sctp_sys_calls.c revision 253104
1/*-
2 * Copyright (c) 2001-2007, by Cisco Systems, Inc. All rights reserved.
3 * Copyright (c) 2008-2012, by Randall Stewart. All rights reserved.
4 * Copyright (c) 2008-2012, by Michael Tuexen. All rights reserved.
5 *
6 * Redistribution and use in source and binary forms, with or without
7 * modification, are permitted provided that the following conditions are met:
8 *
9 * a) Redistributions of source code must retain the above copyright notice,
10 *    this list of conditions and the following disclaimer.
11 *
12 * b) Redistributions in binary form must reproduce the above copyright
13 *    notice, this list of conditions and the following disclaimer in
14 *    the documentation and/or other materials provided with the distribution.
15 *
16 * c) Neither the name of Cisco Systems, Inc. nor the names of its
17 *    contributors may be used to endorse or promote products derived
18 *    from this software without specific prior written permission.
19 *
20 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
21 * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,
22 * THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23 * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE
24 * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
25 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
26 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
27 * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
28 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
29 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
30 * THE POSSIBILITY OF SUCH DAMAGE.
31 */
32
33#include <sys/cdefs.h>
34__FBSDID("$FreeBSD: head/lib/libc/net/sctp_sys_calls.c 253104 2013-07-09 19:04:19Z tuexen $");
35
36#include <stdio.h>
37#include <string.h>
38#include <errno.h>
39#include <stdlib.h>
40#include <unistd.h>
41#include <sys/types.h>
42#include <sys/socket.h>
43#include <sys/errno.h>
44#include <sys/syscall.h>
45#include <sys/uio.h>
46#include <netinet/in.h>
47#include <arpa/inet.h>
48#include <netinet/sctp_uio.h>
49#include <netinet/sctp.h>
50
51#ifndef IN6_IS_ADDR_V4MAPPED
52#define IN6_IS_ADDR_V4MAPPED(a)		      \
53	((*(const uint32_t *)(const void *)(&(a)->s6_addr[0]) == 0) &&	\
54	 (*(const uint32_t *)(const void *)(&(a)->s6_addr[4]) == 0) &&	\
55	 (*(const uint32_t *)(const void *)(&(a)->s6_addr[8]) == ntohl(0x0000ffff)))
56#endif
57
58#define SCTP_CONTROL_VEC_SIZE_RCV  16384
59
60
61static void
62in6_sin6_2_sin(struct sockaddr_in *sin, struct sockaddr_in6 *sin6)
63{
64	bzero(sin, sizeof(*sin));
65	sin->sin_len = sizeof(struct sockaddr_in);
66	sin->sin_family = AF_INET;
67	sin->sin_port = sin6->sin6_port;
68	sin->sin_addr.s_addr = sin6->sin6_addr.__u6_addr.__u6_addr32[3];
69}
70
71int
72sctp_getaddrlen(sa_family_t family)
73{
74	int ret, sd;
75	socklen_t siz;
76	struct sctp_assoc_value av;
77
78	av.assoc_value = family;
79	siz = sizeof(av);
80#if defined(AF_INET)
81	sd = socket(AF_INET, SOCK_SEQPACKET, IPPROTO_SCTP);
82#elif defined(AF_INET6)
83	sd = socket(AF_INET6, SOCK_SEQPACKET, IPPROTO_SCTP);
84#else
85	sd = -1;
86#endif
87	if (sd == -1) {
88		return (-1);
89	}
90	ret = getsockopt(sd, IPPROTO_SCTP, SCTP_GET_ADDR_LEN, &av, &siz);
91	close(sd);
92	if (ret == 0) {
93		return ((int)av.assoc_value);
94	} else {
95		return (-1);
96	}
97}
98
99int
100sctp_connectx(int sd, const struct sockaddr *addrs, int addrcnt,
101    sctp_assoc_t * id)
102{
103	char *buf;
104	int i, ret, cnt, *aa;
105	char *cpto;
106	const struct sockaddr *at;
107	size_t len = sizeof(int);
108
109	/* validate the address count and list */
110	if ((addrs == NULL) || (addrcnt <= 0)) {
111		errno = EINVAL;
112		return (-1);
113	}
114	if ((buf = malloc(sizeof(int) + (size_t)addrcnt * sizeof(struct sockaddr_in6))) == NULL) {
115		errno = E2BIG;
116		return (-1);
117	}
118	at = addrs;
119	cnt = 0;
120	cpto = buf + sizeof(int);
121	/* validate all the addresses and get the size */
122	for (i = 0; i < addrcnt; i++) {
123		switch (at->sa_family) {
124		case AF_INET:
125			if (at->sa_len != sizeof(struct sockaddr_in)) {
126				free(buf);
127				errno = EINVAL;
128				return (-1);
129			}
130			memcpy(cpto, at, sizeof(struct sockaddr_in));
131			cpto = ((caddr_t)cpto + sizeof(struct sockaddr_in));
132			len += sizeof(struct sockaddr_in);
133			break;
134		case AF_INET6:
135			if (at->sa_len != sizeof(struct sockaddr_in6)) {
136				free(buf);
137				errno = EINVAL;
138				return (-1);
