sctp_sys_calls.c revision 231140
1/*-
2 * Copyright (c) 2001-2007, by Cisco Systems, Inc. All rights reserved.
3 * Copyright (c) 2008-2011, by Randall Stewart. All rights reserved.
4 * Copyright (c) 2008-2011, by Michael Tuexen. All rights reserved.
5 *
6 * Redistribution and use in source and binary forms, with or without
7 * modification, are permitted provided that the following conditions are met:
8 *
9 * a) Redistributions of source code must retain the above copyright notice,
10 *    this list of conditions and the following disclaimer.
11 *
12 * b) Redistributions in binary form must reproduce the above copyright
13 *    notice, this list of conditions and the following disclaimer in
14 *    the documentation and/or other materials provided with the distribution.
15 *
16 * c) Neither the name of Cisco Systems, Inc. nor the names of its
17 *    contributors may be used to endorse or promote products derived
18 *    from this software without specific prior written permission.
19 *
20 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
21 * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,
22 * THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23 * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE
24 * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
25 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
26 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
27 * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
28 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
29 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
30 * THE POSSIBILITY OF SUCH DAMAGE.
31 */
32
33#include <sys/cdefs.h>
34__FBSDID("$FreeBSD: stable/9/lib/libc/net/sctp_sys_calls.c 231140 2012-02-07 17:52:32Z tuexen $");
35#include <stdio.h>
36#include <string.h>
37#include <errno.h>
38#include <stdlib.h>
39#include <unistd.h>
40#include <sys/types.h>
41#include <sys/socket.h>
42#include <sys/errno.h>
43#include <sys/syscall.h>
44#include <sys/uio.h>
45#include <netinet/in.h>
46#include <arpa/inet.h>
47#include <netinet/sctp_uio.h>
48#include <netinet/sctp.h>
49
50#include <net/if_dl.h>
51
52#ifndef IN6_IS_ADDR_V4MAPPED
53#define IN6_IS_ADDR_V4MAPPED(a)		      \
54	((*(const uint32_t *)(const void *)(&(a)->s6_addr[0]) == 0) &&	\
55	 (*(const uint32_t *)(const void *)(&(a)->s6_addr[4]) == 0) &&	\
56	 (*(const uint32_t *)(const void *)(&(a)->s6_addr[8]) == ntohl(0x0000ffff)))
57#endif
58
59
60#define SCTP_CONTROL_VEC_SIZE_SND   8192
61#define SCTP_CONTROL_VEC_SIZE_RCV  16384
62#define SCTP_STACK_BUF_SIZE         2048
63
64#ifdef SCTP_DEBUG_PRINT_ADDRESS
65
66#define SCTP_STRING_BUF_SZ 256
67
68static void
69SCTPPrintAnAddress(struct sockaddr *a)
70{
71	char stringToPrint[SCTP_STRING_BUF_SZ];
72	u_short prt;
73	char *srcaddr, *txt;
74
75	if (a == NULL) {
76		printf("NULL\n");
77		return;
78	}
79	if (a->sa_family == AF_INET) {
80		srcaddr = (char *)&((struct sockaddr_in *)a)->sin_addr;
81		txt = "IPv4 Address: ";
82		prt = ntohs(((struct sockaddr_in *)a)->sin_port);
83	} else if (a->sa_family == AF_INET6) {
84		srcaddr = (char *)&((struct sockaddr_in6 *)a)->sin6_addr;
85		prt = ntohs(((struct sockaddr_in6 *)a)->sin6_port);
86		txt = "IPv6 Address: ";
87	} else if (a->sa_family == AF_LINK) {
88		int i;
89		char tbuf[SCTP_STRING_BUF_SZ];
90		u_char adbuf[SCTP_STRING_BUF_SZ];
91		struct sockaddr_dl *dl;
92
93		dl = (struct sockaddr_dl *)a;
94		strncpy(tbuf, dl->sdl_data, dl->sdl_nlen);
95		tbuf[dl->sdl_nlen] = 0;
96		printf("Intf:%s (len:%d)Interface index:%d type:%x(%d) ll-len:%d ",
97		    tbuf,
98		    dl->sdl_nlen,
99		    dl->sdl_index,
100		    dl->sdl_type,
101		    dl->sdl_type,
102		    dl->sdl_alen
103		    );
104		memcpy(adbuf, LLADDR(dl), dl->sdl_alen);
105		for (i = 0; i < dl->sdl_alen; i++) {
106			printf("%2.2x", adbuf[i]);
107			if (i < (dl->sdl_alen - 1))
108				printf(":");
109		}
110		printf("\n");
111		return;
112	} else {
113		return;
114	}
115	if (inet_ntop(a->sa_family, srcaddr, stringToPrint, sizeof(stringToPrint))) {
116		if (a->sa_family == AF_INET6) {
117			printf("%s%s:%d scope:%d\n",
118			    txt, stringToPrint, prt,
119			    ((struct sockaddr_in6 *)a)->sin6_scope_id);
120		} else {
121			printf("%s%s:%d\n", txt, stringToPrint, prt);
122		}
123
124	} else {
125		printf("%s unprintable?\n", txt);
126	}
127}
128
129#endif				/* SCTP_DEBUG_PRINT_ADDRESS */
130
131static void
132in6_sin6_2_sin(struct sockaddr_in *sin, struct sockaddr_in6 *sin6)
133{
134	bzero(sin, sizeof(*sin));
135	sin->sin_len = sizeof(struct sockaddr_in);
136	sin->sin_family = AF_INET;
137	sin->sin_port = sin6->sin6_port;
138	sin->sin_addr.s_addr = sin6->sin6_addr.__u6_addr.__u6_addr32[3];
139}
140
