stewart } 70d6dda9b2SRandall Stewart 71d6dda9b2SRandall Stewart int 72d6dda9b2SRandall Stewart sctp_getaddrlen(sa_family_t family) 73d6dda9b2SRandall Stewart { 74e2e7c62eSMichael Tuexen int ret, sd; 75d6dda9b2SRandall Stewart socklen_t siz; 76d6dda9b2SRandall Stewart struct sctp_assoc_value av; 77d6dda9b2SRandall Stewart 78d6dda9b2SRandall Stewart av.assoc_value = family; 79d6dda9b2SRandall Stewart siz = sizeof(av); 80d6dda9b2SRandall Stewart #if defined(AF_INET) 81d6dda9b2SRandall Stewart sd = socket(AF_INET, SOCK_SEQPACKET, IPPROTO_SCTP); 82d6dda9b2SRandall Stewart #elif defined(AF_INET6) 83d6dda9b2SRandall Stewart sd = socket(AF_INET6, SOCK_SEQPACKET, IPPROTO_SCTP); 84e2e7c62eSMichael Tuexen #else 85e2e7c62eSMichael Tuexen sd = -1; 86d6dda9b2SRandall Stewart #endif 87d6dda9b2SRandall Stewart if (sd == -1) { 88a593094eSRandall Stewart return (-1); 89d6dda9b2SRandall Stewart } 90e2e7c62eSMichael Tuexen ret = getsockopt(sd, IPPROTO_SCTP, SCTP_GET_ADDR_LEN, &av, &siz); 91d6dda9b2SRandall Stewart close(sd); 92e2e7c62eSMichael Tuexen if (ret == 0) { 93d6dda9b2SRandall Stewart return ((int)av.assoc_value); 94d6dda9b2SRandall Stewart } else { 95a593094eSRandall Stewart return (-1); 96d6dda9b2SRandall Stewart } 97d6dda9b2SRandall Stewart } 98d6dda9b2SRandall Stewart 99d6dda9b2SRandall Stewart int 1002c356be2SRandall Stewart sctp_connectx(int sd, const struct sockaddr *addrs, int addrcnt, 1012c356be2SRandall Stewart sctp_assoc_t * id) 102d6dda9b2SRandall Stewart { 1037f15a8dfSMichael Tuexen char *buf; 10410e6d832SMichael Tuexen int i, ret, *aa; 105d6dda9b2SRandall Stewart char *cpto; 106d6dda9b2SRandall Stewart const struct sockaddr *at; 10710e6d832SMichael Tuexen size_t len; 108d6dda9b2SRandall Stewart 1092c356be2SRandall Stewart /* validate the address count and list */ 1102c356be2SRandall Stewart if ((addrs == NULL) || (addrcnt <= 0)) { 1112c356be2SRandall Stewart errno = EINVAL; 1122c356be2SRandall Stewart return (-1); 1132c356be2SRandall Stewart } 1147f15a8dfSMichael Tuexen if ((buf = malloc(sizeof(int) + (size_t)addrcnt * sizeof(struct sockaddr_in6))) == NULL) { 1157f15a8dfSMichael Tuexen errno = E2BIG; 1167f15a8dfSMichael Tuexen return (-1); 1177f15a8dfSMichael Tuexen } 11810e6d832SMichael Tuexen len = sizeof(int); 119d6dda9b2SRandall Stewart at = addrs; 1207f15a8dfSMichael Tuexen cpto = buf + sizeof(int); 121d6dda9b2SRandall Stewart /* validate all the addresses and get the size */ 122d6dda9b2SRandall Stewart for (i = 0; i < addrcnt; i++) { 12393409822SMichael Tuexen switch (at->sa_family) { 12493409822SMichael Tuexen case AF_INET: 12525d63f19SRandall Stewart if (at->sa_len != sizeof(struct sockaddr_in)) { 1267f15a8dfSMichael Tuexen free(buf); 12725d63f19SRandall Stewart errno = EINVAL; 12825d63f19SRandall Stewart return (-1); 12925d63f19SRandall Stewart } 13093409822SMichael Tuexen memcpy(cpto, at, sizeof(struct sockaddr_in)); 13193409822SMichael Tuexen cpto = ((caddr_t)cpto + sizeof(struct sockaddr_in)); 13293409822SMichael Tuexen len += sizeof(struct sockaddr_in); 13393409822SMichael Tuexen break; 13493409822SMichael Tuexen case AF_INET6: 13525d63f19SRandall Stewart if (at->sa_len != sizeof(struct sockaddr_in6)) { 1367f15a8dfSMichael Tuexen free(buf); 13725d63f19SRandall Stewart errno = EINVAL; 13825d63f19SRandall Stewart return (-1); 13925d63f19SRandall Stewart } 140d6dda9b2SRandall Stewart if (IN6_IS_ADDR_V4MAPPED(&((struct sockaddr_in6 *)at)->sin6_addr)) { 141d6dda9b2SRandall Stewart in6_sin6_2_sin((struct sockaddr_in *)cpto, (struct sockaddr_in6 *)at); 142d6dda9b2SRandall Stewart cpto = ((caddr_t)cpto + sizeof(struct sockaddr_in)); 143d6dda9b2SRandall Stewart len += sizeof(struct sockaddr_in); 144d6dda9b2SRandall Stewart } else { 14593409822SMichael Tuexen memcpy(cpto, at, sizeof(struct sockaddr_in6)); 14693409822SMichael Tuexen cpto = ((caddr_t)cpto + sizeof(struct sockaddr_in6)); 14793409822SMichael Tuexen len += sizeof(struct sockaddr_in6); 148d6dda9b2SRandall Stewart } 14993409822SMichael Tuexen break; 15093409822SMichael Tuexen default: 1517f15a8dfSMichael Tuexen free(buf); 152d6dda9b2SRandall Stewart errno = EINVAL; 153d6dda9b2SRandall Stewart return (-1); 154d6dda9b2SRandall Stewart } 1557f15a8dfSMichael Tuexen at = (struct sockaddr *)((caddr_t)at + at->sa_len); 156d6dda9b2SRandall Stewart } 157d6dda9b2SRandall Stewart aa = (int *)buf; 1587f15a8dfSMichael Tuexen *aa = addrcnt; 159d6dda9b2SRandall Stewart ret = setsockopt(sd, IPPROTO_SCTP, SCTP_CONNECT_X, (void *)buf, 160d6dda9b2SRandall Stewart (socklen_t) len); 1617f15a8dfSMichael Tuexen if ((ret == 0) && (id != NULL)) { 1627f15a8dfSMichael Tuexen *id = *(sctp_assoc_t *) buf; 16342551e99SRandall Stewart } 16410e6d832SMichael Tuexen free(buf); 165d6dda9b2SRandall Stewart return (ret); 166d6dda9b2SRandall Stewart } 167d6dda9b2SRandall Stewart 168d6dda9b2SRandall Stewart int 169d6dda9b2SRandall Stewart sctp_bindx(int sd, struct sockaddr *addrs, int addrcnt, int flags) 170d6dda9b2SRandall Stewart { 171d6dda9b2SRandall Stewart struct sctp_getaddresses *gaddrs; 172d6dda9b2SRandall Stewart struct sockaddr *sa; 1731b649582SRandall Stewart struct sockaddr_in *sin; 1741b649582SRandall Stewart struct sockaddr_in6 *sin6; 1755dc6a815SMichael Tuexen int i; 1765dc6a815SMichael Tuexen size_t argsz; 1771b649582SRandall Stewart uint16_t sport = 0; 178d6dda9b2SRandall Stewart 1792c356be2SRandall Stewart /* validate the flags */ 180d6dda9b2SRandall Stewart if ((flags != SCTP_BINDX_ADD_ADDR) && 181d6dda9b2SRandall Stewart (flags != SCTP_BINDX_REM_ADDR)) { 182d6dda9b2SRandall Stewart errno = EFAULT; 183d6dda9b2SRandall Stewart return (-1); 184d6dda9b2SRandall Stewart } 1852c356be2SRandall Stewart /* validate the address count and list */ 1862c356be2SRandall Stewart if ((addrcnt <= 0) || (addrs == NULL)) { 1872c356be2SRandall Stewart errno = EINVAL; 1882c356be2SRandall Stewart return (-1); 1892c356be2SRandall Stewart } 1901b649582SRandall Stewart /* First pre-screen the addresses */ 191d6dda9b2SRandall Stewart sa = addrs; 192d6dda9b2SRandall Stewart for (i = 0; i < addrcnt; i++) { 19393409822SMichael Tuexen switch (sa->sa_family) { 19493409822SMichael Tuexen case AF_INET: 19593409822SMichael Tuexen if (sa->sa_len != sizeof(struct sockaddr_in)) { 19693409822SMichael Tuexen errno = EINVAL; 19793409822SMichael Tuexen return (-1); 19893409822SMichael Tuexen } 1991b649582SRandall Stewart sin = (struct sockaddr_in *)sa; 2001b649582SRandall Stewart if (sin->sin_port) { 2011b649582SRandall Stewart /* non-zero port, check or save */ 2021b649582SRandall Stewart if (sport) { 2031b649582SRandall Stewart /* Check against our port */ 2041b649582SRandall Stewart if (sport != sin->sin_port) { 20593409822SMichael Tuexen errno = EINVAL; 20693409822SMichael Tuexen return (-1); 2071b649582SRandall Stewart } 2081b649582SRandall Stewart } else { 2091b649582SRandall Stewart /* save off the port */ 2101b649582SRandall Stewart sport = sin->sin_port; 2111b649582SRandall Stewart } 2121b649582SRandall Stewart } 