xref: /freebsd/lib/libc/net/sctp_sys_calls.c (revision d3d381b2b194b4d24853e92eecef55f262688d1a)
1 /*-
2  * SPDX-License-Identifier: BSD-3-Clause
3  *
4  * Copyright (c) 2001-2007, by Cisco Systems, Inc. All rights reserved.
5  * Copyright (c) 2008-2012, by Randall Stewart. All rights reserved.
6  * Copyright (c) 2008-2012, by Michael Tuexen. All rights reserved.
7  *
8  * Redistribution and use in source and binary forms, with or without
9  * modification, are permitted provided that the following conditions are met:
10  *
11  * a) Redistributions of source code must retain the above copyright notice,
12  *    this list of conditions and the following disclaimer.
13  *
14  * b) Redistributions in binary form must reproduce the above copyright
15  *    notice, this list of conditions and the following disclaimer in
16  *    the documentation and/or other materials provided with the distribution.
17  *
18  * c) Neither the name of Cisco Systems, Inc. nor the names of its
19  *    contributors may be used to endorse or promote products derived
20  *    from this software without specific prior written permission.
21  *
22  * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
23  * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,
24  * THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
25  * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE
26  * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
27  * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
28  * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
29  * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
30  * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
31  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
32  * THE POSSIBILITY OF SUCH DAMAGE.
33  */
34 
35 #include <sys/cdefs.h>
36 __FBSDID("$FreeBSD$");
37 
38 #include <stdio.h>
39 #include <string.h>
40 #include <errno.h>
41 #include <stdlib.h>
42 #include <unistd.h>
43 #include <sys/types.h>
44 #include <sys/socket.h>
45 #include <sys/errno.h>
46 #include <sys/syscall.h>
47 #include <sys/uio.h>
48 #include <netinet/in.h>
49 #include <arpa/inet.h>
50 #include <netinet/sctp_uio.h>
51 #include <netinet/sctp.h>
52 
53 #ifndef IN6_IS_ADDR_V4MAPPED
54 #define IN6_IS_ADDR_V4MAPPED(a)		      \
55 	((*(const uint32_t *)(const void *)(&(a)->s6_addr[0]) == 0) &&	\
56 	 (*(const uint32_t *)(const void *)(&(a)->s6_addr[4]) == 0) &&	\
57 	 (*(const uint32_t *)(const void *)(&(a)->s6_addr[8]) == ntohl(0x0000ffff)))
58 #endif
59 
60 #define SCTP_CONTROL_VEC_SIZE_RCV  16384
61 
62 
63 static void
64 in6_sin6_2_sin(struct sockaddr_in *sin, struct sockaddr_in6 *sin6)
65 {
66 	bzero(sin, sizeof(*sin));
67 	sin->sin_len = sizeof(struct sockaddr_in);
68 	sin->sin_family = AF_INET;
69 	sin->sin_port = sin6->sin6_port;
70 	sin->sin_addr.s_addr = sin6->sin6_addr.__u6_addr.__u6_addr32[3];
71 }
72 
73 int
74 sctp_getaddrlen(sa_family_t family)
75 {
76 	int ret, sd;
77 	socklen_t siz;
78 	struct sctp_assoc_value av;
79 
80 	av.assoc_value = family;
81 	siz = sizeof(av);
82 #if defined(AF_INET)
83 	sd = socket(AF_INET, SOCK_SEQPACKET, IPPROTO_SCTP);
84 #elif defined(AF_INET6)
85 	sd = socket(AF_INET6, SOCK_SEQPACKET, IPPROTO_SCTP);
86 #else
87 	sd = -1;
88 #endif
89 	if (sd == -1) {
90 		return (-1);
91 	}
92 	ret = getsockopt(sd, IPPROTO_SCTP, SCTP_GET_ADDR_LEN, &av, &siz);
93 	close(sd);
94 	if (ret == 0) {
95 		return ((int)av.assoc_value);
96 	} else {
97 		return (-1);
98 	}
99 }
100 
101 int
102 sctp_connectx(int sd, const struct sockaddr *addrs, int addrcnt,
103     sctp_assoc_t * id)
104 {
105 	char *buf;
106 	int i, ret, *aa;
107 	char *cpto;
108 	const struct sockaddr *at;
109 	size_t len;
110 
111 	/* validate the address count and list */
112 	if ((addrs == NULL) || (addrcnt <= 0)) {
113 		errno = EINVAL;
114 		return (-1);
115 	}
116 	if ((buf = malloc(sizeof(int) + (size_t)addrcnt * sizeof(struct sockaddr_in6))) == NULL) {
117 		errno = E2BIG;
118 		return (-1);
119 	}
120 	len = sizeof(int);
121 	at = addrs;
122 	cpto = buf + sizeof(int);
123 	/* validate all the addresses and get the size */
124 	for (i = 0; i < addrcnt; i++) {
125 		switch (at->sa_family) {
126 		case AF_INET:
127 			if (at->sa_len != sizeof(struct sockaddr_in)) {
128 				free(buf);
129 				errno = EINVAL;
130 				return (-1);
131 			}
132 			memcpy(cpto, at, sizeof(struct sockaddr_in));
133 			cpto = ((caddr_t)cpto + sizeof(struct sockaddr_in));
134 			len += sizeof(struct sockaddr_in);
135 			break;
136 		case AF_INET6:
137 			if (at->sa_len != sizeof(struct sockaddr_in6)) {