139			}
140			if (IN6_IS_ADDR_V4MAPPED(&((struct sockaddr_in6 *)at)->sin6_addr)) {
141				in6_sin6_2_sin((struct sockaddr_in *)cpto, (struct sockaddr_in6 *)at);
142				cpto = ((caddr_t)cpto + sizeof(struct sockaddr_in));
143				len += sizeof(struct sockaddr_in);
144			} else {
145				memcpy(cpto, at, sizeof(struct sockaddr_in6));
146				cpto = ((caddr_t)cpto + sizeof(struct sockaddr_in6));
147				len += sizeof(struct sockaddr_in6);
148			}
149			break;
150		default:
151			free(buf);
152			errno = EINVAL;
153			return (-1);
154		}
155		at = (struct sockaddr *)((caddr_t)at + at->sa_len);
156	}
157	aa = (int *)buf;
158	*aa = addrcnt;
159	ret = setsockopt(sd, IPPROTO_SCTP, SCTP_CONNECT_X, (void *)buf,
160	    (socklen_t) len);
161	if ((ret == 0) && (id != NULL)) {
162		*id = *(sctp_assoc_t *) buf;
163	}
164	return (ret);
165}
166
167int
168sctp_bindx(int sd, struct sockaddr *addrs, int addrcnt, int flags)
169{
170	struct sctp_getaddresses *gaddrs;
171	struct sockaddr *sa;
172	struct sockaddr_in *sin;
173	struct sockaddr_in6 *sin6;
174	int i;
175	size_t argsz;
176	uint16_t sport = 0;
177
178	/* validate the flags */
179	if ((flags != SCTP_BINDX_ADD_ADDR) &&
180	    (flags != SCTP_BINDX_REM_ADDR)) {
181		errno = EFAULT;
182		return (-1);
183	}
184	/* validate the address count and list */
185	if ((addrcnt <= 0) || (addrs == NULL)) {
186		errno = EINVAL;
187		return (-1);
188	}
189	/* First pre-screen the addresses */
190	sa = addrs;
191	for (i = 0; i < addrcnt; i++) {
192		switch (sa->sa_family) {
193		case AF_INET:
194			if (sa->sa_len != sizeof(struct sockaddr_in)) {
195				errno = EINVAL;
196				return (-1);
197			}
198			sin = (struct sockaddr_in *)sa;
199			if (sin->sin_port) {
200				/* non-zero port, check or save */
201				if (sport) {
202					/* Check against our port */
203					if (sport != sin->sin_port) {
204						errno = EINVAL;
205						return (-1);
206					}
207				} else {
208					/* save off the port */
209					sport = sin->sin_port;
210				}
211			}
212			break;
213		case AF_INET6:
214			if (sa->sa_len != sizeof(struct sockaddr_in6)) {
215				errno = EINVAL;
216				return (-1);
217			}
218			sin6 = (struct sockaddr_in6 *)sa;
219			if (sin6->sin6_port) {
220				/* non-zero port, check or save */
221				if (sport) {
222					/* Check against our port */
223					if (sport != sin6->sin6_port) {
224						errno = EINVAL;
225						return (-1);
226					}
227				} else {
228					/* save off the port */
229					sport = sin6->sin6_port;
230				}
231			}
232			break;
233		default:
234			/* Invalid address family specified. */
235			errno = EINVAL;
236			return (-1);
237		}
238		sa = (struct sockaddr *)((caddr_t)sa + sa->sa_len);
239	}
240	/*
241	 * Now if there was a port mentioned, assure that the first address
242	 * has that port to make sure it fails or succeeds correctly.
243	 */
244	if (sport) {
245		sin = (struct sockaddr_in *)sa;
246		sin->sin_port = sport;
247	}
248	argsz = sizeof(struct sctp_getaddresses) +
249	    sizeof(struct sockaddr_storage);
250	if ((gaddrs = (struct sctp_getaddresses *)malloc(argsz)) == NULL) {
251		errno = ENOMEM;
252		return (-1);
253	}
254	sa = addrs;
255	for (i = 0; i < addrcnt; i++) {
256		memset(gaddrs, 0, argsz);
257		gaddrs->sget_assoc_id = 0;
258		memcpy(gaddrs->addr, sa, sa->sa_len);
259		if (setsockopt(sd, IPPROTO_SCTP, flags, gaddrs,
260		    (socklen_t) argsz) != 0) {
261			free(gaddrs);
262			return (-1);
263		}
264		sa = (struct sockaddr *)((caddr_t)sa + sa->sa_len);
265	}
266	free(gaddrs);
267	return (0);
268}
269
270int
271sctp_opt_info(int sd, sctp_assoc_t id, int opt, void *arg, socklen_t * size)
272{
273	if (arg == NULL) {
274		errno = EINVAL;
275		return (-1);
276	}
277	switch (opt) {
278	case SCTP_RTOINFO:
279		((struct sctp_rtoinfo *)arg)->srto_assoc_id = id;
280		break;
281	case SCTP_ASSOCINFO:
282		((struct sctp_assocparams *)arg)->sasoc_assoc_id = id;
283		break;
284	case SCTP_DEFAULT_SEND_PARAM:
285		((struct sctp_assocparams *)arg)->sasoc_assoc_id = id;
286		break;
287	case SCTP_PRIMARY_ADDR:
288		((struct sctp_setprim *)arg)->ssp_assoc_id = id;
289		break;
290	case SCTP_PEER_ADDR_PARAMS:
291		((struct sctp_paddrparams *)arg)->spp_assoc_id = id;
292		break;
293	case SCTP_MAXSEG:
294		((struct sctp_assoc_value *)arg)->assoc_id = id;
295		break;
296	case SCTP_AUTH_KEY:
297		((struct sctp_authkey *)arg)->sca_assoc_id = id;
298		break;
299	case SCTP_AUTH_ACTIVE_KEY:
300		((struct sctp_authkeyid *)arg)->scact_assoc_id = id;