21393409822SMichael Tuexen break; 21493409822SMichael Tuexen case AF_INET6: 21593409822SMichael Tuexen if (sa->sa_len != sizeof(struct sockaddr_in6)) { 21693409822SMichael Tuexen errno = EINVAL; 21793409822SMichael Tuexen return (-1); 21893409822SMichael Tuexen } 2191b649582SRandall Stewart sin6 = (struct sockaddr_in6 *)sa; 2201b649582SRandall Stewart if (sin6->sin6_port) { 2211b649582SRandall Stewart /* non-zero port, check or save */ 2221b649582SRandall Stewart if (sport) { 2231b649582SRandall Stewart /* Check against our port */ 2241b649582SRandall Stewart if (sport != sin6->sin6_port) { 22593409822SMichael Tuexen errno = EINVAL; 22693409822SMichael Tuexen return (-1); 2271b649582SRandall Stewart } 2281b649582SRandall Stewart } else { 2291b649582SRandall Stewart /* save off the port */ 2301b649582SRandall Stewart sport = sin6->sin6_port; 2311b649582SRandall Stewart } 2321b649582SRandall Stewart } 23393409822SMichael Tuexen break; 23493409822SMichael Tuexen default: 23593409822SMichael Tuexen /* Invalid address family specified. */ 2361dd0c905SMichael Tuexen errno = EAFNOSUPPORT; 23793409822SMichael Tuexen return (-1); 2381b649582SRandall Stewart } 2395dc6a815SMichael Tuexen sa = (struct sockaddr *)((caddr_t)sa + sa->sa_len); 2401b649582SRandall Stewart } 24193409822SMichael Tuexen argsz = sizeof(struct sctp_getaddresses) + 24293409822SMichael Tuexen sizeof(struct sockaddr_storage); 24393409822SMichael Tuexen if ((gaddrs = (struct sctp_getaddresses *)malloc(argsz)) == NULL) { 24493409822SMichael Tuexen errno = ENOMEM; 245d6dda9b2SRandall Stewart return (-1); 246d6dda9b2SRandall Stewart } 24793409822SMichael Tuexen sa = addrs; 24893409822SMichael Tuexen for (i = 0; i < addrcnt; i++) { 24925d63f19SRandall Stewart memset(gaddrs, 0, argsz); 25025d63f19SRandall Stewart gaddrs->sget_assoc_id = 0; 2515dc6a815SMichael Tuexen memcpy(gaddrs->addr, sa, sa->sa_len); 2521dd0c905SMichael Tuexen /* 2531dd0c905SMichael Tuexen * Now, if there was a port mentioned, assure that the first 2541dd0c905SMichael Tuexen * address has that port to make sure it fails or succeeds 2551dd0c905SMichael Tuexen * correctly. 2561dd0c905SMichael Tuexen */ 2571dd0c905SMichael Tuexen if ((i == 0) && (sport != 0)) { 2581dd0c905SMichael Tuexen switch (gaddrs->addr->sa_family) { 2591dd0c905SMichael Tuexen case AF_INET: 2601dd0c905SMichael Tuexen sin = (struct sockaddr_in *)gaddrs->addr; 2611dd0c905SMichael Tuexen sin->sin_port = sport; 2621dd0c905SMichael Tuexen break; 2631dd0c905SMichael Tuexen case AF_INET6: 2641dd0c905SMichael Tuexen sin6 = (struct sockaddr_in6 *)gaddrs->addr; 2651dd0c905SMichael Tuexen sin6->sin6_port = sport; 2661dd0c905SMichael Tuexen break; 2671dd0c905SMichael Tuexen } 2681dd0c905SMichael Tuexen } 26925d63f19SRandall Stewart if (setsockopt(sd, IPPROTO_SCTP, flags, gaddrs, 27025d63f19SRandall Stewart (socklen_t) argsz) != 0) { 271d6dda9b2SRandall Stewart free(gaddrs); 272d6dda9b2SRandall Stewart return (-1); 273d6dda9b2SRandall Stewart } 2745dc6a815SMichael Tuexen sa = (struct sockaddr *)((caddr_t)sa + sa->sa_len); 275d6dda9b2SRandall Stewart } 276d6dda9b2SRandall Stewart free(gaddrs); 277d6dda9b2SRandall Stewart return (0); 278d6dda9b2SRandall Stewart } 279d6dda9b2SRandall Stewart 280d6dda9b2SRandall Stewart int 281d6dda9b2SRandall Stewart sctp_opt_info(int sd, sctp_assoc_t id, int opt, void *arg, socklen_t * size) 282d6dda9b2SRandall Stewart { 283d6dda9b2SRandall Stewart if (arg == NULL) { 284602afc03SRandall Stewart errno = EINVAL; 285602afc03SRandall Stewart return (-1); 286d6dda9b2SRandall Stewart } 287b71f5853SMichael Tuexen if ((id == SCTP_CURRENT_ASSOC) || 288b71f5853SMichael Tuexen (id == SCTP_ALL_ASSOC)) { 289b71f5853SMichael Tuexen errno = EINVAL; 290b71f5853SMichael Tuexen return (-1); 291b71f5853SMichael Tuexen } 2921b649582SRandall Stewart switch (opt) { 2931b649582SRandall Stewart case SCTP_RTOINFO: 2941b649582SRandall Stewart ((struct sctp_rtoinfo *)arg)->srto_assoc_id = id; 2951b649582SRandall Stewart break; 2961b649582SRandall Stewart case SCTP_ASSOCINFO: 2971b649582SRandall Stewart ((struct sctp_assocparams *)arg)->sasoc_assoc_id = id; 2981b649582SRandall Stewart break; 2991b649582SRandall Stewart case SCTP_DEFAULT_SEND_PARAM: 3001b649582SRandall Stewart ((struct sctp_assocparams *)arg)->sasoc_assoc_id = id; 3011b649582SRandall Stewart break; 3021b649582SRandall Stewart case SCTP_PRIMARY_ADDR: 3031b649582SRandall Stewart ((struct sctp_setprim *)arg)->ssp_assoc_id = id; 3041b649582SRandall Stewart break; 3051b649582SRandall Stewart case SCTP_PEER_ADDR_PARAMS: 3061b649582SRandall Stewart ((struct sctp_paddrparams *)arg)->spp_assoc_id = id; 3071b649582SRandall Stewart break; 3081b649582SRandall Stewart case SCTP_MAXSEG: 3091b649582SRandall Stewart ((struct sctp_assoc_value *)arg)->assoc_id = id; 3101b649582SRandall Stewart break; 3111b649582SRandall Stewart case SCTP_AUTH_KEY: 3121b649582SRandall Stewart ((struct sctp_authkey *)arg)->sca_assoc_id = id; 3131b649582SRandall Stewart break; 3141b649582SRandall Stewart case SCTP_AUTH_ACTIVE_KEY: 3151b649582SRandall Stewart ((struct sctp_authkeyid *)arg)->scact_assoc_id = id; 3161b649582SRandall Stewart break; 3171b649582SRandall Stewart case SCTP_DELAYED_SACK: 3181b649582SRandall Stewart ((struct sctp_sack_info *)arg)->sack_assoc_id = id; 3191b649582SRandall Stewart break; 3201b649582SRandall Stewart case SCTP_CONTEXT: 3211b649582SRandall Stewart ((struct sctp_assoc_value *)arg)->assoc_id = id; 3221b649582SRandall Stewart break; 3231b649582SRandall Stewart case SCTP_STATUS: 3241b649582SRandall Stewart ((struct sctp_status *)arg)->sstat_assoc_id = id; 3251b649582SRandall Stewart break; 3261b649582SRandall Stewart case SCTP_GET_PEER_ADDR_INFO: 3271b649582SRandall Stewart ((struct sctp_paddrinfo *)arg)->spinfo_assoc_id = id; 3281b649582SRandall Stewart break; 3291b649582SRandall Stewart case SCTP_PEER_AUTH_CHUNKS: 3301b649582SRandall Stewart ((struct sctp_authchunks *)arg)->gauth_assoc_id = id; 3311b649582SRandall Stewart break; 3321b649582SRandall Stewart case SCTP_LOCAL_AUTH_CHUNKS: 3331b649582SRandall Stewart ((struct sctp_authchunks *)arg)->gauth_assoc_id = id; 3341b649582SRandall Stewart break; 33548f65f00SMichael Tuexen case SCTP_TIMEOUTS: 33648f65f00SMichael Tuexen ((struct sctp_timeouts *)arg)->stimo_assoc_id = id; 33748f65f00SMichael Tuexen break; 338e2e7c62eSMichael Tuexen case SCTP_EVENT: 339e2e7c62eSMichael Tuexen ((struct sctp_event *)arg)->se_assoc_id = id; 340e2e7c62eSMichael Tuexen break; 34113aae0bfSMichael Tuexen case SCTP_DEFAULT_SNDINFO: 34213aae0bfSMichael Tuexen ((struct sctp_sndinfo *)arg)->snd_assoc_id = id; 34313aae0bfSMichael Tuexen break; 34413aae0bfSMichael Tuexen case SCTP_DEFAULT_PRINFO: 34513aae0bfSMichael Tuexen ((struct sctp_default_prinfo *)arg)->pr_assoc_id = id; 34613aae0bfSMichael Tuexen break; 347ca85e948SMichael Tuexen case SCTP_PEER_ADDR_THLDS: 348ca85e948SMichael Tuexen ((struct sctp_paddrthlds *)arg)->spt_assoc_id = id; 349ca85e948SMichael Tuexen break; 