141int
142sctp_getaddrlen(sa_family_t family)
143{
144	int ret, sd;
145	socklen_t siz;
146	struct sctp_assoc_value av;
147
148	av.assoc_value = family;
149	siz = sizeof(av);
150#if defined(AF_INET)
151	sd = socket(AF_INET, SOCK_SEQPACKET, IPPROTO_SCTP);
152#elif defined(AF_INET6)
153	sd = socket(AF_INET6, SOCK_SEQPACKET, IPPROTO_SCTP);
154#else
155	sd = -1;
156#endif
157	if (sd == -1) {
158		return (-1);
159	}
160	ret = getsockopt(sd, IPPROTO_SCTP, SCTP_GET_ADDR_LEN, &av, &siz);
161	close(sd);
162	if (ret == 0) {
163		return ((int)av.assoc_value);
164	} else {
165		return (-1);
166	}
167}
168
169int
170sctp_connectx(int sd, const struct sockaddr *addrs, int addrcnt,
171    sctp_assoc_t * id)
172{
173	char buf[SCTP_STACK_BUF_SIZE];
174	int i, ret, cnt, *aa;
175	char *cpto;
176	const struct sockaddr *at;
177	sctp_assoc_t *p_id;
178	size_t len = sizeof(int);
179
180	/* validate the address count and list */
181	if ((addrs == NULL) || (addrcnt <= 0)) {
182		errno = EINVAL;
183		return (-1);
184	}
185	at = addrs;
186	cnt = 0;
187	cpto = ((caddr_t)buf + sizeof(int));
188	/* validate all the addresses and get the size */
189	for (i = 0; i < addrcnt; i++) {
190		if (at->sa_family == AF_INET) {
191			if (at->sa_len != sizeof(struct sockaddr_in)) {
192				errno = EINVAL;
193				return (-1);
194			}
195			memcpy(cpto, at, at->sa_len);
196			cpto = ((caddr_t)cpto + at->sa_len);
197			len += at->sa_len;
198		} else if (at->sa_family == AF_INET6) {
199			if (at->sa_len != sizeof(struct sockaddr_in6)) {
200				errno = EINVAL;
201				return (-1);
202			}
203			if (IN6_IS_ADDR_V4MAPPED(&((struct sockaddr_in6 *)at)->sin6_addr)) {
204				len += sizeof(struct sockaddr_in);
205				in6_sin6_2_sin((struct sockaddr_in *)cpto, (struct sockaddr_in6 *)at);
206				cpto = ((caddr_t)cpto + sizeof(struct sockaddr_in));
207				len += sizeof(struct sockaddr_in);
208			} else {
209				memcpy(cpto, at, at->sa_len);
210				cpto = ((caddr_t)cpto + at->sa_len);
211				len += at->sa_len;
212			}
213		} else {
214			errno = EINVAL;
215			return (-1);
216		}
217		if (len > (sizeof(buf) - sizeof(int))) {
218			/* Never enough memory */
219			errno = E2BIG;
220			return (-1);
221		}
222		at = (struct sockaddr *)((caddr_t)at + at->sa_len);
223		cnt++;
224	}
225	/* do we have any? */
226	if (cnt == 0) {
227		errno = EINVAL;
228		return (-1);
229	}
230	aa = (int *)buf;
231	*aa = cnt;
232	ret = setsockopt(sd, IPPROTO_SCTP, SCTP_CONNECT_X, (void *)buf,
233	    (socklen_t) len);
234	if ((ret == 0) && id) {
235		p_id = (sctp_assoc_t *) buf;
236		*id = *p_id;
237	}
238	return (ret);
239}
240
241int
242sctp_bindx(int sd, struct sockaddr *addrs, int addrcnt, int flags)
243{
244	struct sctp_getaddresses *gaddrs;
245	struct sockaddr *sa;
246	struct sockaddr_in *sin;
247	struct sockaddr_in6 *sin6;
248	int i;
249	size_t argsz;
250	uint16_t sport = 0;
251
252	/* validate the flags */
253	if ((flags != SCTP_BINDX_ADD_ADDR) &&
254	    (flags != SCTP_BINDX_REM_ADDR)) {
255		errno = EFAULT;
256		return (-1);
257	}
258	/* validate the address count and list */
259	if ((addrcnt <= 0) || (addrs == NULL)) {
260		errno = EINVAL;
261		return (-1);
262	}
263	argsz = (sizeof(struct sockaddr_storage) +
264	    sizeof(struct sctp_getaddresses));
265	gaddrs = (struct sctp_getaddresses *)calloc(1, argsz);
266	if (gaddrs == NULL) {
267		errno = ENOMEM;
268		return (-1);
269	}
270	/* First pre-screen the addresses */
271	sa = addrs;
272	for (i = 0; i < addrcnt; i++) {
273		if (sa->sa_family == AF_INET) {
274			if (sa->sa_len != sizeof(struct sockaddr_in))
275				goto out_error;
276			sin = (struct sockaddr_in *)sa;
277			if (sin->sin_port) {
278				/* non-zero port, check or save */
279				if (sport) {
280					/* Check against our port */
281					if (sport != sin->sin_port) {
282						goto out_error;
283					}
284				} else {
285					/* save off the port */
286					sport = sin->sin_port;
287				}
288			}
289		} else if (sa->sa_family == AF_INET6) {
290			if (sa->sa_len != sizeof(struct sockaddr_in6))
291				goto out_error;
292			sin6 = (struct sockaddr_in6 *)sa;
293			if (sin6->sin6_port) {
294				/* non-zero port, check or save */
295				if (sport) {
296					/* Check against our port */
297					if (sport != sin6->sin6_port) {
298						goto out_error;
299					}
300				} else {
301					/* save off the port */
302					sport = sin6->sin6_port;
303				}
304			}
305		} else {
306			/* invalid address family specified */
307			goto out_error;
308		}
309
310		sa = (struct sockaddr *)((caddr_t)sa + sa->sa_len);
311	}
312	sa = addrs;
313	/*
314	 * Now if there was a port mentioned, assure that the first address
315	 * has that port to make sure it fails or succeeds correctly.
