xref: /freebsd/lib/libc/net/sctp_sys_calls.c (revision 7cd2dcf07629713e5a3d60472cfe4701b705a167)
1 /*-
2  * Copyright (c) 2001-2007, by Cisco Systems, Inc. All rights reserved.
3  * Copyright (c) 2008-2012, by Randall Stewart. All rights reserved.
4  * Copyright (c) 2008-2012, by Michael Tuexen. All rights reserved.
5  *
6  * Redistribution and use in source and binary forms, with or without
7  * modification, are permitted provided that the following conditions are met:
8  *
9  * a) Redistributions of source code must retain the above copyright notice,
10  *    this list of conditions and the following disclaimer.
11  *
12  * b) Redistributions in binary form must reproduce the above copyright
13  *    notice, this list of conditions and the following disclaimer in
14  *    the documentation and/or other materials provided with the distribution.
15  *
16  * c) Neither the name of Cisco Systems, Inc. nor the names of its
17  *    contributors may be used to endorse or promote products derived
18  *    from this software without specific prior written permission.
19  *
20  * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
21  * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,
22  * THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23  * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE
24  * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
25  * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
26  * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
27  * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
28  * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
29  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
30  * THE POSSIBILITY OF SUCH DAMAGE.
31  */
32 
33 #include <sys/cdefs.h>
34 __FBSDID("$FreeBSD$");
35 
36 #include <stdio.h>
37 #include <string.h>
38 #include <errno.h>
39 #include <stdlib.h>
40 #include <unistd.h>
41 #include <sys/types.h>
42 #include <sys/socket.h>
43 #include <sys/errno.h>
44 #include <sys/syscall.h>
45 #include <sys/uio.h>
46 #include <netinet/in.h>
47 #include <arpa/inet.h>
48 #include <netinet/sctp_uio.h>
49 #include <netinet/sctp.h>
50 
51 #include <net/if_dl.h>
52 
53 #ifndef IN6_IS_ADDR_V4MAPPED
54 #define IN6_IS_ADDR_V4MAPPED(a)		      \
55 	((*(const uint32_t *)(const void *)(&(a)->s6_addr[0]) == 0) &&	\
56 	 (*(const uint32_t *)(const void *)(&(a)->s6_addr[4]) == 0) &&	\
57 	 (*(const uint32_t *)(const void *)(&(a)->s6_addr[8]) == ntohl(0x0000ffff)))
58 #endif
59 
60 
61 #define SCTP_CONTROL_VEC_SIZE_SND   8192
62 #define SCTP_CONTROL_VEC_SIZE_RCV  16384
63 #define SCTP_STACK_BUF_SIZE         2048
64 
65 #ifdef SCTP_DEBUG_PRINT_ADDRESS
66 
67 #define SCTP_STRING_BUF_SZ 256
68 
69 static void
70 SCTPPrintAnAddress(struct sockaddr *a)
71 {
72 	char stringToPrint[SCTP_STRING_BUF_SZ];
73 	u_short prt;
74 	char *srcaddr, *txt;
75 
76 	if (a == NULL) {
77 		printf("NULL\n");
78 		return;
79 	}
80 	if (a->sa_family == AF_INET) {
81 		srcaddr = (char *)&((struct sockaddr_in *)a)->sin_addr;
82 		txt = "IPv4 Address: ";
83 		prt = ntohs(((struct sockaddr_in *)a)->sin_port);
84 	} else if (a->sa_family == AF_INET6) {
85 		srcaddr = (char *)&((struct sockaddr_in6 *)a)->sin6_addr;
86 		prt = ntohs(((struct sockaddr_in6 *)a)->sin6_port);
87 		txt = "IPv6 Address: ";
88 	} else if (a->sa_family == AF_LINK) {
89 		int i;
90 		char tbuf[SCTP_STRING_BUF_SZ];
91 		u_char adbuf[SCTP_STRING_BUF_SZ];
92 		struct sockaddr_dl *dl;
93 
94 		dl = (struct sockaddr_dl *)a;
95 		strncpy(tbuf, dl->sdl_data, dl->sdl_nlen);
96 		tbuf[dl->sdl_nlen] = 0;
97 		printf("Intf:%s (len:%d)Interface index:%d type:%x(%d) ll-len:%d ",
98 		    tbuf,
99 		    dl->sdl_nlen,
100 		    dl->sdl_index,
101 		    dl->sdl_type,
102 		    dl->sdl_type,
103 		    dl->sdl_alen
104 		    );
105 		memcpy(adbuf, LLADDR(dl), dl->sdl_alen);
106 		for (i = 0; i < dl->sdl_alen; i++) {
107 			printf("%2.2x", adbuf[i]);
108 			if (i < (dl->sdl_alen - 1))
109 				printf(":");
110 		}
111 		printf("\n");
112 		return;
113 	} else {
114 		return;
115 	}
116 	if (inet_ntop(a->sa_family, srcaddr, stringToPrint, sizeof(stringToPrint))) {
117 		if (a->sa_family == AF_INET6) {
118 			printf("%s%s:%d scope:%d\n",
119 			    txt, stringToPrint, prt,
120 			    ((struct sockaddr_in6 *)a)->sin6_scope_id);
121 		} else {
122 			printf("%s%s:%d\n", txt, stringToPrint, prt);
123 		}
124 
125 	} else {
126 		printf("%s unprintable?\n", txt);
127 	}
128 }
129 
130 #endif				/* SCTP_DEBUG_PRINT_ADDRESS */
131 
132 static void
133 in6_sin6_2_sin(struct sockaddr_in *sin, struct sockaddr_in6 *sin6)
134 {
135 	bzero(sin, sizeof(*sin));
136 	sin->sin_len = sizeof(struct sockaddr_in);
137 	sin->sin_family = AF_INET;
138 	sin->sin_port = sin6->sin6_port;
139 	sin->sin_addr.s_addr = sin6->sin6_addr.__u6_addr.__u6_addr32[3];
140 }
141 
142 int