350c9c58059SMichael Tuexen case SCTP_REMOTE_UDP_ENCAPS_PORT: 351c9c58059SMichael Tuexen ((struct sctp_udpencaps *)arg)->sue_assoc_id = id; 352c9c58059SMichael Tuexen break; 353f342355aSMichael Tuexen case SCTP_ECN_SUPPORTED: 354f342355aSMichael Tuexen ((struct sctp_assoc_value *)arg)->assoc_id = id; 355f342355aSMichael Tuexen break; 356dd973b0eSMichael Tuexen case SCTP_PR_SUPPORTED: 357dd973b0eSMichael Tuexen ((struct sctp_assoc_value *)arg)->assoc_id = id; 358dd973b0eSMichael Tuexen break; 359*caea9879SMichael Tuexen case SCTP_NRSACK_SUPPORTED: 360*caea9879SMichael Tuexen ((struct sctp_assoc_value *)arg)->assoc_id = id; 361*caea9879SMichael Tuexen break; 362bb2c20c1SMichael Tuexen case SCTP_MAX_BURST: 363bb2c20c1SMichael Tuexen ((struct sctp_assoc_value *)arg)->assoc_id = id; 364bb2c20c1SMichael Tuexen break; 3657c9b6492SMichael Tuexen case SCTP_ENABLE_STREAM_RESET: 3667c9b6492SMichael Tuexen ((struct sctp_assoc_value *)arg)->assoc_id = id; 3677c9b6492SMichael Tuexen break; 3681b649582SRandall Stewart default: 3691b649582SRandall Stewart break; 3701b649582SRandall Stewart } 371d6dda9b2SRandall Stewart return (getsockopt(sd, IPPROTO_SCTP, opt, arg, size)); 372d6dda9b2SRandall Stewart } 373d6dda9b2SRandall Stewart 374d6dda9b2SRandall Stewart int 375d6dda9b2SRandall Stewart sctp_getpaddrs(int sd, sctp_assoc_t id, struct sockaddr **raddrs) 376d6dda9b2SRandall Stewart { 377d6dda9b2SRandall Stewart struct sctp_getaddresses *addrs; 378d6dda9b2SRandall Stewart struct sockaddr *sa; 379d6dda9b2SRandall Stewart sctp_assoc_t asoc; 380d6dda9b2SRandall Stewart caddr_t lim; 3815dc6a815SMichael Tuexen socklen_t opt_len; 382d6dda9b2SRandall Stewart int cnt; 383d6dda9b2SRandall Stewart 384d6dda9b2SRandall Stewart if (raddrs == NULL) { 385d6dda9b2SRandall Stewart errno = EFAULT; 386d6dda9b2SRandall Stewart return (-1); 387d6dda9b2SRandall Stewart } 388d6dda9b2SRandall Stewart asoc = id; 3895dc6a815SMichael Tuexen opt_len = (socklen_t) sizeof(sctp_assoc_t); 390d6dda9b2SRandall Stewart if (getsockopt(sd, IPPROTO_SCTP, SCTP_GET_REMOTE_ADDR_SIZE, 3915dc6a815SMichael Tuexen &asoc, &opt_len) != 0) { 392d6dda9b2SRandall Stewart return (-1); 393d6dda9b2SRandall Stewart } 394d6dda9b2SRandall Stewart /* size required is returned in 'asoc' */ 3955dc6a815SMichael Tuexen opt_len = (socklen_t) ((size_t)asoc + sizeof(struct sctp_getaddresses)); 3965dc6a815SMichael Tuexen addrs = calloc(1, (size_t)opt_len); 397d6dda9b2SRandall Stewart if (addrs == NULL) { 3984ed0ebf6SMichael Tuexen errno = ENOMEM; 399d6dda9b2SRandall Stewart return (-1); 400d6dda9b2SRandall Stewart } 401d6dda9b2SRandall Stewart addrs->sget_assoc_id = id; 402d6dda9b2SRandall Stewart /* Now lets get the array of addresses */ 403d6dda9b2SRandall Stewart if (getsockopt(sd, IPPROTO_SCTP, SCTP_GET_PEER_ADDRESSES, 4045dc6a815SMichael Tuexen addrs, &opt_len) != 0) { 405d6dda9b2SRandall Stewart free(addrs); 406d6dda9b2SRandall Stewart return (-1); 407d6dda9b2SRandall Stewart } 4085dc6a815SMichael Tuexen *raddrs = (struct sockaddr *)&addrs->addr[0]; 409d6dda9b2SRandall Stewart cnt = 0; 410d6dda9b2SRandall Stewart sa = (struct sockaddr *)&addrs->addr[0]; 4115dc6a815SMichael Tuexen lim = (caddr_t)addrs + opt_len; 412d6dda9b2SRandall Stewart while (((caddr_t)sa < lim) && (sa->sa_len > 0)) { 413d6dda9b2SRandall Stewart sa = (struct sockaddr *)((caddr_t)sa + sa->sa_len); 414d6dda9b2SRandall Stewart cnt++; 415d6dda9b2SRandall Stewart } 416d6dda9b2SRandall Stewart return (cnt); 417d6dda9b2SRandall Stewart } 418d6dda9b2SRandall Stewart 419d6dda9b2SRandall Stewart void 420d6dda9b2SRandall Stewart sctp_freepaddrs(struct sockaddr *addrs) 421d6dda9b2SRandall Stewart { 422d6dda9b2SRandall Stewart void *fr_addr; 423d6dda9b2SRandall Stewart 4247f15a8dfSMichael Tuexen /* Take away the hidden association id */ 425d6dda9b2SRandall Stewart fr_addr = (void *)((caddr_t)addrs - sizeof(sctp_assoc_t)); 426d6dda9b2SRandall Stewart /* Now free it */ 427d6dda9b2SRandall Stewart free(fr_addr); 428d6dda9b2SRandall Stewart } 429d6dda9b2SRandall Stewart 430d6dda9b2SRandall Stewart int 431d6dda9b2SRandall Stewart sctp_getladdrs(int sd, sctp_assoc_t id, struct sockaddr **raddrs) 432d6dda9b2SRandall Stewart { 433d6dda9b2SRandall Stewart struct sctp_getaddresses *addrs; 434d6dda9b2SRandall Stewart caddr_t lim; 435d6dda9b2SRandall Stewart struct sockaddr *sa; 4365dc6a815SMichael Tuexen size_t size_of_addresses; 4375dc6a815SMichael Tuexen socklen_t opt_len; 438d6dda9b2SRandall Stewart int cnt; 439d6dda9b2SRandall Stewart 440d6dda9b2SRandall Stewart if (raddrs == NULL) { 441d6dda9b2SRandall Stewart errno = EFAULT; 442d6dda9b2SRandall Stewart return (-1); 443d6dda9b2SRandall Stewart } 444d6dda9b2SRandall Stewart size_of_addresses = 0; 4455dc6a815SMichael Tuexen opt_len = (socklen_t) sizeof(int); 446d6dda9b2SRandall Stewart if (getsockopt(sd, IPPROTO_SCTP, SCTP_GET_LOCAL_ADDR_SIZE, 4475dc6a815SMichael Tuexen &size_of_addresses, &opt_len) != 0) { 448d6dda9b2SRandall Stewart errno = ENOMEM; 449d6dda9b2SRandall Stewart return (-1); 450d6dda9b2SRandall Stewart } 451d6dda9b2SRandall Stewart if (size_of_addresses == 0) { 452d6dda9b2SRandall Stewart errno = ENOTCONN; 453d6dda9b2SRandall Stewart return (-1); 454d6dda9b2SRandall Stewart } 4555dc6a815SMichael Tuexen opt_len = (socklen_t) (size_of_addresses + 4565dc6a815SMichael Tuexen sizeof(struct sockaddr_storage) + 4575dc6a815SMichael Tuexen sizeof(struct sctp_getaddresses)); 4585dc6a815SMichael Tuexen addrs = calloc(1, (size_t)opt_len); 459d6dda9b2SRandall Stewart if (addrs == NULL) { 460d6dda9b2SRandall Stewart errno = ENOMEM; 461d6dda9b2SRandall Stewart return (-1); 462d6dda9b2SRandall Stewart } 463d6dda9b2SRandall Stewart addrs->sget_assoc_id = id; 464d6dda9b2SRandall Stewart /* Now lets get the array of addresses */ 465d6dda9b2SRandall Stewart if (getsockopt(sd, IPPROTO_SCTP, SCTP_GET_LOCAL_ADDRESSES, addrs, 4665dc6a815SMichael Tuexen &opt_len) != 0) { 467d6dda9b2SRandall Stewart free(addrs); 468d6dda9b2SRandall Stewart errno = ENOMEM; 469d6dda9b2SRandall Stewart return (-1); 470d6dda9b2SRandall Stewart } 4715dc6a815SMichael Tuexen *raddrs = (struct sockaddr *)&addrs->addr[0]; 472d6dda9b2SRandall Stewart cnt = 0; 473d6dda9b2SRandall Stewart sa = (struct sockaddr *)&addrs->addr[0]; 4745dc6a815SMichael Tuexen lim = (caddr_t)addrs + opt_len; 475d6dda9b2SRandall Stewart while (((caddr_t)sa < lim) && (sa->sa_len > 0)) { 476d6dda9b2SRandall Stewart sa = (struct sockaddr *)((caddr_t)sa + sa->sa_len); 477d6dda9b2SRandall Stewart cnt++; 478d6dda9b2SRandall Stewart } 479d6dda9b2SRandall Stewart return (cnt); 480d6dda9b2SRandall Stewart } 481d6dda9b2SRandall Stewart 482d6dda9b2SRandall Stewart void 483d6dda9b2SRandall Stewart sctp_freeladdrs(struct sockaddr *addrs) 484d6dda9b2SRandall Stewart { 485d6dda9b2SRandall Stewart void *fr_addr; 486d6dda9b2SRandall Stewart 4877f15a8dfSMichael Tuexen /* Take away the hidden association id */ 488d6dda9b2SRandall Stewart fr_addr = (void *)((caddr_t)addrs - sizeof(sctp_assoc_t)); 