Merge tag 'wireless-drivers-next-for-davem-2019-06-26' of git://git.kernel.org/pub...
[linux-block.git] / include / linux / sctp.h
CommitLineData
47505b8b 1/* SPDX-License-Identifier: GPL-2.0-or-later */
1da177e4
LT
2/* SCTP kernel reference Implementation
3 * (C) Copyright IBM Corp. 2001, 2004
4 * Copyright (c) 1999-2000 Cisco, Inc.
5 * Copyright (c) 1999-2001 Motorola, Inc.
6 * Copyright (c) 2001 Intel Corp.
7 * Copyright (c) 2001 Nokia, Inc.
8 * Copyright (c) 2001 La Monte H.P. Yarroll
9 *
10 * This file is part of the SCTP kernel reference Implementation
11 *
12 * Various protocol defined structures.
13 *
1da177e4
LT
14 * Please send any bug reports or fixes you make to the
15 * email address(es):
31956660 16 * lksctp developers <linux-sctp@vger.kernel.org>
1da177e4
LT
17 *
18 * Or submit a bug report through the following website:
19 * http://www.sf.net/projects/lksctp
20 *
21 * Written or modified by:
22 * La Monte H.P. Yarroll <piggy@acm.org>
23 * Karl Knutson <karl@athena.chicago.il.us>
24 * Jon Grimm <jgrimm@us.ibm.com>
25 * Xingang Guo <xingang.guo@intel.com>
26 * randall@sctp.chicago.il.us
27 * kmorneau@cisco.com
28 * qxie1@email.mot.com
29 * Sridhar Samudrala <sri@us.ibm.com>
30 * Kevin Gao <kevin.gao@intel.com>
31 *
32 * Any bugs reported given to us we will try to fix... any fixes shared will
33 * be incorporated into the next SCTP release.
34 */
35#ifndef __LINUX_SCTP_H__
36#define __LINUX_SCTP_H__
37
38#include <linux/in.h> /* We need in_addr. */
39#include <linux/in6.h> /* We need in6_addr. */
1b866434 40#include <linux/skbuff.h>
1da177e4 41
1b866434 42#include <uapi/linux/sctp.h>
1da177e4
LT
43
44/* Section 3.1. SCTP Common Header Format */
ae146d9b 45struct sctphdr {
f3ffaf14
AV
46 __be16 source;
47 __be16 dest;
48 __be32 vtag;
4458f04c 49 __le32 checksum;
ae146d9b 50};
1da177e4 51
2c0fd387
ACM
52static inline struct sctphdr *sctp_hdr(const struct sk_buff *skb)
53{
9c70220b 54 return (struct sctphdr *)skb_transport_header(skb);
2c0fd387 55}
2c0fd387 56
1da177e4 57/* Section 3.2. Chunk Field Descriptions. */
922dbc5b 58struct sctp_chunkhdr {
1da177e4
LT
59 __u8 type;
60 __u8 flags;
f3ffaf14 61 __be16 length;
922dbc5b 62};
1da177e4
LT
63
64
65/* Section 3.2. Chunk Type Values.
66 * [Chunk Type] identifies the type of information contained in the Chunk
67 * Value field. It takes a value from 0 to 254. The value of 255 is
68 * reserved for future use as an extension field.
