1 /*- 2 * Copyright (c) 2001-2007, by Cisco Systems, Inc. All rights reserved. 3 * Copyright (c) 2008-2012, by Randall Stewart. All rights reserved. 4 * Copyright (c) 2008-2012, by Michael Tuexen. All rights reserved. 5 * 6 * Redistribution and use in source and binary forms, with or without 7 * modification, are permitted provided that the following conditions are met: 8 * 9 * a) Redistributions of source code must retain the above copyright notice, 10 * this list of conditions and the following disclaimer. 11 * 12 * b) Redistributions in binary form must reproduce the above copyright 13 * notice, this list of conditions and the following disclaimer in 14 * the documentation and/or other materials provided with the distribution. 15 * 16 * c) Neither the name of Cisco Systems, Inc. nor the names of its 17 * contributors may be used to endorse or promote products derived 18 * from this software without specific prior written permission. 19 * 20 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS 21 * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, 22 * THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 23 * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE 24 * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR 25 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF 26 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS 27 * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN 28 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) 29 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF 30 * THE POSSIBILITY OF SUCH DAMAGE. 31 */ 32 33 #include <sys/cdefs.h> 34 __FBSDID("$FreeBSD$"); 35 36 #include <stdio.h> 37 #include <string.h> 38 #include <errno.h> 39 #include <stdlib.h> 40 #include <unistd.h> 41 #include <sys/types.h> 42 #include <sys/socket.h> 43 #include <sys/errno.h> 44 #include <sys/syscall.h> 45 #include <sys/uio.h> 46 #include <netinet/in.h> 47 #include <arpa/inet.h> 48 #include <netinet/sctp_uio.h> 49 #include <netinet/sctp.h> 50 51 #ifndef IN6_IS_ADDR_V4MAPPED 52 #define IN6_IS_ADDR_V4MAPPED(a) \ 53 ((*(const uint32_t *)(const void *)(&(a)->s6_addr[0]) == 0) && \ 54 (*(const uint32_t *)(const void *)(&(a)->s6_addr[4]) == 0) && \ 55 (*(const uint32_t *)(const void *)(&(a)->s6_addr[8]) == ntohl(0x0000ffff))) 56 #endif 57 58 #define SCTP_CONTROL_VEC_SIZE_RCV 16384 59 60 61 static void 62 in6_sin6_2_sin(struct sockaddr_in *sin, struct sockaddr_in6 *sin6) 63 { 64 bzero(sin, sizeof(*sin)); 65 sin->sin_len = sizeof(struct sockaddr_in); 66 sin->sin_family = AF_INET; 67 sin->sin_port = sin6->sin6_port; 68 sin->sin_addr.s_addr = sin6->sin6_addr.__u6_addr.__u6_addr32[3]; 69 } 70 71 int 72 sctp_getaddrlen(sa_family_t family) 73 { 74 int ret, sd; 75 socklen_t siz; 76 struct sctp_assoc_value av; 77 78 av.assoc_value = family; 79 siz = sizeof(av); 80 #if defined(AF_INET) 81 sd = socket(AF_INET, SOCK_SEQPACKET, IPPROTO_SCTP); 82 #elif defined(AF_INET6) 83 sd = socket(AF_INET6, SOCK_SEQPACKET, IPPROTO_SCTP); 84 #else 85 sd = -1; 86 #endif 87 if (sd == -1) { 88 return (-1); 89 } 90 ret = getsockopt(sd, IPPROTO_SCTP, SCTP_GET_ADDR_LEN, &av, &siz); 91 close(sd); 92 if (ret == 0) { 93 return ((int)av.assoc_value); 94 } else { 95 return (-1); 96 } 97 } 98 99 int 100 sctp_connectx(int sd, const struct sockaddr *addrs, int addrcnt, 101 sctp_assoc_t * id) 102 { 103 char *buf; 104 int i, ret, cnt, *aa; 105 char *cpto; 106 const struct sockaddr *at; 107 size_t len = sizeof(int); 108 109 /* validate the address count and list */ 110 if ((addrs == NULL) || (addrcnt <= 0)) { 111 errno = EINVAL; 112 return (-1); 113 } 114 if ((buf = malloc(sizeof(int) + (size_t)addrcnt * sizeof(struct sockaddr_in6))) == NULL) { 115 errno = E2BIG; 116 return (-1); 117 } 118 at = addrs; 119 cnt = 0; 120 cpto = buf + sizeof(int); 121 /* validate all the addresses and get the size */ 122 for (i = 0; i < addrcnt; i++) { 123 switch (at->sa_family) { 124 case AF_INET: 125 if (at->sa_len != sizeof(struct sockaddr_in)) { 