489d6dda9b2SRandall Stewart /* Now free it */ 490d6dda9b2SRandall Stewart free(fr_addr); 491d6dda9b2SRandall Stewart } 492d6dda9b2SRandall Stewart 493d6dda9b2SRandall Stewart ssize_t 494d6dda9b2SRandall Stewart sctp_sendmsg(int s, 495d6dda9b2SRandall Stewart const void *data, 496d6dda9b2SRandall Stewart size_t len, 497d6dda9b2SRandall Stewart const struct sockaddr *to, 498002b1f0bSRandall Stewart socklen_t tolen, 4993d36ac98SRebecca Cran uint32_t ppid, 5003d36ac98SRebecca Cran uint32_t flags, 5013d36ac98SRebecca Cran uint16_t stream_no, 5023d36ac98SRebecca Cran uint32_t timetolive, 5033d36ac98SRebecca Cran uint32_t context) 504d6dda9b2SRandall Stewart { 505d6dda9b2SRandall Stewart #ifdef SYS_sctp_generic_sendmsg 506d6dda9b2SRandall Stewart struct sctp_sndrcvinfo sinfo; 507d6dda9b2SRandall Stewart 508539bb45aSMichael Tuexen memset(&sinfo, 0, sizeof(struct sctp_sndrcvinfo)); 509d6dda9b2SRandall Stewart sinfo.sinfo_ppid = ppid; 510d6dda9b2SRandall Stewart sinfo.sinfo_flags = flags; 511d6dda9b2SRandall Stewart sinfo.sinfo_stream = stream_no; 512d6dda9b2SRandall Stewart sinfo.sinfo_timetolive = timetolive; 513d6dda9b2SRandall Stewart sinfo.sinfo_context = context; 514d6dda9b2SRandall Stewart sinfo.sinfo_assoc_id = 0; 515d6dda9b2SRandall Stewart return (syscall(SYS_sctp_generic_sendmsg, s, 516d6dda9b2SRandall Stewart data, len, to, tolen, &sinfo, 0)); 517d6dda9b2SRandall Stewart #else 518d6dda9b2SRandall Stewart struct msghdr msg; 5197f15a8dfSMichael Tuexen struct sctp_sndrcvinfo *sinfo; 52048f65f00SMichael Tuexen struct iovec iov; 5217f15a8dfSMichael Tuexen char cmsgbuf[CMSG_SPACE(sizeof(struct sctp_sndrcvinfo))]; 522d6dda9b2SRandall Stewart struct cmsghdr *cmsg; 523d6dda9b2SRandall Stewart struct sockaddr *who = NULL; 524d6dda9b2SRandall Stewart union { 525d6dda9b2SRandall Stewart struct sockaddr_in in; 526d6dda9b2SRandall Stewart struct sockaddr_in6 in6; 527d6dda9b2SRandall Stewart } addr; 528d6dda9b2SRandall Stewart 52948f65f00SMichael Tuexen if ((tolen > 0) && 53048f65f00SMichael Tuexen ((to == NULL) || (tolen < sizeof(struct sockaddr)))) { 531002b1f0bSRandall Stewart errno = EINVAL; 5324224e03aSMichael Tuexen return (-1); 533002b1f0bSRandall Stewart } 5347f15a8dfSMichael Tuexen if ((to != NULL) && (tolen > 0)) { 5357f15a8dfSMichael Tuexen switch (to->sa_family) { 5367f15a8dfSMichael Tuexen case AF_INET: 537002b1f0bSRandall Stewart if (tolen != sizeof(struct sockaddr_in)) { 538002b1f0bSRandall Stewart errno = EINVAL; 5394224e03aSMichael Tuexen return (-1); 540002b1f0bSRandall Stewart } 54148f65f00SMichael Tuexen if ((to->sa_len > 0) && 54248f65f00SMichael Tuexen (to->sa_len != sizeof(struct sockaddr_in))) { 543002b1f0bSRandall Stewart errno = EINVAL; 5444224e03aSMichael Tuexen return (-1); 545002b1f0bSRandall Stewart } 546d6dda9b2SRandall Stewart memcpy(&addr, to, sizeof(struct sockaddr_in)); 547d6dda9b2SRandall Stewart addr.in.sin_len = sizeof(struct sockaddr_in); 5487f15a8dfSMichael Tuexen break; 5497f15a8dfSMichael Tuexen case AF_INET6: 550002b1f0bSRandall Stewart if (tolen != sizeof(struct sockaddr_in6)) { 551002b1f0bSRandall Stewart errno = EINVAL; 5524224e03aSMichael Tuexen return (-1); 553002b1f0bSRandall Stewart } 55448f65f00SMichael Tuexen if ((to->sa_len > 0) && 55548f65f00SMichael Tuexen (to->sa_len != sizeof(struct sockaddr_in6))) { 556002b1f0bSRandall Stewart errno = EINVAL; 5574224e03aSMichael Tuexen return (-1); 558002b1f0bSRandall Stewart } 559d6dda9b2SRandall Stewart memcpy(&addr, to, sizeof(struct sockaddr_in6)); 560d6dda9b2SRandall Stewart addr.in6.sin6_len = sizeof(struct sockaddr_in6); 5617f15a8dfSMichael Tuexen break; 5627f15a8dfSMichael Tuexen default: 563002b1f0bSRandall Stewart errno = EAFNOSUPPORT; 5644224e03aSMichael Tuexen return (-1); 565d6dda9b2SRandall Stewart } 566d6dda9b2SRandall Stewart who = (struct sockaddr *)&addr; 567d6dda9b2SRandall Stewart } 56848f65f00SMichael Tuexen iov.iov_base = (char *)data; 56948f65f00SMichael Tuexen iov.iov_len = len; 570d6dda9b2SRandall Stewart 571002b1f0bSRandall Stewart if (who) { 572d6dda9b2SRandall Stewart msg.msg_name = (caddr_t)who; 573d6dda9b2SRandall Stewart msg.msg_namelen = who->sa_len; 574d6dda9b2SRandall Stewart } else { 575d6dda9b2SRandall Stewart msg.msg_name = (caddr_t)NULL; 576d6dda9b2SRandall Stewart msg.msg_namelen = 0; 577d6dda9b2SRandall Stewart } 57848f65f00SMichael Tuexen msg.msg_iov = &iov; 579d6dda9b2SRandall Stewart msg.msg_iovlen = 1; 5807f15a8dfSMichael Tuexen msg.msg_control = cmsgbuf; 5817f15a8dfSMichael Tuexen msg.msg_controllen = CMSG_SPACE(sizeof(struct sctp_sndrcvinfo)); 5827f15a8dfSMichael Tuexen cmsg = (struct cmsghdr *)cmsgbuf; 583d6dda9b2SRandall Stewart cmsg->cmsg_level = IPPROTO_SCTP; 584d6dda9b2SRandall Stewart cmsg->cmsg_type = SCTP_SNDRCV; 585d6dda9b2SRandall Stewart cmsg->cmsg_len = CMSG_LEN(sizeof(struct sctp_sndrcvinfo)); 5867f15a8dfSMichael Tuexen sinfo = (struct sctp_sndrcvinfo *)CMSG_DATA(cmsg); 5877f15a8dfSMichael Tuexen sinfo->sinfo_stream = stream_no; 5887f15a8dfSMichael Tuexen sinfo->sinfo_ssn = 0; 5897f15a8dfSMichael Tuexen sinfo->sinfo_flags = flags; 5907f15a8dfSMichael Tuexen sinfo->sinfo_ppid = ppid; 5917f15a8dfSMichael Tuexen sinfo->sinfo_context = context; 5927f15a8dfSMichael Tuexen sinfo->sinfo_assoc_id = 0; 5937f15a8dfSMichael Tuexen sinfo->sinfo_timetolive = timetolive; 5947f15a8dfSMichael Tuexen return (sendmsg(s, &msg, 0)); 595d6dda9b2SRandall Stewart #endif 596d6dda9b2SRandall Stewart } 597d6dda9b2SRandall Stewart 598d6dda9b2SRandall Stewart 599d6dda9b2SRandall Stewart sctp_assoc_t 600d6dda9b2SRandall Stewart sctp_getassocid(int sd, struct sockaddr *sa) 601d6dda9b2SRandall Stewart { 602b54d3a6cSRandall Stewart struct sctp_paddrinfo sp; 603066f54d8SCraig Rodrigues socklen_t siz; 604d6dda9b2SRandall Stewart 605d6dda9b2SRandall Stewart /* First get the assoc id */ 606b54d3a6cSRandall Stewart siz = sizeof(sp); 607d6dda9b2SRandall Stewart memset(&sp, 0, sizeof(sp)); 608b54d3a6cSRandall Stewart memcpy((caddr_t)&sp.spinfo_address, sa, sa->sa_len); 609d6dda9b2SRandall Stewart if (getsockopt(sd, IPPROTO_SCTP, 610b54d3a6cSRandall Stewart SCTP_GET_PEER_ADDR_INFO, &sp, &siz) != 0) { 6117f15a8dfSMichael Tuexen /* We depend on the fact that 0 can never be returned */ 612d6dda9b2SRandall Stewart return ((sctp_assoc_t) 0); 613d6dda9b2SRandall Stewart } 614b54d3a6cSRandall Stewart return (sp.spinfo_assoc_id); 615d6dda9b2SRandall Stewart } 616d6dda9b2SRandall Stewart 617d6dda9b2SRandall Stewart ssize_t 618d6dda9b2SRandall Stewart sctp_send(int sd, const void *data, size_t len, 619d6dda9b2SRandall Stewart const struct sctp_sndrcvinfo *sinfo, 620d6dda9b2SRandall Stewart int flags) 621d6dda9b2SRandall Stewart { 622d6dda9b2SRandall Stewart 623d6dda9b2SRandall Stewart #ifdef SYS_sctp_generic_sendmsg 624d6dda9b2SRandall Stewart struct sockaddr *to = NULL; 625d6dda9b2SRandall Stewart 626d6dda9b2SRandall Stewart return (syscall(SYS_sctp_generic_sendmsg, sd, 627d6dda9b2SRandall Stewart data, len, to, 0, sinfo, flags)); 