1 /*- 2 * Copyright (c) 2001-2007, by Cisco Systems, Inc. All rights reserved. 3 * Copyright (c) 2008-2012, by Randall Stewart. All rights reserved. 4 * Copyright (c) 2008-2012, by Michael Tuexen. All rights reserved. 5 * 6 * Redistribution and use in source and binary forms, with or without 7 * modification, are permitted provided that the following conditions are met: 8 * 9 * a) Redistributions of source code must retain the above copyright notice, 10 * this list of conditions and the following disclaimer. 11 * 12 * b) Redistributions in binary form must reproduce the above copyright 13 * notice, this list of conditions and the following disclaimer in 14 * the documentation and/or other materials provided with the distribution. 15 * 16 * c) Neither the name of Cisco Systems, Inc. nor the names of its 17 * contributors may be used to endorse or promote products derived 18 * from this software without specific prior written permission. 19 * 20 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS 21 * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, 22 * THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 23 * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE 24 * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR 25 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF 26 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS 27 * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN 28 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) 29 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF 30 * THE POSSIBILITY OF SUCH DAMAGE. 31 */ 32 33 #include <sys/cdefs.h> 34 __FBSDID("$FreeBSD$"); 35 36 #include <stdio.h> 37 #include <string.h> 38 #include <errno.h> 39 #include <stdlib.h> 40 #include <unistd.h> 41 #include <sys/types.h> 42 #include <sys/socket.h> 43 #include <sys/errno.h> 44 #include <sys/syscall.h> 45 #include <sys/uio.h> 46 #include <netinet/in.h> 47 #include <arpa/inet.h> 48 #include <netinet/sctp_uio.h> 49 #include <netinet/sctp.h> 50 51 #include <net/if_dl.h> 52 53 #ifndef IN6_IS_ADDR_V4MAPPED 54 #define IN6_IS_ADDR_V4MAPPED(a) \ 55 ((*(const uint32_t *)(const void *)(&(a)->s6_addr[0]) == 0) && \ 56 (*(const uint32_t *)(const void *)(&(a)->s6_addr[4]) == 0) && \ 57 (*(const uint32_t *)(const void *)(&(a)->s6_addr[8]) == ntohl(0x0000ffff))) 58 #endif 59 60 61 #define SCTP_CONTROL_VEC_SIZE_SND 8192 62 #define SCTP_CONTROL_VEC_SIZE_RCV 16384 63 #define SCTP_STACK_BUF_SIZE 2048 64 65 #ifdef SCTP_DEBUG_PRINT_ADDRESS 66 67 #define SCTP_STRING_BUF_SZ 256 68 69 static void 70 SCTPPrintAnAddress(struct sockaddr *a) 71 { 72 char stringToPrint[SCTP_STRING_BUF_SZ]; 73 u_short prt; 74 char *srcaddr, *txt; 75 76 if (a == NULL) { 77 printf("NULL\n"); 78 return; 79 } 80 if (a->sa_family == AF_INET) { 81 srcaddr = (char *)&((struct sockaddr_in *)a)->sin_addr; 82 txt = "IPv4 Address: "; 83 prt = ntohs(((struct sockaddr_in *)a)->sin_port); 84 } else if (a->sa_family == AF_INET6) { 85 srcaddr = (char *)&((struct sockaddr_in6 *)a)->sin6_addr; 86 prt = ntohs(((struct sockaddr_in6 *)a)->sin6_port); 87 txt = "IPv6 Address: "; 88 } else if (a->sa_family == AF_LINK) { 89 int i; 90 char tbuf[SCTP_STRING_BUF_SZ]; 91 u_char adbuf[SCTP_STRING_BUF_SZ]; 92 struct sockaddr_dl *dl; 93 94 dl = (struct sockaddr_dl *)a; 95 strncpy(tbuf, dl->sdl_data, dl->sdl_nlen); 96 tbuf[dl->sdl_nlen] = 0; 97 printf("Intf:%s (len:%d)Interface index:%d type:%x(%d) ll-len:%d ", 98 tbuf, 99 dl->sdl_nlen, 100 dl->sdl_index, 101 dl->sdl_type, 102 dl->sdl_type, 103 dl->sdl_alen 104 ); 105 memcpy(adbuf, LLADDR(dl), dl->sdl_alen); 106 for (i = 0; i < dl->sdl_alen; i++) { 107 printf("%2.2x", adbuf[i]); 108 if (i < (dl->sdl_alen - 1)) 109 printf(":"); 110 } 111 printf("\n"); 112 return; 113 } else { 114 return; 115 } 116 if (inet_ntop(a->sa_family, srcaddr, stringToPrint, sizeof(stringToPrint))) { 117 if (a->sa_family == AF_INET6) { 118 printf("%s%s:%d scope:%d\n", 119 txt, stringToPrint, prt, 120 ((struct sockaddr_in6 *)a)->sin6_scope_id); 121 } else { 122 printf("%s%s:%d\n", txt, stringToPrint, prt); 123 } 124 125 } else { 126 printf("%s unprintable?\n", txt); 127 } 128 } 129 130 #endif /* SCTP_DEBUG_PRINT_ADDRESS */ 131 132 static void 133 in6_sin6_2_sin(struct sockaddr_in *sin, struct sockaddr_in6 *sin6) 134 { 135 bzero(sin, sizeof(*sin)); 136 sin->sin_len = sizeof(struct sockaddr_in); 137 sin->sin_family = AF_INET; 138 sin->sin_port = sin6->sin6_port; 139 sin->sin_addr.s_addr = sin6->sin6_addr.