xref: /freebsd/lib/libc/net/sctp_sys_calls.c (revision 675be9115aae86ad6b3d877155d4fd7822892105)
1 /*-
2  * Copyright (c) 2001-2007, by Cisco Systems, Inc. All rights reserved.
3  * Copyright (c) 2008-2011, by Randall Stewart. All rights reserved.
4  * Copyright (c) 2008-2011, by Michael Tuexen. All rights reserved.
5  *
6  * Redistribution and use in source and binary forms, with or without
7  * modification, are permitted provided that the following conditions are met:
8  *
9  * a) Redistributions of source code must retain the above copyright notice,
10  *    this list of conditions and the following disclaimer.
11  *
12  * b) Redistributions in binary form must reproduce the above copyright
13  *    notice, this list of conditions and the following disclaimer in
14  *    the documentation and/or other materials provided with the distribution.
15  *
16  * c) Neither the name of Cisco Systems, Inc. nor the names of its
17  *    contributors may be used to endorse or promote products derived
18  *    from this software without specific prior written permission.
19  *
20  * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
21  * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,
22  * THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23  * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE
24  * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
25  * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
26  * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
27  * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
28  * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
29  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
30  * THE POSSIBILITY OF SUCH DAMAGE.
31  */
32 
33 #include <sys/cdefs.h>
34 __FBSDID("$FreeBSD$");
35 #include <stdio.h>
36 #include <string.h>
37 #include <errno.h>
38 #include <stdlib.h>
39 #include <unistd.h>
40 #include <sys/types.h>
41 #include <sys/socket.h>
42 #include <sys/errno.h>
43 #include <sys/syscall.h>
44 #include <sys/uio.h>
45 #include <netinet/in.h>
46 #include <arpa/inet.h>
47 #include <netinet/sctp_uio.h>
48 #include <netinet/sctp.h>
49 
50 #include <net/if_dl.h>
51 
52 #ifndef IN6_IS_ADDR_V4MAPPED
53 #define IN6_IS_ADDR_V4MAPPED(a)		      \
54 	((*(const uint32_t *)(const void *)(&(a)->s6_addr[0]) == 0) &&	\
55 	 (*(const uint32_t *)(const void *)(&(a)->s6_addr[4]) == 0) &&	\
56 	 (*(const uint32_t *)(const void *)(&(a)->s6_addr[8]) == ntohl(0x0000ffff)))
57 #endif
58 
59 
60 #define SCTP_CONTROL_VEC_SIZE_SND   8192
61 #define SCTP_CONTROL_VEC_SIZE_RCV  16384
62 #define SCTP_STACK_BUF_SIZE         2048
63 
64 #ifdef SCTP_DEBUG_PRINT_ADDRESS
65 
66 #define SCTP_STRING_BUF_SZ 256
67 
68 static void
69 SCTPPrintAnAddress(struct sockaddr *a)
70 {
71 	char stringToPrint[SCTP_STRING_BUF_SZ];
72 	u_short prt;
73 	char *srcaddr, *txt;
74 
75 	if (a == NULL) {
76 		printf("NULL\n");
77 		return;
78 	}
79 	if (a->sa_family == AF_INET) {
80 		srcaddr = (char *)&((struct sockaddr_in *)a)->sin_addr;
81 		txt = "IPv4 Address: ";
82 		prt = ntohs(((struct sockaddr_in *)a)->sin_port);
83 	} else if (a->sa_family == AF_INET6) {
84 		srcaddr = (char *)&((struct sockaddr_in6 *)a)->sin6_addr;
85 		prt = ntohs(((struct sockaddr_in6 *)a)->sin6_port);
86 		txt = "IPv6 Address: ";
87 	} else if (a->sa_family == AF_LINK) {
88 		int i;
89 		char tbuf[SCTP_STRING_BUF_SZ];
90 		u_char adbuf[SCTP_STRING_BUF_SZ];
91 		struct sockaddr_dl *dl;
92 
93 		dl = (struct sockaddr_dl *)a;
94 		strncpy(tbuf, dl->sdl_data, dl->sdl_nlen);
95 		tbuf[dl->sdl_nlen] = 0;
96 		printf("Intf:%s (len:%d)Interface index:%d type:%x(%d) ll-len:%d ",
97 		    tbuf,
98 		    dl->sdl_nlen,
99 		    dl->sdl_index,
100 		    dl->sdl_type,
101 		    dl->sdl_type,
102 		    dl->sdl_alen
103 		    );
104 		memcpy(adbuf, LLADDR(dl), dl->sdl_alen);
105 		for (i = 0; i < dl->sdl_alen; i++) {
106 			printf("%2.2x", adbuf[i]);
107 			if (i < (dl->sdl_alen - 1))
108 				printf(":");
109 		}
110 		printf("\n");
111 		return;
112 	} else {
113 		return;
114 	}
115 	if (inet_ntop(a->sa_family, srcaddr, stringToPrint, sizeof(stringToPrint))) {
116 		if (a->sa_family == AF_INET6) {
117 			printf("%s%s:%d scope:%d\n",
118 			    txt, stringToPrint, prt,
119 			    ((struct sockaddr_in6 *)a)->sin6_scope_id);
120 		} else {
121 			printf("%s%s:%d\n", txt, stringToPrint, prt);
122 		}
123 
124 	} else {
125 		printf("%s unprintable?\n", txt);
126 	}
127 }
128 
129 #endif				/* SCTP_DEBUG_PRINT_ADDRESS */
130 
131 static void
132 in6_sin6_2_sin(struct sockaddr_in *sin, struct sockaddr_in6 *sin6)
133 {
134 	bzero(sin, sizeof(*sin));
135 	sin->sin_len = sizeof(struct sockaddr_in);
136 	sin->sin_family = AF_INET;
137 	sin->sin_port = sin6->sin6_port;
138 	sin->sin_addr.s_addr = sin6->sin6_addr.__u6_addr.__u6_addr32[3];
139 }
140 
141 int