143 sctp_getaddrlen(sa_family_t family)
144 {
145 	int ret, sd;
146 	socklen_t siz;
147 	struct sctp_assoc_value av;
148 
149 	av.assoc_value = family;
150 	siz = sizeof(av);
151 #if defined(AF_INET)
152 	sd = socket(AF_INET, SOCK_SEQPACKET, IPPROTO_SCTP);
153 #elif defined(AF_INET6)
154 	sd = socket(AF_INET6, SOCK_SEQPACKET, IPPROTO_SCTP);
155 #else
156 	sd = -1;
157 #endif
158 	if (sd == -1) {
159 		return (-1);
160 	}
161 	ret = getsockopt(sd, IPPROTO_SCTP, SCTP_GET_ADDR_LEN, &av, &siz);
162 	close(sd);
163 	if (ret == 0) {
164 		return ((int)av.assoc_value);
165 	} else {
166 		return (-1);
167 	}
168 }
169 
170 int
171 sctp_connectx(int sd, const struct sockaddr *addrs, int addrcnt,
172     sctp_assoc_t * id)
173 {
174 	char buf[SCTP_STACK_BUF_SIZE];
175 	int i, ret, cnt, *aa;
176 	char *cpto;
177 	const struct sockaddr *at;
178 	sctp_assoc_t *p_id;
179 	size_t len = sizeof(int);
180 
181 	/* validate the address count and list */
182 	if ((addrs == NULL) || (addrcnt <= 0)) {
183 		errno = EINVAL;
184 		return (-1);
185 	}
186 	at = addrs;
187 	cnt = 0;
188 	cpto = ((caddr_t)buf + sizeof(int));
189 	/* validate all the addresses and get the size */
190 	for (i = 0; i < addrcnt; i++) {
191 		if (at->sa_family == AF_INET) {
192 			if (at->sa_len != sizeof(struct sockaddr_in)) {
193 				errno = EINVAL;
194 				return (-1);
195 			}
196 			memcpy(cpto, at, at->sa_len);
197 			cpto = ((caddr_t)cpto + at->sa_len);
198 			len += at->sa_len;
199 		} else if (at->sa_family == AF_INET6) {
200 			if (at->sa_len != sizeof(struct sockaddr_in6)) {
201 				errno = EINVAL;
202 				return (-1);
203 			}
204 			if (IN6_IS_ADDR_V4MAPPED(&((struct sockaddr_in6 *)at)->sin6_addr)) {
205 				len += sizeof(struct sockaddr_in);
206 				in6_sin6_2_sin((struct sockaddr_in *)cpto, (struct sockaddr_in6 *)at);
207 				cpto = ((caddr_t)cpto + sizeof(struct sockaddr_in));
208 				len += sizeof(struct sockaddr_in);
209 			} else {
210 				memcpy(cpto, at, at->sa_len);
211 				cpto = ((caddr_t)cpto + at->sa_len);
212 				len += at->sa_len;
213 			}
214 		} else {
215 			errno = EINVAL;
216 			return (-1);
217 		}
218 		if (len > (sizeof(buf) - sizeof(int))) {
219 			/* Never enough memory */
220 			errno = E2BIG;
221 			return (-1);
222 		}
223 		at = (struct sockaddr *)((caddr_t)at + at->sa_len);
224 		cnt++;
225 	}
226 	/* do we have any? */
227 	if (cnt == 0) {
228 		errno = EINVAL;
229 		return (-1);
230 	}
231 	aa = (int *)buf;
232 	*aa = cnt;
233 	ret = setsockopt(sd, IPPROTO_SCTP, SCTP_CONNECT_X, (void *)buf,
234 	    (socklen_t) len);
235 	if ((ret == 0) && id) {
236 		p_id = (sctp_assoc_t *) buf;
237 		*id = *p_id;
238 	}
239 	return (ret);
240 }
241 
242 int
243 sctp_bindx(int sd, struct sockaddr *addrs, int addrcnt, int flags)
244 {
245 	struct sctp_getaddresses *gaddrs;
246 	struct sockaddr *sa;
247 	struct sockaddr_in *sin;
248 	struct sockaddr_in6 *sin6;
249 	int i;
250 	size_t argsz;
251 	uint16_t sport = 0;
252 
253 	/* validate the flags */
254 	if ((flags != SCTP_BINDX_ADD_ADDR) &&
255 	    (flags != SCTP_BINDX_REM_ADDR)) {
256 		errno = EFAULT;
257 		return (-1);
258 	}
259 	/* validate the address count and list */
260 	if ((addrcnt <= 0) || (addrs == NULL)) {
261 		errno = EINVAL;
262 		return (-1);
263 	}
264 	argsz = (sizeof(struct sockaddr_storage) +
265 	    sizeof(struct sctp_getaddresses));
266 	gaddrs = (struct sctp_getaddresses *)calloc(1, argsz);
267 	if (gaddrs == NULL) {
268 		errno = ENOMEM;
269 		return (-1);
270 	}
271 	/* First pre-screen the addresses */
272 	sa = addrs;
273 	for (i = 0; i < addrcnt; i++) {
274 		if (sa->sa_family == AF_INET) {
275 			if (sa->sa_len != sizeof(struct sockaddr_in))
276 				goto out_error;
277 			sin = (struct sockaddr_in *)sa;
278 			if (sin->sin_port) {
279 				/* non-zero port, check or save */
280 				if (sport) {
281 					/* Check against our port */
282 					if (sport != sin->sin_port) {
283 						goto out_error;
284 					}
285 				} else {
286 					/* save off the port */
287 					sport = sin->sin_port;
288 				}
289 			}
290 		} else if (sa->sa_family == AF_INET6) {
291 			if (sa->sa_len != sizeof(struct sockaddr_in6))
292 				goto out_error;
293 			sin6 = (struct sockaddr_in6 *)sa;
294 			if (sin6->sin6_port) {
295 				/* non-zero port, check or save */
296 				if (sport) {
297 					/* Check against our port */
298 					if (sport != sin6->sin6_port) {
299 						goto out_error;
300 					}
301 				} else {
302 					/* save off the port */
303 					sport = sin6->sin6_port;
304 				}
305 			}
306 		} else {
307 			/* invalid address family specified */
308 			goto out_error;
309 		}
310 
311 		sa = (struct sockaddr *)((caddr_t)sa + sa->sa_len);
312 	}
313 	sa = addrs;
314 	/*
315 	 * Now if there was a port mentioned, assure that the first address
316 	 * has that port to make sure it fails or succeeds correctly.
