sctp_sys_calls.c revision 170580
1/*	$KAME: sctp_sys_calls.c,v 1.9 2004/08/17 06:08:53 itojun Exp $ */
2
3/*
4 * Copyright (C) 2002-2007 Cisco Systems Inc,
5 * All rights reserved.
6 *
7 * Redistribution and use in source and binary forms, with or without
8 * modification, are permitted provided that the following conditions
9 * are met:
10 * 1. Redistributions of source code must retain the above copyright
11 *    notice, this list of conditions and the following disclaimer.
12 * 2. Redistributions in binary form must reproduce the above copyright
13 *    notice, this list of conditions and the following disclaimer in the
14 *    documentation and/or other materials provided with the distribution.
15 * 3. Neither the name of the project nor the names of its contributors
16 *    may be used to endorse or promote products derived from this software
17 *    without specific prior written permission.
18 *
19 * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND
20 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
21 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
22 * ARE DISCLAIMED.  IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE
23 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
24 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
25 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
26 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
27 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
28 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
29 * SUCH DAMAGE.
30 */
31#include <sys/cdefs.h>
32__FBSDID("$FreeBSD: head/lib/libc/net/sctp_sys_calls.c 170580 2007-06-11 21:05:29Z rrs $");
33#include <stdio.h>
34#include <string.h>
35#include <errno.h>
36#include <stdlib.h>
37#include <unistd.h>
38#include <sys/types.h>
39#include <sys/socket.h>
40#include <sys/errno.h>
41#include <sys/syscall.h>
42#include <sys/uio.h>
43#include <netinet/in.h>
44#include <arpa/inet.h>
45#include <netinet/sctp_uio.h>
46#include <netinet/sctp.h>
47
48#include <net/if_dl.h>
49
50#ifndef IN6_IS_ADDR_V4MAPPED
51#define IN6_IS_ADDR_V4MAPPED(a)		      \
52	((*(const u_int32_t *)(const void *)(&(a)->s6_addr[0]) == 0) &&	\
53	 (*(const u_int32_t *)(const void *)(&(a)->s6_addr[4]) == 0) &&	\
54	 (*(const u_int32_t *)(const void *)(&(a)->s6_addr[8]) == ntohl(0x0000ffff)))
55#endif
56
57
58#define SCTP_CONTROL_VEC_SIZE_SND   8192
59#define SCTP_CONTROL_VEC_SIZE_RCV  16384
60#define SCTP_STACK_BUF_SIZE         2048
61#define SCTP_SMALL_IOVEC_SIZE          2
62
63#ifdef SCTP_DEBUG_PRINT_ADDRESS
64
65#define SCTP_STRING_BUF_SZ 256
66
67static void
68SCTPPrintAnAddress(struct sockaddr *a)
69{
70	char stringToPrint[SCTP_STRING_BUF_SZ];
71	u_short prt;
72	char *srcaddr, *txt;
73
74	if (a == NULL) {
75		printf("NULL\n");
76		return;
77	}
78	if (a->sa_family == AF_INET) {
79		srcaddr = (char *)&((struct sockaddr_in *)a)->sin_addr;