126 free(buf); 127 errno = EINVAL; 128 return (-1); 129 } 130 memcpy(cpto, at, sizeof(struct sockaddr_in)); 131 cpto = ((caddr_t)cpto + sizeof(struct sockaddr_in)); 132 len += sizeof(struct sockaddr_in); 133 break; 134 case AF_INET6: 135 if (at->sa_len != sizeof(struct sockaddr_in6)) { 136 free(buf); 137 errno = EINVAL; 138 return (-1); 139 } 140 if (IN6_IS_ADDR_V4MAPPED(&((struct sockaddr_in6 *)at)->sin6_addr)) { 141 in6_sin6_2_sin((struct sockaddr_in *)cpto, (struct sockaddr_in6 *)at); 142 cpto = ((caddr_t)cpto + sizeof(struct sockaddr_in)); 143 len += sizeof(struct sockaddr_in); 144 } else { 145 memcpy(cpto, at, sizeof(struct sockaddr_in6)); 146 cpto = ((caddr_t)cpto + sizeof(struct sockaddr_in6)); 147 len += sizeof(struct sockaddr_in6); 148 } 149 break; 150 default: 151 free(buf); 152 errno = EINVAL; 153 return (-1); 154 } 155 at = (struct sockaddr *)((caddr_t)at + at->sa_len); 156 } 157 aa = (int *)buf; 158 *aa = addrcnt; 159 ret = setsockopt(sd, IPPROTO_SCTP, SCTP_CONNECT_X, (void *)buf, 160 (socklen_t) len); 161 if ((ret == 0) && (id != NULL)) { 162 *id = *(sctp_assoc_t *) buf; 163 } 164 return (ret); 165 } 166 167 int 168 sctp_bindx(int sd, struct sockaddr *addrs, int addrcnt, int flags) 169 { 170 struct sctp_getaddresses *gaddrs; 171 struct sockaddr *sa; 172 struct sockaddr_in *sin; 173 struct sockaddr_in6 *sin6; 174 int i; 175 size_t argsz; 176 uint16_t sport = 0; 177 178 /* validate the flags */ 179 if ((flags != SCTP_BINDX_ADD_ADDR) && 180 (flags != SCTP_BINDX_REM_ADDR)) { 181 errno = EFAULT; 182 return (-1); 183 } 184 /* validate the address count and list */ 185 if ((addrcnt <= 0) || (addrs == NULL)) { 186 errno = EINVAL; 187 return (-1); 188 } 189 /* First pre-screen the addresses */ 190 sa = addrs; 191 for (i = 0; i < addrcnt; i++) { 192 switch (sa->sa_family) { 193 case AF_INET: 194 if (sa->sa_len != sizeof(struct sockaddr_in)) { 195 errno = EINVAL; 196 return (-1); 197 } 198 sin = (struct sockaddr_in *)sa; 199 if (sin->sin_port) { 200 /* non-zero port, check or save */ 201 if (sport) { 202 /* Check against our port */ 203 if (sport != sin->sin_port) { 204 errno = EINVAL; 205 return (-1); 206 } 207 } else { 208 /* save off the port */ 209 sport = sin->sin_port; 210 } 211 } 212 break; 213 case AF_INET6: 214 if (sa->sa_len != sizeof(struct sockaddr_in6)) { 215 errno = EINVAL; 216 return (-1); 217 } 218 sin6 = (struct sockaddr_in6 *)sa; 219 if (sin6->sin6_port) { 220 /* non-zero port, check or save */ 221 if (sport) { 222 /* Check against our port */ 223 if (sport != sin6->sin6_port) { 224 errno = EINVAL; 225 return (-1); 226 } 227 } else { 228 /* save off the port */ 229 sport = sin6->sin6_port; 230 } 231 } 232 break; 233 default: 234 /* Invalid address family specified. */ 235 errno = EINVAL; 236 return (-1); 237 } 238 sa = (struct sockaddr *)((caddr_t)sa + sa->sa_len); 239 } 240 /* 241 * Now if there was a port mentioned, assure that the first address 242 * has that port to make sure it fails or succeeds correctly. 243 */ 244 if (sport) { 245 sin = (struct sockaddr_in *)sa; 246 sin->sin_port = sport; 247 } 248 argsz = sizeof(struct sctp_getaddresses) + 249 sizeof(struct sockaddr_storage); 250 if ((gaddrs = (struct sctp_getaddresses *)malloc(argsz)) == NULL) { 251 errno = ENOMEM; 252 return (-1); 253 } 254 sa = addrs; 255 for (i = 0; i < addrcnt; i++) { 256 memset(gaddrs, 0, argsz); 257 gaddrs->sget_assoc_id = 0; 258 memcpy(gaddrs->addr, sa, sa->sa_len); 259 if (setsockopt(sd, IPPROTO_SCTP, flags, gaddrs, 260 (socklen_t) argsz) != 0) { 261 free(gaddrs); 262 return (-1); 263 } 264 sa = (struct sockaddr *)((caddr_t)sa + sa->sa_len); 265 } 266 free(gaddrs); 267 return (0); 268 } 269 270 int 271 sctp_opt_info(int sd, sctp_assoc_t id, int opt, void *arg, socklen_t * size) 272 { 273 if (arg == NULL) { 274 errno = EINVAL; 275 return (-1); 276 } 277 switch (opt) { 278 case SCTP_RTOINFO: 279 ((struct sctp_rtoinfo *)arg)->srto_assoc_id = id; 280 break; 281 case SCTP_ASSOCINFO: 282 ((struct