316	 */
317	if (sport) {
318		sin = (struct sockaddr_in *)sa;
319		sin->sin_port = sport;
320	}
321	for (i = 0; i < addrcnt; i++) {
322		if (sa->sa_family == AF_INET) {
323			if (sa->sa_len != sizeof(struct sockaddr_in))
324				goto out_error;
325		} else if (sa->sa_family == AF_INET6) {
326			if (sa->sa_len != sizeof(struct sockaddr_in6))
327				goto out_error;
328		} else {
329			/* invalid address family specified */
330	out_error:
331			free(gaddrs);
332			errno = EINVAL;
333			return (-1);
334		}
335		memset(gaddrs, 0, argsz);
336		gaddrs->sget_assoc_id = 0;
337		memcpy(gaddrs->addr, sa, sa->sa_len);
338		if (setsockopt(sd, IPPROTO_SCTP, flags, gaddrs,
339		    (socklen_t) argsz) != 0) {
340			free(gaddrs);
341			return (-1);
342		}
343		sa = (struct sockaddr *)((caddr_t)sa + sa->sa_len);
344	}
345	free(gaddrs);
346	return (0);
347}
348
349
350int
351sctp_opt_info(int sd, sctp_assoc_t id, int opt, void *arg, socklen_t * size)
352{
353	if (arg == NULL) {
354		errno = EINVAL;
355		return (-1);
356	}
357	switch (opt) {
358	case SCTP_RTOINFO:
359		((struct sctp_rtoinfo *)arg)->srto_assoc_id = id;
360		break;
361	case SCTP_ASSOCINFO:
362		((struct sctp_assocparams *)arg)->sasoc_assoc_id = id;
363		break;
364	case SCTP_DEFAULT_SEND_PARAM:
365		((struct sctp_assocparams *)arg)->sasoc_assoc_id = id;
366		break;
367	case SCTP_PRIMARY_ADDR:
368		((struct sctp_setprim *)arg)->ssp_assoc_id = id;
369		break;
370	case SCTP_PEER_ADDR_PARAMS:
371		((struct sctp_paddrparams *)arg)->spp_assoc_id = id;
372		break;
373	case SCTP_MAXSEG:
374		((struct sctp_assoc_value *)arg)->assoc_id = id;
375		break;
376	case SCTP_AUTH_KEY:
377		((struct sctp_authkey *)arg)->sca_assoc_id = id;
378		break;
379	case SCTP_AUTH_ACTIVE_KEY:
380		((struct sctp_authkeyid *)arg)->scact_assoc_id = id;
381		break;
382	case SCTP_DELAYED_SACK:
383		((struct sctp_sack_info *)arg)->sack_assoc_id = id;
384		break;
385	case SCTP_CONTEXT:
386		((struct sctp_assoc_value *)arg)->assoc_id = id;
387		break;
388	case SCTP_STATUS:
389		((struct sctp_status *)arg)->sstat_assoc_id = id;
390		break;
391	case SCTP_GET_PEER_ADDR_INFO:
392		((struct sctp_paddrinfo *)arg)->spinfo_assoc_id = id;
393		break;
394	case SCTP_PEER_AUTH_CHUNKS:
395		((struct sctp_authchunks *)arg)->gauth_assoc_id = id;
396		break;
397	case SCTP_LOCAL_AUTH_CHUNKS:
398		((struct sctp_authchunks *)arg)->gauth_assoc_id = id;
399		break;
400	case SCTP_TIMEOUTS:
401		((struct sctp_timeouts *)arg)->stimo_assoc_id = id;
402		break;
403	case SCTP_EVENT:
404		((struct sctp_event *)arg)->se_assoc_id = id;
405		break;
406	case SCTP_DEFAULT_SNDINFO:
407		((struct sctp_sndinfo *)arg)->snd_assoc_id = id;
408		break;
409	case SCTP_DEFAULT_PRINFO:
410		((struct sctp_default_prinfo *)arg)->pr_assoc_id = id;
411		break;
412	case SCTP_PEER_ADDR_THLDS:
413		((struct sctp_paddrthlds *)arg)->spt_assoc_id = id;
414		break;
415	case SCTP_REMOTE_UDP_ENCAPS_PORT:
416		((struct sctp_udpencaps *)arg)->sue_assoc_id = id;
417		break;
418	case SCTP_MAX_BURST:
419		((struct sctp_assoc_value *)arg)->assoc_id = id;
420		break;
421	default:
422		break;
423	}
424	return (getsockopt(sd, IPPROTO_SCTP, opt, arg, size));
425}
426
427int
428sctp_getpaddrs(int sd, sctp_assoc_t id, struct sockaddr **raddrs)
429{
430	struct sctp_getaddresses *addrs;
431	struct sockaddr *sa;
432	sctp_assoc_t asoc;
433	caddr_t lim;
434	socklen_t opt_len;
435	int cnt;
436
437	if (raddrs == NULL) {
438		errno = EFAULT;
439		return (-1);
440	}
441	asoc = id;
442	opt_len = (socklen_t) sizeof(sctp_assoc_t);
443	if (getsockopt(sd, IPPROTO_SCTP, SCTP_GET_REMOTE_ADDR_SIZE,
444	    &asoc, &opt_len) != 0) {
445		return (-1);
446	}
447	/* size required is returned in 'asoc' */
448	opt_len = (socklen_t) ((size_t)asoc + sizeof(struct sctp_getaddresses));
449	addrs = calloc(1, (size_t)opt_len);
450	if (addrs == NULL) {
451		return (-1);
452	}
453	addrs->sget_assoc_id = id;
454	/* Now lets get the array of addresses */
455	if (getsockopt(sd, IPPROTO_SCTP, SCTP_GET_PEER_ADDRESSES,
456	    addrs, &opt_len) != 0) {
457		free(addrs);
458		return (-1);
459	}
460	*raddrs = (struct sockaddr *)&addrs->addr[0];
461	cnt = 0;
462	sa = (struct sockaddr *)&addrs->addr[0];
463	lim = (caddr_t)addrs + opt_len;
464	while (((caddr_t)sa < lim) && (sa->sa_len > 0)) {
465		sa = (struct sockaddr *)((caddr_t)sa + sa->sa_len);
466		cnt++;
467	}
468	return (cnt);
469}
470
471void
472sctp_freepaddrs(struct sockaddr *addrs)