317 	 */
318 	if (sport) {
319 		sin = (struct sockaddr_in *)sa;
320 		sin->sin_port = sport;
321 	}
322 	for (i = 0; i < addrcnt; i++) {
323 		if (sa->sa_family == AF_INET) {
324 			if (sa->sa_len != sizeof(struct sockaddr_in))
325 				goto out_error;
326 		} else if (sa->sa_family == AF_INET6) {
327 			if (sa->sa_len != sizeof(struct sockaddr_in6))
328 				goto out_error;
329 		} else {
330 			/* invalid address family specified */
331 	out_error:
332 			free(gaddrs);
333 			errno = EINVAL;
334 			return (-1);
335 		}
336 		memset(gaddrs, 0, argsz);
337 		gaddrs->sget_assoc_id = 0;
338 		memcpy(gaddrs->addr, sa, sa->sa_len);
339 		if (setsockopt(sd, IPPROTO_SCTP, flags, gaddrs,
340 		    (socklen_t) argsz) != 0) {
341 			free(gaddrs);
342 			return (-1);
343 		}
344 		sa = (struct sockaddr *)((caddr_t)sa + sa->sa_len);
345 	}
346 	free(gaddrs);
347 	return (0);
348 }
349 
350 
351 int
352 sctp_opt_info(int sd, sctp_assoc_t id, int opt, void *arg, socklen_t * size)
353 {
354 	if (arg == NULL) {
355 		errno = EINVAL;
356 		return (-1);
357 	}
358 	switch (opt) {
359 	case SCTP_RTOINFO:
360 		((struct sctp_rtoinfo *)arg)->srto_assoc_id = id;
361 		break;
362 	case SCTP_ASSOCINFO:
363 		((struct sctp_assocparams *)arg)->sasoc_assoc_id = id;
364 		break;
365 	case SCTP_DEFAULT_SEND_PARAM:
366 		((struct sctp_assocparams *)arg)->sasoc_assoc_id = id;
367 		break;
368 	case SCTP_PRIMARY_ADDR:
369 		((struct sctp_setprim *)arg)->ssp_assoc_id = id;
370 		break;
371 	case SCTP_PEER_ADDR_PARAMS:
372 		((struct sctp_paddrparams *)arg)->spp_assoc_id = id;
373 		break;
374 	case SCTP_MAXSEG:
375 		((struct sctp_assoc_value *)arg)->assoc_id = id;
376 		break;
377 	case SCTP_AUTH_KEY:
378 		((struct sctp_authkey *)arg)->sca_assoc_id = id;
379 		break;
380 	case SCTP_AUTH_ACTIVE_KEY:
381 		((struct sctp_authkeyid *)arg)->scact_assoc_id = id;
382 		break;
383 	case SCTP_DELAYED_SACK:
384 		((struct sctp_sack_info *)arg)->sack_assoc_id = id;
385 		break;
386 	case SCTP_CONTEXT:
387 		((struct sctp_assoc_value *)arg)->assoc_id = id;
388 		break;
389 	case SCTP_STATUS:
390 		((struct sctp_status *)arg)->sstat_assoc_id = id;
391 		break;
392 	case SCTP_GET_PEER_ADDR_INFO:
393 		((struct sctp_paddrinfo *)arg)->spinfo_assoc_id = id;
394 		break;
395 	case SCTP_PEER_AUTH_CHUNKS:
396 		((struct sctp_authchunks *)arg)->gauth_assoc_id = id;
397 		break;
398 	case SCTP_LOCAL_AUTH_CHUNKS:
399 		((struct sctp_authchunks *)arg)->gauth_assoc_id = id;
400 		break;
401 	case SCTP_TIMEOUTS:
402 		((struct sctp_timeouts *)arg)->stimo_assoc_id = id;
403 		break;
404 	case SCTP_EVENT:
405 		((struct sctp_event *)arg)->se_assoc_id = id;
406 		break;
407 	case SCTP_DEFAULT_SNDINFO:
408 		((struct sctp_sndinfo *)arg)->snd_assoc_id = id;
409 		break;
410 	case SCTP_DEFAULT_PRINFO:
411 		((struct sctp_default_prinfo *)arg)->pr_assoc_id = id;
412 		break;
413 	case SCTP_PEER_ADDR_THLDS:
414 		((struct sctp_paddrthlds *)arg)->spt_assoc_id = id;
415 		break;
416 	case SCTP_REMOTE_UDP_ENCAPS_PORT:
417 		((struct sctp_udpencaps *)arg)->sue_assoc_id = id;
418 		break;
419 	case SCTP_MAX_BURST:
420 		((struct sctp_assoc_value *)arg)->assoc_id = id;
421 		break;
422 	default:
423 		break;
424 	}
425 	return (getsockopt(sd, IPPROTO_SCTP, opt, arg, size));
426 }
427 
428 int
429 sctp_getpaddrs(int sd, sctp_assoc_t id, struct sockaddr **raddrs)
430 {
431 	struct sctp_getaddresses *addrs;
432 	struct sockaddr *sa;
433 	sctp_assoc_t asoc;
434 	caddr_t lim;
435 	socklen_t opt_len;
436 	int cnt;
437 
438 	if (raddrs == NULL) {
439 		errno = EFAULT;
440 		return (-1);
441 	}
442 	asoc = id;
443 	opt_len = (socklen_t) sizeof(sctp_assoc_t);
444 	if (getsockopt(sd, IPPROTO_SCTP, SCTP_GET_REMOTE_ADDR_SIZE,
445 	    &asoc, &opt_len) != 0) {
446 		return (-1);
447 	}
448 	/* size required is returned in 'asoc' */
449 	opt_len = (socklen_t) ((size_t)asoc + sizeof(struct sctp_getaddresses));
450 	addrs = calloc(1, (size_t)opt_len);
451 	if (addrs == NULL) {
452 		errno = ENOMEM;
453 		return (-1);
454 	}
455 	addrs->sget_assoc_id = id;
456 	/* Now lets get the array of addresses */
457 	if (getsockopt(sd, IPPROTO_SCTP, SCTP_GET_PEER_ADDRESSES,
458 	    addrs, &opt_len) != 0) {
459 		free(addrs);
460 		return (-1);
461 	}
462 	*raddrs = (struct sockaddr *)&addrs->addr[0];
463 	cnt = 0;
464 	sa = (struct sockaddr *)&addrs->addr[0];
465 	lim = (caddr_t)addrs + opt_len;
466 	while (((caddr_t)sa < lim) && (sa->sa_len > 0)) {
467 		sa = (struct sockaddr *)((caddr_t)sa + sa->sa_len);
468 		cnt++;
469 	}
470 	return (cnt);
471 }
472 
473 void
