1 /*- 2 * Copyright (c) 2001-2007, by Cisco Systems, Inc. All rights reserved. 3 * Copyright (c) 2008-2011, by Randall Stewart. All rights reserved. 4 * Copyright (c) 2008-2011, by Michael Tuexen. All rights reserved. 5 * 6 * Redistribution and use in source and binary forms, with or without 7 * modification, are permitted provided that the following conditions are met: 8 * 9 * a) Redistributions of source code must retain the above copyright notice, 10 * this list of conditions and the following disclaimer. 11 * 12 * b) Redistributions in binary form must reproduce the above copyright 13 * notice, this list of conditions and the following disclaimer in 14 * the documentation and/or other materials provided with the distribution. 15 * 16 * c) Neither the name of Cisco Systems, Inc. nor the names of its 17 * contributors may be used to endorse or promote products derived 18 * from this software without specific prior written permission. 19 * 20 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS 21 * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, 22 * THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 23 * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE 24 * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR 25 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF 26 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS 27 * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN 28 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) 29 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF 30 * THE POSSIBILITY OF SUCH DAMAGE. 31 */ 32 33 #include <sys/cdefs.h> 34 __FBSDID("$FreeBSD$"); 35 #include <stdio.h> 36 #include <string.h> 37 #include <errno.h> 38 #include <stdlib.h> 39 #include <unistd.h> 40 #include <sys/types.h> 41 #include <sys/socket.h> 42 #include <sys/errno.h> 43 #include <sys/syscall.h> 44 #include <sys/uio.h> 45 #include <netinet/in.h> 46 #include <arpa/inet.h> 47 #include <netinet/sctp_uio.h> 48 #include <netinet/sctp.h> 49 50 #include <net/if_dl.h> 51 52 #ifndef IN6_IS_ADDR_V4MAPPED 53 #define IN6_IS_ADDR_V4MAPPED(a) \ 54 ((*(const uint32_t *)(const void *)(&(a)->s6_addr[0]) == 0) && \ 55 (*(const uint32_t *)(const void *)(&(a)->s6_addr[4]) == 0) && \ 56 (*(const uint32_t *)(const void *)(&(a)->s6_addr[8]) == ntohl(0x0000ffff))) 57 #endif 58 59 60 #define SCTP_CONTROL_VEC_SIZE_SND 8192 61 #define SCTP_CONTROL_VEC_SIZE_RCV 16384 62 #define SCTP_STACK_BUF_SIZE 2048 63 64 #ifdef SCTP_DEBUG_PRINT_ADDRESS 65 66 #define SCTP_STRING_BUF_SZ 256 67 68 static void 69 SCTPPrintAnAddress(struct sockaddr *a) 70 { 71 char stringToPrint[SCTP_STRING_BUF_SZ]; 72 u_short prt; 73 char *srcaddr, *txt; 74 75 if (a == NULL) { 76 printf("NULL\n"); 77 return; 78 } 79 if (a->sa_family == AF_INET) { 80 srcaddr = (char *)&((struct sockaddr_in *)a)->sin_addr; 81 txt = "IPv4 Address: "; 82 prt = ntohs(((struct sockaddr_in *)a)->sin_port); 83 } else if (a->sa_family == AF_INET6) { 84 srcaddr = (char *)&((struct sockaddr_in6 *)a)->sin6_addr; 85 prt = ntohs(((struct sockaddr_in6 *)a)->sin6_port); 86 txt = "IPv6 Address: "; 87 } else if (a->sa_family == AF_LINK) { 88 int i; 89 char tbuf[SCTP_STRING_BUF_SZ]; 90 u_char adbuf[SCTP_STRING_BUF_SZ]; 91 struct sockaddr_dl *dl; 92 93 dl = (struct sockaddr_dl *)a; 94 strncpy(tbuf, dl->sdl_data, dl->sdl_nlen); 95 tbuf[dl->sdl_nlen] = 0; 96 printf("Intf:%s (len:%d)Interface index:%d type:%x(%d) ll-len:%d ", 97 tbuf, 98 dl->sdl_nlen, 99 dl->sdl_index, 100 dl->sdl_type, 101 dl->sdl_type, 102 dl->sdl_alen 103 ); 104 memcpy(adbuf, LLADDR(dl), dl->sdl_alen); 105 for (i = 0; i < dl->sdl_alen; i++) { 106 printf("%2.2x", adbuf[i]); 107 if (i < (dl->sdl_alen - 1)) 108 printf(":"); 109 } 110 printf("\n"); 111 return; 112 } else { 113 return; 114 } 115 if (inet_ntop(a->sa_family, srcaddr, stringToPrint, sizeof(stringToPrint))) { 116 if (a->sa_family == AF_INET6) { 117 printf("%s%s:%d scope:%d\n", 118 txt, stringToPrint, prt, 119 ((struct sockaddr_in6 *)a)->sin6_scope_id); 120 } else { 121 printf("%s%s:%d\n", txt, stringToPrint, prt); 122 } 123 124 } else { 125 printf("%s unprintable?\n", txt); 126 } 127 } 128 129 #endif /* SCTP_DEBUG_PRINT_ADDRESS */ 130 131 static void 132 in6_sin6_2_sin(struct sockaddr_in *sin, struct sockaddr_in6 *sin6) 133 { 134 bzero(sin, sizeof(*sin)); 135 sin->sin_len = sizeof(struct sockaddr_in); 136 sin->sin_family = AF_INET; 137 sin->sin_port = sin6->sin6_port; 138 sin->sin_addr.s_addr = sin6->sin6_addr.