69 */
6d85e68f 70enum sctp_cid {
1da177e4
LT
71 SCTP_CID_DATA = 0,
72 SCTP_CID_INIT = 1,
73 SCTP_CID_INIT_ACK = 2,
74 SCTP_CID_SACK = 3,
75 SCTP_CID_HEARTBEAT = 4,
76 SCTP_CID_HEARTBEAT_ACK = 5,
77 SCTP_CID_ABORT = 6,
78 SCTP_CID_SHUTDOWN = 7,
79 SCTP_CID_SHUTDOWN_ACK = 8,
80 SCTP_CID_ERROR = 9,
81 SCTP_CID_COOKIE_ECHO = 10,
82 SCTP_CID_COOKIE_ACK = 11,
83 SCTP_CID_ECN_ECNE = 12,
84 SCTP_CID_ECN_CWR = 13,
85 SCTP_CID_SHUTDOWN_COMPLETE = 14,
86
f7b0e93b
VY
87 /* AUTH Extension Section 4.1 */
88 SCTP_CID_AUTH = 0x0F,
89
96b120b3
XL
90 /* sctp ndata 5.1. I-DATA */
91 SCTP_CID_I_DATA = 0x40,
92
1da177e4
LT
93 /* PR-SCTP Sec 3.2 */
94 SCTP_CID_FWD_TSN = 0xC0,
95
96 /* Use hex, as defined in ADDIP sec. 3.1 */
97 SCTP_CID_ASCONF = 0xC1,
2d07a49a 98 SCTP_CID_I_FWD_TSN = 0xC2,
1da177e4 99 SCTP_CID_ASCONF_ACK = 0x80,
cc16f00f 100 SCTP_CID_RECONF = 0x82,
6d85e68f 101}; /* enum */
1da177e4
LT
102
103
104/* Section 3.2
105 * Chunk Types are encoded such that the highest-order two bits specify
106 * the action that must be taken if the processing endpoint does not
107 * recognize the Chunk Type.
108 */
ec431c2c 109enum {
1da177e4
LT
110 SCTP_CID_ACTION_DISCARD = 0x00,
111 SCTP_CID_ACTION_DISCARD_ERR = 0x40,
112 SCTP_CID_ACTION_SKIP = 0x80,
113 SCTP_CID_ACTION_SKIP_ERR = 0xc0,
ec431c2c 114};
1da177e4
LT
115
116enum { SCTP_CID_ACTION_MASK = 0xc0, };
117
118/* This flag is used in Chunk Flags for ABORT and SHUTDOWN COMPLETE.
119 *
120 * 3.3.7 Abort Association (ABORT) (6):
121 * The T bit is set to 0 if the sender had a TCB that it destroyed.
122 * If the sender did not have a TCB it should set this bit to 1.
123 */
124enum { SCTP_CHUNK_FLAG_T = 0x01 };
125
126/*
127 * Set the T bit
128 *
129 * 0 1 2 3
130 * 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
131 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
132 * | Type = 14 |Reserved |T| Length = 4 |
133 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
134 *
135 * Chunk Flags: 8 bits
136 *
137 * Reserved: 7 bits
138 * Set to 0 on transmit and ignored on receipt.
139 *
140 * T bit: 1 bit
141 * The T bit is set to 0 if the sender had a TCB that it destroyed. If
142 * the sender did NOT have a TCB it should set this bit to 1.
143 *
144 * Note: Special rules apply to this chunk for verification, please
145 * see Section 8.5.1 for details.
146 */
147
148#define sctp_test_T_bit(c) ((c)->chunk_hdr->flags & SCTP_CHUNK_FLAG_T)
149
150/* RFC 2960
151 * Section 3.2.1 Optional/Variable-length Parmaeter Format.
