1 /*- 2 * Copyright (c) 2001-2007, by Cisco Systems, Inc. All rights reserved. 3 * Copyright (c) 2008-2012, by Randall Stewart. All rights reserved. 4 * Copyright (c) 2008-2012, by Michael Tuexen. All rights reserved. 5 * 6 * Redistribution and use in source and binary forms, with or without 7 * modification, are permitted provided that the following conditions are met: 8 * 9 * a) Redistributions of source code must retain the above copyright notice, 10 * this list of conditions and the following disclaimer. 11 * 12 * b) Redistributions in binary form must reproduce the above copyright 13 * notice, this list of conditions and the following disclaimer in 14 * the documentation and/or other materials provided with the distribution. 15 * 16 * c) Neither the name of Cisco Systems, Inc. nor the names of its 17 * contributors may be used to endorse or promote products derived 18 * from this software without specific prior written permission. 19 * 20 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS 21 * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, 22 * THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 23 * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE 24 * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR 25 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF 26 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS 27 * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN 28 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) 29 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF 30 * THE POSSIBILITY OF SUCH DAMAGE. 31 */ 32 33 #include <sys/cdefs.h> 34 __FBSDID("$FreeBSD$"); 35 36 #include <stdio.h> 37 #include <string.h> 38 #include <errno.h> 39 #include <stdlib.h> 40 #include <unistd.h> 41 #include <sys/types.h> 42 #include <sys/socket.h> 43 #include <sys/errno.h> 44 #include <sys/syscall.h> 45 #include <sys/uio.h> 46 #include <netinet/in.h> 47 #include <arpa/inet.h> 48 #include <netinet/sctp_uio.h> 49 #include <netinet/sctp.h> 50 51 #ifndef IN6_IS_ADDR_V4MAPPED 52 #define IN6_IS_ADDR_V4MAPPED(a) \ 53 ((*(const uint32_t *)(const void *)(&(a)->s6_addr[0]) == 0) && \ 54 (*(const uint32_t *)(const void *)(&(a)->s6_addr[4]) == 0) && \ 55 (*(const uint32_t *)(const void *)(&(a)->s6_addr[8]) == ntohl(0x0000ffff))) 56 #endif 57 58 #define SCTP_CONTROL_VEC_SIZE_RCV 16384 59 60 61 static void 62 in6_sin6_2_sin(struct sockaddr_in *sin, struct sockaddr_in6 *sin6) 63 { 64 bzero(sin, sizeof(*sin)); 65 sin->sin_len = sizeof(struct sockaddr_in); 66 sin->sin_family = AF_INET; 67 sin->sin_port = sin6->sin6_port; 68 sin->sin_addr.s_addr = sin6->sin6_addr.__u6_addr.__u6_addr32[3]; 69 } 70 71 int 72 sctp_getaddrlen(sa_family_t family) 73 { 74 int ret, sd; 75 socklen_t siz; 76 struct sctp_assoc_value av; 77 78 av.assoc_value = family; 79 siz = sizeof(av); 80 #if defined(AF_INET) 81 sd = socket(AF_INET, SOCK_SEQPACKET, IPPROTO_SCTP); 82 #elif defined(AF_INET6) 83 sd = socket(AF_INET6, SOCK_SEQPACKET, IPPROTO_SCTP); 84 #else 85 sd = -1; 86 #endif 87 if (sd == -1) { 88 return (-1); 89 } 90 ret = getsockopt(sd, IPPROTO_SCTP, SCTP_GET_ADDR_LEN, &av, &siz); 91 close(sd); 92 if (ret == 0) { 93 return ((int)av.assoc_value); 94 } else { 95 return (-1); 96 } 97 } 98 99 int 100 sctp_connectx(int sd, const struct sockaddr *addrs, int addrcnt, 101 sctp_assoc_t * id) 102 { 103 char *buf; 104 int i, ret, *aa; 105 char *cpto; 106 const struct sockaddr *at; 107 size_t len; 108 109 /* validate the address count and list */ 110 if ((addrs == NULL) || (addrcnt <= 0)) { 111 errno = EINVAL; 112 return (-1); 113 } 114 if ((buf = malloc(sizeof(int) + (size_t)addrcnt * sizeof(struct sockaddr_in6))) == NULL) { 115 errno = E2BIG; 116 return (-1); 117 } 118 len = sizeof(int); 119 at = addrs; 120 cpto = buf + sizeof(int); 121 /* validate all the addresses and get the size */ 122 for (i = 0; i < addrcnt; i++) { 123 switch (at->sa_family) { 124 case AF_INET: 125 if (at->sa_len != sizeof(struct sockaddr_in)) { 126 free(buf); 127 errno = EINVAL; 