80		txt = "IPv4 Address: ";
81		prt = ntohs(((struct sockaddr_in *)a)->sin_port);
82	} else if (a->sa_family == AF_INET6) {
83		srcaddr = (char *)&((struct sockaddr_in6 *)a)->sin6_addr;
84		prt = ntohs(((struct sockaddr_in6 *)a)->sin6_port);
85		txt = "IPv6 Address: ";
86	} else if (a->sa_family == AF_LINK) {
87		int i;
88		char tbuf[SCTP_STRING_BUF_SZ];
89		u_char adbuf[SCTP_STRING_BUF_SZ];
90		struct sockaddr_dl *dl;
91
92		dl = (struct sockaddr_dl *)a;
93		strncpy(tbuf, dl->sdl_data, dl->sdl_nlen);
94		tbuf[dl->sdl_nlen] = 0;
95		printf("Intf:%s (len:%d)Interface index:%d type:%x(%d) ll-len:%d ",
96		    tbuf,
97		    dl->sdl_nlen,
98		    dl->sdl_index,
99		    dl->sdl_type,
100		    dl->sdl_type,
101		    dl->sdl_alen
102		    );
103		memcpy(adbuf, LLADDR(dl), dl->sdl_alen);
104		for (i = 0; i < dl->sdl_alen; i++) {
105			printf("%2.2x", adbuf[i]);
106			if (i < (dl->sdl_alen - 1))
107				printf(":");
108		}
109		printf("\n");
110		return;
111	} else {
112		return;
113	}
114	if (inet_ntop(a->sa_family, srcaddr, stringToPrint, sizeof(stringToPrint))) {
115		if (a->sa_family == AF_INET6) {
116			printf("%s%s:%d scope:%d\n",
117			    txt, stringToPrint, prt,
118			    ((struct sockaddr_in6 *)a)->sin6_scope_id);
119		} else {
120			printf("%s%s:%d\n", txt, stringToPrint, prt);
121		}
122
123	} else {
124		printf("%s unprintable?\n", txt);
125	}
126}
127
128#endif				/* SCTP_DEBUG_PRINT_ADDRESS */
129
130static void
131in6_sin6_2_sin(struct sockaddr_in *sin, struct sockaddr_in6 *sin6)
132{
133	bzero(sin, sizeof(*sin));
134	sin->sin_len = sizeof(struct sockaddr_in);
135	sin->sin_family = AF_INET;
136	sin->sin_port = sin6->sin6_port;
137	sin->sin_addr.s_addr = sin6->sin6_addr.__u6_addr.__u6_addr32[3];
138}
139
140int
141sctp_getaddrlen(sa_family_t family)
142{
143	int error, sd;
144	socklen_t siz;
145	struct sctp_assoc_value av;
146
147	av.assoc_value = family;
148	siz = sizeof(av);
149#if defined(AF_INET)
150	sd = socket(AF_INET, SOCK_SEQPACKET, IPPROTO_SCTP);
151#elif defined(AF_INET6)
152	sd = socket(AF_INET6, SOCK_SEQPACKET, IPPROTO_SCTP);
153#endif
154	if (sd == -1) {
155		return (errno);
156	}
157	error = getsockopt(sd, IPPROTO_SCTP, SCTP_GET_ADDR_LEN, &av, &siz);
158	close(sd);
159	if (error == 0) {
160		return ((int)av.assoc_value);
161	} else {
162		return (error);
163	}
164}
165
166int
167sctp_connectx(int sd, const struct sockaddr *addrs, int addrcnt,
168    sctp_assoc_t * id)
169{
170	char buf[SCTP_STACK_BUF_SIZE];
171	int i, ret, cnt, *aa;
172	char *cpto;
173	const struct sockaddr *at;
174	sctp_assoc_t *p_id;
175	size_t len = sizeof(int);
176
177	/* validate the address count and list */
178	if ((addrs == NULL) || (addrcnt <= 0)) {
179		errno = EINVAL;
180		return (-1);
181	}
182	at = addrs;
183	cnt = 0;
184	cpto = ((caddr_t)buf + sizeof(int));
185	/* validate all the addresses and get the size */