138 				free(buf);
139 				errno = EINVAL;
140 				return (-1);
141 			}
142 			if (IN6_IS_ADDR_V4MAPPED(&((struct sockaddr_in6 *)at)->sin6_addr)) {
143 				in6_sin6_2_sin((struct sockaddr_in *)cpto, (struct sockaddr_in6 *)at);
144 				cpto = ((caddr_t)cpto + sizeof(struct sockaddr_in));
145 				len += sizeof(struct sockaddr_in);
146 			} else {
147 				memcpy(cpto, at, sizeof(struct sockaddr_in6));
148 				cpto = ((caddr_t)cpto + sizeof(struct sockaddr_in6));
149 				len += sizeof(struct sockaddr_in6);
150 			}
151 			break;
152 		default:
153 			free(buf);
154 			errno = EINVAL;
155 			return (-1);
156 		}
157 		at = (struct sockaddr *)((caddr_t)at + at->sa_len);
158 	}
159 	aa = (int *)buf;
160 	*aa = addrcnt;
161 	ret = setsockopt(sd, IPPROTO_SCTP, SCTP_CONNECT_X, (void *)buf,
162 	    (socklen_t) len);
163 	if ((ret == 0) && (id != NULL)) {
164 		*id = *(sctp_assoc_t *) buf;
165 	}
166 	free(buf);
167 	return (ret);
168 }
169 
170 int
171 sctp_bindx(int sd, struct sockaddr *addrs, int addrcnt, int flags)
172 {
173 	struct sctp_getaddresses *gaddrs;
174 	struct sockaddr *sa;
175 	struct sockaddr_in *sin;
176 	struct sockaddr_in6 *sin6;
177 	int i;
178 	size_t argsz;
179 	uint16_t sport = 0;
180 
181 	/* validate the flags */
182 	if ((flags != SCTP_BINDX_ADD_ADDR) &&
183 	    (flags != SCTP_BINDX_REM_ADDR)) {
184 		errno = EFAULT;
185 		return (-1);
186 	}
187 	/* validate the address count and list */
188 	if ((addrcnt <= 0) || (addrs == NULL)) {
189 		errno = EINVAL;
190 		return (-1);
191 	}
192 	/* First pre-screen the addresses */
193 	sa = addrs;
194 	for (i = 0; i < addrcnt; i++) {
195 		switch (sa->sa_family) {
196 		case AF_INET:
197 			if (sa->sa_len != sizeof(struct sockaddr_in)) {
198 				errno = EINVAL;
199 				return (-1);
200 			}
201 			sin = (struct sockaddr_in *)sa;
202 			if (sin->sin_port) {
203 				/* non-zero port, check or save */
204 				if (sport) {
205 					/* Check against our port */
206 					if (sport != sin->sin_port) {
207 						errno = EINVAL;
208 						return (-1);
209 					}
210 				} else {
211 					/* save off the port */
212 					sport = sin->sin_port;
213 				}
214 			}
215 			break;
216 		case AF_INET6:
217 			if (sa->sa_len != sizeof(struct sockaddr_in6)) {
218 				errno = EINVAL;
219 				return (-1);
220 			}
221 			sin6 = (struct sockaddr_in6 *)sa;
222 			if (sin6->sin6_port) {
223 				/* non-zero port, check or save */
224 				if (sport) {
225 					/* Check against our port */
226 					if (sport != sin6->sin6_port) {
227 						errno = EINVAL;
228 						return (-1);
229 					}
230 				} else {
231 					/* save off the port */
232 					sport = sin6->sin6_port;
233 				}
234 			}
235 			break;
236 		default:
237 			/* Invalid address family specified. */
238 			errno = EAFNOSUPPORT;
239 			return (-1);
240 		}
241 		sa = (struct sockaddr *)((caddr_t)sa + sa->sa_len);
242 	}
243 	argsz = sizeof(struct sctp_getaddresses) +
244 	    sizeof(struct sockaddr_storage);
245 	if ((gaddrs = (struct sctp_getaddresses *)malloc(argsz)) == NULL) {
246 		errno = ENOMEM;
247 		return (-1);
248 	}
249 	sa = addrs;
250 	for (i = 0; i < addrcnt; i++) {
251 		memset(gaddrs, 0, argsz);
252 		gaddrs->sget_assoc_id = 0;
253 		memcpy(gaddrs->addr, sa, sa->sa_len);
254 		/*
255 		 * Now, if there was a port mentioned, assure that the first
256 		 * address has that port to make sure it fails or succeeds
257 		 * correctly.
258 		 */
259 		if ((i == 0) && (sport != 0)) {
260 			switch (gaddrs->addr->sa_family) {
261 			case AF_INET:
262 				sin = (struct sockaddr_in *)gaddrs->addr;
263 				sin->sin_port = sport;
264 				break;
265 			case AF_INET6:
266 				sin6 = (struct sockaddr_in6 *)gaddrs->addr;
267 				sin6->sin6_port = sport;
268 				break;
269 			}
270 		}
271 		if (setsockopt(sd, IPPROTO_SCTP, flags, gaddrs,
272 		    (socklen_t) argsz) != 0) {
273 			free(gaddrs);
274 			return (-1);
275 		}
276 		sa = (struct sockaddr *)((caddr_t)sa + sa->sa_len);
277 	}
278 	free(gaddrs);
279 	return (0);
280 }
281 
282 int
283 sctp_opt_info(int sd, sctp_assoc_t id, int opt, void *arg, socklen_t * size)
284 {
285 	if (arg == NULL) {
286 		errno = EINVAL;
287 		return (-1);
288 	}
289 	if ((id == SCTP_CURRENT_ASSOC) ||
290 	    (id == SCTP_ALL_ASSOC)) {
291 		errno = EINVAL;
292 		return (-1);
293 	}
294 	switch (opt) {
295 	case SCTP_RTOINFO:
296 		((struct sctp_rtoinfo *)arg)->srto_assoc_id = id;
297 		break;
298 	case SCTP_ASSOCINFO:
299 		((struct sctp_assocparams *)arg)->sasoc_assoc_id = id;
300 		break;