128 return (-1); 129 } 130 memcpy(cpto, at, sizeof(struct sockaddr_in)); 131 cpto = ((caddr_t)cpto + sizeof(struct sockaddr_in)); 132 len += sizeof(struct sockaddr_in); 133 break; 134 case AF_INET6: 135 if (at->sa_len != sizeof(struct sockaddr_in6)) { 136 free(buf); 137 errno = EINVAL; 138 return (-1); 139 } 140 if (IN6_IS_ADDR_V4MAPPED(&((struct sockaddr_in6 *)at)->sin6_addr)) { 141 in6_sin6_2_sin((struct sockaddr_in *)cpto, (struct sockaddr_in6 *)at); 142 cpto = ((caddr_t)cpto + sizeof(struct sockaddr_in)); 143 len += sizeof(struct sockaddr_in); 144 } else { 145 memcpy(cpto, at, sizeof(struct sockaddr_in6)); 146 cpto = ((caddr_t)cpto + sizeof(struct sockaddr_in6)); 147 len += sizeof(struct sockaddr_in6); 148 } 149 break; 150 default: 151 free(buf); 152 errno = EINVAL; 153 return (-1); 154 } 155 at = (struct sockaddr *)((caddr_t)at + at->sa_len); 156 } 157 aa = (int *)buf; 158 *aa = addrcnt; 159 ret = setsockopt(sd, IPPROTO_SCTP, SCTP_CONNECT_X, (void *)buf, 160 (socklen_t) len); 161 if ((ret == 0) && (id != NULL)) { 162 *id = *(sctp_assoc_t *) buf; 163 } 164 free(buf); 165 return (ret); 166 } 167 168 int 169 sctp_bindx(int sd, struct sockaddr *addrs, int addrcnt, int flags) 170 { 171 struct sctp_getaddresses *gaddrs; 172 struct sockaddr *sa; 173 struct sockaddr_in *sin; 174 struct sockaddr_in6 *sin6; 175 int i; 176 size_t argsz; 177 uint16_t sport = 0; 178 179 /* validate the flags */ 180 if ((flags != SCTP_BINDX_ADD_ADDR) && 181 (flags != SCTP_BINDX_REM_ADDR)) { 182 errno = EFAULT; 183 return (-1); 184 } 185 /* validate the address count and list */ 186 if ((addrcnt <= 0) || (addrs == NULL)) { 187 errno = EINVAL; 188 return (-1); 189 } 190 /* First pre-screen the addresses */ 191 sa = addrs; 192 for (i = 0; i < addrcnt; i++) { 193 switch (sa->sa_family) { 194 case AF_INET: 195 if (sa->sa_len != sizeof(struct sockaddr_in)) { 196 errno = EINVAL; 197 return (-1); 198 } 199 sin = (struct sockaddr_in *)sa; 200 if (sin->sin_port) { 201 /* non-zero port, check or save */ 202 if (sport) { 203 /* Check against our port */ 204 if (sport != sin->sin_port) { 205 errno = EINVAL; 206 return (-1); 207 } 208 } else { 209 /* save off the port */ 210 sport = sin->sin_port; 211 } 212 } 213 break; 214 case AF_INET6: 215 if (sa->sa_len != sizeof(struct sockaddr_in6)) { 216 errno = EINVAL; 217 return (-1); 218 } 219 sin6 = (struct sockaddr_in6 *)sa; 220 if (sin6->sin6_port) { 221 /* non-zero port, check or save */ 222 if (sport) { 223 /* Check against our port */ 224 if (sport != sin6->sin6_port) { 225 errno = EINVAL; 226 return (-1); 227 } 228 } else { 229 /* save off the port */ 230 sport = sin6->sin6_port; 231 } 232 } 233 break; 234 default: 235 /* Invalid address family specified. */ 236 errno = EINVAL; 237 return (-1); 238 } 239 sa = (struct sockaddr *)((caddr_t)sa + sa->sa_len); 240 } 241 /* 242 * Now if there was a port mentioned, assure that the first address 243 * has that port to make sure it fails or succeeds correctly. 244 */ 245 if (sport) { 246 sin = (struct sockaddr_in *)sa; 247 sin->sin_port = sport; 248 } 249 argsz = sizeof(struct sctp_getaddresses) + 250 sizeof(struct sockaddr_storage); 251 if ((gaddrs = (struct sctp_getaddresses *)malloc(argsz)) == NULL) { 252 errno = ENOMEM; 253 return (-1); 254 } 255 sa = addrs; 256 for (i = 0; i < addrcnt; i++) { 257 memset(gaddrs, 0, argsz); 258 gaddrs->sget_assoc_id = 0; 259 memcpy(gaddrs->addr, sa, sa->sa_len); 260 if (setsockopt(sd, IPPROTO_SCTP, flags, gaddrs, 261 (socklen_t) argsz) != 0) { 262 free(gaddrs); 263 return (-1); 264 } 265 sa = (struct sockaddr *)((caddr_t)sa + sa->sa_len); 266 } 267 free(gaddrs); 268 return (0); 269 } 270 271 int 272 sctp_opt_info(int sd, sctp_assoc_t id, int opt, void *arg, socklen_t * size) 273 { 274 if (arg == NULL) { 275 errno = EINVAL; 276 return (-1); 277 } 278 if ((id == SCTP_CURRENT_ASSOC) || 279 (id == SCTP_ALL_ASSOC)) { 280 errno = EINVAL; 281 return (-1); 282 } 283 switch (opt) { 284 case SCTP_RTOINFO: 285 ((struct sctp_rtoinfo *)arg)->srto_assoc_id = id; 286 break; 287 case SCTP_ASSOCINFO: 288 ((struct sctp_assocparams *)arg)->sasoc_assoc_id = id; 289 break; 290 case SCTP_DEFAULT_SEND_PARAM: 291 ((struct sctp_assocparams *)arg)->sasoc_assoc_id = id; 292 break; 293 case SCTP_PRIMARY_ADDR: 294 ((struct sctp_setprim *)arg)->ssp_assoc_id = id; 295 break; 296 case SCTP_PEER_ADDR_PARAMS: 297 ((struct sctp_paddrparams *)arg)->spp_assoc_id = id; 298 break; 299 case SCTP_MAXSEG: 300 ((struct sctp_assoc_value *)arg)->assoc_id = id; 301 break; 302 case SCTP_AUTH_KEY: 303 ((struct sctp_authkey *)arg)->sca_assoc_id = id; 304 break; 305 case SCTP_AUTH_ACTIVE_KEY: 306 ((struct sctp_authkeyid *)arg)->scact_assoc_id = id; 307 break; 308 case SCTP_DELAYED_SACK: 309 ((struct sctp_sack_info *)arg)->sack_assoc_id = id; 310 break; 311 case SCTP_CONTEXT: 312 ((struct sctp_assoc_value *)arg)->assoc_id = id; 313 break; 314 case SCTP_STATUS: 315 ((struct sctp_status *)arg)->sstat_assoc_id = id; 316 break; 317 case SCTP_GET_PEER_ADDR_INFO: 318 ((struct sctp_paddrinfo *)arg)->spinfo_assoc_id = id; 319 break; 320 case SCTP_PEER_AUTH_CHUNKS: 321 ((struct sctp_authchunks *)arg)->gauth_assoc_id = id; 322 break; 323 case SCTP_LOCAL_AUTH_CHUNKS: 324 ((struct sctp_authchunks *)arg)->gauth_assoc_id = id; 325 break; 326 case SCTP_TIMEOUTS: 327 ((struct sctp_timeouts *)arg)->stimo_assoc_id = id; 328 break; 329 case SCTP_EVENT: 330 ((struct sctp_event *)arg)->se_assoc_id = id; 331 break; 332 case SCTP_DEFAULT_SNDINFO: 333 ((struct sctp_sndinfo *)arg)->snd_assoc_id = id; 334 break; 335 case SCTP_DEFAULT_PRINFO: 336 ((struct sctp_default_prinfo *)arg)->pr_assoc_id = id; 337 break; 338 case SCTP_PEER_ADDR_THLDS: 339 ((struct sctp_paddrthlds *)arg)->spt_assoc_id = id; 340 break; 341 case SCTP_REMOTE_UDP_ENCAPS_PORT: 342 ((struct sctp_udpencaps *)arg)->sue_assoc_id = id; 343 break; 344 case SCTP_MAX_BURST: 345 ((struct sctp_assoc_value *)arg)->assoc_id = id; 346 break; 347 case SCTP_ENABLE_STREAM_RESET: 348 ((struct sctp_assoc_value *)arg)->assoc_id = id; 349 break; 350 default: 351 break; 352 } 353 return (getsockopt(sd, IPPROTO_SCTP, opt, arg, size)); 354 } 355 356 int 357 sctp_getpaddrs(int sd, sctp_assoc_t id, struct sockaddr **raddrs) 358 { 359 struct sctp_getaddresses *addrs; 360 struct sockaddr *sa; 361 sctp_assoc_t asoc; 362 caddr_t lim; 363 socklen_t opt_len; 364 int cnt; 365 366 if (raddrs == NULL) { 367 errno = EFAULT; 368 return (-1); 369 } 370 asoc = id; 371 opt_len = (socklen_t) sizeof(sctp_assoc_t); 372 if (getsockopt(sd, IPPROTO_SCTP, SCTP_GET_REMOTE_ADDR_SIZE, 373 &asoc, &opt_len) != 0) { 374 return (-1); 375 } 376 /* size required is returned in 'asoc' */ 377 opt_len = (socklen_t) ((size_t)asoc + sizeof(struct sctp_getaddresses)); 378 addrs = calloc(1, (size_t)opt_len); 379 if (addrs == NULL) { 380 errno = ENOMEM; 381 return (-1); 382 } 383 addrs->sget_assoc_id = id; 384 /* Now lets get the array of addresses */ 385 if (getsockopt(sd, IPPROTO_SCTP, SCTP_GET_PEER_ADDRESSES, 386 addrs, &opt_len) != 0) { 387 free(addrs); 388 return (-1); 389 } 390 *raddrs = (struct sockaddr *)&addrs->addr[0]; 391 cnt = 0; 392 sa = (struct sockaddr *)&addrs->addr[0]; 393 lim = (caddr_t)addrs + opt_len; 394 while (((caddr_t)sa < lim) && (sa->sa_len > 0)) { 395 sa = (struct sockaddr *)((caddr_t)sa + sa->sa_len); 396 cnt++; 397 } 398 return (cnt); 399 } 400 401 void 402 sctp_freepaddrs(struct sockaddr *addrs) 403 { 404 void *fr_addr; 405 406 /* Take away the hidden association id */ 407 fr_addr = (void *)((caddr_t)addrs - sizeof(sctp_assoc_t)); 408 /* Now free it */ 409 free(fr_addr); 410 } 411 412 int 413 sctp_getladdrs(int sd, sctp_assoc_t id, struct sockaddr **raddrs) 414 { 415 struct sctp_getaddresses *addrs; 416 caddr_t lim; 417 struct sockaddr *sa; 418 size_t size_of_addresses; 419 socklen_t opt_len; 420 int cnt; 421 422 if (raddrs == NULL) { 423 errno = EFAULT; 424 return (-1); 425 } 426 size_of_addresses = 0; 427 opt_len = (socklen_t) sizeof(int); 428 if (getsockopt(sd, IPPROTO_SCTP, SCTP_GET_LOCAL_ADDR_SIZE, 429 &size_of_addresses, &opt_len) != 0) { 430 errno = ENOMEM; 431 return (-1); 432 } 433 if (size_of_addresses == 0) { 434 errno = ENOTCONN; 435 return (-1); 436 } 437 opt_len = (socklen_t) (size_of_addresses + 438 sizeof(struct sockaddr_storage) + 439 sizeof(struct sctp_getaddresses)); 440 addrs = calloc(1, (size_t)opt_len); 441 if (addrs == NULL) { 442 errno = ENOMEM; 443 return (-1); 444 } 445 addrs->sget_assoc_id = id; 446 /* Now lets get the array of addresses */ 447 if (getsockopt(sd, IPPROTO_SCTP, SCTP_GET_LOCAL_ADDRESSES, addrs, 448 &opt_len) != 0) { 449 free(addrs); 450 errno = ENOMEM; 451 return (-1); 452 } 453 *raddrs = (struct sockaddr *)&addrs->addr[0]; 454 cnt = 0; 455 sa = (struct sockaddr *)&addrs->addr[0]; 456 lim = (caddr_t)addrs + opt_len; 457 while (((caddr_t)sa < lim) && (sa->sa_len > 0)) { 458 sa = (struct sockaddr *)((caddr_t)sa + sa->sa_len); 459 cnt++; 460 } 461 return (cnt); 462 } 463 464 void 465 sctp_freeladdrs(struct sockaddr *addrs) 466 { 467 void *fr_addr; 468 469 /* Take away the hidden association id */ 470 fr_addr = (void *)((caddr_t)addrs - sizeof(sctp_assoc_t)); 471 /* Now free it */ 472 free(fr_addr); 473 } 474 475 ssize_t 476 sctp_sendmsg(int s, 477 const void *data, 478 size_t len, 479 const struct sockaddr *to, 480 socklen_t tolen, 481 uint32_t ppid, 482 uint32_t flags, 483 uint16_t stream_no, 484 uint32_t timetolive, 485 uint32_t context) 486 { 487 #ifdef SYS_sctp_generic_sendmsg 488 struct sctp_sndrcvinfo sinfo; 489 490 memset(&sinfo, 0, sizeof(struct sctp_sndrcvinfo)); 491 sinfo.sinfo_ppid = ppid; 492 sinfo.sinfo_flags = flags; 493 sinfo.sinfo_stream = stream_no; 494 sinfo.sinfo_timetolive = timetolive; 495 sinfo.sinfo_context = context; 496 sinfo.sinfo_assoc_id = 0; 497 return (syscall(SYS_sctp_generic_sendmsg, s, 498 data, len, to, tolen, &sinfo, 0)); 499 #else 500 struct msghdr msg; 501 struct sctp_sndrcvinfo *sinfo; 502 struct iovec iov; 503 char cmsgbuf[CMSG_SPACE(sizeof(struct sctp_sndrcvinfo))]; 504 struct cmsghdr *cmsg; 505 struct sockaddr *who = NULL; 506 union { 507 struct sockaddr_in in; 508 struct sockaddr_in6 in6; 509 } addr; 510 511 if ((tolen > 0) && 512 ((to == NULL) || (tolen < sizeof(struct sockaddr)))) { 513 errno = EINVAL; 514 return (-1); 515 } 516 if ((to != NULL) && (tolen > 0)) { 517 switch (to->sa_family) { 518 case AF_INET: 519 if (tolen != sizeof(struct sockaddr_in)) { 520 errno = EINVAL; 521 return (-1); 522 } 523 if ((to->sa_len > 0) && 524 (to->sa_len != sizeof(struct sockaddr_in))) { 525 errno = EINVAL; 526 return (-1); 527 } 528 memcpy(&addr, to, sizeof(struct sockaddr_in)); 529 addr.in.sin_len = sizeof(struct sockaddr_in); 530 break; 531 case AF_INET6: 532 if (tolen != sizeof(struct sockaddr_in6)) { 533 errno = EINVAL; 534 return (-1); 535 } 536 if ((to->sa_len > 0) && 537 (to->sa_len != sizeof(struct sockaddr_in6))) { 538 errno = EINVAL; 539 return (-1); 540 } 541 memcpy(&addr, to, sizeof(struct sockaddr_in6)); 542 addr.in6.sin6_len = sizeof(struct sockaddr_in6); 543 break; 544 default: 545 errno = EAFNOSUPPORT; 546 return (-1); 547 } 548 who = (struct sockaddr *)&addr; 549 } 550 iov.iov_base = (char *)data; 551 iov.iov_len = len; 552 553 if (who) { 554 msg.msg_name = (caddr_t)who; 555 msg.msg_namelen = who->sa_len; 556 } else { 557 msg.msg_name = (caddr_t)NULL; 558 msg.msg_namelen = 0; 559 } 560 msg.msg_iov = &iov; 561 msg.msg_iovlen = 1; 562 msg.msg_control = cmsgbuf; 563 msg.msg_controllen = CMSG_SPACE(sizeof(struct sctp_sndrcvinfo)); 564 cmsg = (struct cmsghdr *)cmsgbuf; 565 cmsg->cmsg_level = IPPROTO_SCTP; 566 cmsg->cmsg_type = SCTP_SNDRCV; 567 cmsg->cmsg_len = CMSG_LEN(sizeof(struct sctp_sndrcvinfo)); 568 sinfo = (struct sctp_sndrcvinfo *)CMSG_DATA(cmsg); 569 sinfo->sinfo_stream = stream_no; 570 sinfo->sinfo_ssn = 0; 571 sinfo->sinfo_flags = flags; 572 sinfo->sinfo_ppid = ppid; 573 sinfo->sinfo_context = context; 574 sinfo->sinfo_assoc_id = 0; 575 sinfo->sinfo_timetolive = timetolive; 576 return (sendmsg(s, &msg, 0)); 577 #endif 578 } 579 580 581 sctp_assoc_t 