186	for (i = 0; i < addrcnt; i++) {
187		if (at->sa_family == AF_INET) {
188			memcpy(cpto, at, at->sa_len);
189			cpto = ((caddr_t)cpto + at->sa_len);
190			len += at->sa_len;
191		} else if (at->sa_family == AF_INET6) {
192			if (IN6_IS_ADDR_V4MAPPED(&((struct sockaddr_in6 *)at)->sin6_addr)) {
193				len += sizeof(struct sockaddr_in);
194				in6_sin6_2_sin((struct sockaddr_in *)cpto, (struct sockaddr_in6 *)at);
195				cpto = ((caddr_t)cpto + sizeof(struct sockaddr_in));
196				len += sizeof(struct sockaddr_in);
197			} else {
198				memcpy(cpto, at, at->sa_len);
199				cpto = ((caddr_t)cpto + at->sa_len);
200				len += at->sa_len;
201			}
202		} else {
203			errno = EINVAL;
204			return (-1);
205		}
206		if (len > (sizeof(buf) - sizeof(int))) {
207			/* Never enough memory */
208			return (E2BIG);
209		}
210		at = (struct sockaddr *)((caddr_t)at + at->sa_len);
211		cnt++;
212	}
213	/* do we have any? */
214	if (cnt == 0) {
215		errno = EINVAL;
216		return (-1);
217	}
218	aa = (int *)buf;
219	*aa = cnt;
220	ret = setsockopt(sd, IPPROTO_SCTP, SCTP_CONNECT_X, (void *)buf,
221	    (socklen_t) len);
222	if ((ret == 0) && id) {
223		p_id = (sctp_assoc_t *) buf;
224		*id = *p_id;
225	}
226	return (ret);
227}
228
229int
230sctp_bindx(int sd, struct sockaddr *addrs, int addrcnt, int flags)
231{
232	struct sctp_getaddresses *gaddrs;
233	struct sockaddr *sa;
234	int i, sz, fam, argsz;
235
236	/* validate the flags */
237	if ((flags != SCTP_BINDX_ADD_ADDR) &&
238	    (flags != SCTP_BINDX_REM_ADDR)) {
239		errno = EFAULT;
240		return (-1);
241	}
242	/* validate the address count and list */
243	if ((addrcnt <= 0) || (addrs == NULL)) {
244		errno = EINVAL;
245		return (-1);
246	}
247	argsz = (sizeof(struct sockaddr_storage) +
248	    sizeof(struct sctp_getaddresses));
249	gaddrs = (struct sctp_getaddresses *)calloc(1, argsz);
250	if (gaddrs == NULL) {
251		errno = ENOMEM;
252		return (-1);
253	}
254	gaddrs->sget_assoc_id = 0;
255	sa = addrs;
256	for (i = 0; i < addrcnt; i++) {
257		sz = sa->sa_len;
258		fam = sa->sa_family;
259		((struct sockaddr_in *)&addrs[i])->sin_port = ((struct sockaddr_in *)sa)->sin_port;
260		if ((fam != AF_INET) && (fam != AF_INET6)) {
261			errno = EINVAL;
262			return (-1);
263		}
264		memcpy(gaddrs->addr, sa, sz);
265		if (setsockopt(sd, IPPROTO_SCTP, flags,
266		    gaddrs, (socklen_t) argsz) != 0) {
267			free(gaddrs);
268			return (-1);
269		}
270		memset(gaddrs, 0, argsz);
271		sa = (struct sockaddr *)((caddr_t)sa + sz);
272	}
273	free(gaddrs);
274	return (0);
275}
276
277
278int
279sctp_opt_info(int sd, sctp_assoc_t id, int opt, void *arg, socklen_t * size)
280{
281	if (arg == NULL) {
282		return (EINVAL);
283	}
284	*(sctp_assoc_t *) arg = id;
285	return (getsockopt(sd, IPPROTO_SCTP, opt, arg, size));
286}
287
288int
289sctp_getpaddrs(int sd, sctp_assoc_t id, struct sockaddr **raddrs)