301		break;
302	case SCTP_DELAYED_SACK:
303		((struct sctp_sack_info *)arg)->sack_assoc_id = id;
304		break;
305	case SCTP_CONTEXT:
306		((struct sctp_assoc_value *)arg)->assoc_id = id;
307		break;
308	case SCTP_STATUS:
309		((struct sctp_status *)arg)->sstat_assoc_id = id;
310		break;
311	case SCTP_GET_PEER_ADDR_INFO:
312		((struct sctp_paddrinfo *)arg)->spinfo_assoc_id = id;
313		break;
314	case SCTP_PEER_AUTH_CHUNKS:
315		((struct sctp_authchunks *)arg)->gauth_assoc_id = id;
316		break;
317	case SCTP_LOCAL_AUTH_CHUNKS:
318		((struct sctp_authchunks *)arg)->gauth_assoc_id = id;
319		break;
320	case SCTP_TIMEOUTS:
321		((struct sctp_timeouts *)arg)->stimo_assoc_id = id;
322		break;
323	case SCTP_EVENT:
324		((struct sctp_event *)arg)->se_assoc_id = id;
325		break;
326	case SCTP_DEFAULT_SNDINFO:
327		((struct sctp_sndinfo *)arg)->snd_assoc_id = id;
328		break;
329	case SCTP_DEFAULT_PRINFO:
330		((struct sctp_default_prinfo *)arg)->pr_assoc_id = id;
331		break;
332	case SCTP_PEER_ADDR_THLDS:
333		((struct sctp_paddrthlds *)arg)->spt_assoc_id = id;
334		break;
335	case SCTP_REMOTE_UDP_ENCAPS_PORT:
336		((struct sctp_udpencaps *)arg)->sue_assoc_id = id;
337		break;
338	case SCTP_MAX_BURST:
339		((struct sctp_assoc_value *)arg)->assoc_id = id;
340		break;
341	case SCTP_ENABLE_STREAM_RESET:
342		((struct sctp_assoc_value *)arg)->assoc_id = id;
343		break;
344	default:
345		break;
346	}
347	return (getsockopt(sd, IPPROTO_SCTP, opt, arg, size));
348}
349
350int
351sctp_getpaddrs(int sd, sctp_assoc_t id, struct sockaddr **raddrs)
352{
353	struct sctp_getaddresses *addrs;
354	struct sockaddr *sa;
355	sctp_assoc_t asoc;
356	caddr_t lim;
357	socklen_t opt_len;
358	int cnt;
359
360	if (raddrs == NULL) {
361		errno = EFAULT;
362		return (-1);
363	}
364	asoc = id;
365	opt_len = (socklen_t) sizeof(sctp_assoc_t);
366	if (getsockopt(sd, IPPROTO_SCTP, SCTP_GET_REMOTE_ADDR_SIZE,
367	    &asoc, &opt_len) != 0) {
368		return (-1);
369	}
370	/* size required is returned in 'asoc' */
371	opt_len = (socklen_t) ((size_t)asoc + sizeof(struct sctp_getaddresses));
372	addrs = calloc(1, (size_t)opt_len);
373	if (addrs == NULL) {
374		errno = ENOMEM;
375		return (-1);
376	}
377	addrs->sget_assoc_id = id;
378	/* Now lets get the array of addresses */
379	if (getsockopt(sd, IPPROTO_SCTP, SCTP_GET_PEER_ADDRESSES,
380	    addrs, &opt_len) != 0) {
381		free(addrs);
382		return (-1);
383	}
384	*raddrs = (struct sockaddr *)&addrs->addr[0];
385	cnt = 0;
386	sa = (struct sockaddr *)&addrs->addr[0];
387	lim = (caddr_t)addrs + opt_len;
388	while (((caddr_t)sa < lim) && (sa->sa_len > 0)) {
389		sa = (struct sockaddr *)((caddr_t)sa + sa->sa_len);
390		cnt++;
391	}
392	return (cnt);
393}
394
395void
396sctp_freepaddrs(struct sockaddr *addrs)
397{
398	void *fr_addr;
399
400	/* Take away the hidden association id */
401	fr_addr = (void *)((caddr_t)addrs - sizeof(sctp_assoc_t));
402	/* Now free it */
403	free(fr_addr);
404}
405
406int
407sctp_getladdrs(int sd, sctp_assoc_t id, struct sockaddr **raddrs)
408{
409	struct sctp_getaddresses *addrs;
410	caddr_t lim;
411	struct sockaddr *sa;
412	size_t size_of_addresses;
413	socklen_t opt_len;
414	int cnt;
415
416	if (raddrs == NULL) {
417		errno = EFAULT;
418		return (-1);
419	}
420	size_of_addresses = 0;
421	opt_len = (socklen_t) sizeof(int);
422	if (getsockopt(sd, IPPROTO_SCTP, SCTP_GET_LOCAL_ADDR_SIZE,
423	    &size_of_addresses, &opt_len) != 0) {
424		errno = ENOMEM;
425		return (-1);
426	}
427	if (size_of_addresses == 0) {
428		errno = ENOTCONN;
429		return (-1);
430	}
431	opt_len = (socklen_t) (size_of_addresses +
432	    sizeof(struct sockaddr_storage) +
433	    sizeof(struct sctp_getaddresses));
434	addrs = calloc(1, (size_t)opt_len);
435	if (addrs == NULL) {
436		errno = ENOMEM;
437		return (-1);
438	}
439	addrs->sget_assoc_id = id;
440	/* Now lets get the array of addresses */
441	if (getsockopt(sd, IPPROTO_SCTP, SCTP_GET_LOCAL_ADDRESSES, addrs,
442	    &opt_len) != 0) {
443		free(addrs);
444		errno = ENOMEM;
445		return (-1);
446	}
447	*raddrs = (struct sockaddr *)&addrs->addr[0];
448	cnt = 0;
449	sa = (struct sockaddr *)&addrs->addr[0];
450	lim = (caddr_t)addrs + opt_len;
451	while (((caddr_t)sa < lim) && (sa->sa_len > 0)) {
452		sa = (struct sockaddr *)((caddr_t)sa + sa->sa_len);
453		cnt++;
454	}
455	return (cnt);
456}
457
458void
459sctp_freeladdrs(struct sockaddr *addrs)
460{
461	void *fr_addr;
462
463	/* Take away the hidden association id */