474 sctp_freepaddrs(struct sockaddr *addrs)
475 {
476 	/* Take away the hidden association id */
477 	void *fr_addr;
478 
479 	fr_addr = (void *)((caddr_t)addrs - sizeof(sctp_assoc_t));
480 	/* Now free it */
481 	free(fr_addr);
482 }
483 
484 int
485 sctp_getladdrs(int sd, sctp_assoc_t id, struct sockaddr **raddrs)
486 {
487 	struct sctp_getaddresses *addrs;
488 	caddr_t lim;
489 	struct sockaddr *sa;
490 	size_t size_of_addresses;
491 	socklen_t opt_len;
492 	int cnt;
493 
494 	if (raddrs == NULL) {
495 		errno = EFAULT;
496 		return (-1);
497 	}
498 	size_of_addresses = 0;
499 	opt_len = (socklen_t) sizeof(int);
500 	if (getsockopt(sd, IPPROTO_SCTP, SCTP_GET_LOCAL_ADDR_SIZE,
501 	    &size_of_addresses, &opt_len) != 0) {
502 		errno = ENOMEM;
503 		return (-1);
504 	}
505 	if (size_of_addresses == 0) {
506 		errno = ENOTCONN;
507 		return (-1);
508 	}
509 	opt_len = (socklen_t) (size_of_addresses +
510 	    sizeof(struct sockaddr_storage) +
511 	    sizeof(struct sctp_getaddresses));
512 	addrs = calloc(1, (size_t)opt_len);
513 	if (addrs == NULL) {
514 		errno = ENOMEM;
515 		return (-1);
516 	}
517 	addrs->sget_assoc_id = id;
518 	/* Now lets get the array of addresses */
519 	if (getsockopt(sd, IPPROTO_SCTP, SCTP_GET_LOCAL_ADDRESSES, addrs,
520 	    &opt_len) != 0) {
521 		free(addrs);
522 		errno = ENOMEM;
523 		return (-1);
524 	}
525 	*raddrs = (struct sockaddr *)&addrs->addr[0];
526 	cnt = 0;
527 	sa = (struct sockaddr *)&addrs->addr[0];
528 	lim = (caddr_t)addrs + opt_len;
529 	while (((caddr_t)sa < lim) && (sa->sa_len > 0)) {
530 		sa = (struct sockaddr *)((caddr_t)sa + sa->sa_len);
531 		cnt++;
532 	}
533 	return (cnt);
534 }
535 
536 void
537 sctp_freeladdrs(struct sockaddr *addrs)
538 {
539 	/* Take away the hidden association id */
540 	void *fr_addr;
541 
542 	fr_addr = (void *)((caddr_t)addrs - sizeof(sctp_assoc_t));
543 	/* Now free it */
544 	free(fr_addr);
545 }
546 
547 
548 ssize_t
549 sctp_sendmsg(int s,
550     const void *data,
551     size_t len,
552     const struct sockaddr *to,
553     socklen_t tolen,
554     uint32_t ppid,
555     uint32_t flags,
556     uint16_t stream_no,
557     uint32_t timetolive,
558     uint32_t context)
559 {
560 #ifdef SYS_sctp_generic_sendmsg
561 	struct sctp_sndrcvinfo sinfo;
562 
563 	memset(&sinfo, 0, sizeof(struct sctp_sndrcvinfo));
564 	sinfo.sinfo_ppid = ppid;
565 	sinfo.sinfo_flags = flags;
566 	sinfo.sinfo_stream = stream_no;
567 	sinfo.sinfo_timetolive = timetolive;
568 	sinfo.sinfo_context = context;
569 	sinfo.sinfo_assoc_id = 0;
570 	return (syscall(SYS_sctp_generic_sendmsg, s,
571 	    data, len, to, tolen, &sinfo, 0));
572 #else
573 	ssize_t sz;
574 	struct msghdr msg;
575 	struct sctp_sndrcvinfo *s_info;
576 	struct iovec iov;
577 	char controlVector[SCTP_CONTROL_VEC_SIZE_RCV];
578 	struct cmsghdr *cmsg;
579 	struct sockaddr *who = NULL;
580 	union {
581 		struct sockaddr_in in;
582 		struct sockaddr_in6 in6;
583 	}     addr;
584 
585 	if ((tolen > 0) &&
586 	    ((to == NULL) || (tolen < sizeof(struct sockaddr)))) {
587 		errno = EINVAL;
588 		return -1;
589 	}
590 	if (to && (tolen > 0)) {
591 		if (to->sa_family == AF_INET) {
592 			if (tolen != sizeof(struct sockaddr_in)) {
593 				errno = EINVAL;
594 				return -1;
595 			}
596 			if ((to->sa_len > 0) &&
597 			    (to->sa_len != sizeof(struct sockaddr_in))) {
598 				errno = EINVAL;
599 				return -1;
600 			}
601 			memcpy(&addr, to, sizeof(struct sockaddr_in));
602 			addr.in.sin_len = sizeof(struct sockaddr_in);
603 		} else if (to->sa_family == AF_INET6) {
604 			if (tolen != sizeof(struct sockaddr_in6)) {
605 				errno = EINVAL;
606 				return -1;
607 			}
608 			if ((to->sa_len > 0) &&
609 			    (to->sa_len != sizeof(struct sockaddr_in6))) {
610 				errno = EINVAL;
611 				return -1;
612 			}
613 			memcpy(&addr, to, sizeof(struct sockaddr_in6));
614 			addr.in6.sin6_len = sizeof(struct sockaddr_in6);
615 		} else {
616 			errno = EAFNOSUPPORT;
617 			return -1;
618 		}
619 		who = (struct sockaddr *)&addr;
620 	}
621 	iov.iov_base = (char *)data;
622 	iov.iov_len = len;
623 
624 	if (who) {
625 		msg.msg_name = (caddr_t)who;
626 		msg.msg_namelen = who->sa_len;
627 	} else {
628 		msg.msg_name = (caddr_t)NULL;
629 		msg.msg_namelen = 0;
630 	}
631 	msg.msg_iov = &iov;
632 	msg.msg_iovlen = 1;
633 	msg.msg_control = (caddr_t)controlVector;
634 
635 	cmsg = (struct cmsghdr *)controlVector;
636 
637 	cmsg->cmsg_level = IPPROTO_SCTP;
638 	cmsg->cmsg_type = SCTP_SNDRCV;
639 	cmsg->cmsg_len = CMSG_LEN(sizeof(struct sctp_sndrcvinfo));
640 	s_info = (struct sctp_sndrcvinfo *)CMSG_DATA(cmsg);