142 sctp_getaddrlen(sa_family_t family)
143 {
144 	int ret, sd;
145 	socklen_t siz;
146 	struct sctp_assoc_value av;
147 
148 	av.assoc_value = family;
149 	siz = sizeof(av);
150 #if defined(AF_INET)
151 	sd = socket(AF_INET, SOCK_SEQPACKET, IPPROTO_SCTP);
152 #elif defined(AF_INET6)
153 	sd = socket(AF_INET6, SOCK_SEQPACKET, IPPROTO_SCTP);
154 #else
155 	sd = -1;
156 #endif
157 	if (sd == -1) {
158 		return (-1);
159 	}
160 	ret = getsockopt(sd, IPPROTO_SCTP, SCTP_GET_ADDR_LEN, &av, &siz);
161 	close(sd);
162 	if (ret == 0) {
163 		return ((int)av.assoc_value);
164 	} else {
165 		return (-1);
166 	}
167 }
168 
169 int
170 sctp_connectx(int sd, const struct sockaddr *addrs, int addrcnt,
171     sctp_assoc_t * id)
172 {
173 	char buf[SCTP_STACK_BUF_SIZE];
174 	int i, ret, cnt, *aa;
175 	char *cpto;
176 	const struct sockaddr *at;
177 	sctp_assoc_t *p_id;
178 	size_t len = sizeof(int);
179 
180 	/* validate the address count and list */
181 	if ((addrs == NULL) || (addrcnt <= 0)) {
182 		errno = EINVAL;
183 		return (-1);
184 	}
185 	at = addrs;
186 	cnt = 0;
187 	cpto = ((caddr_t)buf + sizeof(int));
188 	/* validate all the addresses and get the size */
189 	for (i = 0; i < addrcnt; i++) {
190 		if (at->sa_family == AF_INET) {
191 			if (at->sa_len != sizeof(struct sockaddr_in)) {
192 				errno = EINVAL;
193 				return (-1);
194 			}
195 			memcpy(cpto, at, at->sa_len);
196 			cpto = ((caddr_t)cpto + at->sa_len);
197 			len += at->sa_len;
198 		} else if (at->sa_family == AF_INET6) {
199 			if (at->sa_len != sizeof(struct sockaddr_in6)) {
200 				errno = EINVAL;
201 				return (-1);
202 			}
203 			if (IN6_IS_ADDR_V4MAPPED(&((struct sockaddr_in6 *)at)->sin6_addr)) {
204 				len += sizeof(struct sockaddr_in);
205 				in6_sin6_2_sin((struct sockaddr_in *)cpto, (struct sockaddr_in6 *)at);
206 				cpto = ((caddr_t)cpto + sizeof(struct sockaddr_in));
207 				len += sizeof(struct sockaddr_in);
208 			} else {
209 				memcpy(cpto, at, at->sa_len);
210 				cpto = ((caddr_t)cpto + at->sa_len);
211 				len += at->sa_len;
212 			}
213 		} else {
214 			errno = EINVAL;
215 			return (-1);
216 		}
217 		if (len > (sizeof(buf) - sizeof(int))) {
218 			/* Never enough memory */
219 			errno = E2BIG;
220 			return (-1);
221 		}
222 		at = (struct sockaddr *)((caddr_t)at + at->sa_len);
223 		cnt++;
224 	}
225 	/* do we have any? */
226 	if (cnt == 0) {
227 		errno = EINVAL;
228 		return (-1);
229 	}
230 	aa = (int *)buf;
231 	*aa = cnt;
232 	ret = setsockopt(sd, IPPROTO_SCTP, SCTP_CONNECT_X, (void *)buf,
233 	    (socklen_t) len);
234 	if ((ret == 0) && id) {
235 		p_id = (sctp_assoc_t *) buf;
236 		*id = *p_id;
237 	}
238 	return (ret);
239 }
240 
241 int
242 sctp_bindx(int sd, struct sockaddr *addrs, int addrcnt, int flags)
243 {
244 	struct sctp_getaddresses *gaddrs;
245 	struct sockaddr *sa;
246 	struct sockaddr_in *sin;
247 	struct sockaddr_in6 *sin6;
248 	int i, sz, argsz;
249 	uint16_t sport = 0;
250 
251 	/* validate the flags */
252 	if ((flags != SCTP_BINDX_ADD_ADDR) &&
253 	    (flags != SCTP_BINDX_REM_ADDR)) {
254 		errno = EFAULT;
255 		return (-1);
256 	}
257 	/* validate the address count and list */
258 	if ((addrcnt <= 0) || (addrs == NULL)) {
259 		errno = EINVAL;
260 		return (-1);
261 	}
262 	argsz = (sizeof(struct sockaddr_storage) +
263 	    sizeof(struct sctp_getaddresses));
264 	gaddrs = (struct sctp_getaddresses *)calloc(1, argsz);
265 	if (gaddrs == NULL) {
266 		errno = ENOMEM;
267 		return (-1);
268 	}
269 	/* First pre-screen the addresses */
270 	sa = addrs;
271 	for (i = 0; i < addrcnt; i++) {
272 		sz = sa->sa_len;
273 		if (sa->sa_family == AF_INET) {
274 			if (sa->sa_len != sizeof(struct sockaddr_in))
275 				goto out_error;
276 			sin = (struct sockaddr_in *)sa;
277 			if (sin->sin_port) {
278 				/* non-zero port, check or save */
279 				if (sport) {
280 					/* Check against our port */
281 					if (sport != sin->sin_port) {
282 						goto out_error;
283 					}
284 				} else {
285 					/* save off the port */
286 					sport = sin->sin_port;
287 				}
288 			}
289 		} else if (sa->sa_family == AF_INET6) {
290 			if (sa->sa_len != sizeof(struct sockaddr_in6))
291 				goto out_error;
292 			sin6 = (struct sockaddr_in6 *)sa;
293 			if (sin6->sin6_port) {
294 				/* non-zero port, check or save */
295 				if (sport) {
296 					/* Check against our port */
297 					if (sport != sin6->sin6_port) {
298 						goto out_error;
299 					}
300 				} else {
301 					/* save off the port */
302 					sport = sin6->sin6_port;
303 				}
304 			}
305 		} else {
306 			/* invalid address family specified */
307 			goto out_error;
308 		}
309 
310 		sa = (struct sockaddr *)((caddr_t)sa + sz);
311 	}
312 	sa = addrs;
313 	/*
314 	 * Now if there was a port mentioned, assure that the first address
315 	 * has that port to make sure it fails or succeeds correctly.
