Merge tag 'xfs-6.4-rc1-fixes' of git://git.kernel.org/pub/scm/fs/xfs/xfs-linux
[linux-block.git] / include / linux / sctp.h
CommitLineData
47505b8b 1/* SPDX-License-Identifier: GPL-2.0-or-later */
1da177e4
LT
2/* SCTP kernel reference Implementation
3 * (C) Copyright IBM Corp. 2001, 2004
4 * Copyright (c) 1999-2000 Cisco, Inc.
5 * Copyright (c) 1999-2001 Motorola, Inc.
6 * Copyright (c) 2001 Intel Corp.
7 * Copyright (c) 2001 Nokia, Inc.
8 * Copyright (c) 2001 La Monte H.P. Yarroll
9 *
10 * This file is part of the SCTP kernel reference Implementation
11 *
12 * Various protocol defined structures.
13 *
1da177e4
LT
14 * Please send any bug reports or fixes you make to the
15 * email address(es):
31956660 16 * lksctp developers <linux-sctp@vger.kernel.org>
1da177e4
LT
17 *
18 * Or submit a bug report through the following website:
19 * http://www.sf.net/projects/lksctp
20 *
21 * Written or modified by:
22 * La Monte H.P. Yarroll <piggy@acm.org>
23 * Karl Knutson <karl@athena.chicago.il.us>
24 * Jon Grimm <jgrimm@us.ibm.com>
25 * Xingang Guo <xingang.guo@intel.com>
26 * randall@sctp.chicago.il.us
27 * kmorneau@cisco.com
28 * qxie1@email.mot.com
29 * Sridhar Samudrala <sri@us.ibm.com>
30 * Kevin Gao <kevin.gao@intel.com>
31 *
32 * Any bugs reported given to us we will try to fix... any fixes shared will
33 * be incorporated into the next SCTP release.
34 */
35#ifndef __LINUX_SCTP_H__
36#define __LINUX_SCTP_H__
37
38#include <linux/in.h> /* We need in_addr. */
39#include <linux/in6.h> /* We need in6_addr. */
1b866434 40#include <linux/skbuff.h>
1da177e4 41
1b866434 42#include <uapi/linux/sctp.h>
1da177e4
LT
43
44/* Section 3.1. SCTP Common Header Format */
ae146d9b 45struct sctphdr {
f3ffaf14
AV
46 __be16 source;
47 __be16 dest;
48 __be32 vtag;
4458f04c 49 __le32 checksum;
ae146d9b 50};
1da177e4 51
2c0fd387
ACM
52static inline struct sctphdr *sctp_hdr(const struct sk_buff *skb)
53{
9c70220b 54 return (struct sctphdr *)skb_transport_header(skb);
2c0fd387 55}
2c0fd387 56
1da177e4 57/* Section 3.2. Chunk Field Descriptions. */
922dbc5b 58struct sctp_chunkhdr {
1da177e4
LT
59 __u8 type;
60 __u8 flags;
f3ffaf14 61 __be16 length;
922dbc5b 62};
1da177e4
LT
63
64
65/* Section 3.2. Chunk Type Values.
66 * [Chunk Type] identifies the type of information contained in the Chunk
67 * Value field. It takes a value from 0 to 254. The value of 255 is
68 * reserved for future use as an extension field.
69 */
6d85e68f 70enum sctp_cid {
1da177e4
LT
71 SCTP_CID_DATA = 0,
72 SCTP_CID_INIT = 1,
73 SCTP_CID_INIT_ACK = 2,
74 SCTP_CID_SACK = 3,
75 SCTP_CID_HEARTBEAT = 4,
76 SCTP_CID_HEARTBEAT_ACK = 5,
77 SCTP_CID_ABORT = 6,
78 SCTP_CID_SHUTDOWN = 7,
79 SCTP_CID_SHUTDOWN_ACK = 8,
80 SCTP_CID_ERROR = 9,
81 SCTP_CID_COOKIE_ECHO = 10,
82 SCTP_CID_COOKIE_ACK = 11,
83 SCTP_CID_ECN_ECNE = 12,
84 SCTP_CID_ECN_CWR = 13,
85 SCTP_CID_SHUTDOWN_COMPLETE = 14,
86
f7b0e93b
VY
87 /* AUTH Extension Section 4.1 */
88 SCTP_CID_AUTH = 0x0F,
89
96b120b3
XL
90 /* sctp ndata 5.1. I-DATA */
91 SCTP_CID_I_DATA = 0x40,
92
1da177e4
LT
93 /* PR-SCTP Sec 3.2 */
94 SCTP_CID_FWD_TSN = 0xC0,
95
96 /* Use hex, as defined in ADDIP sec. 3.1 */
97 SCTP_CID_ASCONF = 0xC1,
2d07a49a 98 SCTP_CID_I_FWD_TSN = 0xC2,
1da177e4 99 SCTP_CID_ASCONF_ACK = 0x80,
cc16f00f 100 SCTP_CID_RECONF = 0x82,
745a3211 101 SCTP_CID_PAD = 0x84,
6d85e68f 102}; /* enum */
1da177e4
LT
103
104
105/* Section 3.2
106 * Chunk Types are encoded such that the highest-order two bits specify
107 * the action that must be taken if the processing endpoint does not
108 * recognize the Chunk Type.