641 
642 	s_info->sinfo_stream = stream_no;
643 	s_info->sinfo_ssn = 0;
644 	s_info->sinfo_flags = flags;
645 	s_info->sinfo_ppid = ppid;
646 	s_info->sinfo_context = context;
647 	s_info->sinfo_assoc_id = 0;
648 	s_info->sinfo_timetolive = timetolive;
649 	errno = 0;
650 	msg.msg_controllen = cmsg->cmsg_len;
651 	sz = sendmsg(s, &msg, 0);
652 	return (sz);
653 #endif
654 }
655 
656 
657 sctp_assoc_t
658 sctp_getassocid(int sd, struct sockaddr *sa)
659 {
660 	struct sctp_paddrinfo sp;
661 	socklen_t siz;
662 
663 	/* First get the assoc id */
664 	siz = sizeof(sp);
665 	memset(&sp, 0, sizeof(sp));
666 	memcpy((caddr_t)&sp.spinfo_address, sa, sa->sa_len);
667 	errno = 0;
668 	if (getsockopt(sd, IPPROTO_SCTP,
669 	    SCTP_GET_PEER_ADDR_INFO, &sp, &siz) != 0) {
670 		return ((sctp_assoc_t) 0);
671 	}
672 	/* We depend on the fact that 0 can never be returned */
673 	return (sp.spinfo_assoc_id);
674 }
675 
676 ssize_t
677 sctp_send(int sd, const void *data, size_t len,
678     const struct sctp_sndrcvinfo *sinfo,
679     int flags)
680 {
681 
682 #ifdef SYS_sctp_generic_sendmsg
683 	struct sockaddr *to = NULL;
684 
685 	return (syscall(SYS_sctp_generic_sendmsg, sd,
686 	    data, len, to, 0, sinfo, flags));
687 #else
688 	ssize_t sz;
689 	struct msghdr msg;
690 	struct iovec iov;
691 	struct sctp_sndrcvinfo *s_info;
692 	char controlVector[SCTP_CONTROL_VEC_SIZE_SND];
693 	struct cmsghdr *cmsg;
694 
695 	if (sinfo == NULL) {
696 		errno = EINVAL;
697 		return (-1);
698 	}
699 	iov.iov_base = (char *)data;
700 	iov.iov_len = len;
701 
702 	msg.msg_name = 0;
703 	msg.msg_namelen = 0;
704 	msg.msg_iov = &iov;
705 	msg.msg_iovlen = 1;
706 	msg.msg_control = (caddr_t)controlVector;
707 
708 	cmsg = (struct cmsghdr *)controlVector;
709 
710 	cmsg->cmsg_level = IPPROTO_SCTP;
711 	cmsg->cmsg_type = SCTP_SNDRCV;
712 	cmsg->cmsg_len = CMSG_LEN(sizeof(struct sctp_sndrcvinfo));
713 	s_info = (struct sctp_sndrcvinfo *)CMSG_DATA(cmsg);
714 	/* copy in the data */
715 	*s_info = *sinfo;
716 	errno = 0;
717 	msg.msg_controllen = cmsg->cmsg_len;
718 	sz = sendmsg(sd, &msg, flags);
719 	return (sz);
720 #endif
721 }
722 
723 
724 
725 ssize_t
726 sctp_sendx(int sd, const void *msg, size_t msg_len,
727     struct sockaddr *addrs, int addrcnt,
728     struct sctp_sndrcvinfo *sinfo,
729     int flags)
730 {
731 	struct sctp_sndrcvinfo __sinfo;
732 	ssize_t ret;
733 	int i, cnt, *aa, saved_errno;
734 	char *buf;
735 	int no_end_cx = 0;
736 	size_t len, add_len;
737 	struct sockaddr *at;
738 
739 	if (addrs == NULL) {
740 		errno = EINVAL;
741 		return (-1);
742 	}
743 #ifdef SYS_sctp_generic_sendmsg
744 	if (addrcnt == 1) {
745 		socklen_t l;
746 
747 		/*
748 		 * Quick way, we don't need to do a connectx so lets use the
749 		 * syscall directly.
750 		 */
751 		l = addrs->sa_len;
752 		return (syscall(SYS_sctp_generic_sendmsg, sd,
753 		    msg, msg_len, addrs, l, sinfo, flags));
754 	}
755 #endif
756 
757 	len = sizeof(int);
758 	at = addrs;
759 	cnt = 0;
760 	/* validate all the addresses and get the size */
761 	for (i = 0; i < addrcnt; i++) {
762 		if (at->sa_family == AF_INET) {
763 			add_len = sizeof(struct sockaddr_in);
764 		} else if (at->sa_family == AF_INET6) {
765 			add_len = sizeof(struct sockaddr_in6);
766 		} else {
767 			errno = EINVAL;
768 			return (-1);
769 		}
770 		len += add_len;
771 		at = (struct sockaddr *)((caddr_t)at + add_len);
772 		cnt++;
773 	}
774 	/* do we have any? */
775 	if (cnt == 0) {
776 		errno = EINVAL;
777 		return (-1);
778 	}
779 	buf = malloc(len);
780 	if (buf == NULL) {
781 		errno = ENOMEM;
782 		return (-1);
783 	}
784 	aa = (int *)buf;
785 	*aa = cnt;
786 	aa++;
787 	memcpy((caddr_t)aa, addrs, (size_t)(len - sizeof(int)));
788 	ret = setsockopt(sd, IPPROTO_SCTP, SCTP_CONNECT_X_DELAYED, (void *)buf,
789 	    (socklen_t) len);
790 
791 	free(buf);
792 	if (ret != 0) {
793 		if (errno == EALREADY) {
794 			no_end_cx = 1;
795 			goto continue_send;
796 		}
797 		return (ret);
798 	}
799 continue_send:
800 	if (sinfo == NULL) {
801 		sinfo = &__sinfo;
802 		memset(&__sinfo, 0, sizeof(__sinfo));
803 	}
804 	sinfo->sinfo_assoc_id = sctp_getassocid(sd, addrs);
805 	if (sinfo->sinfo_assoc_id == 0) {
806 		(void)setsockopt(sd, IPPROTO_SCTP, SCTP_CONNECT_X_COMPLETE, (void *)addrs,
807 		    (socklen_t) addrs->sa_len);
808 		errno = ENOENT;
809 		return (-1);
810 	}
811 	ret = sctp_send(sd, msg, msg_len, sinfo, flags);
812 	saved_errno = errno;
813 	if (no_end_cx == 0)
814 		(void)setsockopt(sd, IPPROTO_SCTP, SCTP_CONNECT_X_COMPLETE, (void *)addrs,