290{
291	struct sctp_getaddresses *addrs;
292	struct sockaddr *sa;
293	struct sockaddr *re;
294	sctp_assoc_t asoc;
295	caddr_t lim;
296	socklen_t siz;
297	int cnt;
298
299	if (raddrs == NULL) {
300		errno = EFAULT;
301		return (-1);
302	}
303	asoc = id;
304	siz = sizeof(sctp_assoc_t);
305	if (getsockopt(sd, IPPROTO_SCTP, SCTP_GET_REMOTE_ADDR_SIZE,
306	    &asoc, &siz) != 0) {
307		errno = ENOMEM;
308		return (-1);
309	}
310	/* size required is returned in 'asoc' */
311	siz = (size_t)asoc;
312	siz += sizeof(struct sctp_getaddresses);
313	addrs = calloc(1, siz);
314	if (addrs == NULL) {
315		errno = ENOMEM;
316		return (-1);
317	}
318	memset(addrs, 0, siz);
319	addrs->sget_assoc_id = id;
320	/* Now lets get the array of addresses */
321	if (getsockopt(sd, IPPROTO_SCTP, SCTP_GET_PEER_ADDRESSES,
322	    addrs, &siz) != 0) {
323		free(addrs);
324		errno = ENOMEM;
325		return (-1);
326	}
327	re = (struct sockaddr *)&addrs->addr[0];
328	*raddrs = re;
329	cnt = 0;
330	sa = (struct sockaddr *)&addrs->addr[0];
331	lim = (caddr_t)addrs + siz;
332	while (((caddr_t)sa < lim) && (sa->sa_len > 0)) {
333		sa = (struct sockaddr *)((caddr_t)sa + sa->sa_len);
334		cnt++;
335	}
336	return (cnt);
337}
338
339void
340sctp_freepaddrs(struct sockaddr *addrs)
341{
342	/* Take away the hidden association id */
343	void *fr_addr;
344
345	fr_addr = (void *)((caddr_t)addrs - sizeof(sctp_assoc_t));
346	/* Now free it */
347	free(fr_addr);
348}
349
350int
351sctp_getladdrs(int sd, sctp_assoc_t id, struct sockaddr **raddrs)
352{
353	struct sctp_getaddresses *addrs;
354	struct sockaddr *re;
355	caddr_t lim;
356	struct sockaddr *sa;
357	int size_of_addresses;
358	socklen_t siz;
359	int cnt;
360
361	if (raddrs == NULL) {
362		errno = EFAULT;
363		return (-1);
364	}
365	size_of_addresses = 0;
366	siz = sizeof(int);
367	if (getsockopt(sd, IPPROTO_SCTP, SCTP_GET_LOCAL_ADDR_SIZE,
368	    &size_of_addresses, &siz) != 0) {
369		errno = ENOMEM;
370		return (-1);
371	}
372	if (size_of_addresses == 0) {
373		errno = ENOTCONN;
374		return (-1);
375	}
376	siz = size_of_addresses + sizeof(struct sockaddr_storage);
377	siz += sizeof(struct sctp_getaddresses);
378	addrs = calloc(1, siz);
379	if (addrs == NULL) {
380		errno = ENOMEM;
381		return (-1);
382	}
383	memset(addrs, 0, siz);
384	addrs->sget_assoc_id = id;
385	/* Now lets get the array of addresses */
386	if (getsockopt(sd, IPPROTO_SCTP, SCTP_GET_LOCAL_ADDRESSES, addrs,
387	    &siz) != 0) {
388		free(addrs);
389		errno = ENOMEM;
390		return (-1);
391	}
392	re = (struct sockaddr *)&addrs->addr[0];
393	*raddrs = re;
394	cnt = 0;
395	sa = (struct sockaddr *)&addrs->addr[0];
396	lim = (caddr_t)addrs + siz;
397	while (((caddr_t)sa < lim) && (sa->sa_len > 0)) {
398		sa = (struct sockaddr *)((caddr_t)sa + sa->sa_len);
399		cnt++;
400	}
401	return (cnt);
402}
403
404void
405sctp_freeladdrs(struct sockaddr *addrs)
