sctp_sys_calls.c revision 253104
1/*- 2 * Copyright (c) 2001-2007, by Cisco Systems, Inc. All rights reserved. 3 * Copyright (c) 2008-2012, by Randall Stewart. All rights reserved. 4 * Copyright (c) 2008-2012, by Michael Tuexen. All rights reserved. 5 * 6 * Redistribution and use in source and binary forms, with or without 7 * modification, are permitted provided that the following conditions are met: 8 * 9 * a) Redistributions of source code must retain the above copyright notice, 10 * this list of conditions and the following disclaimer. 11 * 12 * b) Redistributions in binary form must reproduce the above copyright 13 * notice, this list of conditions and the following disclaimer in 14 * the documentation and/or other materials provided with the distribution. 15 * 16 * c) Neither the name of Cisco Systems, Inc. nor the names of its 17 * contributors may be used to endorse or promote products derived 18 * from this software without specific prior written permission. 19 * 20 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS 21 * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, 22 * THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 23 * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE 24 * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR 25 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF 26 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS 27 * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN 28 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) 29 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF 30 * THE POSSIBILITY OF SUCH DAMAGE. 31 */ 32 33#include <sys/cdefs.h> 34__FBSDID("$FreeBSD: head/lib/libc/net/sctp_sys_calls.c 253104 2013-07-09 19:04:19Z tuexen $"); 35 36#include <stdio.h> 37#include <string.h> 38#include <errno.h> 39#include <stdlib.h> 40#include <unistd.h> 41#include <sys/types.h> 42#include <sys/socket.h> 43#include <sys/errno.h> 44#include <sys/syscall.h> 45#include <sys/uio.h> 46#include <netinet/in.h> 47#include <arpa/inet.h> 48#include <netinet/sctp_uio.h> 49#include <netinet/sctp.h> 50 51#ifndef IN6_IS_ADDR_V4MAPPED 52#define IN6_IS_ADDR_V4MAPPED(a) \ 53 ((*(const uint32_t *)(const void *)(&(a)->s6_addr[0]) == 0) && \ 54 (*(const uint32_t *)(const void *)(&(a)->s6_addr[4]) == 0) && \ 55 (*(const uint32_t *)(const void *)(&(a)->s6_addr[8]) == ntohl(0x0000ffff))) 56#endif 57 58#define SCTP_CONTROL_VEC_SIZE_RCV 16384 59 60 61static void 62in6_sin6_2_sin(struct sockaddr_in *sin, struct sockaddr_in6 *sin6) 63{ 64 bzero(sin, sizeof(*sin)); 65 sin->sin_len = sizeof(struct sockaddr_in); 66 sin->sin_family = AF_INET; 67 sin->sin_port = sin6->sin6_port; 68 sin->sin_addr.s_addr = sin6->sin6_addr.__u6_addr.__u6_addr32[3]; 69} 70 71int 72sctp_getaddrlen(sa_family_t family) 73{ 74 int ret, sd; 75 socklen_t siz; 76 struct sctp_assoc_value av; 77 78 av.assoc_value = family; 79 siz = sizeof(av); 80#if defined(AF_INET) 81 sd = socket(AF_INET, SOCK_SEQPACKET, IPPROTO_SCTP); 82#elif defined(AF_INET6) 83 sd = socket(AF_INET6, SOCK_SEQPACKET, IPPROTO_SCTP); 84#else 85 sd = -1; 86#endif 87 if (sd == -1) { 88 return (-1); 89 } 90 ret = getsockopt(sd, IPPROTO_SCTP, SCTP_GET_ADDR_LEN, &av, &siz); 91 close(sd); 92 if (ret == 0) { 93 return ((int)av.assoc_value); 94 } else { 95 return (-1); 96 } 97} 98 99int 100sctp_connectx(int sd, const struct sockaddr *addrs, int addrcnt, 101 sctp_assoc_t * id) 102{ 103 char *buf; 104 int i, ret, cnt, *aa; 105 char *cpto; 106 const struct sockaddr *at; 107 size_t len = sizeof(int); 108 109 /* validate the address count and list */ 110 if ((addrs == NULL) || (addrcnt <= 0)) { 111 errno = EINVAL; 112 return (-1); 113 } 114 if ((buf = malloc(sizeof(int) + (size_t)addrcnt * sizeof(struct sockaddr_in6))) == NULL) { 115 errno = E2BIG; 116 return (-1); 117 } 118 at = addrs; 119 cnt = 0; 120 cpto = buf + sizeof(int); 121 /* validate all the addresses and get the size */ 122 for (i = 0; i < addrcnt; i++) { 123 switch (at->sa_family) { 124 case