__u6_addr.__u6_addr32[3]; 139 } 140 141 int 142 sctp_getaddrlen(sa_family_t family) 143 { 144 int ret, sd; 145 socklen_t siz; 146 struct sctp_assoc_value av; 147 148 av.assoc_value = family; 149 siz = sizeof(av); 150 #if defined(AF_INET) 151 sd = socket(AF_INET, SOCK_SEQPACKET, IPPROTO_SCTP); 152 #elif defined(AF_INET6) 153 sd = socket(AF_INET6, SOCK_SEQPACKET, IPPROTO_SCTP); 154 #else 155 sd = -1; 156 #endif 157 if (sd == -1) { 158 return (-1); 159 } 160 ret = getsockopt(sd, IPPROTO_SCTP, SCTP_GET_ADDR_LEN, &av, &siz); 161 close(sd); 162 if (ret == 0) { 163 return ((int)av.assoc_value); 164 } else { 165 return (-1); 166 } 167 } 168 169 int 170 sctp_connectx(int sd, const struct sockaddr *addrs, int addrcnt, 171 sctp_assoc_t * id) 172 { 173 char buf[SCTP_STACK_BUF_SIZE]; 174 int i, ret, cnt, *aa; 175 char *cpto; 176 const struct sockaddr *at; 177 sctp_assoc_t *p_id; 178 size_t len = sizeof(int); 179 180 /* validate the address count and list */ 181 if ((addrs == NULL) || (addrcnt <= 0)) { 182 errno = EINVAL; 183 return (-1); 184 } 185 at = addrs; 186 cnt = 0; 187 cpto = ((caddr_t)buf + sizeof(int)); 188 /* validate all the addresses and get the size */ 189 for (i = 0; i < addrcnt; i++) { 190 if (at->sa_family == AF_INET) { 191 if (at->sa_len != sizeof(struct sockaddr_in)) { 192 errno = EINVAL; 193 return (-1); 194 } 195 memcpy(cpto, at, at->sa_len); 196 cpto = ((caddr_t)cpto + at->sa_len); 197 len += at->sa_len; 198 } else if (at->sa_family == AF_INET6) { 199 if (at->sa_len != sizeof(struct sockaddr_in6)) { 200 errno = EINVAL; 201 return (-1); 202 } 203 if (IN6_IS_ADDR_V4MAPPED(&((struct sockaddr_in6 *)at)->sin6_addr)) { 204 len += sizeof(struct sockaddr_in); 205 in6_sin6_2_sin((struct sockaddr_in *)cpto, (struct sockaddr_in6 *)at); 206 cpto = ((caddr_t)cpto + sizeof(struct sockaddr_in)); 207 len += sizeof(struct sockaddr_in); 208 } else { 209 memcpy(cpto, at, at->sa_len); 210 cpto = ((caddr_t)cpto + at->sa_len); 211 len += at->sa_len; 212 } 213 } else { 214 errno = EINVAL; 215 return (-1); 216 } 217 if (len > (sizeof(buf) - sizeof(int))) { 218 /* Never enough memory */ 219 errno = E2BIG; 220 return (-1); 221 } 222 at = (struct sockaddr *)((caddr_t)at + at->sa_len); 223 cnt++; 224 } 225 /* do we have any? */ 226 if (cnt == 0) { 227 errno = EINVAL; 228 return (-1); 229 } 230 aa = (int *)buf; 231 *aa = cnt; 232 ret = setsockopt(sd, IPPROTO_SCTP, SCTP_CONNECT_X, (void *)buf, 233 (socklen_t) len); 234 if ((ret == 0) && id) { 235 p_id = (sctp_assoc_t *) buf; 236 *id = *p_id; 237 } 238 return (ret); 239 } 240 241 int 242 sctp_bindx(int sd, struct sockaddr *addrs, int addrcnt, int flags) 243 { 244 struct sctp_getaddresses *gaddrs; 245 struct sockaddr *sa; 246 struct sockaddr_in *sin; 247 struct sockaddr_in6 *sin6; 248 int i, sz, argsz; 249 uint16_t sport = 0; 250 251 /* validate the flags */ 252 if ((flags != SCTP_BINDX_ADD_ADDR) && 253 (flags != SCTP_BINDX_REM_ADDR)) { 254 errno = EFAULT; 255 return (-1); 256 } 257 /* validate the address count and list */ 258 if ((addrcnt <= 0) || (addrs == NULL)) { 259 errno = EINVAL; 260 return (-1); 261 } 262 argsz = (sizeof(struct sockaddr_storage) + 263 sizeof(struct sctp_getaddresses)); 264 gaddrs = (struct sctp_getaddresses *)calloc(1, argsz); 265 if (gaddrs == NULL) { 266 errno = ENOMEM; 267 return (-1); 268 } 269 /* First pre-screen the addresses */ 270 sa = addrs; 271 for (i = 0; i < addrcnt; i++) { 272 sz = sa->sa_len; 273 if (sa->sa_family == AF_INET) { 274 if (sa->sa_len != sizeof(struct sockaddr_in)) 275 goto out_error; 276 sin = (struct sockaddr_in *)sa; 277 if (sin->sin_port) { 278 /* non-zero port, check or save */ 279 if (sport) { 280 /* Check against our port */ 281 if (sport != sin->sin_port) { 282 goto out_error; 283 } 284 } else { 285 /* save off the port */ 286 sport = sin->sin_port; 287 } 288 } 289 } else if (sa->sa_family == AF_INET6) { 290 if (sa->sa_len != sizeof(struct sockaddr_in6)) 291 goto out_error; 292 sin6 = (struct sockaddr_in6 *)sa; 293 if (sin6->sin6_port) { 294 /* non-zero port, check or save */ 295 if (sport) { 296 /* Check against our port */ 297 if (sport != sin6->sin6_port) { 298 goto out_error; 299 } 300 } else { 301 /* save off the port */ 302 sport = sin6->sin6_port; 303 } 304 } 305 } else { 306 /* invalid address family specified */ 307 goto out_error; 308 } 309 310 sa = (struct sockaddr *)((caddr_t)sa + sz); 311 } 312 sa = addrs; 313 /* 314 * Now if there was a port mentioned, assure that the first address 315 * has that port to make sure it fails or succeeds correctly. 