464	fr_addr = (void *)((caddr_t)addrs - sizeof(sctp_assoc_t));
465	/* Now free it */
466	free(fr_addr);
467}
468
469ssize_t
470sctp_sendmsg(int s,
471    const void *data,
472    size_t len,
473    const struct sockaddr *to,
474    socklen_t tolen,
475    uint32_t ppid,
476    uint32_t flags,
477    uint16_t stream_no,
478    uint32_t timetolive,
479    uint32_t context)
480{
481#ifdef SYS_sctp_generic_sendmsg
482	struct sctp_sndrcvinfo sinfo;
483
484	memset(&sinfo, 0, sizeof(struct sctp_sndrcvinfo));
485	sinfo.sinfo_ppid = ppid;
486	sinfo.sinfo_flags = flags;
487	sinfo.sinfo_stream = stream_no;
488	sinfo.sinfo_timetolive = timetolive;
489	sinfo.sinfo_context = context;
490	sinfo.sinfo_assoc_id = 0;
491	return (syscall(SYS_sctp_generic_sendmsg, s,
492	    data, len, to, tolen, &sinfo, 0));
493#else
494	struct msghdr msg;
495	struct sctp_sndrcvinfo *sinfo;
496	struct iovec iov;
497	char cmsgbuf[CMSG_SPACE(sizeof(struct sctp_sndrcvinfo))];
498	struct cmsghdr *cmsg;
499	struct sockaddr *who = NULL;
500	union {
501		struct sockaddr_in in;
502		struct sockaddr_in6 in6;
503	}     addr;
504
505	if ((tolen > 0) &&
506	    ((to == NULL) || (tolen < sizeof(struct sockaddr)))) {
507		errno = EINVAL;
508		return (-1);
509	}
510	if ((to != NULL) && (tolen > 0)) {
511		switch (to->sa_family) {
512		case AF_INET:
513			if (tolen != sizeof(struct sockaddr_in)) {
514				errno = EINVAL;
515				return (-1);
516			}
517			if ((to->sa_len > 0) &&
518			    (to->sa_len != sizeof(struct sockaddr_in))) {
519				errno = EINVAL;
520				return (-1);
521			}
522			memcpy(&addr, to, sizeof(struct sockaddr_in));
523			addr.in.sin_len = sizeof(struct sockaddr_in);
524			break;
525		case AF_INET6:
526			if (tolen != sizeof(struct sockaddr_in6)) {
527				errno = EINVAL;
528				return (-1);
529			}
530			if ((to->sa_len > 0) &&
531			    (to->sa_len != sizeof(struct sockaddr_in6))) {
532				errno = EINVAL;
533				return (-1);
534			}
535			memcpy(&addr, to, sizeof(struct sockaddr_in6));
536			addr.in6.sin6_len = sizeof(struct sockaddr_in6);
537			break;
538		default:
539			errno = EAFNOSUPPORT;
540			return (-1);
541		}
542		who = (struct sockaddr *)&addr;
543	}
544	iov.iov_base = (char *)data;
545	iov.iov_len = len;
546
547	if (who) {
548		msg.msg_name = (caddr_t)who;
549		msg.msg_namelen = who->sa_len;
550	} else {
551		msg.msg_name = (caddr_t)NULL;
552		msg.msg_namelen = 0;
553	}
554	msg.msg_iov = &iov;
555	msg.msg_iovlen = 1;
556	msg.msg_control = cmsgbuf;
557	msg.msg_controllen = CMSG_SPACE(sizeof(struct sctp_sndrcvinfo));
558	cmsg = (struct cmsghdr *)cmsgbuf;
559	cmsg->cmsg_level = IPPROTO_SCTP;
560	cmsg->cmsg_type = SCTP_SNDRCV;
561	cmsg->cmsg_len = CMSG_LEN(sizeof(struct sctp_sndrcvinfo));
562	sinfo = (struct sctp_sndrcvinfo *)CMSG_DATA(cmsg);
563	sinfo->sinfo_stream = stream_no;
564	sinfo->sinfo_ssn = 0;
565	sinfo->sinfo_flags = flags;
566	sinfo->sinfo_ppid = ppid;
567	sinfo->sinfo_context = context;
568	sinfo->sinfo_assoc_id = 0;
569	sinfo->sinfo_timetolive = timetolive;
570	return (sendmsg(s, &msg, 0));
571#endif
572}
573
574
575sctp_assoc_t
576sctp_getassocid(int sd, struct sockaddr *sa)
577{
578	struct sctp_paddrinfo sp;
579	socklen_t siz;
580
581	/* First get the assoc id */
582	siz = sizeof(sp);
583	memset(&sp, 0, sizeof(sp));
584	memcpy((caddr_t)&sp.spinfo_address, sa, sa->sa_len);
585	if (getsockopt(sd, IPPROTO_SCTP,
586	    SCTP_GET_PEER_ADDR_INFO, &sp, &siz) != 0) {
587		/* We depend on the fact that 0 can never be returned */
588		return ((sctp_assoc_t) 0);
589	}
590	return (sp.spinfo_assoc_id);
591}
592
593ssize_t
594sctp_send(int sd, const void *data, size_t len,
595    const struct sctp_sndrcvinfo *sinfo,
596    int flags)
597{
598
599#ifdef SYS_sctp_generic_sendmsg
600	struct sockaddr *to = NULL;
601
602	return (syscall(SYS_sctp_generic_sendmsg, sd,
603	    data, len, to, 0, sinfo, flags));
604#else
605	struct msghdr msg;
606	struct iovec iov;
607	char cmsgbuf[CMSG_SPACE(sizeof(struct sctp_sndrcvinfo))];
608	struct cmsghdr *cmsg;
609
610	if (sinfo == NULL) {
611		errno = EINVAL;
612		return (-1);
613	}
614	iov.iov_base = (char *)data;
615	iov.iov_len = len;
616
617	msg.msg_name = NULL;
618	msg.msg_namelen = 0;
619	msg.msg_iov = &iov;
620	msg.msg_iovlen = 1;
621	msg.msg_control = cmsgbuf;
622	msg.msg_controllen = CMSG_SPACE(sizeof(struct sctp_sndrcvinfo));
623	cmsg = (struct cmsghdr *)cmsgbuf;
624	cmsg->cmsg_level = IPPROTO_SCTP;
625	cmsg->cmsg_type = SCTP_SNDRCV;