301 	case SCTP_DEFAULT_SEND_PARAM:
302 		((struct sctp_assocparams *)arg)->sasoc_assoc_id = id;
303 		break;
304 	case SCTP_PRIMARY_ADDR:
305 		((struct sctp_setprim *)arg)->ssp_assoc_id = id;
306 		break;
307 	case SCTP_PEER_ADDR_PARAMS:
308 		((struct sctp_paddrparams *)arg)->spp_assoc_id = id;
309 		break;
310 	case SCTP_MAXSEG:
311 		((struct sctp_assoc_value *)arg)->assoc_id = id;
312 		break;
313 	case SCTP_AUTH_KEY:
314 		((struct sctp_authkey *)arg)->sca_assoc_id = id;
315 		break;
316 	case SCTP_AUTH_ACTIVE_KEY:
317 		((struct sctp_authkeyid *)arg)->scact_assoc_id = id;
318 		break;
319 	case SCTP_DELAYED_SACK:
320 		((struct sctp_sack_info *)arg)->sack_assoc_id = id;
321 		break;
322 	case SCTP_CONTEXT:
323 		((struct sctp_assoc_value *)arg)->assoc_id = id;
324 		break;
325 	case SCTP_STATUS:
326 		((struct sctp_status *)arg)->sstat_assoc_id = id;
327 		break;
328 	case SCTP_GET_PEER_ADDR_INFO:
329 		((struct sctp_paddrinfo *)arg)->spinfo_assoc_id = id;
330 		break;
331 	case SCTP_PEER_AUTH_CHUNKS:
332 		((struct sctp_authchunks *)arg)->gauth_assoc_id = id;
333 		break;
334 	case SCTP_LOCAL_AUTH_CHUNKS:
335 		((struct sctp_authchunks *)arg)->gauth_assoc_id = id;
336 		break;
337 	case SCTP_TIMEOUTS:
338 		((struct sctp_timeouts *)arg)->stimo_assoc_id = id;
339 		break;
340 	case SCTP_EVENT:
341 		((struct sctp_event *)arg)->se_assoc_id = id;
342 		break;
343 	case SCTP_DEFAULT_SNDINFO:
344 		((struct sctp_sndinfo *)arg)->snd_assoc_id = id;
345 		break;
346 	case SCTP_DEFAULT_PRINFO:
347 		((struct sctp_default_prinfo *)arg)->pr_assoc_id = id;
348 		break;
349 	case SCTP_PEER_ADDR_THLDS:
350 		((struct sctp_paddrthlds *)arg)->spt_assoc_id = id;
351 		break;
352 	case SCTP_REMOTE_UDP_ENCAPS_PORT:
353 		((struct sctp_udpencaps *)arg)->sue_assoc_id = id;
354 		break;
355 	case SCTP_ECN_SUPPORTED:
356 		((struct sctp_assoc_value *)arg)->assoc_id = id;
357 		break;
358 	case SCTP_PR_SUPPORTED:
359 		((struct sctp_assoc_value *)arg)->assoc_id = id;
360 		break;
361 	case SCTP_AUTH_SUPPORTED:
362 		((struct sctp_assoc_value *)arg)->assoc_id = id;
363 		break;
364 	case SCTP_ASCONF_SUPPORTED:
365 		((struct sctp_assoc_value *)arg)->assoc_id = id;
366 		break;
367 	case SCTP_RECONFIG_SUPPORTED:
368 		((struct sctp_assoc_value *)arg)->assoc_id = id;
369 		break;
370 	case SCTP_NRSACK_SUPPORTED:
371 		((struct sctp_assoc_value *)arg)->assoc_id = id;
372 		break;
373 	case SCTP_PKTDROP_SUPPORTED:
374 		((struct sctp_assoc_value *)arg)->assoc_id = id;
375 		break;
376 	case SCTP_MAX_BURST:
377 		((struct sctp_assoc_value *)arg)->assoc_id = id;
378 		break;
379 	case SCTP_ENABLE_STREAM_RESET:
380 		((struct sctp_assoc_value *)arg)->assoc_id = id;
381 		break;
382 	case SCTP_PR_STREAM_STATUS:
383 		((struct sctp_prstatus *)arg)->sprstat_assoc_id = id;
384 		break;
385 	case SCTP_PR_ASSOC_STATUS:
386 		((struct sctp_prstatus *)arg)->sprstat_assoc_id = id;
387 		break;
388 	case SCTP_MAX_CWND:
389 		((struct sctp_assoc_value *)arg)->assoc_id = id;
390 		break;
391 	default:
392 		break;
393 	}
394 	return (getsockopt(sd, IPPROTO_SCTP, opt, arg, size));
395 }
396 
397 int
398 sctp_getpaddrs(int sd, sctp_assoc_t id, struct sockaddr **raddrs)
399 {
400 	struct sctp_getaddresses *addrs;
401 	struct sockaddr *sa;
402 	sctp_assoc_t asoc;
403 	caddr_t lim;
404 	socklen_t opt_len;
405 	int cnt;
406 
407 	if (raddrs == NULL) {
408 		errno = EFAULT;
409 		return (-1);
410 	}
411 	asoc = id;
412 	opt_len = (socklen_t) sizeof(sctp_assoc_t);
413 	if (getsockopt(sd, IPPROTO_SCTP, SCTP_GET_REMOTE_ADDR_SIZE,
414 	    &asoc, &opt_len) != 0) {
415 		return (-1);
416 	}
417 	/* size required is returned in 'asoc' */
418 	opt_len = (socklen_t) ((size_t)asoc + sizeof(struct sctp_getaddresses));
419 	addrs = calloc(1, (size_t)opt_len);
420 	if (addrs == NULL) {
421 		errno = ENOMEM;
422 		return (-1);
423 	}
424 	addrs->sget_assoc_id = id;
425 	/* Now lets get the array of addresses */
426 	if (getsockopt(sd, IPPROTO_SCTP, SCTP_GET_PEER_ADDRESSES,
427 	    addrs, &opt_len) != 0) {
428 		free(addrs);
429 		return (-1);
430 	}
431 	*raddrs = (struct sockaddr *)&addrs->addr[0];
432 	cnt = 0;
433 	sa = (struct sockaddr *)&addrs->addr[0];
434 	lim = (caddr_t)addrs + opt_len;
435 	while (((caddr_t)sa < lim) && (sa->sa_len > 0)) {
436 		sa = (struct sockaddr *)((caddr_t)sa + sa->sa_len);
437 		cnt++;
438 	}
439 	return (cnt);
440 }
441 
442 void
443 sctp_freepaddrs(struct sockaddr *addrs)
444 {
445 	void *fr_addr;
446 
447 	/* Take away the hidden association id */