152 */
153
3c918704 154struct sctp_paramhdr {
f3ffaf14
AV
155 __be16 type;
156 __be16 length;
3c918704 157};
1da177e4 158
34b4e29b 159enum sctp_param {
1da177e4
LT
160
161 /* RFC 2960 Section 3.3.5 */
f3a7c66b 162 SCTP_PARAM_HEARTBEAT_INFO = cpu_to_be16(1),
1da177e4 163 /* RFC 2960 Section 3.3.2.1 */
f3a7c66b
HH
164 SCTP_PARAM_IPV4_ADDRESS = cpu_to_be16(5),
165 SCTP_PARAM_IPV6_ADDRESS = cpu_to_be16(6),
166 SCTP_PARAM_STATE_COOKIE = cpu_to_be16(7),
167 SCTP_PARAM_UNRECOGNIZED_PARAMETERS = cpu_to_be16(8),
168 SCTP_PARAM_COOKIE_PRESERVATIVE = cpu_to_be16(9),
169 SCTP_PARAM_HOST_NAME_ADDRESS = cpu_to_be16(11),
170 SCTP_PARAM_SUPPORTED_ADDRESS_TYPES = cpu_to_be16(12),
171 SCTP_PARAM_ECN_CAPABLE = cpu_to_be16(0x8000),
1da177e4 172
f7b0e93b 173 /* AUTH Extension Section 3 */
f3a7c66b
HH
174 SCTP_PARAM_RANDOM = cpu_to_be16(0x8002),
175 SCTP_PARAM_CHUNKS = cpu_to_be16(0x8003),
176 SCTP_PARAM_HMAC_ALGO = cpu_to_be16(0x8004),
f7b0e93b 177
131a47e3 178 /* Add-IP: Supported Extensions, Section 4.2 */
f3a7c66b 179 SCTP_PARAM_SUPPORTED_EXT = cpu_to_be16(0x8008),
131a47e3 180
1da177e4 181 /* PR-SCTP Sec 3.1 */
f3a7c66b 182 SCTP_PARAM_FWD_TSN_SUPPORT = cpu_to_be16(0xc000),
1da177e4
LT
183
184 /* Add-IP Extension. Section 3.2 */
f3a7c66b
HH
185 SCTP_PARAM_ADD_IP = cpu_to_be16(0xc001),
186 SCTP_PARAM_DEL_IP = cpu_to_be16(0xc002),
187 SCTP_PARAM_ERR_CAUSE = cpu_to_be16(0xc003),
188 SCTP_PARAM_SET_PRIMARY = cpu_to_be16(0xc004),
189 SCTP_PARAM_SUCCESS_REPORT = cpu_to_be16(0xc005),
190 SCTP_PARAM_ADAPTATION_LAYER_IND = cpu_to_be16(0xc006),
1da177e4 191
cc16f00f
XL
192 /* RE-CONFIG. Section 4 */
193 SCTP_PARAM_RESET_OUT_REQUEST = cpu_to_be16(0x000d),
194 SCTP_PARAM_RESET_IN_REQUEST = cpu_to_be16(0x000e),
195 SCTP_PARAM_RESET_TSN_REQUEST = cpu_to_be16(0x000f),
196 SCTP_PARAM_RESET_RESPONSE = cpu_to_be16(0x0010),
197 SCTP_PARAM_RESET_ADD_OUT_STREAMS = cpu_to_be16(0x0011),
198 SCTP_PARAM_RESET_ADD_IN_STREAMS = cpu_to_be16(0x0012),
34b4e29b 199}; /* enum */
1da177e4
LT
200
201
202/* RFC 2960 Section 3.2.1
203 * The Parameter Types are encoded such that the highest-order two bits
204 * specify the action that must be taken if the processing endpoint does
205 * not recognize the Parameter Type.