316 */ 317 if (sport) { 318 sin = (struct sockaddr_in *)sa; 319 sin->sin_port = sport; 320 } 321 for (i = 0; i < addrcnt; i++) { 322 sz = sa->sa_len; 323 if (sa->sa_family == AF_INET) { 324 if (sa->sa_len != sizeof(struct sockaddr_in)) 325 goto out_error; 326 } else if (sa->sa_family == AF_INET6) { 327 if (sa->sa_len != sizeof(struct sockaddr_in6)) 328 goto out_error; 329 } else { 330 /* invalid address family specified */ 331 out_error: 332 free(gaddrs); 333 errno = EINVAL; 334 return (-1); 335 } 336 memset(gaddrs, 0, argsz); 337 gaddrs->sget_assoc_id = 0; 338 memcpy(gaddrs->addr, sa, sz); 339 if (setsockopt(sd, IPPROTO_SCTP, flags, gaddrs, 340 (socklen_t) argsz) != 0) { 341 free(gaddrs); 342 return (-1); 343 } 344 sa = (struct sockaddr *)((caddr_t)sa + sz); 345 } 346 free(gaddrs); 347 return (0); 348 } 349 350 351 int 352 sctp_opt_info(int sd, sctp_assoc_t id, int opt, void *arg, socklen_t * size) 353 { 354 if (arg == NULL) { 355 errno = EINVAL; 356 return (-1); 357 } 358 switch (opt) { 359 case SCTP_RTOINFO: 360 ((struct sctp_rtoinfo *)arg)->srto_assoc_id = id; 361 break; 362 case SCTP_ASSOCINFO: 363 ((struct sctp_assocparams *)arg)->sasoc_assoc_id = id; 364 break; 365 case SCTP_DEFAULT_SEND_PARAM: 366 ((struct sctp_assocparams *)arg)->sasoc_assoc_id = id; 367 break; 368 case SCTP_PRIMARY_ADDR: 369 ((struct sctp_setprim *)arg)->ssp_assoc_id = id; 370 break; 371 case SCTP_PEER_ADDR_PARAMS: 372 ((struct sctp_paddrparams *)arg)->spp_assoc_id = id; 373 break; 374 case SCTP_MAXSEG: 375 ((struct sctp_assoc_value *)arg)->assoc_id = id; 376 break; 377 case SCTP_AUTH_KEY: 378 ((struct sctp_authkey *)arg)->sca_assoc_id = id; 379 break; 380 case SCTP_AUTH_ACTIVE_KEY: 381 ((struct sctp_authkeyid *)arg)->scact_assoc_id = id; 382 break; 383 case SCTP_DELAYED_SACK: 384 ((struct sctp_sack_info *)arg)->sack_assoc_id = id; 385 break; 386 case SCTP_CONTEXT: 387 ((struct sctp_assoc_value *)arg)->assoc_id = id; 388 break; 389 case SCTP_STATUS: 390 ((struct sctp_status *)arg)->sstat_assoc_id = id; 391 break; 392 case SCTP_GET_PEER_ADDR_INFO: 393 ((struct sctp_paddrinfo *)arg)->spinfo_assoc_id = id; 394 break; 395 case SCTP_PEER_AUTH_CHUNKS: 396 ((struct sctp_authchunks *)arg)->gauth_assoc_id = id; 397 break; 398 case SCTP_LOCAL_AUTH_CHUNKS: 399 ((struct sctp_authchunks *)arg)->gauth_assoc_id = id; 400 break; 401 case SCTP_TIMEOUTS: 402 ((struct sctp_timeouts *)arg)->stimo_assoc_id = id; 403 break; 404 case SCTP_EVENT: 405 ((struct sctp_event *)arg)->se_assoc_id = id; 406 break; 407 case SCTP_DEFAULT_SNDINFO: 408 ((struct sctp_sndinfo *)arg)->snd_assoc_id = id; 409 break; 410 case SCTP_DEFAULT_PRINFO: 411 ((struct sctp_default_prinfo *)arg)->pr_assoc_id = id; 412 break; 413 case SCTP_PEER_ADDR_THLDS: 414 ((struct sctp_paddrthlds *)arg)->spt_assoc_id = id; 415 break; 416 case SCTP_REMOTE_UDP_ENCAPS_PORT: 417 ((struct sctp_udpencaps *)arg)->sue_assoc_id = id; 418 break; 419 case SCTP_MAX_BURST: 420 ((struct sctp_assoc_value *)arg)->assoc_id = id; 421 break; 422 default: 423 break; 424 } 425 return (getsockopt(sd, IPPROTO_SCTP, opt, arg, size)); 426 } 427 428 int 429 sctp_getpaddrs(int sd, sctp_assoc_t id, struct sockaddr **raddrs) 430 { 431 struct sctp_getaddresses *addrs; 432 struct sockaddr *sa; 433 struct sockaddr *re; 434 sctp_assoc_t asoc; 435 caddr_t lim; 436 socklen_t siz; 437 int cnt; 438 439 if (raddrs == NULL) { 440 errno = EFAULT; 441 return (-1); 442 } 443 asoc = id; 444 siz = sizeof(sctp_assoc_t); 445 if (getsockopt(sd, IPPROTO_SCTP, SCTP_GET_REMOTE_ADDR_SIZE, 446 &asoc, &siz) != 0) { 447 return (-1); 448 } 449 /* size required is returned in 'asoc' */ 450 siz = (size_t)asoc; 451 siz += sizeof(struct sctp_getaddresses); 452 addrs = calloc(1, siz); 453 if (addrs == NULL) { 454 return (-1); 455 } 456 addrs->sget_assoc_id = id; 457 /* Now lets get the array of addresses */ 458 if (getsockopt(sd, IPPROTO_SCTP, SCTP_GET_PEER_ADDRESSES, 459 addrs, &siz) != 0) { 460 free(addrs); 461 return (-1); 462 } 463 re = (struct sockaddr *)&addrs->addr[0]; 464 *raddrs = re; 465 cnt = 0; 466 sa = (struct sockaddr *)&addrs->addr[0]; 467 lim = (caddr_t)addrs + siz; 468 while (((caddr_t)sa < lim) && (sa->sa_len > 0)) { 469 sa = (struct sockaddr *)((caddr_t)sa + sa->sa_len); 470 cnt++; 471 } 472 return (cnt); 473 } 474 475 void 476 sctp_freepaddrs(struct sockaddr *addrs) 477 { 478 /* Take away the hidden association id */ 479 void *fr_addr; 480 481 fr_addr = (void *)((caddr_t)addrs - sizeof(sctp_assoc_t)); 482 /* Now free it */ 483 free(fr_addr); 484 } 485 486 int 487 sctp_getladdrs(int sd, sctp_assoc_t id, struct sockaddr **raddrs) 488 { 489 struct sctp_getaddresses *addrs; 490 struct sockaddr *re; 491 caddr_t lim; 492 struct sockaddr *sa; 493 int size_of_addresses; 494 socklen_t siz; 495 int cnt; 496 497 if (raddrs == NULL) { 498 errno = EFAULT; 499 return (-1); 500 } 501 size_of_addresses = 0; 502 siz = sizeof(int); 503 if (getsockopt(sd, IPPROTO_SCTP, SCTP_GET_LOCAL_ADDR_SIZE, 504 &size_of_addresses, &siz) != 0) { 505 errno = ENOMEM; 506 return (-1); 507 } 508 if (size_of_addresses == 0) { 509 errno = ENOTCONN; 510 return (-1); 511 } 512 siz = size_of_addresses + sizeof(struct sockaddr_storage); 513 siz += sizeof(struct sctp_getaddresses); 514 addrs = calloc(1, siz); 515 if (addrs == NULL) { 516 errno = ENOMEM; 517 return (-1); 518 } 519 addrs->sget_assoc_id = id; 520 /* Now lets get the array of addresses */ 521 if (getsockopt(sd, IPPROTO_SCTP, SCTP_GET_LOCAL_ADDRESSES, addrs, 522 &siz) != 0) { 523 free(addrs); 524 errno = ENOMEM; 525 return (-1); 526 } 527 re = (struct sockaddr *)&addrs->addr[0]; 528 *raddrs = re; 529 cnt = 0; 530 sa = (struct sockaddr *)&addrs->addr[0]; 531 lim = (caddr_t)addrs + siz; 532 while (((caddr_t)sa < lim) && (sa->sa_len > 0)) { 533 sa = (struct sockaddr *)((caddr_t)sa + sa->sa_len); 534 cnt++; 535 } 536 return (cnt); 537 } 538 539 void 540 sctp_freeladdrs(struct sockaddr *addrs) 541 { 542 /* Take away the hidden association id */ 543 void *fr_addr; 544 545 fr_addr = (void *)((caddr_t)addrs - sizeof(sctp_assoc_t)); 546 /* Now free it */ 547 free(fr_addr); 548 } 549 550 551 ssize_t 552 sctp_sendmsg(int s, 553 const void *data, 554 size_t len, 555 const struct sockaddr *to, 556 socklen_t tolen, 557 uint32_t ppid, 558 uint32_t flags, 559 uint16_t stream_no, 560 uint32_t timetolive, 561 uint32_t context) 562 { 563 #ifdef SYS_sctp_generic_sendmsg 564 struct sctp_sndrcvinfo sinfo; 565 566 memset(&sinfo, 0, sizeof(struct sctp_sndrcvinfo)); 567 sinfo.sinfo_ppid = ppid; 568 sinfo.sinfo_flags = flags; 569 sinfo.sinfo_stream = stream_no; 570 sinfo.sinfo_timetolive = timetolive; 571 sinfo.sinfo_context = context; 572 sinfo.sinfo_assoc_id = 0; 573 return (syscall(SYS_sctp_generic_sendmsg, s, 574 data, len, to, tolen, &sinfo, 0)); 575 #else 576 ssize_t sz; 577 struct msghdr msg; 578 struct sctp_sndrcvinfo *s_info; 579 struct iovec iov; 580 char controlVector[SCTP_CONTROL_VEC_SIZE_RCV]; 581 struct cmsghdr *cmsg; 582 struct sockaddr *who = NULL; 583 union { 584 struct sockaddr_in in; 585 struct sockaddr_in6 in6; 586 } addr; 587 588 if ((tolen > 0) && 589 ((to == NULL) || (tolen < sizeof(struct sockaddr)))) { 590 errno = EINVAL; 591 return -1; 592 } 593 if (to && (tolen > 0)) { 594 if (to->sa_family == AF_INET) { 595 if (tolen != sizeof(struct sockaddr_in)) { 596 errno = EINVAL; 597 return -1; 598 } 599 if ((to->sa_len > 0) && 600 (to->sa_len != sizeof(struct sockaddr_in))) { 601 errno = EINVAL; 602 return -1; 603 } 604 memcpy(&addr, to, sizeof(struct sockaddr_in)); 605 addr.in.sin_len = sizeof(struct sockaddr_in); 606 } else if (to->sa_family == AF_INET6) { 607 if (tolen != sizeof(struct sockaddr_in6)) { 608 errno = EINVAL; 609 return -1; 610 } 611 if ((to->sa_len > 0) && 612 (to->sa_len != sizeof(struct sockaddr_in6))) { 613 errno = EINVAL; 614 return -1; 615 } 616 memcpy(&addr, to, sizeof(struct sockaddr_in6)); 617 addr.in6.sin6_len = sizeof(struct sockaddr_in6); 618 } else { 619 errno = EAFNOSUPPORT; 620 return -1; 621 } 622 who = (struct sockaddr *)&addr; 623 } 624 iov.iov_base = (char *)data; 625 iov.iov_len = len; 626 627 if (who) { 628 msg.msg_name = (caddr_t)who; 629 msg.msg_namelen = who->sa_len; 630 } else { 631 msg.msg_name = (caddr_t)NULL; 632 msg.msg_namelen = 0; 633 } 634 msg.msg_iov = &iov; 635 msg.msg_iovlen = 1; 636 msg.msg_control = (caddr_t)controlVector; 