473{
474	/* Take away the hidden association id */
475	void *fr_addr;
476
477	fr_addr = (void *)((caddr_t)addrs - sizeof(sctp_assoc_t));
478	/* Now free it */
479	free(fr_addr);
480}
481
482int
483sctp_getladdrs(int sd, sctp_assoc_t id, struct sockaddr **raddrs)
484{
485	struct sctp_getaddresses *addrs;
486	caddr_t lim;
487	struct sockaddr *sa;
488	size_t size_of_addresses;
489	socklen_t opt_len;
490	int cnt;
491
492	if (raddrs == NULL) {
493		errno = EFAULT;
494		return (-1);
495	}
496	size_of_addresses = 0;
497	opt_len = (socklen_t) sizeof(int);
498	if (getsockopt(sd, IPPROTO_SCTP, SCTP_GET_LOCAL_ADDR_SIZE,
499	    &size_of_addresses, &opt_len) != 0) {
500		errno = ENOMEM;
501		return (-1);
502	}
503	if (size_of_addresses == 0) {
504		errno = ENOTCONN;
505		return (-1);
506	}
507	opt_len = (socklen_t) (size_of_addresses +
508	    sizeof(struct sockaddr_storage) +
509	    sizeof(struct sctp_getaddresses));
510	addrs = calloc(1, (size_t)opt_len);
511	if (addrs == NULL) {
512		errno = ENOMEM;
513		return (-1);
514	}
515	addrs->sget_assoc_id = id;
516	/* Now lets get the array of addresses */
517	if (getsockopt(sd, IPPROTO_SCTP, SCTP_GET_LOCAL_ADDRESSES, addrs,
518	    &opt_len) != 0) {
519		free(addrs);
520		errno = ENOMEM;
521		return (-1);
522	}
523	*raddrs = (struct sockaddr *)&addrs->addr[0];
524	cnt = 0;
525	sa = (struct sockaddr *)&addrs->addr[0];
526	lim = (caddr_t)addrs + opt_len;
527	while (((caddr_t)sa < lim) && (sa->sa_len > 0)) {
528		sa = (struct sockaddr *)((caddr_t)sa + sa->sa_len);
529		cnt++;
530	}
531	return (cnt);
532}
533
534void
535sctp_freeladdrs(struct sockaddr *addrs)
536{
537	/* Take away the hidden association id */
538	void *fr_addr;
539
540	fr_addr = (void *)((caddr_t)addrs - sizeof(sctp_assoc_t));
541	/* Now free it */
542	free(fr_addr);
543}
544
545
546ssize_t
547sctp_sendmsg(int s,
548    const void *data,
549    size_t len,
550    const struct sockaddr *to,
551    socklen_t tolen,
552    uint32_t ppid,
553    uint32_t flags,
554    uint16_t stream_no,
555    uint32_t timetolive,
556    uint32_t context)
557{
558#ifdef SYS_sctp_generic_sendmsg
559	struct sctp_sndrcvinfo sinfo;
560
561	memset(&sinfo, 0, sizeof(struct sctp_sndrcvinfo));
562	sinfo.sinfo_ppid = ppid;
563	sinfo.sinfo_flags = flags;
564	sinfo.sinfo_stream = stream_no;
565	sinfo.sinfo_timetolive = timetolive;
566	sinfo.sinfo_context = context;
567	sinfo.sinfo_assoc_id = 0;
568	return (syscall(SYS_sctp_generic_sendmsg, s,
569	    data, len, to, tolen, &sinfo, 0));
570#else
571	ssize_t sz;
572	struct msghdr msg;
573	struct sctp_sndrcvinfo *s_info;
574	struct iovec iov;
575	char controlVector[SCTP_CONTROL_VEC_SIZE_RCV];
576	struct cmsghdr *cmsg;
577	struct sockaddr *who = NULL;
578	union {
579		struct sockaddr_in in;
580		struct sockaddr_in6 in6;
581	}     addr;
582
583	if ((tolen > 0) &&
584	    ((to == NULL) || (tolen < sizeof(struct sockaddr)))) {
585		errno = EINVAL;
586		return -1;
587	}
588	if (to && (tolen > 0)) {
589		if (to->sa_family == AF_INET) {
590			if (tolen != sizeof(struct sockaddr_in)) {
591				errno = EINVAL;
592				return -1;
593			}
594			if ((to->sa_len > 0) &&
595			    (to->sa_len != sizeof(struct sockaddr_in))) {
596				errno = EINVAL;
597				return -1;
598			}
599			memcpy(&addr, to, sizeof(struct sockaddr_in));
600			addr.in.sin_len = sizeof(struct sockaddr_in);
601		} else if (to->sa_family == AF_INET6) {
602			if (tolen != sizeof(struct sockaddr_in6)) {
603				errno = EINVAL;
604				return -1;
605			}
606			if ((to->sa_len > 0) &&
607			    (to->sa_len != sizeof(struct sockaddr_in6))) {
608				errno = EINVAL;
609				return -1;
610			}
611			memcpy(&addr, to, sizeof(struct sockaddr_in6));
612			addr.in6.sin6_len = sizeof(struct sockaddr_in6);
613		} else {
614			errno = EAFNOSUPPORT;
615			return -1;
616		}
617		who = (struct sockaddr *)&addr;
618	}
619	iov.iov_base = (char *)data;
620	iov.iov_len = len;
621
622	if (who) {
623		msg.msg_name = (caddr_t)who;
624		msg.msg_namelen = who->sa_len;
625	} else {
626		msg.msg_name = (caddr_t)NULL;
627		msg.msg_namelen = 0;
628	}
629	msg.msg_iov = &iov;
630	msg.msg_iovlen = 1;
631	msg.msg_control = (caddr_t)controlVector;
632
633	cmsg = (struct cmsghdr *)controlVector;
634
635	cmsg->cmsg_level = IPPROTO_SCTP;
636	cmsg->cmsg_type = SCTP_SNDRCV;
637	cmsg->cmsg_len = CMSG_LEN(sizeof(struct sctp_sndrcvinfo));
638	s_info = (struct sctp_sndrcvinfo *)CMSG_DATA(cmsg);
639