626	cmsg->cmsg_len = CMSG_LEN(sizeof(struct sctp_sndrcvinfo));
627	memcpy(CMSG_DATA(cmsg), sinfo, sizeof(struct sctp_sndrcvinfo));
628	return (sendmsg(sd, &msg, flags));
629#endif
630}
631
632
633
634ssize_t
635sctp_sendx(int sd, const void *msg, size_t msg_len,
636    struct sockaddr *addrs, int addrcnt,
637    struct sctp_sndrcvinfo *sinfo,
638    int flags)
639{
640	struct sctp_sndrcvinfo __sinfo;
641	ssize_t ret;
642	int i, cnt, *aa, saved_errno;
643	char *buf;
644	int no_end_cx = 0;
645	size_t len, add_len;
646	struct sockaddr *at;
647
648	if (addrs == NULL) {
649		errno = EINVAL;
650		return (-1);
651	}
652#ifdef SYS_sctp_generic_sendmsg
653	if (addrcnt == 1) {
654		socklen_t l;
655
656		/*
657		 * Quick way, we don't need to do a connectx so lets use the
658		 * syscall directly.
659		 */
660		l = addrs->sa_len;
661		return (syscall(SYS_sctp_generic_sendmsg, sd,
662		    msg, msg_len, addrs, l, sinfo, flags));
663	}
664#endif
665
666	len = sizeof(int);
667	at = addrs;
668	cnt = 0;
669	/* validate all the addresses and get the size */
670	for (i = 0; i < addrcnt; i++) {
671		if (at->sa_family == AF_INET) {
672			add_len = sizeof(struct sockaddr_in);
673		} else if (at->sa_family == AF_INET6) {
674			add_len = sizeof(struct sockaddr_in6);
675		} else {
676			errno = EINVAL;
677			return (-1);
678		}
679		len += add_len;
680		at = (struct sockaddr *)((caddr_t)at + add_len);
681		cnt++;
682	}
683	/* do we have any? */
684	if (cnt == 0) {
685		errno = EINVAL;
686		return (-1);
687	}
688	buf = malloc(len);
689	if (buf == NULL) {
690		errno = ENOMEM;
691		return (-1);
692	}
693	aa = (int *)buf;
694	*aa = cnt;
695	aa++;
696	memcpy((caddr_t)aa, addrs, (size_t)(len - sizeof(int)));
697	ret = setsockopt(sd, IPPROTO_SCTP, SCTP_CONNECT_X_DELAYED, (void *)buf,
698	    (socklen_t) len);
699
700	free(buf);
701	if (ret != 0) {
702		if (errno == EALREADY) {
703			no_end_cx = 1;
704			goto continue_send;
705		}
706		return (ret);
707	}
708continue_send:
709	if (sinfo == NULL) {
710		sinfo = &__sinfo;
711		memset(&__sinfo, 0, sizeof(__sinfo));
712	}
713	sinfo->sinfo_assoc_id = sctp_getassocid(sd, addrs);
714	if (sinfo->sinfo_assoc_id == 0) {
715		(void)setsockopt(sd, IPPROTO_SCTP, SCTP_CONNECT_X_COMPLETE, (void *)addrs,
716		    (socklen_t) addrs->sa_len);
717		errno = ENOENT;
718		return (-1);
719	}
720	ret = sctp_send(sd, msg, msg_len, sinfo, flags);
721	saved_errno = errno;
722	if (no_end_cx == 0)
723		(void)setsockopt(sd, IPPROTO_SCTP, SCTP_CONNECT_X_COMPLETE, (void *)addrs,
724		    (socklen_t) addrs->sa_len);
725
726	errno = saved_errno;
727	return (ret);
728}
729
730ssize_t
731sctp_sendmsgx(int sd,
732    const void *msg,
733    size_t len,
734    struct sockaddr *addrs,
735    int addrcnt,
736    uint32_t ppid,
737    uint32_t flags,
738    uint16_t stream_no,
739    uint32_t timetolive,
740    uint32_t context)
741{
742	struct sctp_sndrcvinfo sinfo;
743
744	memset((void *)&sinfo, 0, sizeof(struct sctp_sndrcvinfo));
745	sinfo.sinfo_ppid = ppid;
746	sinfo.sinfo_flags = flags;
747	sinfo.sinfo_ssn = stream_no;
748	sinfo.sinfo_timetolive = timetolive;
749	sinfo.sinfo_context = context;
750	return (sctp_sendx(sd, msg, len, addrs, addrcnt, &sinfo, 0));
751}
752
753ssize_t
754sctp_recvmsg(int s,
755    void *dbuf,
756    size_t len,
757    struct sockaddr *from,
758    socklen_t * fromlen,
759    struct sctp_sndrcvinfo *sinfo,
760    int *msg_flags)
761{
762#ifdef SYS_sctp_generic_recvmsg
763	struct iovec iov;
764
765	iov.iov_base = dbuf;
766	iov.iov_len = len;
767	return (syscall(SYS_sctp_generic_recvmsg, s,
768	    &iov, 1, from, fromlen, sinfo, msg_flags));
769#else
770	ssize_t sz;
771	struct msghdr msg;
772	struct iovec iov;
773	char cmsgbuf[SCTP_CONTROL_VEC_SIZE_RCV];
774	struct cmsghdr *cmsg;
775
776	if (msg_flags == NULL) {
777		errno = EINVAL;
778		return (-1);
779	}
780	msg.msg_flags = 0;
781	iov.iov_base = dbuf;
782	iov.iov_len = len;
783	msg.msg_name = (caddr_t)from;
784	if (fromlen == NULL)
785		msg.msg_namelen = 0;
786	else
787		msg.msg_namelen = *fromlen;
788	msg.msg_iov = &iov;
789	msg.msg_iovlen = 1;
790	msg.msg_control = cmsgbuf;
791	msg.msg_controllen = sizeof(cmsgbuf);
792	sz = recvmsg(s, &msg, *msg_flags);
793	*msg_flags = msg.msg_flags;
794	if (sz <= 0) {
795		return (sz);
796	}
797	if (sinfo) {
798		sinfo->sinfo_assoc_id = 0;
799	}
800	if ((msg.msg_controllen > 0) && (sinfo != NULL)) {
801		/*
802		 * parse through and see if we find the sctp_sndrcvinfo (if
803		 * the user wants it).