582 sctp_getassocid(int sd, struct sockaddr *sa) 583 { 584 struct sctp_paddrinfo sp; 585 socklen_t siz; 586 587 /* First get the assoc id */ 588 siz = sizeof(sp); 589 memset(&sp, 0, sizeof(sp)); 590 memcpy((caddr_t)&sp.spinfo_address, sa, sa->sa_len); 591 if (getsockopt(sd, IPPROTO_SCTP, 592 SCTP_GET_PEER_ADDR_INFO, &sp, &siz) != 0) { 593 /* We depend on the fact that 0 can never be returned */ 594 return ((sctp_assoc_t) 0); 595 } 596 return (sp.spinfo_assoc_id); 597 } 598 599 ssize_t 600 sctp_send(int sd, const void *data, size_t len, 601 const struct sctp_sndrcvinfo *sinfo, 602 int flags) 603 { 604 605 #ifdef SYS_sctp_generic_sendmsg 606 struct sockaddr *to = NULL; 607 608 return (syscall(SYS_sctp_generic_sendmsg, sd, 609 data, len, to, 0, sinfo, flags)); 610 #else 611 struct msghdr msg; 612 struct iovec iov; 613 char cmsgbuf[CMSG_SPACE(sizeof(struct sctp_sndrcvinfo))]; 614 struct cmsghdr *cmsg; 615 616 if (sinfo == NULL) { 617 errno = EINVAL; 618 return (-1); 619 } 620 iov.iov_base = (char *)data; 621 iov.iov_len = len; 622 623 msg.msg_name = NULL; 624 msg.msg_namelen = 0; 625 msg.msg_iov = &iov; 626 msg.msg_iovlen = 1; 627 msg.msg_control = cmsgbuf; 628 msg.msg_controllen = CMSG_SPACE(sizeof(struct sctp_sndrcvinfo)); 629 cmsg = (struct cmsghdr *)cmsgbuf; 630 cmsg->cmsg_level = IPPROTO_SCTP; 631 cmsg->cmsg_type = SCTP_SNDRCV; 632 cmsg->cmsg_len = CMSG_LEN(sizeof(struct sctp_sndrcvinfo)); 633 memcpy(CMSG_DATA(cmsg), sinfo, sizeof(struct sctp_sndrcvinfo)); 634 return (sendmsg(sd, &msg, flags)); 635 #endif 636 } 637 638 639 640 ssize_t 641 sctp_sendx(int sd, const void *msg, size_t msg_len, 642 struct sockaddr *addrs, int addrcnt, 643 struct sctp_sndrcvinfo *sinfo, 644 int flags) 645 { 646 struct sctp_sndrcvinfo __sinfo; 647 ssize_t ret; 648 int i, cnt, *aa, saved_errno; 649 char *buf; 650 int no_end_cx = 0; 651 size_t len, add_len; 652 struct sockaddr *at; 653 654 if (addrs == NULL) { 655 errno = EINVAL; 656 return (-1); 657 } 658 #ifdef SYS_sctp_generic_sendmsg 659 if (addrcnt == 1) { 660 socklen_t l; 661 662 /* 663 * Quick way, we don't need to do a connectx so lets use the 664 * syscall directly. 665 */ 666 l = addrs->sa_len; 667 return (syscall(SYS_sctp_generic_sendmsg, sd, 668 msg, msg_len, addrs, l, sinfo, flags)); 669 } 670 #endif 671 672 len = sizeof(int); 673 at = addrs; 674 cnt = 0; 675 /* validate all the addresses and get the size */ 676 for (i = 0; i < addrcnt; i++) { 677 if (at->sa_family == AF_INET) { 678 add_len = sizeof(struct sockaddr_in); 679 } else if (at->sa_family == AF_INET6) { 680 add_len = sizeof(struct sockaddr_in6); 681 } else { 682 errno = EINVAL; 683 return (-1); 684 } 685 len += add_len; 686 at = (struct sockaddr *)((caddr_t)at + add_len); 687 cnt++; 688 } 689 /* do we have any? */ 690 if (cnt == 0) { 691 errno = EINVAL; 692 return (-1); 693 } 694 buf = malloc(len); 695 if (buf == NULL) { 696 errno = ENOMEM; 697 return (-1); 698 } 699 aa = (int *)buf; 700 *aa = cnt; 701 aa++; 702 memcpy((caddr_t)aa, addrs, (size_t)(len - sizeof(int))); 703 ret = setsockopt(sd, IPPROTO_SCTP, SCTP_CONNECT_X_DELAYED, (void *)buf, 704 (socklen_t) len); 705 706 free(buf); 707 if (ret != 0) { 708 if (errno == EALREADY) { 709 no_end_cx = 1; 710 goto continue_send; 711 } 712 return (ret); 713 } 714 continue_send: 715 if (sinfo == NULL) { 716 sinfo = &__sinfo; 717 memset(&__sinfo, 0, sizeof(__sinfo)); 718 } 719 sinfo->sinfo_assoc_id = sctp_getassocid(sd, addrs); 720 if (sinfo->sinfo_assoc_id == 0) { 721 (void)setsockopt(sd, IPPROTO_SCTP, SCTP_CONNECT_X_COMPLETE, (void *)addrs, 722 (socklen_t) addrs->sa_len); 723 errno = ENOENT; 724 return (-1); 725 } 726 ret = sctp_send(sd, msg, msg_len, sinfo, flags); 727 saved_errno = errno; 728 if (no_end_cx == 0) 729 (void)setsockopt(sd, IPPROTO_SCTP, SCTP_CONNECT_X_COMPLETE, (void *)addrs, 730 (socklen_t) addrs->sa_len); 731 732 errno = saved_errno; 733 return (ret); 734 } 735 736 ssize_t 737 sctp_sendmsgx(int sd, 738 const void *msg, 739 size_t len, 740 struct sockaddr *addrs, 741 int