815 		    (socklen_t) addrs->sa_len);
816 
817 	errno = saved_errno;
818 	return (ret);
819 }
820 
821 ssize_t
822 sctp_sendmsgx(int sd,
823     const void *msg,
824     size_t len,
825     struct sockaddr *addrs,
826     int addrcnt,
827     uint32_t ppid,
828     uint32_t flags,
829     uint16_t stream_no,
830     uint32_t timetolive,
831     uint32_t context)
832 {
833 	struct sctp_sndrcvinfo sinfo;
834 
835 	memset((void *)&sinfo, 0, sizeof(struct sctp_sndrcvinfo));
836 	sinfo.sinfo_ppid = ppid;
837 	sinfo.sinfo_flags = flags;
838 	sinfo.sinfo_ssn = stream_no;
839 	sinfo.sinfo_timetolive = timetolive;
840 	sinfo.sinfo_context = context;
841 	return sctp_sendx(sd, msg, len, addrs, addrcnt, &sinfo, 0);
842 }
843 
844 ssize_t
845 sctp_recvmsg(int s,
846     void *dbuf,
847     size_t len,
848     struct sockaddr *from,
849     socklen_t * fromlen,
850     struct sctp_sndrcvinfo *sinfo,
851     int *msg_flags)
852 {
853 #ifdef SYS_sctp_generic_recvmsg
854 	struct iovec iov;
855 
856 	iov.iov_base = dbuf;
857 	iov.iov_len = len;
858 	return (syscall(SYS_sctp_generic_recvmsg, s,
859 	    &iov, 1, from, fromlen, sinfo, msg_flags));
860 #else
861 	struct sctp_sndrcvinfo *s_info;
862 	ssize_t sz;
863 	struct msghdr msg;
864 	struct iovec iov;
865 	char controlVector[SCTP_CONTROL_VEC_SIZE_RCV];
866 	struct cmsghdr *cmsg;
867 
868 	if (msg_flags == NULL) {
869 		errno = EINVAL;
870 		return (-1);
871 	}
872 	msg.msg_flags = 0;
873 	iov.iov_base = dbuf;
874 	iov.iov_len = len;
875 	msg.msg_name = (caddr_t)from;
876 	if (fromlen == NULL)
877 		msg.msg_namelen = 0;
878 	else
879 		msg.msg_namelen = *fromlen;
880 	msg.msg_iov = &iov;
881 	msg.msg_iovlen = 1;
882 	msg.msg_control = (caddr_t)controlVector;
883 	msg.msg_controllen = sizeof(controlVector);
884 	errno = 0;
885 	sz = recvmsg(s, &msg, *msg_flags);
886 	*msg_flags = msg.msg_flags;
887 	if (sz <= 0) {
888 		return (sz);
889 	}
890 	s_info = NULL;
891 	if (sinfo) {
892 		sinfo->sinfo_assoc_id = 0;
893 	}
894 	if ((msg.msg_controllen) && sinfo) {
895 		/*
896 		 * parse through and see if we find the sctp_sndrcvinfo (if
897 		 * the user wants it).
898 		 */
899 		cmsg = (struct cmsghdr *)controlVector;
900 		while (cmsg) {
901 			if ((cmsg->cmsg_len == 0) || (cmsg->cmsg_len > msg.msg_controllen)) {
902 				break;
903 			}
904 			if (cmsg->cmsg_level == IPPROTO_SCTP) {
905 				if (cmsg->cmsg_type == SCTP_SNDRCV) {
906 					/* Got it */
907 					s_info = (struct sctp_sndrcvinfo *)CMSG_DATA(cmsg);
908 					/* Copy it to the user */
909 					if (sinfo)
910 						*sinfo = *s_info;
911 					break;
912 				} else if (cmsg->cmsg_type == SCTP_EXTRCV) {
913 					/*
914 					 * Got it, presumably the user has
915 					 * asked for this extra info, so the
916 					 * structure holds more room :-D
917 					 */
918 					s_info = (struct sctp_sndrcvinfo *)CMSG_DATA(cmsg);
919 					/* Copy it to the user */
920 					if (sinfo) {
921 						memcpy(sinfo, s_info, sizeof(struct sctp_extrcvinfo));
922 					}
923 					break;
924 
925 				}
926 			}
927 			cmsg = CMSG_NXTHDR(&msg, cmsg);
928 		}
929 	}
930 	return (sz);
931 #endif
932 }
933 
934 ssize_t
935 sctp_recvv(int sd,
936     const struct iovec *iov,
937     int iovlen,
938     struct sockaddr *from,
939     socklen_t * fromlen,
940     void *info,
941     socklen_t * infolen,
942     unsigned int *infotype,
943     int *flags)
944 {
945 	char ctlbuf[SCTP_CONTROL_VEC_SIZE_RCV];
946 	struct msghdr msg;
947 	struct cmsghdr *cmsg;
948 	ssize_t n;
949 	struct sctp_rcvinfo *rcvinfo;
950 	struct sctp_nxtinfo *nxtinfo;
951 
952 	if (((info != NULL) && (infolen == NULL)) |
953 	    ((info == NULL) && (infolen != NULL) && (*infolen != 0)) ||
954 	    ((info != NULL) && (infotype == NULL))) {
955 		errno = EINVAL;
956 		return (-1);
957 	}
958 	if (infotype) {
959 		*infotype = SCTP_RECVV_NOINFO;
960 	}
961 	msg.msg_name = from;
962 	if (fromlen == NULL) {
963 		msg.msg_namelen = 0;
964 	} else {
965 		msg.msg_namelen = *fromlen;
966 	}
967 	msg.msg_iov = (struct iovec *)iov;
968 	msg.msg_iovlen = iovlen;
969 	msg.msg_control = ctlbuf;
970 	msg.msg_controllen = sizeof(ctlbuf);
971 	errno = 0;
972 	n = recvmsg(sd, &msg, *flags);
973 	*flags = msg.msg_flags;
974 	if ((n > 0) &&
975 	    (msg.msg_controllen > 0) &&
976 	    (infotype != NULL) &&
977 	    (infolen != NULL) &&
978 	    (*infolen > 0)) {
979 		rcvinfo = NULL;
980 		nxtinfo = NULL;
981 		for (cmsg = CMSG_FIRSTHDR(&msg); cmsg; cmsg = CMSG_NXTHDR(&msg, cmsg)) {
982 			if (cmsg->cmsg_level != IPPROTO_SCTP) {
983 				continue;
984 			}
