xref: /freebsd/lib/libc/net/sctp_sys_calls.c (revision 071966e874ed472bdac031b7e89d08bacf8bbbc4)
1 /*-
2  * SPDX-License-Identifier: BSD-3-Clause
3  *
4  * Copyright (c) 2001-2007, by Cisco Systems, Inc. All rights reserved.
5  * Copyright (c) 2008-2012, by Randall Stewart. All rights reserved.
6  * Copyright (c) 2008-2012, by Michael Tuexen. All rights reserved.
7  *
8  * Redistribution and use in source and binary forms, with or without
9  * modification, are permitted provided that the following conditions are met:
10  *
11  * a) Redistributions of source code must retain the above copyright notice,
12  *    this list of conditions and the following disclaimer.
13  *
14  * b) Redistributions in binary form must reproduce the above copyright
15  *    notice, this list of conditions and the following disclaimer in
16  *    the documentation and/or other materials provided with the distribution.
17  *
18  * c) Neither the name of Cisco Systems, Inc. nor the names of its
19  *    contributors may be used to endorse or promote products derived
20  *    from this software without specific prior written permission.
21  *
22  * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
23  * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,
24  * THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
25  * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE
26  * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
27  * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
28  * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
29  * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
30  * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
31  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
32  * THE POSSIBILITY OF SUCH DAMAGE.
33  */
34 
35 #include <sys/cdefs.h>
36 __FBSDID("$FreeBSD$");
37 
38 #include <stdbool.h>
39 #include <stddef.h>
40 #include <stdio.h>
41 #include <string.h>
42 #include <errno.h>
43 #include <stdlib.h>
44 #include <unistd.h>
45 #include <sys/types.h>
46 #include <sys/socket.h>
47 #include <sys/errno.h>
48 #include <sys/syscall.h>
49 #include <sys/uio.h>
50 #include <netinet/in.h>
51 #include <arpa/inet.h>
52 #include <netinet/sctp_uio.h>
53 #include <netinet/sctp.h>
54 
55 #ifndef IN6_IS_ADDR_V4MAPPED
56 #define IN6_IS_ADDR_V4MAPPED(a)		      \
57 	((*(const uint32_t *)(const void *)(&(a)->s6_addr[0]) == 0) &&	\
58 	 (*(const uint32_t *)(const void *)(&(a)->s6_addr[4]) == 0) &&	\
59 	 (*(const uint32_t *)(const void *)(&(a)->s6_addr[8]) == ntohl(0x0000ffff)))
60 #endif
61 
62 #define SCTP_CONTROL_VEC_SIZE_RCV  16384
63 
64 
65 static void
66 in6_sin6_2_sin(struct sockaddr_in *sin, struct sockaddr_in6 *sin6)
67 {
68 	bzero(sin, sizeof(*sin));
69 	sin->sin_len = sizeof(struct sockaddr_in);
70 	sin->sin_family = AF_INET;
71 	sin->sin_port = sin6->sin6_port;
72 	sin->sin_addr.s_addr = sin6->sin6_addr.__u6_addr.__u6_addr32[3];
73 }
74 
75 int
76 sctp_getaddrlen(sa_family_t family)
77 {
78 	int ret, sd;
79 	socklen_t siz;
80 	struct sctp_assoc_value av;
81 
82 	av.assoc_value = family;
83 	siz = sizeof(av);
84 #if defined(AF_INET)
85 	sd = socket(AF_INET, SOCK_SEQPACKET, IPPROTO_SCTP);
86 #elif defined(AF_INET6)
87 	sd = socket(AF_INET6, SOCK_SEQPACKET, IPPROTO_SCTP);
88 #else
89 	sd = -1;
90 #endif
91 	if (sd == -1) {
92 		return (-1);
93 	}
94 	ret = getsockopt(sd, IPPROTO_SCTP, SCTP_GET_ADDR_LEN, &av, &siz);
95 	close(sd);
96 	if (ret == 0) {
97 		return ((int)av.assoc_value);
98 	} else {
99 		return (-1);
100 	}
101 }
102 
103 int
104 sctp_connectx(int sd, const struct sockaddr *addrs, int addrcnt,
105     sctp_assoc_t *id)
106 {
107 	char *buf;
108 	int i, ret, *aa;
109 	char *cpto;
110 	const struct sockaddr *at;
111 	size_t len;
112 
113 	/* validate the address count and list */
114 	if ((addrs == NULL) || (addrcnt <= 0)) {
115 		errno = EINVAL;
116 		return (-1);
117 	}
118 	if ((buf = malloc(sizeof(int) + (size_t)addrcnt * sizeof(struct sockaddr_in6))) == NULL) {
119 		errno = E2BIG;
120 		return (-1);
121 	}
122 	len = sizeof(int);
123 	at = addrs;
124 	cpto = buf + sizeof(int);
125 	/* validate all the addresses and get the size */
126 	for (i = 0; i < addrcnt; i++) {
127 		switch (at->sa_family) {
128 		case AF_INET:
129 			if (at->sa_len != sizeof(struct sockaddr_in)) {
130 				free(buf);
131 				errno = EINVAL;
132 				return (-1);
133 			}
134 			memcpy(cpto, at, sizeof(struct sockaddr_in));
135 			cpto = ((caddr_t)cpto + sizeof(struct sockaddr_in));
136 			len += sizeof(struct sockaddr_in);
137 			break;
138 		case AF_INET6:
139 			if (at->sa_len != sizeof(struct sockaddr_in6)) {
140 				free(buf);
141 				errno = EINVAL;
142 				return (-1);
143 			}
144 			if (IN6_IS_ADDR_V4MAPPED(&((struct sockaddr_in6 *)at)->sin6_addr)) {
145 				in6_sin6_2_sin((struct sockaddr_in *)cpto, (struct sockaddr_in6 *)at);
146 				cpto = ((caddr_t)cpto + sizeof(struct sockaddr_in));