448 	fr_addr = (void *)((caddr_t)addrs - sizeof(sctp_assoc_t));
449 	/* Now free it */
450 	free(fr_addr);
451 }
452 
453 int
454 sctp_getladdrs(int sd, sctp_assoc_t id, struct sockaddr **raddrs)
455 {
456 	struct sctp_getaddresses *addrs;
457 	caddr_t lim;
458 	struct sockaddr *sa;
459 	size_t size_of_addresses;
460 	socklen_t opt_len;
461 	int cnt;
462 
463 	if (raddrs == NULL) {
464 		errno = EFAULT;
465 		return (-1);
466 	}
467 	size_of_addresses = 0;
468 	opt_len = (socklen_t) sizeof(int);
469 	if (getsockopt(sd, IPPROTO_SCTP, SCTP_GET_LOCAL_ADDR_SIZE,
470 	    &size_of_addresses, &opt_len) != 0) {
471 		errno = ENOMEM;
472 		return (-1);
473 	}
474 	if (size_of_addresses == 0) {
475 		errno = ENOTCONN;
476 		return (-1);
477 	}
478 	opt_len = (socklen_t) (size_of_addresses +
479 	    sizeof(struct sockaddr_storage) +
480 	    sizeof(struct sctp_getaddresses));
481 	addrs = calloc(1, (size_t)opt_len);
482 	if (addrs == NULL) {
483 		errno = ENOMEM;
484 		return (-1);
485 	}
486 	addrs->sget_assoc_id = id;
487 	/* Now lets get the array of addresses */
488 	if (getsockopt(sd, IPPROTO_SCTP, SCTP_GET_LOCAL_ADDRESSES, addrs,
489 	    &opt_len) != 0) {
490 		free(addrs);
491 		errno = ENOMEM;
492 		return (-1);
493 	}
494 	*raddrs = (struct sockaddr *)&addrs->addr[0];
495 	cnt = 0;
496 	sa = (struct sockaddr *)&addrs->addr[0];
497 	lim = (caddr_t)addrs + opt_len;
498 	while (((caddr_t)sa < lim) && (sa->sa_len > 0)) {
499 		sa = (struct sockaddr *)((caddr_t)sa + sa->sa_len);
500 		cnt++;
501 	}
502 	return (cnt);
503 }
504 
505 void
506 sctp_freeladdrs(struct sockaddr *addrs)
507 {
508 	void *fr_addr;
509 
510 	/* Take away the hidden association id */
511 	fr_addr = (void *)((caddr_t)addrs - sizeof(sctp_assoc_t));
512 	/* Now free it */
513 	free(fr_addr);
514 }
515 
516 ssize_t
517 sctp_sendmsg(int s,
518     const void *data,
519     size_t len,
520     const struct sockaddr *to,
521     socklen_t tolen,
522     uint32_t ppid,
523     uint32_t flags,
524     uint16_t stream_no,
525     uint32_t timetolive,
526     uint32_t context)
527 {
528 #ifdef SYS_sctp_generic_sendmsg
529 	struct sctp_sndrcvinfo sinfo;
530 
531 	memset(&sinfo, 0, sizeof(struct sctp_sndrcvinfo));
532 	sinfo.sinfo_ppid = ppid;
533 	sinfo.sinfo_flags = flags;
534 	sinfo.sinfo_stream = stream_no;
535 	sinfo.sinfo_timetolive = timetolive;
536 	sinfo.sinfo_context = context;
537 	sinfo.sinfo_assoc_id = 0;
538 	return (syscall(SYS_sctp_generic_sendmsg, s,
539 	    data, len, to, tolen, &sinfo, 0));
540 #else
541 	struct msghdr msg;
542 	struct sctp_sndrcvinfo *sinfo;
543 	struct iovec iov;
544 	char cmsgbuf[CMSG_SPACE(sizeof(struct sctp_sndrcvinfo))];
545 	struct cmsghdr *cmsg;
546 	struct sockaddr *who = NULL;
547 	union {
548 		struct sockaddr_in in;
549 		struct sockaddr_in6 in6;
550 	}     addr;
551 
552 	if ((tolen > 0) &&
553 	    ((to == NULL) || (tolen < sizeof(struct sockaddr)))) {
554 		errno = EINVAL;
555 		return (-1);
556 	}
557 	if ((to != NULL) && (tolen > 0)) {
558 		switch (to->sa_family) {
559 		case AF_INET:
560 			if (tolen != sizeof(struct sockaddr_in)) {
561 				errno = EINVAL;
562 				return (-1);
563 			}
564 			if ((to->sa_len > 0) &&
565 			    (to->sa_len != sizeof(struct sockaddr_in))) {
566 				errno = EINVAL;
567 				return (-1);
568 			}
569 			memcpy(&addr, to, sizeof(struct sockaddr_in));
570 			addr.in.sin_len = sizeof(struct sockaddr_in);
571 			break;
572 		case AF_INET6:
573 			if (tolen != sizeof(struct sockaddr_in6)) {
574 				errno = EINVAL;
575 				return (-1);
576 			}
577 			if ((to->sa_len > 0) &&
578 			    (to->sa_len != sizeof(struct sockaddr_in6))) {
579 				errno = EINVAL;
580 				return (-1);
581 			}
582 			memcpy(&addr, to, sizeof(struct sockaddr_in6));
583 			addr.in6.sin6_len = sizeof(struct sockaddr_in6);
584 			break;
585 		default:
586 			errno = EAFNOSUPPORT;
587 			return (-1);
588 		}
589 		who = (struct sockaddr *)&addr;
590 	}
591 	iov.iov_base = (char *)data;
592 	iov.iov_len = len;
593 
594 	if (who) {
595 		msg.msg_name = (caddr_t)who;
596 		msg.msg_namelen = who->sa_len;
597 	} else {
598 		msg.msg_name = (caddr_t)NULL;
599 		msg.msg_namelen = 0;
600 	}
601 	msg.msg_iov = &iov;
602 	msg.msg_iovlen = 1;
603 	msg.msg_control = cmsgbuf;
604 	msg.msg_controllen = CMSG_SPACE(sizeof(struct sctp_sndrcvinfo));
605 	msg.msg_flags = 0;
606 	cmsg = (struct cmsghdr *)cmsgbuf;
607 	cmsg->cmsg_level = IPPROTO_SCTP;
608 	cmsg->cmsg_type = SCTP_SNDRCV;
609 	cmsg->cmsg_len = CMSG_LEN(sizeof(struct sctp_sndrcvinfo));
610 	sinfo = (struct sctp_sndrcvinfo *)CMSG_DATA(cmsg);
