]> git.proxmox.com Git - mirror_ubuntu-bionic-kernel.git/blame - include/linux/sctp.h
cfg80211/mac80211: make ieee80211_send_layer2_update a public function
[mirror_ubuntu-bionic-kernel.git] / include / linux / sctp.h
CommitLineData
1da177e4
LT
1/* SCTP kernel reference Implementation
2 * (C) Copyright IBM Corp. 2001, 2004
3 * Copyright (c) 1999-2000 Cisco, Inc.
4 * Copyright (c) 1999-2001 Motorola, Inc.
5 * Copyright (c) 2001 Intel Corp.
6 * Copyright (c) 2001 Nokia, Inc.
7 * Copyright (c) 2001 La Monte H.P. Yarroll
8 *
9 * This file is part of the SCTP kernel reference Implementation
10 *
11 * Various protocol defined structures.
12 *
60c778b2 13 * This SCTP implementation is free software;
1da177e4
LT
14 * you can redistribute it and/or modify it under the terms of
15 * the GNU General Public License as published by
16 * the Free Software Foundation; either version 2, or (at your option)
17 * any later version.
18 *
60c778b2 19 * This SCTP implementation is distributed in the hope that it
1da177e4
LT
20 * will be useful, but WITHOUT ANY WARRANTY; without even the implied
21 * ************************
22 * warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
23 * See the GNU General Public License for more details.
24 *
25 * You should have received a copy of the GNU General Public License
4b2f13a2
JK
26 * along with GNU CC; see the file COPYING. If not, see
27 * <http://www.gnu.org/licenses/>.
1da177e4
LT
28 *
29 * Please send any bug reports or fixes you make to the
30 * email address(es):
31956660 31 * lksctp developers <linux-sctp@vger.kernel.org>
1da177e4
LT
32 *
33 * Or submit a bug report through the following website:
34 * http://www.sf.net/projects/lksctp
35 *
36 * Written or modified by:
37 * La Monte H.P. Yarroll <piggy@acm.org>
38 * Karl Knutson <karl@athena.chicago.il.us>
39 * Jon Grimm <jgrimm@us.ibm.com>
40 * Xingang Guo <xingang.guo@intel.com>
41 * randall@sctp.chicago.il.us
42 * kmorneau@cisco.com
43 * qxie1@email.mot.com
44 * Sridhar Samudrala <sri@us.ibm.com>
45 * Kevin Gao <kevin.gao@intel.com>
46 *
47 * Any bugs reported given to us we will try to fix... any fixes shared will
48 * be incorporated into the next SCTP release.
49 */
50#ifndef __LINUX_SCTP_H__
51#define __LINUX_SCTP_H__
52
53#include <linux/in.h> /* We need in_addr. */
54#include <linux/in6.h> /* We need in6_addr. */
1b866434 55#include <linux/skbuff.h>
1da177e4 56
1b866434 57#include <uapi/linux/sctp.h>
1da177e4
LT
58
59/* Section 3.1. SCTP Common Header Format */
ae146d9b 60struct sctphdr {
f3ffaf14
AV
61 __be16 source;
62 __be16 dest;
63 __be32 vtag;
4458f04c 64 __le32 checksum;
ae146d9b 65};
1da177e4 66
2c0fd387
ACM
67static inline struct sctphdr *sctp_hdr(const struct sk_buff *skb)
68{
9c70220b 69 return (struct sctphdr *)skb_transport_header(skb);
2c0fd387 70}
2c0fd387 71
1da177e4 72/* Section 3.2. Chunk Field Descriptions. */
922dbc5b 73struct sctp_chunkhdr {
1da177e4
LT
74 __u8 type;
75 __u8 flags;
f3ffaf14 76 __be16 length;
922dbc5b 77};
1da177e4
LT
78
79
80/* Section 3.2. Chunk Type Values.
81 * [Chunk Type] identifies the type of information contained in the Chunk
82 * Value field. It takes a value from 0 to 254. The value of 255 is
83 * reserved for future use as an extension field.