628d6dda9b2SRandall Stewart #else 629d6dda9b2SRandall Stewart struct msghdr msg; 63048f65f00SMichael Tuexen struct iovec iov; 6317f15a8dfSMichael Tuexen char cmsgbuf[CMSG_SPACE(sizeof(struct sctp_sndrcvinfo))]; 632d6dda9b2SRandall Stewart struct cmsghdr *cmsg; 633d6dda9b2SRandall Stewart 634d6dda9b2SRandall Stewart if (sinfo == NULL) { 635b54d3a6cSRandall Stewart errno = EINVAL; 636b54d3a6cSRandall Stewart return (-1); 637d6dda9b2SRandall Stewart } 63848f65f00SMichael Tuexen iov.iov_base = (char *)data; 63948f65f00SMichael Tuexen iov.iov_len = len; 640d6dda9b2SRandall Stewart 6417f15a8dfSMichael Tuexen msg.msg_name = NULL; 642d6dda9b2SRandall Stewart msg.msg_namelen = 0; 64348f65f00SMichael Tuexen msg.msg_iov = &iov; 644d6dda9b2SRandall Stewart msg.msg_iovlen = 1; 6457f15a8dfSMichael Tuexen msg.msg_control = cmsgbuf; 6467f15a8dfSMichael Tuexen msg.msg_controllen = CMSG_SPACE(sizeof(struct sctp_sndrcvinfo)); 6477f15a8dfSMichael Tuexen cmsg = (struct cmsghdr *)cmsgbuf; 648d6dda9b2SRandall Stewart cmsg->cmsg_level = IPPROTO_SCTP; 649d6dda9b2SRandall Stewart cmsg->cmsg_type = SCTP_SNDRCV; 650d6dda9b2SRandall Stewart cmsg->cmsg_len = CMSG_LEN(sizeof(struct sctp_sndrcvinfo)); 6517f15a8dfSMichael Tuexen memcpy(CMSG_DATA(cmsg), sinfo, sizeof(struct sctp_sndrcvinfo)); 6527f15a8dfSMichael Tuexen return (sendmsg(sd, &msg, flags)); 653d6dda9b2SRandall Stewart #endif 654d6dda9b2SRandall Stewart } 655d6dda9b2SRandall Stewart 656d6dda9b2SRandall Stewart 657d6dda9b2SRandall Stewart 658d6dda9b2SRandall Stewart ssize_t 659d6dda9b2SRandall Stewart sctp_sendx(int sd, const void *msg, size_t msg_len, 660d6dda9b2SRandall Stewart struct sockaddr *addrs, int addrcnt, 661d6dda9b2SRandall Stewart struct sctp_sndrcvinfo *sinfo, 662d6dda9b2SRandall Stewart int flags) 663d6dda9b2SRandall Stewart { 664335a2d00SRandall Stewart struct sctp_sndrcvinfo __sinfo; 665d6dda9b2SRandall Stewart ssize_t ret; 666d6dda9b2SRandall Stewart int i, cnt, *aa, saved_errno; 667d6dda9b2SRandall Stewart char *buf; 6685dc6a815SMichael Tuexen int no_end_cx = 0; 6695dc6a815SMichael Tuexen size_t len, add_len; 670d6dda9b2SRandall Stewart struct sockaddr *at; 671d6dda9b2SRandall Stewart 6721b649582SRandall Stewart if (addrs == NULL) { 6731b649582SRandall Stewart errno = EINVAL; 6741b649582SRandall Stewart return (-1); 6751b649582SRandall Stewart } 676804cf641SRandall Stewart #ifdef SYS_sctp_generic_sendmsg 67748f65f00SMichael Tuexen if (addrcnt == 1) { 678804cf641SRandall Stewart socklen_t l; 679804cf641SRandall Stewart 680804cf641SRandall Stewart /* 681804cf641SRandall Stewart * Quick way, we don't need to do a connectx so lets use the 682804cf641SRandall Stewart * syscall directly. 683804cf641SRandall Stewart */ 684804cf641SRandall Stewart l = addrs->sa_len; 685804cf641SRandall Stewart return (syscall(SYS_sctp_generic_sendmsg, sd, 686804cf641SRandall Stewart msg, msg_len, addrs, l, sinfo, flags)); 687804cf641SRandall Stewart } 688804cf641SRandall Stewart #endif 689b54d3a6cSRandall Stewart 690d6dda9b2SRandall Stewart len = sizeof(int); 691d6dda9b2SRandall Stewart at = addrs; 692d6dda9b2SRandall Stewart cnt = 0; 693d6dda9b2SRandall Stewart /* validate all the addresses and get the size */ 694d6dda9b2SRandall Stewart for (i = 0; i < addrcnt; i++) { 695d6dda9b2SRandall Stewart if (at->sa_family == AF_INET) { 696d6dda9b2SRandall Stewart add_len = sizeof(struct sockaddr_in); 697d6dda9b2SRandall Stewart } else if (at->sa_family == AF_INET6) { 698d6dda9b2SRandall Stewart add_len = sizeof(struct sockaddr_in6); 699d6dda9b2SRandall Stewart } else { 700d6dda9b2SRandall Stewart errno = EINVAL; 701d6dda9b2SRandall Stewart return (-1); 702d6dda9b2SRandall Stewart } 703d6dda9b2SRandall Stewart len += add_len; 704d6dda9b2SRandall Stewart at = (struct sockaddr *)((caddr_t)at + add_len); 705d6dda9b2SRandall Stewart cnt++; 706d6dda9b2SRandall Stewart } 707d6dda9b2SRandall Stewart /* do we have any? */ 708d6dda9b2SRandall Stewart if (cnt == 0) { 709d6dda9b2SRandall Stewart errno = EINVAL; 710d6dda9b2SRandall Stewart return (-1); 711d6dda9b2SRandall Stewart } 712d6dda9b2SRandall Stewart buf = malloc(len); 713d6dda9b2SRandall Stewart if (buf == NULL) { 7144ed0ebf6SMichael Tuexen errno = ENOMEM; 715b54d3a6cSRandall Stewart return (-1); 716d6dda9b2SRandall Stewart } 717d6dda9b2SRandall Stewart aa = (int *)buf; 718d6dda9b2SRandall Stewart *aa = cnt; 719d6dda9b2SRandall Stewart aa++; 7205dc6a815SMichael Tuexen memcpy((caddr_t)aa, addrs, (size_t)(len - sizeof(int))); 721d6dda9b2SRandall Stewart ret = setsockopt(sd, IPPROTO_SCTP, SCTP_CONNECT_X_DELAYED, (void *)buf, 722d6dda9b2SRandall Stewart (socklen_t) len); 723d6dda9b2SRandall Stewart 724d6dda9b2SRandall Stewart free(buf); 725d6dda9b2SRandall Stewart if (ret != 0) { 726d6dda9b2SRandall Stewart if (errno == EALREADY) { 727ecf4b67aSRebecca Cran no_end_cx = 1; 728d6dda9b2SRandall Stewart goto continue_send; 729d6dda9b2SRandall Stewart } 730d6dda9b2SRandall Stewart return (ret); 731d6dda9b2SRandall Stewart } 732d6dda9b2SRandall Stewart continue_send: 733335a2d00SRandall Stewart if (sinfo == NULL) { 734335a2d00SRandall Stewart sinfo = &__sinfo; 735335a2d00SRandall Stewart memset(&__sinfo, 0, sizeof(__sinfo)); 736335a2d00SRandall Stewart } 737d6dda9b2SRandall Stewart sinfo->sinfo_assoc_id = sctp_getassocid(sd, addrs); 738d6dda9b2SRandall Stewart if (sinfo->sinfo_assoc_id == 0) { 739d6dda9b2SRandall Stewart (void)setsockopt(sd, IPPROTO_SCTP, SCTP_CONNECT_X_COMPLETE, (void *)addrs, 740d6dda9b2SRandall Stewart (socklen_t) addrs->sa_len); 741d6dda9b2SRandall Stewart errno = ENOENT; 742d6dda9b2SRandall Stewart return (-1); 743d6dda9b2SRandall Stewart } 744d6dda9b2SRandall Stewart ret = sctp_send(sd, msg, msg_len, sinfo, flags); 745d6dda9b2SRandall Stewart saved_errno = errno; 746d6dda9b2SRandall Stewart if (no_end_cx == 0) 747d6dda9b2SRandall Stewart (void)setsockopt(sd, IPPROTO_SCTP, SCTP_CONNECT_X_COMPLETE, (void *)addrs, 748d6dda9b2SRandall Stewart (socklen_t) addrs->sa_len); 749d6dda9b2SRandall Stewart 750d6dda9b2SRandall Stewart errno = saved_errno; 751d6dda9b2SRandall Stewart return (ret); 752d6dda9b2SRandall Stewart } 753d6dda9b2SRandall Stewart 754d6dda9b2SRandall Stewart ssize_t 755d6dda9b2SRandall Stewart sctp_sendmsgx(int sd, 756d6dda9b2SRandall Stewart const void *msg, 757d6dda9b2SRandall Stewart size_t len, 758d6dda9b2SRandall Stewart struct sockaddr *addrs, 759d6dda9b2SRandall Stewart int addrcnt, 7603d36ac98SRebecca Cran uint32_t ppid, 7613d36ac98SRebecca Cran uint32_t flags, 7623d36ac98SRebecca Cran uint16_t stream_no, 7633d36ac98SRebecca Cran uint32_t timetolive, 7643d36ac98SRebecca Cran uint32_t context) 765d6dda9b2SRandall Stewart { 766d6dda9b2SRandall Stewart struct sctp_sndrcvinfo sinfo; 767d6dda9b2SRandall Stewart 768d6dda9b2SRandall Stewart memset((void *)&sinfo, 0, sizeof(struct sctp_sndrcvinfo)); 769d6dda9b2SRandall Stewart sinfo.sinfo_ppid = ppid; 770d6dda9b2SRandall Stewart sinfo.sinfo_flags = flags; 771d6dda9b2SRandall Stewart sinfo.sinfo_ssn = stream_no; 772d6dda9b2SRandall Stewart sinfo.sinfo_timetolive = timetolive; 773d6dda9b2SRandall Stewart sinfo.sinfo_context = context; 7744224e03aSMichael Tuexen return (sctp_sendx(sd, msg, len, addrs, addrcnt, &sinfo, 0)); 775d6dda9b2SRandall Stewart } 776d6dda9b2SRandall Stewart 777d6dda9b2SRandall Stewart ssize_t 778d6dda9b2SRandall Stewart sctp_recvmsg(int s, 779d6dda9b2SRandall Stewart void *dbuf, 780d6dda9b2SRandall Stewart size_t len, 781d6dda9b2SRandall Stewart struct sockaddr *from, 782d6dda9b2SRandall Stewart socklen_t * fromlen, 783d6dda9b2SRandall Stewart struct sctp_sndrcvinfo *sinfo, 784d6dda9b2SRandall Stewart int *msg_flags) 785d6dda9b2SRandall Stewart { 786d6dda9b2SRandall Stewart #ifdef SYS_sctp_generic_recvmsg 78748f65f00SMichael Tuexen struct iovec iov; 788d6dda9b2SRandall Stewart 78948f65f00SMichael Tuexen iov.iov_base = dbuf; 79048f65f00SMichael Tuexen iov.iov_len = len; 791d6dda9b2SRandall Stewart return (syscall(SYS_sctp_generic_recvmsg, s, 79248f65f00SMichael Tuexen &iov, 1, from, fromlen, sinfo, msg_flags)); 793d6dda9b2SRandall Stewart #else 794d6dda9b2SRandall Stewart ssize_t sz; 795d6dda9b2SRandall Stewart struct msghdr msg; 79648f65f00SMichael Tuexen struct iovec iov; 7977f15a8dfSMichael Tuexen char cmsgbuf[SCTP_CONTROL_VEC_SIZE_RCV]; 798d6dda9b2SRandall Stewart struct cmsghdr *cmsg; 799d6dda9b2SRandall Stewart 800d6dda9b2SRandall Stewart if (msg_flags == NULL) { 801d6dda9b2SRandall Stewart errno = EINVAL; 802d6dda9b2SRandall Stewart return (-1); 803d6dda9b2SRandall Stewart } 804d6dda9b2SRandall Stewart msg.msg_flags = 0; 80548f65f00SMichael Tuexen iov.iov_base = dbuf; 80648f65f00SMichael Tuexen iov.iov_len = len; 807d6dda9b2SRandall Stewart msg.msg_name = (caddr_t)from; 808d6dda9b2SRandall Stewart if (fromlen == NULL) 809d6dda9b2SRandall Stewart msg.msg_namelen = 0; 810d6dda9b2SRandall Stewart else 811d6dda9b2SRandall Stewart msg.msg_namelen = *fromlen; 81248f65f00SMichael Tuexen msg.msg_iov = &iov; 813d6dda9b2SRandall Stewart msg.msg_iovlen = 1; 8147f15a8dfSMichael Tuexen msg.msg_control = cmsgbuf; 8157f15a8dfSMichael Tuexen msg.msg_controllen = sizeof(cmsgbuf); 8162c356be2SRandall Stewart sz = recvmsg(s, &msg, *msg_flags); 81748f65f00SMichael Tuexen *msg_flags = msg.msg_flags; 81848f65f00SMichael Tuexen if (sz <= 0) { 819d6dda9b2SRandall Stewart return (sz); 82048f65f00SMichael Tuexen } 82148f65f00SMichael Tuexen if (sinfo) { 822d6dda9b2SRandall Stewart sinfo->sinfo_assoc_id = 0; 82348f65f00SMichael Tuexen } 8247f15a8dfSMichael Tuexen if ((msg.msg_controllen > 0) && (sinfo != NULL)) { 825d6dda9b2SRandall Stewart /* 826d6dda9b2SRandall Stewart * parse through and see if we find the sctp_sndrcvinfo (if 827d6dda9b2SRandall Stewart * the user wants it). 828d6dda9b2SRandall Stewart */ 8297f15a8dfSMichael Tuexen for (cmsg = CMSG_FIRSTHDR(&msg); cmsg; cmsg = CMSG_NXTHDR(&msg, cmsg)) { 8307f15a8dfSMichael Tuexen if (cmsg->cmsg_level != IPPROTO_SCTP) { 8317f15a8dfSMichael Tuexen continue; 832d6dda9b2SRandall Stewart } 833d6dda9b2SRandall Stewart if (cmsg->cmsg_type == SCTP_SNDRCV) { 8347f15a8dfSMichael Tuexen memcpy(sinfo, CMSG_DATA(cmsg), sizeof(struct sctp_sndrcvinfo)); 835d6dda9b2SRandall Stewart break; 8367f15a8dfSMichael Tuexen } 8377f15a8dfSMichael Tuexen if (cmsg->cmsg_type == SCTP_EXTRCV) { 838d6dda9b2SRandall Stewart /* 8397f15a8dfSMichael Tuexen * Let's hope that the user provided enough 8407f15a8dfSMichael Tuexen * enough memory. At least he asked for more 8417f15a8dfSMichael Tuexen * information. 842d6dda9b2SRandall Stewart */ 8437f15a8dfSMichael Tuexen memcpy(sinfo, CMSG_DATA(cmsg), sizeof(struct sctp_extrcvinfo)); 844d6dda9b2SRandall Stewart break; 845d6dda9b2SRandall Stewart } 846d6dda9b2SRandall Stewart } 847d6dda9b2SRandall Stewart } 848d6dda9b2SRandall Stewart return (sz); 849d6dda9b2SRandall Stewart #endif 850d6dda9b2SRandall Stewart } 851d6dda9b2SRandall Stewart 852e2e7c62eSMichael Tuexen ssize_t 853e2e7c62eSMichael Tuexen sctp_recvv(int sd, 854e2e7c62eSMichael Tuexen const struct iovec *iov, 855e2e7c62eSMichael Tuexen int iovlen, 856e2e7c62eSMichael Tuexen struct sockaddr *from, 857e2e7c62eSMichael Tuexen socklen_t * fromlen, 858e2e7c62eSMichael Tuexen void *info, 859e2e7c62eSMichael Tuexen socklen_t * infolen, 860e2e7c62eSMichael Tuexen unsigned int *infotype, 861e2e7c62eSMichael Tuexen int *flags) 862d6dda9b2SRandall Stewart { 8637f15a8dfSMichael Tuexen char cmsgbuf[SCTP_CONTROL_VEC_SIZE_RCV]; 864e2e7c62eSMichael Tuexen struct msghdr msg; 865e2e7c62eSMichael Tuexen struct cmsghdr *cmsg; 8667f15a8dfSMichael Tuexen ssize_t ret; 867e2e7c62eSMichael Tuexen struct sctp_rcvinfo *rcvinfo; 868e2e7c62eSMichael Tuexen struct sctp_nxtinfo *nxtinfo; 869d6dda9b2SRandall Stewart 8700b064106SMichael Tuexen if (((info != NULL) && (infolen == NULL)) | 8710b064106SMichael Tuexen ((info == NULL) && (infolen != NULL) && (*infolen != 0)) || 8720b064106SMichael Tuexen ((info != NULL) && (infotype == NULL))) { 8730b064106SMichael Tuexen errno = EINVAL; 8740b064106SMichael Tuexen return (-1); 8750b064106SMichael Tuexen } 876e2e7c62eSMichael Tuexen if (infotype) { 877e2e7c62eSMichael Tuexen *infotype = SCTP_RECVV_NOINFO; 878e2e7c62eSMichael Tuexen } 879e2e7c62eSMichael Tuexen msg.msg_name = from; 880e2e7c62eSMichael Tuexen if (fromlen == NULL) { 881e2e7c62eSMichael Tuexen msg.msg_namelen = 0; 882d6dda9b2SRandall Stewart } else { 883e2e7c62eSMichael Tuexen msg.msg_namelen = *fromlen; 884d6dda9b2SRandall Stewart } 885e2e7c62eSMichael Tuexen msg.msg_iov = (struct iovec *)iov; 886e2e7c62eSMichael Tuexen msg.msg_iovlen = iovlen; 8877f15a8dfSMichael Tuexen msg.msg_control = cmsgbuf; 8887f15a8dfSMichael Tuexen msg.msg_controllen = sizeof(cmsgbuf); 8897f15a8dfSMichael Tuexen ret = recvmsg(sd, &msg, *flags); 890e2e7c62eSMichael Tuexen *flags = msg.msg_flags; 8917f15a8dfSMichael Tuexen if ((ret > 0) && 892e2e7c62eSMichael Tuexen (msg.msg_controllen > 0) && 893e2e7c62eSMichael Tuexen (infotype != NULL) && 894e2e7c62eSMichael Tuexen (infolen != NULL) && 895e2e7c62eSMichael Tuexen (*infolen > 0)) { 896e2e7c62eSMichael Tuexen rcvinfo = NULL; 897e2e7c62eSMichael Tuexen nxtinfo = NULL; 898e2e7c62eSMichael Tuexen for (cmsg = CMSG_FIRSTHDR(&msg); cmsg; cmsg = CMSG_NXTHDR(&msg, cmsg)) { 899e2e7c62eSMichael Tuexen if (cmsg->cmsg_level != IPPROTO_SCTP) { 900e2e7c62eSMichael Tuexen continue; 901e2e7c62eSMichael Tuexen } 902e2e7c62eSMichael Tuexen if (cmsg->cmsg_type == SCTP_RCVINFO) { 903e2e7c62eSMichael Tuexen rcvinfo = (struct sctp_rcvinfo *)CMSG_DATA(cmsg); 9047f15a8dfSMichael Tuexen if (nxtinfo != NULL) { 9057f15a8dfSMichael Tuexen break; 9067f15a8dfSMichael Tuexen } else { 9077f15a8dfSMichael Tuexen continue; 9087f15a8dfSMichael Tuexen } 909e2e7c62eSMichael Tuexen } 910e2e7c62eSMichael Tuexen if (cmsg->cmsg_type == SCTP_NXTINFO) { 911e2e7c62eSMichael Tuexen nxtinfo = (struct sctp_nxtinfo *)CMSG_DATA(cmsg); 9127f15a8dfSMichael Tuexen if (rcvinfo != NULL) { 913e2e7c62eSMichael Tuexen break; 9147f15a8dfSMichael Tuexen } else { 