147 				len += sizeof(struct sockaddr_in);
148 			} else {
149 				memcpy(cpto, at, sizeof(struct sockaddr_in6));
150 				cpto = ((caddr_t)cpto + sizeof(struct sockaddr_in6));
151 				len += sizeof(struct sockaddr_in6);
152 			}
153 			break;
154 		default:
155 			free(buf);
156 			errno = EINVAL;
157 			return (-1);
158 		}
159 		at = (struct sockaddr *)((caddr_t)at + at->sa_len);
160 	}
161 	aa = (int *)buf;
162 	*aa = addrcnt;
163 	ret = setsockopt(sd, IPPROTO_SCTP, SCTP_CONNECT_X, (void *)buf,
164 	    (socklen_t)len);
165 	if ((ret == 0) && (id != NULL)) {
166 		*id = *(sctp_assoc_t *)buf;
167 	}
168 	free(buf);
169 	return (ret);
170 }
171 
172 int
173 sctp_bindx(int sd, struct sockaddr *addrs, int addrcnt, int flags)
174 {
175 	struct sockaddr *sa;
176 	struct sockaddr_in *sin;
177 	struct sockaddr_in6 *sin6;
178 	int i;
179 	uint16_t sport;
180 	bool fix_port;
181 
182 	/* validate the flags */
183 	if ((flags != SCTP_BINDX_ADD_ADDR) &&
184 	    (flags != SCTP_BINDX_REM_ADDR)) {
185 		errno = EFAULT;
186 		return (-1);
187 	}
188 	/* validate the address count and list */
189 	if ((addrcnt <= 0) || (addrs == NULL)) {
190 		errno = EINVAL;
191 		return (-1);
192 	}
193 	sport = 0;
194 	fix_port = false;
195 	/* First pre-screen the addresses */
196 	sa = addrs;
197 	for (i = 0; i < addrcnt; i++) {
198 		switch (sa->sa_family) {
199 		case AF_INET:
200 			if (sa->sa_len != sizeof(struct sockaddr_in)) {
201 				errno = EINVAL;
202 				return (-1);
203 			}
204 			sin = (struct sockaddr_in *)sa;
205 			if (sin->sin_port) {
206 				/* non-zero port, check or save */
207 				if (sport) {
208 					/* Check against our port */
209 					if (sport != sin->sin_port) {
210 						errno = EINVAL;
211 						return (-1);
212 					}
213 				} else {
214 					/* save off the port */
215 					sport = sin->sin_port;
216 					fix_port = (i > 0);
217 				}
218 			}
219 			break;
220 		case AF_INET6:
221 			if (sa->sa_len != sizeof(struct sockaddr_in6)) {
222 				errno = EINVAL;
223 				return (-1);
224 			}
225 			sin6 = (struct sockaddr_in6 *)sa;
226 			if (sin6->sin6_port) {
227 				/* non-zero port, check or save */
228 				if (sport) {
229 					/* Check against our port */
230 					if (sport != sin6->sin6_port) {
231 						errno = EINVAL;
232 						return (-1);
233 					}
234 				} else {
235 					/* save off the port */
236 					sport = sin6->sin6_port;
237 					fix_port = (i > 0);
238 				}
239 			}
240 			break;
241 		default:
242 			/* Invalid address family specified. */
243 			errno = EAFNOSUPPORT;
244 			return (-1);
245 		}
246 		sa = (struct sockaddr *)((caddr_t)sa + sa->sa_len);
247 	}
248 	sa = addrs;
249 	for (i = 0; i < addrcnt; i++) {
250 		/*
251 		 * Now, if there was a port mentioned, assure that the first
252 		 * address has that port to make sure it fails or succeeds
253 		 * correctly.
254 		 */
255 		if (fix_port) {
256 			switch (sa->sa_family) {
257 			case AF_INET:
258 				((struct sockaddr_in *)sa)->sin_port = sport;
259 				break;
260 			case AF_INET6:
261 				((struct sockaddr_in6 *)sa)->sin6_port = sport;
262 				break;
263 			}
264 			fix_port = false;
265 		}
266 		if (setsockopt(sd, IPPROTO_SCTP, flags, sa, sa->sa_len) != 0) {
267 			return (-1);
268 		}
269 		sa = (struct sockaddr *)((caddr_t)sa + sa->sa_len);
270 	}
271 	return (0);
272 }
273 
274 int
275 sctp_opt_info(int sd, sctp_assoc_t id, int opt, void *arg, socklen_t *size)
276 {
277 	if (arg == NULL) {
278 		errno = EINVAL;
279 		return (-1);
280 	}
281 	if ((id == SCTP_CURRENT_ASSOC) ||
282 	    (id == SCTP_ALL_ASSOC)) {
283 		errno = EINVAL;
284 		return (-1);
285 	}
286 	switch (opt) {
287 	case SCTP_RTOINFO:
288 		((struct sctp_rtoinfo *)arg)->srto_assoc_id = id;
289 		break;
290 	case SCTP_ASSOCINFO:
291 		((struct sctp_assocparams *)arg)->sasoc_assoc_id = id;
292 		break;
293 	case SCTP_DEFAULT_SEND_PARAM:
294 		((struct sctp_assocparams *)arg)->sasoc_assoc_id = id;
295 		break;
296 	case SCTP_PRIMARY_ADDR:
297 		((struct sctp_setprim *)arg)->ssp_assoc_id = id;
298 		break;
299 	case SCTP_PEER_ADDR_PARAMS:
300 		((struct sctp_paddrparams *)arg)->spp_assoc_id = id;
301 		break;
302 	case SCTP_MAXSEG:
303 		((struct sctp_assoc_value *)arg)->assoc_id = id;
304 		break;
305 	case SCTP_AUTH_KEY:
306 		((struct sctp_authkey *)arg)->sca_assoc_id = id;
307 		break;
308 	case SCTP_AUTH_ACTIVE_KEY:
309 		((struct sctp_authkeyid *)arg)->scact_assoc_id = id;
310 		break;
311 	case SCTP_DELAYED_SACK:
312 		((struct sctp_sack_info *)arg)->sack_assoc_id = id;
313 		break;
314 	case SCTP_CONTEXT:
315 		((struct sctp_assoc_value *)arg)->assoc_id = id;
316 		break;
317 	case SCTP_STATUS:
318 		((struct sctp_status *)arg)->sstat_assoc_id = id;
319 		break;
320 	case SCTP_GET_PEER_ADDR_INFO:
321 		((struct sctp_paddrinfo *)arg)->spinfo_assoc_id = id;
322 		break;
323 	case SCTP_PEER_AUTH_CHUNKS:
324 		((struct sctp_authchunks *)arg)->gauth_assoc_id = id;
325 		break;
326 	case SCTP_LOCAL_AUTH_CHUNKS:
327 		((struct sctp_authchunks *)arg)->gauth_assoc_id = id;
328 		break;
329 	case SCTP_TIMEOUTS:
330 		((struct sctp_timeouts *)arg)->stimo_assoc_id = id;
331 		break;
332 	case SCTP_EVENT:
333 		((struct sctp_event *)arg)->se_assoc_id = id;
334 		break;
335 	case SCTP_DEFAULT_SNDINFO:
336 		((struct sctp_sndinfo *)arg)->snd_assoc_id = id;
337 		break;
338 	case SCTP_DEFAULT_PRINFO:
339 		((struct sctp_default_prinfo *)arg)->pr_assoc_id = id;
340 		break;
341 	case SCTP_PEER_ADDR_THLDS:
342 		((struct sctp_paddrthlds *)arg)->spt_assoc_id = id;
343 		break;
344 	case SCTP_REMOTE_UDP_ENCAPS_PORT:
345 		((struct sctp_udpencaps *)arg)->sue_assoc_id = id;
346 		break;
347 	case SCTP_ECN_SUPPORTED:
348 		((struct sctp_assoc_value *)arg)->assoc_id = id;
349 		break;
350 	case SCTP_PR_SUPPORTED:
351 		((struct sctp_assoc_value *)arg)->assoc_id = id;
352 		break;
353 	case SCTP_AUTH_SUPPORTED:
354 		((struct sctp_assoc_value *)arg)->assoc_id = id;
355 		break;
356 	case SCTP_ASCONF_SUPPORTED:
357 		((struct sctp_assoc_value *)arg)->assoc_id = id;
358 		break;
359 	case SCTP_RECONFIG_SUPPORTED:
360 		((struct sctp_assoc_value *)arg)->assoc_id = id;
361 		break;
362 	case SCTP_NRSACK_SUPPORTED:
363 		((struct sctp_assoc_value *)arg)->assoc_id = id;
364 		break;
365 	case SCTP_PKTDROP_SUPPORTED:
366 		((struct sctp_assoc_value *)arg)->assoc_id = id;
367 		break;
368 	case SCTP_MAX_BURST:
369 		((struct sctp_assoc_value *)arg)->assoc_id = id;
370 		break;
371 	case SCTP_ENABLE_STREAM_RESET:
372 		((struct sctp_assoc_value *)arg)->assoc_id = id;
373 		break;
374 	case SCTP_PR_STREAM_STATUS:
375 		((struct sctp_prstatus *)arg)->sprstat_assoc_id = id;
376 		break;
377 	case SCTP_PR_ASSOC_STATUS:
378 		((struct sctp_prstatus *)arg)->sprstat_assoc_id = id;
379 		break;
380 	case SCTP_MAX_CWND:
381 		((struct sctp_assoc_value *)arg)->assoc_id = id;
382 		break;
383 	default:
384 		break;
385 	}
386 	return (getsockopt(sd, IPPROTO_SCTP, opt, arg, size));
387 }
388 
389 int
390 sctp_getpaddrs(int sd, sctp_assoc_t id, struct sockaddr **raddrs)
391 {
392 	struct sctp_getaddresses *addrs;
393 	struct sockaddr *sa;
394 	caddr_t lim;
395 	socklen_t opt_len;
396 	uint32_t size_of_addresses;
397 	int cnt;
398 
399 	if (raddrs == NULL) {
400 		errno = EFAULT;
401 		return (-1);
402 	}
403 	/* When calling getsockopt(), the value contains the assoc_id. */
404 	size_of_addresses = (uint32_t)id;
405 	opt_len = (socklen_t)sizeof(uint32_t);
406 	if (getsockopt(sd, IPPROTO_SCTP, SCTP_GET_REMOTE_ADDR_SIZE,
407 	    &size_of_addresses, &opt_len) != 0) {
408 		return (-1);
409 	}
410 	opt_len = (socklen_t)((size_t)size_of_addresses + sizeof(struct sctp_getaddresses));
411 	addrs = calloc(1, (size_t)opt_len);
412 	if (addrs == NULL) {
413 		errno = ENOMEM;
414 		return (-1);
415 	}
416 	addrs->sget_assoc_id = id;
417 	/* Now lets get the array of addresses */
418 	if (getsockopt(sd, IPPROTO_SCTP, SCTP_GET_PEER_ADDRESSES,
419 	    addrs, &opt_len) != 0) {
420 		free(addrs);
421 		return (-1);
422 	}
423 	*raddrs = &addrs->addr[0].sa;
424 	cnt = 0;
425 	sa = &addrs->addr[0].sa;
426 	lim = (caddr_t)addrs + opt_len;
427 	while (((caddr_t)sa < lim) && (sa->sa_len > 0)) {
428 		sa = (struct sockaddr *)((caddr_t)sa + sa->sa_len);
429 		cnt++;
430 	}
431 	return (cnt);
432 }
433 
434 void
435 sctp_freepaddrs(struct sockaddr *addrs)
436 {
437 	void *fr_addr;
438 
439 	/* Take away the hidden association id */
440 	fr_addr = (void *)((caddr_t)addrs - offsetof(struct sctp_getaddresses, addr));
441 	/* Now free it */
442 	free(fr_addr);
443 }
444 
445 int
446 sctp_getladdrs(int sd, sctp_assoc_t id, struct sockaddr **raddrs)
447 {
448 	struct sctp_getaddresses *addrs;
449 	struct sockaddr *sa;
450 	caddr_t lim;
451 	socklen_t opt_len;
452 	uint32_t size_of_addresses;
453 	int cnt;
454 
455 	if (raddrs == NULL) {
456 		errno = EFAULT;
457 		return (-1);
458 	}
459 	size_of_addresses = 0;
460 	opt_len = (socklen_t)sizeof(uint32_t);
461 	if (getsockopt(sd, IPPROTO_SCTP, SCTP_GET_LOCAL_ADDR_SIZE,
462 	    &size_of_addresses, &opt_len) != 0) {
463 		return (-1);
464 	}
465 	opt_len = (socklen_t)((size_t)size_of_addresses + sizeof(struct sctp_getaddresses));
466 	addrs = calloc(1, (size_t)opt_len);
467 	if (addrs == NULL) {
468 		errno = ENOMEM;
469 		return (-1);
470 	}
471 	addrs->sget_assoc_id = id;
472 	/* Now lets get the array of addresses */
473 	if (getsockopt(sd, IPPROTO_SCTP, SCTP_GET_LOCAL_ADDRESSES, addrs,
474 	    &opt_len) != 0) {
475 		free(addrs);
476 		return (-1);
477 	}
478 	if (size_of_addresses == 0) {
479 		free(addrs);
480 		return (0);
481 	}
482 	*raddrs = &addrs->addr[0].sa;
483 	cnt = 0;
484 	sa = &addrs->addr[0].sa;
485 	lim = (caddr_t)addrs + opt_len;
486 	while (((caddr_t)sa < lim) && (sa->sa_len > 0)) {