sctp_assocparams *)arg)->sasoc_assoc_id = id; 283 break; 284 case SCTP_DEFAULT_SEND_PARAM: 285 ((struct sctp_assocparams *)arg)->sasoc_assoc_id = id; 286 break; 287 case SCTP_PRIMARY_ADDR: 288 ((struct sctp_setprim *)arg)->ssp_assoc_id = id; 289 break; 290 case SCTP_PEER_ADDR_PARAMS: 291 ((struct sctp_paddrparams *)arg)->spp_assoc_id = id; 292 break; 293 case SCTP_MAXSEG: 294 ((struct sctp_assoc_value *)arg)->assoc_id = id; 295 break; 296 case SCTP_AUTH_KEY: 297 ((struct sctp_authkey *)arg)->sca_assoc_id = id; 298 break; 299 case SCTP_AUTH_ACTIVE_KEY: 300 ((struct sctp_authkeyid *)arg)->scact_assoc_id = id; 301 break; 302 case SCTP_DELAYED_SACK: 303 ((struct sctp_sack_info *)arg)->sack_assoc_id = id; 304 break; 305 case SCTP_CONTEXT: 306 ((struct sctp_assoc_value *)arg)->assoc_id = id; 307 break; 308 case SCTP_STATUS: 309 ((struct sctp_status *)arg)->sstat_assoc_id = id; 310 break; 311 case SCTP_GET_PEER_ADDR_INFO: 312 ((struct sctp_paddrinfo *)arg)->spinfo_assoc_id = id; 313 break; 314 case SCTP_PEER_AUTH_CHUNKS: 315 ((struct sctp_authchunks *)arg)->gauth_assoc_id = id; 316 break; 317 case SCTP_LOCAL_AUTH_CHUNKS: 318 ((struct sctp_authchunks *)arg)->gauth_assoc_id = id; 319 break; 320 case SCTP_TIMEOUTS: 321 ((struct sctp_timeouts *)arg)->stimo_assoc_id = id; 322 break; 323 case SCTP_EVENT: 324 ((struct sctp_event *)arg)->se_assoc_id = id; 325 break; 326 case SCTP_DEFAULT_SNDINFO: 327 ((struct sctp_sndinfo *)arg)->snd_assoc_id = id; 328 break; 329 case SCTP_DEFAULT_PRINFO: 330 ((struct sctp_default_prinfo *)arg)->pr_assoc_id = id; 331 break; 332 case SCTP_PEER_ADDR_THLDS: 333 ((struct sctp_paddrthlds *)arg)->spt_assoc_id = id; 334 break; 335 case SCTP_REMOTE_UDP_ENCAPS_PORT: 336 ((struct sctp_udpencaps *)arg)->sue_assoc_id = id; 337 break; 338 case SCTP_MAX_BURST: 339 ((struct sctp_assoc_value *)arg)->assoc_id = id; 340 break; 341 default: 342 break; 343 } 344 return (getsockopt(sd, IPPROTO_SCTP, opt, arg, size)); 345 } 346 347 int 348 sctp_getpaddrs(int sd, sctp_assoc_t id, struct sockaddr **raddrs) 349 { 350 struct sctp_getaddresses *addrs; 351 struct sockaddr *sa; 352 sctp_assoc_t asoc; 353 caddr_t lim; 354 socklen_t opt_len; 355 int cnt; 356 357 if (raddrs == NULL) { 358 errno = EFAULT; 359 return (-1); 360 } 361 asoc = id; 362 opt_len = (socklen_t) sizeof(sctp_assoc_t); 363 if (getsockopt(sd, IPPROTO_SCTP, SCTP_GET_REMOTE_ADDR_SIZE, 364 &asoc, &opt_len) != 0) { 365 return (-1); 366 } 367 /* size required is returned in 'asoc' */ 368 opt_len = (socklen_t) ((size_t)asoc + sizeof(struct sctp_getaddresses)); 369 addrs = calloc(1, (size_t)opt_len); 370 if (addrs == NULL) { 371 errno = ENOMEM; 372 return (-1); 373 } 374 addrs->sget_assoc_id = id; 375 /* Now lets get the array of addresses */ 376 if (getsockopt(sd, IPPROTO_SCTP, SCTP_GET_PEER_ADDRESSES, 377 addrs, &opt_len) != 0) { 378 free(addrs); 379 return (-1); 380 } 381 *raddrs = (struct sockaddr *)&addrs->addr[0]; 382 cnt = 0; 383 sa = (struct sockaddr *)&addrs->addr[0]; 384 lim = (caddr_t)addrs + opt_len; 385 while (((caddr_t)sa < lim) && (sa->sa_len > 0)) { 386 sa = (struct sockaddr *)((caddr_t)sa + sa->sa_len); 387 cnt++; 388 } 389 return (cnt); 390 } 391 392 void 393 sctp_freepaddrs(struct sockaddr *addrs) 394 { 395 void *fr_addr; 396 397 /* Take away the hidden association id */ 398 fr_addr = (void *)((caddr_t)addrs - sizeof(sctp_assoc_t)); 399 /* Now free it */ 400 free(fr_addr); 401 } 402 403 int 404 sctp_getladdrs(int sd, sctp_assoc_t id, struct sockaddr **raddrs) 405 { 406 struct sctp_getaddresses *addrs; 407 caddr_t lim; 408 struct sockaddr *sa; 409 size_t size_of_addresses; 410 socklen_t opt_len; 411 int cnt; 412 413 if (raddrs == NULL) { 414 errno = EFAULT; 415 return (-1); 416 } 417 size_of_addresses = 0; 418 opt_len = (socklen_t) sizeof(int); 419 if (getsockopt(sd, IPPROTO_SCTP, SCTP_GET_LOCAL_ADDR_SIZE, 420 &size_of_addresses, &opt_len) != 0) { 421 errno = ENOMEM; 422 return (-1); 423 } 424 if (size_of_addresses == 0) { 425 errno = ENOTCONN; 