AF_INET: 125 if (at->sa_len != sizeof(struct sockaddr_in)) { 126 free(buf); 127 errno = EINVAL; 128 return (-1); 129 } 130 memcpy(cpto, at, sizeof(struct sockaddr_in)); 131 cpto = ((caddr_t)cpto + sizeof(struct sockaddr_in)); 132 len += sizeof(struct sockaddr_in); 133 break; 134 case AF_INET6: 135 if (at->sa_len != sizeof(struct sockaddr_in6)) { 136 free(buf); 137 errno = EINVAL; 138 return (-1); 139 } 140 if (IN6_IS_ADDR_V4MAPPED(&((struct sockaddr_in6 *)at)->sin6_addr)) { 141 in6_sin6_2_sin((struct sockaddr_in *)cpto, (struct sockaddr_in6 *)at); 142 cpto = ((caddr_t)cpto + sizeof(struct sockaddr_in)); 143 len += sizeof(struct sockaddr_in); 144 } else { 145 memcpy(cpto, at, sizeof(struct sockaddr_in6)); 146 cpto = ((caddr_t)cpto + sizeof(struct sockaddr_in6)); 147 len += sizeof(struct sockaddr_in6); 148 } 149 break; 150 default: 151 free(buf); 152 errno = EINVAL; 153 return (-1); 154 } 155 at = (struct sockaddr *)((caddr_t)at + at->sa_len); 156 } 157 aa = (int *)buf; 158 *aa = addrcnt; 159 ret = setsockopt(sd, IPPROTO_SCTP, SCTP_CONNECT_X, (void *)buf, 160 (socklen_t) len); 161 if ((ret == 0) && (id != NULL)) { 162 *id = *(sctp_assoc_t *) buf; 163 } 164 return (ret); 165} 166 167int 168sctp_bindx(int sd, struct sockaddr *addrs, int addrcnt, int flags) 169{ 170 struct sctp_getaddresses *gaddrs; 171 struct sockaddr *sa; 172 struct sockaddr_in *sin; 173 struct sockaddr_in6 *sin6; 174 int i; 175 size_t argsz; 176 uint16_t sport = 0; 177 178 /* validate the flags */ 179 if ((flags != SCTP_BINDX_ADD_ADDR) && 180 (flags != SCTP_BINDX_REM_ADDR)) { 181 errno = EFAULT; 182 return (-1); 183 } 184 /* validate the address count and list */ 185 if ((addrcnt <= 0) || (addrs == NULL)) { 186 errno = EINVAL; 187 return (-1); 188 } 189 /* First pre-screen the addresses */ 190 sa = addrs; 191 for (i = 0; i < addrcnt; i++) { 192 switch (sa->sa_family) { 193 case AF_INET: 194 if (sa->sa_len != sizeof(struct sockaddr_in)) { 195 errno = EINVAL; 196 return (-1); 197 } 198 sin = (struct sockaddr_in *)sa; 199 if (sin->sin_port) { 200 /* non-zero port, check or save */ 201 if (sport) { 202 /* Check against our port */ 203 if (sport != sin->sin_port) { 204 errno = EINVAL; 205 return (-1); 206 } 207 } else { 208 /* save off the port */ 209 sport = sin->sin_port; 210 } 211 } 212 break; 213 case AF_INET6: 214 if (sa->sa_len != sizeof(struct sockaddr_in6)) { 215 errno = EINVAL; 216 return (-1); 217 } 218 sin6 = (struct sockaddr_in6 *)sa; 219 if (sin6->sin6_port) { 220 /* non-zero port, check or save */ 221 if (sport) { 222 /* Check against our port */ 223 if (sport != sin6->sin6_port) { 224 errno = EINVAL; 225 return (-1); 226 } 227 } else { 228 /* save off the port */ 229 sport = sin6->sin6_port; 230 } 231 } 232 break; 233 default: 234 /* Invalid address family specified. */ 235 errno = EINVAL; 236 return (-1); 237 } 238 sa = (struct sockaddr *)((caddr_t)sa + sa->sa_len); 239 } 240 /* 241 * Now if there was a port mentioned, assure that the first address 242 * has that port to make sure it fails or succeeds correctly. 243 */ 244 if (sport) { 245 sin = (struct sockaddr_in *)sa; 246 sin->sin_port = sport; 247 } 248 argsz = sizeof(struct sctp_getaddresses) + 249 sizeof(struct sockaddr_storage); 250 if ((gaddrs = (struct sctp_getaddresses *)malloc(argsz)) == NULL) { 251 errno = ENOMEM; 252 return (-1); 253 } 254 sa = addrs; 255 for (i = 0; i < addrcnt; i++) { 256 memset(gaddrs, 0, argsz); 257 gaddrs->sget_assoc_id = 0; 258 memcpy(gaddrs->addr, sa, sa->sa_len); 259 if (setsockopt(sd, IPPROTO_SCTP, flags, gaddrs, 260 (socklen_t) argsz) != 0) { 261 free(gaddrs); 262 return (-1); 263 } 264 sa = (struct sockaddr *)((caddr_t)sa + sa->sa_len); 265 } 266 free(gaddrs); 267 return (0); 268} 269 270int 271sctp_opt_info(int sd, sctp_assoc_t id, int opt, void *arg, socklen_t * size) 272{ 273 if (arg == NULL) { 274 errno = EINVAL; 275 return (-1); 276 } 277 switch (opt) { 278 case SCTP_RTOINFO: 279 ((struct sctp_rtoinfo *)arg)->srto_assoc_id = id; 280 break; 281 