487 		sa = (struct sockaddr *)((caddr_t)sa + sa->sa_len);
488 		cnt++;
489 	}
490 	return (cnt);
491 }
492 
493 void
494 sctp_freeladdrs(struct sockaddr *addrs)
495 {
496 	void *fr_addr;
497 
498 	/* Take away the hidden association id */
499 	fr_addr = (void *)((caddr_t)addrs - offsetof(struct sctp_getaddresses, addr));
500 	/* Now free it */
501 	free(fr_addr);
502 }
503 
504 ssize_t
505 sctp_sendmsg(int s,
506     const void *data,
507     size_t len,
508     const struct sockaddr *to,
509     socklen_t tolen,
510     uint32_t ppid,
511     uint32_t flags,
512     uint16_t stream_no,
513     uint32_t timetolive,
514     uint32_t context)
515 {
516 #ifdef SYS_sctp_generic_sendmsg
517 	struct sctp_sndrcvinfo sinfo;
518 
519 	memset(&sinfo, 0, sizeof(struct sctp_sndrcvinfo));
520 	sinfo.sinfo_ppid = ppid;
521 	sinfo.sinfo_flags = flags;
522 	sinfo.sinfo_stream = stream_no;
523 	sinfo.sinfo_timetolive = timetolive;
524 	sinfo.sinfo_context = context;
525 	sinfo.sinfo_assoc_id = 0;
526 	return (syscall(SYS_sctp_generic_sendmsg, s,
527 	    data, len, to, tolen, &sinfo, 0));
528 #else
529 	struct msghdr msg;
530 	struct sctp_sndrcvinfo *sinfo;
531 	struct iovec iov;
532 	char cmsgbuf[CMSG_SPACE(sizeof(struct sctp_sndrcvinfo))];
533 	struct cmsghdr *cmsg;
534 	struct sockaddr *who = NULL;
535 	union {
536 		struct sockaddr_in in;
537 		struct sockaddr_in6 in6;
538 	}     addr;
539 
540 	if ((tolen > 0) &&
541 	    ((to == NULL) || (tolen < sizeof(struct sockaddr)))) {
542 		errno = EINVAL;
543 		return (-1);
544 	}
545 	if ((to != NULL) && (tolen > 0)) {
546 		switch (to->sa_family) {
547 		case AF_INET:
548 			if (tolen != sizeof(struct sockaddr_in)) {
549 				errno = EINVAL;
550 				return (-1);
551 			}
552 			if ((to->sa_len > 0) &&
553 			    (to->sa_len != sizeof(struct sockaddr_in))) {
554 				errno = EINVAL;
555 				return (-1);
556 			}
557 			memcpy(&addr, to, sizeof(struct sockaddr_in));
558 			addr.in.sin_len = sizeof(struct sockaddr_in);
559 			break;
560 		case AF_INET6:
561 			if (tolen != sizeof(struct sockaddr_in6)) {
562 				errno = EINVAL;
563 				return (-1);
564 			}
565 			if ((to->sa_len > 0) &&
566 			    (to->sa_len != sizeof(struct sockaddr_in6))) {
567 				errno = EINVAL;
568 				return (-1);
569 			}
570 			memcpy(&addr, to, sizeof(struct sockaddr_in6));
571 			addr.in6.sin6_len = sizeof(struct sockaddr_in6);
572 			break;
573 		default:
574 			errno = EAFNOSUPPORT;
575 			return (-1);
576 		}
577 		who = (struct sockaddr *)&addr;
578 	}
579 
580 	iov.iov_base = (char *)data;
581 	iov.iov_len = len;
582 
583 	if (who) {
584 		msg.msg_name = (caddr_t)who;
585 		msg.msg_namelen = who->sa_len;
586 	} else {
587 		msg.msg_name = (caddr_t)NULL;
588 		msg.msg_namelen = 0;
589 	}
590 	msg.msg_iov = &iov;
591 	msg.msg_iovlen = 1;
592 	msg.msg_control = cmsgbuf;
593 	msg.msg_controllen = CMSG_SPACE(sizeof(struct sctp_sndrcvinfo));
594 	msg.msg_flags = 0;
595 	cmsg = (struct cmsghdr *)cmsgbuf;
596 	cmsg->cmsg_level = IPPROTO_SCTP;
597 	cmsg->cmsg_type = SCTP_SNDRCV;
598 	cmsg->cmsg_len = CMSG_LEN(sizeof(struct sctp_sndrcvinfo));
599 	sinfo = (struct sctp_sndrcvinfo *)CMSG_DATA(cmsg);
600 	memset(sinfo, 0, sizeof(struct sctp_sndrcvinfo));
601 	sinfo->sinfo_stream = stream_no;
602 	sinfo->sinfo_ssn = 0;
603 	sinfo->sinfo_flags = flags;
604 	sinfo->sinfo_ppid = ppid;
605 	sinfo->sinfo_context = context;
606 	sinfo->sinfo_assoc_id = 0;
607 	sinfo->sinfo_timetolive = timetolive;
608 	return (sendmsg(s, &msg, 0));
609 #endif
610 }
611 
612 
613 sctp_assoc_t
614 sctp_getassocid(int sd, struct sockaddr *sa)
615 {
616 	struct sctp_paddrinfo sp;
617 	socklen_t siz;
618 
619 	/* First get the assoc id */
620 	siz = sizeof(sp);
621 	memset(&sp, 0, sizeof(sp));
622 	memcpy((caddr_t)&sp.spinfo_address, sa, sa->sa_len);
623 	if (getsockopt(sd, IPPROTO_SCTP,
624 	    SCTP_GET_PEER_ADDR_INFO, &sp, &siz) != 0) {
625 		/* We depend on the fact that 0 can never be returned */
626 		return ((sctp_assoc_t)0);
627 	}
628 	return (sp.spinfo_assoc_id);
629 }
630 
631 ssize_t
632 sctp_send(int sd, const void *data, size_t len,
633     const struct sctp_sndrcvinfo *sinfo,
634     int flags)
635 {
636 
637 #ifdef SYS_sctp_generic_sendmsg
638 	struct sockaddr *to = NULL;
639 
640 	return (syscall(SYS_sctp_generic_sendmsg, sd,
641 	    data, len, to, 0, sinfo, flags));
642 #else
643 	struct msghdr msg;
644 	struct iovec iov;
645 	char cmsgbuf[CMSG_SPACE(sizeof(struct sctp_sndrcvinfo))];
646 	struct cmsghdr *cmsg;
647 
648 	if (sinfo == NULL) {
649 		errno = EINVAL;
650 		return (-1);
651 	}
652 	iov.iov_base = (char *)data;
653 	iov.iov_len = len;
654 
655 	msg.msg_name = NULL;
656 	msg.msg_namelen = 0;
657 	msg.msg_iov = &iov;
658 	msg.msg_iovlen = 1;
659 	msg.msg_control = cmsgbuf;
660 	msg.msg_controllen = CMSG_SPACE(sizeof(struct sctp_sndrcvinfo));
661 	msg.msg_flags = 0;
662 	cmsg = (struct cmsghdr *)cmsgbuf;
