xref: /freebsd/lib/libc/net/sctp_sys_calls.c (revision 94942af266ac119ede0ca836f9aa5a5ac0582938)
1 /*	$KAME: sctp_sys_calls.c,v 1.9 2004/08/17 06:08:53 itojun Exp $ */
2 
3 /*
4  * Copyright (C) 2002-2006 Cisco Systems Inc,
5  * All rights reserved.
6  *
7  * Redistribution and use in source and binary forms, with or without
8  * modification, are permitted provided that the following conditions
9  * are met:
10  * 1. Redistributions of source code must retain the above copyright
11  *    notice, this list of conditions and the following disclaimer.
12  * 2. Redistributions in binary form must reproduce the above copyright
13  *    notice, this list of conditions and the following disclaimer in the
14  *    documentation and/or other materials provided with the distribution.
15  * 3. Neither the name of the project nor the names of its contributors
16  *    may be used to endorse or promote products derived from this software
17  *    without specific prior written permission.
18  *
19  * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND
20  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
21  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
22  * ARE DISCLAIMED.  IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE
23  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
24  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
25  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
26  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
27  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
28  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
29  * SUCH DAMAGE.
30  */
31 #include <sys/cdefs.h>
32 __FBSDID("$FreeBSD$");
33 #include <stdio.h>
34 #include <string.h>
35 #include <errno.h>
36 #include <stdlib.h>
37 #include <unistd.h>
38 #include <sys/types.h>
39 #include <sys/socket.h>
40 #include <sys/errno.h>
41 #include <sys/syscall.h>
42 #include <sys/uio.h>
43 #include <netinet/in.h>
44 #include <arpa/inet.h>
45 #include <netinet/sctp_uio.h>
46 #include <netinet/sctp.h>
47 
48 #include <net/if_dl.h>
49 
50 #ifndef IN6_IS_ADDR_V4MAPPED
51 #define IN6_IS_ADDR_V4MAPPED(a)		      \
52 	((*(const u_int32_t *)(const void *)(&(a)->s6_addr[0]) == 0) &&	\
53 	 (*(const u_int32_t *)(const void *)(&(a)->s6_addr[4]) == 0) &&	\
54 	 (*(const u_int32_t *)(const void *)(&(a)->s6_addr[8]) == ntohl(0x0000ffff)))
55 #endif
56 
57 
58 #define SCTP_CONTROL_VEC_SIZE_SND   8192
59 #define SCTP_CONTROL_VEC_SIZE_RCV  16384
60 #define SCTP_STACK_BUF_SIZE         2048
61 #define SCTP_SMALL_IOVEC_SIZE          2
62 
63 #ifdef SCTP_DEBUG_PRINT_ADDRESS
64 
65 #define SCTP_STRING_BUF_SZ 256
66 
67 static void
68 SCTPPrintAnAddress(struct sockaddr *a)
69 {
70 	char stringToPrint[SCTP_STRING_BUF_SZ];
71 	u_short prt;
72 	char *srcaddr, *txt;
73 
74 	if (a == NULL) {
75 		printf("NULL\n");
76 		return;
77 	}
78 	if (a->sa_family == AF_INET) {