206 *
207 */
0664ed43 208enum {
f3a7c66b
HH
209 SCTP_PARAM_ACTION_DISCARD = cpu_to_be16(0x0000),
210 SCTP_PARAM_ACTION_DISCARD_ERR = cpu_to_be16(0x4000),
211 SCTP_PARAM_ACTION_SKIP = cpu_to_be16(0x8000),
212 SCTP_PARAM_ACTION_SKIP_ERR = cpu_to_be16(0xc000),
0664ed43 213};
1da177e4 214
f3a7c66b 215enum { SCTP_PARAM_ACTION_MASK = cpu_to_be16(0xc000), };
1da177e4
LT
216
217/* RFC 2960 Section 3.3.1 Payload Data (DATA) (0) */
218
3583df1a 219struct sctp_datahdr {
f3ffaf14
AV
220 __be32 tsn;
221 __be16 stream;
222 __be16 ssn;
978aa047 223 __u32 ppid;
1da177e4 224 __u8 payload[0];
3583df1a 225};
1da177e4 226
9f8d3147 227struct sctp_data_chunk {
922dbc5b 228 struct sctp_chunkhdr chunk_hdr;
3583df1a 229 struct sctp_datahdr data_hdr;
9f8d3147 230};
1da177e4 231
ad05a7a0
XL
232struct sctp_idatahdr {
233 __be32 tsn;
234 __be16 stream;
235 __be16 reserved;
236 __be32 mid;
237 union {
238 __u32 ppid;
239 __be32 fsn;
240 };
241 __u8 payload[0];
242};
243
244struct sctp_idata_chunk {
245 struct sctp_chunkhdr chunk_hdr;
246 struct sctp_idatahdr data_hdr;
247};
248
1da177e4
LT
249/* DATA Chuck Specific Flags */
250enum {
251 SCTP_DATA_MIDDLE_FRAG = 0x00,
252 SCTP_DATA_LAST_FRAG = 0x01,
253 SCTP_DATA_FIRST_FRAG = 0x02,
254 SCTP_DATA_NOT_FRAG = 0x03,
255 SCTP_DATA_UNORDERED = 0x04,
475cba4e 256 SCTP_DATA_SACK_IMM = 0x08,
1da177e4
LT
257};
258enum { SCTP_DATA_FRAG_MASK = 0x03, };
259
260
261/* RFC 2960 Section 3.3.2 Initiation (INIT) (1)
262 *
263 * This chunk is used to initiate a SCTP association between two
264 * endpoints.
265 */
4ae70c08 266struct sctp_inithdr {
f3ffaf14
AV
267 __be32 init_tag;
268 __be32 a_rwnd;
269 __be16 num_outbound_streams;
270 __be16 num_inbound_streams;
271 __be32 initial_tsn;
1da177e4 272 __u8 params[0];
4ae70c08 273};
1da177e4 274
01a992be 275struct sctp_init_chunk {
922dbc5b 276 struct sctp_chunkhdr chunk_hdr;
4ae70c08 277 struct sctp_inithdr init_hdr;
01a992be 278};
1da177e4
LT
279
280
281/* Section 3.3.2.1. IPv4 Address Parameter (5) */
a38905e6 282struct sctp_ipv4addr_param {
3c918704 283 struct sctp_paramhdr param_hdr;
a38905e6
XL
284 struct in_addr addr;
285};
1da177e4
LT
286
287/* Section 3.3.2.1. IPv6 Address Parameter (6) */
00987cc0 288struct sctp_ipv6addr_param {
3c918704 289 struct sctp_paramhdr param_hdr;
1da177e4 290 struct in6_addr addr;
00987cc0 291};
1da177e4
LT
292
293/* Section 3.3.2.1 Cookie Preservative (9) */
365ddb65 294struct sctp_cookie_preserve_param {
3c918704 295 struct sctp_paramhdr param_hdr;
365ddb65
XL
296 __be32 lifespan_increment;
297};
1da177e4
LT
298
299/* Section 3.3.2.1 Host Name Address (11) */
df9af006 300struct sctp_hostname_param {
3c918704 301 struct sctp_paramhdr param_hdr;
1da177e4 302 uint8_t hostname[0];
df9af006 303};
1da177e4
LT
304
305/* Section 3.3.2.1 Supported Address Types (12) */
e925d506 306struct sctp_supported_addrs_param {
3c918704 307 struct sctp_paramhdr param_hdr;
f3ffaf14 308 __be16 types[0];