109 */
ec431c2c 110enum {
1da177e4
LT
111 SCTP_CID_ACTION_DISCARD = 0x00,
112 SCTP_CID_ACTION_DISCARD_ERR = 0x40,
113 SCTP_CID_ACTION_SKIP = 0x80,
114 SCTP_CID_ACTION_SKIP_ERR = 0xc0,
ec431c2c 115};
1da177e4
LT
116
117enum { SCTP_CID_ACTION_MASK = 0xc0, };
118
119/* This flag is used in Chunk Flags for ABORT and SHUTDOWN COMPLETE.
120 *
121 * 3.3.7 Abort Association (ABORT) (6):
122 * The T bit is set to 0 if the sender had a TCB that it destroyed.
123 * If the sender did not have a TCB it should set this bit to 1.
124 */
125enum { SCTP_CHUNK_FLAG_T = 0x01 };
126
127/*
128 * Set the T bit
129 *
130 * 0 1 2 3
131 * 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
132 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
133 * | Type = 14 |Reserved |T| Length = 4 |
134 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
135 *
136 * Chunk Flags: 8 bits
137 *
138 * Reserved: 7 bits
139 * Set to 0 on transmit and ignored on receipt.
140 *
141 * T bit: 1 bit
142 * The T bit is set to 0 if the sender had a TCB that it destroyed. If
143 * the sender did NOT have a TCB it should set this bit to 1.
144 *
145 * Note: Special rules apply to this chunk for verification, please
146 * see Section 8.5.1 for details.
147 */
148
149#define sctp_test_T_bit(c) ((c)->chunk_hdr->flags & SCTP_CHUNK_FLAG_T)
150
151/* RFC 2960
152 * Section 3.2.1 Optional/Variable-length Parmaeter Format.
153 */
154
3c918704 155struct sctp_paramhdr {
f3ffaf14
AV
156 __be16 type;
157 __be16 length;
3c918704 158};
1da177e4 159
34b4e29b 160enum sctp_param {
1da177e4
LT
161
162 /* RFC 2960 Section 3.3.5 */
f3a7c66b 163 SCTP_PARAM_HEARTBEAT_INFO = cpu_to_be16(1),
1da177e4 164 /* RFC 2960 Section 3.3.2.1 */
f3a7c66b
HH
165 SCTP_PARAM_IPV4_ADDRESS = cpu_to_be16(5),
166 SCTP_PARAM_IPV6_ADDRESS = cpu_to_be16(6),
167 SCTP_PARAM_STATE_COOKIE = cpu_to_be16(7),
168 SCTP_PARAM_UNRECOGNIZED_PARAMETERS = cpu_to_be16(8),
169 SCTP_PARAM_COOKIE_PRESERVATIVE = cpu_to_be16(9),
170 SCTP_PARAM_HOST_NAME_ADDRESS = cpu_to_be16(11),
171 SCTP_PARAM_SUPPORTED_ADDRESS_TYPES = cpu_to_be16(12),
172 SCTP_PARAM_ECN_CAPABLE = cpu_to_be16(0x8000),
1da177e4 173
f7b0e93b 174 /* AUTH Extension Section 3 */
f3a7c66b
HH
175 SCTP_PARAM_RANDOM = cpu_to_be16(0x8002),
176 SCTP_PARAM_CHUNKS = cpu_to_be16(0x8003),
177 SCTP_PARAM_HMAC_ALGO = cpu_to_be16(0x8004),
f7b0e93b 178
131a47e3 179 /* Add-IP: Supported Extensions, Section 4.2 */
f3a7c66b 180 SCTP_PARAM_SUPPORTED_EXT = cpu_to_be16(0x8008),
131a47e3 181
1da177e4 182 /* PR-SCTP Sec 3.1 */
f3a7c66b 183 SCTP_PARAM_FWD_TSN_SUPPORT = cpu_to_be16(0xc000),
