sctpserv06.c 1.6 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162
  1. #include "unp.h"
  2. int
  3. main(int argc, char **argv)
  4. {
  5. int sock_fd,msg_flags;
  6. char readbuf[BUFFSIZE];
  7. struct sockaddr_in servaddr, cliaddr;
  8. struct sctp_sndrcvinfo sri;
  9. struct sctp_event_subscribe evnts;
  10. int stream_increment=1;
  11. socklen_t len;
  12. size_t rd_sz;
  13. if (argc == 2)
  14. stream_increment = atoi(argv[1]);
  15. sock_fd = Socket(AF_INET, SOCK_SEQPACKET, IPPROTO_SCTP);
  16. bzero(&servaddr, sizeof(servaddr));
  17. servaddr.sin_family = AF_INET;
  18. servaddr.sin_addr.s_addr = htonl(INADDR_ANY);
  19. servaddr.sin_port = htons(SERV_PORT);
  20. Bind(sock_fd, (SA *) &servaddr, sizeof(servaddr));
  21. /* include mod_serv06 */
  22. bzero(&evnts, sizeof(evnts));
  23. evnts.sctp_data_io_event = 1;
  24. evnts.sctp_association_event = 1;
  25. evnts.sctp_address_event = 1;
  26. evnts.sctp_send_failure_event = 1;
  27. evnts.sctp_peer_error_event = 1;
  28. evnts.sctp_shutdown_event = 1;
  29. evnts.sctp_partial_delivery_event = 1;
  30. evnts.sctp_adaption_layer_event = 1;
  31. Setsockopt(sock_fd, IPPROTO_SCTP, SCTP_EVENTS,
  32. &evnts, sizeof(evnts));
  33. Listen(sock_fd, LISTENQ);
  34. for ( ; ; ) {
  35. len = sizeof(struct sockaddr_in);
  36. rd_sz = Sctp_recvmsg(sock_fd, readbuf, sizeof(readbuf),
  37. (SA *)&cliaddr, &len,
  38. &sri,&msg_flags);
  39. if(msg_flags & MSG_NOTIFICATION) {
  40. print_notification(readbuf);
  41. continue;
  42. }
  43. /* end mod_serv06 */
  44. if(stream_increment) {
  45. sri.sinfo_stream++;
  46. if(sri.sinfo_stream >= sctp_get_no_strms(sock_fd,(SA *)&cliaddr, len))
  47. sri.sinfo_stream = 0;
  48. }
  49. Sctp_sendmsg(sock_fd, readbuf, rd_sz,
  50. (SA *)&cliaddr, len,
  51. sri.sinfo_ppid,
  52. sri.sinfo_flags,
  53. sri.sinfo_stream,
  54. 0, 0);
  55. }
  56. }