case SCTP_ASSOCINFO: 282 ((struct sctp_assocparams *)arg)->sasoc_assoc_id = id; 283 break; 284 case SCTP_DEFAULT_SEND_PARAM: 285 ((struct sctp_assocparams *)arg)->sasoc_assoc_id = id; 286 break; 287 case SCTP_PRIMARY_ADDR: 288 ((struct sctp_setprim *)arg)->ssp_assoc_id = id; 289 break; 290 case SCTP_PEER_ADDR_PARAMS: 291 ((struct sctp_paddrparams *)arg)->spp_assoc_id = id; 292 break; 293 case SCTP_MAXSEG: 294 ((struct sctp_assoc_value *)arg)->assoc_id = id; 295 break; 296 case SCTP_AUTH_KEY: 297 ((struct sctp_authkey *)arg)->sca_assoc_id = id; 298 break; 299 case SCTP_AUTH_ACTIVE_KEY: 300 ((struct sctp_authkeyid *)arg)->scact_assoc_id = id; 301 break; 302 case SCTP_DELAYED_SACK: 303 ((struct sctp_sack_info *)arg)->sack_assoc_id = id; 304 break; 305 case SCTP_CONTEXT: 306 ((struct sctp_assoc_value *)arg)->assoc_id = id; 307 break; 308 case SCTP_STATUS: 309 ((struct sctp_status *)arg)->sstat_assoc_id = id; 310 break; 311 case SCTP_GET_PEER_ADDR_INFO: 312 ((struct sctp_paddrinfo *)arg)->spinfo_assoc_id = id; 313 break; 314 case SCTP_PEER_AUTH_CHUNKS: 315 ((struct sctp_authchunks *)arg)->gauth_assoc_id = id; 316 break; 317 case SCTP_LOCAL_AUTH_CHUNKS: 318 ((struct sctp_authchunks *)arg)->gauth_assoc_id = id; 319 break; 320 case SCTP_TIMEOUTS: 321 ((struct sctp_timeouts *)arg)->stimo_assoc_id = id; 322 break; 323 case SCTP_EVENT: 324 ((struct sctp_event *)arg)->se_assoc_id = id; 325 break; 326 case SCTP_DEFAULT_SNDINFO: 327 ((struct sctp_sndinfo *)arg)->snd_assoc_id = id; 328 break; 329 case SCTP_DEFAULT_PRINFO: 330 ((struct sctp_default_prinfo *)arg)->pr_assoc_id = id; 331 break; 332 case SCTP_PEER_ADDR_THLDS: 333 ((struct sctp_paddrthlds *)arg)->spt_assoc_id = id; 334 break; 335 case SCTP_REMOTE_UDP_ENCAPS_PORT: 336 ((struct sctp_udpencaps *)arg)->sue_assoc_id = id; 337 break; 338 case SCTP_MAX_BURST: 339 ((struct sctp_assoc_value *)arg)->assoc_id = id; 340 break; 341 case SCTP_ENABLE_STREAM_RESET: 342 ((struct sctp_assoc_value *)arg)->assoc_id = id; 343 break; 344 default: 345 break; 346 } 347 return (getsockopt(sd, IPPROTO_SCTP, opt, arg, size)); 348} 349 350int 351sctp_getpaddrs(int sd, sctp_assoc_t id, struct sockaddr **raddrs) 352{ 353 struct sctp_getaddresses *addrs; 354 struct sockaddr *sa; 355 sctp_assoc_t asoc; 356 caddr_t lim; 357 socklen_t opt_len; 358 int cnt; 359 360 if (raddrs == NULL) { 361 errno = EFAULT; 362 return (-1); 363 } 364 asoc = id; 365 opt_len = (socklen_t) sizeof(sctp_assoc_t); 366 if (getsockopt(sd, IPPROTO_SCTP, SCTP_GET_REMOTE_ADDR_SIZE, 367 &asoc, &opt_len) != 0) { 368 return (-1); 369 } 370 /* size required is returned in 'asoc' */ 371 opt_len = (socklen_t) ((size_t)asoc + sizeof(struct sctp_getaddresses)); 372 addrs = calloc(1, (size_t)opt_len); 373 if (addrs == NULL) { 374 errno = ENOMEM; 375 return (-1); 376 } 377 addrs->sget_assoc_id = id; 378 /* Now lets get the array of addresses */ 379 if (getsockopt(sd, IPPROTO_SCTP, SCTP_GET_PEER_ADDRESSES, 380 addrs, &opt_len) != 0) { 381 free(addrs); 382 return (-1); 383 } 384 *raddrs = (struct sockaddr *)&addrs->addr[0]; 385 cnt = 0; 386 sa = (struct sockaddr *)&addrs->addr[0]; 387 lim = (caddr_t)addrs + opt_len; 388 while (((caddr_t)sa < lim) && (sa->sa_len > 0)) { 389 sa = (struct sockaddr *)((caddr_t)sa + sa->sa_len); 390 cnt++; 391 } 392 return (cnt); 393} 394 395void 396sctp_freepaddrs(struct sockaddr *addrs) 397{ 398 void *fr_addr; 399 400 /* Take away the hidden association id */ 401 fr_addr = (void *)((caddr_t)addrs - sizeof(sctp_assoc_t)); 402 /* Now free it */ 403 free(fr_addr); 404} 405 406int 407sctp_getladdrs(int sd, sctp_assoc_t id, struct sockaddr **raddrs) 408{ 409 struct sctp_getaddresses *addrs; 410 caddr_t lim; 411 struct sockaddr *sa; 412 size_t size_of_addresses; 413 socklen_t opt_len; 414 int cnt; 415 416 if (raddrs == NULL) { 417 errno = EFAULT; 418 return (-1); 419 } 420 size_of_addresses = 0; 421 opt_len = (socklen_t) sizeof(int); 422 if (getsockopt(sd, IPPROTO_SCTP, SCTP_GET_LOCAL_ADDR_SIZE, 423 &size_of_addresses, &opt_len) != 