316 	 */
317 	if (sport) {
318 		sin = (struct sockaddr_in *)sa;
319 		sin->sin_port = sport;
320 	}
321 	for (i = 0; i < addrcnt; i++) {
322 		sz = sa->sa_len;
323 		if (sa->sa_family == AF_INET) {
324 			if (sa->sa_len != sizeof(struct sockaddr_in))
325 				goto out_error;
326 		} else if (sa->sa_family == AF_INET6) {
327 			if (sa->sa_len != sizeof(struct sockaddr_in6))
328 				goto out_error;
329 		} else {
330 			/* invalid address family specified */
331 	out_error:
332 			free(gaddrs);
333 			errno = EINVAL;
334 			return (-1);
335 		}
336 		memset(gaddrs, 0, argsz);
337 		gaddrs->sget_assoc_id = 0;
338 		memcpy(gaddrs->addr, sa, sz);
339 		if (setsockopt(sd, IPPROTO_SCTP, flags, gaddrs,
340 		    (socklen_t) argsz) != 0) {
341 			free(gaddrs);
342 			return (-1);
343 		}
344 		sa = (struct sockaddr *)((caddr_t)sa + sz);
345 	}
346 	free(gaddrs);
347 	return (0);
348 }
349 
350 
351 int
352 sctp_opt_info(int sd, sctp_assoc_t id, int opt, void *arg, socklen_t * size)
353 {
354 	if (arg == NULL) {
355 		errno = EINVAL;
356 		return (-1);
357 	}
358 	switch (opt) {
359 	case SCTP_RTOINFO:
360 		((struct sctp_rtoinfo *)arg)->srto_assoc_id = id;
361 		break;
362 	case SCTP_ASSOCINFO:
363 		((struct sctp_assocparams *)arg)->sasoc_assoc_id = id;
364 		break;
365 	case SCTP_DEFAULT_SEND_PARAM:
366 		((struct sctp_assocparams *)arg)->sasoc_assoc_id = id;
367 		break;
368 	case SCTP_PRIMARY_ADDR:
369 		((struct sctp_setprim *)arg)->ssp_assoc_id = id;
370 		break;
371 	case SCTP_PEER_ADDR_PARAMS:
372 		((struct sctp_paddrparams *)arg)->spp_assoc_id = id;
373 		break;
374 	case SCTP_MAXSEG:
375 		((struct sctp_assoc_value *)arg)->assoc_id = id;
376 		break;
377 	case SCTP_AUTH_KEY:
378 		((struct sctp_authkey *)arg)->sca_assoc_id = id;
379 		break;
380 	case SCTP_AUTH_ACTIVE_KEY:
381 		((struct sctp_authkeyid *)arg)->scact_assoc_id = id;
382 		break;
383 	case SCTP_DELAYED_SACK:
384 		((struct sctp_sack_info *)arg)->sack_assoc_id = id;
385 		break;
386 	case SCTP_CONTEXT:
387 		((struct sctp_assoc_value *)arg)->assoc_id = id;
388 		break;
389 	case SCTP_STATUS:
390 		((struct sctp_status *)arg)->sstat_assoc_id = id;
391 		break;
392 	case SCTP_GET_PEER_ADDR_INFO:
393 		((struct sctp_paddrinfo *)arg)->spinfo_assoc_id = id;
394 		break;
395 	case SCTP_PEER_AUTH_CHUNKS:
396 		((struct sctp_authchunks *)arg)->gauth_assoc_id = id;
397 		break;
398 	case SCTP_LOCAL_AUTH_CHUNKS:
399 		((struct sctp_authchunks *)arg)->gauth_assoc_id = id;
400 		break;
401 	case SCTP_TIMEOUTS:
402 		((struct sctp_timeouts *)arg)->stimo_assoc_id = id;
403 		break;
404 	case SCTP_EVENT:
405 		((struct sctp_event *)arg)->se_assoc_id = id;
406 		break;
407 	case SCTP_DEFAULT_SNDINFO:
408 		((struct sctp_sndinfo *)arg)->snd_assoc_id = id;
409 		break;
410 	case SCTP_DEFAULT_PRINFO:
411 		((struct sctp_default_prinfo *)arg)->pr_assoc_id = id;
412 		break;
413 	case SCTP_PEER_ADDR_THLDS:
414 		((struct sctp_paddrthlds *)arg)->spt_assoc_id = id;
415 		break;
416 	case SCTP_REMOTE_UDP_ENCAPS_PORT:
417 		((struct sctp_udpencaps *)arg)->sue_assoc_id = id;
418 		break;
419 	case SCTP_MAX_BURST:
420 		((struct sctp_assoc_value *)arg)->assoc_id = id;
421 		break;
422 	default:
423 		break;
424 	}
425 	return (getsockopt(sd, IPPROTO_SCTP, opt, arg, size));
426 }
427 
428 int
429 sctp_getpaddrs(int sd, sctp_assoc_t id, struct sockaddr **raddrs)
430 {
431 	struct sctp_getaddresses *addrs;
432 	struct sockaddr *sa;
433 	struct sockaddr *re;
434 	sctp_assoc_t asoc;
435 	caddr_t lim;
436 	socklen_t siz;
437 	int cnt;
438 
439 	if (raddrs == NULL) {
440 		errno = EFAULT;
441 		return (-1);
442 	}
443 	asoc = id;
444 	siz = sizeof(sctp_assoc_t);
445 	if (getsockopt(sd, IPPROTO_SCTP, SCTP_GET_REMOTE_ADDR_SIZE,
446 	    &asoc, &siz) != 0) {
447 		return (-1);
448 	}
449 	/* size required is returned in 'asoc' */
450 	siz = (size_t)asoc;
451 	siz += sizeof(struct sctp_getaddresses);
452 	addrs = calloc(1, siz);
453 	if (addrs == NULL) {
454 		return (-1);
455 	}
456 	addrs->sget_assoc_id = id;
457 	/* Now lets get the array of addresses */
458 	if (getsockopt(sd, IPPROTO_SCTP, SCTP_GET_PEER_ADDRESSES,
459 	    addrs, &siz) != 0) {
460 		free(addrs);
461 		return (-1);
462 	}
463 	re = (struct sockaddr *)&addrs->addr[0];
464 	*raddrs = re;
465 	cnt = 0;
466 	sa = (struct sockaddr *)&addrs->addr[0];
467 	lim = (caddr_t)addrs + siz;
468 	while (((caddr_t)sa < lim) && (sa->sa_len > 0)) {
469 		sa = (struct sockaddr *)((caddr_t)sa + sa->sa_len);
470 		cnt++;
471 	}
472 	return (cnt);
473 }
474 
475 void
476 sctp_freepaddrs(struct sockaddr *addrs)
477 {