__u6_addr.__u6_addr32[3]; 140 } 141 142 int 143 sctp_getaddrlen(sa_family_t family) 144 { 145 int ret, sd; 146 socklen_t siz; 147 struct sctp_assoc_value av; 148 149 av.assoc_value = family; 150 siz = sizeof(av); 151 #if defined(AF_INET) 152 sd = socket(AF_INET, SOCK_SEQPACKET, IPPROTO_SCTP); 153 #elif defined(AF_INET6) 154 sd = socket(AF_INET6, SOCK_SEQPACKET, IPPROTO_SCTP); 155 #else 156 sd = -1; 157 #endif 158 if (sd == -1) { 159 return (-1); 160 } 161 ret = getsockopt(sd, IPPROTO_SCTP, SCTP_GET_ADDR_LEN, &av, &siz); 162 close(sd); 163 if (ret == 0) { 164 return ((int)av.assoc_value); 165 } else { 166 return (-1); 167 } 168 } 169 170 int 171 sctp_connectx(int sd, const struct sockaddr *addrs, int addrcnt, 172 sctp_assoc_t * id) 173 { 174 char buf[SCTP_STACK_BUF_SIZE]; 175 int i, ret, cnt, *aa; 176 char *cpto; 177 const struct sockaddr *at; 178 sctp_assoc_t *p_id; 179 size_t len = sizeof(int); 180 181 /* validate the address count and list */ 182 if ((addrs == NULL) || (addrcnt <= 0)) { 183 errno = EINVAL; 184 return (-1); 185 } 186 at = addrs; 187 cnt = 0; 188 cpto = ((caddr_t)buf + sizeof(int)); 189 /* validate all the addresses and get the size */ 190 for (i = 0; i < addrcnt; i++) { 191 if (at->sa_family == AF_INET) { 192 if (at->sa_len != sizeof(struct sockaddr_in)) { 193 errno = EINVAL; 194 return (-1); 195 } 196 memcpy(cpto, at, at->sa_len); 197 cpto = ((caddr_t)cpto + at->sa_len); 198 len += at->sa_len; 199 } else if (at->sa_family == AF_INET6) { 200 if (at->sa_len != sizeof(struct sockaddr_in6)) { 201 errno = EINVAL; 202 return (-1); 203 } 204 if (IN6_IS_ADDR_V4MAPPED(&((struct sockaddr_in6 *)at)->sin6_addr)) { 205 len += sizeof(struct sockaddr_in); 206 in6_sin6_2_sin((struct sockaddr_in *)cpto, (struct sockaddr_in6 *)at); 207 cpto = ((caddr_t)cpto + sizeof(struct sockaddr_in)); 208 len += sizeof(struct sockaddr_in); 209 } else { 210 memcpy(cpto, at, at->sa_len); 211 cpto = ((caddr_t)cpto + at->sa_len); 212 len += at->sa_len; 213 } 214 } else { 215 errno = EINVAL; 216 return (-1); 217 } 218 if (len > (sizeof(buf) - sizeof(int))) { 219 /* Never enough memory */ 220 errno = E2BIG; 221 return (-1); 222 } 223 at = (struct sockaddr *)((caddr_t)at + at->sa_len); 224 cnt++; 225 } 226 /* do we have any? */ 227 if (cnt == 0) { 228 errno = EINVAL; 229 return (-1); 230 } 231 aa = (int *)buf; 232 *aa = cnt; 233 ret = setsockopt(sd, IPPROTO_SCTP, SCTP_CONNECT_X, (void *)buf, 234 (socklen_t) len); 235 if ((ret == 0) && id) { 236 p_id = (sctp_assoc_t *) buf; 237 *id = *p_id; 238 } 239 return (ret); 240 } 241 242 int 243 sctp_bindx(int sd, struct sockaddr *addrs, int addrcnt, int flags) 244 { 245 struct sctp_getaddresses *gaddrs; 246 struct sockaddr *sa; 247 struct sockaddr_in *sin; 248 struct sockaddr_in6 *sin6; 249 int i; 250 size_t argsz; 251 uint16_t sport = 0; 252 253 /* validate the flags */ 254 if ((flags != SCTP_BINDX_ADD_ADDR) && 255 (flags != SCTP_BINDX_REM_ADDR)) { 256 errno = EFAULT; 257 return (-1); 258 } 259 /* validate the address count and list */ 260 if ((addrcnt <= 0) || (addrs == NULL)) { 261 errno = EINVAL; 262 return (-1); 263 } 264 argsz = (sizeof(struct sockaddr_storage) + 265 sizeof(struct sctp_getaddresses)); 266 gaddrs = (struct sctp_getaddresses *)calloc(1, argsz); 267 if (gaddrs == NULL) { 268 errno = ENOMEM; 269 return (-1); 270 } 271 /* First pre-screen the addresses */ 272 sa = addrs; 273 for (i = 0; i < addrcnt; i++) { 274 if (sa->sa_family == AF_INET) { 275 if (sa->sa_len != sizeof(struct sockaddr_in)) 276 goto out_error; 277 sin = (struct sockaddr_in *)sa; 278 if (sin->sin_port) { 279 /* non-zero port, check or save */ 280 if (sport) { 281 /* Check against our port */ 282 if (sport != sin->sin_port) { 283 goto out_error; 284 } 285 } else { 286 /* save off the port */ 287 sport = sin->sin_port; 288 } 289 } 290 } else if (sa->sa_family == AF_INET6) { 291 if (sa->sa_len != sizeof(struct sockaddr_in6)) 292 goto out_error; 293 sin6 = (struct sockaddr_in6 *)sa; 294 if (sin6->sin6_port) { 295 /* non-zero port, check or save */ 296 if (sport) { 297 /* Check against our port */ 298 if (sport != sin6->sin6_port) { 299 goto out_error; 300 } 301 } else { 302 /* save off the port */ 303 sport = sin6->sin6_port; 304 } 305 } 306 } else { 307 /* invalid address family specified */ 308 goto out_error; 309 } 310 311 sa = (struct sockaddr *)((caddr_t)sa + sa->sa_len); 312 } 313 sa = addrs; 314 /* 315 * Now if there was a port mentioned, assure that the first address 316 * has that port to make sure it fails or succeeds correctly. 