663 	cmsg->cmsg_level = IPPROTO_SCTP;
664 	cmsg->cmsg_type = SCTP_SNDRCV;
665 	cmsg->cmsg_len = CMSG_LEN(sizeof(struct sctp_sndrcvinfo));
666 	memcpy(CMSG_DATA(cmsg), sinfo, sizeof(struct sctp_sndrcvinfo));
667 	return (sendmsg(sd, &msg, flags));
668 #endif
669 }
670 
671 
672 
673 ssize_t
674 sctp_sendx(int sd, const void *msg, size_t msg_len,
675     struct sockaddr *addrs, int addrcnt,
676     struct sctp_sndrcvinfo *sinfo,
677     int flags)
678 {
679 	struct sctp_sndrcvinfo __sinfo;
680 	ssize_t ret;
681 	int i, cnt, *aa, saved_errno;
682 	char *buf;
683 	int no_end_cx = 0;
684 	size_t len, add_len;
685 	struct sockaddr *at;
686 
687 	if (addrs == NULL) {
688 		errno = EINVAL;
689 		return (-1);
690 	}
691 #ifdef SYS_sctp_generic_sendmsg
692 	if (addrcnt == 1) {
693 		socklen_t l;
694 		ssize_t ret;
695 
696 		/*
697 		 * Quick way, we don't need to do a connectx so lets use the
698 		 * syscall directly.
699 		 */
700 		l = addrs->sa_len;
701 		ret = syscall(SYS_sctp_generic_sendmsg, sd,
702 		    msg, msg_len, addrs, l, sinfo, flags);
703 		if ((ret >= 0) && (sinfo != NULL)) {
704 			sinfo->sinfo_assoc_id = sctp_getassocid(sd, addrs);
705 		}
706 		return (ret);
707 	}
708 #endif
709 
710 	len = sizeof(int);
711 	at = addrs;
712 	cnt = 0;
713 	/* validate all the addresses and get the size */
714 	for (i = 0; i < addrcnt; i++) {
715 		if (at->sa_family == AF_INET) {
716 			add_len = sizeof(struct sockaddr_in);
717 		} else if (at->sa_family == AF_INET6) {
718 			add_len = sizeof(struct sockaddr_in6);
719 		} else {
720 			errno = EINVAL;
721 			return (-1);
722 		}
723 		len += add_len;
724 		at = (struct sockaddr *)((caddr_t)at + add_len);
725 		cnt++;
726 	}
727 	/* do we have any? */
728 	if (cnt == 0) {
729 		errno = EINVAL;
730 		return (-1);
731 	}
732 	buf = malloc(len);
733 	if (buf == NULL) {
734 		errno = ENOMEM;
735 		return (-1);
736 	}
737 	aa = (int *)buf;
738 	*aa = cnt;
739 	aa++;
740 	memcpy((caddr_t)aa, addrs, (size_t)(len - sizeof(int)));
741 	ret = setsockopt(sd, IPPROTO_SCTP, SCTP_CONNECT_X_DELAYED, (void *)buf,
742 	    (socklen_t)len);
743 
744 	free(buf);
745 	if (ret != 0) {
746 		if (errno == EALREADY) {
747 			no_end_cx = 1;
748 			goto continue_send;
749 		}
750 		return (ret);
751 	}
752 continue_send:
753 	if (sinfo == NULL) {
754 		sinfo = &__sinfo;
755 		memset(&__sinfo, 0, sizeof(__sinfo));
756 	}
757 	sinfo->sinfo_assoc_id = sctp_getassocid(sd, addrs);
758 	if (sinfo->sinfo_assoc_id == 0) {
759 		(void)setsockopt(sd, IPPROTO_SCTP, SCTP_CONNECT_X_COMPLETE, (void *)addrs,
760 		    (socklen_t)addrs->sa_len);
761 		errno = ENOENT;
762 		return (-1);
763 	}
764 	ret = sctp_send(sd, msg, msg_len, sinfo, flags);
765 	saved_errno = errno;
766 	if (no_end_cx == 0)
767 		(void)setsockopt(sd, IPPROTO_SCTP, SCTP_CONNECT_X_COMPLETE, (void *)addrs,
768 		    (socklen_t)addrs->sa_len);
769 
770 	errno = saved_errno;
771 	return (ret);
772 }
773 
774 ssize_t
775 sctp_sendmsgx(int sd,
776     const void *msg,
777     size_t len,
778     struct sockaddr *addrs,
779     int addrcnt,
780     uint32_t ppid,
781     uint32_t flags,
782     uint16_t stream_no,
783     uint32_t timetolive,
784     uint32_t context)
785 {
786 	struct sctp_sndrcvinfo sinfo;
787 
788 	memset((void *)&sinfo, 0, sizeof(struct sctp_sndrcvinfo));
789 	sinfo.sinfo_ppid = ppid;
790 	sinfo.sinfo_flags = flags;
791 	sinfo.sinfo_stream = stream_no;
792 	sinfo.sinfo_timetolive = timetolive;
793 	sinfo.sinfo_context = context;
794 	return (sctp_sendx(sd, msg, len, addrs, addrcnt, &sinfo, 0));
795 }
796 
797 ssize_t
798 sctp_recvmsg(int s,
799     void *dbuf,
800     size_t len,
801     struct sockaddr *from,
802     socklen_t *fromlen,
803     struct sctp_sndrcvinfo *sinfo,
804     int *msg_flags)
805 {
806 #ifdef SYS_sctp_generic_recvmsg
807 	struct iovec iov;
808 
809 	iov.iov_base = dbuf;
810 	iov.iov_len = len;
811 	return (syscall(SYS_sctp_generic_recvmsg, s,
812 	    &iov, 1, from, fromlen, sinfo, msg_flags));
813 #else
814 	ssize_t sz;
815 	struct msghdr msg;
816 	struct iovec iov;
817 	char cmsgbuf[SCTP_CONTROL_VEC_SIZE_RCV];
818 	struct cmsghdr *cmsg;
819 
820 	if (msg_flags == NULL) {
821 		errno = EINVAL;
822 		return (-1);
823 	}
824 	iov.iov_base = dbuf;
825 	iov.iov_len = len;
826 	msg.msg_name = (caddr_t)from;
827 	if (fromlen == NULL)
828 		msg.msg_namelen = 0;
829 	else
830 		msg.msg_namelen = *fromlen;
831 	msg.msg_iov = &iov;
832 	msg.msg_iovlen = 1;
833 	msg.msg_control = cmsgbuf;
834 	msg.msg_controllen = sizeof(cmsgbuf);
835 	msg.msg_flags = 0;
836 	sz = recvmsg(s, &msg, *msg_flags);
837 	*msg_flags = msg.msg_flags;
838 	if (sz <= 0) {
839 		return (sz);
840 	}
841 	if (sinfo) {
842 		sinfo->sinfo_assoc_id = 0;
843 	}
844 	if ((msg.msg_controllen > 0) && (sinfo != NULL)) {
845 		/*
846 		 * parse through and see if we find the sctp_sndrcvinfo (if
847 		 * the user wants it).