640	s_info->sinfo_stream = stream_no;
641	s_info->sinfo_ssn = 0;
642	s_info->sinfo_flags = flags;
643	s_info->sinfo_ppid = ppid;
644	s_info->sinfo_context = context;
645	s_info->sinfo_assoc_id = 0;
646	s_info->sinfo_timetolive = timetolive;
647	errno = 0;
648	msg.msg_controllen = cmsg->cmsg_len;
649	sz = sendmsg(s, &msg, 0);
650	return (sz);
651#endif
652}
653
654
655sctp_assoc_t
656sctp_getassocid(int sd, struct sockaddr *sa)
657{
658	struct sctp_paddrinfo sp;
659	socklen_t siz;
660
661	/* First get the assoc id */
662	siz = sizeof(sp);
663	memset(&sp, 0, sizeof(sp));
664	memcpy((caddr_t)&sp.spinfo_address, sa, sa->sa_len);
665	errno = 0;
666	if (getsockopt(sd, IPPROTO_SCTP,
667	    SCTP_GET_PEER_ADDR_INFO, &sp, &siz) != 0) {
668		return ((sctp_assoc_t) 0);
669	}
670	/* We depend on the fact that 0 can never be returned */
671	return (sp.spinfo_assoc_id);
672}
673
674ssize_t
675sctp_send(int sd, const void *data, size_t len,
676    const struct sctp_sndrcvinfo *sinfo,
677    int flags)
678{
679
680#ifdef SYS_sctp_generic_sendmsg
681	struct sockaddr *to = NULL;
682
683	return (syscall(SYS_sctp_generic_sendmsg, sd,
684	    data, len, to, 0, sinfo, flags));
685#else
686	ssize_t sz;
687	struct msghdr msg;
688	struct iovec iov;
689	struct sctp_sndrcvinfo *s_info;
690	char controlVector[SCTP_CONTROL_VEC_SIZE_SND];
691	struct cmsghdr *cmsg;
692
693	if (sinfo == NULL) {
694		errno = EINVAL;
695		return (-1);
696	}
697	iov.iov_base = (char *)data;
698	iov.iov_len = len;
699
700	msg.msg_name = 0;
701	msg.msg_namelen = 0;
702	msg.msg_iov = &iov;
703	msg.msg_iovlen = 1;
704	msg.msg_control = (caddr_t)controlVector;
705
706	cmsg = (struct cmsghdr *)controlVector;
707
708	cmsg->cmsg_level = IPPROTO_SCTP;
709	cmsg->cmsg_type = SCTP_SNDRCV;
710	cmsg->cmsg_len = CMSG_LEN(sizeof(struct sctp_sndrcvinfo));
711	s_info = (struct sctp_sndrcvinfo *)CMSG_DATA(cmsg);
712	/* copy in the data */
713	*s_info = *sinfo;
714	errno = 0;
715	msg.msg_controllen = cmsg->cmsg_len;
716	sz = sendmsg(sd, &msg, flags);
717	return (sz);
718#endif
719}
720
721
722
723ssize_t
724sctp_sendx(int sd, const void *msg, size_t msg_len,
725    struct sockaddr *addrs, int addrcnt,
726    struct sctp_sndrcvinfo *sinfo,
727    int flags)
728{
729	struct sctp_sndrcvinfo __sinfo;
730	ssize_t ret;
731	int i, cnt, *aa, saved_errno;
732	char *buf;
733	int no_end_cx = 0;
734	size_t len, add_len;
735	struct sockaddr *at;
736
737	if (addrs == NULL) {
738		errno = EINVAL;
739		return (-1);
740	}
741#ifdef SYS_sctp_generic_sendmsg
742	if (addrcnt == 1) {
743		socklen_t l;
744
745		/*
746		 * Quick way, we don't need to do a connectx so lets use the
747		 * syscall directly.
748		 */
749		l = addrs->sa_len;
750		return (syscall(SYS_sctp_generic_sendmsg, sd,
751		    msg, msg_len, addrs, l, sinfo, flags));
752	}
753#endif
754
755	len = sizeof(int);
756	at = addrs;
757	cnt = 0;
758	/* validate all the addresses and get the size */
759	for (i = 0; i < addrcnt; i++) {
760		if (at->sa_family == AF_INET) {
761			add_len = sizeof(struct sockaddr_in);
762		} else if (at->sa_family == AF_INET6) {
763			add_len = sizeof(struct sockaddr_in6);
764		} else {
765			errno = EINVAL;
766			return (-1);
767		}
768		len += add_len;
769		at = (struct sockaddr *)((caddr_t)at + add_len);
770		cnt++;
771	}
772	/* do we have any? */
773	if (cnt == 0) {
774		errno = EINVAL;
775		return (-1);
776	}
777	buf = malloc(len);
778	if (buf == NULL) {
779		return (-1);
780	}
781	aa = (int *)buf;
782	*aa = cnt;
783	aa++;
784	memcpy((caddr_t)aa, addrs, (size_t)(len - sizeof(int)));
785	ret = setsockopt(sd, IPPROTO_SCTP, SCTP_CONNECT_X_DELAYED, (void *)buf,
786	    (socklen_t) len);
787
788	free(buf);
789	if (ret != 0) {
790		if (errno == EALREADY) {
791			no_end_cx = 1;
792			goto continue_send;
793		}
794		return (ret);
795	}
796continue_send:
797	if (sinfo == NULL) {
798		sinfo = &__sinfo;
799		memset(&__sinfo, 0, sizeof(__sinfo));
800	}
801	sinfo->sinfo_assoc_id = sctp_getassocid(sd, addrs);
802	if (sinfo->sinfo_assoc_id == 0) {
803		printf("Huh, can't get associd? TSNH!\n");
804		(void)setsockopt(sd, IPPROTO_SCTP, SCTP_CONNECT_X_COMPLETE, (void *)addrs,
805		    (socklen_t) addrs->sa_len);
806		errno = ENOENT;
807		return (-1);
808	}
809	ret = sctp_send(sd, msg, msg_len, sinfo, flags);
810	saved_errno = errno;
811	if (no_end_cx == 0)
812		(void)setsockopt(sd, IPPROTO_SCTP, SCTP_CONNECT_X_COMPLETE, (void *)addrs,
813		    (socklen_t) addrs->sa_len);