478 	/* Take away the hidden association id */
479 	void *fr_addr;
480 
481 	fr_addr = (void *)((caddr_t)addrs - sizeof(sctp_assoc_t));
482 	/* Now free it */
483 	free(fr_addr);
484 }
485 
486 int
487 sctp_getladdrs(int sd, sctp_assoc_t id, struct sockaddr **raddrs)
488 {
489 	struct sctp_getaddresses *addrs;
490 	struct sockaddr *re;
491 	caddr_t lim;
492 	struct sockaddr *sa;
493 	int size_of_addresses;
494 	socklen_t siz;
495 	int cnt;
496 
497 	if (raddrs == NULL) {
498 		errno = EFAULT;
499 		return (-1);
500 	}
501 	size_of_addresses = 0;
502 	siz = sizeof(int);
503 	if (getsockopt(sd, IPPROTO_SCTP, SCTP_GET_LOCAL_ADDR_SIZE,
504 	    &size_of_addresses, &siz) != 0) {
505 		errno = ENOMEM;
506 		return (-1);
507 	}
508 	if (size_of_addresses == 0) {
509 		errno = ENOTCONN;
510 		return (-1);
511 	}
512 	siz = size_of_addresses + sizeof(struct sockaddr_storage);
513 	siz += sizeof(struct sctp_getaddresses);
514 	addrs = calloc(1, siz);
515 	if (addrs == NULL) {
516 		errno = ENOMEM;
517 		return (-1);
518 	}
519 	addrs->sget_assoc_id = id;
520 	/* Now lets get the array of addresses */
521 	if (getsockopt(sd, IPPROTO_SCTP, SCTP_GET_LOCAL_ADDRESSES, addrs,
522 	    &siz) != 0) {
523 		free(addrs);
524 		errno = ENOMEM;
525 		return (-1);
526 	}
527 	re = (struct sockaddr *)&addrs->addr[0];
528 	*raddrs = re;
529 	cnt = 0;
530 	sa = (struct sockaddr *)&addrs->addr[0];
531 	lim = (caddr_t)addrs + siz;
532 	while (((caddr_t)sa < lim) && (sa->sa_len > 0)) {
533 		sa = (struct sockaddr *)((caddr_t)sa + sa->sa_len);
534 		cnt++;
535 	}
536 	return (cnt);
537 }
538 
539 void
540 sctp_freeladdrs(struct sockaddr *addrs)
541 {
542 	/* Take away the hidden association id */
543 	void *fr_addr;
544 
545 	fr_addr = (void *)((caddr_t)addrs - sizeof(sctp_assoc_t));
546 	/* Now free it */
547 	free(fr_addr);
548 }
549 
550 
551 ssize_t
552 sctp_sendmsg(int s,
553     const void *data,
554     size_t len,
555     const struct sockaddr *to,
556     socklen_t tolen,
557     uint32_t ppid,
558     uint32_t flags,
559     uint16_t stream_no,
560     uint32_t timetolive,
561     uint32_t context)
562 {
563 #ifdef SYS_sctp_generic_sendmsg
564 	struct sctp_sndrcvinfo sinfo;
565 
566 	memset(&sinfo, 0, sizeof(struct sctp_sndrcvinfo));
567 	sinfo.sinfo_ppid = ppid;
568 	sinfo.sinfo_flags = flags;
569 	sinfo.sinfo_stream = stream_no;
570 	sinfo.sinfo_timetolive = timetolive;
571 	sinfo.sinfo_context = context;
572 	sinfo.sinfo_assoc_id = 0;
573 	return (syscall(SYS_sctp_generic_sendmsg, s,
574 	    data, len, to, tolen, &sinfo, 0));
575 #else
576 	ssize_t sz;
577 	struct msghdr msg;
578 	struct sctp_sndrcvinfo *s_info;
579 	struct iovec iov;
580 	char controlVector[SCTP_CONTROL_VEC_SIZE_RCV];
581 	struct cmsghdr *cmsg;
582 	struct sockaddr *who = NULL;
583 	union {
584 		struct sockaddr_in in;
585 		struct sockaddr_in6 in6;
586 	}     addr;
587 
588 	if ((tolen > 0) &&
589 	    ((to == NULL) || (tolen < sizeof(struct sockaddr)))) {
590 		errno = EINVAL;
591 		return -1;
592 	}
593 	if (to && (tolen > 0)) {
594 		if (to->sa_family == AF_INET) {
595 			if (tolen != sizeof(struct sockaddr_in)) {
596 				errno = EINVAL;
597 				return -1;
598 			}
599 			if ((to->sa_len > 0) &&
600 			    (to->sa_len != sizeof(struct sockaddr_in))) {
601 				errno = EINVAL;
602 				return -1;
603 			}
604 			memcpy(&addr, to, sizeof(struct sockaddr_in));
605 			addr.in.sin_len = sizeof(struct sockaddr_in);
606 		} else if (to->sa_family == AF_INET6) {
607 			if (tolen != sizeof(struct sockaddr_in6)) {
608 				errno = EINVAL;
609 				return -1;
610 			}
611 			if ((to->sa_len > 0) &&
612 			    (to->sa_len != sizeof(struct sockaddr_in6))) {
613 				errno = EINVAL;
614 				return -1;
615 			}
616 			memcpy(&addr, to, sizeof(struct sockaddr_in6));
617 			addr.in6.sin6_len = sizeof(struct sockaddr_in6);
618 		} else {
619 			errno = EAFNOSUPPORT;
620 			return -1;
621 		}
622 		who = (struct sockaddr *)&addr;
623 	}
624 	iov.iov_base = (char *)data;
625 	iov.iov_len = len;
626 
627 	if (who) {
628 		msg.msg_name = (caddr_t)who;
629 		msg.msg_namelen = who->sa_len;
630 	} else {
631 		msg.msg_name = (caddr_t)NULL;
632 		msg.msg_namelen = 0;
633 	}
634 	msg.msg_iov = &iov;
635 	msg.msg_iovlen = 1;
636 	msg.msg_control = (caddr_t)controlVector;
637 
638 	cmsg = (struct cmsghdr *)controlVector;
639 
640 	cmsg->cmsg_level = IPPROTO_SCTP;
641 	cmsg->cmsg_type = SCTP_SNDRCV;
642 	cmsg->cmsg_len = CMSG_LEN(sizeof(struct sctp_sndrcvinfo));
643 	s_info = (struct sctp_sndrcvinfo *)CMSG_DATA(cmsg);
644 
645 	s_info->sinfo_stream = stream_no;