804		 */
805		for (cmsg = CMSG_FIRSTHDR(&msg); cmsg; cmsg = CMSG_NXTHDR(&msg, cmsg)) {
806			if (cmsg->cmsg_level != IPPROTO_SCTP) {
807				continue;
808			}
809			if (cmsg->cmsg_type == SCTP_SNDRCV) {
810				memcpy(sinfo, CMSG_DATA(cmsg), sizeof(struct sctp_sndrcvinfo));
811				break;
812			}
813			if (cmsg->cmsg_type == SCTP_EXTRCV) {
814				/*
815				 * Let's hope that the user provided enough
816				 * enough memory. At least he asked for more
817				 * information.
818				 */
819				memcpy(sinfo, CMSG_DATA(cmsg), sizeof(struct sctp_extrcvinfo));
820				break;
821			}
822		}
823	}
824	return (sz);
825#endif
826}
827
828ssize_t
829sctp_recvv(int sd,
830    const struct iovec *iov,
831    int iovlen,
832    struct sockaddr *from,
833    socklen_t * fromlen,
834    void *info,
835    socklen_t * infolen,
836    unsigned int *infotype,
837    int *flags)
838{
839	char cmsgbuf[SCTP_CONTROL_VEC_SIZE_RCV];
840	struct msghdr msg;
841	struct cmsghdr *cmsg;
842	ssize_t ret;
843	struct sctp_rcvinfo *rcvinfo;
844	struct sctp_nxtinfo *nxtinfo;
845
846	if (((info != NULL) && (infolen == NULL)) |
847	    ((info == NULL) && (infolen != NULL) && (*infolen != 0)) ||
848	    ((info != NULL) && (infotype == NULL))) {
849		errno = EINVAL;
850		return (-1);
851	}
852	if (infotype) {
853		*infotype = SCTP_RECVV_NOINFO;
854	}
855	msg.msg_name = from;
856	if (fromlen == NULL) {
857		msg.msg_namelen = 0;
858	} else {
859		msg.msg_namelen = *fromlen;
860	}
861	msg.msg_iov = (struct iovec *)iov;
862	msg.msg_iovlen = iovlen;
863	msg.msg_control = cmsgbuf;
864	msg.msg_controllen = sizeof(cmsgbuf);
865	ret = recvmsg(sd, &msg, *flags);
866	*flags = msg.msg_flags;
867	if ((ret > 0) &&
868	    (msg.msg_controllen > 0) &&
869	    (infotype != NULL) &&
870	    (infolen != NULL) &&
871	    (*infolen > 0)) {
872		rcvinfo = NULL;
873		nxtinfo = NULL;
874		for (cmsg = CMSG_FIRSTHDR(&msg); cmsg; cmsg = CMSG_NXTHDR(&msg, cmsg)) {
875			if (cmsg->cmsg_level != IPPROTO_SCTP) {
876				continue;
877			}
878			if (cmsg->cmsg_type == SCTP_RCVINFO) {
879				rcvinfo = (struct sctp_rcvinfo *)CMSG_DATA(cmsg);
880				if (nxtinfo != NULL) {
881					break;
882				} else {
883					continue;
884				}
885			}
886			if (cmsg->cmsg_type == SCTP_NXTINFO) {
887				nxtinfo = (struct sctp_nxtinfo *)CMSG_DATA(cmsg);
888				if (rcvinfo != NULL) {
889					break;
890				} else {
891					continue;
892				}
893			}
894		}
895		if (rcvinfo != NULL) {
896			if ((nxtinfo != NULL) && (*infolen >= sizeof(struct sctp_recvv_rn))) {
897				struct sctp_recvv_rn *rn_info;
898
899				rn_info = (struct sctp_recvv_rn *)info;
900				rn_info->recvv_rcvinfo = *rcvinfo;
901				rn_info->recvv_nxtinfo = *nxtinfo;
902				*infolen = (socklen_t) sizeof(struct sctp_recvv_rn);
903				*infotype = SCTP_RECVV_RN;
904			} else if (*infolen >= sizeof(struct sctp_rcvinfo)) {
905				memcpy(info, rcvinfo, sizeof(struct sctp_rcvinfo));
906				*infolen = (socklen_t) sizeof(struct sctp_rcvinfo);
907				*infotype = SCTP_RECVV_RCVINFO;
908			}
909		} else if (nxtinfo != NULL) {
910			if (*infolen >= sizeof(struct sctp_nxtinfo)) {
911				memcpy(info, nxtinfo, sizeof(struct sctp_nxtinfo));
912				*infolen = (socklen_t) sizeof(struct sctp_nxtinfo);
913				*infotype = SCTP_RECVV_NXTINFO;
914			}
915		}
916	}
917	return (ret);
918}
919
920ssize_t
921sctp_sendv(int sd,
922    const struct iovec *iov, int iovcnt,
923    struct sockaddr *addrs, int addrcnt,
924    void *info, socklen_t infolen, unsigned int infotype,
925    int flags)
926{
927	ssize_t ret;
928	int i;
929	socklen_t addr_len;
930	struct msghdr msg;
931	in_port_t port;