426 return (-1); 427 } 428 opt_len = (socklen_t) (size_of_addresses + 429 sizeof(struct sockaddr_storage) + 430 sizeof(struct sctp_getaddresses)); 431 addrs = calloc(1, (size_t)opt_len); 432 if (addrs == NULL) { 433 errno = ENOMEM; 434 return (-1); 435 } 436 addrs->sget_assoc_id = id; 437 /* Now lets get the array of addresses */ 438 if (getsockopt(sd, IPPROTO_SCTP, SCTP_GET_LOCAL_ADDRESSES, addrs, 439 &opt_len) != 0) { 440 free(addrs); 441 errno = ENOMEM; 442 return (-1); 443 } 444 *raddrs = (struct sockaddr *)&addrs->addr[0]; 445 cnt = 0; 446 sa = (struct sockaddr *)&addrs->addr[0]; 447 lim = (caddr_t)addrs + opt_len; 448 while (((caddr_t)sa < lim) && (sa->sa_len > 0)) { 449 sa = (struct sockaddr *)((caddr_t)sa + sa->sa_len); 450 cnt++; 451 } 452 return (cnt); 453 } 454 455 void 456 sctp_freeladdrs(struct sockaddr *addrs) 457 { 458 void *fr_addr; 459 460 /* Take away the hidden association id */ 461 fr_addr = (void *)((caddr_t)addrs - sizeof(sctp_assoc_t)); 462 /* Now free it */ 463 free(fr_addr); 464 } 465 466 ssize_t 467 sctp_sendmsg(int s, 468 const void *data, 469 size_t len, 470 const struct sockaddr *to, 471 socklen_t tolen, 472 uint32_t ppid, 473 uint32_t flags, 474 uint16_t stream_no, 475 uint32_t timetolive, 476 uint32_t context) 477 { 478 #ifdef SYS_sctp_generic_sendmsg 479 struct sctp_sndrcvinfo sinfo; 480 481 memset(&sinfo, 0, sizeof(struct sctp_sndrcvinfo)); 482 sinfo.sinfo_ppid = ppid; 483 sinfo.sinfo_flags = flags; 484 sinfo.sinfo_stream = stream_no; 485 sinfo.sinfo_timetolive = timetolive; 486 sinfo.sinfo_context = context; 487 sinfo.sinfo_assoc_id = 0; 488 return (syscall(SYS_sctp_generic_sendmsg, s, 489 data, len, to, tolen, &sinfo, 0)); 490 #else 491 struct msghdr msg; 492 struct sctp_sndrcvinfo *sinfo; 493 struct iovec iov; 494 char cmsgbuf[CMSG_SPACE(sizeof(struct sctp_sndrcvinfo))]; 495 struct cmsghdr *cmsg; 496 struct sockaddr *who = NULL; 497 union { 498 struct sockaddr_in in; 499 struct sockaddr_in6 in6; 500 } addr; 501 502 if ((tolen > 0) && 503 ((to == NULL) || (tolen < sizeof(struct sockaddr)))) { 504 errno = EINVAL; 505 return (-1); 506 } 507 if ((to != NULL) && (tolen > 0)) { 508 switch (to->sa_family) { 509 case AF_INET: 510 if (tolen != sizeof(struct sockaddr_in)) { 511 errno = EINVAL; 512 return (-1); 513 } 514 if ((to->sa_len > 0) && 515 (to->sa_len != sizeof(struct sockaddr_in))) { 516 errno = EINVAL; 517 return (-1); 518 } 519 memcpy(&addr, to, sizeof(struct sockaddr_in)); 520 addr.in.sin_len = sizeof(struct sockaddr_in); 521 break; 522 case AF_INET6: 523 if (tolen != sizeof(struct sockaddr_in6)) { 524 errno = EINVAL; 525 return (-1); 526 } 527 if ((to->sa_len > 0) && 528 (to->sa_len != sizeof(struct sockaddr_in6))) { 529 errno = EINVAL; 530 return (-1); 531 } 532 memcpy(&addr, to, sizeof(struct sockaddr_in6)); 533 addr.in6.sin6_len = sizeof(struct sockaddr_in6); 534 break; 535 default: 536 errno = EAFNOSUPPORT; 537 return (-1); 538 } 539 who = (struct sockaddr *)&addr; 540 } 541 iov.iov_base = (char *)data; 542 iov.iov_len = len; 543 544 if (who) { 545 msg.msg_name = (caddr_t)who; 546 msg.msg_namelen = who->sa_len; 547 } else { 548 msg.msg_name = (caddr_t)NULL; 549 msg.msg_namelen = 0; 550 } 551 msg.msg_iov = &iov; 552 msg.msg_iovlen = 1; 553 msg.msg_control = cmsgbuf; 554 msg.msg_controllen = CMSG_SPACE(sizeof(struct sctp_sndrcvinfo)); 555 cmsg = (struct cmsghdr *)cmsgbuf; 556 cmsg->cmsg_level = IPPROTO_SCTP; 557 cmsg->cmsg_type = SCTP_SNDRCV; 558 cmsg->cmsg_len = CMSG_LEN(sizeof(struct sctp_sndrcvinfo)); 559 sinfo = (struct sctp_sndrcvinfo *)CMSG_DATA(cmsg); 560 sinfo->sinfo_stream = stream_no; 561 sinfo->sinfo_ssn = 0; 562 sinfo->sinfo_flags = flags; 563 sinfo->sinfo_ppid = ppid; 564 sinfo->sinfo_context = context; 565 sinfo->sinfo_assoc_id = 0; 566 sinfo->sinfo_timetolive = timetolive; 567 return (sendmsg(s, &msg, 0)); 568 #endif 569 } 570 571 572 sctp_assoc_t 573 sctp_getassocid(int sd, struct sockaddr *sa) 574 { 575 struct sctp_paddrinfo sp; 576 socklen_t siz; 