317 */ 318 if (sport) { 319 sin = (struct sockaddr_in *)sa; 320 sin->sin_port = sport; 321 } 322 for (i = 0; i < addrcnt; i++) { 323 if (sa->sa_family == AF_INET) { 324 if (sa->sa_len != sizeof(struct sockaddr_in)) 325 goto out_error; 326 } else if (sa->sa_family == AF_INET6) { 327 if (sa->sa_len != sizeof(struct sockaddr_in6)) 328 goto out_error; 329 } else { 330 /* invalid address family specified */ 331 out_error: 332 free(gaddrs); 333 errno = EINVAL; 334 return (-1); 335 } 336 memset(gaddrs, 0, argsz); 337 gaddrs->sget_assoc_id = 0; 338 memcpy(gaddrs->addr, sa, sa->sa_len); 339 if (setsockopt(sd, IPPROTO_SCTP, flags, gaddrs, 340 (socklen_t) argsz) != 0) { 341 free(gaddrs); 342 return (-1); 343 } 344 sa = (struct sockaddr *)((caddr_t)sa + sa->sa_len); 345 } 346 free(gaddrs); 347 return (0); 348 } 349 350 351 int 352 sctp_opt_info(int sd, sctp_assoc_t id, int opt, void *arg, socklen_t * size) 353 { 354 if (arg == NULL) { 355 errno = EINVAL; 356 return (-1); 357 } 358 switch (opt) { 359 case SCTP_RTOINFO: 360 ((struct sctp_rtoinfo *)arg)->srto_assoc_id = id; 361 break; 362 case SCTP_ASSOCINFO: 363 ((struct sctp_assocparams *)arg)->sasoc_assoc_id = id; 364 break; 365 case SCTP_DEFAULT_SEND_PARAM: 366 ((struct sctp_assocparams *)arg)->sasoc_assoc_id = id; 367 break; 368 case SCTP_PRIMARY_ADDR: 369 ((struct sctp_setprim *)arg)->ssp_assoc_id = id; 370 break; 371 case SCTP_PEER_ADDR_PARAMS: 372 ((struct sctp_paddrparams *)arg)->spp_assoc_id = id; 373 break; 374 case SCTP_MAXSEG: 375 ((struct sctp_assoc_value *)arg)->assoc_id = id; 376 break; 377 case SCTP_AUTH_KEY: 378 ((struct sctp_authkey *)arg)->sca_assoc_id = id; 379 break; 380 case SCTP_AUTH_ACTIVE_KEY: 381 ((struct sctp_authkeyid *)arg)->scact_assoc_id = id; 382 break; 383 case SCTP_DELAYED_SACK: 384 ((struct sctp_sack_info *)arg)->sack_assoc_id = id; 385 break; 386 case SCTP_CONTEXT: 387 ((struct sctp_assoc_value *)arg)->assoc_id = id; 388 break; 389 case SCTP_STATUS: 390 ((struct sctp_status *)arg)->sstat_assoc_id = id; 391 break; 392 case SCTP_GET_PEER_ADDR_INFO: 393 ((struct sctp_paddrinfo *)arg)->spinfo_assoc_id = id; 394 break; 395 case SCTP_PEER_AUTH_CHUNKS: 396 ((struct sctp_authchunks *)arg)->gauth_assoc_id = id; 397 break; 398 case SCTP_LOCAL_AUTH_CHUNKS: 399 ((struct sctp_authchunks *)arg)->gauth_assoc_id = id; 400 break; 401 case SCTP_TIMEOUTS: 402 ((struct sctp_timeouts *)arg)->stimo_assoc_id = id; 403 break; 404 case SCTP_EVENT: 405 ((struct sctp_event *)arg)->se_assoc_id = id; 406 break; 407 case SCTP_DEFAULT_SNDINFO: 408 ((struct sctp_sndinfo *)arg)->snd_assoc_id = id; 409 break; 410 case SCTP_DEFAULT_PRINFO: 411 ((struct sctp_default_prinfo *)arg)->pr_assoc_id = id; 412 break; 413 case SCTP_PEER_ADDR_THLDS: 414 ((struct sctp_paddrthlds *)arg)->spt_assoc_id = id; 415 break; 416 case SCTP_REMOTE_UDP_ENCAPS_PORT: 417 ((struct sctp_udpencaps *)arg)->sue_assoc_id = id; 418 break; 419 case SCTP_MAX_BURST: 420 ((struct sctp_assoc_value *)arg)->assoc_id = id; 421 break; 422 default: 423 break; 424 } 425 return (getsockopt(sd, IPPROTO_SCTP, opt, arg, size)); 426 } 427 428 int 429 sctp_getpaddrs(int sd, sctp_assoc_t id, struct sockaddr **raddrs) 430 { 431 struct sctp_getaddresses *addrs; 432 struct sockaddr *sa; 433 sctp_assoc_t asoc; 434 caddr_t lim; 435 socklen_t opt_len; 436 int cnt; 437 438 if (raddrs == NULL) { 439 errno = EFAULT; 440 return (-1); 441 } 442 asoc = id; 443 opt_len = (socklen_t) sizeof(sctp_assoc_t); 444 if (getsockopt(sd, IPPROTO_SCTP, SCTP_GET_REMOTE_ADDR_SIZE, 445 &asoc, &opt_len) != 0) { 446 return (-1); 447 } 448 /* size required is returned in 'asoc' */ 449 opt_len = (socklen_t) ((size_t)asoc + sizeof(struct sctp_getaddresses)); 450 addrs = calloc(1, (size_t)opt_len); 451 if (addrs == NULL) { 452 errno = ENOMEM; 453 return (-1); 454 } 455 addrs->sget_assoc_id = id; 456 /* Now lets get the array of addresses */ 457 if (getsockopt(sd, IPPROTO_SCTP, SCTP_GET_PEER_ADDRESSES, 458 addrs, &opt_len) != 0) { 459 free(addrs); 460 