637 638 cmsg = (struct cmsghdr *)controlVector; 639 640 cmsg->cmsg_level = IPPROTO_SCTP; 641 cmsg->cmsg_type = SCTP_SNDRCV; 642 cmsg->cmsg_len = CMSG_LEN(sizeof(struct sctp_sndrcvinfo)); 643 s_info = (struct sctp_sndrcvinfo *)CMSG_DATA(cmsg); 644 645 s_info->sinfo_stream = stream_no; 646 s_info->sinfo_ssn = 0; 647 s_info->sinfo_flags = flags; 648 s_info->sinfo_ppid = ppid; 649 s_info->sinfo_context = context; 650 s_info->sinfo_assoc_id = 0; 651 s_info->sinfo_timetolive = timetolive; 652 errno = 0; 653 msg.msg_controllen = cmsg->cmsg_len; 654 sz = sendmsg(s, &msg, 0); 655 return (sz); 656 #endif 657 } 658 659 660 sctp_assoc_t 661 sctp_getassocid(int sd, struct sockaddr *sa) 662 { 663 struct sctp_paddrinfo sp; 664 socklen_t siz; 665 666 /* First get the assoc id */ 667 siz = sizeof(sp); 668 memset(&sp, 0, sizeof(sp)); 669 memcpy((caddr_t)&sp.spinfo_address, sa, sa->sa_len); 670 errno = 0; 671 if (getsockopt(sd, IPPROTO_SCTP, 672 SCTP_GET_PEER_ADDR_INFO, &sp, &siz) != 0) { 673 return ((sctp_assoc_t) 0); 674 } 675 /* We depend on the fact that 0 can never be returned */ 676 return (sp.spinfo_assoc_id); 677 } 678 679 ssize_t 680 sctp_send(int sd, const void *data, size_t len, 681 const struct sctp_sndrcvinfo *sinfo, 682 int flags) 683 { 684 685 #ifdef SYS_sctp_generic_sendmsg 686 struct sockaddr *to = NULL; 687 688 return (syscall(SYS_sctp_generic_sendmsg, sd, 689 data, len, to, 0, sinfo, flags)); 690 #else 691 ssize_t sz; 692 struct msghdr msg; 693 struct iovec iov; 694 struct sctp_sndrcvinfo *s_info; 695 char controlVector[SCTP_CONTROL_VEC_SIZE_SND]; 696 struct cmsghdr *cmsg; 697 698 if (sinfo == NULL) { 699 errno = EINVAL; 700 return (-1); 701 } 702 iov.iov_base = (char *)data; 703 iov.iov_len = len; 704 705 msg.msg_name = 0; 706 msg.msg_namelen = 0; 707 msg.msg_iov = &iov; 708 msg.msg_iovlen = 1; 709 msg.msg_control = (caddr_t)controlVector; 710 711 cmsg = (struct cmsghdr *)controlVector; 712 713 cmsg->cmsg_level = IPPROTO_SCTP; 714 cmsg->cmsg_type = SCTP_SNDRCV; 715 cmsg->cmsg_len = CMSG_LEN(sizeof(struct sctp_sndrcvinfo)); 716 s_info = (struct sctp_sndrcvinfo *)CMSG_DATA(cmsg); 717 /* copy in the data */ 718 *s_info = *sinfo; 719 errno = 0; 720 msg.msg_controllen = cmsg->cmsg_len; 721 sz = sendmsg(sd, &msg, flags); 722 return (sz); 723 #endif 724 } 725 726 727 728 ssize_t 729 sctp_sendx(int sd, const void *msg, size_t msg_len, 730 struct sockaddr *addrs, int addrcnt, 731 struct sctp_sndrcvinfo *sinfo, 732 int flags) 733 { 734 struct sctp_sndrcvinfo __sinfo; 735 ssize_t ret; 736 int i, cnt, *aa, saved_errno; 737 char *buf; 738 int add_len, len, no_end_cx = 0; 739 struct sockaddr *at; 740 741 if (addrs == NULL) { 742 errno = EINVAL; 743 return (-1); 744 } 745 #ifdef SYS_sctp_generic_sendmsg 746 if (addrcnt == 1) { 747 socklen_t l; 748 749 /* 750 * Quick way, we don't need to do a connectx so lets use the 751 * syscall directly. 752 */ 753 l = addrs->sa_len; 754 return (syscall(SYS_sctp_generic_sendmsg, sd, 755 msg, msg_len, addrs, l, sinfo, flags)); 756 } 757 #endif 758 759 len = sizeof(int); 760 at = addrs; 761 cnt = 0; 762 /* validate all the addresses and get the size */ 763 for (i = 0; i < addrcnt; i++) { 764 if (at->sa_family == AF_INET) { 765 add_len = sizeof(struct sockaddr_in); 766 } else if (at->sa_family == AF_INET6) { 767 add_len = sizeof(struct sockaddr_in6); 768 } else { 769 errno = EINVAL; 770 return (-1); 771 } 772 len += add_len; 773 at = (struct sockaddr *)((caddr_t)at + add_len); 774 cnt++; 775 } 776 /* do we have any? */ 777 if (cnt == 0) { 778 errno = EINVAL; 779 return (-1); 780 } 781 buf = malloc(len); 782 if (buf == NULL) { 783 return (-1); 784 } 785 aa = (int *)buf; 786 *aa = cnt; 787 aa++; 788 memcpy((caddr_t)aa, addrs, (len - sizeof(int))); 789 ret = setsockopt(sd, IPPROTO_SCTP, SCTP_CONNECT_X_DELAYED, (void *)buf, 790 (socklen_t) len); 791 792 free(buf); 793 if (ret != 0) { 794 if (errno == EALREADY) { 795 no_end_cx = 1; 796 goto continue_send; 797 } 798 return (ret); 799 } 800 continue_send: 801 if (sinfo == NULL) { 802 sinfo = &__sinfo; 803 memset(&__sinfo, 0, sizeof(__sinfo)); 804 } 805 sinfo->sinfo_assoc_id = sctp_getassocid(sd, addrs); 806 if (sinfo->sinfo_assoc_id == 0) { 807 printf("Huh, can't get associd? TSNH!