611 	memset(sinfo, 0, sizeof(struct sctp_sndrcvinfo));
612 	sinfo->sinfo_stream = stream_no;
613 	sinfo->sinfo_ssn = 0;
614 	sinfo->sinfo_flags = flags;
615 	sinfo->sinfo_ppid = ppid;
616 	sinfo->sinfo_context = context;
617 	sinfo->sinfo_assoc_id = 0;
618 	sinfo->sinfo_timetolive = timetolive;
619 	return (sendmsg(s, &msg, 0));
620 #endif
621 }
622 
623 
624 sctp_assoc_t
625 sctp_getassocid(int sd, struct sockaddr *sa)
626 {
627 	struct sctp_paddrinfo sp;
628 	socklen_t siz;
629 
630 	/* First get the assoc id */
631 	siz = sizeof(sp);
632 	memset(&sp, 0, sizeof(sp));
633 	memcpy((caddr_t)&sp.spinfo_address, sa, sa->sa_len);
634 	if (getsockopt(sd, IPPROTO_SCTP,
635 	    SCTP_GET_PEER_ADDR_INFO, &sp, &siz) != 0) {
636 		/* We depend on the fact that 0 can never be returned */
637 		return ((sctp_assoc_t) 0);
638 	}
639 	return (sp.spinfo_assoc_id);
640 }
641 
642 ssize_t
643 sctp_send(int sd, const void *data, size_t len,
644     const struct sctp_sndrcvinfo *sinfo,
645     int flags)
646 {
647 
648 #ifdef SYS_sctp_generic_sendmsg
649 	struct sockaddr *to = NULL;
650 
651 	return (syscall(SYS_sctp_generic_sendmsg, sd,
652 	    data, len, to, 0, sinfo, flags));
653 #else
654 	struct msghdr msg;
655 	struct iovec iov;
656 	char cmsgbuf[CMSG_SPACE(sizeof(struct sctp_sndrcvinfo))];
657 	struct cmsghdr *cmsg;
658 
659 	if (sinfo == NULL) {
660 		errno = EINVAL;
661 		return (-1);
662 	}
663 	iov.iov_base = (char *)data;
664 	iov.iov_len = len;
665 
666 	msg.msg_name = NULL;
667 	msg.msg_namelen = 0;
668 	msg.msg_iov = &iov;
669 	msg.msg_iovlen = 1;
670 	msg.msg_control = cmsgbuf;
671 	msg.msg_controllen = CMSG_SPACE(sizeof(struct sctp_sndrcvinfo));
672 	msg.msg_flags = 0;
673 	cmsg = (struct cmsghdr *)cmsgbuf;
674 	cmsg->cmsg_level = IPPROTO_SCTP;
675 	cmsg->cmsg_type = SCTP_SNDRCV;
676 	cmsg->cmsg_len = CMSG_LEN(sizeof(struct sctp_sndrcvinfo));
677 	memcpy(CMSG_DATA(cmsg), sinfo, sizeof(struct sctp_sndrcvinfo));
678 	return (sendmsg(sd, &msg, flags));
679 #endif
680 }
681 
682 
683 
684 ssize_t
685 sctp_sendx(int sd, const void *msg, size_t msg_len,
686     struct sockaddr *addrs, int addrcnt,
687     struct sctp_sndrcvinfo *sinfo,
688     int flags)
689 {
690 	struct sctp_sndrcvinfo __sinfo;
691 	ssize_t ret;
692 	int i, cnt, *aa, saved_errno;
693 	char *buf;
694 	int no_end_cx = 0;
695 	size_t len, add_len;
696 	struct sockaddr *at;
697 
698 	if (addrs == NULL) {
699 		errno = EINVAL;
700 		return (-1);
701 	}
702 #ifdef SYS_sctp_generic_sendmsg
703 	if (addrcnt == 1) {
704 		socklen_t l;
705 		ssize_t ret;
706 
707 		/*
708 		 * Quick way, we don't need to do a connectx so lets use the
709 		 * syscall directly.
710 		 */
711 		l = addrs->sa_len;
712 		ret = syscall(SYS_sctp_generic_sendmsg, sd,
713 		    msg, msg_len, addrs, l, sinfo, flags);
714 		if ((ret >= 0) && (sinfo != NULL)) {
715 			sinfo->sinfo_assoc_id = sctp_getassocid(sd, addrs);
716 		}
717 		return (ret);
718 	}
719 #endif
720 
721 	len = sizeof(int);
722 	at = addrs;
723 	cnt = 0;
724 	/* validate all the addresses and get the size */
725 	for (i = 0; i < addrcnt; i++) {
726 		if (at->sa_family == AF_INET) {
727 			add_len = sizeof(struct sockaddr_in);
728 		} else if (at->sa_family == AF_INET6) {
729 			add_len = sizeof(struct sockaddr_in6);
730 		} else {
731 			errno = EINVAL;
732 			return (-1);
733 		}
734 		len += add_len;
735 		at = (struct sockaddr *)((caddr_t)at + add_len);
736 		cnt++;
737 	}
738 	/* do we have any? */
739 	if (cnt == 0) {
740 		errno = EINVAL;
741 		return (-1);
742 	}
743 	buf = malloc(len);
744 	if (buf == NULL) {
745 		errno = ENOMEM;
746 		return (-1);
747 	}
748 	aa = (int *)buf;
749 	*aa = cnt;
750 	aa++;
751 	memcpy((caddr_t)aa, addrs, (size_t)(len - sizeof(int)));
752 	ret = setsockopt(sd, IPPROTO_SCTP, SCTP_CONNECT_X_DELAYED, (void *)buf,
753 	    (socklen_t) len);
754 
755 	free(buf);
756 	if (ret != 0) {
757 		if (errno == EALREADY) {
758 			no_end_cx = 1;
759 			goto continue_send;
760 		}
761 		return (ret);
762 	}
763 continue_send:
764 	if (sinfo == NULL) {
765 		sinfo = &__sinfo;
766 		memset(&__sinfo, 0, sizeof(__sinfo));
767 	}
768 	sinfo->sinfo_assoc_id = sctp_getassocid(sd, addrs);
769 	if (sinfo->sinfo_assoc_id == 0) {
770 		(void)setsockopt(sd, IPPROTO_SCTP, SCTP_CONNECT_X_COMPLETE, (void *)addrs,
771 		    (socklen_t) addrs->sa_len);
772 		errno = ENOENT;
773 		return (-1);
774 	}
775 	ret = sctp_send(sd, msg, msg_len, sinfo, flags);
776 	saved_errno = errno;
777 	if (no_end_cx == 0)
778 		(void)setsockopt(sd, IPPROTO_SCTP, SCTP_CONNECT_X_COMPLETE, (void *)addrs,