0) { 424 errno = ENOMEM; 425 return (-1); 426 } 427 if (size_of_addresses == 0) { 428 errno = ENOTCONN; 429 return (-1); 430 } 431 opt_len = (socklen_t) (size_of_addresses + 432 sizeof(struct sockaddr_storage) + 433 sizeof(struct sctp_getaddresses)); 434 addrs = calloc(1, (size_t)opt_len); 435 if (addrs == NULL) { 436 errno = ENOMEM; 437 return (-1); 438 } 439 addrs->sget_assoc_id = id; 440 /* Now lets get the array of addresses */ 441 if (getsockopt(sd, IPPROTO_SCTP, SCTP_GET_LOCAL_ADDRESSES, addrs, 442 &opt_len) != 0) { 443 free(addrs); 444 errno = ENOMEM; 445 return (-1); 446 } 447 *raddrs = (struct sockaddr *)&addrs->addr[0]; 448 cnt = 0; 449 sa = (struct sockaddr *)&addrs->addr[0]; 450 lim = (caddr_t)addrs + opt_len; 451 while (((caddr_t)sa < lim) && (sa->sa_len > 0)) { 452 sa = (struct sockaddr *)((caddr_t)sa + sa->sa_len); 453 cnt++; 454 } 455 return (cnt); 456} 457 458void 459sctp_freeladdrs(struct sockaddr *addrs) 460{ 461 void *fr_addr; 462 463 /* Take away the hidden association id */ 464 fr_addr = (void *)((caddr_t)addrs - sizeof(sctp_assoc_t)); 465 /* Now free it */ 466 free(fr_addr); 467} 468 469ssize_t 470sctp_sendmsg(int s, 471 const void *data, 472 size_t len, 473 const struct sockaddr *to, 474 socklen_t tolen, 475 uint32_t ppid, 476 uint32_t flags, 477 uint16_t stream_no, 478 uint32_t timetolive, 479 uint32_t context) 480{ 481#ifdef SYS_sctp_generic_sendmsg 482 struct sctp_sndrcvinfo sinfo; 483 484 memset(&sinfo, 0, sizeof(struct sctp_sndrcvinfo)); 485 sinfo.sinfo_ppid = ppid; 486 sinfo.sinfo_flags = flags; 487 sinfo.sinfo_stream = stream_no; 488 sinfo.sinfo_timetolive = timetolive; 489 sinfo.sinfo_context = context; 490 sinfo.sinfo_assoc_id = 0; 491 return (syscall(SYS_sctp_generic_sendmsg, s, 492 data, len, to, tolen, &sinfo, 0)); 493#else 494 struct msghdr msg; 495 struct sctp_sndrcvinfo *sinfo; 496 struct iovec iov; 497 char cmsgbuf[CMSG_SPACE(sizeof(struct sctp_sndrcvinfo))]; 498 struct cmsghdr *cmsg; 499 struct sockaddr *who = NULL; 500 union { 501 struct sockaddr_in in; 502 struct sockaddr_in6 in6; 503 } addr; 504 505 if ((tolen > 0) && 506 ((to == NULL) || (tolen < sizeof(struct sockaddr)))) { 507 errno = EINVAL; 508 return (-1); 509 } 510 if ((to != NULL) && (tolen > 0)) { 511 switch (to->sa_family) { 512 case AF_INET: 513 if (tolen != sizeof(struct sockaddr_in)) { 514 errno = EINVAL; 515 return (-1); 516 } 517 if ((to->sa_len > 0) && 518 (to->sa_len != sizeof(struct sockaddr_in))) { 519 errno = EINVAL; 520 return (-1); 521 } 522 memcpy(&addr, to, sizeof(struct sockaddr_in)); 523 addr.in.sin_len = sizeof(struct sockaddr_in); 524 break; 525 case AF_INET6: 526 if (tolen != sizeof(struct sockaddr_in6)) { 527 errno = EINVAL; 528 return (-1); 529 } 530 if ((to->sa_len > 0) && 531 (to->sa_len != sizeof(struct sockaddr_in6))) { 532 errno = EINVAL; 533 return (-1); 534 } 535 memcpy(&addr, to, sizeof(struct sockaddr_in6)); 536 addr.in6.sin6_len = sizeof(struct sockaddr_in6); 537 break; 538 default: 539 errno = EAFNOSUPPORT; 540 return (-1); 541 } 542 who = (struct sockaddr *)&addr; 543 } 544 iov.iov_base = (char *)data; 545 iov.iov_len = len; 546 547 if (who) { 548 msg.msg_name = (caddr_t)who; 549 msg.msg_namelen = who->sa_len; 550 } else { 551 msg.msg_name = (caddr_t)NULL; 552 msg.msg_namelen = 0; 553 } 554 msg.msg_iov = &iov; 555 msg.msg_iovlen = 1; 556 msg.msg_control = cmsgbuf; 557 msg.msg_controllen = CMSG_SPACE(sizeof(struct sctp_sndrcvinfo)); 558 cmsg = (struct cmsghdr *)cmsgbuf; 559 cmsg->cmsg_level = IPPROTO_SCTP; 560 cmsg->cmsg_type = SCTP_SNDRCV; 561 cmsg->cmsg_len = CMSG_LEN(sizeof(struct sctp_sndrcvinfo)); 562 sinfo = (struct sctp_sndrcvinfo *)CMSG_DATA(cmsg); 563 sinfo->sinfo_stream = stream_no; 564 sinfo->sinfo_ssn = 0; 565 sinfo->sinfo_flags = flags; 566 sinfo->sinfo_ppid = ppid; 567 sinfo->sinfo_context = context; 568 sinfo->sinfo_assoc_id = 0; 569 sinfo->sinfo_timetolive = timetolive; 570 return (sendmsg(s, &msg, 0)); 571#endif 572} 573 574 575sctp_assoc_t 576sctp_getassocid(int