985 			if (cmsg->cmsg_type == SCTP_RCVINFO) {
986 				rcvinfo = (struct sctp_rcvinfo *)CMSG_DATA(cmsg);
987 			}
988 			if (cmsg->cmsg_type == SCTP_NXTINFO) {
989 				nxtinfo = (struct sctp_nxtinfo *)CMSG_DATA(cmsg);
990 			}
991 			if (rcvinfo && nxtinfo) {
992 				break;
993 			}
994 		}
995 		if (rcvinfo) {
996 			if (nxtinfo) {
997 				if (*infolen >= sizeof(struct sctp_recvv_rn)) {
998 					struct sctp_recvv_rn *rn_info;
999 
1000 					rn_info = (struct sctp_recvv_rn *)info;
1001 					rn_info->recvv_rcvinfo = *rcvinfo;
1002 					rn_info->recvv_nxtinfo = *nxtinfo;
1003 					*infolen = (socklen_t) sizeof(struct sctp_recvv_rn);
1004 					*infotype = SCTP_RECVV_RN;
1005 				}
1006 			} else {
1007 				if (*infolen >= sizeof(struct sctp_rcvinfo)) {
1008 					memcpy(info, rcvinfo, sizeof(struct sctp_rcvinfo));
1009 					*infolen = (socklen_t) sizeof(struct sctp_rcvinfo);
1010 					*infotype = SCTP_RECVV_RCVINFO;
1011 				}
1012 			}
1013 		} else if (nxtinfo) {
1014 			if (*infolen >= sizeof(struct sctp_rcvinfo)) {
1015 				memcpy(info, nxtinfo, sizeof(struct sctp_nxtinfo));
1016 				*infolen = (socklen_t) sizeof(struct sctp_nxtinfo);
1017 				*infotype = SCTP_RECVV_NXTINFO;
1018 			}
1019 		}
1020 	}
1021 	return (n);
1022 }
1023 
1024 ssize_t
1025 sctp_sendv(int sd,
1026     const struct iovec *iov, int iovcnt,
1027     struct sockaddr *addrs, int addrcnt,
1028     void *info, socklen_t infolen, unsigned int infotype,
1029     int flags)
1030 {
1031 	ssize_t ret;
1032 	int i;
1033 	socklen_t addr_len;
1034 	struct msghdr msg;
1035 	in_port_t port;
1036 	struct sctp_sendv_spa *spa_info;
1037 	struct cmsghdr *cmsg;
1038 	char *cmsgbuf;
1039 	struct sockaddr *addr;
1040 	struct sockaddr_in *addr_in;
1041 	struct sockaddr_in6 *addr_in6;
1042 
1043 	if ((addrcnt < 0) ||
1044 	    (iovcnt < 0) ||
1045 	    ((addrs == NULL) && (addrcnt > 0)) ||
1046 	    ((addrs != NULL) && (addrcnt == 0)) ||
1047 	    ((iov == NULL) && (iovcnt > 0)) ||
1048 	    ((iov != NULL) && (iovcnt == 0))) {
1049 		errno = EINVAL;
1050 		return (-1);
1051 	}
1052 	cmsgbuf = malloc(CMSG_SPACE(sizeof(struct sctp_sndinfo)) +
1053 	    CMSG_SPACE(sizeof(struct sctp_prinfo)) +
1054 	    CMSG_SPACE(sizeof(struct sctp_authinfo)) +
1055 	    (size_t)addrcnt * CMSG_SPACE(sizeof(struct in6_addr)));
1056 	if (cmsgbuf == NULL) {
1057 		errno = ENOMEM;
1058 		return (-1);
1059 	}
1060 	msg.msg_control = cmsgbuf;
1061 	msg.msg_controllen = 0;
1062 	cmsg = (struct cmsghdr *)cmsgbuf;
1063 	switch (infotype) {
1064 	case SCTP_SENDV_NOINFO:
1065 		if ((infolen != 0) || (info != NULL)) {
1066 			free(cmsgbuf);
1067 			errno = EINVAL;
1068 			return (-1);
1069 		}
1070 		break;
1071 	case SCTP_SENDV_SNDINFO:
1072 		if ((info == NULL) || (infolen < sizeof(struct sctp_sndinfo))) {
1073 			free(cmsgbuf);
1074 			errno = EINVAL;
1075 			return (-1);
1076 		}
1077 		cmsg->cmsg_level = IPPROTO_SCTP;
1078 		cmsg->cmsg_type = SCTP_SNDINFO;
1079 		cmsg->cmsg_len = CMSG_LEN(sizeof(struct sctp_sndinfo));
1080 		memcpy(CMSG_DATA(cmsg), info, sizeof(struct sctp_sndinfo));
1081 		msg.msg_controllen += CMSG_SPACE(sizeof(struct sctp_sndinfo));
1082 		cmsg = (struct cmsghdr *)((caddr_t)cmsg + CMSG_SPACE(sizeof(struct sctp_sndinfo)));
1083 		break;
1084 	case SCTP_SENDV_PRINFO:
1085 		if ((info == NULL) || (infolen < sizeof(struct sctp_prinfo))) {
1086 			free(cmsgbuf);
1087 			errno = EINVAL;
1088 			return (-1);
1089 		}
1090 		cmsg->cmsg_level = IPPROTO_SCTP;
1091 		cmsg->cmsg_type = SCTP_PRINFO;
1092 		cmsg->cmsg_len = CMSG_LEN(sizeof(struct sctp_prinfo));
1093 		memcpy(CMSG_DATA(cmsg), info, sizeof(struct sctp_prinfo));
1094 		msg.msg_controllen += CMSG_SPACE(sizeof(struct sctp_prinfo));
1095 		cmsg = (struct cmsghdr *)((caddr_t)cmsg + CMSG_SPACE(sizeof(struct sctp_prinfo)));
1096 		break;
1097 	case SCTP_SENDV_AUTHINFO:
1098 		if ((info == NULL) || (infolen < sizeof(struct sctp_authinfo))) {
1099 			free(cmsgbuf);
1100 			errno = EINVAL;
1101 			return (-1);
1102 		}
1103 		cmsg->cmsg_level = IPPROTO_SCTP;
1104 		cmsg->cmsg_type = SCTP_AUTHINFO;
1105 		cmsg->cmsg_len = CMSG_LEN(sizeof(struct sctp_authinfo));
1106 		memcpy(CMSG_DATA(cmsg), info, sizeof(struct sctp_authinfo));
1107 		msg.msg_controllen += CMSG_SPACE(sizeof(struct sctp_authinfo));
1108 		cmsg = (struct cmsghdr *)((caddr_t)cmsg + CMSG_SPACE(sizeof(struct sctp_authinfo)));
1109 		break;
1110 	case SCTP_SENDV_SPA:
1111 		if ((info == NULL) || (infolen < sizeof(struct sctp_sendv_spa))) {
1112 			free(cmsgbuf);
1113 			errno = EINVAL;
1114 			return (-1);
1115 		}
1116 		spa_info = (struct sctp_sendv_spa *)info;