9157f15a8dfSMichael Tuexen continue; 916e2e7c62eSMichael Tuexen } 917e2e7c62eSMichael Tuexen } 9187f15a8dfSMichael Tuexen } 9197f15a8dfSMichael Tuexen if (rcvinfo != NULL) { 9207f15a8dfSMichael Tuexen if ((nxtinfo != NULL) && (*infolen >= sizeof(struct sctp_recvv_rn))) { 921e2e7c62eSMichael Tuexen struct sctp_recvv_rn *rn_info; 922e2e7c62eSMichael Tuexen 923e2e7c62eSMichael Tuexen rn_info = (struct sctp_recvv_rn *)info; 924e2e7c62eSMichael Tuexen rn_info->recvv_rcvinfo = *rcvinfo; 925e2e7c62eSMichael Tuexen rn_info->recvv_nxtinfo = *nxtinfo; 926e2e7c62eSMichael Tuexen *infolen = (socklen_t) sizeof(struct sctp_recvv_rn); 927e2e7c62eSMichael Tuexen *infotype = SCTP_RECVV_RN; 9287f15a8dfSMichael Tuexen } else if (*infolen >= sizeof(struct sctp_rcvinfo)) { 929e2e7c62eSMichael Tuexen memcpy(info, rcvinfo, sizeof(struct sctp_rcvinfo)); 930e2e7c62eSMichael Tuexen *infolen = (socklen_t) sizeof(struct sctp_rcvinfo); 931e2e7c62eSMichael Tuexen *infotype = SCTP_RECVV_RCVINFO; 932e2e7c62eSMichael Tuexen } 9337f15a8dfSMichael Tuexen } else if (nxtinfo != NULL) { 9347f15a8dfSMichael Tuexen if (*infolen >= sizeof(struct sctp_nxtinfo)) { 935e2e7c62eSMichael Tuexen memcpy(info, nxtinfo, sizeof(struct sctp_nxtinfo)); 936e2e7c62eSMichael Tuexen *infolen = (socklen_t) sizeof(struct sctp_nxtinfo); 937e2e7c62eSMichael Tuexen *infotype = SCTP_RECVV_NXTINFO; 938e2e7c62eSMichael Tuexen } 939e2e7c62eSMichael Tuexen } 940e2e7c62eSMichael Tuexen } 9417f15a8dfSMichael Tuexen return (ret); 942d6dda9b2SRandall Stewart } 943d6dda9b2SRandall Stewart 944e2e7c62eSMichael Tuexen ssize_t 945e2e7c62eSMichael Tuexen sctp_sendv(int sd, 946e2e7c62eSMichael Tuexen const struct iovec *iov, int iovcnt, 947e2e7c62eSMichael Tuexen struct sockaddr *addrs, int addrcnt, 948e2e7c62eSMichael Tuexen void *info, socklen_t infolen, unsigned int infotype, 949e2e7c62eSMichael Tuexen int flags) 950e2e7c62eSMichael Tuexen { 951e2e7c62eSMichael Tuexen ssize_t ret; 952e2e7c62eSMichael Tuexen int i; 9530b064106SMichael Tuexen socklen_t addr_len; 954e2e7c62eSMichael Tuexen struct msghdr msg; 9550b064106SMichael Tuexen in_port_t port; 9560b064106SMichael Tuexen struct sctp_sendv_spa *spa_info; 957e2e7c62eSMichael Tuexen struct cmsghdr *cmsg; 958e2e7c62eSMichael Tuexen char *cmsgbuf; 959e2e7c62eSMichael Tuexen struct sockaddr *addr; 960e2e7c62eSMichael Tuexen struct sockaddr_in *addr_in; 961e2e7c62eSMichael Tuexen struct sockaddr_in6 *addr_in6; 962e2e7c62eSMichael Tuexen 9630b064106SMichael Tuexen if ((addrcnt < 0) || 9640b064106SMichael Tuexen (iovcnt < 0) || 965c67a03f9SMichael Tuexen ((addrs == NULL) && (addrcnt > 0)) || 966c67a03f9SMichael Tuexen ((addrs != NULL) && (addrcnt == 0)) || 9670b064106SMichael Tuexen ((iov == NULL) && (iovcnt > 0)) || 9680b064106SMichael Tuexen ((iov != NULL) && (iovcnt == 0))) { 969e2e7c62eSMichael Tuexen errno = EINVAL; 970e2e7c62eSMichael Tuexen return (-1); 971e2e7c62eSMichael Tuexen } 972e2e7c62eSMichael Tuexen cmsgbuf = malloc(CMSG_SPACE(sizeof(struct sctp_sndinfo)) + 973e2e7c62eSMichael Tuexen CMSG_SPACE(sizeof(struct sctp_prinfo)) + 974e2e7c62eSMichael Tuexen CMSG_SPACE(sizeof(struct sctp_authinfo)) + 9755dc6a815SMichael Tuexen (size_t)addrcnt * CMSG_SPACE(sizeof(struct in6_addr))); 976e2e7c62eSMichael Tuexen if (cmsgbuf == NULL) { 9774ed0ebf6SMichael Tuexen errno = ENOMEM; 978e2e7c62eSMichael Tuexen return (-1); 979e2e7c62eSMichael Tuexen } 980e2e7c62eSMichael Tuexen msg.msg_control = cmsgbuf; 981e2e7c62eSMichael Tuexen msg.msg_controllen = 0; 982e2e7c62eSMichael Tuexen cmsg = (struct cmsghdr *)cmsgbuf; 983e2e7c62eSMichael Tuexen switch (infotype) { 9840b064106SMichael Tuexen case SCTP_SENDV_NOINFO: 9850b064106SMichael Tuexen if ((infolen != 0) || (info != NULL)) { 9860b064106SMichael Tuexen free(cmsgbuf); 9870b064106SMichael Tuexen errno = EINVAL; 9880b064106SMichael Tuexen return (-1); 9890b064106SMichael Tuexen } 9900b064106SMichael Tuexen break; 991e2e7c62eSMichael Tuexen case SCTP_SENDV_SNDINFO: 9920b064106SMichael Tuexen if ((info == NULL) || (infolen < sizeof(struct sctp_sndinfo))) { 993e2e7c62eSMichael Tuexen free(cmsgbuf); 994e2e7c62eSMichael Tuexen errno = EINVAL; 995e2e7c62eSMichael Tuexen return (-1); 996e2e7c62eSMichael Tuexen } 997e2e7c62eSMichael Tuexen cmsg->cmsg_level = IPPROTO_SCTP; 998e2e7c62eSMichael Tuexen cmsg->cmsg_type = SCTP_SNDINFO; 999e2e7c62eSMichael Tuexen cmsg->cmsg_len = CMSG_LEN(sizeof(struct sctp_sndinfo)); 1000e2e7c62eSMichael Tuexen memcpy(CMSG_DATA(cmsg), info, sizeof(struct sctp_sndinfo)); 1001e2e7c62eSMichael Tuexen msg.msg_controllen += CMSG_SPACE(sizeof(struct sctp_sndinfo)); 1002e2e7c62eSMichael Tuexen cmsg = (struct cmsghdr *)((caddr_t)cmsg + CMSG_SPACE(sizeof(struct sctp_sndinfo))); 1003e2e7c62eSMichael Tuexen break; 1004e2e7c62eSMichael Tuexen case SCTP_SENDV_PRINFO: 10050b064106SMichael Tuexen if ((info == NULL) || (infolen < sizeof(struct sctp_prinfo))) { 1006e2e7c62eSMichael Tuexen free(cmsgbuf); 1007e2e7c62eSMichael Tuexen errno = EINVAL; 1008e2e7c62eSMichael Tuexen return (-1); 1009e2e7c62eSMichael Tuexen } 1010e2e7c62eSMichael Tuexen cmsg->cmsg_level = IPPROTO_SCTP; 1011e2e7c62eSMichael Tuexen cmsg->cmsg_type = SCTP_PRINFO; 1012e2e7c62eSMichael Tuexen cmsg->cmsg_len = CMSG_LEN(sizeof(struct sctp_prinfo)); 1013e2e7c62eSMichael Tuexen memcpy(CMSG_DATA(cmsg), info, sizeof(struct sctp_prinfo)); 1014e2e7c62eSMichael Tuexen msg.msg_controllen += CMSG_SPACE(sizeof(struct sctp_prinfo)); 1015e2e7c62eSMichael Tuexen cmsg = (struct cmsghdr *)((caddr_t)cmsg + CMSG_SPACE(sizeof(struct sctp_prinfo))); 1016e2e7c62eSMichael Tuexen break; 1017e2e7c62eSMichael Tuexen case SCTP_SENDV_AUTHINFO: 10180b064106SMichael Tuexen if ((info == NULL) || (infolen < sizeof(struct sctp_authinfo))) { 1019e2e7c62eSMichael Tuexen free(cmsgbuf); 1020e2e7c62eSMichael Tuexen errno = EINVAL; 1021e2e7c62eSMichael Tuexen return (-1); 1022e2e7c62eSMichael Tuexen } 1023e2e7c62eSMichael Tuexen cmsg->cmsg_level = IPPROTO_SCTP; 1024e2e7c62eSMichael Tuexen cmsg->cmsg_type = SCTP_AUTHINFO; 1025e2e7c62eSMichael Tuexen cmsg->cmsg_len = CMSG_LEN(sizeof(struct sctp_authinfo)); 1026e2e7c62eSMichael Tuexen memcpy(CMSG_DATA(cmsg), info, sizeof(struct sctp_authinfo)); 1027e2e7c62eSMichael Tuexen msg.msg_controllen += CMSG_SPACE(sizeof(struct sctp_authinfo)); 1028e2e7c62eSMichael Tuexen cmsg = (struct cmsghdr *)((caddr_t)cmsg + CMSG_SPACE(sizeof(struct sctp_authinfo))); 1029e2e7c62eSMichael Tuexen break; 1030e2e7c62eSMichael Tuexen case SCTP_SENDV_SPA: 10310b064106SMichael Tuexen if ((info == NULL) || (infolen < sizeof(struct sctp_sendv_spa))) { 1032e2e7c62eSMichael Tuexen free(cmsgbuf); 1033e2e7c62eSMichael Tuexen errno = EINVAL; 1034e2e7c62eSMichael Tuexen return (-1); 1035e2e7c62eSMichael Tuexen } 1036e2e7c62eSMichael Tuexen spa_info = (struct sctp_sendv_spa *)info; 1037e2e7c62eSMichael Tuexen if (spa_info->sendv_flags & SCTP_SEND_SNDINFO_VALID) { 1038e2e7c62eSMichael Tuexen cmsg->cmsg_level = IPPROTO_SCTP; 1039e2e7c62eSMichael Tuexen cmsg->cmsg_type = SCTP_SNDINFO; 