\n"); 808 (void)setsockopt(sd, IPPROTO_SCTP, SCTP_CONNECT_X_COMPLETE, (void *)addrs, 809 (socklen_t) addrs->sa_len); 810 errno = ENOENT; 811 return (-1); 812 } 813 ret = sctp_send(sd, msg, msg_len, sinfo, flags); 814 saved_errno = errno; 815 if (no_end_cx == 0) 816 (void)setsockopt(sd, IPPROTO_SCTP, SCTP_CONNECT_X_COMPLETE, (void *)addrs, 817 (socklen_t) addrs->sa_len); 818 819 errno = saved_errno; 820 return (ret); 821 } 822 823 ssize_t 824 sctp_sendmsgx(int sd, 825 const void *msg, 826 size_t len, 827 struct sockaddr *addrs, 828 int addrcnt, 829 uint32_t ppid, 830 uint32_t flags, 831 uint16_t stream_no, 832 uint32_t timetolive, 833 uint32_t context) 834 { 835 struct sctp_sndrcvinfo sinfo; 836 837 memset((void *)&sinfo, 0, sizeof(struct sctp_sndrcvinfo)); 838 sinfo.sinfo_ppid = ppid; 839 sinfo.sinfo_flags = flags; 840 sinfo.sinfo_ssn = stream_no; 841 sinfo.sinfo_timetolive = timetolive; 842 sinfo.sinfo_context = context; 843 return sctp_sendx(sd, msg, len, addrs, addrcnt, &sinfo, 0); 844 } 845 846 ssize_t 847 sctp_recvmsg(int s, 848 void *dbuf, 849 size_t len, 850 struct sockaddr *from, 851 socklen_t * fromlen, 852 struct sctp_sndrcvinfo *sinfo, 853 int *msg_flags) 854 { 855 #ifdef SYS_sctp_generic_recvmsg 856 struct iovec iov; 857 858 iov.iov_base = dbuf; 859 iov.iov_len = len; 860 return (syscall(SYS_sctp_generic_recvmsg, s, 861 &iov, 1, from, fromlen, sinfo, msg_flags)); 862 #else 863 struct sctp_sndrcvinfo *s_info; 864 ssize_t sz; 865 int sinfo_found = 0; 866 struct msghdr msg; 867 struct iovec iov; 868 char controlVector[SCTP_CONTROL_VEC_SIZE_RCV]; 869 struct cmsghdr *cmsg; 870 871 if (msg_flags == NULL) { 872 errno = EINVAL; 873 return (-1); 874 } 875 msg.msg_flags = 0; 876 iov.iov_base = dbuf; 877 iov.iov_len = len; 878 msg.msg_name = (caddr_t)from; 879 if (fromlen == NULL) 880 msg.msg_namelen = 0; 881 else 882 msg.msg_namelen = *fromlen; 883 msg.msg_iov = &iov; 884 msg.msg_iovlen = 1; 885 msg.msg_control = (caddr_t)controlVector; 886 msg.msg_controllen = sizeof(controlVector); 887 errno = 0; 888 sz = recvmsg(s, &msg, *msg_flags); 889 *msg_flags = msg.msg_flags; 890 if (sz <= 0) { 891 return (sz); 892 } 893 s_info = NULL; 894 len = sz; 895 if (sinfo) { 896 sinfo->sinfo_assoc_id = 0; 897 } 898 if ((msg.msg_controllen) && sinfo) { 899 /* 900 * parse through and see if we find the sctp_sndrcvinfo (if 901 * the user wants it). 902 */ 903 cmsg = (struct cmsghdr *)controlVector; 904 while (cmsg) { 905 if ((cmsg->cmsg_len == 0) || (cmsg->cmsg_len > msg.msg_controllen)) { 906 break; 907 } 908 if (cmsg->cmsg_level == IPPROTO_SCTP) { 909 if (cmsg->cmsg_type == SCTP_SNDRCV) { 910 /* Got it */ 911 s_info = (struct sctp_sndrcvinfo *)CMSG_DATA(cmsg); 912 /* Copy it to the user */ 913 if (sinfo) 914 *sinfo = *s_info; 915 sinfo_found = 1; 916 break; 917 } else if (cmsg->cmsg_type == SCTP_EXTRCV) { 918 /* 919 * Got it, presumably the user has 920 * asked for this extra info, so the 921 * structure holds more room :-D 922 */ 923 s_info = (struct sctp_sndrcvinfo *)CMSG_DATA(cmsg); 924 /* Copy it to the user */ 925 if (sinfo) { 926 memcpy(sinfo, s_info, sizeof(struct sctp_extrcvinfo)); 927 } 928 sinfo_found = 1; 929 break; 930 931 } 932 } 933 cmsg = CMSG_NXTHDR(&msg, cmsg); 934 } 935 } 936 return (sz); 937 #endif 938 } 939 940 ssize_t 941 sctp_recvv(int sd, 942 const struct iovec *iov, 943 int iovlen, 944 struct sockaddr *from, 945 socklen_t * fromlen, 946 void *info, 947 socklen_t * infolen, 948 unsigned int *infotype, 949 int *flags) 950 { 951 char ctlbuf[SCTP_CONTROL_VEC_SIZE_RCV]; 952 struct msghdr msg; 953 struct cmsghdr *cmsg; 954 ssize_t n; 955 struct sctp_rcvinfo *rcvinfo; 956 struct sctp_nxtinfo *nxtinfo; 957 958 if (((info != NULL) && (infolen == NULL)) | 959 ((info == NULL) && (infolen != NULL) && (*infolen != 0)) || 960 ((info != NULL) && (infotype == NULL))) { 961 errno = EINVAL; 962 return (-1); 963 } 964 if (infotype) { 965 *infotype = SCTP_RECVV_NOINFO; 966 } 967 msg.msg_name = from; 968 if (fromlen == NULL) { 969 msg.msg_namelen = 0; 970 } else { 971 msg.msg_namelen = *fromlen; 972 } 973 msg.msg_iov = (struct iovec *)iov; 974 msg.msg_iovlen = iovlen; 975 msg.msg_control = ctlbuf; 976 msg.msg_controllen = sizeof(ctlbuf); 977 errno = 0; 978 n = recvmsg(sd, &msg, *flags); 979 *flags = msg.msg_flags; 980 if ((n > 0) && 981 (msg.msg_controllen > 0) && 982 (infotype != NULL) && 983 (infolen != NULL) && 984 (*infolen > 0)) { 985 rcvinfo = NULL; 986 