84 */
6d85e68f 85enum sctp_cid {
1da177e4
LT
86 SCTP_CID_DATA = 0,
87 SCTP_CID_INIT = 1,
88 SCTP_CID_INIT_ACK = 2,
89 SCTP_CID_SACK = 3,
90 SCTP_CID_HEARTBEAT = 4,
91 SCTP_CID_HEARTBEAT_ACK = 5,
92 SCTP_CID_ABORT = 6,
93 SCTP_CID_SHUTDOWN = 7,
94 SCTP_CID_SHUTDOWN_ACK = 8,
95 SCTP_CID_ERROR = 9,
96 SCTP_CID_COOKIE_ECHO = 10,
97 SCTP_CID_COOKIE_ACK = 11,
98 SCTP_CID_ECN_ECNE = 12,
99 SCTP_CID_ECN_CWR = 13,
100 SCTP_CID_SHUTDOWN_COMPLETE = 14,
101
f7b0e93b
VY
102 /* AUTH Extension Section 4.1 */
103 SCTP_CID_AUTH = 0x0F,
104
1da177e4
LT
105 /* PR-SCTP Sec 3.2 */
106 SCTP_CID_FWD_TSN = 0xC0,
107
108 /* Use hex, as defined in ADDIP sec. 3.1 */
109 SCTP_CID_ASCONF = 0xC1,
110 SCTP_CID_ASCONF_ACK = 0x80,
cc16f00f 111 SCTP_CID_RECONF = 0x82,
6d85e68f 112}; /* enum */
1da177e4
LT
113
114
115/* Section 3.2
116 * Chunk Types are encoded such that the highest-order two bits specify
117 * the action that must be taken if the processing endpoint does not
118 * recognize the Chunk Type.
119 */
ec431c2c 120enum {
1da177e4
LT
121 SCTP_CID_ACTION_DISCARD = 0x00,
122 SCTP_CID_ACTION_DISCARD_ERR = 0x40,
123 SCTP_CID_ACTION_SKIP = 0x80,
124 SCTP_CID_ACTION_SKIP_ERR = 0xc0,
ec431c2c 125};
1da177e4
LT
126
127enum { SCTP_CID_ACTION_MASK = 0xc0, };
128
129/* This flag is used in Chunk Flags for ABORT and SHUTDOWN COMPLETE.
130 *
131 * 3.3.7 Abort Association (ABORT) (6):
132 * The T bit is set to 0 if the sender had a TCB that it destroyed.
133 * If the sender did not have a TCB it should set this bit to 1.
134 */
135enum { SCTP_CHUNK_FLAG_T = 0x01 };
136
137/*
138 * Set the T bit
139 *
140 * 0 1 2 3
141 * 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
142 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
143 * | Type = 14 |Reserved |T| Length = 4 |
144 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
145 *
146 * Chunk Flags: 8 bits
147 *
148 * Reserved: 7 bits
149 * Set to 0 on transmit and ignored on receipt.
150 *
151 * T bit: 1 bit
152 * The T bit is set to 0 if the sender had a TCB that it destroyed. If
153 * the sender did NOT have a TCB it should set this bit to 1.
154 *
155 * Note: Special rules apply to this chunk for verification, please
156 * see Section 8.5.1 for details.
157 */
158
159#define sctp_test_T_bit(c) ((c)->chunk_hdr->flags & SCTP_CHUNK_FLAG_T)
160
161/* RFC 2960
162 * Section 3.2.1 Optional/Variable-length Parmaeter Format.
163 */
164
3c918704 165struct sctp_paramhdr {
f3ffaf14
AV
166 __be16 type;
167 __be16 length;
3c918704 168};
1da177e4 169
34b4e29b 170enum sctp_param {
1da177e4
LT
171
172 /* RFC 2960 Section 3.3.5 */
f3a7c66b 173 SCTP_PARAM_HEARTBEAT_INFO = cpu_to_be16(1),
1da177e4 174 /* RFC 2960 Section 3.3.2.1 */
f3a7c66b
HH
175 SCTP_PARAM_IPV4_ADDRESS = cpu_to_be16(5),
176 SCTP_PARAM_IPV6_ADDRESS = cpu_to_be16(6),
177 SCTP_PARAM_STATE_COOKIE = cpu_to_be16(7),
178 SCTP_PARAM_UNRECOGNIZED_PARAMETERS = cpu_to_be16(8),