sd, struct sockaddr *sa) 577{ 578 struct sctp_paddrinfo sp; 579 socklen_t siz; 580 581 /* First get the assoc id */ 582 siz = sizeof(sp); 583 memset(&sp, 0, sizeof(sp)); 584 memcpy((caddr_t)&sp.spinfo_address, sa, sa->sa_len); 585 if (getsockopt(sd, IPPROTO_SCTP, 586 SCTP_GET_PEER_ADDR_INFO, &sp, &siz) != 0) { 587 /* We depend on the fact that 0 can never be returned */ 588 return ((sctp_assoc_t) 0); 589 } 590 return (sp.spinfo_assoc_id); 591} 592 593ssize_t 594sctp_send(int sd, const void *data, size_t len, 595 const struct sctp_sndrcvinfo *sinfo, 596 int flags) 597{ 598 599#ifdef SYS_sctp_generic_sendmsg 600 struct sockaddr *to = NULL; 601 602 return (syscall(SYS_sctp_generic_sendmsg, sd, 603 data, len, to, 0, sinfo, flags)); 604#else 605 struct msghdr msg; 606 struct iovec iov; 607 char cmsgbuf[CMSG_SPACE(sizeof(struct sctp_sndrcvinfo))]; 608 struct cmsghdr *cmsg; 609 610 if (sinfo == NULL) { 611 errno = EINVAL; 612 return (-1); 613 } 614 iov.iov_base = (char *)data; 615 iov.iov_len = len; 616 617 msg.msg_name = NULL; 618 msg.msg_namelen = 0; 619 msg.msg_iov = &iov; 620 msg.msg_iovlen = 1; 621 msg.msg_control = cmsgbuf; 622 msg.msg_controllen = CMSG_SPACE(sizeof(struct sctp_sndrcvinfo)); 623 cmsg = (struct cmsghdr *)cmsgbuf; 624 cmsg->cmsg_level = IPPROTO_SCTP; 625 cmsg->cmsg_type = SCTP_SNDRCV; 626 cmsg->cmsg_len = CMSG_LEN(sizeof(struct sctp_sndrcvinfo)); 627 memcpy(CMSG_DATA(cmsg), sinfo, sizeof(struct sctp_sndrcvinfo)); 628 return (sendmsg(sd, &msg, flags)); 629#endif 630} 631 632 633 634ssize_t 635sctp_sendx(int sd, const void *msg, size_t msg_len, 636 struct sockaddr *addrs, int addrcnt, 637 struct sctp_sndrcvinfo *sinfo, 638 int flags) 639{ 640 struct sctp_sndrcvinfo __sinfo; 641 ssize_t ret; 642 int i, cnt, *aa, saved_errno; 643 char *buf; 644 int no_end_cx = 0; 645 size_t len, add_len; 646 struct sockaddr *at; 647 648 if (addrs == NULL) { 649 errno = EINVAL; 650 return (-1); 651 } 652#ifdef SYS_sctp_generic_sendmsg 653 if (addrcnt == 1) { 654 socklen_t l; 655 656 /* 657 * Quick way, we don't need to do a connectx so lets use the 658 * syscall directly. 659 */ 660 l = addrs->sa_len; 661 return (syscall(SYS_sctp_generic_sendmsg, sd, 662 msg, msg_len, addrs, l, sinfo, flags)); 663 } 664#endif 665 666 len = sizeof(int); 667 at = addrs; 668 cnt = 0; 669 /* validate all the addresses and get the size */ 670 for (i = 0; i < addrcnt; i++) { 671 if (at->sa_family == AF_INET) { 672 add_len = sizeof(struct sockaddr_in); 673 } else if (at->sa_family == AF_INET6) { 674 add_len = sizeof(struct sockaddr_in6); 675 } else { 676 errno = EINVAL; 677 return (-1); 678 } 679 len += add_len; 680 at = (struct sockaddr *)((caddr_t)at + add_len); 681 cnt++; 682 } 683 /* do we have any? */ 684 if (cnt == 0) { 685 errno = EINVAL; 686 return (-1); 687 } 688 buf = malloc(len); 689 if (buf == NULL) { 690 errno = ENOMEM; 691 return (-1); 692 } 693 aa = (int *)buf; 694 *aa = cnt; 695 aa++; 696 memcpy((caddr_t)aa, addrs, (size_t)(len - sizeof(int))); 697 ret = setsockopt(sd, IPPROTO_SCTP, SCTP_CONNECT_X_DELAYED, (void *)buf, 698 (socklen_t) len); 699 700 free(buf); 701 if (ret != 0) { 702 if (errno == EALREADY) { 703 no_end_cx = 1; 704 goto continue_send; 705 } 706 return (ret); 707 } 708continue_send: 709 if (sinfo == NULL) { 710 sinfo = &__sinfo; 711 memset(&__sinfo, 0, sizeof(__sinfo)); 712 } 713 sinfo->sinfo_assoc_id = sctp_getassocid(sd, addrs); 714 if (sinfo->sinfo_assoc_id == 0) { 715 (void)setsockopt(sd, IPPROTO_SCTP, SCTP_CONNECT_X_COMPLETE, (void *)addrs, 716 (socklen_t) addrs->sa_len); 717 errno = ENOENT; 718 return (-1); 719 } 720 ret = sctp_send(sd, msg, msg_len, sinfo, flags); 721 saved_errno = errno; 722 if (no_end_cx == 0) 723 (void)setsockopt(sd, IPPROTO_SCTP, SCTP_CONNECT_X_COMPLETE, (void *)addrs, 724 (socklen_t) addrs->sa_len); 725 726 errno = saved_errno; 727 return (ret); 728} 729 730ssize_t 731sctp_sendmsgx(int sd, 732 const void *msg, 733 size_t len, 734 struct sockaddr *addrs, 735 int addrcnt, 736 