nxtinfo = NULL; 987 for (cmsg = CMSG_FIRSTHDR(&msg); cmsg; cmsg = CMSG_NXTHDR(&msg, cmsg)) { 988 if (cmsg->cmsg_level != IPPROTO_SCTP) { 989 continue; 990 } 991 if (cmsg->cmsg_type == SCTP_RCVINFO) { 992 rcvinfo = (struct sctp_rcvinfo *)CMSG_DATA(cmsg); 993 } 994 if (cmsg->cmsg_type == SCTP_NXTINFO) { 995 nxtinfo = (struct sctp_nxtinfo *)CMSG_DATA(cmsg); 996 } 997 if (rcvinfo && nxtinfo) { 998 break; 999 } 1000 } 1001 if (rcvinfo) { 1002 if (nxtinfo) { 1003 if (*infolen >= sizeof(struct sctp_recvv_rn)) { 1004 struct sctp_recvv_rn *rn_info; 1005 1006 rn_info = (struct sctp_recvv_rn *)info; 1007 rn_info->recvv_rcvinfo = *rcvinfo; 1008 rn_info->recvv_nxtinfo = *nxtinfo; 1009 *infolen = (socklen_t) sizeof(struct sctp_recvv_rn); 1010 *infotype = SCTP_RECVV_RN; 1011 } 1012 } else { 1013 if (*infolen >= sizeof(struct sctp_rcvinfo)) { 1014 memcpy(info, rcvinfo, sizeof(struct sctp_rcvinfo)); 1015 *infolen = (socklen_t) sizeof(struct sctp_rcvinfo); 1016 *infotype = SCTP_RECVV_RCVINFO; 1017 } 1018 } 1019 } else if (nxtinfo) { 1020 if (*infolen >= sizeof(struct sctp_rcvinfo)) { 1021 memcpy(info, nxtinfo, sizeof(struct sctp_nxtinfo)); 1022 *infolen = (socklen_t) sizeof(struct sctp_nxtinfo); 1023 *infotype = SCTP_RECVV_NXTINFO; 1024 } 1025 } 1026 } 1027 return (n); 1028 } 1029 1030 ssize_t 1031 sctp_sendv(int sd, 1032 const struct iovec *iov, int iovcnt, 1033 struct sockaddr *addrs, int addrcnt, 1034 void *info, socklen_t infolen, unsigned int infotype, 1035 int flags) 1036 { 1037 ssize_t ret; 1038 int i; 1039 socklen_t addr_len; 1040 struct msghdr msg; 1041 in_port_t port; 1042 struct sctp_sendv_spa *spa_info; 1043 struct cmsghdr *cmsg; 1044 char *cmsgbuf; 1045 struct sockaddr *addr; 1046 struct sockaddr_in *addr_in; 1047 struct sockaddr_in6 *addr_in6; 1048 1049 if ((addrcnt < 0) || 1050 (iovcnt < 0) || 1051 ((addrs == NULL) && (addrcnt > 0)) || 1052 ((addrs != NULL) && (addrcnt == 0)) || 1053 ((iov == NULL) && (iovcnt > 0)) || 1054 ((iov != NULL) && (iovcnt == 0))) { 1055 errno = EINVAL; 1056 return (-1); 1057 } 1058 cmsgbuf = malloc(CMSG_SPACE(sizeof(struct sctp_sndinfo)) + 1059 CMSG_SPACE(sizeof(struct sctp_prinfo)) + 1060 CMSG_SPACE(sizeof(struct sctp_authinfo)) + 1061 addrcnt * CMSG_SPACE(sizeof(struct in6_addr))); 1062 if (cmsgbuf == NULL) { 1063 errno = ENOBUFS; 1064 return (-1); 1065 } 1066 msg.msg_control = cmsgbuf; 1067 msg.msg_controllen = 0; 1068 cmsg = (struct cmsghdr *)cmsgbuf; 1069 switch (infotype) { 1070 case SCTP_SENDV_NOINFO: 1071 if ((infolen != 0) || (info != NULL)) { 1072 free(cmsgbuf); 1073 errno = EINVAL; 1074 return (-1); 1075 } 1076 break; 1077 case SCTP_SENDV_SNDINFO: 1078 if ((info == NULL) || (infolen < sizeof(struct sctp_sndinfo))) { 1079 free(cmsgbuf); 1080 errno = EINVAL; 1081 return (-1); 1082 } 1083 cmsg->cmsg_level = IPPROTO_SCTP; 1084 cmsg->cmsg_type = SCTP_SNDINFO; 1085 cmsg->cmsg_len = CMSG_LEN(sizeof(struct sctp_sndinfo)); 1086 memcpy(CMSG_DATA(cmsg), info, sizeof(struct sctp_sndinfo)); 1087 msg.msg_controllen += CMSG_SPACE(sizeof(struct sctp_sndinfo)); 1088 cmsg = (struct cmsghdr *)((caddr_t)cmsg + CMSG_SPACE(sizeof(struct sctp_sndinfo))); 1089 break; 1090 case SCTP_SENDV_PRINFO: 1091 if ((info == NULL) || (infolen < sizeof(struct sctp_prinfo))) { 1092 free(cmsgbuf); 1093 errno = EINVAL; 1094 return (-1); 1095 } 1096 cmsg->cmsg_level = IPPROTO_SCTP; 1097 cmsg->cmsg_type = SCTP_PRINFO; 1098 cmsg->cmsg_len = CMSG_LEN(sizeof(struct sctp_prinfo)); 1099 memcpy(CMSG_DATA(cmsg), info, sizeof(struct sctp_prinfo)); 1100 msg.msg_controllen += CMSG_SPACE(sizeof(struct sctp_prinfo)); 1101 cmsg = (struct cmsghdr *)((caddr_t)cmsg + CMSG_SPACE(sizeof(struct sctp_prinfo))); 1102 break; 1103 case SCTP_SENDV_AUTHINFO: 1104 if ((info == NULL) || (infolen < sizeof(struct sctp_authinfo))) { 1105 free(cmsgbuf); 1106 errno = EINVAL; 1107 return (-1); 1108 } 1109 cmsg->cmsg_level = IPPROTO_SCTP; 1110 cmsg->cmsg_type = SCTP_AUTHINFO; 1111 cmsg->cmsg_len = CMSG_LEN(sizeof(struct sctp_authinfo)); 1112 memcpy(CMSG_DATA(cmsg), info, sizeof(struct sctp_authinfo)); 1113 msg.msg_controllen += CMSG_SPACE(sizeof(struct sctp_authinfo)); 1114 cmsg = (struct cmsghdr *)((caddr_t)cmsg + CMSG_SPACE(sizeof(struct sctp_authinfo))); 1115 break; 1116 case SCTP_SENDV_SPA: 1117 if ((info == NULL) || (infolen < sizeof(struct sctp_sendv_spa))) { 1118 free(cmsgbuf); 