e925d506 309};
1da177e4 310
0f3fffd8 311/* ADDIP Section 3.2.6 Adaptation Layer Indication */
85f6bd24 312struct sctp_adaptation_ind_param {
1da177e4 313 struct sctp_paramhdr param_hdr;
0f3fffd8 314 __be32 adaptation_ind;
85f6bd24 315};
1da177e4 316
131a47e3 317/* ADDIP Section 4.2.7 Supported Extensions Parameter */
15328d9f 318struct sctp_supported_ext_param {
131a47e3
VY
319 struct sctp_paramhdr param_hdr;
320 __u8 chunks[0];
15328d9f 321};
131a47e3 322
f7b0e93b 323/* AUTH Section 3.1 Random */
b02db702 324struct sctp_random_param {
3c918704 325 struct sctp_paramhdr param_hdr;
f7b0e93b 326 __u8 random_val[0];
b02db702 327};
f7b0e93b
VY
328
329/* AUTH Section 3.2 Chunk List */
a762a9d9 330struct sctp_chunks_param {
3c918704 331 struct sctp_paramhdr param_hdr;
f7b0e93b 332 __u8 chunks[0];
a762a9d9 333};
f7b0e93b
VY
334
335/* AUTH Section 3.3 HMAC Algorithm */
1474774a 336struct sctp_hmac_algo_param {
3c918704 337 struct sctp_paramhdr param_hdr;
f7b0e93b 338 __be16 hmac_ids[0];
1474774a 339};
f7b0e93b 340
1da177e4
LT
341/* RFC 2960. Section 3.3.3 Initiation Acknowledgement (INIT ACK) (2):
342 * The INIT ACK chunk is used to acknowledge the initiation of an SCTP
343 * association.
344 */
cb1844c4
XL
345struct sctp_initack_chunk {
346 struct sctp_chunkhdr chunk_hdr;
347 struct sctp_inithdr init_hdr;
348};
1da177e4
LT
349
350/* Section 3.3.3.1 State Cookie (7) */
f48ef4c7 351struct sctp_cookie_param {
3c918704 352 struct sctp_paramhdr p;
1da177e4 353 __u8 body[0];
f48ef4c7 354};
1da177e4
LT
355
356/* Section 3.3.3.1 Unrecognized Parameters (8) */
62e6b7e4 357struct sctp_unrecognized_param {
3c918704
XL
358 struct sctp_paramhdr param_hdr;
359 struct sctp_paramhdr unrecognized;
62e6b7e4 360};
1da177e4
LT
361
362
363
364/*
365 * 3.3.4 Selective Acknowledgement (SACK) (3):
366 *
367 * This chunk is sent to the peer endpoint to acknowledge received DATA
368 * chunks and to inform the peer endpoint of gaps in the received
369 * subsequences of DATA chunks as represented by their TSNs.
370 */
371
fe9a0fe7 372struct sctp_gap_ack_block {
f3ffaf14
AV
373 __be16 start;
374 __be16 end;
fe9a0fe7 375};
1da177e4 376
afd93b7b 377union sctp_sack_variable {
fe9a0fe7 378 struct sctp_gap_ack_block gab;
9b415156 379 __be32 dup;
afd93b7b 380};
1da177e4 381
78731085 382struct sctp_sackhdr {
f3ffaf14
AV
383 __be32 cum_tsn_ack;
384 __be32 a_rwnd;
385 __be16 num_gap_ack_blocks;
386 __be16 num_dup_tsns;
afd93b7b 387 union sctp_sack_variable variable[0];
78731085 388};
1da177e4 389
d4d6c614 390struct sctp_sack_chunk {
922dbc5b 391 struct sctp_chunkhdr chunk_hdr;
78731085 392 struct sctp_sackhdr sack_hdr;
d4d6c614 393};
1da177e4
LT
394
395
396/* RFC 2960. Section 3.3.5 Heartbeat Request (HEARTBEAT) (4):
397 *
398 * An endpoint should send this chunk to its peer endpoint to probe the
399 * reachability of a particular destination transport address defined in
400 * the present association.