79 		srcaddr = (char *)&((struct sockaddr_in *)a)->sin_addr;
80 		txt = "IPv4 Address: ";
81 		prt = ntohs(((struct sockaddr_in *)a)->sin_port);
82 	} else if (a->sa_family == AF_INET6) {
83 		srcaddr = (char *)&((struct sockaddr_in6 *)a)->sin6_addr;
84 		prt = ntohs(((struct sockaddr_in6 *)a)->sin6_port);
85 		txt = "IPv6 Address: ";
86 	} else if (a->sa_family == AF_LINK) {
87 		int i;
88 		char tbuf[SCTP_STRING_BUF_SZ];
89 		u_char adbuf[SCTP_STRING_BUF_SZ];
90 		struct sockaddr_dl *dl;
91 
92 		dl = (struct sockaddr_dl *)a;
93 		strncpy(tbuf, dl->sdl_data, dl->sdl_nlen);
94 		tbuf[dl->sdl_nlen] = 0;
95 		printf("Intf:%s (len:%d)Interface index:%d type:%x(%d) ll-len:%d ",
96 		    tbuf,
97 		    dl->sdl_nlen,
98 		    dl->sdl_index,
99 		    dl->sdl_type,
100 		    dl->sdl_type,
101 		    dl->sdl_alen
102 		    );
103 		memcpy(adbuf, LLADDR(dl), dl->sdl_alen);
104 		for (i = 0; i < dl->sdl_alen; i++) {
105 			printf("%2.2x", adbuf[i]);
106 			if (i < (dl->sdl_alen - 1))
107 				printf(":");
108 		}
109 		printf("\n");
110 		return;
111 	} else {
112 		return;
113 	}
114 	if (inet_ntop(a->sa_family, srcaddr, stringToPrint, sizeof(stringToPrint))) {
115 		if (a->sa_family == AF_INET6) {
116 			printf("%s%s:%d scope:%d\n",
117 			    txt, stringToPrint, prt,
118 			    ((struct sockaddr_in6 *)a)->sin6_scope_id);
119 		} else {
120 			printf("%s%s:%d\n", txt, stringToPrint, prt);
121 		}
122 
123 	} else {
124 		printf("%s unprintable?\n", txt);
125 	}
126 }
127 
128 #endif				/* SCTP_DEBUG_PRINT_ADDRESS */
129 
130 static void
131 in6_sin6_2_sin(struct sockaddr_in *sin, struct sockaddr_in6 *sin6)
132 {
133 	bzero(sin, sizeof(*sin));
134 	sin->sin_len = sizeof(struct sockaddr_in);
135 	sin->sin_family = AF_INET;
136 	sin->sin_port = sin6->sin6_port;
137 	sin->sin_addr.s_addr = sin6->sin6_addr.__u6_addr.__u6_addr32[3];
138 }
139 
140 int
141 sctp_getaddrlen(sa_family_t family)
142 {
143 	int error, sd;
144 	socklen_t siz;
145 	struct sctp_assoc_value av;
146 
147 	av.assoc_value = family;
148 	siz = sizeof(av);
149 #if defined(AF_INET)
150 	sd = socket(AF_INET, SOCK_SEQPACKET, IPPROTO_SCTP);
151 #elif defined(AF_INET6)
152 	sd = socket(AF_INET6, SOCK_SEQPACKET, IPPROTO_SCTP);
153 #endif
154 	if (sd == -1) {
155 		return (errno);
156 	}
157 	error = getsockopt(sd, IPPROTO_SCTP, SCTP_GET_ADDR_LEN, &av, &siz);
158 	close(sd);
159 	if (error == 0) {
160 		return ((int)av.assoc_value);
161 	} else {
162 		return (error);
163 	}
164 }
165 
166 int
167 sctp_connectx(int sd, const struct sockaddr *addrs, int addrcnt, sctp_assoc_t * id)
168 {
169 	char buf[SCTP_STACK_BUF_SIZE];
170 	int i, ret, cnt, *aa;
171 	char *cpto;
172 	const struct sockaddr *at;
173 	size_t len = sizeof(int);
174 	sctp_assoc_t *p_id;
175 
176 	at = addrs;
177 	cnt = 0;
178 	cpto = ((caddr_t)buf + sizeof(int));
179 	/* validate all the addresses and get the size */
180 	for (i = 0; i < addrcnt; i++) {
181 		if (at->sa_family == AF_INET) {