848 		 */
849 		for (cmsg = CMSG_FIRSTHDR(&msg); cmsg; cmsg = CMSG_NXTHDR(&msg, cmsg)) {
850 			if (cmsg->cmsg_level != IPPROTO_SCTP) {
851 				continue;
852 			}
853 			if (cmsg->cmsg_type == SCTP_SNDRCV) {
854 				memcpy(sinfo, CMSG_DATA(cmsg), sizeof(struct sctp_sndrcvinfo));
855 				break;
856 			}
857 			if (cmsg->cmsg_type == SCTP_EXTRCV) {
858 				/*
859 				 * Let's hope that the user provided enough
860 				 * enough memory. At least he asked for more
861 				 * information.
862 				 */
863 				memcpy(sinfo, CMSG_DATA(cmsg), sizeof(struct sctp_extrcvinfo));
864 				break;
865 			}
866 		}
867 	}
868 	return (sz);
869 #endif
870 }
871 
872 ssize_t
873 sctp_recvv(int sd,
874     const struct iovec *iov,
875     int iovlen,
876     struct sockaddr *from,
877     socklen_t *fromlen,
878     void *info,
879     socklen_t *infolen,
880     unsigned int *infotype,
881     int *flags)
882 {
883 	char cmsgbuf[SCTP_CONTROL_VEC_SIZE_RCV];
884 	struct msghdr msg;
885 	struct cmsghdr *cmsg;
886 	ssize_t ret;
887 	struct sctp_rcvinfo *rcvinfo;
888 	struct sctp_nxtinfo *nxtinfo;
889 
890 	if (((info != NULL) && (infolen == NULL)) ||
891 	    ((info == NULL) && (infolen != NULL) && (*infolen != 0)) ||
892 	    ((info != NULL) && (infotype == NULL))) {
893 		errno = EINVAL;
894 		return (-1);
895 	}
896 	if (infotype) {
897 		*infotype = SCTP_RECVV_NOINFO;
898 	}
899 	msg.msg_name = from;
900 	if (fromlen == NULL) {
901 		msg.msg_namelen = 0;
902 	} else {
903 		msg.msg_namelen = *fromlen;
904 	}
905 	msg.msg_iov = (struct iovec *)iov;
906 	msg.msg_iovlen = iovlen;
907 	msg.msg_control = cmsgbuf;
908 	msg.msg_controllen = sizeof(cmsgbuf);
909 	msg.msg_flags = 0;
910 	ret = recvmsg(sd, &msg, *flags);
911 	*flags = msg.msg_flags;
912 	if ((ret > 0) &&
913 	    (msg.msg_controllen > 0) &&
914 	    (infotype != NULL) &&
915 	    (infolen != NULL) &&
916 	    (*infolen > 0)) {
917 		rcvinfo = NULL;
918 		nxtinfo = NULL;
919 		for (cmsg = CMSG_FIRSTHDR(&msg); cmsg; cmsg = CMSG_NXTHDR(&msg, cmsg)) {
920 			if (cmsg->cmsg_level != IPPROTO_SCTP) {
921 				continue;
922 			}
923 			if (cmsg->cmsg_type == SCTP_RCVINFO) {
924 				rcvinfo = (struct sctp_rcvinfo *)CMSG_DATA(cmsg);
925 				if (nxtinfo != NULL) {
926 					break;
927 				} else {
928 					continue;
929 				}
930 			}
931 			if (cmsg->cmsg_type == SCTP_NXTINFO) {
932 				nxtinfo = (struct sctp_nxtinfo *)CMSG_DATA(cmsg);
933 				if (rcvinfo != NULL) {
934 					break;
935 				} else {
936 					continue;
937 				}
938 			}
939 		}
940 		if (rcvinfo != NULL) {
941 			if ((nxtinfo != NULL) && (*infolen >= sizeof(struct sctp_recvv_rn))) {
942 				struct sctp_recvv_rn *rn_info;
943 
944 				rn_info = (struct sctp_recvv_rn *)info;
945 				rn_info->recvv_rcvinfo = *rcvinfo;
946 				rn_info->recvv_nxtinfo = *nxtinfo;
947 				*infolen = (socklen_t)sizeof(struct sctp_recvv_rn);
948 				*infotype = SCTP_RECVV_RN;
949 			} else if (*infolen >= sizeof(struct sctp_rcvinfo)) {
950 				memcpy(info, rcvinfo, sizeof(struct sctp_rcvinfo));
951 				*infolen = (socklen_t)sizeof(struct sctp_rcvinfo);
952 				*infotype = SCTP_RECVV_RCVINFO;
953 			}
954 		} else if (nxtinfo != NULL) {
955 			if (*infolen >= sizeof(struct sctp_nxtinfo)) {
956 				memcpy(info, nxtinfo, sizeof(struct sctp_nxtinfo));
957 				*infolen = (socklen_t)sizeof(struct sctp_nxtinfo);
958 				*infotype = SCTP_RECVV_NXTINFO;
959 			}
960 		}
961 	}
962 	return (ret);
963 }
964 
965 ssize_t
966 sctp_sendv(int sd,
967     const struct iovec *iov, int iovcnt,
968     struct sockaddr *addrs, int addrcnt,
969     void *info, socklen_t infolen, unsigned int infotype,
970     int flags)
971 {
972 	ssize_t ret;
973 	int i;
974 	socklen_t addr_len;
975 	struct msghdr msg;
976 	in_port_t port;
977 	struct sctp_sendv_spa *spa_info;
978 	struct cmsghdr *cmsg;
979 	char *cmsgbuf;
980 	struct sockaddr *addr;