814
815	errno = saved_errno;
816	return (ret);
817}
818
819ssize_t
820sctp_sendmsgx(int sd,
821    const void *msg,
822    size_t len,
823    struct sockaddr *addrs,
824    int addrcnt,
825    uint32_t ppid,
826    uint32_t flags,
827    uint16_t stream_no,
828    uint32_t timetolive,
829    uint32_t context)
830{
831	struct sctp_sndrcvinfo sinfo;
832
833	memset((void *)&sinfo, 0, sizeof(struct sctp_sndrcvinfo));
834	sinfo.sinfo_ppid = ppid;
835	sinfo.sinfo_flags = flags;
836	sinfo.sinfo_ssn = stream_no;
837	sinfo.sinfo_timetolive = timetolive;
838	sinfo.sinfo_context = context;
839	return sctp_sendx(sd, msg, len, addrs, addrcnt, &sinfo, 0);
840}
841
842ssize_t
843sctp_recvmsg(int s,
844    void *dbuf,
845    size_t len,
846    struct sockaddr *from,
847    socklen_t * fromlen,
848    struct sctp_sndrcvinfo *sinfo,
849    int *msg_flags)
850{
851#ifdef SYS_sctp_generic_recvmsg
852	struct iovec iov;
853
854	iov.iov_base = dbuf;
855	iov.iov_len = len;
856	return (syscall(SYS_sctp_generic_recvmsg, s,
857	    &iov, 1, from, fromlen, sinfo, msg_flags));
858#else
859	struct sctp_sndrcvinfo *s_info;
860	ssize_t sz;
861	struct msghdr msg;
862	struct iovec iov;
863	char controlVector[SCTP_CONTROL_VEC_SIZE_RCV];
864	struct cmsghdr *cmsg;
865
866	if (msg_flags == NULL) {
867		errno = EINVAL;
868		return (-1);
869	}
870	msg.msg_flags = 0;
871	iov.iov_base = dbuf;
872	iov.iov_len = len;
873	msg.msg_name = (caddr_t)from;
874	if (fromlen == NULL)
875		msg.msg_namelen = 0;
876	else
877		msg.msg_namelen = *fromlen;
878	msg.msg_iov = &iov;
879	msg.msg_iovlen = 1;
880	msg.msg_control = (caddr_t)controlVector;
881	msg.msg_controllen = sizeof(controlVector);
882	errno = 0;
883	sz = recvmsg(s, &msg, *msg_flags);
884	*msg_flags = msg.msg_flags;
885	if (sz <= 0) {
886		return (sz);
887	}
888	s_info = NULL;
889	if (sinfo) {
890		sinfo->sinfo_assoc_id = 0;
891	}
892	if ((msg.msg_controllen) && sinfo) {
893		/*
894		 * parse through and see if we find the sctp_sndrcvinfo (if
895		 * the user wants it).
896		 */
897		cmsg = (struct cmsghdr *)controlVector;
898		while (cmsg) {
899			if ((cmsg->cmsg_len == 0) || (cmsg->cmsg_len > msg.msg_controllen)) {
900				break;
901			}
902			if (cmsg->cmsg_level == IPPROTO_SCTP) {
903				if (cmsg->cmsg_type == SCTP_SNDRCV) {
904					/* Got it */
905					s_info = (struct sctp_sndrcvinfo *)CMSG_DATA(cmsg);
906					/* Copy it to the user */
907					if (sinfo)
908						*sinfo = *s_info;
909					break;
910				} else if (cmsg->cmsg_type == SCTP_EXTRCV) {
911					/*
912					 * Got it, presumably the user has
913					 * asked for this extra info, so the
914					 * structure holds more room :-D
915					 */
916					s_info = (struct sctp_sndrcvinfo *)CMSG_DATA(cmsg);
917					/* Copy it to the user */
918					if (sinfo) {
919						memcpy(sinfo, s_info, sizeof(struct sctp_extrcvinfo));
920					}
921					break;
922
923				}
924			}
925			cmsg = CMSG_NXTHDR(&msg, cmsg);
926		}
927	}
928	return (sz);
929#endif
930}
931
932ssize_t
933sctp_recvv(int sd,
934    const struct iovec *iov,
935    int iovlen,
936    struct sockaddr *from,
937    socklen_t * fromlen,
938    void *info,
939    socklen_t * infolen,
940    unsigned int *infotype,
941    int *flags)
942{
943	char ctlbuf[SCTP_CONTROL_VEC_SIZE_RCV];
944	struct msghdr msg;
945	struct cmsghdr *cmsg;
946	ssize_t n;
947	struct sctp_rcvinfo *rcvinfo;
948	struct sctp_nxtinfo *nxtinfo;
949
950	if (((info != NULL) && (infolen == NULL)) |
951	    ((info == NULL) && (infolen != NULL) && (*infolen != 0)) ||
952	    ((info != NULL) && (infotype == NULL))) {
953		errno = EINVAL;
954		return (-1);
955	}
956	if (infotype) {
957		*infotype = SCTP_RECVV_NOINFO;
958	}
959	msg.msg_name = from;
960	if (fromlen == NULL) {
961		msg.msg_namelen = 0;
962	} else {
963		msg.msg_namelen = *fromlen;
964	}
965	msg.msg_iov = (struct iovec *)iov;
966	msg.msg_iovlen = iovlen;
967	msg.msg_control = ctlbuf;
968	msg.msg_controllen = sizeof(ctlbuf);
969	errno = 0;
970	n = recvmsg(sd, &msg, *flags);
971	*flags = msg.msg_flags;
972	if ((n > 0) &&
973	    (msg.msg_controllen > 0) &&
974	    (infotype != NULL) &&
975	    (infolen != NULL) &&
976	    (*infolen > 0)) {
977		rcvinfo = NULL;
978		nxtinfo = NULL;
979		for (cmsg = CMSG_FIRSTHDR(&msg); cmsg; cmsg = CMSG_NXTHDR(&msg, cmsg)) {
980			if (cmsg->cmsg_level != IPPROTO_SCTP) {
981				continue;
982			}
983			if (cmsg->cmsg_type == SCTP_RCVINFO) {