179 SCTP_PARAM_COOKIE_PRESERVATIVE = cpu_to_be16(9),
180 SCTP_PARAM_HOST_NAME_ADDRESS = cpu_to_be16(11),
181 SCTP_PARAM_SUPPORTED_ADDRESS_TYPES = cpu_to_be16(12),
182 SCTP_PARAM_ECN_CAPABLE = cpu_to_be16(0x8000),
1da177e4 183
f7b0e93b 184 /* AUTH Extension Section 3 */
f3a7c66b
HH
185 SCTP_PARAM_RANDOM = cpu_to_be16(0x8002),
186 SCTP_PARAM_CHUNKS = cpu_to_be16(0x8003),
187 SCTP_PARAM_HMAC_ALGO = cpu_to_be16(0x8004),
f7b0e93b 188
131a47e3 189 /* Add-IP: Supported Extensions, Section 4.2 */
f3a7c66b 190 SCTP_PARAM_SUPPORTED_EXT = cpu_to_be16(0x8008),
131a47e3 191
1da177e4 192 /* PR-SCTP Sec 3.1 */
f3a7c66b 193 SCTP_PARAM_FWD_TSN_SUPPORT = cpu_to_be16(0xc000),
1da177e4
LT
194
195 /* Add-IP Extension. Section 3.2 */
f3a7c66b
HH
196 SCTP_PARAM_ADD_IP = cpu_to_be16(0xc001),
197 SCTP_PARAM_DEL_IP = cpu_to_be16(0xc002),
198 SCTP_PARAM_ERR_CAUSE = cpu_to_be16(0xc003),
199 SCTP_PARAM_SET_PRIMARY = cpu_to_be16(0xc004),
200 SCTP_PARAM_SUCCESS_REPORT = cpu_to_be16(0xc005),
201 SCTP_PARAM_ADAPTATION_LAYER_IND = cpu_to_be16(0xc006),
1da177e4 202
cc16f00f
XL
203 /* RE-CONFIG. Section 4 */
204 SCTP_PARAM_RESET_OUT_REQUEST = cpu_to_be16(0x000d),
205 SCTP_PARAM_RESET_IN_REQUEST = cpu_to_be16(0x000e),
206 SCTP_PARAM_RESET_TSN_REQUEST = cpu_to_be16(0x000f),
207 SCTP_PARAM_RESET_RESPONSE = cpu_to_be16(0x0010),
208 SCTP_PARAM_RESET_ADD_OUT_STREAMS = cpu_to_be16(0x0011),
209 SCTP_PARAM_RESET_ADD_IN_STREAMS = cpu_to_be16(0x0012),
34b4e29b 210}; /* enum */
1da177e4
LT
211
212
213/* RFC 2960 Section 3.2.1
214 * The Parameter Types are encoded such that the highest-order two bits
215 * specify the action that must be taken if the processing endpoint does
216 * not recognize the Parameter Type.
217 *
218 */
0664ed43 219enum {
f3a7c66b
HH
220 SCTP_PARAM_ACTION_DISCARD = cpu_to_be16(0x0000),
221 SCTP_PARAM_ACTION_DISCARD_ERR = cpu_to_be16(0x4000),
222 SCTP_PARAM_ACTION_SKIP = cpu_to_be16(0x8000),
223 SCTP_PARAM_ACTION_SKIP_ERR = cpu_to_be16(0xc000),
0664ed43 224};
1da177e4 225
f3a7c66b 226enum { SCTP_PARAM_ACTION_MASK = cpu_to_be16(0xc000), };
1da177e4
LT
227
228/* RFC 2960 Section 3.3.1 Payload Data (DATA) (0) */
229
3583df1a 230struct sctp_datahdr {
f3ffaf14
AV
231 __be32 tsn;
232 __be16 stream;
233 __be16 ssn;
978aa047 234 __u32 ppid;
1da177e4 235 __u8 payload[0];
3583df1a 236};
1da177e4 237
9f8d3147 238struct sctp_data_chunk {
922dbc5b 239 struct sctp_chunkhdr chunk_hdr;
3583df1a 240 struct sctp_datahdr data_hdr;
9f8d3147 241};
1da177e4
LT
242
243/* DATA Chuck Specific Flags */
244enum {
245 SCTP_DATA_MIDDLE_FRAG = 0x00,
246 SCTP_DATA_LAST_FRAG = 0x01,
247 SCTP_DATA_FIRST_FRAG = 0x02,
248 SCTP_DATA_NOT_FRAG = 0x03,
249 SCTP_DATA_UNORDERED = 0x04,
475cba4e 250 SCTP_DATA_SACK_IMM = 0x08,
1da177e4
LT
251};
252enum { SCTP_DATA_FRAG_MASK = 0x03, };
253
254
255/* RFC 2960 Section 3.3.2 Initiation (INIT) (1)
256 *
257 * This chunk is used to initiate a SCTP association between two
258 * endpoints.