981 	struct sockaddr_in *addr_in;
982 	struct sockaddr_in6 *addr_in6;
983 	sctp_assoc_t *assoc_id;
984 
985 	if ((addrcnt < 0) ||
986 	    (iovcnt < 0) ||
987 	    ((addrs == NULL) && (addrcnt > 0)) ||
988 	    ((addrs != NULL) && (addrcnt == 0)) ||
989 	    ((iov == NULL) && (iovcnt > 0)) ||
990 	    ((iov != NULL) && (iovcnt == 0))) {
991 		errno = EINVAL;
992 		return (-1);
993 	}
994 	cmsgbuf = malloc(CMSG_SPACE(sizeof(struct sctp_sndinfo)) +
995 	    CMSG_SPACE(sizeof(struct sctp_prinfo)) +
996 	    CMSG_SPACE(sizeof(struct sctp_authinfo)) +
997 	    (size_t)addrcnt * CMSG_SPACE(sizeof(struct in6_addr)));
998 	if (cmsgbuf == NULL) {
999 		errno = ENOMEM;
1000 		return (-1);
1001 	}
1002 	assoc_id = NULL;
1003 	msg.msg_control = cmsgbuf;
1004 	msg.msg_controllen = 0;
1005 	cmsg = (struct cmsghdr *)cmsgbuf;
1006 	switch (infotype) {
1007 	case SCTP_SENDV_NOINFO:
1008 		if ((infolen != 0) || (info != NULL)) {
1009 			free(cmsgbuf);
1010 			errno = EINVAL;
1011 			return (-1);
1012 		}
1013 		break;
1014 	case SCTP_SENDV_SNDINFO:
1015 		if ((info == NULL) || (infolen < sizeof(struct sctp_sndinfo))) {
1016 			free(cmsgbuf);
1017 			errno = EINVAL;
1018 			return (-1);
1019 		}
1020 		cmsg->cmsg_level = IPPROTO_SCTP;
1021 		cmsg->cmsg_type = SCTP_SNDINFO;
1022 		cmsg->cmsg_len = CMSG_LEN(sizeof(struct sctp_sndinfo));
1023 		memcpy(CMSG_DATA(cmsg), info, sizeof(struct sctp_sndinfo));
1024 		msg.msg_controllen += CMSG_SPACE(sizeof(struct sctp_sndinfo));
1025 		cmsg = (struct cmsghdr *)((caddr_t)cmsg + CMSG_SPACE(sizeof(struct sctp_sndinfo)));
1026 		assoc_id = &(((struct sctp_sndinfo *)info)->snd_assoc_id);
1027 		break;
1028 	case SCTP_SENDV_PRINFO:
1029 		if ((info == NULL) || (infolen < sizeof(struct sctp_prinfo))) {
1030 			free(cmsgbuf);
1031 			errno = EINVAL;
1032 			return (-1);
1033 		}
1034 		cmsg->cmsg_level = IPPROTO_SCTP;
1035 		cmsg->cmsg_type = SCTP_PRINFO;
1036 		cmsg->cmsg_len = CMSG_LEN(sizeof(struct sctp_prinfo));
1037 		memcpy(CMSG_DATA(cmsg), info, sizeof(struct sctp_prinfo));
1038 		msg.msg_controllen += CMSG_SPACE(sizeof(struct sctp_prinfo));
1039 		cmsg = (struct cmsghdr *)((caddr_t)cmsg + CMSG_SPACE(sizeof(struct sctp_prinfo)));
1040 		break;
1041 	case SCTP_SENDV_AUTHINFO:
1042 		if ((info == NULL) || (infolen < sizeof(struct sctp_authinfo))) {
1043 			free(cmsgbuf);
1044 			errno = EINVAL;
1045 			return (-1);
1046 		}
1047 		cmsg->cmsg_level = IPPROTO_SCTP;
1048 		cmsg->cmsg_type = SCTP_AUTHINFO;
1049 		cmsg->cmsg_len = CMSG_LEN(sizeof(struct sctp_authinfo));
1050 		memcpy(CMSG_DATA(cmsg), info, sizeof(struct sctp_authinfo));
1051 		msg.msg_controllen += CMSG_SPACE(sizeof(struct sctp_authinfo));
1052 		cmsg = (struct cmsghdr *)((caddr_t)cmsg + CMSG_SPACE(sizeof(struct sctp_authinfo)));
1053 		break;
1054 	case SCTP_SENDV_SPA:
1055 		if ((info == NULL) || (infolen < sizeof(struct sctp_sendv_spa))) {
1056 			free(cmsgbuf);
1057 			errno = EINVAL;
1058 			return (-1);
1059 		}
1060 		spa_info = (struct sctp_sendv_spa *)info;
1061 		if (spa_info->sendv_flags & SCTP_SEND_SNDINFO_VALID) {
1062 			cmsg->cmsg_level = IPPROTO_SCTP;
1063 			cmsg->cmsg_type = SCTP_SNDINFO;
1064 			cmsg->cmsg_len = CMSG_LEN(sizeof(struct sctp_sndinfo));
1065 			memcpy(CMSG_DATA(cmsg), &spa_info->sendv_sndinfo, sizeof(struct sctp_sndinfo));
1066 			msg.msg_controllen += CMSG_SPACE(sizeof(struct sctp_sndinfo));
1067 			cmsg = (struct cmsghdr *)((caddr_t)cmsg + CMSG_SPACE(sizeof(struct sctp_sndinfo)));
1068 			assoc_id = &(spa_info->sendv_sndinfo.snd_assoc_id);
1069 		}
1070 		if (spa_info->sendv_flags & SCTP_SEND_PRINFO_VALID) {
1071 			cmsg->cmsg_level = IPPROTO_SCTP;
1072 			cmsg->cmsg_type = SCTP_PRINFO;
1073 			cmsg->cmsg_len = CMSG_LEN(sizeof(struct sctp_prinfo));
1074 			memcpy(CMSG_DATA(cmsg), &spa_info->sendv_prinfo, sizeof(struct sctp_prinfo));