return (-1); 461 } 462 *raddrs = (struct sockaddr *)&addrs->addr[0]; 463 cnt = 0; 464 sa = (struct sockaddr *)&addrs->addr[0]; 465 lim = (caddr_t)addrs + opt_len; 466 while (((caddr_t)sa < lim) && (sa->sa_len > 0)) { 467 sa = (struct sockaddr *)((caddr_t)sa + sa->sa_len); 468 cnt++; 469 } 470 return (cnt); 471 } 472 473 void 474 sctp_freepaddrs(struct sockaddr *addrs) 475 { 476 /* Take away the hidden association id */ 477 void *fr_addr; 478 479 fr_addr = (void *)((caddr_t)addrs - sizeof(sctp_assoc_t)); 480 /* Now free it */ 481 free(fr_addr); 482 } 483 484 int 485 sctp_getladdrs(int sd, sctp_assoc_t id, struct sockaddr **raddrs) 486 { 487 struct sctp_getaddresses *addrs; 488 caddr_t lim; 489 struct sockaddr *sa; 490 size_t size_of_addresses; 491 socklen_t opt_len; 492 int cnt; 493 494 if (raddrs == NULL) { 495 errno = EFAULT; 496 return (-1); 497 } 498 size_of_addresses = 0; 499 opt_len = (socklen_t) sizeof(int); 500 if (getsockopt(sd, IPPROTO_SCTP, SCTP_GET_LOCAL_ADDR_SIZE, 501 &size_of_addresses, &opt_len) != 0) { 502 errno = ENOMEM; 503 return (-1); 504 } 505 if (size_of_addresses == 0) { 506 errno = ENOTCONN; 507 return (-1); 508 } 509 opt_len = (socklen_t) (size_of_addresses + 510 sizeof(struct sockaddr_storage) + 511 sizeof(struct sctp_getaddresses)); 512 addrs = calloc(1, (size_t)opt_len); 513 if (addrs == NULL) { 514 errno = ENOMEM; 515 return (-1); 516 } 517 addrs->sget_assoc_id = id; 518 /* Now lets get the array of addresses */ 519 if (getsockopt(sd, IPPROTO_SCTP, SCTP_GET_LOCAL_ADDRESSES, addrs, 520 &opt_len) != 0) { 521 free(addrs); 522 errno = ENOMEM; 523 return (-1); 524 } 525 *raddrs = (struct sockaddr *)&addrs->addr[0]; 526 cnt = 0; 527 sa = (struct sockaddr *)&addrs->addr[0]; 528 lim = (caddr_t)addrs + opt_len; 529 while (((caddr_t)sa < lim) && (sa->sa_len > 0)) { 530 sa = (struct sockaddr *)((caddr_t)sa + sa->sa_len); 531 cnt++; 532 } 533 return (cnt); 534 } 535 536 void 537 sctp_freeladdrs(struct sockaddr *addrs) 538 { 539 /* Take away the hidden association id */ 540 void *fr_addr; 541 542 fr_addr = (void *)((caddr_t)addrs - sizeof(sctp_assoc_t)); 543 /* Now free it */ 544 free(fr_addr); 545 } 546 547 548 ssize_t 549 sctp_sendmsg(int s, 550 const void *data, 551 size_t len, 552 const struct sockaddr *to, 553 socklen_t tolen, 554 uint32_t ppid, 555 uint32_t flags, 556 uint16_t stream_no, 557 uint32_t timetolive, 558 uint32_t context) 559 { 560 #ifdef SYS_sctp_generic_sendmsg 561 struct sctp_sndrcvinfo sinfo; 562 563 memset(&sinfo, 0, sizeof(struct sctp_sndrcvinfo)); 564 sinfo.sinfo_ppid = ppid; 565 sinfo.sinfo_flags = flags; 566 sinfo.sinfo_stream = stream_no; 567 sinfo.sinfo_timetolive = timetolive; 568 sinfo.sinfo_context = context; 569 sinfo.sinfo_assoc_id = 0; 570 return (syscall(SYS_sctp_generic_sendmsg, s, 571 data, len, to, tolen, &sinfo, 0)); 572 #else 573 ssize_t sz; 574 struct msghdr msg; 575 struct sctp_sndrcvinfo *s_info; 576 struct iovec iov; 577 char controlVector[SCTP_CONTROL_VEC_SIZE_RCV]; 578 struct cmsghdr *cmsg; 579 struct sockaddr *who = NULL; 580 union { 581 struct sockaddr_in in; 582 struct sockaddr_in6 in6; 583 } addr; 584 585 if ((tolen > 0) && 586 ((to == NULL) || (tolen < sizeof(struct sockaddr)))) { 587 errno = EINVAL; 588 return -1; 589 } 590 if (to && (tolen > 0)) { 591 if (to->sa_family == AF_INET) { 592 if (tolen != sizeof(struct sockaddr_in)) { 593 errno = EINVAL; 594 return -1; 595 } 596 if ((to->sa_len > 0) && 597 (to->sa_len != sizeof(struct sockaddr_in))) { 598 errno = EINVAL; 599 return -1; 600 } 601 memcpy(&addr, to, sizeof(struct sockaddr_in)); 602 addr.in.sin_len = sizeof(struct sockaddr_in); 603 } else if (to->sa_family == AF_INET6) { 604 if (tolen != sizeof(struct sockaddr_in6)) { 605 errno = EINVAL; 606 return -1; 607 } 608 if ((to->sa_len > 0) && 609 (to->sa_len != sizeof(struct sockaddr_in6))) { 610 errno = EINVAL; 611 return -1; 612 } 613 memcpy(&addr, to, sizeof(struct sockaddr_in6)); 614 addr.in6.sin6_len = sizeof(struct sockaddr_in6); 615 } else { 616 errno = EAFNOSUPPORT; 617 return -1; 618 } 619 who = (struct sockaddr *)&addr; 620 } 621 iov.iov_base = (char *)data; 622 iov.iov_len = len; 623 624 if (who) { 625 msg.msg_name = (caddr_t)who; 626 msg.msg_namelen = who->sa_len; 627 } else { 628 msg.msg_name = (caddr_t)NULL; 629 msg.msg_namelen = 0; 630 } 631 msg.msg_iov = &iov; 