182 			memcpy(cpto, at, at->sa_len);
183 			cpto = ((caddr_t)cpto + at->sa_len);
184 			len += at->sa_len;
185 		} else if (at->sa_family == AF_INET6) {
186 			if (IN6_IS_ADDR_V4MAPPED(&((struct sockaddr_in6 *)at)->sin6_addr)) {
187 				len += sizeof(struct sockaddr_in);
188 				in6_sin6_2_sin((struct sockaddr_in *)cpto, (struct sockaddr_in6 *)at);
189 				cpto = ((caddr_t)cpto + sizeof(struct sockaddr_in));
190 				len += sizeof(struct sockaddr_in);
191 			} else {
192 				memcpy(cpto, at, at->sa_len);
193 				cpto = ((caddr_t)cpto + at->sa_len);
194 				len += at->sa_len;
195 			}
196 		} else {
197 			errno = EINVAL;
198 			return (-1);
199 		}
200 		if (len > (sizeof(buf) - sizeof(int))) {
201 			/* Never enough memory */
202 			return (E2BIG);
203 		}
204 		at = (struct sockaddr *)((caddr_t)at + at->sa_len);
205 		cnt++;
206 	}
207 	/* do we have any? */
208 	if (cnt == 0) {
209 		errno = EINVAL;
210 		return (-1);
211 	}
212 	aa = (int *)buf;
213 	*aa = cnt;
214 	ret = setsockopt(sd, IPPROTO_SCTP, SCTP_CONNECT_X, (void *)buf,
215 	    (socklen_t) len);
216 	if ((ret == 0) && id) {
217 		p_id = (sctp_assoc_t *) buf;
218 		*id = *p_id;
219 	}
220 	return (ret);
221 }
222 
223 int
224 sctp_bindx(int sd, struct sockaddr *addrs, int addrcnt, int flags)
225 {
226 	struct sctp_getaddresses *gaddrs;
227 	struct sockaddr *sa;
228 	int i, sz, fam, argsz;
229 
230 	if ((flags != SCTP_BINDX_ADD_ADDR) &&
231 	    (flags != SCTP_BINDX_REM_ADDR)) {
232 		errno = EFAULT;
233 		return (-1);
234 	}
235 	argsz = (sizeof(struct sockaddr_storage) +
236 	    sizeof(struct sctp_getaddresses));
237 	gaddrs = (struct sctp_getaddresses *)calloc(1, argsz);
238 	if (gaddrs == NULL) {
239 		errno = ENOMEM;
240 		return (-1);
241 	}
242 	gaddrs->sget_assoc_id = 0;
243 	sa = addrs;
244 	for (i = 0; i < addrcnt; i++) {
245 		sz = sa->sa_len;
246 		fam = sa->sa_family;
247 		((struct sockaddr_in *)&addrs[i])->sin_port = ((struct sockaddr_in *)sa)->sin_port;
248 		if ((fam != AF_INET) && (fam != AF_INET6)) {
249 			errno = EINVAL;
250 			return (-1);
251 		}
252 		memcpy(gaddrs->addr, sa, sz);
253 		if (setsockopt(sd, IPPROTO_SCTP, flags,
254 		    gaddrs, (socklen_t) argsz) != 0) {
255 			free(gaddrs);
256 			return (-1);
257 		}
258 		memset(gaddrs, 0, argsz);
259 		sa = (struct sockaddr *)((caddr_t)sa + sz);
260 	}
261 	free(gaddrs);
262 	return (0);
263 }
264 
265 
266 int
267 sctp_opt_info(int sd, sctp_assoc_t id, int opt, void *arg, socklen_t * size)
268 {
269 	if (arg == NULL) {
270 		return (EINVAL);
271 	}
272 	*(sctp_assoc_t *) arg = id;
273 	return (getsockopt(sd, IPPROTO_SCTP, opt, arg, size));
274 }
275 
276 int
277 sctp_getpaddrs(int sd, sctp_assoc_t id, struct sockaddr **raddrs)
278 {
279 	struct sctp_getaddresses *addrs;
280 	struct sockaddr *sa;
281 	struct sockaddr *re;
282 	sctp_assoc_t asoc;
283 	caddr_t lim;
284 	socklen_t siz;
285 	int cnt;
286 