577 578 /* First get the assoc id */ 579 siz = sizeof(sp); 580 memset(&sp, 0, sizeof(sp)); 581 memcpy((caddr_t)&sp.spinfo_address, sa, sa->sa_len); 582 if (getsockopt(sd, IPPROTO_SCTP, 583 SCTP_GET_PEER_ADDR_INFO, &sp, &siz) != 0) { 584 /* We depend on the fact that 0 can never be returned */ 585 return ((sctp_assoc_t) 0); 586 } 587 return (sp.spinfo_assoc_id); 588 } 589 590 ssize_t 591 sctp_send(int sd, const void *data, size_t len, 592 const struct sctp_sndrcvinfo *sinfo, 593 int flags) 594 { 595 596 #ifdef SYS_sctp_generic_sendmsg 597 struct sockaddr *to = NULL; 598 599 return (syscall(SYS_sctp_generic_sendmsg, sd, 600 data, len, to, 0, sinfo, flags)); 601 #else 602 struct msghdr msg; 603 struct iovec iov; 604 char cmsgbuf[CMSG_SPACE(sizeof(struct sctp_sndrcvinfo))]; 605 struct cmsghdr *cmsg; 606 607 if (sinfo == NULL) { 608 errno = EINVAL; 609 return (-1); 610 } 611 iov.iov_base = (char *)data; 612 iov.iov_len = len; 613 614 msg.msg_name = NULL; 615 msg.msg_namelen = 0; 616 msg.msg_iov = &iov; 617 msg.msg_iovlen = 1; 618 msg.msg_control = cmsgbuf; 619 msg.msg_controllen = CMSG_SPACE(sizeof(struct sctp_sndrcvinfo)); 620 cmsg = (struct cmsghdr *)cmsgbuf; 621 cmsg->cmsg_level = IPPROTO_SCTP; 622 cmsg->cmsg_type = SCTP_SNDRCV; 623 cmsg->cmsg_len = CMSG_LEN(sizeof(struct sctp_sndrcvinfo)); 624 memcpy(CMSG_DATA(cmsg), sinfo, sizeof(struct sctp_sndrcvinfo)); 625 return (sendmsg(sd, &msg, flags)); 626 #endif 627 } 628 629 630 631 ssize_t 632 sctp_sendx(int sd, const void *msg, size_t msg_len, 633 struct sockaddr *addrs, int addrcnt, 634 struct sctp_sndrcvinfo *sinfo, 635 int flags) 636 { 637 struct sctp_sndrcvinfo __sinfo; 638 ssize_t ret; 639 int i, cnt, *aa, saved_errno; 640 char *buf; 641 int no_end_cx = 0; 642 size_t len, add_len; 643 struct sockaddr *at; 644 645 if (addrs == NULL) { 646 errno = EINVAL; 647 return (-1); 648 } 649 #ifdef SYS_sctp_generic_sendmsg 650 if (addrcnt == 1) { 651 socklen_t l; 652 653 /* 654 * Quick way, we don't need to do a connectx so lets use the 655 * syscall directly. 656 */ 657 l = addrs->sa_len; 658 return (syscall(SYS_sctp_generic_sendmsg, sd, 659 msg, msg_len, addrs, l, sinfo, flags)); 660 } 661 #endif 662 663 len = sizeof(int); 664 at = addrs; 665 cnt = 0; 666 /* validate all the addresses and get the size */ 667 for (i = 0; i < addrcnt; i++) { 668 if (at->sa_family == AF_INET) { 669 add_len = sizeof(struct sockaddr_in); 670 } else if (at->sa_family == AF_INET6) { 671 add_len = sizeof(struct sockaddr_in6); 672 } else { 673 errno = EINVAL; 674 return (-1); 675 } 676 len += add_len; 677 at = (struct sockaddr *)((caddr_t)at + add_len); 678 cnt++; 679 } 680 /* do we have any? */ 681 if (cnt == 0) { 682 errno = EINVAL; 683 return (-1); 684 } 685 buf = malloc(len); 686 if (buf == NULL) { 687 errno = ENOMEM; 688 return (-1); 689 } 690 aa = (int *)buf; 691 *aa = cnt; 692 aa++; 693 memcpy((caddr_t)aa, addrs, (size_t)(len - sizeof(int))); 694 ret = setsockopt(sd, IPPROTO_SCTP, SCTP_CONNECT_X_DELAYED, (void *)buf, 695 (socklen_t) len); 696 697 free(buf); 698 if (ret != 0) { 699 if (errno == EALREADY) { 700 no_end_cx = 1; 701 goto continue_send; 702 } 703 return (ret); 704 } 705 continue_send: 706 if (sinfo == NULL) { 707 sinfo = &__sinfo; 708 memset(&__sinfo, 0, sizeof(__sinfo)); 709 } 710 sinfo->sinfo_assoc_id = sctp_getassocid(sd, addrs); 711 if (sinfo->sinfo_assoc_id == 0) { 712 (void)setsockopt(sd, IPPROTO_SCTP, SCTP_CONNECT_X_COMPLETE, (void *)addrs, 713 (socklen_t) addrs->sa_len); 714 errno = ENOENT; 715 return (-1); 716 } 717 ret = sctp_send(sd, msg, msg_len, sinfo, flags); 718 saved_errno = errno; 719 if (no_end_cx == 0) 720 (void)setsockopt(sd, IPPROTO_SCTP, SCTP_CONNECT_X_COMPLETE, (void *)addrs, 721 (socklen_t) addrs->sa_len); 722 723 errno = saved_errno; 724 return (ret); 725 } 726 727 ssize_t 728 sctp_sendmsgx(int sd, 729 const void *msg, 730 size_t len, 731 struct sockaddr *addrs, 732 int addrcnt, 733 uint32_t ppid, 734 uint32_t flags, 735 uint16_t stream_no, 736 