632 msg.msg_iovlen = 1; 633 msg.msg_control = (caddr_t)controlVector; 634 635 cmsg = (struct cmsghdr *)controlVector; 636 637 cmsg->cmsg_level = IPPROTO_SCTP; 638 cmsg->cmsg_type = SCTP_SNDRCV; 639 cmsg->cmsg_len = CMSG_LEN(sizeof(struct sctp_sndrcvinfo)); 640 s_info = (struct sctp_sndrcvinfo *)CMSG_DATA(cmsg); 641 642 s_info->sinfo_stream = stream_no; 643 s_info->sinfo_ssn = 0; 644 s_info->sinfo_flags = flags; 645 s_info->sinfo_ppid = ppid; 646 s_info->sinfo_context = context; 647 s_info->sinfo_assoc_id = 0; 648 s_info->sinfo_timetolive = timetolive; 649 errno = 0; 650 msg.msg_controllen = cmsg->cmsg_len; 651 sz = sendmsg(s, &msg, 0); 652 return (sz); 653 #endif 654 } 655 656 657 sctp_assoc_t 658 sctp_getassocid(int sd, struct sockaddr *sa) 659 { 660 struct sctp_paddrinfo sp; 661 socklen_t siz; 662 663 /* First get the assoc id */ 664 siz = sizeof(sp); 665 memset(&sp, 0, sizeof(sp)); 666 memcpy((caddr_t)&sp.spinfo_address, sa, sa->sa_len); 667 errno = 0; 668 if (getsockopt(sd, IPPROTO_SCTP, 669 SCTP_GET_PEER_ADDR_INFO, &sp, &siz) != 0) { 670 return ((sctp_assoc_t) 0); 671 } 672 /* We depend on the fact that 0 can never be returned */ 673 return (sp.spinfo_assoc_id); 674 } 675 676 ssize_t 677 sctp_send(int sd, const void *data, size_t len, 678 const struct sctp_sndrcvinfo *sinfo, 679 int flags) 680 { 681 682 #ifdef SYS_sctp_generic_sendmsg 683 struct sockaddr *to = NULL; 684 685 return (syscall(SYS_sctp_generic_sendmsg, sd, 686 data, len, to, 0, sinfo, flags)); 687 #else 688 ssize_t sz; 689 struct msghdr msg; 690 struct iovec iov; 691 struct sctp_sndrcvinfo *s_info; 692 char controlVector[SCTP_CONTROL_VEC_SIZE_SND]; 693 struct cmsghdr *cmsg; 694 695 if (sinfo == NULL) { 696 errno = EINVAL; 697 return (-1); 698 } 699 iov.iov_base = (char *)data; 700 iov.iov_len = len; 701 702 msg.msg_name = 0; 703 msg.msg_namelen = 0; 704 msg.msg_iov = &iov; 705 msg.msg_iovlen = 1; 706 msg.msg_control = (caddr_t)controlVector; 707 708 cmsg = (struct cmsghdr *)controlVector; 709 710 cmsg->cmsg_level = IPPROTO_SCTP; 711 cmsg->cmsg_type = SCTP_SNDRCV; 712 cmsg->cmsg_len = CMSG_LEN(sizeof(struct sctp_sndrcvinfo)); 713 s_info = (struct sctp_sndrcvinfo *)CMSG_DATA(cmsg); 714 /* copy in the data */ 715 *s_info = *sinfo; 716 errno = 0; 717 msg.msg_controllen = cmsg->cmsg_len; 718 sz = sendmsg(sd, &msg, flags); 719 return (sz); 720 #endif 721 } 722 723 724 725 ssize_t 726 sctp_sendx(int sd, const void *msg, size_t msg_len, 727 struct sockaddr *addrs, int addrcnt, 728 struct sctp_sndrcvinfo *sinfo, 729 int flags) 730 { 731 struct sctp_sndrcvinfo __sinfo; 732 ssize_t ret; 733 int i, cnt, *aa, saved_errno; 734 char *buf; 735 int no_end_cx = 0; 736 size_t len, add_len; 737 struct sockaddr *at; 738 739 if (addrs == NULL) { 740 errno = EINVAL; 741 return (-1); 742 } 743 #ifdef SYS_sctp_generic_sendmsg 744 if (addrcnt == 1) { 745 socklen_t l; 746 747 /* 748 * Quick way, we don't need to do a connectx so lets use the 749 * syscall directly. 750 */ 751 l = addrs->sa_len; 752 return (syscall(SYS_sctp_generic_sendmsg, sd, 753 msg, msg_len, addrs, l, sinfo, flags)); 754 } 755 #endif 756 757 len = sizeof(int); 758 at = addrs; 759 cnt = 0; 760 /* validate all the addresses and get the size */ 761 for (i = 0; i < addrcnt; i++) { 762 if (at->sa_family == AF_INET) { 763 add_len = sizeof(struct sockaddr_in); 764 } else if (at->sa_family == AF_INET6) { 765 add_len = sizeof(struct sockaddr_in6); 766 } else { 767 errno = EINVAL; 768 return (-1); 769 } 770 len += add_len; 771 at = (struct sockaddr *)((caddr_t)at + add_len); 772 cnt++; 773 } 774 /* do we have any? */ 775 if (cnt == 0) { 776 errno = EINVAL; 777 return (-1); 778 } 779 buf = malloc(len); 780 if (buf == NULL) { 781 errno = ENOMEM; 782 return (-1); 783 } 784 aa = (int *)buf; 785 *aa = cnt; 786 aa++; 787 memcpy((caddr_t)aa, addrs, (size_t)(len - sizeof(int))); 788 ret = setsockopt(sd, IPPROTO_SCTP, SCTP_CONNECT_X_DELAYED, (void *)buf, 789 (socklen_t) len); 790 791 free(buf); 792 if (ret != 0) { 793 if (errno == EALREADY) { 794 no_end_cx = 1; 795 goto continue_send; 796 } 797 return (ret); 798 } 799 continue_send: 800 if (sinfo == NULL) { 801 sinfo = &__sinfo; 802 memset(&__sinfo, 0, sizeof(__sinfo)); 803 } 804 sinfo->sinfo_assoc_id = sctp_getassocid(sd, addrs); 805 if (sinfo->sinfo_assoc_id == 0) { 806 (void)setsockopt(sd, IPPROTO_SCTP, SCTP_CONNECT_X_COMPLETE, (void *)addrs, 807 (socklen_t) addrs->sa_len); 808 errno = ENOENT; 809 return (-1); 810 } 811 ret = sctp_send(sd, msg, msg_len, sinfo, flags); 812 saved_errno = errno; 813 if (no_end_cx == 0) 814 (void)setsockopt(sd, IPPROTO_SCTP, SCTP_CONNECT_X_COMPLETE, (void *)addrs, 815 (socklen_t) addrs->sa_len); 816 817 errno = saved_errno; 818 return (ret); 819 } 820 821 ssize_t 822 sctp_sendmsgx(int sd, 823 const void *msg, 824 size_t len, 825 struct sockaddr *addrs, 826 int addrcnt, 827 uint32_t ppid, 828 uint32_t flags, 829 uint16_t stream_no, 830 uint32_t timetolive, 831 uint32_t context) 832 { 833 struct sctp_sndrcvinfo sinfo; 834 835 memset((void *)&sinfo, 0, sizeof(struct sctp_sndrcvinfo)); 836 sinfo.sinfo_ppid = ppid; 837 sinfo.sinfo_flags = flags; 838 sinfo.sinfo_ssn = stream_no; 839 sinfo.sinfo_timetolive = timetolive; 840 sinfo.sinfo_context = context; 841 return sctp_sendx(sd, msg, len, addrs, addrcnt, &sinfo, 0); 842 } 843 844 ssize_t 845 sctp_recvmsg(int s, 846 void *dbuf, 847 size_t len, 848 struct sockaddr *from, 849 socklen_t * fromlen, 850 struct sctp_sndrcvinfo *sinfo, 851 int *msg_flags) 852 { 853 #ifdef SYS_sctp_generic_recvmsg 854 struct iovec iov; 855 856 iov.iov_base = dbuf; 857 iov.iov_len = len; 858 return (syscall(SYS_sctp_generic_recvmsg, s, 859 &iov, 1, from, fromlen, sinfo, msg_flags)); 860 #else 861 struct sctp_sndrcvinfo *s_info; 862 ssize_t sz; 863 struct msghdr msg; 864 struct iovec iov; 865 char controlVector[SCTP_CONTROL_VEC_SIZE_RCV]; 866 struct cmsghdr *cmsg; 867 868 if (msg_flags == NULL) { 869 errno = EINVAL; 870 return (-1); 871 } 872 msg.msg_flags = 0; 873 iov.iov_base = dbuf; 874 iov.iov_len = len; 875 msg.msg_name = (caddr_t)from; 876 if (fromlen == NULL) 877 msg.msg_namelen = 0; 878 else 879 msg.msg_namelen = *fromlen; 880 msg.msg_iov = &iov; 881 msg.msg_iovlen = 1; 882 msg.msg_control = (caddr_t)controlVector; 883 msg.msg_controllen = sizeof(controlVector); 884 errno = 0; 885 sz = recvmsg(s, &msg, *msg_flags); 886 *msg_flags = msg.msg_flags; 887 if (sz <= 0) { 888 return (sz); 889 } 890 s_info = NULL; 891 if (sinfo) { 892 sinfo->sinfo_assoc_id = 0; 893 } 894 if ((msg.msg_controllen) && sinfo) { 895 /* 896 * parse through and see if we find the sctp_sndrcvinfo (if 897 * the user wants it). 898 */ 899 cmsg = (struct cmsghdr *)controlVector; 900 while (cmsg) { 901 if ((cmsg->cmsg_len == 0) || (cmsg->cmsg_len > msg.msg_controllen)) { 902 break; 903 } 904 if (cmsg->cmsg_level == IPPROTO_SCTP) { 905 if (cmsg->cmsg_type == SCTP_SNDRCV) { 906 /* Got it */ 907 s_info = (struct sctp_sndrcvinfo *)CMSG_DATA(cmsg); 908 /* Copy it to the user */ 909 if (sinfo) 910 *sinfo = *s_info; 911 break; 912 } else if (cmsg->cmsg_type == SCTP_EXTRCV) { 913 /* 914 * Got it, presumably the user has 915 * asked for this extra info, so the 916 * structure holds more room :-D 917 */ 918 s_info = (struct sctp_sndrcvinfo *)CMSG_DATA(cmsg); 919 /* Copy it to the user */ 920 if (sinfo) { 921 memcpy(sinfo, s_info, sizeof(struct sctp_extrcvinfo)); 922 } 923 break; 924 925 } 926 } 927 cmsg = CMSG_NXTHDR(&msg, cmsg); 928 } 929 } 930 return (sz); 931 #endif 932 } 933 934 ssize_t 935 sctp_recvv(int sd, 936 const struct iovec *iov, 937 int iovlen, 938 struct sockaddr *from, 939 socklen_t * fromlen, 940 void *info, 941 socklen_t * infolen, 942 unsigned int *infotype, 943 int *flags) 944 { 945 char ctlbuf[SCTP_CONTROL_VEC_SIZE_RCV]; 946 struct msghdr msg; 947 struct cmsghdr *cmsg; 948 ssize_t n; 949 struct sctp_rcvinfo *rcvinfo; 950 struct sctp_nxtinfo *nxtinfo; 951 952 if (((info != NULL) && (infolen == NULL)) | 953 ((info == NULL) && (infolen != NULL) && (*infolen != 0)) || 954 ((info != NULL) && (infotype == NULL))) { 955 errno = EINVAL; 956 return (-1); 957 } 958 if (infotype) { 959 *infotype = SCTP_RECVV_NOINFO; 960 } 961 msg.msg_name = from; 962 if (fromlen == NULL) { 963 msg.msg_namelen = 0; 964 } else { 965 msg.msg_namelen = *fromlen; 966 } 967 msg.msg_iov = (struct iovec *)iov; 968 msg.msg_iovlen = iovlen; 969 msg.msg_control = ctlbuf; 970 msg.msg_controllen = sizeof(ctlbuf); 971 errno = 0; 972 n = recvmsg(sd, &msg, *flags); 973 *flags = msg.msg_flags; 974 if ((n > 0) && 975 (msg.msg_controllen > 0) && 976 (infotype != NULL) && 977 (infolen != NULL) && 978 (*infolen > 0)) { 979 rcvinfo = NULL; 980 nxtinfo = NULL; 981 for (cmsg = CMSG_FIRSTHDR(&msg); cmsg; cmsg = CMSG_NXTHDR(&msg, cmsg)) { 982 if (cmsg->cmsg_level != IPPROTO_SCTP) { 983 continue; 984 } 985 if (cmsg->cmsg_type == SCTP_RCVINFO) { 986 rcvinfo = (struct sctp_rcvinfo *)CMSG_DATA(cmsg); 987 } 988 if (cmsg->cmsg_type == SCTP_NXTINFO) { 989 nxtinfo = (struct sctp_nxtinfo *)CMSG_DATA(cmsg); 990 } 991 if (rcvinfo && nxtinfo) { 992 break; 993 } 994 } 995 if (rcvinfo) { 996 if (nxtinfo) { 997 if (*infolen >= sizeof(struct sctp_recvv_rn)) { 998 struct sctp_recvv_rn *rn_info; 999 1000 rn_info = (struct sctp_recvv_rn *)info; 1001 rn_info->recvv_rcvinfo = *rcvinfo; 1002 rn_info->recvv_nxtinfo = *nxtinfo; 1003 *infolen = (socklen_t) sizeof(struct sctp_recvv_rn); 1004 *infotype = SCTP_RECVV_RN; 1005 } 1006 } else { 1007 if (*infolen >= sizeof(struct sctp_rcvinfo)) { 1008 memcpy(info, rcvinfo, sizeof(struct sctp_rcvinfo)); 1009 *infolen = (socklen_t) sizeof(struct sctp_rcvinfo); 1010 *infotype = SCTP_RECVV_RCVINFO; 1011 } 1012 } 1013 } else if (nxtinfo) { 1014 if (*infolen >= sizeof(struct sctp_rcvinfo)) { 1015 memcpy(info, nxtinfo, sizeof(struct sctp_nxtinfo)); 1016 *infolen = (socklen_t) sizeof(struct sctp_nxtinfo); 1017 *infotype = SCTP_RECVV_NXTINFO; 1018 } 1019 } 1020 } 1021 return (n); 1022 } 1023 1024 ssize_t 1025 sctp_sendv(int sd, 1026 const struct iovec *iov, int iovcnt, 1027 struct sockaddr *addrs, int addrcnt, 1028 void *info, socklen_t infolen, unsigned int infotype, 1029 int flags) 1030 { 1031 ssize_t ret; 1032 int i; 1033 socklen_t addr_len; 1034 struct msghdr msg; 1035 in_port_t port; 1036 struct sctp_sendv_spa *spa_info; 1037 struct cmsghdr *cmsg; 1038 char *cmsgbuf; 1039 struct sockaddr *addr; 1040 struct sockaddr_in *addr_in; 1041 struct sockaddr_in6 *addr_in6; 1042 1043 if ((addrcnt < 0) || 1044 (iovcnt < 0) || 1045 ((addrs == NULL) && (addrcnt > 0)) || 1046 ((addrs != NULL) && (addrcnt == 0)) || 1047 ((iov == NULL) && (iovcnt > 0)) || 1048 ((iov != NULL) && (iovcnt == 0))) { 1049 errno = EINVAL; 1050 return (-1); 1051 } 1052 cmsgbuf = malloc(CMSG_SPACE(sizeof(struct sctp_sndinfo)) + 1053 CMSG_SPACE(sizeof(struct sctp_prinfo)) + 1054 CMSG_SPACE(sizeof(struct sctp_authinfo)) + 1055 (size_t)addrcnt * CMSG_SPACE(sizeof(struct in6_addr))); 1056 if (cmsgbuf == NULL) { 1057 errno = ENOMEM; 1058 return (-1); 1059 } 1060 msg.msg_control = cmsgbuf; 1061 msg.msg_controllen = 0; 1062 cmsg = (struct cmsghdr *)cmsgbuf; 1063 switch (infotype) { 1064 case SCTP_SENDV_NOINFO: 1065 if ((infolen != 0) || (info != NULL)) { 1066 free(cmsgbuf); 1067 errno = EINVAL; 1068 return (-1); 1069 } 1070 break; 1071 case SCTP_SENDV_SNDINFO: 1072 if ((info == NULL) || (infolen < sizeof(struct sctp_sndinfo))) { 1073 free(cmsgbuf); 1074 errno = EINVAL; 1075 return (-1); 1076 } 1077 cmsg->cmsg_level = IPPROTO_SCTP; 1078 cmsg->cmsg_type = SCTP_SNDINFO; 1079 cmsg->cmsg_len = CMSG_LEN(sizeof(struct sctp_sndinfo)); 1080 memcpy(CMSG_DATA(cmsg), info, sizeof(struct sctp_sndinfo)); 1081 msg.msg_controllen += CMSG_SPACE(sizeof(struct sctp_sndinfo)); 1082 cmsg = (struct cmsghdr *)((caddr_t)cmsg + CMSG_SPACE(sizeof(struct sctp_sndinfo))); 1083 break; 1084 case SCTP_SENDV_PRINFO: 1085 if ((info == NULL) || (infolen < sizeof(struct sctp_prinfo))) { 1086 free(cmsgbuf); 1087 errno = EINVAL; 1088 return (-1); 1089 } 1090 cmsg->cmsg_level = IPPROTO_SCTP; 1091 cmsg->cmsg_type = SCTP_PRINFO; 1092 cmsg->cmsg_len = CMSG_LEN(sizeof(struct sctp_prinfo)); 1093 memcpy(CMSG_DATA(cmsg), info, sizeof(struct sctp_prinfo)); 1094 msg.msg_controllen += CMSG_SPACE(sizeof(struct sctp_prinfo)); 1095 cmsg = (struct cmsghdr *)((caddr_t)cmsg + CMSG_SPACE(sizeof(struct sctp_prinfo))); 1096 break; 1097 case SCTP_SENDV_AUTHINFO: 1098 if ((info == NULL) || (infolen < sizeof(struct sctp_authinfo))) { 1099 free(cmsgbuf); 1100 errno = EINVAL; 1101 return (-1); 1102 } 1103 cmsg->cmsg_level = IPPROTO_SCTP; 1104 cmsg->cmsg_type = SCTP_AUTHINFO; 1105 cmsg->cmsg_len = CMSG_LEN(sizeof(struct sctp_authinfo)); 1106 memcpy(CMSG_DATA(cmsg), info, sizeof(struct sctp_authinfo)); 1107 msg.msg_controllen += CMSG_SPACE(sizeof(struct sctp_authinfo)); 1108 cmsg = (struct cmsghdr *)((caddr_t)cmsg + CMSG_SPACE(sizeof(struct sctp_authinfo))); 1109 break; 1110 case SCTP_SENDV_SPA: 1111 if ((info == NULL) || (infolen < sizeof(struct sctp_sendv_spa))) { 1112 free(cmsgbuf); 1113 