1119 errno = EINVAL; 1120 return (-1); 1121 } 1122 spa_info = (struct sctp_sendv_spa *)info; 1123 if (spa_info->sendv_flags & SCTP_SEND_SNDINFO_VALID) { 1124 cmsg->cmsg_level = IPPROTO_SCTP; 1125 cmsg->cmsg_type = SCTP_SNDINFO; 1126 cmsg->cmsg_len = CMSG_LEN(sizeof(struct sctp_sndinfo)); 1127 memcpy(CMSG_DATA(cmsg), &spa_info->sendv_sndinfo, sizeof(struct sctp_sndinfo)); 1128 msg.msg_controllen += CMSG_SPACE(sizeof(struct sctp_sndinfo)); 1129 cmsg = (struct cmsghdr *)((caddr_t)cmsg + CMSG_SPACE(sizeof(struct sctp_sndinfo))); 1130 } 1131 if (spa_info->sendv_flags & SCTP_SEND_PRINFO_VALID) { 1132 cmsg->cmsg_level = IPPROTO_SCTP; 1133 cmsg->cmsg_type = SCTP_PRINFO; 1134 cmsg->cmsg_len = CMSG_LEN(sizeof(struct sctp_prinfo)); 1135 memcpy(CMSG_DATA(cmsg), &spa_info->sendv_prinfo, sizeof(struct sctp_prinfo)); 1136 msg.msg_controllen += CMSG_SPACE(sizeof(struct sctp_prinfo)); 1137 cmsg = (struct cmsghdr *)((caddr_t)cmsg + CMSG_SPACE(sizeof(struct sctp_prinfo))); 1138 } 1139 if (spa_info->sendv_flags & SCTP_SEND_AUTHINFO_VALID) { 1140 cmsg->cmsg_level = IPPROTO_SCTP; 1141 cmsg->cmsg_type = SCTP_AUTHINFO; 1142 cmsg->cmsg_len = CMSG_LEN(sizeof(struct sctp_authinfo)); 1143 memcpy(CMSG_DATA(cmsg), &spa_info->sendv_authinfo, sizeof(struct sctp_authinfo)); 1144 msg.msg_controllen += CMSG_SPACE(sizeof(struct sctp_authinfo)); 1145 cmsg = (struct cmsghdr *)((caddr_t)cmsg + CMSG_SPACE(sizeof(struct sctp_authinfo))); 1146 } 1147 break; 1148 default: 1149 free(cmsgbuf); 1150 errno = EINVAL; 1151 return (-1); 1152 } 1153 addr = addrs; 1154 msg.msg_name = NULL; 1155 msg.msg_namelen = 0; 1156 1157 for (i = 0; i < addrcnt; i++) { 1158 switch (addr->sa_family) { 1159 case AF_INET: 1160 addr_len = (socklen_t) sizeof(struct sockaddr_in); 1161 addr_in = (struct sockaddr_in *)addr; 1162 if (addr_in->sin_len != addr_len) { 1163 free(cmsgbuf); 1164 errno = EINVAL; 1165 return (-1); 1166 } 1167 if (i == 0) { 1168 port = addr_in->sin_port; 1169 } else { 1170 if (port == addr_in->sin_port) { 1171 cmsg->cmsg_level = IPPROTO_SCTP; 1172 cmsg->cmsg_type = SCTP_DSTADDRV4; 1173 cmsg->cmsg_len = CMSG_LEN(sizeof(struct in_addr)); 1174 memcpy(CMSG_DATA(cmsg), &addr_in->sin_addr, sizeof(struct in_addr)); 1175 msg.msg_controllen += CMSG_SPACE(sizeof(struct in_addr)); 1176 cmsg = (struct cmsghdr *)((caddr_t)cmsg + CMSG_SPACE(sizeof(struct in_addr))); 1177 } else { 1178 free(cmsgbuf); 1179 errno = EINVAL; 1180 return (-1); 1181 } 1182 } 1183 break; 1184 case AF_INET6: 1185 addr_len = (socklen_t) sizeof(struct sockaddr_in6); 1186 addr_in6 = (struct sockaddr_in6 *)addr; 1187 if (addr_in6->sin6_len != addr_len) { 1188 free(cmsgbuf); 1189 errno = EINVAL; 1190 return (-1); 1191 } 1192 if (i == 0) { 1193 port = addr_in6->sin6_port; 1194 } else { 1195 if (port == addr_in6->sin6_port) { 1196 cmsg->cmsg_level = IPPROTO_SCTP; 1197 cmsg->cmsg_type = SCTP_DSTADDRV6; 1198 cmsg->cmsg_len = CMSG_LEN(sizeof(struct in6_addr)); 1199 memcpy(CMSG_DATA(cmsg), &addr_in6->sin6_addr, sizeof(struct in6_addr)); 1200 msg.msg_controllen += CMSG_SPACE(sizeof(struct in6_addr)); 1201 cmsg = (struct cmsghdr *)((caddr_t)cmsg + CMSG_SPACE(sizeof(struct in6_addr))); 1202 } else { 1203 free(cmsgbuf); 1204 errno = EINVAL; 1205 return (-1); 1206 } 1207 } 1208 break; 1209 default: 1210 free(cmsgbuf); 1211 errno = EINVAL; 1212 return (-1); 1213 } 1214 if (i == 0) { 1215 msg.msg_name = addr; 1216 msg.msg_namelen = addr_len; 1217 } 1218 addr = (struct sockaddr *)((caddr_t)addr + addr_len); 1219 } 1220 if (msg.msg_controllen == 0) { 1221 msg.msg_control = NULL; 1222 } 1223 msg.msg_iov = (struct iovec *)iov; 1224 msg.msg_iovlen = iovcnt; 1225 msg.msg_flags = 0; 1226 ret = sendmsg(sd, &msg, flags); 1227 free(cmsgbuf); 1228 return (ret); 1229 } 1230 1231 1232 #if !defined(SYS_sctp_peeloff) && !defined(HAVE_SCTP_PEELOFF_SOCKOPT) 1233 1234 int 1235 sctp_peeloff(int sd, sctp_assoc_t assoc_id) 1236 { 1237 /* NOT supported, return invalid sd */ 1238 errno = ENOTSUP; 1239 return (-1); 1240 } 1241 1242 #endif 1243 #if defined(SYS_sctp_peeloff) && !defined(HAVE_SCTP_PEELOFF_SOCKOPT) 1244 int 1245 sctp_peeloff(int sd, sctp_assoc_t assoc_id) 1246 { 1247 return (syscall(SYS_sctp_peeloff, sd, assoc_id)); 1248 } 1249 1250 #endif 1251 1252 1253 #undef SCTP_CONTROL_VEC_SIZE_SND 1254 #undef SCTP_CONTROL_VEC_SIZE_RCV 1255 #undef SCTP_STACK_BUF_SIZE 1256