287 	if (raddrs == NULL) {
288 		errno = EFAULT;
289 		return (-1);
290 	}
291 	asoc = id;
292 	siz = sizeof(sctp_assoc_t);
293 	if (getsockopt(sd, IPPROTO_SCTP, SCTP_GET_REMOTE_ADDR_SIZE,
294 	    &asoc, &siz) != 0) {
295 		errno = ENOMEM;
296 		return (-1);
297 	}
298 	/* size required is returned in 'asoc' */
299 	siz = (size_t)asoc;
300 	siz += sizeof(struct sctp_getaddresses);
301 	addrs = calloc(1, siz);
302 	if (addrs == NULL) {
303 		errno = ENOMEM;
304 		return (-1);
305 	}
306 	memset(addrs, 0, siz);
307 	addrs->sget_assoc_id = id;
308 	/* Now lets get the array of addresses */
309 	if (getsockopt(sd, IPPROTO_SCTP, SCTP_GET_PEER_ADDRESSES,
310 	    addrs, &siz) != 0) {
311 		free(addrs);
312 		errno = ENOMEM;
313 		return (-1);
314 	}
315 	re = (struct sockaddr *)&addrs->addr[0];
316 	*raddrs = re;
317 	cnt = 0;
318 	sa = (struct sockaddr *)&addrs->addr[0];
319 	lim = (caddr_t)addrs + siz;
320 	while (((caddr_t)sa < lim) && (sa->sa_len > 0)) {
321 		sa = (struct sockaddr *)((caddr_t)sa + sa->sa_len);
322 		cnt++;
323 	}
324 	return (cnt);
325 }
326 
327 void
328 sctp_freepaddrs(struct sockaddr *addrs)
329 {
330 	/* Take away the hidden association id */
331 	void *fr_addr;
332 
333 	fr_addr = (void *)((caddr_t)addrs - sizeof(sctp_assoc_t));
334 	/* Now free it */
335 	free(fr_addr);
336 }
337 
338 int
339 sctp_getladdrs(int sd, sctp_assoc_t id, struct sockaddr **raddrs)
340 {
341 	struct sctp_getaddresses *addrs;
342 	struct sockaddr *re;
343 	caddr_t lim;
344 	struct sockaddr *sa;
345 	int size_of_addresses;
346 	socklen_t siz;
347 	int cnt;
348 
349 	if (raddrs == NULL) {
350 		errno = EFAULT;
351 		return (-1);
352 	}
353 	size_of_addresses = 0;
354 	siz = sizeof(int);
355 	if (getsockopt(sd, IPPROTO_SCTP, SCTP_GET_LOCAL_ADDR_SIZE,
356 	    &size_of_addresses, &siz) != 0) {
357 		errno = ENOMEM;
358 		return (-1);
359 	}
360 	if (size_of_addresses == 0) {
361 		errno = ENOTCONN;
362 		return (-1);
363 	}
364 	siz = size_of_addresses + sizeof(struct sockaddr_storage);
365 	siz += sizeof(struct sctp_getaddresses);
366 	addrs = calloc(1, siz);
367 	if (addrs == NULL) {
368 		errno = ENOMEM;
369 		return (-1);
370 	}
371 	memset(addrs, 0, siz);
372 	addrs->sget_assoc_id = id;
373 	/* Now lets get the array of addresses */
374 	if (getsockopt(sd, IPPROTO_SCTP, SCTP_GET_LOCAL_ADDRESSES, addrs,
375 	    &siz) != 0) {
376 		free(addrs);
377 		errno = ENOMEM;
378 		return (-1);
379 	}
380 	re = (struct sockaddr *)&addrs->addr[0];
381 	*raddrs = re;
382 	cnt = 0;
383 	sa = (struct sockaddr *)&addrs->addr[0];
384 	lim = (caddr_t)addrs + siz;
385 	while (((caddr_t)sa < lim) && (sa->sa_len > 0)) {
386 		sa = (struct sockaddr *)((caddr_t)sa + sa->sa_len);
387 		cnt++;
388 	}
389 	return (cnt);
390 }
391 
392 void
393 sctp_freeladdrs(struct sockaddr *addrs)
394 {
395 	/* Take away the hidden association id */
396 	void *fr_addr;
397 
398 	fr_addr = (void *)((caddr_t)addrs - sizeof(sctp_assoc_t));