406{
407	/* Take away the hidden association id */
408	void *fr_addr;
409
410	fr_addr = (void *)((caddr_t)addrs - sizeof(sctp_assoc_t));
411	/* Now free it */
412	free(fr_addr);
413}
414
415
416ssize_t
417sctp_sendmsg(int s,
418    const void *data,
419    size_t len,
420    const struct sockaddr *to,
421    socklen_t tolen,
422    u_int32_t ppid,
423    u_int32_t flags,
424    u_int16_t stream_no,
425    u_int32_t timetolive,
426    u_int32_t context)
427{
428#ifdef SYS_sctp_generic_sendmsg
429	struct sctp_sndrcvinfo sinfo;
430
431	sinfo.sinfo_ppid = ppid;
432	sinfo.sinfo_flags = flags;
433	sinfo.sinfo_stream = stream_no;
434	sinfo.sinfo_timetolive = timetolive;
435	sinfo.sinfo_context = context;
436	sinfo.sinfo_assoc_id = 0;
437	return (syscall(SYS_sctp_generic_sendmsg, s,
438	    data, len, to, tolen, &sinfo, 0));
439#else
440
441	ssize_t sz;
442	struct msghdr msg;
443	struct sctp_sndrcvinfo *s_info;
444	struct iovec iov[SCTP_SMALL_IOVEC_SIZE];
445	char controlVector[SCTP_CONTROL_VEC_SIZE_RCV];
446	struct cmsghdr *cmsg;
447	struct sockaddr *who = NULL;
448	union {
449		struct sockaddr_in in;
450		struct sockaddr_in6 in6;
451	}     addr;
452
453/*
454  fprintf(io, "sctp_sendmsg(sd:%d, data:%x, len:%d, to:%x, tolen:%d, ppid:%x, flags:%x str:%d ttl:%d ctx:%x\n",
455  s,
456  (u_int)data,
457  (int)len,
458  (u_int)to,
459  (int)tolen,
460  ppid, flags,
461  (int)stream_no,
462  (int)timetolive,
463  (u_int)context);
464  fflush(io);
465*/
466	if ((tolen > 0) && ((to == NULL) || (tolen < sizeof(struct sockaddr)))) {
467		errno = EINVAL;
468		return -1;
469	}
470	if (to && (tolen > 0)) {
471		if (to->sa_family == AF_INET) {
472			if (tolen != sizeof(struct sockaddr_in)) {
473				errno = EINVAL;
474				return -1;
475			}
476			if ((to->sa_len > 0) && (to->sa_len != sizeof(struct sockaddr_in))) {
477				errno = EINVAL;
478				return -1;
479			}
480			memcpy(&addr, to, sizeof(struct sockaddr_in));
481			addr.in.sin_len = sizeof(struct sockaddr_in);
482		} else if (to->sa_family == AF_INET6) {
483			if (tolen != sizeof(struct sockaddr_in6)) {
484				errno = EINVAL;
485				return -1;
486			}
487			if ((to->sa_len > 0) && (to->sa_len != sizeof(struct sockaddr_in6))) {
488				errno = EINVAL;
489				return -1;
490			}
491			memcpy(&addr, to, sizeof(struct sockaddr_in6));
492			addr.in6.sin6_len = sizeof(struct sockaddr_in6);
493		} else {
494			errno = EAFNOSUPPORT;
495			return -1;
496		}
497		who = (struct sockaddr *)&addr;
498	}
499	iov[0].iov_base = (char *)data;
500	iov[0].iov_len = len;
501	iov[1].iov_base = NULL;
502	iov[1].iov_len = 0;
503
504	if (who) {
505		msg.msg_name = (caddr_t)who;
506		msg.msg_namelen = who->sa_len;
507	} else {
508		msg.msg_name = (caddr_t)NULL;
509		msg.msg_namelen = 0;
510	}
511	msg.msg_iov = iov;
512	msg.msg_iovlen = 1;
513	msg.msg_control = (caddr_t)controlVector;
514