uint32_t timetolive, 737 uint32_t context) 738 { 739 struct sctp_sndrcvinfo sinfo; 740 741 memset((void *)&sinfo, 0, sizeof(struct sctp_sndrcvinfo)); 742 sinfo.sinfo_ppid = ppid; 743 sinfo.sinfo_flags = flags; 744 sinfo.sinfo_ssn = stream_no; 745 sinfo.sinfo_timetolive = timetolive; 746 sinfo.sinfo_context = context; 747 return (sctp_sendx(sd, msg, len, addrs, addrcnt, &sinfo, 0)); 748 } 749 750 ssize_t 751 sctp_recvmsg(int s, 752 void *dbuf, 753 size_t len, 754 struct sockaddr *from, 755 socklen_t * fromlen, 756 struct sctp_sndrcvinfo *sinfo, 757 int *msg_flags) 758 { 759 #ifdef SYS_sctp_generic_recvmsg 760 struct iovec iov; 761 762 iov.iov_base = dbuf; 763 iov.iov_len = len; 764 return (syscall(SYS_sctp_generic_recvmsg, s, 765 &iov, 1, from, fromlen, sinfo, msg_flags)); 766 #else 767 ssize_t sz; 768 struct msghdr msg; 769 struct iovec iov; 770 char cmsgbuf[SCTP_CONTROL_VEC_SIZE_RCV]; 771 struct cmsghdr *cmsg; 772 773 if (msg_flags == NULL) { 774 errno = EINVAL; 775 return (-1); 776 } 777 msg.msg_flags = 0; 778 iov.iov_base = dbuf; 779 iov.iov_len = len; 780 msg.msg_name = (caddr_t)from; 781 if (fromlen == NULL) 782 msg.msg_namelen = 0; 783 else 784 msg.msg_namelen = *fromlen; 785 msg.msg_iov = &iov; 786 msg.msg_iovlen = 1; 787 msg.msg_control = cmsgbuf; 788 msg.msg_controllen = sizeof(cmsgbuf); 789 sz = recvmsg(s, &msg, *msg_flags); 790 *msg_flags = msg.msg_flags; 791 if (sz <= 0) { 792 return (sz); 793 } 794 if (sinfo) { 795 sinfo->sinfo_assoc_id = 0; 796 } 797 if ((msg.msg_controllen > 0) && (sinfo != NULL)) { 798 /* 799 * parse through and see if we find the sctp_sndrcvinfo (if 800 * the user wants it). 801 */ 802 for (cmsg = CMSG_FIRSTHDR(&msg); cmsg; cmsg = CMSG_NXTHDR(&msg, cmsg)) { 803 if (cmsg->cmsg_level != IPPROTO_SCTP) { 804 continue; 805 } 806 if (cmsg->cmsg_type == SCTP_SNDRCV) { 807 memcpy(sinfo, CMSG_DATA(cmsg), sizeof(struct sctp_sndrcvinfo)); 808 break; 809 } 810 if (cmsg->cmsg_type == SCTP_EXTRCV) { 811 /* 812 * Let's hope that the user provided enough 813 * enough memory. At least he asked for more 814 * information. 815 */ 816 memcpy(sinfo, CMSG_DATA(cmsg), sizeof(struct sctp_extrcvinfo)); 817 break; 818 } 819 } 820 } 821 return (sz); 822 #endif 823 } 824 825 ssize_t 826 sctp_recvv(int sd, 827 const struct iovec *iov, 828 int iovlen, 829 struct sockaddr *from, 830 socklen_t * fromlen, 831 void *info, 832 socklen_t * infolen, 833 unsigned int *infotype, 834 int *flags) 835 { 836 char cmsgbuf[SCTP_CONTROL_VEC_SIZE_RCV]; 837 struct msghdr msg; 838 struct cmsghdr *cmsg; 839 ssize_t ret; 840 struct sctp_rcvinfo *rcvinfo; 841 struct sctp_nxtinfo *nxtinfo; 842 843 if (((info != NULL) && (infolen == NULL)) | 844 ((info == NULL) && (infolen != NULL) && (*infolen != 0)) || 845 ((info != NULL) && (infotype == NULL))) { 846 errno = EINVAL; 847 return (-1); 848 } 849 if (infotype) { 850 *infotype = SCTP_RECVV_NOINFO; 851 } 852 msg.msg_name = from; 853 if (fromlen == NULL) { 854 msg.msg_namelen = 0; 855 } else { 856 msg.msg_namelen = *fromlen; 857 } 858 msg.msg_iov = (struct iovec *)iov; 859 msg.msg_iovlen = iovlen; 860 msg.msg_control = cmsgbuf; 861 msg.msg_controllen = sizeof(cmsgbuf); 862 ret = recvmsg(sd, &msg, *flags); 863 *flags = msg.msg_flags; 864 if ((ret > 0) && 865 (msg.msg_controllen > 0) && 866 (infotype != NULL) && 867 (infolen != NULL) && 868 (*infolen > 0)) { 869 rcvinfo = NULL; 870 nxtinfo = NULL; 871 for (cmsg = CMSG_FIRSTHDR(&msg); cmsg; cmsg = CMSG_NXTHDR(&msg, cmsg)) { 872 if (cmsg->cmsg_level != IPPROTO_SCTP) { 873 continue; 874 } 875 if (cmsg->cmsg_type == SCTP_RCVINFO) { 876 rcvinfo = (struct sctp_rcvinfo *)CMSG_DATA(cmsg); 877 if (nxtinfo != NULL) { 878 break; 879 } else { 880 continue; 881 } 882 } 883 if (cmsg->cmsg_type == SCTP_NXTINFO) { 884 nxtinfo = (struct sctp_nxtinfo *)CMSG_DATA(cmsg); 885 if (rcvinfo != NULL) { 886 break; 887 } else { 888 continue; 889 } 890 } 891 } 892 if (rcvinfo != NULL) { 893 if ((nxtinfo != NULL) && (*infolen >= sizeof(struct sctp_recvv_rn))) { 