259 */
4ae70c08 260struct sctp_inithdr {
f3ffaf14
AV
261 __be32 init_tag;
262 __be32 a_rwnd;
263 __be16 num_outbound_streams;
264 __be16 num_inbound_streams;
265 __be32 initial_tsn;
1da177e4 266 __u8 params[0];
4ae70c08 267};
1da177e4 268
01a992be 269struct sctp_init_chunk {
922dbc5b 270 struct sctp_chunkhdr chunk_hdr;
4ae70c08 271 struct sctp_inithdr init_hdr;
01a992be 272};
1da177e4
LT
273
274
275/* Section 3.3.2.1. IPv4 Address Parameter (5) */
a38905e6 276struct sctp_ipv4addr_param {
3c918704 277 struct sctp_paramhdr param_hdr;
a38905e6
XL
278 struct in_addr addr;
279};
1da177e4
LT
280
281/* Section 3.3.2.1. IPv6 Address Parameter (6) */
00987cc0 282struct sctp_ipv6addr_param {
3c918704 283 struct sctp_paramhdr param_hdr;
1da177e4 284 struct in6_addr addr;
00987cc0 285};
1da177e4
LT
286
287/* Section 3.3.2.1 Cookie Preservative (9) */
365ddb65 288struct sctp_cookie_preserve_param {
3c918704 289 struct sctp_paramhdr param_hdr;
365ddb65
XL
290 __be32 lifespan_increment;
291};
1da177e4
LT
292
293/* Section 3.3.2.1 Host Name Address (11) */
df9af006 294struct sctp_hostname_param {
3c918704 295 struct sctp_paramhdr param_hdr;
1da177e4 296 uint8_t hostname[0];
df9af006 297};
1da177e4
LT
298
299/* Section 3.3.2.1 Supported Address Types (12) */
e925d506 300struct sctp_supported_addrs_param {
3c918704 301 struct sctp_paramhdr param_hdr;
f3ffaf14 302 __be16 types[0];
e925d506 303};
1da177e4 304
0f3fffd8 305/* ADDIP Section 3.2.6 Adaptation Layer Indication */
85f6bd24 306struct sctp_adaptation_ind_param {
1da177e4 307 struct sctp_paramhdr param_hdr;
0f3fffd8 308 __be32 adaptation_ind;
85f6bd24 309};
1da177e4 310
131a47e3 311/* ADDIP Section 4.2.7 Supported Extensions Parameter */
15328d9f 312struct sctp_supported_ext_param {
131a47e3
VY
313 struct sctp_paramhdr param_hdr;
314 __u8 chunks[0];
15328d9f 315};
131a47e3 316
f7b0e93b 317/* AUTH Section 3.1 Random */
b02db702 318struct sctp_random_param {
3c918704 319 struct sctp_paramhdr param_hdr;
f7b0e93b 320 __u8 random_val[0];
b02db702 321};
f7b0e93b
VY
322
323/* AUTH Section 3.2 Chunk List */
a762a9d9 324struct sctp_chunks_param {
3c918704 325 struct sctp_paramhdr param_hdr;
f7b0e93b 326 __u8 chunks[0];
a762a9d9 327};
f7b0e93b
VY
328
329/* AUTH Section 3.3 HMAC Algorithm */
1474774a 330struct sctp_hmac_algo_param {
3c918704 331 struct sctp_paramhdr param_hdr;
f7b0e93b 332 __be16 hmac_ids[0];
1474774a 333};
f7b0e93b 334
1da177e4
LT
335/* RFC 2960. Section 3.3.3 Initiation Acknowledgement (INIT ACK) (2):
336 * The INIT ACK chunk is used to acknowledge the initiation of an SCTP
337 * association.
338 */
cb1844c4
XL
339struct sctp_initack_chunk {
340 struct sctp_chunkhdr chunk_hdr;
341 struct sctp_inithdr init_hdr;
342};
1da177e4
LT
343
344/* Section 3.3.3.1 State Cookie (7) */
f48ef4c7 345struct sctp_cookie_param {
3c918704 346 struct sctp_paramhdr p;
1da177e4 347 __u8 body[0];
f48ef4c7 348};
1da177e4
LT
349
350/* Section 3.3.3.1 Unrecognized Parameters (8) */
62e6b7e4 351struct sctp_unrecognized_param {
3c918704
XL
352 struct sctp_paramhdr param_hdr;
353 struct sctp_paramhdr unrecognized;
62e6b7e4 354};
1da177e4
LT
355
356
357
358/*
359 * 3.3.4 Selective Acknowledgement (SACK) (3):
360 *
361 * This chunk is sent to the peer endpoint to acknowledge received DATA
362 * chunks and to inform the peer endpoint of gaps in the received
363 * subsequences of DATA chunks as represented by their TSNs.