399 	/* Now free it */
400 	free(fr_addr);
401 }
402 
403 
404 ssize_t
405 sctp_sendmsg(int s,
406     const void *data,
407     size_t len,
408     const struct sockaddr *to,
409     socklen_t tolen,
410     u_int32_t ppid,
411     u_int32_t flags,
412     u_int16_t stream_no,
413     u_int32_t timetolive,
414     u_int32_t context)
415 {
416 #ifdef SYS_sctp_generic_sendmsg
417 	struct sctp_sndrcvinfo sinfo;
418 
419 	sinfo.sinfo_ppid = ppid;
420 	sinfo.sinfo_flags = flags;
421 	sinfo.sinfo_stream = stream_no;
422 	sinfo.sinfo_timetolive = timetolive;
423 	sinfo.sinfo_context = context;
424 	sinfo.sinfo_assoc_id = 0;
425 	return (syscall(SYS_sctp_generic_sendmsg, s,
426 	    data, len, to, tolen, &sinfo, 0));
427 #else
428 
429 	ssize_t sz;
430 	struct msghdr msg;
431 	struct sctp_sndrcvinfo *s_info;
432 	struct iovec iov[SCTP_SMALL_IOVEC_SIZE];
433 	char controlVector[SCTP_CONTROL_VEC_SIZE_RCV];
434 	struct cmsghdr *cmsg;
435 	struct sockaddr *who = NULL;
436 	union {
437 		struct sockaddr_in in;
438 		struct sockaddr_in6 in6;
439 	}     addr;
440 
441 /*
442   fprintf(io, "sctp_sendmsg(sd:%d, data:%x, len:%d, to:%x, tolen:%d, ppid:%x, flags:%x str:%d ttl:%d ctx:%x\n",
443   s,
444   (u_int)data,
445   (int)len,
446   (u_int)to,
447   (int)tolen,
448   ppid, flags,
449   (int)stream_no,
450   (int)timetolive,
451   (u_int)context);
452   fflush(io);
453 */
454 	if ((tolen > 0) && ((to == NULL) || (tolen < sizeof(struct sockaddr)))) {
455 		errno = EINVAL;
456 		return -1;
457 	}
458 	if (to && (tolen > 0)) {
459 		if (to->sa_family == AF_INET) {
460 			if (tolen != sizeof(struct sockaddr_in)) {
461 				errno = EINVAL;
462 				return -1;
463 			}
464 			if ((to->sa_len > 0) && (to->sa_len != sizeof(struct sockaddr_in))) {
465 				errno = EINVAL;
466 				return -1;
467 			}
468 			memcpy(&addr, to, sizeof(struct sockaddr_in));
469 			addr.in.sin_len = sizeof(struct sockaddr_in);
470 		} else if (to->sa_family == AF_INET6) {
471 			if (tolen != sizeof(struct sockaddr_in6)) {
472 				errno = EINVAL;
473 				return -1;
474 			}
475 			if ((to->sa_len > 0) && (to->sa_len != sizeof(struct sockaddr_in6))) {
476 				errno = EINVAL;
477 				return -1;
478 			}
479 			memcpy(&addr, to, sizeof(struct sockaddr_in6));
480 			addr.in6.sin6_len = sizeof(struct sockaddr_in6);
481 		} else {
482 			errno = EAFNOSUPPORT;
483 			return -1;
484 		}
485 		who = (struct sockaddr *)&addr;
486 	}
487 	iov[0].iov_base = (char *)data;
488 	iov[0].iov_len = len;
489 	iov[1].iov_base = NULL;
490 	iov[1].iov_len = 0;
491 
492 	if (who) {
493 		msg.msg_name = (caddr_t)who;
494 		msg.msg_namelen = who->sa_len;
495 	} else {
496 		msg.msg_name = (caddr_t)NULL;
497 		msg.msg_namelen = 0;
498 	}
499 	msg.msg_iov = iov;
500 	msg.msg_iovlen = 1;
501 	msg.msg_control = (caddr_t)controlVector;
502 
503 	cmsg = (struct cmsghdr *)controlVector;
504 
505 	cmsg->cmsg_level = IPPROTO_SCTP;