894 struct sctp_recvv_rn *rn_info; 895 896 rn_info = (struct sctp_recvv_rn *)info; 897 rn_info->recvv_rcvinfo = *rcvinfo; 898 rn_info->recvv_nxtinfo = *nxtinfo; 899 *infolen = (socklen_t) sizeof(struct sctp_recvv_rn); 900 *infotype = SCTP_RECVV_RN; 901 } else if (*infolen >= sizeof(struct sctp_rcvinfo)) { 902 memcpy(info, rcvinfo, sizeof(struct sctp_rcvinfo)); 903 *infolen = (socklen_t) sizeof(struct sctp_rcvinfo); 904 *infotype = SCTP_RECVV_RCVINFO; 905 } 906 } else if (nxtinfo != NULL) { 907 if (*infolen >= sizeof(struct sctp_nxtinfo)) { 908 memcpy(info, nxtinfo, sizeof(struct sctp_nxtinfo)); 909 *infolen = (socklen_t) sizeof(struct sctp_nxtinfo); 910 *infotype = SCTP_RECVV_NXTINFO; 911 } 912 } 913 } 914 return (ret); 915 } 916 917 ssize_t 918 sctp_sendv(int sd, 919 const struct iovec *iov, int iovcnt, 920 struct sockaddr *addrs, int addrcnt, 921 void *info, socklen_t infolen, unsigned int infotype, 922 int flags) 923 { 924 ssize_t ret; 925 int i; 926 socklen_t addr_len; 927 struct msghdr msg; 928 in_port_t port; 929 struct sctp_sendv_spa *spa_info; 930 struct cmsghdr *cmsg; 931 char *cmsgbuf; 932 struct sockaddr *addr; 933 struct sockaddr_in *addr_in; 934 struct sockaddr_in6 *addr_in6; 935 936 if ((addrcnt < 0) || 937 (iovcnt < 0) || 938 ((addrs == NULL) && (addrcnt > 0)) || 939 ((addrs != NULL) && (addrcnt == 0)) || 940 ((iov == NULL) && (iovcnt > 0)) || 941 ((iov != NULL) && (iovcnt == 0))) { 942 errno = EINVAL; 943 return (-1); 944 } 945 cmsgbuf = malloc(CMSG_SPACE(sizeof(struct sctp_sndinfo)) + 946 CMSG_SPACE(sizeof(struct sctp_prinfo)) + 947 CMSG_SPACE(sizeof(struct sctp_authinfo)) + 948 (size_t)addrcnt * CMSG_SPACE(sizeof(struct in6_addr))); 949 if (cmsgbuf == NULL) { 950 errno = ENOMEM; 951 return (-1); 952 } 953 msg.msg_control = cmsgbuf; 954 msg.msg_controllen = 0; 955 cmsg = (struct cmsghdr *)cmsgbuf; 956 switch (infotype) { 957 case SCTP_SENDV_NOINFO: 958 if ((infolen != 0) || (info != NULL)) { 959 free(cmsgbuf); 960 errno = EINVAL; 961 return (-1); 962 } 963 break; 964 case SCTP_SENDV_SNDINFO: 965 if ((info == NULL) || (infolen < sizeof(struct sctp_sndinfo))) { 966 free(cmsgbuf); 967 errno = EINVAL; 968 return (-1); 969 } 970 cmsg->cmsg_level = IPPROTO_SCTP; 971 cmsg->cmsg_type = SCTP_SNDINFO; 972 cmsg->cmsg_len = CMSG_LEN(sizeof(struct sctp_sndinfo)); 973 memcpy(CMSG_DATA(cmsg), info, sizeof(struct sctp_sndinfo)); 974 msg.msg_controllen += CMSG_SPACE(sizeof(struct sctp_sndinfo)); 975 cmsg = (struct cmsghdr *)((caddr_t)cmsg + CMSG_SPACE(sizeof(struct sctp_sndinfo))); 976 break; 977 case SCTP_SENDV_PRINFO: 978 if ((info == NULL) || (infolen < sizeof(struct sctp_prinfo))) { 979 free(cmsgbuf); 980 errno = EINVAL; 981 return (-1); 982 } 983 cmsg->cmsg_level = IPPROTO_SCTP; 984 cmsg->cmsg_type = SCTP_PRINFO; 985 cmsg->cmsg_len = CMSG_LEN(sizeof(struct sctp_prinfo)); 986 memcpy(CMSG_DATA(cmsg), info, sizeof(struct sctp_prinfo)); 987 msg.msg_controllen += CMSG_SPACE(sizeof(struct sctp_prinfo)); 988 cmsg = (struct cmsghdr *)((caddr_t)cmsg + CMSG_SPACE(sizeof(struct sctp_prinfo))); 989 break; 990 case SCTP_SENDV_AUTHINFO: 991 if ((info == NULL) || (infolen < sizeof(struct sctp_authinfo))) { 992 free(cmsgbuf); 993 errno = EINVAL; 994 return (-1); 995 } 996 cmsg->cmsg_level = IPPROTO_SCTP; 997 cmsg->cmsg_type = SCTP_AUTHINFO; 998 cmsg->cmsg_len = CMSG_LEN(sizeof(struct sctp_authinfo)); 999 memcpy(CMSG_DATA(cmsg), info, sizeof(struct sctp_authinfo)); 1000 msg.msg_controllen += CMSG_SPACE(sizeof(struct sctp_authinfo)); 1001 cmsg = (struct cmsghdr *)((caddr_t)cmsg + CMSG_SPACE(sizeof(struct sctp_authinfo))); 1002 break; 1003 case SCTP_SENDV_SPA: 1004 if ((info == NULL) || (infolen < sizeof(struct sctp_sendv_spa))) { 1005 free(cmsgbuf); 1006 errno = EINVAL; 1007 return (-1); 1008 } 1009 spa_info = (struct sctp_sendv_spa *)info; 1010 if (spa_info->sendv_flags & SCTP_SEND_SNDINFO_VALID) { 1011 cmsg->cmsg_level = IPPROTO_SCTP; 1012 cmsg->cmsg_type = SCTP_SNDINFO; 1013 cmsg->cmsg_len = CMSG_LEN(sizeof(struct