364 */
365
fe9a0fe7 366struct sctp_gap_ack_block {
f3ffaf14
AV
367 __be16 start;
368 __be16 end;
fe9a0fe7 369};
1da177e4 370
afd93b7b 371union sctp_sack_variable {
fe9a0fe7 372 struct sctp_gap_ack_block gab;
9b415156 373 __be32 dup;
afd93b7b 374};
1da177e4 375
78731085 376struct sctp_sackhdr {
f3ffaf14
AV
377 __be32 cum_tsn_ack;
378 __be32 a_rwnd;
379 __be16 num_gap_ack_blocks;
380 __be16 num_dup_tsns;
afd93b7b 381 union sctp_sack_variable variable[0];
78731085 382};
1da177e4 383
d4d6c614 384struct sctp_sack_chunk {
922dbc5b 385 struct sctp_chunkhdr chunk_hdr;
78731085 386 struct sctp_sackhdr sack_hdr;
d4d6c614 387};
1da177e4
LT
388
389
390/* RFC 2960. Section 3.3.5 Heartbeat Request (HEARTBEAT) (4):
391 *
392 * An endpoint should send this chunk to its peer endpoint to probe the
393 * reachability of a particular destination transport address defined in
394 * the present association.
395 */
396
4d2dcdf4 397struct sctp_heartbeathdr {
3c918704 398 struct sctp_paramhdr info;
4d2dcdf4 399};
1da177e4 400
38c00f74 401struct sctp_heartbeat_chunk {
922dbc5b 402 struct sctp_chunkhdr chunk_hdr;
4d2dcdf4 403 struct sctp_heartbeathdr hb_hdr;
38c00f74 404};
1da177e4
LT
405
406
407/* For the abort and shutdown ACK we must carry the init tag in the
408 * common header. Just the common header is all that is needed with a
409 * chunk descriptor.
410 */
441ae65a 411struct sctp_abort_chunk {
922dbc5b 412 struct sctp_chunkhdr uh;
441ae65a 413};
1da177e4
LT
414
415
416/* For the graceful shutdown we must carry the tag (in common header)
417 * and the highest consecutive acking value.
418 */
e61e4055 419struct sctp_shutdownhdr {
f3ffaf14 420 __be32 cum_tsn_ack;
e61e4055 421};
1da177e4 422
ac23e681 423struct sctp_shutdown_chunk {
922dbc5b 424 struct sctp_chunkhdr chunk_hdr;
e61e4055 425 struct sctp_shutdownhdr shutdown_hdr;
85c727b5 426};
1da177e4
LT
427
428/* RFC 2960. Section 3.3.10 Operation Error (ERROR) (9) */
429
d8238d9d 430struct sctp_errhdr {
f3ffaf14
AV
431 __be16 cause;
432 __be16 length;
1da177e4 433 __u8 variable[0];
d8238d9d 434};
1da177e4 435
87caeba7 436struct sctp_operr_chunk {
922dbc5b 437 struct sctp_chunkhdr chunk_hdr;
d8238d9d 438 struct sctp_errhdr err_hdr;
87caeba7 439};
1da177e4
LT
440
441/* RFC 2960 3.3.10 - Operation Error
442 *
443 * Cause Code: 16 bits (unsigned integer)
444 *
445 * Defines the type of error conditions being reported.