errno = EINVAL; 1114 return (-1); 1115 } 1116 spa_info = (struct sctp_sendv_spa *)info; 1117 if (spa_info->sendv_flags & SCTP_SEND_SNDINFO_VALID) { 1118 cmsg->cmsg_level = IPPROTO_SCTP; 1119 cmsg->cmsg_type = SCTP_SNDINFO; 1120 cmsg->cmsg_len = CMSG_LEN(sizeof(struct sctp_sndinfo)); 1121 memcpy(CMSG_DATA(cmsg), &spa_info->sendv_sndinfo, sizeof(struct sctp_sndinfo)); 1122 msg.msg_controllen += CMSG_SPACE(sizeof(struct sctp_sndinfo)); 1123 cmsg = (struct cmsghdr *)((caddr_t)cmsg + CMSG_SPACE(sizeof(struct sctp_sndinfo))); 1124 } 1125 if (spa_info->sendv_flags & SCTP_SEND_PRINFO_VALID) { 1126 cmsg->cmsg_level = IPPROTO_SCTP; 1127 cmsg->cmsg_type = SCTP_PRINFO; 1128 cmsg->cmsg_len = CMSG_LEN(sizeof(struct sctp_prinfo)); 1129 memcpy(CMSG_DATA(cmsg), &spa_info->sendv_prinfo, sizeof(struct sctp_prinfo)); 1130 msg.msg_controllen += CMSG_SPACE(sizeof(struct sctp_prinfo)); 1131 cmsg = (struct cmsghdr *)((caddr_t)cmsg + CMSG_SPACE(sizeof(struct sctp_prinfo))); 1132 } 1133 if (spa_info->sendv_flags & SCTP_SEND_AUTHINFO_VALID) { 1134 cmsg->cmsg_level = IPPROTO_SCTP; 1135 cmsg->cmsg_type = SCTP_AUTHINFO; 1136 cmsg->cmsg_len = CMSG_LEN(sizeof(struct sctp_authinfo)); 1137 memcpy(CMSG_DATA(cmsg), &spa_info->sendv_authinfo, sizeof(struct sctp_authinfo)); 1138 msg.msg_controllen += CMSG_SPACE(sizeof(struct sctp_authinfo)); 1139 cmsg = (struct cmsghdr *)((caddr_t)cmsg + CMSG_SPACE(sizeof(struct sctp_authinfo))); 1140 } 1141 break; 1142 default: 1143 free(cmsgbuf); 1144 errno = EINVAL; 1145 return (-1); 1146 } 1147 addr = addrs; 1148 msg.msg_name = NULL; 1149 msg.msg_namelen = 0; 1150 1151 for (i = 0; i < addrcnt; i++) { 1152 switch (addr->sa_family) { 1153 case AF_INET: 1154 addr_len = (socklen_t) sizeof(struct sockaddr_in); 1155 addr_in = (struct sockaddr_in *)addr; 1156 if (addr_in->sin_len != addr_len) { 1157 free(cmsgbuf); 1158 errno = EINVAL; 1159 return (-1); 1160 } 1161 if (i == 0) { 1162 port = addr_in->sin_port; 1163 } else { 1164 if (port == addr_in->sin_port) { 1165 cmsg->cmsg_level = IPPROTO_SCTP; 1166 cmsg->cmsg_type = SCTP_DSTADDRV4; 1167 cmsg->cmsg_len = CMSG_LEN(sizeof(struct in_addr)); 1168 memcpy(CMSG_DATA(cmsg), &addr_in->sin_addr, sizeof(struct in_addr)); 1169 msg.msg_controllen += CMSG_SPACE(sizeof(struct in_addr)); 1170 cmsg = (struct cmsghdr *)((caddr_t)cmsg + CMSG_SPACE(sizeof(struct in_addr))); 1171 } else { 1172 free(cmsgbuf); 1173 errno = EINVAL; 1174 return (-1); 1175 } 1176 } 1177 break; 1178 case AF_INET6: 1179 addr_len = (socklen_t) sizeof(struct sockaddr_in6); 1180 addr_in6 = (struct sockaddr_in6 *)addr; 1181 if (addr_in6->sin6_len != addr_len) { 1182 free(cmsgbuf); 1183 errno = EINVAL; 1184 return (-1); 1185 } 1186 if (i == 0) { 1187 port = addr_in6->sin6_port; 1188 } else { 1189 if (port == addr_in6->sin6_port) { 1190 cmsg->cmsg_level = IPPROTO_SCTP; 1191 cmsg->cmsg_type = SCTP_DSTADDRV6; 1192 cmsg->cmsg_len = CMSG_LEN(sizeof(struct in6_addr)); 1193 memcpy(CMSG_DATA(cmsg), &addr_in6->sin6_addr, sizeof(struct in6_addr)); 1194 msg.msg_controllen += CMSG_SPACE(sizeof(struct in6_addr)); 1195 cmsg = (struct cmsghdr *)((caddr_t)cmsg + CMSG_SPACE(sizeof(struct in6_addr))); 1196 } else { 1197 free(cmsgbuf); 1198 errno = EINVAL; 1199 return (-1); 1200 } 1201 } 1202 break; 1203 default: 1204 free(cmsgbuf); 1205 errno = EINVAL; 1206 return (-1); 1207 } 1208 if (i == 0) { 1209 msg.msg_name = addr; 1210 msg.msg_namelen = addr_len; 1211 } 1212 addr = (struct sockaddr *)((caddr_t)addr + addr_len); 1213 } 1214 if (msg.msg_controllen == 0) { 1215 msg.msg_control = NULL; 1216 } 1217 msg.msg_iov = (struct iovec *)iov; 1218 msg.msg_iovlen = iovcnt; 1219 msg.msg_flags = 0; 1220 ret = sendmsg(sd, &msg, flags); 1221 free(cmsgbuf); 1222 return (ret); 1223 } 1224 1225 1226 #if !defined(SYS_sctp_peeloff) && !defined(HAVE_SCTP_PEELOFF_SOCKOPT) 1227 1228 int 1229 sctp_peeloff(int sd, sctp_assoc_t assoc_id) 1230 { 1231 /* NOT supported, return invalid sd */ 1232 errno = ENOTSUP; 1233 return (-1); 1234 } 1235 1236 #endif 1237 #if defined(SYS_sctp_peeloff) && !defined(HAVE_SCTP_PEELOFF_SOCKOPT) 1238 int 1239 sctp_peeloff(int sd, sctp_assoc_t assoc_id) 1240 { 1241 return (syscall(SYS_sctp_peeloff, sd, assoc_id)); 1242 } 1243 1244 #endif 1245 1246 1247 #undef SCTP_CONTROL_VEC_SIZE_SND 1248 #undef SCTP_CONTROL_VEC_SIZE_RCV 1249 #undef SCTP_STACK_BUF_SIZE 1250