sctp_sndinfo)); 1014 memcpy(CMSG_DATA(cmsg), &spa_info->sendv_sndinfo, sizeof(struct sctp_sndinfo)); 1015 msg.msg_controllen += CMSG_SPACE(sizeof(struct sctp_sndinfo)); 1016 cmsg = (struct cmsghdr *)((caddr_t)cmsg + CMSG_SPACE(sizeof(struct sctp_sndinfo))); 1017 } 1018 if (spa_info->sendv_flags & SCTP_SEND_PRINFO_VALID) { 1019 cmsg->cmsg_level = IPPROTO_SCTP; 1020 cmsg->cmsg_type = SCTP_PRINFO; 1021 cmsg->cmsg_len = CMSG_LEN(sizeof(struct sctp_prinfo)); 1022 memcpy(CMSG_DATA(cmsg), &spa_info->sendv_prinfo, sizeof(struct sctp_prinfo)); 1023 msg.msg_controllen += CMSG_SPACE(sizeof(struct sctp_prinfo)); 1024 cmsg = (struct cmsghdr *)((caddr_t)cmsg + CMSG_SPACE(sizeof(struct sctp_prinfo))); 1025 } 1026 if (spa_info->sendv_flags & SCTP_SEND_AUTHINFO_VALID) { 1027 cmsg->cmsg_level = IPPROTO_SCTP; 1028 cmsg->cmsg_type = SCTP_AUTHINFO; 1029 cmsg->cmsg_len = CMSG_LEN(sizeof(struct sctp_authinfo)); 1030 memcpy(CMSG_DATA(cmsg), &spa_info->sendv_authinfo, sizeof(struct sctp_authinfo)); 1031 msg.msg_controllen += CMSG_SPACE(sizeof(struct sctp_authinfo)); 1032 cmsg = (struct cmsghdr *)((caddr_t)cmsg + CMSG_SPACE(sizeof(struct sctp_authinfo))); 1033 } 1034 break; 1035 default: 1036 free(cmsgbuf); 1037 errno = EINVAL; 1038 return (-1); 1039 } 1040 addr = addrs; 1041 msg.msg_name = NULL; 1042 msg.msg_namelen = 0; 1043 1044 for (i = 0; i < addrcnt; i++) { 1045 switch (addr->sa_family) { 1046 case AF_INET: 1047 addr_len = (socklen_t) sizeof(struct sockaddr_in); 1048 addr_in = (struct sockaddr_in *)addr; 1049 if (addr_in->sin_len != addr_len) { 1050 free(cmsgbuf); 1051 errno = EINVAL; 1052 return (-1); 1053 } 1054 if (i == 0) { 1055 port = addr_in->sin_port; 1056 } else { 1057 if (port == addr_in->sin_port) { 1058 cmsg->cmsg_level = IPPROTO_SCTP; 1059 cmsg->cmsg_type = SCTP_DSTADDRV4; 1060 cmsg->cmsg_len = CMSG_LEN(sizeof(struct in_addr)); 1061 memcpy(CMSG_DATA(cmsg), &addr_in->sin_addr, sizeof(struct in_addr)); 1062 msg.msg_controllen += CMSG_SPACE(sizeof(struct in_addr)); 1063 cmsg = (struct cmsghdr *)((caddr_t)cmsg + CMSG_SPACE(sizeof(struct in_addr))); 1064 } else { 1065 free(cmsgbuf); 1066 errno = EINVAL; 1067 return (-1); 1068 } 1069 } 1070 break; 1071 case AF_INET6: 1072 addr_len = (socklen_t) sizeof(struct sockaddr_in6); 1073 addr_in6 = (struct sockaddr_in6 *)addr; 1074 if (addr_in6->sin6_len != addr_len) { 1075 free(cmsgbuf); 1076 errno = EINVAL; 1077 return (-1); 1078 } 1079 if (i == 0) { 1080 port = addr_in6->sin6_port; 1081 } else { 1082 if (port == addr_in6->sin6_port) { 1083 cmsg->cmsg_level = IPPROTO_SCTP; 1084 cmsg->cmsg_type = SCTP_DSTADDRV6; 1085 cmsg->cmsg_len = CMSG_LEN(sizeof(struct in6_addr)); 1086 memcpy(CMSG_DATA(cmsg), &addr_in6->sin6_addr, sizeof(struct in6_addr)); 1087 msg.msg_controllen += CMSG_SPACE(sizeof(struct in6_addr)); 1088 cmsg = (struct cmsghdr *)((caddr_t)cmsg + CMSG_SPACE(sizeof(struct in6_addr))); 1089 } else { 1090 free(cmsgbuf); 1091 errno = EINVAL; 1092 return (-1); 1093 } 1094 } 1095 break; 1096 default: 1097 free(cmsgbuf); 1098 errno = EINVAL; 1099 return (-1); 1100 } 1101 if (i == 0) { 1102 msg.msg_name = addr; 1103 msg.msg_namelen = addr_len; 1104 } 1105 addr = (struct sockaddr *)((caddr_t)addr + addr_len); 1106 } 1107 if (msg.msg_controllen == 0) { 1108 msg.msg_control = NULL; 1109 } 1110 msg.msg_iov = (struct iovec *)iov; 1111 msg.msg_iovlen = iovcnt; 1112 msg.msg_flags = 0; 1113 ret = sendmsg(sd, &msg, flags); 1114 free(cmsgbuf); 1115 return (ret); 1116 } 1117 1118 1119 #if !defined(SYS_sctp_peeloff) && !defined(HAVE_SCTP_PEELOFF_SOCKOPT) 1120 1121 int 1122 sctp_peeloff(int sd, sctp_assoc_t assoc_id) 1123 { 1124 /* NOT supported, return invalid sd */ 1125 errno = ENOTSUP; 1126 return (-1); 1127 } 1128 1129 #endif 1130 #if defined(SYS_sctp_peeloff) && !defined(HAVE_SCTP_PEELOFF_SOCKOPT) 1131 int 1132 sctp_peeloff(int sd, sctp_assoc_t assoc_id) 1133 { 1134 return (syscall(SYS_sctp_peeloff, sd, assoc_id)); 1135 } 1136 1137 #endif 1138 1139 #undef SCTP_CONTROL_VEC_SIZE_RCV 1140