515	cmsg = (struct cmsghdr *)controlVector;
516
517	cmsg->cmsg_level = IPPROTO_SCTP;
518	cmsg->cmsg_type = SCTP_SNDRCV;
519	cmsg->cmsg_len = CMSG_LEN(sizeof(struct sctp_sndrcvinfo));
520	s_info = (struct sctp_sndrcvinfo *)CMSG_DATA(cmsg);
521
522	s_info->sinfo_stream = stream_no;
523	s_info->sinfo_ssn = 0;
524	s_info->sinfo_flags = flags;
525	s_info->sinfo_ppid = ppid;
526	s_info->sinfo_context = context;
527	s_info->sinfo_assoc_id = 0;
528	s_info->sinfo_timetolive = timetolive;
529	errno = 0;
530	msg.msg_controllen = cmsg->cmsg_len;
531	sz = sendmsg(s, &msg, 0);
532	return (sz);
533#endif
534}
535
536
537sctp_assoc_t
538sctp_getassocid(int sd, struct sockaddr *sa)
539{
540	struct sctp_paddrparams sp;
541	socklen_t siz;
542
543	/* First get the assoc id */
544	siz = sizeof(struct sctp_paddrparams);
545	memset(&sp, 0, sizeof(sp));
546	memcpy((caddr_t)&sp.spp_address, sa, sa->sa_len);
547	errno = 0;
548	if (getsockopt(sd, IPPROTO_SCTP,
549	    SCTP_PEER_ADDR_PARAMS, &sp, &siz) != 0) {
550		return ((sctp_assoc_t) 0);
551	}
552	/* We depend on the fact that 0 can never be returned */
553	return (sp.spp_assoc_id);
554}
555
556ssize_t
557sctp_send(int sd, const void *data, size_t len,
558    const struct sctp_sndrcvinfo *sinfo,
559    int flags)
560{
561
562#ifdef SYS_sctp_generic_sendmsg
563	struct sockaddr *to = NULL;
564
565	return (syscall(SYS_sctp_generic_sendmsg, sd,
566	    data, len, to, 0, sinfo, flags));
567#else
568	ssize_t sz;
569	struct msghdr msg;
570	struct iovec iov[SCTP_SMALL_IOVEC_SIZE];
571	struct sctp_sndrcvinfo *s_info;
572	char controlVector[SCTP_CONTROL_VEC_SIZE_SND];
573	struct cmsghdr *cmsg;
574
575	if (sinfo == NULL) {
576		return (EINVAL);
577	}
578	iov[0].iov_base = (char *)data;
579	iov[0].iov_len = len;
580	iov[1].iov_base = NULL;
581	iov[1].iov_len = 0;
582
583	msg.msg_name = 0;
584	msg.msg_namelen = 0;
585	msg.msg_iov = iov;
586	msg.msg_iovlen = 1;
587	msg.msg_control = (caddr_t)controlVector;
588
589	cmsg = (struct cmsghdr *)controlVector;
590
591	cmsg->cmsg_level = IPPROTO_SCTP;
592	cmsg->cmsg_type = SCTP_SNDRCV;
593	cmsg->cmsg_len = CMSG_LEN(sizeof(struct sctp_sndrcvinfo));
594	s_info = (struct sctp_sndrcvinfo *)CMSG_DATA(cmsg);
595	/* copy in the data */
596	*s_info = *sinfo;
597	errno = 0;
598	msg.msg_controllen = cmsg->cmsg_len;
599	sz = sendmsg(sd, &msg, flags);
600	return (sz);
601#endif
602}
603
604
605
606ssize_t
607sctp_sendx(int sd, const void *msg, size_t msg_len,
608    struct sockaddr *addrs, int addrcnt,
609    struct sctp_sndrcvinfo *sinfo,
610    int flags)
611{
612	ssize_t ret;
613	int i, cnt, *aa, saved_errno;
614	char *buf;
615	int add_len, len, no_end_cx = 0;
616	struct sockaddr *at;
617
618
619#ifdef SYS_sctp_generic_sendmsg
620	if (addrcnt < SCTP_SMALL_IOVEC_SIZE) {
621		socklen_t l;
622
623		/*
624		 * Quick way, we don't need to do a connectx so lets use the
625		 * syscall directly.