932	struct sctp_sendv_spa *spa_info;
933	struct cmsghdr *cmsg;
934	char *cmsgbuf;
935	struct sockaddr *addr;
936	struct sockaddr_in *addr_in;
937	struct sockaddr_in6 *addr_in6;
938
939	if ((addrcnt < 0) ||
940	    (iovcnt < 0) ||
941	    ((addrs == NULL) && (addrcnt > 0)) ||
942	    ((addrs != NULL) && (addrcnt == 0)) ||
943	    ((iov == NULL) && (iovcnt > 0)) ||
944	    ((iov != NULL) && (iovcnt == 0))) {
945		errno = EINVAL;
946		return (-1);
947	}
948	cmsgbuf = malloc(CMSG_SPACE(sizeof(struct sctp_sndinfo)) +
949	    CMSG_SPACE(sizeof(struct sctp_prinfo)) +
950	    CMSG_SPACE(sizeof(struct sctp_authinfo)) +
951	    (size_t)addrcnt * CMSG_SPACE(sizeof(struct in6_addr)));
952	if (cmsgbuf == NULL) {
953		errno = ENOMEM;
954		return (-1);
955	}
956	msg.msg_control = cmsgbuf;
957	msg.msg_controllen = 0;
958	cmsg = (struct cmsghdr *)cmsgbuf;
959	switch (infotype) {
960	case SCTP_SENDV_NOINFO:
961		if ((infolen != 0) || (info != NULL)) {
962			free(cmsgbuf);
963			errno = EINVAL;
964			return (-1);
965		}
966		break;
967	case SCTP_SENDV_SNDINFO:
968		if ((info == NULL) || (infolen < sizeof(struct sctp_sndinfo))) {
969			free(cmsgbuf);
970			errno = EINVAL;
971			return (-1);
972		}
973		cmsg->cmsg_level = IPPROTO_SCTP;
974		cmsg->cmsg_type = SCTP_SNDINFO;
975		cmsg->cmsg_len = CMSG_LEN(sizeof(struct sctp_sndinfo));
976		memcpy(CMSG_DATA(cmsg), info, sizeof(struct sctp_sndinfo));
977		msg.msg_controllen += CMSG_SPACE(sizeof(struct sctp_sndinfo));
978		cmsg = (struct cmsghdr *)((caddr_t)cmsg + CMSG_SPACE(sizeof(struct sctp_sndinfo)));
979		break;
980	case SCTP_SENDV_PRINFO:
981		if ((info == NULL) || (infolen < sizeof(struct sctp_prinfo))) {
982			free(cmsgbuf);
983			errno = EINVAL;
984			return (-1);
985		}
986		cmsg->cmsg_level = IPPROTO_SCTP;
987		cmsg->cmsg_type = SCTP_PRINFO;
988		cmsg->cmsg_len = CMSG_LEN(sizeof(struct sctp_prinfo));
989		memcpy(CMSG_DATA(cmsg), info, sizeof(struct sctp_prinfo));
990		msg.msg_controllen += CMSG_SPACE(sizeof(struct sctp_prinfo));
991		cmsg = (struct cmsghdr *)((caddr_t)cmsg + CMSG_SPACE(sizeof(struct sctp_prinfo)));
992		break;
993	case SCTP_SENDV_AUTHINFO:
994		if ((info == NULL) || (infolen < sizeof(struct sctp_authinfo))) {
995			free(cmsgbuf);
996			errno = EINVAL;
997			return (-1);
998		}
999		cmsg->cmsg_level = IPPROTO_SCTP;
1000		cmsg->cmsg_type = SCTP_AUTHINFO;
1001		cmsg->cmsg_len = CMSG_LEN(sizeof(struct sctp_authinfo));
1002		memcpy(CMSG_DATA(cmsg), info, sizeof(struct sctp_authinfo));
1003		msg.msg_controllen += CMSG_SPACE(sizeof(struct sctp_authinfo));
1004		cmsg = (struct cmsghdr *)((caddr_t)cmsg + CMSG_SPACE(sizeof(struct sctp_authinfo)));
1005		break;
1006	case SCTP_SENDV_SPA:
1007		if ((info == NULL) || (infolen < sizeof(struct sctp_sendv_spa))) {
1008			free(cmsgbuf);
1009			errno = EINVAL;
1010			return (-1);
1011		}
1012		spa_info = (struct sctp_sendv_spa *)info;
1013		if (spa_info->sendv_flags & SCTP_SEND_SNDINFO_VALID) {
1014			cmsg->cmsg_level = IPPROTO_SCTP;
1015			cmsg->cmsg_type = SCTP_SNDINFO;
1016			cmsg->cmsg_len = CMSG_LEN(sizeof(struct sctp_sndinfo));
1017			memcpy(CMSG_DATA(cmsg), &spa_info->sendv_sndinfo, sizeof(struct sctp_sndinfo));
1018			msg.msg_controllen += CMSG_SPACE(sizeof(struct sctp_sndinfo));
1019			cmsg = (struct cmsghdr *)((caddr_t)cmsg + CMSG_SPACE(sizeof(struct sctp_sndinfo)));
1020		}
1021		if (spa_info->sendv_flags & SCTP_SEND_PRINFO_VALID) {
1022			cmsg->cmsg_level = IPPROTO_SCTP;
1023			cmsg->cmsg_type = SCTP_PRINFO;
1024			cmsg->cmsg_len = CMSG_LEN(sizeof(struct sctp_prinfo));
1025			memcpy(CMSG_DATA(cmsg), &spa_info->sendv_prinfo, sizeof(struct sctp_prinfo));