646 	s_info->sinfo_ssn = 0;
647 	s_info->sinfo_flags = flags;
648 	s_info->sinfo_ppid = ppid;
649 	s_info->sinfo_context = context;
650 	s_info->sinfo_assoc_id = 0;
651 	s_info->sinfo_timetolive = timetolive;
652 	errno = 0;
653 	msg.msg_controllen = cmsg->cmsg_len;
654 	sz = sendmsg(s, &msg, 0);
655 	return (sz);
656 #endif
657 }
658 
659 
660 sctp_assoc_t
661 sctp_getassocid(int sd, struct sockaddr *sa)
662 {
663 	struct sctp_paddrinfo sp;
664 	socklen_t siz;
665 
666 	/* First get the assoc id */
667 	siz = sizeof(sp);
668 	memset(&sp, 0, sizeof(sp));
669 	memcpy((caddr_t)&sp.spinfo_address, sa, sa->sa_len);
670 	errno = 0;
671 	if (getsockopt(sd, IPPROTO_SCTP,
672 	    SCTP_GET_PEER_ADDR_INFO, &sp, &siz) != 0) {
673 		return ((sctp_assoc_t) 0);
674 	}
675 	/* We depend on the fact that 0 can never be returned */
676 	return (sp.spinfo_assoc_id);
677 }
678 
679 ssize_t
680 sctp_send(int sd, const void *data, size_t len,
681     const struct sctp_sndrcvinfo *sinfo,
682     int flags)
683 {
684 
685 #ifdef SYS_sctp_generic_sendmsg
686 	struct sockaddr *to = NULL;
687 
688 	return (syscall(SYS_sctp_generic_sendmsg, sd,
689 	    data, len, to, 0, sinfo, flags));
690 #else
691 	ssize_t sz;
692 	struct msghdr msg;
693 	struct iovec iov;
694 	struct sctp_sndrcvinfo *s_info;
695 	char controlVector[SCTP_CONTROL_VEC_SIZE_SND];
696 	struct cmsghdr *cmsg;
697 
698 	if (sinfo == NULL) {
699 		errno = EINVAL;
700 		return (-1);
701 	}
702 	iov.iov_base = (char *)data;
703 	iov.iov_len = len;
704 
705 	msg.msg_name = 0;
706 	msg.msg_namelen = 0;
707 	msg.msg_iov = &iov;
708 	msg.msg_iovlen = 1;
709 	msg.msg_control = (caddr_t)controlVector;
710 
711 	cmsg = (struct cmsghdr *)controlVector;
712 
713 	cmsg->cmsg_level = IPPROTO_SCTP;
714 	cmsg->cmsg_type = SCTP_SNDRCV;
715 	cmsg->cmsg_len = CMSG_LEN(sizeof(struct sctp_sndrcvinfo));
716 	s_info = (struct sctp_sndrcvinfo *)CMSG_DATA(cmsg);
717 	/* copy in the data */
718 	*s_info = *sinfo;
719 	errno = 0;
720 	msg.msg_controllen = cmsg->cmsg_len;
721 	sz = sendmsg(sd, &msg, flags);
722 	return (sz);
723 #endif
724 }
725 
726 
727 
728 ssize_t
729 sctp_sendx(int sd, const void *msg, size_t msg_len,
730     struct sockaddr *addrs, int addrcnt,
731     struct sctp_sndrcvinfo *sinfo,
732     int flags)
733 {
734 	struct sctp_sndrcvinfo __sinfo;
735 	ssize_t ret;
736 	int i, cnt, *aa, saved_errno;
737 	char *buf;
738 	int add_len, len, no_end_cx = 0;
739 	struct sockaddr *at;
740 
741 	if (addrs == NULL) {
742 		errno = EINVAL;
743 		return (-1);
744 	}
745 #ifdef SYS_sctp_generic_sendmsg
746 	if (addrcnt == 1) {
747 		socklen_t l;
748 
749 		/*
750 		 * Quick way, we don't need to do a connectx so lets use the
751 		 * syscall directly.
752 		 */
753 		l = addrs->sa_len;
754 		return (syscall(SYS_sctp_generic_sendmsg, sd,
755 		    msg, msg_len, addrs, l, sinfo, flags));
756 	}
757 #endif
758 
759 	len = sizeof(int);
760 	at = addrs;
761 	cnt = 0;
762 	/* validate all the addresses and get the size */
763 	for (i = 0; i < addrcnt; i++) {
764 		if (at->sa_family == AF_INET) {
765 			add_len = sizeof(struct sockaddr_in);
766 		} else if (at->sa_family == AF_INET6) {
767 			add_len = sizeof(struct sockaddr_in6);
768 		} else {
769 			errno = EINVAL;
770 			return (-1);
771 		}
772 		len += add_len;
773 		at = (struct sockaddr *)((caddr_t)at + add_len);
774 		cnt++;
775 	}
776 	/* do we have any? */
777 	if (cnt == 0) {
778 		errno = EINVAL;
779 		return (-1);
780 	}
781 	buf = malloc(len);
782 	if (buf == NULL) {
783 		return (-1);
784 	}
785 	aa = (int *)buf;
786 	*aa = cnt;
787 	aa++;
788 	memcpy((caddr_t)aa, addrs, (len - sizeof(int)));
789 	ret = setsockopt(sd, IPPROTO_SCTP, SCTP_CONNECT_X_DELAYED, (void *)buf,
790 	    (socklen_t) len);
791 
792 	free(buf);
793 	if (ret != 0) {
794 		if (errno == EALREADY) {
795 			no_end_cx = 1;
796 			goto continue_send;
797 		}
798 		return (ret);
799 	}
800 continue_send:
801 	if (sinfo == NULL) {
802 		sinfo = &__sinfo;
803 		memset(&__sinfo, 0, sizeof(__sinfo));
804 	}
805 	sinfo->sinfo_assoc_id = sctp_getassocid(sd, addrs);
806 	if (sinfo->sinfo_assoc_id == 0) {
807 		printf("Huh, can't get associd? TSNH!\n");
808 		(void)setsockopt(sd, IPPROTO_SCTP, SCTP_CONNECT_X_COMPLETE, (void *)addrs,
809 		    (socklen_t) addrs->sa_len);
810 		errno = ENOENT;
811 		return (-1);
812 	}
813 	ret = sctp_send(sd, msg, msg_len, sinfo, flags);
814 	saved_errno = errno;
815 	if (no_end_cx == 0)
816 		(void)setsockopt(sd, IPPROTO_SCTP, SCTP_CONNECT_X_COMPLETE, (void *)addrs,
817 		    (socklen_t) addrs->sa_len);
818 
819 	errno = saved_errno;