401 */
402
4d2dcdf4 403struct sctp_heartbeathdr {
3c918704 404 struct sctp_paramhdr info;
4d2dcdf4 405};
1da177e4 406
38c00f74 407struct sctp_heartbeat_chunk {
922dbc5b 408 struct sctp_chunkhdr chunk_hdr;
4d2dcdf4 409 struct sctp_heartbeathdr hb_hdr;
38c00f74 410};
1da177e4
LT
411
412
413/* For the abort and shutdown ACK we must carry the init tag in the
414 * common header. Just the common header is all that is needed with a
415 * chunk descriptor.
416 */
441ae65a 417struct sctp_abort_chunk {
922dbc5b 418 struct sctp_chunkhdr uh;
441ae65a 419};
1da177e4
LT
420
421
422/* For the graceful shutdown we must carry the tag (in common header)
423 * and the highest consecutive acking value.
424 */
e61e4055 425struct sctp_shutdownhdr {
f3ffaf14 426 __be32 cum_tsn_ack;
e61e4055 427};
1da177e4 428
ac23e681 429struct sctp_shutdown_chunk {
922dbc5b 430 struct sctp_chunkhdr chunk_hdr;
e61e4055 431 struct sctp_shutdownhdr shutdown_hdr;
85c727b5 432};
1da177e4
LT
433
434/* RFC 2960. Section 3.3.10 Operation Error (ERROR) (9) */
435
d8238d9d 436struct sctp_errhdr {
f3ffaf14
AV
437 __be16 cause;
438 __be16 length;
1da177e4 439 __u8 variable[0];
d8238d9d 440};
1da177e4 441
87caeba7 442struct sctp_operr_chunk {
922dbc5b 443 struct sctp_chunkhdr chunk_hdr;
d8238d9d 444 struct sctp_errhdr err_hdr;
87caeba7 445};
1da177e4
LT
446
447/* RFC 2960 3.3.10 - Operation Error
448 *
449 * Cause Code: 16 bits (unsigned integer)
450 *
451 * Defines the type of error conditions being reported.
452 * Cause Code
453 * Value Cause Code
454 * --------- ----------------
455 * 1 Invalid Stream Identifier
456 * 2 Missing Mandatory Parameter
457 * 3 Stale Cookie Error
458 * 4 Out of Resource
459 * 5 Unresolvable Address
460 * 6 Unrecognized Chunk Type
461 * 7 Invalid Mandatory Parameter
462 * 8 Unrecognized Parameters
463 * 9 No User Data
464 * 10 Cookie Received While Shutting Down
465 */
2a493216 466enum sctp_error {
1da177e4 467
f3a7c66b
HH
468 SCTP_ERROR_NO_ERROR = cpu_to_be16(0x00),
469 SCTP_ERROR_INV_STRM = cpu_to_be16(0x01),
470 SCTP_ERROR_MISS_PARAM = cpu_to_be16(0x02),
471 SCTP_ERROR_STALE_COOKIE = cpu_to_be16(0x03),
472 SCTP_ERROR_NO_RESOURCE = cpu_to_be16(0x04),
473 SCTP_ERROR_DNS_FAILED = cpu_to_be16(0x05),
474 SCTP_ERROR_UNKNOWN_CHUNK = cpu_to_be16(0x06),
475 SCTP_ERROR_INV_PARAM = cpu_to_be16(0x07),
476 SCTP_ERROR_UNKNOWN_PARAM = cpu_to_be16(0x08),
477 SCTP_ERROR_NO_DATA = cpu_to_be16(0x09),
478 SCTP_ERROR_COOKIE_IN_SHUTDOWN = cpu_to_be16(0x0a),
1da177e4
LT
479
480
481 /* SCTP Implementation Guide:
482 * 11 Restart of an association with new addresses
483 * 12 User Initiated Abort
484 * 13 Protocol Violation
485 */
486
f3a7c66b
HH
487 SCTP_ERROR_RESTART = cpu_to_be16(0x0b),
488 SCTP_ERROR_USER_ABORT = cpu_to_be16(0x0c),
489 SCTP_ERROR_PROTO_VIOLATION = cpu_to_be16(0x0d),
1da177e4
LT
490
491 /* ADDIP Section 3.3 New Error Causes
492 *
493 * Four new Error Causes are added to the SCTP Operational Errors,
494 * primarily for use in the ASCONF-ACK chunk.