626		 */
627		l = addrs->sa_len;
628		return (syscall(SYS_sctp_generic_sendmsg, sd,
629		    msg, msg_len, addrs, l, sinfo, flags));
630	}
631#endif
632	len = sizeof(int);
633	at = addrs;
634	cnt = 0;
635	/* validate all the addresses and get the size */
636	for (i = 0; i < addrcnt; i++) {
637		if (at->sa_family == AF_INET) {
638			add_len = sizeof(struct sockaddr_in);
639		} else if (at->sa_family == AF_INET6) {
640			add_len = sizeof(struct sockaddr_in6);
641		} else {
642			errno = EINVAL;
643			return (-1);
644		}
645		len += add_len;
646		at = (struct sockaddr *)((caddr_t)at + add_len);
647		cnt++;
648	}
649	/* do we have any? */
650	if (cnt == 0) {
651		errno = EINVAL;
652		return (-1);
653	}
654	buf = malloc(len);
655	if (buf == NULL) {
656		return (ENOMEM);
657	}
658	aa = (int *)buf;
659	*aa = cnt;
660	aa++;
661	memcpy((caddr_t)aa, addrs, (len - sizeof(int)));
662	ret = setsockopt(sd, IPPROTO_SCTP, SCTP_CONNECT_X_DELAYED, (void *)buf,
663	    (socklen_t) len);
664
665	free(buf);
666	if (ret != 0) {
667		if (errno == EALREADY) {
668			no_end_cx = 1;;
669			goto continue_send;
670		}
671		return (ret);
672	}
673continue_send:
674	sinfo->sinfo_assoc_id = sctp_getassocid(sd, addrs);
675	if (sinfo->sinfo_assoc_id == 0) {
676		printf("Huh, can't get associd? TSNH!\n");
677		(void)setsockopt(sd, IPPROTO_SCTP, SCTP_CONNECT_X_COMPLETE, (void *)addrs,
678		    (socklen_t) addrs->sa_len);
679		errno = ENOENT;
680		return (-1);
681	}
682	ret = sctp_send(sd, msg, msg_len, sinfo, flags);
683	saved_errno = errno;
684	if (no_end_cx == 0)
685		(void)setsockopt(sd, IPPROTO_SCTP, SCTP_CONNECT_X_COMPLETE, (void *)addrs,
686		    (socklen_t) addrs->sa_len);
687
688	errno = saved_errno;
689	return (ret);
690}
691
692ssize_t
693sctp_sendmsgx(int sd,
694    const void *msg,
695    size_t len,
696    struct sockaddr *addrs,
697    int addrcnt,
698    u_int32_t ppid,
699    u_int32_t flags,
700    u_int16_t stream_no,
701    u_int32_t timetolive,
702    u_int32_t context)
703{
704	struct sctp_sndrcvinfo sinfo;
705
706	memset((void *)&sinfo, 0, sizeof(struct sctp_sndrcvinfo));
707	sinfo.sinfo_ppid = ppid;
708	sinfo.sinfo_flags = flags;
709	sinfo.sinfo_ssn = stream_no;
710	sinfo.sinfo_timetolive = timetolive;
711	sinfo.sinfo_context = context;
712	return sctp_sendx(sd, msg, len, addrs, addrcnt, &sinfo, 0);
713}
714
715ssize_t
716sctp_recvmsg(int s,
717    void *dbuf,
718    size_t len,
719    struct sockaddr *from,
720    socklen_t * fromlen,
721    struct sctp_sndrcvinfo *sinfo,
722    int *msg_flags)
723{
724#ifdef SYS_sctp_generic_recvmsg
725	struct iovec iov[SCTP_SMALL_IOVEC_SIZE];
726
727	iov[0].iov_base = dbuf;
728	iov[0].iov_len = len;
729	return (syscall(SYS_sctp_generic_recvmsg, s,
730	    iov, 1, from, fromlen, sinfo, msg_flags));
731#else
732	struct sctp_sndrcvinfo *s_info;
733	ssize_t sz;
734	int sinfo_found = 0;
735	struct msghdr msg;
736	struct iovec iov[SCTP_SMALL_IOVEC_SIZE];
737	char controlVector[SCTP_CONTROL_VEC_SIZE_RCV];
738	struct cmsghdr *cmsg;
739
740	if (msg_flags == NULL) {
741		errno = EINVAL;
742		return (-1);
743	}
744	msg.msg_flags = 0;
745	iov[0].iov_base = dbuf;
746	iov[0].iov_len = len;
747	iov[1].iov_base = NULL;
748	iov[1].iov_len = 0;
749	msg.msg_name = (caddr_t)from;
750	if (fromlen == NULL)
751		msg.msg_namelen = 0;
752	else
753		msg.msg_namelen = *fromlen;
754	msg.msg_iov = iov;
755	msg.msg_iovlen = 1;
756	msg.msg_control = (caddr_t)controlVector;
757	msg.msg_controllen = sizeof(controlVector);
758	errno = 0;
759	sz = recvmsg(s, &msg, *msg_flags);
760	if (sz <= 0)
761		return (sz);
762
763	s_info = NULL;
764	len = sz;
765	*msg_flags = msg.msg_flags;
766	if (sinfo)
767		sinfo->sinfo_assoc_id = 0;
768
769	if ((msg.msg_controllen) && sinfo) {
770		/*
771		 * parse through and see if we find the sctp_sndrcvinfo (if
772		 * the user wants it).