446 * Cause Code
447 * Value Cause Code
448 * --------- ----------------
449 * 1 Invalid Stream Identifier
450 * 2 Missing Mandatory Parameter
451 * 3 Stale Cookie Error
452 * 4 Out of Resource
453 * 5 Unresolvable Address
454 * 6 Unrecognized Chunk Type
455 * 7 Invalid Mandatory Parameter
456 * 8 Unrecognized Parameters
457 * 9 No User Data
458 * 10 Cookie Received While Shutting Down
459 */
2a493216 460enum sctp_error {
1da177e4 461
f3a7c66b
HH
462 SCTP_ERROR_NO_ERROR = cpu_to_be16(0x00),
463 SCTP_ERROR_INV_STRM = cpu_to_be16(0x01),
464 SCTP_ERROR_MISS_PARAM = cpu_to_be16(0x02),
465 SCTP_ERROR_STALE_COOKIE = cpu_to_be16(0x03),
466 SCTP_ERROR_NO_RESOURCE = cpu_to_be16(0x04),
467 SCTP_ERROR_DNS_FAILED = cpu_to_be16(0x05),
468 SCTP_ERROR_UNKNOWN_CHUNK = cpu_to_be16(0x06),
469 SCTP_ERROR_INV_PARAM = cpu_to_be16(0x07),
470 SCTP_ERROR_UNKNOWN_PARAM = cpu_to_be16(0x08),
471 SCTP_ERROR_NO_DATA = cpu_to_be16(0x09),
472 SCTP_ERROR_COOKIE_IN_SHUTDOWN = cpu_to_be16(0x0a),
1da177e4
LT
473
474
475 /* SCTP Implementation Guide:
476 * 11 Restart of an association with new addresses
477 * 12 User Initiated Abort
478 * 13 Protocol Violation
479 */
480
f3a7c66b
HH
481 SCTP_ERROR_RESTART = cpu_to_be16(0x0b),
482 SCTP_ERROR_USER_ABORT = cpu_to_be16(0x0c),
483 SCTP_ERROR_PROTO_VIOLATION = cpu_to_be16(0x0d),
1da177e4
LT
484
485 /* ADDIP Section 3.3 New Error Causes
486 *
487 * Four new Error Causes are added to the SCTP Operational Errors,
488 * primarily for use in the ASCONF-ACK chunk.
489 *
490 * Value Cause Code
491 * --------- ----------------
a84db794
WY
492 * 0x00A0 Request to Delete Last Remaining IP Address.
493 * 0x00A1 Operation Refused Due to Resource Shortage.
494 * 0x00A2 Request to Delete Source IP Address.
495 * 0x00A3 Association Aborted due to illegal ASCONF-ACK
496 * 0x00A4 Request refused - no authorization.
1da177e4 497 */
a84db794
WY
498 SCTP_ERROR_DEL_LAST_IP = cpu_to_be16(0x00A0),
499 SCTP_ERROR_RSRC_LOW = cpu_to_be16(0x00A1),
500 SCTP_ERROR_DEL_SRC_IP = cpu_to_be16(0x00A2),
501 SCTP_ERROR_ASCONF_ACK = cpu_to_be16(0x00A3),
502 SCTP_ERROR_REQ_REFUSED = cpu_to_be16(0x00A4),
f7b0e93b
VY
503
504 /* AUTH Section 4. New Error Cause
505 *
506 * This section defines a new error cause that will be sent if an AUTH
507 * chunk is received with an unsupported HMAC identifier.
508 * illustrates the new error cause.
509 *
510 * Cause Code Error Cause Name
511 * --------------------------------------------------------------
512 * 0x0105 Unsupported HMAC Identifier
513 */
f3a7c66b 514 SCTP_ERROR_UNSUP_HMAC = cpu_to_be16(0x0105)
2a493216 515};
1da177e4
LT
516
517
518
519/* RFC 2960. Appendix A. Explicit Congestion Notification.
520 * Explicit Congestion Notification Echo (ECNE) (12)
521 */
1fb6d83b 522struct sctp_ecnehdr {
f3ffaf14 523 __be32 lowest_tsn;
1fb6d83b 524};
1da177e4 525
b515fd27 526struct sctp_ecne_chunk {
922dbc5b 527 struct sctp_chunkhdr chunk_hdr;
1fb6d83b 528 struct sctp_ecnehdr ence_hdr;
b515fd27 529};
1da177e4
LT
530
531/* RFC 2960. Appendix A. Explicit Congestion Notification.
532 * Congestion Window Reduced (CWR) (13)
533 */
65f77105 534struct sctp_cwrhdr {
f3ffaf14 535 __be32 lowest_tsn;
65f77105 536};
1da177e4 537
1da177e4
LT
538/* PR-SCTP
539 * 3.2 Forward Cumulative TSN Chunk Definition (FORWARD TSN)
540 *
541 * Forward Cumulative TSN chunk has the following format:
542 *
543 * 0 1 2 3
544 * 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
545 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
546 * | Type = 192 | Flags = 0x00 | Length = Variable |
547 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
548 * | New Cumulative TSN |
549 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
550 * | Stream-1 | Stream Sequence-1 |
551 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
552 * \ /
553 * / \
554 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
555 * | Stream-N | Stream Sequence-N |
556 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
557 *
558 * Chunk Flags:
559 *
560 * Set to all zeros on transmit and ignored on receipt.