1da177e4
LT
184
185 /* Add-IP Extension. Section 3.2 */
f3a7c66b
HH
186 SCTP_PARAM_ADD_IP = cpu_to_be16(0xc001),
187 SCTP_PARAM_DEL_IP = cpu_to_be16(0xc002),
188 SCTP_PARAM_ERR_CAUSE = cpu_to_be16(0xc003),
189 SCTP_PARAM_SET_PRIMARY = cpu_to_be16(0xc004),
190 SCTP_PARAM_SUCCESS_REPORT = cpu_to_be16(0xc005),
191 SCTP_PARAM_ADAPTATION_LAYER_IND = cpu_to_be16(0xc006),
1da177e4 192
cc16f00f
XL
193 /* RE-CONFIG. Section 4 */
194 SCTP_PARAM_RESET_OUT_REQUEST = cpu_to_be16(0x000d),
195 SCTP_PARAM_RESET_IN_REQUEST = cpu_to_be16(0x000e),
196 SCTP_PARAM_RESET_TSN_REQUEST = cpu_to_be16(0x000f),
197 SCTP_PARAM_RESET_RESPONSE = cpu_to_be16(0x0010),
198 SCTP_PARAM_RESET_ADD_OUT_STREAMS = cpu_to_be16(0x0011),
199 SCTP_PARAM_RESET_ADD_IN_STREAMS = cpu_to_be16(0x0012),
34b4e29b 200}; /* enum */
1da177e4
LT
201
202
203/* RFC 2960 Section 3.2.1
204 * The Parameter Types are encoded such that the highest-order two bits
205 * specify the action that must be taken if the processing endpoint does
206 * not recognize the Parameter Type.
207 *
208 */
0664ed43 209enum {
f3a7c66b
HH
210 SCTP_PARAM_ACTION_DISCARD = cpu_to_be16(0x0000),
211 SCTP_PARAM_ACTION_DISCARD_ERR = cpu_to_be16(0x4000),
212 SCTP_PARAM_ACTION_SKIP = cpu_to_be16(0x8000),
213 SCTP_PARAM_ACTION_SKIP_ERR = cpu_to_be16(0xc000),
0664ed43 214};
1da177e4 215
f3a7c66b 216enum { SCTP_PARAM_ACTION_MASK = cpu_to_be16(0xc000), };
1da177e4
LT
217
218/* RFC 2960 Section 3.3.1 Payload Data (DATA) (0) */
219
3583df1a 220struct sctp_datahdr {
f3ffaf14
AV
221 __be32 tsn;
222 __be16 stream;
223 __be16 ssn;
978aa047 224 __u32 ppid;
dbda0fba 225 /* __u8 payload[]; */
3583df1a 226};
1da177e4 227
9f8d3147 228struct sctp_data_chunk {
922dbc5b 229 struct sctp_chunkhdr chunk_hdr;
3583df1a 230 struct sctp_datahdr data_hdr;
9f8d3147 231};
1da177e4 232
ad05a7a0
XL
233struct sctp_idatahdr {
234 __be32 tsn;
235 __be16 stream;
236 __be16 reserved;
237 __be32 mid;
238 union {
239 __u32 ppid;
240 __be32 fsn;
241 };
242 __u8 payload[0];
243};
244
245struct sctp_idata_chunk {
246 struct sctp_chunkhdr chunk_hdr;
247 struct sctp_idatahdr data_hdr;
248};
249
1da177e4
LT
250/* DATA Chuck Specific Flags */
251enum {
252 SCTP_DATA_MIDDLE_FRAG = 0x00,
253 SCTP_DATA_LAST_FRAG = 0x01,
254 SCTP_DATA_FIRST_FRAG = 0x02,
255 SCTP_DATA_NOT_FRAG = 0x03,
256 SCTP_DATA_UNORDERED = 0x04,
475cba4e 257 SCTP_DATA_SACK_IMM = 0x08,
1da177e4
LT
258};
259enum { SCTP_DATA_FRAG_MASK = 0x03, };
260
261
262/* RFC 2960 Section 3.3.2 Initiation (INIT) (1)
263 *
264 * This chunk is used to initiate a SCTP association between two
265 * endpoints.