820 	return (ret);
821 }
822 
823 ssize_t
824 sctp_sendmsgx(int sd,
825     const void *msg,
826     size_t len,
827     struct sockaddr *addrs,
828     int addrcnt,
829     uint32_t ppid,
830     uint32_t flags,
831     uint16_t stream_no,
832     uint32_t timetolive,
833     uint32_t context)
834 {
835 	struct sctp_sndrcvinfo sinfo;
836 
837 	memset((void *)&sinfo, 0, sizeof(struct sctp_sndrcvinfo));
838 	sinfo.sinfo_ppid = ppid;
839 	sinfo.sinfo_flags = flags;
840 	sinfo.sinfo_ssn = stream_no;
841 	sinfo.sinfo_timetolive = timetolive;
842 	sinfo.sinfo_context = context;
843 	return sctp_sendx(sd, msg, len, addrs, addrcnt, &sinfo, 0);
844 }
845 
846 ssize_t
847 sctp_recvmsg(int s,
848     void *dbuf,
849     size_t len,
850     struct sockaddr *from,
851     socklen_t * fromlen,
852     struct sctp_sndrcvinfo *sinfo,
853     int *msg_flags)
854 {
855 #ifdef SYS_sctp_generic_recvmsg
856 	struct iovec iov;
857 
858 	iov.iov_base = dbuf;
859 	iov.iov_len = len;
860 	return (syscall(SYS_sctp_generic_recvmsg, s,
861 	    &iov, 1, from, fromlen, sinfo, msg_flags));
862 #else
863 	struct sctp_sndrcvinfo *s_info;
864 	ssize_t sz;
865 	int sinfo_found = 0;
866 	struct msghdr msg;
867 	struct iovec iov;
868 	char controlVector[SCTP_CONTROL_VEC_SIZE_RCV];
869 	struct cmsghdr *cmsg;
870 
871 	if (msg_flags == NULL) {
872 		errno = EINVAL;
873 		return (-1);
874 	}
875 	msg.msg_flags = 0;
876 	iov.iov_base = dbuf;
877 	iov.iov_len = len;
878 	msg.msg_name = (caddr_t)from;
879 	if (fromlen == NULL)
880 		msg.msg_namelen = 0;
881 	else
882 		msg.msg_namelen = *fromlen;
883 	msg.msg_iov = &iov;
884 	msg.msg_iovlen = 1;
885 	msg.msg_control = (caddr_t)controlVector;
886 	msg.msg_controllen = sizeof(controlVector);
887 	errno = 0;
888 	sz = recvmsg(s, &msg, *msg_flags);
889 	*msg_flags = msg.msg_flags;
890 	if (sz <= 0) {
891 		return (sz);
892 	}
893 	s_info = NULL;
894 	len = sz;
895 	if (sinfo) {
896 		sinfo->sinfo_assoc_id = 0;
897 	}
898 	if ((msg.msg_controllen) && sinfo) {
899 		/*
900 		 * parse through and see if we find the sctp_sndrcvinfo (if
901 		 * the user wants it).
902 		 */
903 		cmsg = (struct cmsghdr *)controlVector;
904 		while (cmsg) {
905 			if ((cmsg->cmsg_len == 0) || (cmsg->cmsg_len > msg.msg_controllen)) {
906 				break;
907 			}
908 			if (cmsg->cmsg_level == IPPROTO_SCTP) {
909 				if (cmsg->cmsg_type == SCTP_SNDRCV) {
910 					/* Got it */
911 					s_info = (struct sctp_sndrcvinfo *)CMSG_DATA(cmsg);
912 					/* Copy it to the user */
913 					if (sinfo)
914 						*sinfo = *s_info;
915 					sinfo_found = 1;
916 					break;
917 				} else if (cmsg->cmsg_type == SCTP_EXTRCV) {
918 					/*
919 					 * Got it, presumably the user has
920 					 * asked for this extra info, so the
921 					 * structure holds more room :-D
922 					 */
923 					s_info = (struct sctp_sndrcvinfo *)CMSG_DATA(cmsg);
924 					/* Copy it to the user */
925 					if (sinfo) {
926 						memcpy(sinfo, s_info, sizeof(struct sctp_extrcvinfo));
927 					}
928 					sinfo_found = 1;
929 					break;
930 
931 				}
932 			}
933 			cmsg = CMSG_NXTHDR(&msg, cmsg);
934 		}
935 	}
936 	return (sz);
937 #endif
938 }
939 
940 ssize_t
941 sctp_recvv(int sd,
942     const struct iovec *iov,
943     int iovlen,
944     struct sockaddr *from,
945     socklen_t * fromlen,
946     void *info,
947     socklen_t * infolen,
948     unsigned int *infotype,
949     int *flags)
950 {
951 	char ctlbuf[SCTP_CONTROL_VEC_SIZE_RCV];
952 	struct msghdr msg;
953 	struct cmsghdr *cmsg;
954 	ssize_t n;
955 	struct sctp_rcvinfo *rcvinfo;
956 	struct sctp_nxtinfo *nxtinfo;
957 
958 	if (((info != NULL) && (infolen == NULL)) |
959 	    ((info == NULL) && (infolen != NULL) && (*infolen != 0)) ||
960 	    ((info != NULL) && (infotype == NULL))) {
961 		errno = EINVAL;
962 		return (-1);
963 	}
964 	if (infotype) {
965 		*infotype = SCTP_RECVV_NOINFO;
966 	}
967 	msg.msg_name = from;
968 	if (fromlen == NULL) {
969 		msg.msg_namelen = 0;
970 	} else {
971 		msg.msg_namelen = *fromlen;
972 	}
973 	msg.msg_iov = (struct iovec *)iov;
974 	msg.msg_iovlen = iovlen;
975 	msg.msg_control = ctlbuf;
976 	msg.msg_controllen = sizeof(ctlbuf);
977 	errno = 0;
978 	n = recvmsg(sd, &msg, *flags);
979 	*flags = msg.msg_flags;
980 	if ((n > 0) &&
981 	    (msg.msg_controllen > 0) &&
982 	    (infotype != NULL) &&
983 	    (infolen != NULL) &&
984 	    (*infolen > 0)) {
985 		rcvinfo = NULL;
986 		nxtinfo = NULL;
987 		for (cmsg = CMSG_FIRSTHDR(&msg); cmsg; cmsg = CMSG_NXTHDR(&msg, cmsg)) {
988 			if (cmsg->cmsg_level != IPPROTO_SCTP) {
989 				continue;
990 			}