506 	cmsg->cmsg_type = SCTP_SNDRCV;
507 	cmsg->cmsg_len = CMSG_LEN(sizeof(struct sctp_sndrcvinfo));
508 	s_info = (struct sctp_sndrcvinfo *)CMSG_DATA(cmsg);
509 
510 	s_info->sinfo_stream = stream_no;
511 	s_info->sinfo_ssn = 0;
512 	s_info->sinfo_flags = flags;
513 	s_info->sinfo_ppid = ppid;
514 	s_info->sinfo_context = context;
515 	s_info->sinfo_assoc_id = 0;
516 	s_info->sinfo_timetolive = timetolive;
517 	errno = 0;
518 	msg.msg_controllen = cmsg->cmsg_len;
519 	sz = sendmsg(s, &msg, 0);
520 	return (sz);
521 #endif
522 }
523 
524 
525 sctp_assoc_t
526 sctp_getassocid(int sd, struct sockaddr *sa)
527 {
528 	struct sctp_paddrparams sp;
529 	socklen_t siz;
530 
531 	/* First get the assoc id */
532 	siz = sizeof(struct sctp_paddrparams);
533 	memset(&sp, 0, sizeof(sp));
534 	memcpy((caddr_t)&sp.spp_address, sa, sa->sa_len);
535 	errno = 0;
536 	if (getsockopt(sd, IPPROTO_SCTP,
537 	    SCTP_PEER_ADDR_PARAMS, &sp, &siz) != 0) {
538 		return ((sctp_assoc_t) 0);
539 	}
540 	/* We depend on the fact that 0 can never be returned */
541 	return (sp.spp_assoc_id);
542 }
543 
544 ssize_t
545 sctp_send(int sd, const void *data, size_t len,
546     const struct sctp_sndrcvinfo *sinfo,
547     int flags)
548 {
549 
550 #ifdef SYS_sctp_generic_sendmsg
551 	struct sockaddr *to = NULL;
552 
553 	return (syscall(SYS_sctp_generic_sendmsg, sd,
554 	    data, len, to, 0, sinfo, flags));
555 #else
556 	ssize_t sz;
557 	struct msghdr msg;
558 	struct iovec iov[SCTP_SMALL_IOVEC_SIZE];
559 	struct sctp_sndrcvinfo *s_info;
560 	char controlVector[SCTP_CONTROL_VEC_SIZE_SND];
561 	struct cmsghdr *cmsg;
562 
563 	if (sinfo == NULL) {
564 		return (EINVAL);
565 	}
566 	iov[0].iov_base = (char *)data;
567 	iov[0].iov_len = len;
568 	iov[1].iov_base = NULL;
569 	iov[1].iov_len = 0;
570 
571 	msg.msg_name = 0;
572 	msg.msg_namelen = 0;
573 	msg.msg_iov = iov;
574 	msg.msg_iovlen = 1;
575 	msg.msg_control = (caddr_t)controlVector;
576 
577 	cmsg = (struct cmsghdr *)controlVector;
578 
579 	cmsg->cmsg_level = IPPROTO_SCTP;
580 	cmsg->cmsg_type = SCTP_SNDRCV;
581 	cmsg->cmsg_len = CMSG_LEN(sizeof(struct sctp_sndrcvinfo));
582 	s_info = (struct sctp_sndrcvinfo *)CMSG_DATA(cmsg);
583 	/* copy in the data */
584 	*s_info = *sinfo;
585 	errno = 0;
586 	msg.msg_controllen = cmsg->cmsg_len;
587 	sz = sendmsg(sd, &msg, flags);
588 	return (sz);
589 #endif
590 }
591 
592 
593 
594 ssize_t
595 sctp_sendx(int sd, const void *msg, size_t msg_len,
596     struct sockaddr *addrs, int addrcnt,
597     struct sctp_sndrcvinfo *sinfo,
598     int flags)
599 {
600 	ssize_t ret;
601 	int i, cnt, *aa, saved_errno;
602 	char *buf;
603 	int add_len, len, no_end_cx = 0;
604 	struct sockaddr *at;
605 
606 
607 #ifdef SYS_sctp_generic_sendmsg
608 	if (addrcnt < SCTP_SMALL_IOVEC_SIZE) {
609 		socklen_t l;
610 
611 		/*
612 		 * Quick way, we don't need to do a connectx so lets use the
613 		 * syscall directly.