266 */
4ae70c08 267struct sctp_inithdr {
f3ffaf14
AV
268 __be32 init_tag;
269 __be32 a_rwnd;
270 __be16 num_outbound_streams;
271 __be16 num_inbound_streams;
272 __be32 initial_tsn;
add7370a 273 /* __u8 params[]; */
4ae70c08 274};
1da177e4 275
01a992be 276struct sctp_init_chunk {
922dbc5b 277 struct sctp_chunkhdr chunk_hdr;
4ae70c08 278 struct sctp_inithdr init_hdr;
01a992be 279};
1da177e4
LT
280
281
282/* Section 3.3.2.1. IPv4 Address Parameter (5) */
a38905e6 283struct sctp_ipv4addr_param {
3c918704 284 struct sctp_paramhdr param_hdr;
a38905e6
XL
285 struct in_addr addr;
286};
1da177e4
LT
287
288/* Section 3.3.2.1. IPv6 Address Parameter (6) */
00987cc0 289struct sctp_ipv6addr_param {
3c918704 290 struct sctp_paramhdr param_hdr;
1da177e4 291 struct in6_addr addr;
00987cc0 292};
1da177e4
LT
293
294/* Section 3.3.2.1 Cookie Preservative (9) */
365ddb65 295struct sctp_cookie_preserve_param {
3c918704 296 struct sctp_paramhdr param_hdr;
365ddb65
XL
297 __be32 lifespan_increment;
298};
1da177e4
LT
299
300/* Section 3.3.2.1 Host Name Address (11) */
df9af006 301struct sctp_hostname_param {
3c918704 302 struct sctp_paramhdr param_hdr;
af6bb61c 303 uint8_t hostname[];
df9af006 304};
1da177e4
LT
305
306/* Section 3.3.2.1 Supported Address Types (12) */
e925d506 307struct sctp_supported_addrs_param {
3c918704 308 struct sctp_paramhdr param_hdr;
af6bb61c 309 __be16 types[];
e925d506 310};
1da177e4 311
0f3fffd8 312/* ADDIP Section 3.2.6 Adaptation Layer Indication */
85f6bd24 313struct sctp_adaptation_ind_param {
1da177e4 314 struct sctp_paramhdr param_hdr;
0f3fffd8 315 __be32 adaptation_ind;
85f6bd24 316};
1da177e4 317
131a47e3 318/* ADDIP Section 4.2.7 Supported Extensions Parameter */
15328d9f 319struct sctp_supported_ext_param {
131a47e3 320 struct sctp_paramhdr param_hdr;
af6bb61c 321 __u8 chunks[];
15328d9f 322};
131a47e3 323
f7b0e93b 324/* AUTH Section 3.1 Random */
b02db702 325struct sctp_random_param {
3c918704 326 struct sctp_paramhdr param_hdr;
af6bb61c 327 __u8 random_val[];
b02db702 328};
f7b0e93b
VY
329
330/* AUTH Section 3.2 Chunk List */
a762a9d9 331struct sctp_chunks_param {
3c918704 332 struct sctp_paramhdr param_hdr;
af6bb61c 333 __u8 chunks[];
a762a9d9 334};
f7b0e93b
VY
335
336/* AUTH Section 3.3 HMAC Algorithm */
1474774a 337struct sctp_hmac_algo_param {
3c918704 338 struct sctp_paramhdr param_hdr;
af6bb61c 339 __be16 hmac_ids[];
1474774a 340};
f7b0e93b 341
1da177e4
LT
342/* RFC 2960. Section 3.3.3 Initiation Acknowledgement (INIT ACK) (2):
343 * The INIT ACK chunk is used to acknowledge the initiation of an SCTP
344 * association.
345 */
cb1844c4
XL
346struct sctp_initack_chunk {
347 struct sctp_chunkhdr chunk_hdr;
348 struct sctp_inithdr init_hdr;
349};
1da177e4
LT
350
351/* Section 3.3.3.1 State Cookie (7) */
f48ef4c7 352struct sctp_cookie_param {
3c918704 353 struct sctp_paramhdr p;
af6bb61c 354 __u8 body[];
f48ef4c7 355};
1da177e4
LT
356
357/* Section 3.3.3.1 Unrecognized Parameters (8) */
62e6b7e4 358struct sctp_unrecognized_param {
3c918704
XL
359 struct sctp_paramhdr param_hdr;
360 struct sctp_paramhdr unrecognized;
62e6b7e4 361};
1da177e4
LT
362
363
364
365/*
366 * 3.3.4 Selective Acknowledgement (SACK) (3):
367 *
368 * This chunk is sent to the peer endpoint to acknowledge received DATA
369 * chunks and to inform the peer endpoint of gaps in the received
370 * subsequences of DATA chunks as represented by their TSNs.
371 */
372
fe9a0fe7 373struct sctp_gap_ack_block {
f3ffaf14
AV
374 __be16 start;
375 __be16 end;
fe9a0fe7 376};
1da177e4 377
afd93b7b 378union sctp_sack_variable {
fe9a0fe7 379 struct sctp_gap_ack_block gab;
9b415156 380 __be32 dup;
afd93b7b 381};
1da177e4 382
78731085 383struct sctp_sackhdr {
f3ffaf14
AV
384 __be32 cum_tsn_ack;
385 __be32 a_rwnd;
386 __be16 num_gap_ack_blocks;
387 __be16 num_dup_tsns;
9789c1c6 388 /* union sctp_sack_variable variable[]; */
78731085 389};
1da177e4 390
d4d6c614 391struct sctp_sack_chunk {
922dbc5b 392 struct sctp_chunkhdr chunk_hdr;
78731085 393 struct sctp_sackhdr sack_hdr;
d4d6c614 394};
1da177e4
LT
395
396
397/* RFC 2960. Section 3.3.5 Heartbeat Request (HEARTBEAT) (4):
398 *
399 * An endpoint should send this chunk to its peer endpoint to probe the
400 * reachability of a particular destination transport address defined in
401 * the present association.