1075 			msg.msg_controllen += CMSG_SPACE(sizeof(struct sctp_prinfo));
1076 			cmsg = (struct cmsghdr *)((caddr_t)cmsg + CMSG_SPACE(sizeof(struct sctp_prinfo)));
1077 		}
1078 		if (spa_info->sendv_flags & SCTP_SEND_AUTHINFO_VALID) {
1079 			cmsg->cmsg_level = IPPROTO_SCTP;
1080 			cmsg->cmsg_type = SCTP_AUTHINFO;
1081 			cmsg->cmsg_len = CMSG_LEN(sizeof(struct sctp_authinfo));
1082 			memcpy(CMSG_DATA(cmsg), &spa_info->sendv_authinfo, sizeof(struct sctp_authinfo));
1083 			msg.msg_controllen += CMSG_SPACE(sizeof(struct sctp_authinfo));
1084 			cmsg = (struct cmsghdr *)((caddr_t)cmsg + CMSG_SPACE(sizeof(struct sctp_authinfo)));
1085 		}
1086 		break;
1087 	default:
1088 		free(cmsgbuf);
1089 		errno = EINVAL;
1090 		return (-1);
1091 	}
1092 	addr = addrs;
1093 	msg.msg_name = NULL;
1094 	msg.msg_namelen = 0;
1095 
1096 	for (i = 0; i < addrcnt; i++) {
1097 		switch (addr->sa_family) {
1098 		case AF_INET:
1099 			addr_len = (socklen_t)sizeof(struct sockaddr_in);
1100 			addr_in = (struct sockaddr_in *)addr;
1101 			if (addr_in->sin_len != addr_len) {
1102 				free(cmsgbuf);
1103 				errno = EINVAL;
1104 				return (-1);
1105 			}
1106 			if (i == 0) {
1107 				port = addr_in->sin_port;
1108 			} else {
1109 				if (port == addr_in->sin_port) {
1110 					cmsg->cmsg_level = IPPROTO_SCTP;
1111 					cmsg->cmsg_type = SCTP_DSTADDRV4;
1112 					cmsg->cmsg_len = CMSG_LEN(sizeof(struct in_addr));
1113 					memcpy(CMSG_DATA(cmsg), &addr_in->sin_addr, sizeof(struct in_addr));
1114 					msg.msg_controllen += CMSG_SPACE(sizeof(struct in_addr));
1115 					cmsg = (struct cmsghdr *)((caddr_t)cmsg + CMSG_SPACE(sizeof(struct in_addr)));
1116 				} else {
1117 					free(cmsgbuf);
1118 					errno = EINVAL;
1119 					return (-1);
1120 				}
1121 			}
1122 			break;
1123 		case AF_INET6:
1124 			addr_len = (socklen_t)sizeof(struct sockaddr_in6);
1125 			addr_in6 = (struct sockaddr_in6 *)addr;
1126 			if (addr_in6->sin6_len != addr_len) {
1127 				free(cmsgbuf);
1128 				errno = EINVAL;
1129 				return (-1);
1130 			}
1131 			if (i == 0) {
1132 				port = addr_in6->sin6_port;
1133 			} else {
1134 				if (port == addr_in6->sin6_port) {
1135 					cmsg->cmsg_level = IPPROTO_SCTP;
1136 					cmsg->cmsg_type = SCTP_DSTADDRV6;
1137 					cmsg->cmsg_len = CMSG_LEN(sizeof(struct in6_addr));
1138 					memcpy(CMSG_DATA(cmsg), &addr_in6->sin6_addr, sizeof(struct in6_addr));
1139 					msg.msg_controllen += CMSG_SPACE(sizeof(struct in6_addr));
1140 					cmsg = (struct cmsghdr *)((caddr_t)cmsg + CMSG_SPACE(sizeof(struct in6_addr)));
1141 				} else {
1142 					free(cmsgbuf);
1143 					errno = EINVAL;
1144 					return (-1);
1145 				}
1146 			}
1147 			break;
1148 		default:
1149 			free(cmsgbuf);
1150 			errno = EINVAL;
1151 			return (-1);
1152 		}
1153 		if (i == 0) {
1154 			msg.msg_name = addr;
1155 			msg.msg_namelen = addr_len;
1156 		}
1157 		addr = (struct sockaddr *)((caddr_t)addr + addr_len);
1158 	}
1159 	if (msg.msg_controllen == 0) {
1160 		msg.msg_control = NULL;
1161 	}
1162 	msg.msg_iov = (struct iovec *)iov;
1163 	msg.msg_iovlen = iovcnt;
1164 	msg.msg_flags = 0;
1165 	ret = sendmsg(sd, &msg, flags);
1166 	free(cmsgbuf);
1167 	if ((ret >= 0) && (addrs != NULL) && (assoc_id != NULL)) {
1168 		*assoc_id = sctp_getassocid(sd, addrs);
1169 	}
1170 	return (ret);
1171 }
1172 
1173 
1174 #if !defined(SYS_sctp_peeloff) && !defined(HAVE_SCTP_PEELOFF_SOCKOPT)
1175 
1176 int
1177 sctp_peeloff(int sd, sctp_assoc_t assoc_id)
1178 {
1179 	/* NOT supported, return invalid sd */
1180 	errno = ENOTSUP;
1181 	return (-1);
1182 }
1183 
1184 #endif
1185 #if defined(SYS_sctp_peeloff) && !defined(HAVE_SCTP_PEELOFF_SOCKOPT)
1186 int
1187 sctp_peeloff(int sd, sctp_assoc_t assoc_id)
1188 {
1189 	return (syscall(SYS_sctp_peeloff, sd, assoc_id));
1190 }
1191 
1192 #endif
1193 
1194 #undef SCTP_CONTROL_VEC_SIZE_RCV
1195