779 		    (socklen_t) addrs->sa_len);
780 
781 	errno = saved_errno;
782 	return (ret);
783 }
784 
785 ssize_t
786 sctp_sendmsgx(int sd,
787     const void *msg,
788     size_t len,
789     struct sockaddr *addrs,
790     int addrcnt,
791     uint32_t ppid,
792     uint32_t flags,
793     uint16_t stream_no,
794     uint32_t timetolive,
795     uint32_t context)
796 {
797 	struct sctp_sndrcvinfo sinfo;
798 
799 	memset((void *)&sinfo, 0, sizeof(struct sctp_sndrcvinfo));
800 	sinfo.sinfo_ppid = ppid;
801 	sinfo.sinfo_flags = flags;
802 	sinfo.sinfo_stream = stream_no;
803 	sinfo.sinfo_timetolive = timetolive;
804 	sinfo.sinfo_context = context;
805 	return (sctp_sendx(sd, msg, len, addrs, addrcnt, &sinfo, 0));
806 }
807 
808 ssize_t
809 sctp_recvmsg(int s,
810     void *dbuf,
811     size_t len,
812     struct sockaddr *from,
813     socklen_t * fromlen,
814     struct sctp_sndrcvinfo *sinfo,
815     int *msg_flags)
816 {
817 #ifdef SYS_sctp_generic_recvmsg
818 	struct iovec iov;
819 
820 	iov.iov_base = dbuf;
821 	iov.iov_len = len;
822 	return (syscall(SYS_sctp_generic_recvmsg, s,
823 	    &iov, 1, from, fromlen, sinfo, msg_flags));
824 #else
825 	ssize_t sz;
826 	struct msghdr msg;
827 	struct iovec iov;
828 	char cmsgbuf[SCTP_CONTROL_VEC_SIZE_RCV];
829 	struct cmsghdr *cmsg;
830 
831 	if (msg_flags == NULL) {
832 		errno = EINVAL;
833 		return (-1);
834 	}
835 	iov.iov_base = dbuf;
836 	iov.iov_len = len;
837 	msg.msg_name = (caddr_t)from;
838 	if (fromlen == NULL)
839 		msg.msg_namelen = 0;
840 	else
841 		msg.msg_namelen = *fromlen;
842 	msg.msg_iov = &iov;
843 	msg.msg_iovlen = 1;
844 	msg.msg_control = cmsgbuf;
845 	msg.msg_controllen = sizeof(cmsgbuf);
846 	msg.msg_flags = 0;
847 	sz = recvmsg(s, &msg, *msg_flags);
848 	*msg_flags = msg.msg_flags;
849 	if (sz <= 0) {
850 		return (sz);
851 	}
852 	if (sinfo) {
853 		sinfo->sinfo_assoc_id = 0;
854 	}
855 	if ((msg.msg_controllen > 0) && (sinfo != NULL)) {
856 		/*
857 		 * parse through and see if we find the sctp_sndrcvinfo (if
858 		 * the user wants it).
859 		 */
860 		for (cmsg = CMSG_FIRSTHDR(&msg); cmsg; cmsg = CMSG_NXTHDR(&msg, cmsg)) {
861 			if (cmsg->cmsg_level != IPPROTO_SCTP) {
862 				continue;
863 			}
864 			if (cmsg->cmsg_type == SCTP_SNDRCV) {
865 				memcpy(sinfo, CMSG_DATA(cmsg), sizeof(struct sctp_sndrcvinfo));
866 				break;
867 			}
868 			if (cmsg->cmsg_type == SCTP_EXTRCV) {
869 				/*
870 				 * Let's hope that the user provided enough
871 				 * enough memory. At least he asked for more
872 				 * information.
873 				 */
874 				memcpy(sinfo, CMSG_DATA(cmsg), sizeof(struct sctp_extrcvinfo));
875 				break;
876 			}
877 		}
878 	}
879 	return (sz);
880 #endif
881 }
882 
883 ssize_t
884 sctp_recvv(int sd,
885     const struct iovec *iov,
886     int iovlen,
887     struct sockaddr *from,
888     socklen_t * fromlen,
889     void *info,
890     socklen_t * infolen,
891     unsigned int *infotype,
892     int *flags)
893 {
894 	char cmsgbuf[SCTP_CONTROL_VEC_SIZE_RCV];
895 	struct msghdr msg;
896 	struct cmsghdr *cmsg;
897 	ssize_t ret;
898 	struct sctp_rcvinfo *rcvinfo;
899 	struct sctp_nxtinfo *nxtinfo;
900 
901 	if (((info != NULL) && (infolen == NULL)) ||
902 	    ((info == NULL) && (infolen != NULL) && (*infolen != 0)) ||
903 	    ((info != NULL) && (infotype == NULL))) {
904 		errno = EINVAL;
905 		return (-1);
906 	}
907 	if (infotype) {
908 		*infotype = SCTP_RECVV_NOINFO;
909 	}
910 	msg.msg_name = from;
911 	if (fromlen == NULL) {
912 		msg.msg_namelen = 0;
913 	} else {
914 		msg.msg_namelen = *fromlen;
915 	}
916 	msg.msg_iov = (struct iovec *)iov;
917 	msg.msg_iovlen = iovlen;
918 	msg.msg_control = cmsgbuf;
919 	msg.msg_controllen = sizeof(cmsgbuf);
920 	msg.msg_flags = 0;
921 	ret = recvmsg(sd, &msg, *flags);
922 	*flags = msg.msg_flags;
923 	if ((ret > 0) &&
924 	    (msg.msg_controllen > 0) &&
925 	    (infotype != NULL) &&
926 	    (infolen != NULL) &&
927 	    (*infolen > 0)) {
928 		rcvinfo = NULL;
929 		nxtinfo = NULL;
930 		for (cmsg = CMSG_FIRSTHDR(&msg); cmsg; cmsg = CMSG_NXTHDR(&msg, cmsg)) {
931 			if (cmsg->cmsg_level != IPPROTO_SCTP) {
932 				continue;
933 			}
934 			if (cmsg->cmsg_type == SCTP_RCVINFO) {
935 				rcvinfo = (struct sctp_rcvinfo *)CMSG_DATA(cmsg);
936 				if (nxtinfo != NULL) {
937 					break;
938 				} else {
939 					continue;
940 				}
941 			}
942 			if (cmsg->cmsg_type == SCTP_NXTINFO) {
943 				nxtinfo = (struct sctp_nxtinfo *)CMSG_DATA(cmsg);
944 				if (rcvinfo != NULL) {
945 					break;