561 *
562 * New Cumulative TSN: 32 bit u_int
563 *
564 * This indicates the new cumulative TSN to the data receiver. Upon
565 * the reception of this value, the data receiver MUST consider
566 * any missing TSNs earlier than or equal to this value as received
567 * and stop reporting them as gaps in any subsequent SACKs.
568 *
569 * Stream-N: 16 bit u_int
570 *
571 * This field holds a stream number that was skipped by this
572 * FWD-TSN.
573 *
574 * Stream Sequence-N: 16 bit u_int
575 * This field holds the sequence number associated with the stream
576 * that was skipped. The stream sequence field holds the largest stream
577 * sequence number in this stream being skipped. The receiver of
578 * the FWD-TSN's can use the Stream-N and Stream Sequence-N fields
579 * to enable delivery of any stranded TSN's that remain on the stream
580 * re-ordering queues. This field MUST NOT report TSN's corresponding
581 * to DATA chunk that are marked as unordered. For ordered DATA
582 * chunks this field MUST be filled in.
583 */
584struct sctp_fwdtsn_skip {
f3ffaf14
AV
585 __be16 stream;
586 __be16 ssn;
85c727b5 587};
1da177e4
LT
588
589struct sctp_fwdtsn_hdr {
f3ffaf14 590 __be32 new_cum_tsn;
1da177e4 591 struct sctp_fwdtsn_skip skip[0];
85c727b5 592};
1da177e4
LT
593
594struct sctp_fwdtsn_chunk {
595 struct sctp_chunkhdr chunk_hdr;
596 struct sctp_fwdtsn_hdr fwdtsn_hdr;
85c727b5 597};
1da177e4
LT
598
599
600/* ADDIP
601 * Section 3.1.1 Address Configuration Change Chunk (ASCONF)
602 *
603 * Serial Number: 32 bits (unsigned integer)
604 * This value represents a Serial Number for the ASCONF Chunk. The
605 * valid range of Serial Number is from 0 to 2^32-1.
606 * Serial Numbers wrap back to 0 after reaching 2^32 -1.
607 *
608 * Address Parameter: 8 or 20 bytes (depending on type)
609 * The address is an address of the sender of the ASCONF chunk,
610 * the address MUST be considered part of the association by the
611 * peer endpoint. This field may be used by the receiver of the
612 * ASCONF to help in finding the association. This parameter MUST
613 * be present in every ASCONF message i.e. it is a mandatory TLV
614 * parameter.
615 *
616 * ASCONF Parameter: TLV format
617 * Each Address configuration change is represented by a TLV
618 * parameter as defined in Section 3.2. One or more requests may
619 * be present in an ASCONF Chunk.
620 *
621 * Section 3.1.2 Address Configuration Acknowledgement Chunk (ASCONF-ACK)
622 *
623 * Serial Number: 32 bits (unsigned integer)
624 * This value represents the Serial Number for the received ASCONF
625 * Chunk that is acknowledged by this chunk. This value is copied
626 * from the received ASCONF Chunk.
627 *
628 * ASCONF Parameter Response: TLV format
629 * The ASCONF Parameter Response is used in the ASCONF-ACK to
630 * report status of ASCONF processing.
631 */
8b32f234
XL
632struct sctp_addip_param {
633 struct sctp_paramhdr param_hdr;
634 __be32 crr_id;
635};
1da177e4 636
65205cc4 637struct sctp_addiphdr {
f3ffaf14 638 __be32 serial;
1da177e4 639 __u8 params[0];
65205cc4 640};
1da177e4 641
68d75469 642struct sctp_addip_chunk {
922dbc5b 643 struct sctp_chunkhdr chunk_hdr;
65205cc4 644 struct sctp_addiphdr addip_hdr;
68d75469 645};
1da177e4 646
f7b0e93b
VY
647/* AUTH
648 * Section 4.1 Authentication Chunk (AUTH)
649 *
650 * This chunk is used to hold the result of the HMAC calculation.
651 *
652 * 0 1 2 3
653 * 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
654 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
655 * | Type = 0x0F | Flags=0 | Length |
656 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
657 * | Shared Key Identifier | HMAC Identifier |
658 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
659 * | |
660 * \ HMAC /
661 * / \
662 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
663 *
664 * Type: 1 byte (unsigned integer)
665 * This value MUST be set to 0x0F for all AUTH-chunks.