402 */
403
4d2dcdf4 404struct sctp_heartbeathdr {
3c918704 405 struct sctp_paramhdr info;
4d2dcdf4 406};
1da177e4 407
38c00f74 408struct sctp_heartbeat_chunk {
922dbc5b 409 struct sctp_chunkhdr chunk_hdr;
4d2dcdf4 410 struct sctp_heartbeathdr hb_hdr;
38c00f74 411};
1da177e4
LT
412
413
745a3211
XL
414/* PAD chunk could be bundled with heartbeat chunk to probe pmtu */
415struct sctp_pad_chunk {
416 struct sctp_chunkhdr uh;
417};
418
419
1da177e4
LT
420/* For the abort and shutdown ACK we must carry the init tag in the
421 * common header. Just the common header is all that is needed with a
422 * chunk descriptor.
423 */
441ae65a 424struct sctp_abort_chunk {
922dbc5b 425 struct sctp_chunkhdr uh;
441ae65a 426};
1da177e4
LT
427
428
429/* For the graceful shutdown we must carry the tag (in common header)
430 * and the highest consecutive acking value.
431 */
e61e4055 432struct sctp_shutdownhdr {
f3ffaf14 433 __be32 cum_tsn_ack;
e61e4055 434};
1da177e4 435
ac23e681 436struct sctp_shutdown_chunk {
922dbc5b 437 struct sctp_chunkhdr chunk_hdr;
e61e4055 438 struct sctp_shutdownhdr shutdown_hdr;
85c727b5 439};
1da177e4
LT
440
441/* RFC 2960. Section 3.3.10 Operation Error (ERROR) (9) */
442
d8238d9d 443struct sctp_errhdr {
f3ffaf14
AV
444 __be16 cause;
445 __be16 length;
9789c1c6 446 /* __u8 variable[]; */
d8238d9d 447};
1da177e4 448
87caeba7 449struct sctp_operr_chunk {
922dbc5b 450 struct sctp_chunkhdr chunk_hdr;
d8238d9d 451 struct sctp_errhdr err_hdr;
87caeba7 452};
1da177e4
LT
453
454/* RFC 2960 3.3.10 - Operation Error
455 *
456 * Cause Code: 16 bits (unsigned integer)
457 *
458 * Defines the type of error conditions being reported.
459 * Cause Code
460 * Value Cause Code
461 * --------- ----------------
462 * 1 Invalid Stream Identifier
463 * 2 Missing Mandatory Parameter
464 * 3 Stale Cookie Error
465 * 4 Out of Resource
466 * 5 Unresolvable Address
467 * 6 Unrecognized Chunk Type
468 * 7 Invalid Mandatory Parameter
469 * 8 Unrecognized Parameters
470 * 9 No User Data
471 * 10 Cookie Received While Shutting Down
472 */
2a493216 473enum sctp_error {
1da177e4 474
f3a7c66b
HH
475 SCTP_ERROR_NO_ERROR = cpu_to_be16(0x00),
476 SCTP_ERROR_INV_STRM = cpu_to_be16(0x01),
477 SCTP_ERROR_MISS_PARAM = cpu_to_be16(0x02),
478 SCTP_ERROR_STALE_COOKIE = cpu_to_be16(0x03),
479 SCTP_ERROR_NO_RESOURCE = cpu_to_be16(0x04),
480 SCTP_ERROR_DNS_FAILED = cpu_to_be16(0x05),
481 SCTP_ERROR_UNKNOWN_CHUNK = cpu_to_be16(0x06),
482 SCTP_ERROR_INV_PARAM = cpu_to_be16(0x07),
483 SCTP_ERROR_UNKNOWN_PARAM = cpu_to_be16(0x08),
484 SCTP_ERROR_NO_DATA = cpu_to_be16(0x09),
485 SCTP_ERROR_COOKIE_IN_SHUTDOWN = cpu_to_be16(0x0a),
1da177e4
LT
486
487
488 /* SCTP Implementation Guide:
489 * 11 Restart of an association with new addresses
490 * 12 User Initiated Abort
491 * 13 Protocol Violation
e38d86b3 492 * 14 Restart of an Association with New Encapsulation Port
1da177e4
LT
493 */
494
f3a7c66b
HH
495 SCTP_ERROR_RESTART = cpu_to_be16(0x0b),
496 SCTP_ERROR_USER_ABORT = cpu_to_be16(0x0c),
497 SCTP_ERROR_PROTO_VIOLATION = cpu_to_be16(0x0d),
e38d86b3 498 SCTP_ERROR_NEW_ENCAP_PORT = cpu_to_be16(0x0e),
1da177e4
LT
499
500 /* ADDIP Section 3.3 New Error Causes
501 *
502 * Four new Error Causes are added to the SCTP Operational Errors,
503 * primarily for use in the ASCONF-ACK chunk.