1040e2e7c62eSMichael Tuexen cmsg->cmsg_len = CMSG_LEN(sizeof(struct sctp_sndinfo)); 1041e2e7c62eSMichael Tuexen memcpy(CMSG_DATA(cmsg), &spa_info->sendv_sndinfo, sizeof(struct sctp_sndinfo)); 1042e2e7c62eSMichael Tuexen msg.msg_controllen += CMSG_SPACE(sizeof(struct sctp_sndinfo)); 1043e2e7c62eSMichael Tuexen cmsg = (struct cmsghdr *)((caddr_t)cmsg + CMSG_SPACE(sizeof(struct sctp_sndinfo))); 1044e2e7c62eSMichael Tuexen } 1045e2e7c62eSMichael Tuexen if (spa_info->sendv_flags & SCTP_SEND_PRINFO_VALID) { 1046e2e7c62eSMichael Tuexen cmsg->cmsg_level = IPPROTO_SCTP; 1047e2e7c62eSMichael Tuexen cmsg->cmsg_type = SCTP_PRINFO; 1048e2e7c62eSMichael Tuexen cmsg->cmsg_len = CMSG_LEN(sizeof(struct sctp_prinfo)); 1049e2e7c62eSMichael Tuexen memcpy(CMSG_DATA(cmsg), &spa_info->sendv_prinfo, sizeof(struct sctp_prinfo)); 1050e2e7c62eSMichael Tuexen msg.msg_controllen += CMSG_SPACE(sizeof(struct sctp_prinfo)); 1051e2e7c62eSMichael Tuexen cmsg = (struct cmsghdr *)((caddr_t)cmsg + CMSG_SPACE(sizeof(struct sctp_prinfo))); 1052e2e7c62eSMichael Tuexen } 1053e2e7c62eSMichael Tuexen if (spa_info->sendv_flags & SCTP_SEND_AUTHINFO_VALID) { 1054e2e7c62eSMichael Tuexen cmsg->cmsg_level = IPPROTO_SCTP; 1055e2e7c62eSMichael Tuexen cmsg->cmsg_type = SCTP_AUTHINFO; 1056e2e7c62eSMichael Tuexen cmsg->cmsg_len = CMSG_LEN(sizeof(struct sctp_authinfo)); 1057e2e7c62eSMichael Tuexen memcpy(CMSG_DATA(cmsg), &spa_info->sendv_authinfo, sizeof(struct sctp_authinfo)); 1058e2e7c62eSMichael Tuexen msg.msg_controllen += CMSG_SPACE(sizeof(struct sctp_authinfo)); 1059e2e7c62eSMichael Tuexen cmsg = (struct cmsghdr *)((caddr_t)cmsg + CMSG_SPACE(sizeof(struct sctp_authinfo))); 1060e2e7c62eSMichael Tuexen } 1061e2e7c62eSMichael Tuexen break; 1062e2e7c62eSMichael Tuexen default: 1063e2e7c62eSMichael Tuexen free(cmsgbuf); 1064e2e7c62eSMichael Tuexen errno = EINVAL; 1065e2e7c62eSMichael Tuexen return (-1); 1066e2e7c62eSMichael Tuexen } 1067e2e7c62eSMichael Tuexen addr = addrs; 10680b064106SMichael Tuexen msg.msg_name = NULL; 10690b064106SMichael Tuexen msg.msg_namelen = 0; 10700b064106SMichael Tuexen 10710b064106SMichael Tuexen for (i = 0; i < addrcnt; i++) { 1072e2e7c62eSMichael Tuexen switch (addr->sa_family) { 1073e2e7c62eSMichael Tuexen case AF_INET: 10740b064106SMichael Tuexen addr_len = (socklen_t) sizeof(struct sockaddr_in); 10750b064106SMichael Tuexen addr_in = (struct sockaddr_in *)addr; 10760b064106SMichael Tuexen if (addr_in->sin_len != addr_len) { 1077e2e7c62eSMichael Tuexen free(cmsgbuf); 1078e2e7c62eSMichael Tuexen errno = EINVAL; 1079e2e7c62eSMichael Tuexen return (-1); 1080e2e7c62eSMichael Tuexen } 10810b064106SMichael Tuexen if (i == 0) { 10820b064106SMichael Tuexen port = addr_in->sin_port; 1083e2e7c62eSMichael Tuexen } else { 10840b064106SMichael Tuexen if (port == addr_in->sin_port) { 1085e2e7c62eSMichael Tuexen cmsg->cmsg_level = IPPROTO_SCTP; 1086e2e7c62eSMichael Tuexen cmsg->cmsg_type = SCTP_DSTADDRV4; 1087e2e7c62eSMichael Tuexen cmsg->cmsg_len = CMSG_LEN(sizeof(struct in_addr)); 1088e2e7c62eSMichael Tuexen memcpy(CMSG_DATA(cmsg), &addr_in->sin_addr, sizeof(struct in_addr)); 1089e2e7c62eSMichael Tuexen msg.msg_controllen += CMSG_SPACE(sizeof(struct in_addr)); 1090e2e7c62eSMichael Tuexen cmsg = (struct cmsghdr *)((caddr_t)cmsg + CMSG_SPACE(sizeof(struct in_addr))); 10910b064106SMichael Tuexen } else { 10920b064106SMichael Tuexen free(cmsgbuf); 10930b064106SMichael Tuexen errno = EINVAL; 10940b064106SMichael Tuexen return (-1); 10950b064106SMichael Tuexen } 10960b064106SMichael Tuexen } 1097e2e7c62eSMichael Tuexen break; 1098e2e7c62eSMichael Tuexen case AF_INET6: 10990b064106SMichael Tuexen addr_len = (socklen_t) sizeof(struct sockaddr_in6); 1100e2e7c62eSMichael Tuexen addr_in6 = (struct sockaddr_in6 *)addr; 11010b064106SMichael Tuexen if (addr_in6->sin6_len != addr_len) { 11020b064106SMichael Tuexen free(cmsgbuf); 11030b064106SMichael Tuexen errno = EINVAL; 11040b064106SMichael Tuexen return (-1); 11050b064106SMichael Tuexen } 11060b064106SMichael Tuexen if (i == 0) { 11070b064106SMichael Tuexen port = addr_in6->sin6_port; 11080b064106SMichael Tuexen } else { 11090b064106SMichael Tuexen if (port == addr_in6->sin6_port) { 1110e2e7c62eSMichael Tuexen cmsg->cmsg_level = IPPROTO_SCTP; 1111e2e7c62eSMichael Tuexen cmsg->cmsg_type = SCTP_DSTADDRV6; 1112e2e7c62eSMichael Tuexen cmsg->cmsg_len = CMSG_LEN(sizeof(struct in6_addr)); 1113e2e7c62eSMichael Tuexen memcpy(CMSG_DATA(cmsg), &addr_in6->sin6_addr, sizeof(struct in6_addr)); 1114e2e7c62eSMichael Tuexen msg.msg_controllen += CMSG_SPACE(sizeof(struct in6_addr)); 1115e2e7c62eSMichael Tuexen cmsg = (struct cmsghdr *)((caddr_t)cmsg + CMSG_SPACE(sizeof(struct in6_addr))); 11160b064106SMichael Tuexen } else { 11170b064106SMichael Tuexen free(cmsgbuf); 11180b064106SMichael Tuexen errno = EINVAL; 11190b064106SMichael Tuexen return (-1); 11200b064106SMichael Tuexen } 11210b064106SMichael Tuexen } 1122e2e7c62eSMichael Tuexen break; 1123e2e7c62eSMichael Tuexen default: 1124e2e7c62eSMichael Tuexen free(cmsgbuf); 1125e2e7c62eSMichael Tuexen errno = EINVAL; 1126e2e7c62eSMichael Tuexen return (-1); 1127e2e7c62eSMichael Tuexen } 11280b064106SMichael Tuexen if (i == 0) { 11290b064106SMichael Tuexen msg.msg_name = addr; 11300b064106SMichael Tuexen msg.msg_namelen = addr_len; 11310b064106SMichael Tuexen } 1132e2e7c62eSMichael Tuexen addr = (struct sockaddr *)((caddr_t)addr + addr_len); 1133e2e7c62eSMichael Tuexen } 11340b064106SMichael Tuexen if (msg.msg_controllen == 0) { 11350b064106SMichael Tuexen msg.msg_control = NULL; 1136e2e7c62eSMichael Tuexen } 1137e2e7c62eSMichael Tuexen msg.msg_iov = (struct iovec *)iov; 1138e2e7c62eSMichael Tuexen msg.msg_iovlen = iovcnt; 1139e2e7c62eSMichael Tuexen msg.msg_flags = 0; 1140e2e7c62eSMichael Tuexen ret = sendmsg(sd, &msg, flags); 1141e2e7c62eSMichael Tuexen free(cmsgbuf); 1142e2e7c62eSMichael Tuexen return (ret); 1143e2e7c62eSMichael Tuexen } 1144e2e7c62eSMichael Tuexen 1145d6dda9b2SRandall Stewart 1146d6dda9b2SRandall Stewart #if !defined(SYS_sctp_peeloff) && !defined(HAVE_SCTP_PEELOFF_SOCKOPT) 1147d6dda9b2SRandall Stewart 1148d6dda9b2SRandall Stewart int 1149d6dda9b2SRandall Stewart sctp_peeloff(int sd, sctp_assoc_t assoc_id) 1150d6dda9b2SRandall Stewart { 1151d6dda9b2SRandall Stewart /* NOT supported, return invalid sd */ 1152d6dda9b2SRandall Stewart errno = ENOTSUP; 1153d6dda9b2SRandall Stewart return (-1); 1154d6dda9b2SRandall Stewart } 1155d6dda9b2SRandall Stewart 1156d6dda9b2SRandall Stewart #endif 1157d6dda9b2SRandall Stewart #if defined(SYS_sctp_peeloff) && !defined(HAVE_SCTP_PEELOFF_SOCKOPT) 1158d6dda9b2SRandall Stewart int 1159d6dda9b2SRandall Stewart sctp_peeloff(int sd, sctp_assoc_t assoc_id) 1160d6dda9b2SRandall Stewart { 1161d6dda9b2SRandall Stewart return (syscall(SYS_sctp_peeloff, sd, assoc_id)); 1162d6dda9b2SRandall Stewart } 1163d6dda9b2SRandall Stewart 1164d6dda9b2SRandall Stewart #endif 1165804cf641SRandall Stewart 11662c0d559dSRandall Stewart #undef SCTP_CONTROL_VEC_SIZE_RCV 1167