1117 		if (spa_info->sendv_flags & SCTP_SEND_SNDINFO_VALID) {
1118 			cmsg->cmsg_level = IPPROTO_SCTP;
1119 			cmsg->cmsg_type = SCTP_SNDINFO;
1120 			cmsg->cmsg_len = CMSG_LEN(sizeof(struct sctp_sndinfo));
1121 			memcpy(CMSG_DATA(cmsg), &spa_info->sendv_sndinfo, sizeof(struct sctp_sndinfo));
1122 			msg.msg_controllen += CMSG_SPACE(sizeof(struct sctp_sndinfo));
1123 			cmsg = (struct cmsghdr *)((caddr_t)cmsg + CMSG_SPACE(sizeof(struct sctp_sndinfo)));
1124 		}
1125 		if (spa_info->sendv_flags & SCTP_SEND_PRINFO_VALID) {
1126 			cmsg->cmsg_level = IPPROTO_SCTP;
1127 			cmsg->cmsg_type = SCTP_PRINFO;
1128 			cmsg->cmsg_len = CMSG_LEN(sizeof(struct sctp_prinfo));
1129 			memcpy(CMSG_DATA(cmsg), &spa_info->sendv_prinfo, sizeof(struct sctp_prinfo));
1130 			msg.msg_controllen += CMSG_SPACE(sizeof(struct sctp_prinfo));
1131 			cmsg = (struct cmsghdr *)((caddr_t)cmsg + CMSG_SPACE(sizeof(struct sctp_prinfo)));
1132 		}
1133 		if (spa_info->sendv_flags & SCTP_SEND_AUTHINFO_VALID) {
1134 			cmsg->cmsg_level = IPPROTO_SCTP;
1135 			cmsg->cmsg_type = SCTP_AUTHINFO;
1136 			cmsg->cmsg_len = CMSG_LEN(sizeof(struct sctp_authinfo));
1137 			memcpy(CMSG_DATA(cmsg), &spa_info->sendv_authinfo, sizeof(struct sctp_authinfo));
1138 			msg.msg_controllen += CMSG_SPACE(sizeof(struct sctp_authinfo));
1139 			cmsg = (struct cmsghdr *)((caddr_t)cmsg + CMSG_SPACE(sizeof(struct sctp_authinfo)));
1140 		}
1141 		break;
1142 	default:
1143 		free(cmsgbuf);
1144 		errno = EINVAL;
1145 		return (-1);
1146 	}
1147 	addr = addrs;
1148 	msg.msg_name = NULL;
1149 	msg.msg_namelen = 0;
1150 
1151 	for (i = 0; i < addrcnt; i++) {
1152 		switch (addr->sa_family) {
1153 		case AF_INET:
1154 			addr_len = (socklen_t) sizeof(struct sockaddr_in);
1155 			addr_in = (struct sockaddr_in *)addr;
1156 			if (addr_in->sin_len != addr_len) {
1157 				free(cmsgbuf);
1158 				errno = EINVAL;
1159 				return (-1);
1160 			}
1161 			if (i == 0) {
1162 				port = addr_in->sin_port;
1163 			} else {
1164 				if (port == addr_in->sin_port) {
1165 					cmsg->cmsg_level = IPPROTO_SCTP;
1166 					cmsg->cmsg_type = SCTP_DSTADDRV4;
1167 					cmsg->cmsg_len = CMSG_LEN(sizeof(struct in_addr));
1168 					memcpy(CMSG_DATA(cmsg), &addr_in->sin_addr, sizeof(struct in_addr));
1169 					msg.msg_controllen += CMSG_SPACE(sizeof(struct in_addr));
1170 					cmsg = (struct cmsghdr *)((caddr_t)cmsg + CMSG_SPACE(sizeof(struct in_addr)));
1171 				} else {
1172 					free(cmsgbuf);
1173 					errno = EINVAL;
1174 					return (-1);
1175 				}
1176 			}
1177 			break;
1178 		case AF_INET6:
1179 			addr_len = (socklen_t) sizeof(struct sockaddr_in6);
1180 			addr_in6 = (struct sockaddr_in6 *)addr;
1181 			if (addr_in6->sin6_len != addr_len) {
1182 				free(cmsgbuf);
1183 				errno = EINVAL;
1184 				return (-1);
1185 			}
1186 			if (i == 0) {
1187 				port = addr_in6->sin6_port;
1188 			} else {
1189 				if (port == addr_in6->sin6_port) {
1190 					cmsg->cmsg_level = IPPROTO_SCTP;
1191 					cmsg->cmsg_type = SCTP_DSTADDRV6;
1192 					cmsg->cmsg_len = CMSG_LEN(sizeof(struct in6_addr));
1193 					memcpy(CMSG_DATA(cmsg), &addr_in6->sin6_addr, sizeof(struct in6_addr));
1194 					msg.msg_controllen += CMSG_SPACE(sizeof(struct in6_addr));
1195 					cmsg = (struct cmsghdr *)((caddr_t)cmsg + CMSG_SPACE(sizeof(struct in6_addr)));
1196 				} else {
1197 					free(cmsgbuf);
1198 					errno = EINVAL;
1199 					return (-1);
1200 				}
1201 			}
1202 			break;
1203 		default:
1204 			free(cmsgbuf);
1205 			errno = EINVAL;
1206 			return (-1);
1207 		}
1208 		if (i == 0) {
1209 			msg.msg_name = addr;
1210 			msg.msg_namelen = addr_len;
1211 		}
1212 		addr = (struct sockaddr *)((caddr_t)addr + addr_len);
1213 	}
1214 	if (msg.msg_controllen == 0) {
1215 		msg.msg_control = NULL;
1216 	}
1217 	msg.msg_iov = (struct iovec *)iov;
1218 	msg.msg_iovlen = iovcnt;
1219 	msg.msg_flags = 0;
1220 	ret = sendmsg(sd, &msg, flags);
1221 	free(cmsgbuf);
1222 	return (ret);
1223 }
1224 
1225 
1226 #if !defined(SYS_sctp_peeloff) && !defined(HAVE_SCTP_PEELOFF_SOCKOPT)
1227 
1228 int
1229 sctp_peeloff(int sd, sctp_assoc_t assoc_id)
1230 {
1231 	/* NOT supported, return invalid sd */
1232 	errno = ENOTSUP;
1233 	return (-1);
1234 }
1235 
1236 #endif
1237 #if defined(SYS_sctp_peeloff) && !defined(HAVE_SCTP_PEELOFF_SOCKOPT)
1238 int
1239 sctp_peeloff(int sd, sctp_assoc_t assoc_id)
1240 {
1241 	return (syscall(SYS_sctp_peeloff, sd, assoc_id));
1242 }
1243 
1244 #endif
1245 
1246 
1247 #undef SCTP_CONTROL_VEC_SIZE_SND
1248 #undef SCTP_CONTROL_VEC_SIZE_RCV
1249 #undef SCTP_STACK_BUF_SIZE
1250