504 *
505 * Value Cause Code
506 * --------- ----------------
a84db794
WY
507 * 0x00A0 Request to Delete Last Remaining IP Address.
508 * 0x00A1 Operation Refused Due to Resource Shortage.
509 * 0x00A2 Request to Delete Source IP Address.
510 * 0x00A3 Association Aborted due to illegal ASCONF-ACK
511 * 0x00A4 Request refused - no authorization.
1da177e4 512 */
a84db794
WY
513 SCTP_ERROR_DEL_LAST_IP = cpu_to_be16(0x00A0),
514 SCTP_ERROR_RSRC_LOW = cpu_to_be16(0x00A1),
515 SCTP_ERROR_DEL_SRC_IP = cpu_to_be16(0x00A2),
516 SCTP_ERROR_ASCONF_ACK = cpu_to_be16(0x00A3),
517 SCTP_ERROR_REQ_REFUSED = cpu_to_be16(0x00A4),
f7b0e93b
VY
518
519 /* AUTH Section 4. New Error Cause
520 *
521 * This section defines a new error cause that will be sent if an AUTH
522 * chunk is received with an unsupported HMAC identifier.
523 * illustrates the new error cause.
524 *
525 * Cause Code Error Cause Name
526 * --------------------------------------------------------------
527 * 0x0105 Unsupported HMAC Identifier
528 */
f3a7c66b 529 SCTP_ERROR_UNSUP_HMAC = cpu_to_be16(0x0105)
2a493216 530};
1da177e4
LT
531
532
533
534/* RFC 2960. Appendix A. Explicit Congestion Notification.
535 * Explicit Congestion Notification Echo (ECNE) (12)
536 */
1fb6d83b 537struct sctp_ecnehdr {
f3ffaf14 538 __be32 lowest_tsn;
1fb6d83b 539};
1da177e4 540
b515fd27 541struct sctp_ecne_chunk {
922dbc5b 542 struct sctp_chunkhdr chunk_hdr;
1fb6d83b 543 struct sctp_ecnehdr ence_hdr;
b515fd27 544};
1da177e4
LT
545
546/* RFC 2960. Appendix A. Explicit Congestion Notification.
547 * Congestion Window Reduced (CWR) (13)
548 */
65f77105 549struct sctp_cwrhdr {
f3ffaf14 550 __be32 lowest_tsn;
65f77105 551};
1da177e4 552
1da177e4
LT
553/* PR-SCTP
554 * 3.2 Forward Cumulative TSN Chunk Definition (FORWARD TSN)
555 *
556 * Forward Cumulative TSN chunk has the following format:
557 *
558 * 0 1 2 3
559 * 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
560 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
561 * | Type = 192 | Flags = 0x00 | Length = Variable |
562 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
563 * | New Cumulative TSN |
564 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
565 * | Stream-1 | Stream Sequence-1 |
566 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
567 * \ /
568 * / \
569 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
570 * | Stream-N | Stream Sequence-N |
571 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
572 *
573 * Chunk Flags:
574 *
575 * Set to all zeros on transmit and ignored on receipt.
576 *
577 * New Cumulative TSN: 32 bit u_int
578 *
579 * This indicates the new cumulative TSN to the data receiver. Upon
580 * the reception of this value, the data receiver MUST consider
581 * any missing TSNs earlier than or equal to this value as received
582 * and stop reporting them as gaps in any subsequent SACKs.
583 *
584 * Stream-N: 16 bit u_int
585 *
586 * This field holds a stream number that was skipped by this
587 * FWD-TSN.
588 *
589 * Stream Sequence-N: 16 bit u_int
590 * This field holds the sequence number associated with the stream
591 * that was skipped. The stream sequence field holds the largest stream
592 * sequence number in this stream being skipped. The receiver of
593 * the FWD-TSN's can use the Stream-N and Stream Sequence-N fields
594 * to enable delivery of any stranded TSN's that remain on the stream
595 * re-ordering queues. This field MUST NOT report TSN's corresponding
596 * to DATA chunk that are marked as unordered. For ordered DATA
597 * chunks this field MUST be filled in.