946 				} else {
947 					continue;
948 				}
949 			}
950 		}
951 		if (rcvinfo != NULL) {
952 			if ((nxtinfo != NULL) && (*infolen >= sizeof(struct sctp_recvv_rn))) {
953 				struct sctp_recvv_rn *rn_info;
954 
955 				rn_info = (struct sctp_recvv_rn *)info;
956 				rn_info->recvv_rcvinfo = *rcvinfo;
957 				rn_info->recvv_nxtinfo = *nxtinfo;
958 				*infolen = (socklen_t) sizeof(struct sctp_recvv_rn);
959 				*infotype = SCTP_RECVV_RN;
960 			} else if (*infolen >= sizeof(struct sctp_rcvinfo)) {
961 				memcpy(info, rcvinfo, sizeof(struct sctp_rcvinfo));
962 				*infolen = (socklen_t) sizeof(struct sctp_rcvinfo);
963 				*infotype = SCTP_RECVV_RCVINFO;
964 			}
965 		} else if (nxtinfo != NULL) {
966 			if (*infolen >= sizeof(struct sctp_nxtinfo)) {
967 				memcpy(info, nxtinfo, sizeof(struct sctp_nxtinfo));
968 				*infolen = (socklen_t) sizeof(struct sctp_nxtinfo);
969 				*infotype = SCTP_RECVV_NXTINFO;
970 			}
971 		}
972 	}
973 	return (ret);
974 }
975 
976 ssize_t
977 sctp_sendv(int sd,
978     const struct iovec *iov, int iovcnt,
979     struct sockaddr *addrs, int addrcnt,
980     void *info, socklen_t infolen, unsigned int infotype,
981     int flags)
982 {
983 	ssize_t ret;
984 	int i;
985 	socklen_t addr_len;
986 	struct msghdr msg;
987 	in_port_t port;
988 	struct sctp_sendv_spa *spa_info;
989 	struct cmsghdr *cmsg;
990 	char *cmsgbuf;
991 	struct sockaddr *addr;
992 	struct sockaddr_in *addr_in;
993 	struct sockaddr_in6 *addr_in6;
994 	sctp_assoc_t *assoc_id;
995 
996 	if ((addrcnt < 0) ||
997 	    (iovcnt < 0) ||
998 	    ((addrs == NULL) && (addrcnt > 0)) ||
999 	    ((addrs != NULL) && (addrcnt == 0)) ||
1000 	    ((iov == NULL) && (iovcnt > 0)) ||
1001 	    ((iov != NULL) && (iovcnt == 0))) {
1002 		errno = EINVAL;
1003 		return (-1);
1004 	}
1005 	cmsgbuf = malloc(CMSG_SPACE(sizeof(struct sctp_sndinfo)) +
1006 	    CMSG_SPACE(sizeof(struct sctp_prinfo)) +
1007 	    CMSG_SPACE(sizeof(struct sctp_authinfo)) +
1008 	    (size_t)addrcnt * CMSG_SPACE(sizeof(struct in6_addr)));
1009 	if (cmsgbuf == NULL) {
1010 		errno = ENOMEM;
1011 		return (-1);
1012 	}
1013 	assoc_id = NULL;
1014 	msg.msg_control = cmsgbuf;
1015 	msg.msg_controllen = 0;
1016 	cmsg = (struct cmsghdr *)cmsgbuf;
1017 	switch (infotype) {
1018 	case SCTP_SENDV_NOINFO:
1019 		if ((infolen != 0) || (info != NULL)) {
1020 			free(cmsgbuf);
1021 			errno = EINVAL;
1022 			return (-1);
1023 		}
1024 		break;
1025 	case SCTP_SENDV_SNDINFO:
1026 		if ((info == NULL) || (infolen < sizeof(struct sctp_sndinfo))) {
1027 			free(cmsgbuf);
1028 			errno = EINVAL;
1029 			return (-1);
1030 		}
1031 		cmsg->cmsg_level = IPPROTO_SCTP;
1032 		cmsg->cmsg_type = SCTP_SNDINFO;
1033 		cmsg->cmsg_len = CMSG_LEN(sizeof(struct sctp_sndinfo));
1034 		memcpy(CMSG_DATA(cmsg), info, sizeof(struct sctp_sndinfo));
1035 		msg.msg_controllen += CMSG_SPACE(sizeof(struct sctp_sndinfo));
1036 		cmsg = (struct cmsghdr *)((caddr_t)cmsg + CMSG_SPACE(sizeof(struct sctp_sndinfo)));
1037 		assoc_id = &(((struct sctp_sndinfo *)info)->snd_assoc_id);
1038 		break;
1039 	case SCTP_SENDV_PRINFO:
1040 		if ((info == NULL) || (infolen < sizeof(struct sctp_prinfo))) {
1041 			free(cmsgbuf);
1042 			errno = EINVAL;
1043 			return (-1);
1044 		}
1045 		cmsg->cmsg_level = IPPROTO_SCTP;
1046 		cmsg->cmsg_type = SCTP_PRINFO;
1047 		cmsg->cmsg_len = CMSG_LEN(sizeof(struct sctp_prinfo));
1048 		memcpy(CMSG_DATA(cmsg), info, sizeof(struct sctp_prinfo));
1049 		msg.msg_controllen += CMSG_SPACE(sizeof(struct sctp_prinfo));
1050 		cmsg = (struct cmsghdr *)((caddr_t)cmsg + CMSG_SPACE(sizeof(struct sctp_prinfo)));
1051 		break;
1052 	case SCTP_SENDV_AUTHINFO:
1053 		if ((info == NULL) || (infolen < sizeof(struct sctp_authinfo))) {
1054 			free(cmsgbuf);
1055 			errno = EINVAL;
1056 			return (-1);
1057 		}
1058 		cmsg->cmsg_level = IPPROTO_SCTP;
1059 		cmsg->cmsg_type = SCTP_AUTHINFO;
1060 		cmsg->cmsg_len = CMSG_LEN(sizeof(struct sctp_authinfo));
1061 		memcpy(CMSG_DATA(cmsg), info, sizeof(struct sctp_authinfo));
1062 		msg.msg_controllen += CMSG_SPACE(sizeof(struct sctp_authinfo));
1063 		cmsg = (struct cmsghdr *)((caddr_t)cmsg + CMSG_SPACE(sizeof(struct sctp_authinfo)));
1064 		break;
1065 	case SCTP_SENDV_SPA:
1066 		if ((info == NULL) || (infolen < sizeof(struct sctp_sendv_spa))) {
1067 			free(cmsgbuf);
1068 			errno = EINVAL;
1069 			return (-1);
1070 		}
1071 		spa_info = (struct sctp_sendv_spa *)info;
1072 		if (spa_info->sendv_flags & SCTP_SEND_SNDINFO_VALID) {
1073 			cmsg->cmsg_level = IPPROTO_SCTP;
1074 			cmsg->cmsg_type = SCTP_SNDINFO;