984				rcvinfo = (struct sctp_rcvinfo *)CMSG_DATA(cmsg);
985			}
986			if (cmsg->cmsg_type == SCTP_NXTINFO) {
987				nxtinfo = (struct sctp_nxtinfo *)CMSG_DATA(cmsg);
988			}
989			if (rcvinfo && nxtinfo) {
990				break;
991			}
992		}
993		if (rcvinfo) {
994			if (nxtinfo) {
995				if (*infolen >= sizeof(struct sctp_recvv_rn)) {
996					struct sctp_recvv_rn *rn_info;
997
998					rn_info = (struct sctp_recvv_rn *)info;
999					rn_info->recvv_rcvinfo = *rcvinfo;
1000					rn_info->recvv_nxtinfo = *nxtinfo;
1001					*infolen = (socklen_t) sizeof(struct sctp_recvv_rn);
1002					*infotype = SCTP_RECVV_RN;
1003				}
1004			} else {
1005				if (*infolen >= sizeof(struct sctp_rcvinfo)) {
1006					memcpy(info, rcvinfo, sizeof(struct sctp_rcvinfo));
1007					*infolen = (socklen_t) sizeof(struct sctp_rcvinfo);
1008					*infotype = SCTP_RECVV_RCVINFO;
1009				}
1010			}
1011		} else if (nxtinfo) {
1012			if (*infolen >= sizeof(struct sctp_rcvinfo)) {
1013				memcpy(info, nxtinfo, sizeof(struct sctp_nxtinfo));
1014				*infolen = (socklen_t) sizeof(struct sctp_nxtinfo);
1015				*infotype = SCTP_RECVV_NXTINFO;
1016			}
1017		}
1018	}
1019	return (n);
1020}
1021
1022ssize_t
1023sctp_sendv(int sd,
1024    const struct iovec *iov, int iovcnt,
1025    struct sockaddr *addrs, int addrcnt,
1026    void *info, socklen_t infolen, unsigned int infotype,
1027    int flags)
1028{
1029	ssize_t ret;
1030	int i;
1031	socklen_t addr_len;
1032	struct msghdr msg;
1033	in_port_t port;
1034	struct sctp_sendv_spa *spa_info;
1035	struct cmsghdr *cmsg;
1036	char *cmsgbuf;
1037	struct sockaddr *addr;
1038	struct sockaddr_in *addr_in;
1039	struct sockaddr_in6 *addr_in6;
1040
1041	if ((addrcnt < 0) ||
1042	    (iovcnt < 0) ||
1043	    ((addrs == NULL) && (addrcnt > 0)) ||
1044	    ((addrs != NULL) && (addrcnt == 0)) ||
1045	    ((iov == NULL) && (iovcnt > 0)) ||
1046	    ((iov != NULL) && (iovcnt == 0))) {
1047		errno = EINVAL;
1048		return (-1);
1049	}
1050	cmsgbuf = malloc(CMSG_SPACE(sizeof(struct sctp_sndinfo)) +
1051	    CMSG_SPACE(sizeof(struct sctp_prinfo)) +
1052	    CMSG_SPACE(sizeof(struct sctp_authinfo)) +
1053	    (size_t)addrcnt * CMSG_SPACE(sizeof(struct in6_addr)));
1054	if (cmsgbuf == NULL) {
1055		errno = ENOBUFS;
1056		return (-1);
1057	}
1058	msg.msg_control = cmsgbuf;
1059	msg.msg_controllen = 0;
1060	cmsg = (struct cmsghdr *)cmsgbuf;
1061	switch (infotype) {
1062	case SCTP_SENDV_NOINFO:
1063		if ((infolen != 0) || (info != NULL)) {
1064			free(cmsgbuf);
1065			errno = EINVAL;
1066			return (-1);
1067		}
1068		break;
1069	case SCTP_SENDV_SNDINFO:
1070		if ((info == NULL) || (infolen < sizeof(struct sctp_sndinfo))) {
1071			free(cmsgbuf);
1072			errno = EINVAL;
1073			return (-1);
1074		}
1075		cmsg->cmsg_level = IPPROTO_SCTP;
1076		cmsg->cmsg_type = SCTP_SNDINFO;
1077		cmsg->cmsg_len = CMSG_LEN(sizeof(struct sctp_sndinfo));
1078		memcpy(CMSG_DATA(cmsg), info, sizeof(struct sctp_sndinfo));
1079		msg.msg_controllen += CMSG_SPACE(sizeof(struct sctp_sndinfo));
1080		cmsg = (struct cmsghdr *)((caddr_t)cmsg + CMSG_SPACE(sizeof(struct sctp_sndinfo)));
1081		break;
1082	case SCTP_SENDV_PRINFO:
1083		if ((info == NULL) || (infolen < sizeof(struct sctp_prinfo))) {
1084			free(cmsgbuf);
1085			errno = EINVAL;
1086			return (-1);
1087		}
1088		cmsg->cmsg_level = IPPROTO_SCTP;
1089		cmsg->cmsg_type = SCTP_PRINFO;
1090		cmsg->cmsg_len = CMSG_LEN(sizeof(struct sctp_prinfo));
1091		memcpy(CMSG_DATA(cmsg), info, sizeof(struct sctp_prinfo));
1092		msg.msg_controllen += CMSG_SPACE(sizeof(struct sctp_prinfo));
1093		cmsg = (struct cmsghdr *)((caddr_t)cmsg + CMSG_SPACE(sizeof(struct sctp_prinfo)));
1094		break;
1095	case SCTP_SENDV_AUTHINFO:
1096		if ((info == NULL) || (infolen < sizeof(struct sctp_authinfo))) {
1097			free(cmsgbuf);
1098			errno = EINVAL;
1099			return (-1);
1100		}
1101		cmsg->cmsg_level = IPPROTO_SCTP;
1102		cmsg->cmsg_type = SCTP_AUTHINFO;
1103		cmsg->cmsg_len = CMSG_LEN(sizeof(struct sctp_authinfo));
1104		memcpy(CMSG_DATA(cmsg), info, sizeof(struct sctp_authinfo));
1105		msg.msg_controllen += CMSG_SPACE(sizeof(struct sctp_authinfo));
1106		cmsg = (struct cmsghdr *)((caddr_t)cmsg + CMSG_SPACE(sizeof(struct sctp_authinfo)));
1107		break;
1108	case SCTP_SENDV_SPA:
1109		if ((info == NULL) || (infolen < sizeof(struct sctp_sendv_spa))) {
1110			free(cmsgbuf);
1111			errno = EINVAL;
1112			return (-1);
1113		}
1114		spa_info = (struct sctp_sendv_spa *)info;