614 		 */
615 		l = addrs->sa_len;
616 		return (syscall(SYS_sctp_generic_sendmsg, sd,
617 		    msg, msg_len, addrs, l, sinfo, flags));
618 	}
619 #endif
620 	len = sizeof(int);
621 	at = addrs;
622 	cnt = 0;
623 	/* validate all the addresses and get the size */
624 	for (i = 0; i < addrcnt; i++) {
625 		if (at->sa_family == AF_INET) {
626 			add_len = sizeof(struct sockaddr_in);
627 		} else if (at->sa_family == AF_INET6) {
628 			add_len = sizeof(struct sockaddr_in6);
629 		} else {
630 			errno = EINVAL;
631 			return (-1);
632 		}
633 		len += add_len;
634 		at = (struct sockaddr *)((caddr_t)at + add_len);
635 		cnt++;
636 	}
637 	/* do we have any? */
638 	if (cnt == 0) {
639 		errno = EINVAL;
640 		return (-1);
641 	}
642 	buf = malloc(len);
643 	if (buf == NULL) {
644 		return (ENOMEM);
645 	}
646 	aa = (int *)buf;
647 	*aa = cnt;
648 	aa++;
649 	memcpy((caddr_t)aa, addrs, (len - sizeof(int)));
650 	ret = setsockopt(sd, IPPROTO_SCTP, SCTP_CONNECT_X_DELAYED, (void *)buf,
651 	    (socklen_t) len);
652 
653 	free(buf);
654 	if (ret != 0) {
655 		if (errno == EALREADY) {
656 			no_end_cx = 1;;
657 			goto continue_send;
658 		}
659 		return (ret);
660 	}
661 continue_send:
662 	sinfo->sinfo_assoc_id = sctp_getassocid(sd, addrs);
663 	if (sinfo->sinfo_assoc_id == 0) {
664 		printf("Huh, can't get associd? TSNH!\n");
665 		(void)setsockopt(sd, IPPROTO_SCTP, SCTP_CONNECT_X_COMPLETE, (void *)addrs,
666 		    (socklen_t) addrs->sa_len);
667 		errno = ENOENT;
668 		return (-1);
669 	}
670 	ret = sctp_send(sd, msg, msg_len, sinfo, flags);
671 	saved_errno = errno;
672 	if (no_end_cx == 0)
673 		(void)setsockopt(sd, IPPROTO_SCTP, SCTP_CONNECT_X_COMPLETE, (void *)addrs,
674 		    (socklen_t) addrs->sa_len);
675 
676 	errno = saved_errno;
677 	return (ret);
678 }
679 
680 ssize_t
681 sctp_sendmsgx(int sd,
682     const void *msg,
683     size_t len,
684     struct sockaddr *addrs,
685     int addrcnt,
686     u_int32_t ppid,
687     u_int32_t flags,
688     u_int16_t stream_no,
689     u_int32_t timetolive,
690     u_int32_t context)
691 {
692 	struct sctp_sndrcvinfo sinfo;
693 
694 	memset((void *)&sinfo, 0, sizeof(struct sctp_sndrcvinfo));
695 	sinfo.sinfo_ppid = ppid;
696 	sinfo.sinfo_flags = flags;
697 	sinfo.sinfo_ssn = stream_no;
698 	sinfo.sinfo_timetolive = timetolive;
699 	sinfo.sinfo_context = context;
700 	return sctp_sendx(sd, msg, len, addrs, addrcnt, &sinfo, 0);
701 }
702 
703 ssize_t
704 sctp_recvmsg(int s,
705     void *dbuf,
706     size_t len,
707     struct sockaddr *from,
708     socklen_t * fromlen,
709     struct sctp_sndrcvinfo *sinfo,
710     int *msg_flags)
711 {
712 
713 #ifdef SYS_sctp_generic_recvmsg
714 	struct iovec iov[SCTP_SMALL_IOVEC_SIZE];
715 
716 	iov[0].iov_base = dbuf;
717 	iov[0].iov_len = len;
718 	return (syscall(SYS_sctp_generic_recvmsg, s,
719 	    iov, 1, from, fromlen, sinfo, msg_flags));
720 #else
721 	struct sctp_sndrcvinfo *s_info;
722 	ssize_t sz;
723 	int sinfo_found = 0;
724 	struct msghdr msg;
725 	struct iovec iov[SCTP_SMALL_IOVEC_SIZE];
726 	char controlVector[SCTP_CONTROL_VEC_SIZE_RCV];
727 	struct cmsghdr *cmsg;
728 
729 	if (msg_flags == NULL) {
730 		errno = EINVAL;
731 		return (-1);
732 	}
733 	msg.msg_flags = 0;
734 	iov[0].iov_base = dbuf;
735 	iov[0].iov_len = len;
736 	iov[1].iov_base = NULL;
737 	iov[1].iov_len = 0;
738 	msg.msg_name = (caddr_t)from;
739 	if (fromlen == NULL)
740 		msg.msg_namelen = 0;
741 	else
742 		msg.msg_namelen = *fromlen;
743 	msg.msg_iov = iov;
744 	msg.msg_iovlen = 1;
745 	msg.msg_control = (caddr_t)controlVector;
746 	msg.msg_controllen = sizeof(controlVector);
747 	errno = 0;
748 	sz = recvmsg(s, &msg, 0);
749 	if (sz <= 0)
750 		return (sz);
751 
752 	s_info = NULL;
753 	len = sz;
754 	*msg_flags = msg.msg_flags;
755 	if (sinfo)
756 		sinfo->sinfo_assoc_id = 0;
757 
758 	if ((msg.msg_controllen) && sinfo) {
759 		/*
760 		 * parse through and see if we find the sctp_sndrcvinfo (if
761 		 * the user wants it).