991 			if (cmsg->cmsg_type == SCTP_RCVINFO) {
992 				rcvinfo = (struct sctp_rcvinfo *)CMSG_DATA(cmsg);
993 			}
994 			if (cmsg->cmsg_type == SCTP_NXTINFO) {
995 				nxtinfo = (struct sctp_nxtinfo *)CMSG_DATA(cmsg);
996 			}
997 			if (rcvinfo && nxtinfo) {
998 				break;
999 			}
1000 		}
1001 		if (rcvinfo) {
1002 			if (nxtinfo) {
1003 				if (*infolen >= sizeof(struct sctp_recvv_rn)) {
1004 					struct sctp_recvv_rn *rn_info;
1005 
1006 					rn_info = (struct sctp_recvv_rn *)info;
1007 					rn_info->recvv_rcvinfo = *rcvinfo;
1008 					rn_info->recvv_nxtinfo = *nxtinfo;
1009 					*infolen = (socklen_t) sizeof(struct sctp_recvv_rn);
1010 					*infotype = SCTP_RECVV_RN;
1011 				}
1012 			} else {
1013 				if (*infolen >= sizeof(struct sctp_rcvinfo)) {
1014 					memcpy(info, rcvinfo, sizeof(struct sctp_rcvinfo));
1015 					*infolen = (socklen_t) sizeof(struct sctp_rcvinfo);
1016 					*infotype = SCTP_RECVV_RCVINFO;
1017 				}
1018 			}
1019 		} else if (nxtinfo) {
1020 			if (*infolen >= sizeof(struct sctp_rcvinfo)) {
1021 				memcpy(info, nxtinfo, sizeof(struct sctp_nxtinfo));
1022 				*infolen = (socklen_t) sizeof(struct sctp_nxtinfo);
1023 				*infotype = SCTP_RECVV_NXTINFO;
1024 			}
1025 		}
1026 	}
1027 	return (n);
1028 }
1029 
1030 ssize_t
1031 sctp_sendv(int sd,
1032     const struct iovec *iov, int iovcnt,
1033     struct sockaddr *addrs, int addrcnt,
1034     void *info, socklen_t infolen, unsigned int infotype,
1035     int flags)
1036 {
1037 	ssize_t ret;
1038 	int i;
1039 	socklen_t addr_len;
1040 	struct msghdr msg;
1041 	in_port_t port;
1042 	struct sctp_sendv_spa *spa_info;
1043 	struct cmsghdr *cmsg;
1044 	char *cmsgbuf;
1045 	struct sockaddr *addr;
1046 	struct sockaddr_in *addr_in;
1047 	struct sockaddr_in6 *addr_in6;
1048 
1049 	if ((addrcnt < 0) ||
1050 	    (iovcnt < 0) ||
1051 	    ((addrs == NULL) && (addrcnt > 0)) ||
1052 	    ((addrs != NULL) && (addrcnt == 0)) ||
1053 	    ((iov == NULL) && (iovcnt > 0)) ||
1054 	    ((iov != NULL) && (iovcnt == 0))) {
1055 		errno = EINVAL;
1056 		return (-1);
1057 	}
1058 	cmsgbuf = malloc(CMSG_SPACE(sizeof(struct sctp_sndinfo)) +
1059 	    CMSG_SPACE(sizeof(struct sctp_prinfo)) +
1060 	    CMSG_SPACE(sizeof(struct sctp_authinfo)) +
1061 	    addrcnt * CMSG_SPACE(sizeof(struct in6_addr)));
1062 	if (cmsgbuf == NULL) {
1063 		errno = ENOBUFS;
1064 		return (-1);
1065 	}
1066 	msg.msg_control = cmsgbuf;
1067 	msg.msg_controllen = 0;
1068 	cmsg = (struct cmsghdr *)cmsgbuf;
1069 	switch (infotype) {
1070 	case SCTP_SENDV_NOINFO:
1071 		if ((infolen != 0) || (info != NULL)) {
1072 			free(cmsgbuf);
1073 			errno = EINVAL;
1074 			return (-1);
1075 		}
1076 		break;
1077 	case SCTP_SENDV_SNDINFO:
1078 		if ((info == NULL) || (infolen < sizeof(struct sctp_sndinfo))) {
1079 			free(cmsgbuf);
1080 			errno = EINVAL;
1081 			return (-1);
1082 		}
1083 		cmsg->cmsg_level = IPPROTO_SCTP;
1084 		cmsg->cmsg_type = SCTP_SNDINFO;
1085 		cmsg->cmsg_len = CMSG_LEN(sizeof(struct sctp_sndinfo));
1086 		memcpy(CMSG_DATA(cmsg), info, sizeof(struct sctp_sndinfo));
1087 		msg.msg_controllen += CMSG_SPACE(sizeof(struct sctp_sndinfo));
1088 		cmsg = (struct cmsghdr *)((caddr_t)cmsg + CMSG_SPACE(sizeof(struct sctp_sndinfo)));
1089 		break;
1090 	case SCTP_SENDV_PRINFO:
1091 		if ((info == NULL) || (infolen < sizeof(struct sctp_prinfo))) {
1092 			free(cmsgbuf);
1093 			errno = EINVAL;
1094 			return (-1);
1095 		}
1096 		cmsg->cmsg_level = IPPROTO_SCTP;
1097 		cmsg->cmsg_type = SCTP_PRINFO;
1098 		cmsg->cmsg_len = CMSG_LEN(sizeof(struct sctp_prinfo));
1099 		memcpy(CMSG_DATA(cmsg), info, sizeof(struct sctp_prinfo));
1100 		msg.msg_controllen += CMSG_SPACE(sizeof(struct sctp_prinfo));
1101 		cmsg = (struct cmsghdr *)((caddr_t)cmsg + CMSG_SPACE(sizeof(struct sctp_prinfo)));
1102 		break;
1103 	case SCTP_SENDV_AUTHINFO:
1104 		if ((info == NULL) || (infolen < sizeof(struct sctp_authinfo))) {
1105 			free(cmsgbuf);
1106 			errno = EINVAL;
1107 			return (-1);
1108 		}
1109 		cmsg->cmsg_level = IPPROTO_SCTP;
1110 		cmsg->cmsg_type = SCTP_AUTHINFO;
1111 		cmsg->cmsg_len = CMSG_LEN(sizeof(struct sctp_authinfo));
1112 		memcpy(CMSG_DATA(cmsg), info, sizeof(struct sctp_authinfo));
1113 		msg.msg_controllen += CMSG_SPACE(sizeof(struct sctp_authinfo));
1114 		cmsg = (struct cmsghdr *)((caddr_t)cmsg + CMSG_SPACE(sizeof(struct sctp_authinfo)));
1115 		break;
1116 	case SCTP_SENDV_SPA:
1117 		if ((info == NULL) || (infolen < sizeof(struct sctp_sendv_spa))) {
1118 			free(cmsgbuf);
1119 			errno = EINVAL;
1120 			return (-1);
1121 		}
1122 		spa_info = (struct sctp_sendv_spa *)info;