1026			msg.msg_controllen += CMSG_SPACE(sizeof(struct sctp_prinfo));
1027			cmsg = (struct cmsghdr *)((caddr_t)cmsg + CMSG_SPACE(sizeof(struct sctp_prinfo)));
1028		}
1029		if (spa_info->sendv_flags & SCTP_SEND_AUTHINFO_VALID) {
1030			cmsg->cmsg_level = IPPROTO_SCTP;
1031			cmsg->cmsg_type = SCTP_AUTHINFO;
1032			cmsg->cmsg_len = CMSG_LEN(sizeof(struct sctp_authinfo));
1033			memcpy(CMSG_DATA(cmsg), &spa_info->sendv_authinfo, sizeof(struct sctp_authinfo));
1034			msg.msg_controllen += CMSG_SPACE(sizeof(struct sctp_authinfo));
1035			cmsg = (struct cmsghdr *)((caddr_t)cmsg + CMSG_SPACE(sizeof(struct sctp_authinfo)));
1036		}
1037		break;
1038	default:
1039		free(cmsgbuf);
1040		errno = EINVAL;
1041		return (-1);
1042	}
1043	addr = addrs;
1044	msg.msg_name = NULL;
1045	msg.msg_namelen = 0;
1046
1047	for (i = 0; i < addrcnt; i++) {
1048		switch (addr->sa_family) {
1049		case AF_INET:
1050			addr_len = (socklen_t) sizeof(struct sockaddr_in);
1051			addr_in = (struct sockaddr_in *)addr;
1052			if (addr_in->sin_len != addr_len) {
1053				free(cmsgbuf);
1054				errno = EINVAL;
1055				return (-1);
1056			}
1057			if (i == 0) {
1058				port = addr_in->sin_port;
1059			} else {
1060				if (port == addr_in->sin_port) {
1061					cmsg->cmsg_level = IPPROTO_SCTP;
1062					cmsg->cmsg_type = SCTP_DSTADDRV4;
1063					cmsg->cmsg_len = CMSG_LEN(sizeof(struct in_addr));
1064					memcpy(CMSG_DATA(cmsg), &addr_in->sin_addr, sizeof(struct in_addr));
1065					msg.msg_controllen += CMSG_SPACE(sizeof(struct in_addr));
1066					cmsg = (struct cmsghdr *)((caddr_t)cmsg + CMSG_SPACE(sizeof(struct in_addr)));
1067				} else {
1068					free(cmsgbuf);
1069					errno = EINVAL;
1070					return (-1);
1071				}
1072			}
1073			break;
1074		case AF_INET6:
1075			addr_len = (socklen_t) sizeof(struct sockaddr_in6);
1076			addr_in6 = (struct sockaddr_in6 *)addr;
1077			if (addr_in6->sin6_len != addr_len) {
1078				free(cmsgbuf);
1079				errno = EINVAL;
1080				return (-1);
1081			}
1082			if (i == 0) {
1083				port = addr_in6->sin6_port;
1084			} else {
1085				if (port == addr_in6->sin6_port) {
1086					cmsg->cmsg_level = IPPROTO_SCTP;
1087					cmsg->cmsg_type = SCTP_DSTADDRV6;
1088					cmsg->cmsg_len = CMSG_LEN(sizeof(struct in6_addr));
1089					memcpy(CMSG_DATA(cmsg), &addr_in6->sin6_addr, sizeof(struct in6_addr));
1090					msg.msg_controllen += CMSG_SPACE(sizeof(struct in6_addr));
1091					cmsg = (struct cmsghdr *)((caddr_t)cmsg + CMSG_SPACE(sizeof(struct in6_addr)));
1092				} else {
1093					free(cmsgbuf);
1094					errno = EINVAL;
1095					return (-1);
1096				}
1097			}
1098			break;
1099		default:
1100			free(cmsgbuf);
1101			errno = EINVAL;
1102			return (-1);
1103		}
1104		if (i == 0) {
1105			msg.msg_name = addr;
1106			msg.msg_namelen = addr_len;
1107		}
1108		addr = (struct sockaddr *)((caddr_t)addr + addr_len);
1109	}
1110	if (msg.msg_controllen == 0) {
1111		msg.msg_control = NULL;
1112	}
1113	msg.msg_iov = (struct iovec *)iov;
1114	msg.msg_iovlen = iovcnt;
1115	msg.msg_flags = 0;
1116	ret = sendmsg(sd, &msg, flags);
1117	free(cmsgbuf);
1118	return (ret);
1119}
1120
1121
1122#if !defined(SYS_sctp_peeloff) && !defined(HAVE_SCTP_PEELOFF_SOCKOPT)
1123
1124int
1125sctp_peeloff(int sd, sctp_assoc_t assoc_id)
1126{
1127	/* NOT supported, return invalid sd */
1128	errno = ENOTSUP;
1129	return (-1);
1130}
1131
1132#endif
1133#if defined(SYS_sctp_peeloff) && !defined(HAVE_SCTP_PEELOFF_SOCKOPT)
1134int
1135sctp_peeloff(int sd, sctp_assoc_t assoc_id)
1136{
1137	return (syscall(SYS_sctp_peeloff, sd, assoc_id));
1138}
1139
1140#endif
1141
1142#undef SCTP_CONTROL_VEC_SIZE_RCV
1143