1075 			cmsg->cmsg_len = CMSG_LEN(sizeof(struct sctp_sndinfo));
1076 			memcpy(CMSG_DATA(cmsg), &spa_info->sendv_sndinfo, sizeof(struct sctp_sndinfo));
1077 			msg.msg_controllen += CMSG_SPACE(sizeof(struct sctp_sndinfo));
1078 			cmsg = (struct cmsghdr *)((caddr_t)cmsg + CMSG_SPACE(sizeof(struct sctp_sndinfo)));
1079 			assoc_id = &(spa_info->sendv_sndinfo.snd_assoc_id);
1080 		}
1081 		if (spa_info->sendv_flags & SCTP_SEND_PRINFO_VALID) {
1082 			cmsg->cmsg_level = IPPROTO_SCTP;
1083 			cmsg->cmsg_type = SCTP_PRINFO;
1084 			cmsg->cmsg_len = CMSG_LEN(sizeof(struct sctp_prinfo));
1085 			memcpy(CMSG_DATA(cmsg), &spa_info->sendv_prinfo, sizeof(struct sctp_prinfo));
1086 			msg.msg_controllen += CMSG_SPACE(sizeof(struct sctp_prinfo));
1087 			cmsg = (struct cmsghdr *)((caddr_t)cmsg + CMSG_SPACE(sizeof(struct sctp_prinfo)));
1088 		}
1089 		if (spa_info->sendv_flags & SCTP_SEND_AUTHINFO_VALID) {
1090 			cmsg->cmsg_level = IPPROTO_SCTP;
1091 			cmsg->cmsg_type = SCTP_AUTHINFO;
1092 			cmsg->cmsg_len = CMSG_LEN(sizeof(struct sctp_authinfo));
1093 			memcpy(CMSG_DATA(cmsg), &spa_info->sendv_authinfo, sizeof(struct sctp_authinfo));
1094 			msg.msg_controllen += CMSG_SPACE(sizeof(struct sctp_authinfo));
1095 			cmsg = (struct cmsghdr *)((caddr_t)cmsg + CMSG_SPACE(sizeof(struct sctp_authinfo)));
1096 		}
1097 		break;
1098 	default:
1099 		free(cmsgbuf);
1100 		errno = EINVAL;
1101 		return (-1);
1102 	}
1103 	addr = addrs;
1104 	msg.msg_name = NULL;
1105 	msg.msg_namelen = 0;
1106 
1107 	for (i = 0; i < addrcnt; i++) {
1108 		switch (addr->sa_family) {
1109 		case AF_INET:
1110 			addr_len = (socklen_t) sizeof(struct sockaddr_in);
1111 			addr_in = (struct sockaddr_in *)addr;
1112 			if (addr_in->sin_len != addr_len) {
1113 				free(cmsgbuf);
1114 				errno = EINVAL;
1115 				return (-1);
1116 			}
1117 			if (i == 0) {
1118 				port = addr_in->sin_port;
1119 			} else {
1120 				if (port == addr_in->sin_port) {
1121 					cmsg->cmsg_level = IPPROTO_SCTP;
1122 					cmsg->cmsg_type = SCTP_DSTADDRV4;
1123 					cmsg->cmsg_len = CMSG_LEN(sizeof(struct in_addr));
1124 					memcpy(CMSG_DATA(cmsg), &addr_in->sin_addr, sizeof(struct in_addr));
1125 					msg.msg_controllen += CMSG_SPACE(sizeof(struct in_addr));
1126 					cmsg = (struct cmsghdr *)((caddr_t)cmsg + CMSG_SPACE(sizeof(struct in_addr)));
1127 				} else {
1128 					free(cmsgbuf);
1129 					errno = EINVAL;
1130 					return (-1);
1131 				}
1132 			}
1133 			break;
1134 		case AF_INET6:
1135 			addr_len = (socklen_t) sizeof(struct sockaddr_in6);
1136 			addr_in6 = (struct sockaddr_in6 *)addr;
1137 			if (addr_in6->sin6_len != addr_len) {
1138 				free(cmsgbuf);
1139 				errno = EINVAL;
1140 				return (-1);
1141 			}
1142 			if (i == 0) {
1143 				port = addr_in6->sin6_port;
1144 			} else {
1145 				if (port == addr_in6->sin6_port) {
1146 					cmsg->cmsg_level = IPPROTO_SCTP;
1147 					cmsg->cmsg_type = SCTP_DSTADDRV6;
1148 					cmsg->cmsg_len = CMSG_LEN(sizeof(struct in6_addr));
1149 					memcpy(CMSG_DATA(cmsg), &addr_in6->sin6_addr, sizeof(struct in6_addr));
1150 					msg.msg_controllen += CMSG_SPACE(sizeof(struct in6_addr));
1151 					cmsg = (struct cmsghdr *)((caddr_t)cmsg + CMSG_SPACE(sizeof(struct in6_addr)));
1152 				} else {
1153 					free(cmsgbuf);
1154 					errno = EINVAL;
1155 					return (-1);
1156 				}
1157 			}
1158 			break;
1159 		default:
1160 			free(cmsgbuf);
1161 			errno = EINVAL;
1162 			return (-1);
1163 		}
1164 		if (i == 0) {
1165 			msg.msg_name = addr;
1166 			msg.msg_namelen = addr_len;
1167 		}
1168 		addr = (struct sockaddr *)((caddr_t)addr + addr_len);
1169 	}
1170 	if (msg.msg_controllen == 0) {
1171 		msg.msg_control = NULL;
1172 	}
1173 	msg.msg_iov = (struct iovec *)iov;
1174 	msg.msg_iovlen = iovcnt;
1175 	msg.msg_flags = 0;
1176 	ret = sendmsg(sd, &msg, flags);
1177 	free(cmsgbuf);
1178 	if ((ret >= 0) && (addrs != NULL) && (assoc_id != NULL)) {
1179 		*assoc_id = sctp_getassocid(sd, addrs);
1180 	}
1181 	return (ret);
1182 }
1183 
1184 
1185 #if !defined(SYS_sctp_peeloff) && !defined(HAVE_SCTP_PEELOFF_SOCKOPT)
1186 
1187 int
1188 sctp_peeloff(int sd, sctp_assoc_t assoc_id)
1189 {
1190 	/* NOT supported, return invalid sd */
1191 	errno = ENOTSUP;
1192 	return (-1);
1193 }
1194 
1195 #endif
1196 #if defined(SYS_sctp_peeloff) && !defined(HAVE_SCTP_PEELOFF_SOCKOPT)
1197 int
1198 sctp_peeloff(int sd, sctp_assoc_t assoc_id)
1199 {
1200 	return (syscall(SYS_sctp_peeloff, sd, assoc_id));
1201 }
1202 
1203 #endif
1204 
1205 #undef SCTP_CONTROL_VEC_SIZE_RCV
1206