762 		 */
763 		cmsg = (struct cmsghdr *)controlVector;
764 		while (cmsg) {
765 			if ((cmsg->cmsg_len == 0) || (cmsg->cmsg_len > msg.msg_controllen)) {
766 				break;
767 			}
768 			if (cmsg->cmsg_level == IPPROTO_SCTP) {
769 				if (cmsg->cmsg_type == SCTP_SNDRCV) {
770 					/* Got it */
771 					s_info = (struct sctp_sndrcvinfo *)CMSG_DATA(cmsg);
772 					/* Copy it to the user */
773 					if (sinfo)
774 						*sinfo = *s_info;
775 					sinfo_found = 1;
776 					break;
777 				} else if (cmsg->cmsg_type == SCTP_EXTRCV) {
778 					/*
779 					 * Got it, presumably the user has
780 					 * asked for this extra info, so the
781 					 * structure holds more room :-D
782 					 */
783 					s_info = (struct sctp_sndrcvinfo *)CMSG_DATA(cmsg);
784 					/* Copy it to the user */
785 					if (sinfo) {
786 						memcpy(sinfo, s_info, sizeof(struct sctp_extrcvinfo));
787 					}
788 					sinfo_found = 1;
789 					break;
790 
791 				}
792 			}
793 			cmsg = CMSG_NXTHDR(&msg, cmsg);
794 		}
795 	}
796 	return (sz);
797 #endif
798 }
799 
800 
801 #if defined(HAVE_SCTP_PEELOFF_SOCKOPT)
802 #include <netinet/sctp_peeloff.h>
803 
804 int
805 sctp_peeloff(int sd, sctp_assoc_t assoc_id)
806 {
807 	struct sctp_peeloff_opt peeloff;
808 	int error;
809 	socklen_t optlen;
810 
811 	/* set in the socket option params */
812 	memset(&peeloff, 0, sizeof(peeloff));
813 	peeloff.s = sd;
814 	peeloff.assoc_id = assoc_id;
815 	optlen = sizeof(peeloff);
816 	error = getsockopt(sd, IPPROTO_SCTP, SCTP_PEELOFF, (void *)&peeloff,
817 	    &optlen);
818 	if (error) {
819 		errno = error;
820 		return (-1);
821 	} else {
822 		return (peeloff.new_sd);
823 	}
824 }
825 
826 #endif
827 
828 #if !defined(SYS_sctp_peeloff) && !defined(HAVE_SCTP_PEELOFF_SOCKOPT)
829 
830 int
831 sctp_peeloff(int sd, sctp_assoc_t assoc_id)
832 {
833 	/* NOT supported, return invalid sd */
834 	errno = ENOTSUP;
835 	return (-1);
836 }
837 
838 #endif
839 #if defined(SYS_sctp_peeloff) && !defined(HAVE_SCTP_PEELOFF_SOCKOPT)
840 int
841 sctp_peeloff(int sd, sctp_assoc_t assoc_id)
842 {
843 	return (syscall(SYS_sctp_peeloff, sd, assoc_id));
844 }
845 
846 #endif
847 
848 
849 #undef SCTP_CONTROL_VEC_SIZE_SND
850 #undef SCTP_CONTROL_VEC_SIZE_RCV
851 #undef SCTP_STACK_BUF_SIZE
852 #undef SCTP_SMALL_IOVEC_SIZE
853