598 */
599struct sctp_fwdtsn_skip {
f3ffaf14
AV
600 __be16 stream;
601 __be16 ssn;
85c727b5 602};
1da177e4
LT
603
604struct sctp_fwdtsn_hdr {
f3ffaf14 605 __be32 new_cum_tsn;
73175a04 606 /* struct sctp_fwdtsn_skip skip[]; */
85c727b5 607};
1da177e4
LT
608
609struct sctp_fwdtsn_chunk {
610 struct sctp_chunkhdr chunk_hdr;
611 struct sctp_fwdtsn_hdr fwdtsn_hdr;
85c727b5 612};
1da177e4 613
2d07a49a
XL
614struct sctp_ifwdtsn_skip {
615 __be16 stream;
616 __u8 reserved;
617 __u8 flags;
618 __be32 mid;
619};
620
621struct sctp_ifwdtsn_hdr {
622 __be32 new_cum_tsn;
73175a04 623 /* struct sctp_ifwdtsn_skip skip[]; */
2d07a49a
XL
624};
625
626struct sctp_ifwdtsn_chunk {
627 struct sctp_chunkhdr chunk_hdr;
628 struct sctp_ifwdtsn_hdr fwdtsn_hdr;
629};
1da177e4
LT
630
631/* ADDIP
632 * Section 3.1.1 Address Configuration Change Chunk (ASCONF)
633 *
634 * Serial Number: 32 bits (unsigned integer)
635 * This value represents a Serial Number for the ASCONF Chunk. The
636 * valid range of Serial Number is from 0 to 2^32-1.
637 * Serial Numbers wrap back to 0 after reaching 2^32 -1.
638 *
639 * Address Parameter: 8 or 20 bytes (depending on type)
640 * The address is an address of the sender of the ASCONF chunk,
641 * the address MUST be considered part of the association by the
642 * peer endpoint. This field may be used by the receiver of the
643 * ASCONF to help in finding the association. This parameter MUST
644 * be present in every ASCONF message i.e. it is a mandatory TLV
645 * parameter.
646 *
647 * ASCONF Parameter: TLV format
648 * Each Address configuration change is represented by a TLV
649 * parameter as defined in Section 3.2. One or more requests may
650 * be present in an ASCONF Chunk.
651 *
652 * Section 3.1.2 Address Configuration Acknowledgement Chunk (ASCONF-ACK)
653 *
654 * Serial Number: 32 bits (unsigned integer)
655 * This value represents the Serial Number for the received ASCONF
656 * Chunk that is acknowledged by this chunk. This value is copied
657 * from the received ASCONF Chunk.
658 *
659 * ASCONF Parameter Response: TLV format
660 * The ASCONF Parameter Response is used in the ASCONF-ACK to
661 * report status of ASCONF processing.
662 */
8b32f234
XL
663struct sctp_addip_param {
664 struct sctp_paramhdr param_hdr;
665 __be32 crr_id;
666};
1da177e4 667
65205cc4 668struct sctp_addiphdr {
f3ffaf14 669 __be32 serial;
add7370a 670 /* __u8 params[]; */
65205cc4 671};
1da177e4 672
68d75469 673struct sctp_addip_chunk {
922dbc5b 674 struct sctp_chunkhdr chunk_hdr;
65205cc4 675 struct sctp_addiphdr addip_hdr;
68d75469 676};
1da177e4 677
f7b0e93b
VY
678/* AUTH
679 * Section 4.1 Authentication Chunk (AUTH)
680 *
681 * This chunk is used to hold the result of the HMAC calculation.
682 *
683 * 0 1 2 3
684 * 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
685 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
686 * | Type = 0x0F | Flags=0 | Length |
687 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
688 * | Shared Key Identifier | HMAC Identifier |
689 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
690 * | |
691 * \ HMAC /
692 * / \
693 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
694 *
695 * Type: 1 byte (unsigned integer)
696 * This value MUST be set to 0x0F for all AUTH-chunks.
697 *
698 * Flags: 1 byte (unsigned integer)
699 * Set to zero on transmit and ignored on receipt.
700 *
701 * Length: 2 bytes (unsigned integer)
702 * This value holds the length of the HMAC in bytes plus 8.
703 *
704 * Shared Key Identifier: 2 bytes (unsigned integer)
705 * This value describes which endpoint pair shared key is used.
706 *
707 * HMAC Identifier: 2 bytes (unsigned integer)
708 * This value describes which message digest is being used. Table 2
709 * shows the currently defined values.
710 *
711 * The following Table 2 shows the currently defined values for HMAC
712 * identifiers.