1115		if (spa_info->sendv_flags & SCTP_SEND_SNDINFO_VALID) {
1116			cmsg->cmsg_level = IPPROTO_SCTP;
1117			cmsg->cmsg_type = SCTP_SNDINFO;
1118			cmsg->cmsg_len = CMSG_LEN(sizeof(struct sctp_sndinfo));
1119			memcpy(CMSG_DATA(cmsg), &spa_info->sendv_sndinfo, sizeof(struct sctp_sndinfo));
1120			msg.msg_controllen += CMSG_SPACE(sizeof(struct sctp_sndinfo));
1121			cmsg = (struct cmsghdr *)((caddr_t)cmsg + CMSG_SPACE(sizeof(struct sctp_sndinfo)));
1122		}
1123		if (spa_info->sendv_flags & SCTP_SEND_PRINFO_VALID) {
1124			cmsg->cmsg_level = IPPROTO_SCTP;
1125			cmsg->cmsg_type = SCTP_PRINFO;
1126			cmsg->cmsg_len = CMSG_LEN(sizeof(struct sctp_prinfo));
1127			memcpy(CMSG_DATA(cmsg), &spa_info->sendv_prinfo, sizeof(struct sctp_prinfo));
1128			msg.msg_controllen += CMSG_SPACE(sizeof(struct sctp_prinfo));
1129			cmsg = (struct cmsghdr *)((caddr_t)cmsg + CMSG_SPACE(sizeof(struct sctp_prinfo)));
1130		}
1131		if (spa_info->sendv_flags & SCTP_SEND_AUTHINFO_VALID) {
1132			cmsg->cmsg_level = IPPROTO_SCTP;
1133			cmsg->cmsg_type = SCTP_AUTHINFO;
1134			cmsg->cmsg_len = CMSG_LEN(sizeof(struct sctp_authinfo));
1135			memcpy(CMSG_DATA(cmsg), &spa_info->sendv_authinfo, sizeof(struct sctp_authinfo));
1136			msg.msg_controllen += CMSG_SPACE(sizeof(struct sctp_authinfo));
1137			cmsg = (struct cmsghdr *)((caddr_t)cmsg + CMSG_SPACE(sizeof(struct sctp_authinfo)));
1138		}
1139		break;
1140	default:
1141		free(cmsgbuf);
1142		errno = EINVAL;
1143		return (-1);
1144	}
1145	addr = addrs;
1146	msg.msg_name = NULL;
1147	msg.msg_namelen = 0;
1148
1149	for (i = 0; i < addrcnt; i++) {
1150		switch (addr->sa_family) {
1151		case AF_INET:
1152			addr_len = (socklen_t) sizeof(struct sockaddr_in);
1153			addr_in = (struct sockaddr_in *)addr;
1154			if (addr_in->sin_len != addr_len) {
1155				free(cmsgbuf);
1156				errno = EINVAL;
1157				return (-1);
1158			}
1159			if (i == 0) {
1160				port = addr_in->sin_port;
1161			} else {
1162				if (port == addr_in->sin_port) {
1163					cmsg->cmsg_level = IPPROTO_SCTP;
1164					cmsg->cmsg_type = SCTP_DSTADDRV4;
1165					cmsg->cmsg_len = CMSG_LEN(sizeof(struct in_addr));
1166					memcpy(CMSG_DATA(cmsg), &addr_in->sin_addr, sizeof(struct in_addr));
1167					msg.msg_controllen += CMSG_SPACE(sizeof(struct in_addr));
1168					cmsg = (struct cmsghdr *)((caddr_t)cmsg + CMSG_SPACE(sizeof(struct in_addr)));
1169				} else {
1170					free(cmsgbuf);
1171					errno = EINVAL;
1172					return (-1);
1173				}
1174			}
1175			break;
1176		case AF_INET6:
1177			addr_len = (socklen_t) sizeof(struct sockaddr_in6);
1178			addr_in6 = (struct sockaddr_in6 *)addr;
1179			if (addr_in6->sin6_len != addr_len) {
1180				free(cmsgbuf);
1181				errno = EINVAL;
1182				return (-1);
1183			}
1184			if (i == 0) {
1185				port = addr_in6->sin6_port;
1186			} else {
1187				if (port == addr_in6->sin6_port) {
1188					cmsg->cmsg_level = IPPROTO_SCTP;
1189					cmsg->cmsg_type = SCTP_DSTADDRV6;
1190					cmsg->cmsg_len = CMSG_LEN(sizeof(struct in6_addr));
1191					memcpy(CMSG_DATA(cmsg), &addr_in6->sin6_addr, sizeof(struct in6_addr));
1192					msg.msg_controllen += CMSG_SPACE(sizeof(struct in6_addr));
1193					cmsg = (struct cmsghdr *)((caddr_t)cmsg + CMSG_SPACE(sizeof(struct in6_addr)));
1194				} else {
1195					free(cmsgbuf);
1196					errno = EINVAL;
1197					return (-1);
1198				}
1199			}
1200			break;
1201		default:
1202			free(cmsgbuf);
1203			errno = EINVAL;
1204			return (-1);
1205		}
1206		if (i == 0) {
1207			msg.msg_name = addr;
1208			msg.msg_namelen = addr_len;
1209		}
1210		addr = (struct sockaddr *)((caddr_t)addr + addr_len);
1211	}
1212	if (msg.msg_controllen == 0) {
1213		msg.msg_control = NULL;
1214	}
1215	msg.msg_iov = (struct iovec *)iov;
1216	msg.msg_iovlen = iovcnt;
1217	msg.msg_flags = 0;
1218	ret = sendmsg(sd, &msg, flags);
1219	free(cmsgbuf);
1220	return (ret);
1221}
1222
1223
1224#if !defined(SYS_sctp_peeloff) && !defined(HAVE_SCTP_PEELOFF_SOCKOPT)
1225
1226int
1227sctp_peeloff(int sd, sctp_assoc_t assoc_id)
1228{
1229	/* NOT supported, return invalid sd */
1230	errno = ENOTSUP;
1231	return (-1);
1232}
1233
1234#endif
1235#if defined(SYS_sctp_peeloff) && !defined(HAVE_SCTP_PEELOFF_SOCKOPT)
1236int
1237sctp_peeloff(int sd, sctp_assoc_t assoc_id)
1238{
1239	return (syscall(SYS_sctp_peeloff, sd, assoc_id));
1240}
1241
1242#endif
1243
1244
1245#undef SCTP_CONTROL_VEC_SIZE_SND
1246#undef SCTP_CONTROL_VEC_SIZE_RCV
1247#undef SCTP_STACK_BUF_SIZE
1248