uint32_t ppid, 737 uint32_t flags, 738 uint16_t stream_no, 739 uint32_t timetolive, 740 uint32_t context) 741{ 742 struct sctp_sndrcvinfo sinfo; 743 744 memset((void *)&sinfo, 0, sizeof(struct sctp_sndrcvinfo)); 745 sinfo.sinfo_ppid = ppid; 746 sinfo.sinfo_flags = flags; 747 sinfo.sinfo_ssn = stream_no; 748 sinfo.sinfo_timetolive = timetolive; 749 sinfo.sinfo_context = context; 750 return (sctp_sendx(sd, msg, len, addrs, addrcnt, &sinfo, 0)); 751} 752 753ssize_t 754sctp_recvmsg(int s, 755 void *dbuf, 756 size_t len, 757 struct sockaddr *from, 758 socklen_t * fromlen, 759 struct sctp_sndrcvinfo *sinfo, 760 int *msg_flags) 761{ 762#ifdef SYS_sctp_generic_recvmsg 763 struct iovec iov; 764 765 iov.iov_base = dbuf; 766 iov.iov_len = len; 767 return (syscall(SYS_sctp_generic_recvmsg, s, 768 &iov, 1, from, fromlen, sinfo, msg_flags)); 769#else 770 ssize_t sz; 771 struct msghdr msg; 772 struct iovec iov; 773 char cmsgbuf[SCTP_CONTROL_VEC_SIZE_RCV]; 774 struct cmsghdr *cmsg; 775 776 if (msg_flags == NULL) { 777 errno = EINVAL; 778 return (-1); 779 } 780 msg.msg_flags = 0; 781 iov.iov_base = dbuf; 782 iov.iov_len = len; 783 msg.msg_name = (caddr_t)from; 784 if (fromlen == NULL) 785 msg.msg_namelen = 0; 786 else 787 msg.msg_namelen = *fromlen; 788 msg.msg_iov = &iov; 789 msg.msg_iovlen = 1; 790 msg.msg_control = cmsgbuf; 791 msg.msg_controllen = sizeof(cmsgbuf); 792 sz = recvmsg(s, &msg, *msg_flags); 793 *msg_flags = msg.msg_flags; 794 if (sz <= 0) { 795 return (sz); 796 } 797 if (sinfo) { 798 sinfo->sinfo_assoc_id = 0; 799 } 800 if ((msg.msg_controllen > 0) && (sinfo != NULL)) { 801 /* 802 * parse through and see if we find the sctp_sndrcvinfo (if 803 * the user wants it). 804 */ 805 for (cmsg = CMSG_FIRSTHDR(&msg); cmsg; cmsg = CMSG_NXTHDR(&msg, cmsg)) { 806 if (cmsg->cmsg_level != IPPROTO_SCTP) { 807 continue; 808 } 809 if (cmsg->cmsg_type == SCTP_SNDRCV) { 810 memcpy(sinfo, CMSG_DATA(cmsg), sizeof(struct sctp_sndrcvinfo)); 811 break; 812 } 813 if (cmsg->cmsg_type == SCTP_EXTRCV) { 814 /* 815 * Let's hope that the user provided enough 816 * enough memory. At least he asked for more 817 * information. 818 */ 819 memcpy(sinfo, CMSG_DATA(cmsg), sizeof(struct sctp_extrcvinfo)); 820 break; 821 } 822 } 823 } 824 return (sz); 825#endif 826} 827 828ssize_t 829sctp_recvv(int sd, 830 const struct iovec *iov, 831 int iovlen, 832 struct sockaddr *from, 833 socklen_t * fromlen, 834 void *info, 835 socklen_t * infolen, 836 unsigned int *infotype, 837 int *flags) 838{ 839 char cmsgbuf[SCTP_CONTROL_VEC_SIZE_RCV]; 840 struct msghdr msg; 841 struct cmsghdr *cmsg; 842 ssize_t ret; 843 struct sctp_rcvinfo *rcvinfo; 844 struct sctp_nxtinfo *nxtinfo; 845 846 if (((info != NULL) && (infolen == NULL)) | 847 ((info == NULL) && (infolen != NULL) && (*infolen != 0)) || 848 ((info != NULL) && (infotype == NULL))) { 849 errno = EINVAL; 850 return (-1); 851 } 852 if (infotype) { 853 *infotype = SCTP_RECVV_NOINFO; 854 } 855 msg.msg_name = from; 856 if (fromlen == NULL) { 857 msg.msg_namelen = 0; 858 } else { 859 msg.msg_namelen = *fromlen; 860 } 861 msg.msg_iov = (struct iovec *)iov; 862 msg.msg_iovlen = iovlen; 863 msg.msg_control = cmsgbuf; 864 msg.msg_controllen = sizeof(cmsgbuf); 865 ret = recvmsg(sd, &msg, *flags); 866 *flags = msg.msg_flags; 867 if ((ret > 0) && 868 (msg.msg_controllen > 0) && 869 (infotype != NULL) && 870 (infolen != NULL) && 871 (*infolen > 0)) { 872 rcvinfo = NULL; 873 nxtinfo = NULL; 874 for (cmsg = CMSG_FIRSTHDR(&msg); cmsg; cmsg = CMSG_NXTHDR(&msg, cmsg)) { 875 if (cmsg->cmsg_level != IPPROTO_SCTP) { 876 continue; 877 } 878 if (cmsg->cmsg_type == SCTP_RCVINFO) { 879 rcvinfo = (struct sctp_rcvinfo *)CMSG_DATA(cmsg); 880 if (nxtinfo != NULL) { 881 break; 882 } else { 883 continue; 884 } 885 } 886 if (cmsg->cmsg_type == SCTP_NXTINFO) { 887 nxtinfo = (struct sctp_nxtinfo *)CMSG_DATA(cmsg); 888 if (rcvinfo != NULL) { 889 break; 890 } else { 891 continue; 892 } 893 } 894 } 895 if (rcvinfo != NULL) { 896 if ((nxtinfo != NULL) && (*infolen >= sizeof(struct sctp_recvv_rn))) { 897 struct sctp_recvv_rn *rn_info; 898 899 rn_info = (struct sctp_recvv_rn *)info; 900 rn_info->recvv_rcvinfo = *rcvinfo; 901 rn_info->recvv_nxtinfo = *nxtinfo; 902 *infolen = (socklen_t) sizeof(struct sctp_recvv_rn); 903 *infotype = SCTP_RECVV_RN; 904 } else if (*infolen >= sizeof(struct sctp_rcvinfo)) { 905 memcpy(info, rcvinfo, sizeof(struct sctp_rcvinfo)); 906 *infolen = (socklen_t) sizeof(struct sctp_rcvinfo); 907 *infotype = SCTP_RECVV_RCVINFO; 908 } 909 } else if (nxtinfo != NULL) { 910 if (*infolen >= sizeof(struct sctp_nxtinfo)) { 911 memcpy(info, nxtinfo, sizeof(struct sctp_nxtinfo)); 912 *infolen = (socklen_t) sizeof(struct sctp_nxtinfo); 913 *infotype = SCTP_RECVV_NXTINFO; 914 } 915 } 916 } 917 return (ret); 918} 919 920ssize_t 921sctp_sendv(int sd, 922 const struct iovec *iov, int iovcnt, 923 struct sockaddr *addrs, int addrcnt, 924 void *info, socklen_t infolen, unsigned int infotype, 925 int flags) 926{ 927 ssize_t ret; 928 int i; 929 socklen_t addr_len; 930 struct msghdr msg; 931 in_port_t port; 932 struct sctp_sendv_spa *spa_info; 933 struct cmsghdr *cmsg; 934 char *cmsgbuf; 935 struct sockaddr *addr; 936 struct sockaddr_in *addr_in; 937 struct sockaddr_in6 *addr_in6; 938 939 if ((addrcnt < 0) || 940 (iovcnt < 0) || 941 ((addrs == NULL) && (addrcnt > 0)) || 942 ((addrs != NULL) && (addrcnt == 0)) || 943 ((iov == NULL) && (iovcnt > 0)) || 944 ((iov != NULL) && (iovcnt == 0))) { 945 errno = EINVAL; 946 return (-1); 947 } 948 cmsgbuf = malloc(CMSG_SPACE(sizeof(struct sctp_sndinfo)) + 949 CMSG_SPACE(sizeof(struct sctp_prinfo)) + 950 CMSG_SPACE(sizeof(struct sctp_authinfo)) + 951 (size_t)addrcnt * CMSG_SPACE(sizeof(struct in6_addr))); 952 if (cmsgbuf == NULL) { 953 errno = ENOMEM; 954 return (-1); 955 } 956 msg.msg_control = cmsgbuf; 957 msg.msg_controllen = 0; 958 cmsg = (struct cmsghdr *)cmsgbuf; 959 switch (infotype) { 960 case SCTP_SENDV_NOINFO: 961 if ((infolen != 0) || (info != NULL)) { 962 free(cmsgbuf); 963 errno = EINVAL; 964 return (-1); 965 } 966 break; 967 case SCTP_SENDV_SNDINFO: 968 if ((info == NULL) || (infolen < sizeof(struct sctp_sndinfo))) { 969 free(cmsgbuf); 970 errno = EINVAL; 971 return (-1); 972 } 973 cmsg->cmsg_level = IPPROTO_SCTP; 974 cmsg->cmsg_type = SCTP_SNDINFO; 975 cmsg->cmsg_len = CMSG_LEN(sizeof(struct sctp_sndinfo)); 976 memcpy(CMSG_DATA(cmsg), info, sizeof(struct sctp_sndinfo)); 977 msg.msg_controllen += CMSG_SPACE(sizeof(struct sctp_sndinfo)); 978 cmsg = (struct cmsghdr *)((caddr_t)cmsg + CMSG_SPACE(sizeof(struct sctp_sndinfo))); 979 break; 980 case SCTP_SENDV_PRINFO: 981 if ((info == NULL) || (infolen < sizeof(struct sctp_prinfo))) { 982 free(cmsgbuf); 983 errno = EINVAL; 984 return (-1); 985 } 986 cmsg->cmsg_level = IPPROTO_SCTP; 987 cmsg->cmsg_type = SCTP_PRINFO; 988 cmsg->cmsg_len = CMSG_LEN(sizeof(struct sctp_prinfo)); 989 memcpy(CMSG_DATA(cmsg), info, sizeof(struct sctp_prinfo)); 990 msg.msg_controllen += CMSG_SPACE(sizeof(struct sctp_prinfo)); 991 cmsg = (struct cmsghdr *)((caddr_t)cmsg + CMSG_SPACE(sizeof(struct sctp_prinfo))); 992 break; 993 case SCTP_SENDV_AUTHINFO: 994 if ((info == NULL) || (infolen < sizeof(struct sctp_authinfo))) { 995 free(cmsgbuf); 996 errno = EINVAL; 997 return (-1); 998 } 999 cmsg->cmsg_level = IPPROTO_SCTP; 1000 cmsg->cmsg_type = SCTP_AUTHINFO; 1001 cmsg->cmsg_len = CMSG_LEN(sizeof(struct sctp_authinfo)); 1002 memcpy(CMSG_DATA(cmsg), info, sizeof(struct sctp_authinfo)); 1003 msg.msg_controllen += CMSG_SPACE(sizeof(struct sctp_authinfo)); 1004 cmsg = (struct cmsghdr *)((caddr_t)cmsg + CMSG_SPACE(sizeof(struct sctp_authinfo))); 1005 break; 1006 case SCTP_SENDV_SPA: 1007 if ((info == NULL) || (infolen < sizeof(struct sctp_sendv_spa))) { 1008 free(cmsgbuf); 1009 errno = EINVAL; 1010 return (-1); 1011 } 1012 spa_info = (struct sctp_sendv_spa *)info; 1013 if (spa_info->sendv_flags & SCTP_SEND_SNDINFO_VALID) { 1014 cmsg->cmsg_level = IPPROTO_SCTP; 1015 cmsg->cmsg_type = SCTP_SNDINFO; 1016 cmsg->cmsg_len = CMSG_LEN(sizeof(struct sctp_sndinfo)); 1017 memcpy(CMSG_DATA(cmsg), &spa_info->sendv_sndinfo, sizeof(struct sctp_sndinfo)); 1018 msg.msg_controllen += CMSG_SPACE(sizeof(struct sctp_sndinfo)); 1019 cmsg = (struct cmsghdr *)((caddr_t)cmsg + CMSG_SPACE(sizeof(struct sctp_sndinfo))); 1020 } 1021 if (spa_info->sendv_flags & SCTP_SEND_PRINFO_VALID) { 1022 cmsg->cmsg_level = IPPROTO_SCTP; 1023 cmsg->cmsg_type = SCTP_PRINFO; 1024 cmsg->cmsg_len = CMSG_LEN(sizeof(struct sctp_prinfo)); 1025 memcpy(CMSG_DATA(cmsg), &spa_info->sendv_prinfo, sizeof(struct sctp_prinfo)); 1026 msg.msg_controllen += CMSG_SPACE(sizeof(struct sctp_prinfo)); 1027 cmsg = (struct cmsghdr *)((caddr_t)cmsg + CMSG_SPACE(sizeof(struct sctp_prinfo))); 1028 } 1029 if (spa_info->sendv_flags & SCTP_SEND_AUTHINFO_VALID) { 1030 cmsg->cmsg_level = IPPROTO_SCTP; 1031 cmsg->cmsg_type = SCTP_AUTHINFO; 1032 cmsg->cmsg_len = CMSG_LEN(sizeof(struct sctp_authinfo)); 1033 memcpy(CMSG_DATA(cmsg), &spa_info->sendv_authinfo, sizeof(struct sctp_authinfo)); 1034 msg.msg_controllen += CMSG_SPACE(sizeof(struct sctp_authinfo)); 1035 cmsg = (struct cmsghdr *)((caddr_t)cmsg + CMSG_SPACE(sizeof(struct sctp_authinfo))); 1036 } 1037 break; 1038 default: 1039 free(cmsgbuf); 1040 errno = EINVAL; 1041 return (-1); 1042 } 1043 addr = addrs; 1044 msg.msg_name = NULL; 1045 msg.msg_namelen = 0; 1046 1047 for (i = 0; i < addrcnt; i++) { 1048 switch (addr->sa_family) { 1049 case AF_INET: 1050 addr_len = (socklen_t) sizeof(struct sockaddr_in); 1051 addr_in = (struct sockaddr_in *)addr; 1052 if (addr_in->sin_len != addr_len) { 1053 free(cmsgbuf); 1054 errno = EINVAL; 1055 return (-1); 1056 } 1057 if (i == 0) { 1058 port = addr_in->sin_port; 1059 } else { 1060 if (port == addr_in->sin_port) { 1061 cmsg->cmsg_level = IPPROTO_SCTP; 1062 cmsg->cmsg_type = SCTP_DSTADDRV4; 1063 cmsg->cmsg_len = CMSG_LEN(sizeof(struct in_addr)); 1064 memcpy(CMSG_DATA(cmsg), &addr_in->sin_addr, sizeof(struct in_addr)); 1065 msg.msg_controllen += CMSG_SPACE(sizeof(struct in_addr)); 1066 cmsg = (struct cmsghdr *)((caddr_t)cmsg + CMSG_SPACE(sizeof(struct in_addr))); 1067 } else { 1068 free(cmsgbuf); 1069 errno = EINVAL; 1070 return (-1); 1071 } 1072 } 1073 break; 1074 case AF_INET6: 1075 addr_len = (socklen_t) sizeof(struct sockaddr_in6); 1076 addr_in6 = (struct sockaddr_in6 *)addr; 1077 if (addr_in6->sin6_len != addr_len) { 1078 free(cmsgbuf); 1079 errno = EINVAL; 1080 return (-1); 1081 } 1082 if (i == 0) { 1083 port = addr_in6->sin6_port; 1084 } else { 1085 if (port == addr_in6->sin6_port) { 1086 cmsg->cmsg_level = IPPROTO_SCTP; 1087 cmsg->cmsg_type = SCTP_DSTADDRV6; 1088 cmsg->cmsg_len = CMSG_LEN(sizeof(struct in6_addr)); 1089 memcpy(CMSG_DATA(cmsg), &addr_in6->sin6_addr, sizeof(struct in6_addr)); 1090 msg.msg_controllen += CMSG_SPACE(sizeof(struct in6_addr)); 1091 cmsg = (struct cmsghdr *)((caddr_t)cmsg + CMSG_SPACE(sizeof(struct in6_addr))); 1092 } else { 1093 free(cmsgbuf); 1094 errno = EINVAL; 1095 return (-1); 1096 } 1097 } 1098 break; 1099 default: 1100 free(cmsgbuf); 1101 errno = EINVAL; 1102 return (-1); 1103 } 1104 if (i == 0) { 1105 msg.msg_name = addr; 1106 msg.msg_namelen = addr_len; 1107 } 1108 addr = (struct sockaddr *)((caddr_t)addr + addr_len); 1109 } 1110 if (msg.msg_controllen == 0) { 1111 msg.msg_control = NULL; 1112 } 1113 msg.msg_iov = (struct iovec *)iov; 1114 msg.msg_iovlen = iovcnt; 1115 msg.msg_flags = 0; 1116 ret = sendmsg(sd, &msg, flags); 1117 free(cmsgbuf); 1118 return (ret); 1119} 1120 1121 1122#if !defined(SYS_sctp_peeloff) && !defined(HAVE_SCTP_PEELOFF_SOCKOPT) 1123 1124int 1125sctp_peeloff(int sd, sctp_assoc_t assoc_id) 1126{ 1127 /* NOT supported, return invalid sd */ 1128 errno = ENOTSUP; 1129 return (-1); 1130} 1131 1132#endif 1133#if defined(SYS_sctp_peeloff) && !defined(HAVE_SCTP_PEELOFF_SOCKOPT) 1134int 1135sctp_peeloff(int sd, sctp_assoc_t assoc_id) 1136{ 1137 return (syscall(SYS_sctp_peeloff, sd, assoc_id)); 1138} 1139 1140#endif 1141 1142#undef SCTP_CONTROL_VEC_SIZE_RCV 1143