713 *
714 * +-----------------+--------------------------+
715 * | HMAC Identifier | Message Digest Algorithm |
716 * +-----------------+--------------------------+
717 * | 0 | Reserved |
718 * | 1 | SHA-1 defined in [8] |
719 * | 2 | Reserved |
720 * | 3 | SHA-256 defined in [8] |
721 * +-----------------+--------------------------+
722 *
723 *
724 * HMAC: n bytes (unsigned integer) This hold the result of the HMAC
725 * calculation.
726 */
96f7ef4d 727struct sctp_authhdr {
f7b0e93b
VY
728 __be16 shkey_id;
729 __be16 hmac_id;
2ab399a9 730 /* __u8 hmac[]; */
96f7ef4d 731};
f7b0e93b 732
bb96dec7 733struct sctp_auth_chunk {
922dbc5b 734 struct sctp_chunkhdr chunk_hdr;
96f7ef4d 735 struct sctp_authhdr auth_hdr;
bb96dec7 736};
f7b0e93b 737
52c52a61
XL
738struct sctp_infox {
739 struct sctp_info *sctpinfo;
740 struct sctp_association *asoc;
741};
742
cc16f00f 743struct sctp_reconf_chunk {
922dbc5b 744 struct sctp_chunkhdr chunk_hdr;
add7370a 745 /* __u8 params[]; */
9faf1c0f 746};
cc16f00f
XL
747
748struct sctp_strreset_outreq {
3c918704 749 struct sctp_paramhdr param_hdr;
1da4fc97
XL
750 __be32 request_seq;
751 __be32 response_seq;
752 __be32 send_reset_at_tsn;
af6bb61c 753 __be16 list_of_streams[];
9faf1c0f 754};
cc16f00f
XL
755
756struct sctp_strreset_inreq {
3c918704 757 struct sctp_paramhdr param_hdr;
1da4fc97 758 __be32 request_seq;
af6bb61c 759 __be16 list_of_streams[];
9faf1c0f 760};
cc16f00f 761
c56480a1 762struct sctp_strreset_tsnreq {
3c918704 763 struct sctp_paramhdr param_hdr;
1da4fc97 764 __be32 request_seq;
c56480a1
XL
765};
766
78098117 767struct sctp_strreset_addstrm {
3c918704 768 struct sctp_paramhdr param_hdr;
1da4fc97
XL
769 __be32 request_seq;
770 __be16 number_of_streams;
771 __be16 reserved;
78098117
XL
772};
773
bd4b9f8b
XL
774enum {
775 SCTP_STRRESET_NOTHING_TO_DO = 0x00,
776 SCTP_STRRESET_PERFORMED = 0x01,
777 SCTP_STRRESET_DENIED = 0x02,
778 SCTP_STRRESET_ERR_WRONG_SSN = 0x03,
779 SCTP_STRRESET_ERR_IN_PROGRESS = 0x04,
780 SCTP_STRRESET_ERR_BAD_SEQNO = 0x05,
781 SCTP_STRRESET_IN_PROGRESS = 0x06,
782};
783
784struct sctp_strreset_resp {
3c918704 785 struct sctp_paramhdr param_hdr;
1da4fc97
XL
786 __be32 response_seq;
787 __be32 result;
bd4b9f8b
XL
788};
789
790struct sctp_strreset_resptsn {
3c918704 791 struct sctp_paramhdr param_hdr;
1da4fc97
XL
792 __be32 response_seq;
793 __be32 result;
794 __be32 senders_next_tsn;
795 __be32 receivers_next_tsn;
bd4b9f8b
XL
796};
797
8a9c58d2
XL
798enum {
799 SCTP_DSCP_SET_MASK = 0x1,
800 SCTP_DSCP_VAL_MASK = 0xfc,
801 SCTP_FLOWLABEL_SET_MASK = 0x100000,
802 SCTP_FLOWLABEL_VAL_MASK = 0xfffff
803};
804
e38d86b3
XL
805/* UDP Encapsulation
806 * draft-tuexen-tsvwg-sctp-udp-encaps-cons-03.html#section-4-4
807 *
808 * The error cause indicating an "Restart of an Association with
809 * New Encapsulation Port"
810 *
811 * 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
812 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
813 * | Cause Code = 14 | Cause Length = 8 |
814 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
815 * | Current Encapsulation Port | New Encapsulation Port |
816 * +-------------------------------+-------------------------------+
817 */
818struct sctp_new_encap_port_hdr {
819 __be16 cur_port;
820 __be16 new_port;
821};
822
647541ea
XL
823/* Round an int up to the next multiple of 4. */
824#define SCTP_PAD4(s) (((s)+3)&~3)
825/* Truncate to the previous multiple of 4. */
826#define SCTP_TRUNC4(s) ((s)&~3)
827
1da177e4 828#endif /* __LINUX_SCTP_H__ */