addrcnt, 742 uint32_t ppid, 743 uint32_t flags, 744 uint16_t stream_no, 745 uint32_t timetolive, 746 uint32_t context) 747 { 748 struct sctp_sndrcvinfo sinfo; 749 750 memset((void *)&sinfo, 0, sizeof(struct sctp_sndrcvinfo)); 751 sinfo.sinfo_ppid = ppid; 752 sinfo.sinfo_flags = flags; 753 sinfo.sinfo_ssn = stream_no; 754 sinfo.sinfo_timetolive = timetolive; 755 sinfo.sinfo_context = context; 756 return (sctp_sendx(sd, msg, len, addrs, addrcnt, &sinfo, 0)); 757 } 758 759 ssize_t 760 sctp_recvmsg(int s, 761 void *dbuf, 762 size_t len, 763 struct sockaddr *from, 764 socklen_t * fromlen, 765 struct sctp_sndrcvinfo *sinfo, 766 int *msg_flags) 767 { 768 #ifdef SYS_sctp_generic_recvmsg 769 struct iovec iov; 770 771 iov.iov_base = dbuf; 772 iov.iov_len = len; 773 return (syscall(SYS_sctp_generic_recvmsg, s, 774 &iov, 1, from, fromlen, sinfo, msg_flags)); 775 #else 776 ssize_t sz; 777 struct msghdr msg; 778 struct iovec iov; 779 char cmsgbuf[SCTP_CONTROL_VEC_SIZE_RCV]; 780 struct cmsghdr *cmsg; 781 782 if (msg_flags == NULL) { 783 errno = EINVAL; 784 return (-1); 785 } 786 msg.msg_flags = 0; 787 iov.iov_base = dbuf; 788 iov.iov_len = len; 789 msg.msg_name = (caddr_t)from; 790 if (fromlen == NULL) 791 msg.msg_namelen = 0; 792 else 793 msg.msg_namelen = *fromlen; 794 msg.msg_iov = &iov; 795 msg.msg_iovlen = 1; 796 msg.msg_control = cmsgbuf; 797 msg.msg_controllen = sizeof(cmsgbuf); 798 sz = recvmsg(s, &msg, *msg_flags); 799 *msg_flags = msg.msg_flags; 800 if (sz <= 0) { 801 return (sz); 802 } 803 if (sinfo) { 804 sinfo->sinfo_assoc_id = 0; 805 } 806 if ((msg.msg_controllen > 0) && (sinfo != NULL)) { 807 /* 808 * parse through and see if we find the sctp_sndrcvinfo (if 809 * the user wants it). 810 */ 811 for (cmsg = CMSG_FIRSTHDR(&msg); cmsg; cmsg = CMSG_NXTHDR(&msg, cmsg)) { 812 if (cmsg->cmsg_level != IPPROTO_SCTP) { 813 continue; 814 } 815 if (cmsg->cmsg_type == SCTP_SNDRCV) { 816 memcpy(sinfo, CMSG_DATA(cmsg), sizeof(struct sctp_sndrcvinfo)); 817 break; 818 } 819 if (cmsg->cmsg_type == SCTP_EXTRCV) { 820 /* 821 * Let's hope that the user provided enough 822 * enough memory. At least he asked for more 823 * information. 824 */ 825 memcpy(sinfo, CMSG_DATA(cmsg), sizeof(struct sctp_extrcvinfo)); 826 break; 827 } 828 } 829 } 830 return (sz); 831 #endif 832 } 833 834 ssize_t 835 sctp_recvv(int sd, 836 const struct iovec *iov, 837 int iovlen, 838 struct sockaddr *from, 839 socklen_t * fromlen, 840 void *info, 841 socklen_t * infolen, 842 unsigned int *infotype, 843 int *flags) 844 { 845 char cmsgbuf[SCTP_CONTROL_VEC_SIZE_RCV]; 846 struct msghdr msg; 847 struct cmsghdr *cmsg; 848 ssize_t ret; 849 struct sctp_rcvinfo *rcvinfo; 850 struct sctp_nxtinfo *nxtinfo; 851 852 if (((info != NULL) && (infolen == NULL)) | 853 ((info == NULL) && (infolen != NULL) && (*infolen != 0)) || 854 ((info != NULL) && (infotype == NULL))) { 855 errno = EINVAL; 856 return (-1); 857 } 858 if (infotype) { 859 *infotype = SCTP_RECVV_NOINFO; 860 } 861 msg.msg_name = from; 862 if (fromlen == NULL) { 863 msg.msg_namelen = 0; 864 } else { 865 msg.msg_namelen = *fromlen; 866 } 867 msg.msg_iov = (struct iovec *)iov; 868 msg.msg_iovlen = iovlen; 869 msg.msg_control = cmsgbuf; 870 msg.msg_controllen = sizeof(cmsgbuf); 871 ret = recvmsg(sd, &msg, *flags); 872 *flags = msg.msg_flags; 873 if ((ret > 0) && 874 (msg.msg_controllen > 0) && 875 (infotype != NULL) && 876 (infolen != NULL) && 877 (*infolen > 0)) { 878 rcvinfo = NULL; 879 nxtinfo = NULL; 880 for (cmsg = CMSG_FIRSTHDR(&msg); cmsg; cmsg = CMSG_NXTHDR(&msg, cmsg)) { 881 if (cmsg->cmsg_level != IPPROTO_SCTP) { 882 continue; 883 } 884 if (cmsg->cmsg_type == SCTP_RCVINFO) { 885 rcvinfo = (struct sctp_rcvinfo *)CMSG_DATA(cmsg); 886 if (nxtinfo != NULL) { 887 break; 888 } else { 889 continue; 890 } 891 } 892 if (cmsg->cmsg_type == SCTP_NXTINFO) { 893 nxtinfo = (struct sctp_nxtinfo *)CMSG_DATA(cmsg); 894 if (rcvinfo != NULL) { 895 break; 896 } else { 897 continue; 898 } 899 } 900 } 901 if (rcvinfo != NULL) { 902 if ((nxtinfo != NULL) && (*infolen >= sizeof(struct sctp_recvv_rn))) { 903 struct sctp_recvv_rn *rn_info; 904 905 rn_info = (struct sctp_recvv_rn *)info; 906 rn_info->recvv_rcvinfo = *rcvinfo; 907 rn_info->recvv_nxtinfo = *nxtinfo; 908 *infolen = (socklen_t) sizeof(struct sctp_recvv_rn); 909 *infotype = SCTP_RECVV_RN; 910 } else if (*infolen >= sizeof(struct sctp_rcvinfo)) { 911 memcpy(info, rcvinfo, sizeof(struct sctp_rcvinfo)); 912 *infolen = (socklen_t) sizeof(struct sctp_rcvinfo); 913 *infotype = SCTP_RECVV_RCVINFO; 914 } 915 } else if (nxtinfo != NULL) { 916 if (*infolen >= sizeof(struct sctp_nxtinfo)) { 917 memcpy(info, nxtinfo, sizeof(struct sctp_nxtinfo)); 918 *infolen = (socklen_t) sizeof(struct sctp_nxtinfo); 919 *infotype = SCTP_RECVV_NXTINFO; 920 } 921 } 922 } 923 return (ret); 924 } 925 926 ssize_t 927 sctp_sendv(int sd, 928 const struct iovec *iov, int iovcnt, 929 struct sockaddr *addrs, int addrcnt, 930 void *info, socklen_t infolen, unsigned int infotype, 931 int flags) 932 { 933 ssize_t ret; 934 int i; 935 socklen_t addr_len; 936 struct msghdr msg; 937 in_port_t port; 938 struct sctp_sendv_spa *spa_info; 939 struct cmsghdr *cmsg; 940 char *cmsgbuf; 941 struct sockaddr *addr; 942 struct sockaddr_in *addr_in; 943 struct sockaddr_in6 *addr_in6; 944 945 if ((addrcnt < 0) || 946 (iovcnt < 0) || 947 ((addrs == NULL) && (addrcnt > 0)) || 948 ((addrs != NULL) && (addrcnt == 0)) || 949 ((iov == NULL) && (iovcnt > 0)) || 950 ((iov != NULL) && (iovcnt == 0))) { 951 errno = EINVAL; 952 return (-1); 953 } 954 cmsgbuf = malloc(CMSG_SPACE(sizeof(struct sctp_sndinfo)) + 955 CMSG_SPACE(sizeof(struct sctp_prinfo)) + 956 CMSG_SPACE(sizeof(struct sctp_authinfo)) + 957 (size_t)addrcnt * CMSG_SPACE(sizeof(struct in6_addr))); 958 if (cmsgbuf == NULL) { 959 errno = ENOMEM; 960 return (-1); 961 } 962 msg.msg_control = cmsgbuf; 963 msg.msg_controllen = 0; 964 cmsg = (struct cmsghdr *)cmsgbuf; 965 switch (infotype) { 966 case SCTP_SENDV_NOINFO: 967 if ((infolen != 0) || (info != NULL)) { 968 free(cmsgbuf); 969 errno = EINVAL; 970 return (-1); 971 } 972 break; 973 case SCTP_SENDV_SNDINFO: 974 if ((info == NULL) || (infolen < sizeof(struct sctp_sndinfo))) { 975 free(cmsgbuf); 976 errno = EINVAL; 977 return (-1); 978 } 979 cmsg->cmsg_level = IPPROTO_SCTP; 980 cmsg->cmsg_type = SCTP_SNDINFO; 981 cmsg->cmsg_len = CMSG_LEN(sizeof(struct sctp_sndinfo)); 982 memcpy(CMSG_DATA(cmsg), info, sizeof(struct sctp_sndinfo)); 983 msg.msg_controllen += CMSG_SPACE(sizeof(struct sctp_sndinfo)); 984 cmsg = (struct cmsghdr *)((caddr_t)cmsg + CMSG_SPACE(sizeof(struct sctp_sndinfo))); 985 break; 986 case SCTP_SENDV_PRINFO: 987 if ((info == NULL) || (infolen < sizeof(struct sctp_prinfo))) { 988 free(cmsgbuf); 989 errno = EINVAL; 990 return (-1); 991 } 992 cmsg->cmsg_level = IPPROTO_SCTP; 993 cmsg->cmsg_type = SCTP_PRINFO; 994 cmsg->cmsg_len = CMSG_LEN(sizeof(struct sctp_prinfo)); 995 memcpy(CMSG_DATA(cmsg), info, sizeof(struct sctp_prinfo)); 996 msg.msg_controllen += CMSG_SPACE(sizeof(struct sctp_prinfo)); 997 cmsg = (struct cmsghdr *)((caddr_t)cmsg + CMSG_SPACE(sizeof(struct sctp_prinfo))); 998 break; 999 case SCTP_SENDV_AUTHINFO: 1000 if ((info == NULL) || (infolen < sizeof(struct sctp_authinfo))) { 1001 free(cmsgbuf); 1002 errno = EINVAL; 1003 return (-1); 1004 } 1005 cmsg->cmsg_level = IPPROTO_SCTP; 1006 cmsg->cmsg_type = SCTP_AUTHINFO; 1007 cmsg->cmsg_len = CMSG_LEN(sizeof(struct sctp_authinfo)); 1008 memcpy(CMSG_DATA(cmsg), info, sizeof(struct sctp_authinfo)); 1009 msg.msg_controllen += CMSG_SPACE(sizeof(struct sctp_authinfo)); 1010 cmsg = (struct cmsghdr *)((caddr_t)cmsg + CMSG_SPACE(sizeof(struct sctp_authinfo))); 1011 break; 1012 case SCTP_SENDV_SPA: 1013 if ((info == NULL) || (infolen < sizeof(struct sctp_sendv_spa))) { 1014 free(cmsgbuf); 1015 errno = EINVAL; 1016 return (-1); 1017 } 1018 spa_info = (struct sctp_sendv_spa *)info; 1019 if (spa_info->sendv_flags & SCTP_SEND_SNDINFO_VALID) { 1020 cmsg->cmsg_level = IPPROTO_SCTP; 1021 cmsg->cmsg_type = SCTP_SNDINFO; 1022 cmsg->cmsg_len = CMSG_LEN(sizeof(struct sctp_sndinfo)); 1023 memcpy(CMSG_DATA(cmsg), &spa_info->sendv_sndinfo, sizeof(struct sctp_sndinfo)); 1024 msg.msg_controllen += CMSG_SPACE(sizeof(struct sctp_sndinfo)); 1025 cmsg = (struct cmsghdr *)((caddr_t)cmsg + CMSG_SPACE(sizeof(struct sctp_sndinfo))); 1026 } 1027 if (spa_info->sendv_flags & SCTP_SEND_PRINFO_VALID) { 1028 cmsg->cmsg_level = IPPROTO_SCTP; 1029 cmsg->cmsg_type = SCTP_PRINFO; 1030 cmsg->cmsg_len = CMSG_LEN(sizeof(struct sctp_prinfo)); 1031 memcpy(CMSG_DATA(cmsg), &spa_info->sendv_prinfo, sizeof(struct sctp_prinfo)); 1032 msg.msg_controllen += CMSG_SPACE(sizeof(struct sctp_prinfo)); 1033 cmsg = (struct cmsghdr *)((caddr_t)cmsg + CMSG_SPACE(sizeof(struct sctp_prinfo))); 1034 } 1035 if (spa_info->sendv_flags & SCTP_SEND_AUTHINFO_VALID) { 1036 cmsg->cmsg_level = IPPROTO_SCTP; 1037 cmsg->cmsg_type = SCTP_AUTHINFO; 1038 cmsg->cmsg_len = CMSG_LEN(sizeof(struct sctp_authinfo)); 1039 memcpy(CMSG_DATA(cmsg), &spa_info->sendv_authinfo, sizeof(struct sctp_authinfo)); 1040 msg.msg_controllen += CMSG_SPACE(sizeof(struct sctp_authinfo)); 1041 cmsg = (struct cmsghdr *)((caddr_t)cmsg + CMSG_SPACE(sizeof(struct sctp_authinfo))); 1042 } 1043 break; 1044 default: 1045 free(cmsgbuf); 1046 errno = EINVAL; 1047 return (-1); 1048 } 1049 addr = addrs; 1050 msg.msg_name = NULL; 1051 msg.msg_namelen = 0; 1052 1053 for (i = 0; i < addrcnt; i++) { 1054 switch (addr->sa_family) { 1055 case AF_INET: 1056 addr_len = (socklen_t) sizeof(struct sockaddr_in); 1057 addr_in = (struct sockaddr_in *)addr; 1058 if (addr_in->sin_len != addr_len) { 1059 free(cmsgbuf); 1060 errno = EINVAL; 1061 return (-1); 1062 } 1063 if (i == 0) { 1064 port = addr_in->sin_port; 1065 } else { 1066 if (port == addr_in->sin_port) { 1067 cmsg->cmsg_level = IPPROTO_SCTP; 1068 cmsg->cmsg_type = SCTP_DSTADDRV4; 1069 cmsg->cmsg_len = CMSG_LEN(sizeof(struct in_addr)); 1070 memcpy(CMSG_DATA(cmsg), &addr_in->sin_addr, sizeof(struct in_addr)); 1071 msg.msg_controllen += CMSG_SPACE(sizeof(struct in_addr)); 1072 cmsg = (struct cmsghdr *)((caddr_t)cmsg + CMSG_SPACE(sizeof(struct in_addr))); 1073 } else { 1074 free(cmsgbuf); 1075 errno = EINVAL; 1076 return (-1); 1077 } 1078 } 1079 break; 1080 case AF_INET6: 1081 addr_len = (socklen_t) sizeof(struct sockaddr_in6); 1082 addr_in6 = (struct sockaddr_in6 *)addr; 1083 if (addr_in6->sin6_len != addr_len) { 1084 free(cmsgbuf); 1085 errno = EINVAL; 1086 return (-1); 1087 } 1088 if (i == 0) { 1089 port = addr_in6->sin6_port; 1090 } else { 1091 if (port == addr_in6->sin6_port) { 1092 cmsg->cmsg_level = IPPROTO_SCTP; 1093 cmsg->cmsg_type = SCTP_DSTADDRV6; 1094 cmsg->cmsg_len = CMSG_LEN(sizeof(struct in6_addr)); 1095 memcpy(CMSG_DATA(cmsg), &addr_in6->sin6_addr, sizeof(struct in6_addr)); 1096 msg.msg_controllen += CMSG_SPACE(sizeof(struct in6_addr)); 1097 cmsg = (struct cmsghdr *)((caddr_t)cmsg + CMSG_SPACE(sizeof(struct in6_addr))); 1098 } else { 1099 free(cmsgbuf); 1100 errno = EINVAL; 1101 return (-1); 1102 } 1103 } 1104 break; 1105 default: 1106 free(cmsgbuf); 1107 errno = EINVAL; 1108 return (-1); 1109 } 1110 if (i == 0) { 1111 msg.msg_name = addr; 1112 msg.msg_namelen = addr_len; 1113 } 1114 addr = (struct sockaddr *)((caddr_t)addr + addr_len); 1115 } 1116 if (msg.msg_controllen == 0) { 1117 msg.msg_control = NULL; 1118 } 1119 msg.msg_iov = (struct iovec *)iov; 1120 msg.msg_iovlen = iovcnt; 1121 msg.msg_flags = 0; 1122 ret = sendmsg(sd, &msg, flags); 1123 free(cmsgbuf); 1124 return (ret); 1125 } 1126 1127 1128 #if !defined(SYS_sctp_peeloff) && !defined(HAVE_SCTP_PEELOFF_SOCKOPT) 1129 1130 int 1131 sctp_peeloff(int sd, sctp_assoc_t assoc_id) 1132 { 1133 /* NOT supported, return invalid sd */ 1134 errno = ENOTSUP; 1135 return (-1); 1136 } 1137 1138 #endif 1139 #if defined(SYS_sctp_peeloff) && !defined(HAVE_SCTP_PEELOFF_SOCKOPT) 1140 int 1141 sctp_peeloff(int sd, sctp_assoc_t assoc_id) 1142 { 1143 return (syscall(SYS_sctp_peeloff, sd, assoc_id)); 1144 } 1145 1146 #endif 1147 1148 #undef SCTP_CONTROL_VEC_SIZE_RCV 1149