666 *
667 * Flags: 1 byte (unsigned integer)
668 * Set to zero on transmit and ignored on receipt.
669 *
670 * Length: 2 bytes (unsigned integer)
671 * This value holds the length of the HMAC in bytes plus 8.
672 *
673 * Shared Key Identifier: 2 bytes (unsigned integer)
674 * This value describes which endpoint pair shared key is used.
675 *
676 * HMAC Identifier: 2 bytes (unsigned integer)
677 * This value describes which message digest is being used. Table 2
678 * shows the currently defined values.
679 *
680 * The following Table 2 shows the currently defined values for HMAC
681 * identifiers.
682 *
683 * +-----------------+--------------------------+
684 * | HMAC Identifier | Message Digest Algorithm |
685 * +-----------------+--------------------------+
686 * | 0 | Reserved |
687 * | 1 | SHA-1 defined in [8] |
688 * | 2 | Reserved |
689 * | 3 | SHA-256 defined in [8] |
690 * +-----------------+--------------------------+
691 *
692 *
693 * HMAC: n bytes (unsigned integer) This hold the result of the HMAC
694 * calculation.
695 */
96f7ef4d 696struct sctp_authhdr {
f7b0e93b
VY
697 __be16 shkey_id;
698 __be16 hmac_id;
699 __u8 hmac[0];
96f7ef4d 700};
f7b0e93b 701
bb96dec7 702struct sctp_auth_chunk {
922dbc5b 703 struct sctp_chunkhdr chunk_hdr;
96f7ef4d 704 struct sctp_authhdr auth_hdr;
bb96dec7 705};
f7b0e93b 706
52c52a61
XL
707struct sctp_infox {
708 struct sctp_info *sctpinfo;
709 struct sctp_association *asoc;
710};
711
cc16f00f 712struct sctp_reconf_chunk {
922dbc5b 713 struct sctp_chunkhdr chunk_hdr;
cc16f00f 714 __u8 params[0];
9faf1c0f 715};
cc16f00f
XL
716
717struct sctp_strreset_outreq {
3c918704 718 struct sctp_paramhdr param_hdr;
1da4fc97
XL
719 __be32 request_seq;
720 __be32 response_seq;
721 __be32 send_reset_at_tsn;
722 __be16 list_of_streams[0];
9faf1c0f 723};
cc16f00f
XL
724
725struct sctp_strreset_inreq {
3c918704 726 struct sctp_paramhdr param_hdr;
1da4fc97
XL
727 __be32 request_seq;
728 __be16 list_of_streams[0];
9faf1c0f 729};
cc16f00f 730
c56480a1 731struct sctp_strreset_tsnreq {
3c918704 732 struct sctp_paramhdr param_hdr;
1da4fc97 733 __be32 request_seq;
c56480a1
XL
734};
735
78098117 736struct sctp_strreset_addstrm {
3c918704 737 struct sctp_paramhdr param_hdr;
1da4fc97
XL
738 __be32 request_seq;
739 __be16 number_of_streams;
740 __be16 reserved;
78098117
XL
741};
742
bd4b9f8b
XL
743enum {
744 SCTP_STRRESET_NOTHING_TO_DO = 0x00,
745 SCTP_STRRESET_PERFORMED = 0x01,
746 SCTP_STRRESET_DENIED = 0x02,
747 SCTP_STRRESET_ERR_WRONG_SSN = 0x03,
748 SCTP_STRRESET_ERR_IN_PROGRESS = 0x04,
749 SCTP_STRRESET_ERR_BAD_SEQNO = 0x05,
750 SCTP_STRRESET_IN_PROGRESS = 0x06,
751};
752
753struct sctp_strreset_resp {
3c918704 754 struct sctp_paramhdr param_hdr;
1da4fc97
XL
755 __be32 response_seq;
756 __be32 result;
bd4b9f8b
XL
757};
758
759struct sctp_strreset_resptsn {
3c918704 760 struct sctp_paramhdr param_hdr;
1da4fc97
XL
761 __be32 response_seq;
762 __be32 result;
763 __be32 senders_next_tsn;
764 __be32 receivers_next_tsn;
bd4b9f8b
XL
765};
766
1da177e4 767#endif /* __LINUX_SCTP_H__ */