1123 		if (spa_info->sendv_flags & SCTP_SEND_SNDINFO_VALID) {
1124 			cmsg->cmsg_level = IPPROTO_SCTP;
1125 			cmsg->cmsg_type = SCTP_SNDINFO;
1126 			cmsg->cmsg_len = CMSG_LEN(sizeof(struct sctp_sndinfo));
1127 			memcpy(CMSG_DATA(cmsg), &spa_info->sendv_sndinfo, sizeof(struct sctp_sndinfo));
1128 			msg.msg_controllen += CMSG_SPACE(sizeof(struct sctp_sndinfo));
1129 			cmsg = (struct cmsghdr *)((caddr_t)cmsg + CMSG_SPACE(sizeof(struct sctp_sndinfo)));
1130 		}
1131 		if (spa_info->sendv_flags & SCTP_SEND_PRINFO_VALID) {
1132 			cmsg->cmsg_level = IPPROTO_SCTP;
1133 			cmsg->cmsg_type = SCTP_PRINFO;
1134 			cmsg->cmsg_len = CMSG_LEN(sizeof(struct sctp_prinfo));
1135 			memcpy(CMSG_DATA(cmsg), &spa_info->sendv_prinfo, sizeof(struct sctp_prinfo));
1136 			msg.msg_controllen += CMSG_SPACE(sizeof(struct sctp_prinfo));
1137 			cmsg = (struct cmsghdr *)((caddr_t)cmsg + CMSG_SPACE(sizeof(struct sctp_prinfo)));
1138 		}
1139 		if (spa_info->sendv_flags & SCTP_SEND_AUTHINFO_VALID) {
1140 			cmsg->cmsg_level = IPPROTO_SCTP;
1141 			cmsg->cmsg_type = SCTP_AUTHINFO;
1142 			cmsg->cmsg_len = CMSG_LEN(sizeof(struct sctp_authinfo));
1143 			memcpy(CMSG_DATA(cmsg), &spa_info->sendv_authinfo, sizeof(struct sctp_authinfo));
1144 			msg.msg_controllen += CMSG_SPACE(sizeof(struct sctp_authinfo));
1145 			cmsg = (struct cmsghdr *)((caddr_t)cmsg + CMSG_SPACE(sizeof(struct sctp_authinfo)));
1146 		}
1147 		break;
1148 	default:
1149 		free(cmsgbuf);
1150 		errno = EINVAL;
1151 		return (-1);
1152 	}
1153 	addr = addrs;
1154 	msg.msg_name = NULL;
1155 	msg.msg_namelen = 0;
1156 
1157 	for (i = 0; i < addrcnt; i++) {
1158 		switch (addr->sa_family) {
1159 		case AF_INET:
1160 			addr_len = (socklen_t) sizeof(struct sockaddr_in);
1161 			addr_in = (struct sockaddr_in *)addr;
1162 			if (addr_in->sin_len != addr_len) {
1163 				free(cmsgbuf);
1164 				errno = EINVAL;
1165 				return (-1);
1166 			}
1167 			if (i == 0) {
1168 				port = addr_in->sin_port;
1169 			} else {
1170 				if (port == addr_in->sin_port) {
1171 					cmsg->cmsg_level = IPPROTO_SCTP;
1172 					cmsg->cmsg_type = SCTP_DSTADDRV4;
1173 					cmsg->cmsg_len = CMSG_LEN(sizeof(struct in_addr));
1174 					memcpy(CMSG_DATA(cmsg), &addr_in->sin_addr, sizeof(struct in_addr));
1175 					msg.msg_controllen += CMSG_SPACE(sizeof(struct in_addr));
1176 					cmsg = (struct cmsghdr *)((caddr_t)cmsg + CMSG_SPACE(sizeof(struct in_addr)));
1177 				} else {
1178 					free(cmsgbuf);
1179 					errno = EINVAL;
1180 					return (-1);
1181 				}
1182 			}
1183 			break;
1184 		case AF_INET6:
1185 			addr_len = (socklen_t) sizeof(struct sockaddr_in6);
1186 			addr_in6 = (struct sockaddr_in6 *)addr;
1187 			if (addr_in6->sin6_len != addr_len) {
1188 				free(cmsgbuf);
1189 				errno = EINVAL;
1190 				return (-1);
1191 			}
1192 			if (i == 0) {
1193 				port = addr_in6->sin6_port;
1194 			} else {
1195 				if (port == addr_in6->sin6_port) {
1196 					cmsg->cmsg_level = IPPROTO_SCTP;
1197 					cmsg->cmsg_type = SCTP_DSTADDRV6;
1198 					cmsg->cmsg_len = CMSG_LEN(sizeof(struct in6_addr));
1199 					memcpy(CMSG_DATA(cmsg), &addr_in6->sin6_addr, sizeof(struct in6_addr));
1200 					msg.msg_controllen += CMSG_SPACE(sizeof(struct in6_addr));
1201 					cmsg = (struct cmsghdr *)((caddr_t)cmsg + CMSG_SPACE(sizeof(struct in6_addr)));
1202 				} else {
1203 					free(cmsgbuf);
1204 					errno = EINVAL;
1205 					return (-1);
1206 				}
1207 			}
1208 			break;
1209 		default:
1210 			free(cmsgbuf);
1211 			errno = EINVAL;
1212 			return (-1);
1213 		}
1214 		if (i == 0) {
1215 			msg.msg_name = addr;
1216 			msg.msg_namelen = addr_len;
1217 		}
1218 		addr = (struct sockaddr *)((caddr_t)addr + addr_len);
1219 	}
1220 	if (msg.msg_controllen == 0) {
1221 		msg.msg_control = NULL;
1222 	}
1223 	msg.msg_iov = (struct iovec *)iov;
1224 	msg.msg_iovlen = iovcnt;
1225 	msg.msg_flags = 0;
1226 	ret = sendmsg(sd, &msg, flags);
1227 	free(cmsgbuf);
1228 	return (ret);
1229 }
1230 
1231 
1232 #if !defined(SYS_sctp_peeloff) && !defined(HAVE_SCTP_PEELOFF_SOCKOPT)
1233 
1234 int
1235 sctp_peeloff(int sd, sctp_assoc_t assoc_id)
1236 {
1237 	/* NOT supported, return invalid sd */
1238 	errno = ENOTSUP;
1239 	return (-1);
1240 }
1241 
1242 #endif
1243 #if defined(SYS_sctp_peeloff) && !defined(HAVE_SCTP_PEELOFF_SOCKOPT)
1244 int
1245 sctp_peeloff(int sd, sctp_assoc_t assoc_id)
1246 {
1247 	return (syscall(SYS_sctp_peeloff, sd, assoc_id));
1248 }
1249 
1250 #endif
1251 
1252 
1253 #undef SCTP_CONTROL_VEC_SIZE_SND
1254 #undef SCTP_CONTROL_VEC_SIZE_RCV
1255 #undef SCTP_STACK_BUF_SIZE
1256