773		 */
774		cmsg = (struct cmsghdr *)controlVector;
775		while (cmsg) {
776			if ((cmsg->cmsg_len == 0) || (cmsg->cmsg_len > msg.msg_controllen)) {
777				break;
778			}
779			if (cmsg->cmsg_level == IPPROTO_SCTP) {
780				if (cmsg->cmsg_type == SCTP_SNDRCV) {
781					/* Got it */
782					s_info = (struct sctp_sndrcvinfo *)CMSG_DATA(cmsg);
783					/* Copy it to the user */
784					if (sinfo)
785						*sinfo = *s_info;
786					sinfo_found = 1;
787					break;
788				} else if (cmsg->cmsg_type == SCTP_EXTRCV) {
789					/*
790					 * Got it, presumably the user has
791					 * asked for this extra info, so the
792					 * structure holds more room :-D
793					 */
794					s_info = (struct sctp_sndrcvinfo *)CMSG_DATA(cmsg);
795					/* Copy it to the user */
796					if (sinfo) {
797						memcpy(sinfo, s_info, sizeof(struct sctp_extrcvinfo));
798					}
799					sinfo_found = 1;
800					break;
801
802				}
803			}
804			cmsg = CMSG_NXTHDR(&msg, cmsg);
805		}
806	}
807	return (sz);
808#endif
809}
810
811
812#if defined(HAVE_SCTP_PEELOFF_SOCKOPT)
813#include <netinet/sctp_peeloff.h>
814
815int
816sctp_peeloff(int sd, sctp_assoc_t assoc_id)
817{
818	struct sctp_peeloff_opt peeloff;
819	int error;
820	socklen_t optlen;
821
822	/* set in the socket option params */
823	memset(&peeloff, 0, sizeof(peeloff));
824	peeloff.s = sd;
825	peeloff.assoc_id = assoc_id;
826	optlen = sizeof(peeloff);
827	error = getsockopt(sd, IPPROTO_SCTP, SCTP_PEELOFF, (void *)&peeloff,
828	    &optlen);
829	if (error) {
830		errno = error;
831		return (-1);
832	} else {
833		return (peeloff.new_sd);
834	}
835}
836
837#endif
838
839#if !defined(SYS_sctp_peeloff) && !defined(HAVE_SCTP_PEELOFF_SOCKOPT)
840
841int
842sctp_peeloff(int sd, sctp_assoc_t assoc_id)
843{
844	/* NOT supported, return invalid sd */
845	errno = ENOTSUP;
846	return (-1);
847}
848
849#endif
850#if defined(SYS_sctp_peeloff) && !defined(HAVE_SCTP_PEELOFF_SOCKOPT)
851int
852sctp_peeloff(int sd, sctp_assoc_t assoc_id)
853{
854	return (syscall(SYS_sctp_peeloff, sd, assoc_id));
855}
856
857#endif
858
859
860#undef SCTP_CONTROL_VEC_SIZE_SND
861#undef SCTP_CONTROL_VEC_SIZE_RCV
862#undef SCTP_STACK_BUF_SIZE
863#undef SCTP_SMALL_IOVEC_SIZE
864