495 *
496 * Value Cause Code
497 * --------- ----------------
a84db794
WY
498 * 0x00A0 Request to Delete Last Remaining IP Address.
499 * 0x00A1 Operation Refused Due to Resource Shortage.
500 * 0x00A2 Request to Delete Source IP Address.
501 * 0x00A3 Association Aborted due to illegal ASCONF-ACK
502 * 0x00A4 Request refused - no authorization.
1da177e4 503 */
a84db794
WY
504 SCTP_ERROR_DEL_LAST_IP = cpu_to_be16(0x00A0),
505 SCTP_ERROR_RSRC_LOW = cpu_to_be16(0x00A1),
506 SCTP_ERROR_DEL_SRC_IP = cpu_to_be16(0x00A2),
507 SCTP_ERROR_ASCONF_ACK = cpu_to_be16(0x00A3),
508 SCTP_ERROR_REQ_REFUSED = cpu_to_be16(0x00A4),
f7b0e93b
VY
509
510 /* AUTH Section 4. New Error Cause
511 *
512 * This section defines a new error cause that will be sent if an AUTH
513 * chunk is received with an unsupported HMAC identifier.
514 * illustrates the new error cause.
515 *
516 * Cause Code Error Cause Name
517 * --------------------------------------------------------------
518 * 0x0105 Unsupported HMAC Identifier
519 */
f3a7c66b 520 SCTP_ERROR_UNSUP_HMAC = cpu_to_be16(0x0105)
2a493216 521};
1da177e4
LT
522
523
524
525/* RFC 2960. Appendix A. Explicit Congestion Notification.
526 * Explicit Congestion Notification Echo (ECNE) (12)
527 */
1fb6d83b 528struct sctp_ecnehdr {
f3ffaf14 529 __be32 lowest_tsn;
1fb6d83b 530};
1da177e4 531
b515fd27 532struct sctp_ecne_chunk {
922dbc5b 533 struct sctp_chunkhdr chunk_hdr;
1fb6d83b 534 struct sctp_ecnehdr ence_hdr;
b515fd27 535};
1da177e4
LT
536
537/* RFC 2960. Appendix A. Explicit Congestion Notification.
538 * Congestion Window Reduced (CWR) (13)
539 */
65f77105 540struct sctp_cwrhdr {
f3ffaf14 541 __be32 lowest_tsn;
65f77105 542};
1da177e4 543
1da177e4
LT
544/* PR-SCTP
545 * 3.2 Forward Cumulative TSN Chunk Definition (FORWARD TSN)
546 *
547 * Forward Cumulative TSN chunk has the following format:
548 *
549 * 0 1 2 3
550 * 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
551 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
552 * | Type = 192 | Flags = 0x00 | Length = Variable |
553 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
554 * | New Cumulative TSN |
555 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
556 * | Stream-1 | Stream Sequence-1 |
557 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
558 * \ /
559 * / \
560 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
561 * | Stream-N | Stream Sequence-N |
562 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
563 *
564 * Chunk Flags:
565 *
566 * Set to all zeros on transmit and ignored on receipt.
567 *
568 * New Cumulative TSN: 32 bit u_int
569 *
570 * This indicates the new cumulative TSN to the data receiver. Upon
571 * the reception of this value, the data receiver MUST consider
572 * any missing TSNs earlier than or equal to this value as received
573 * and stop reporting them as gaps in any subsequent SACKs.
574 *
575 * Stream-N: 16 bit u_int
576 *
577 * This field holds a stream number that was skipped by this
578 * FWD-TSN.
579 *
580 * Stream Sequence-N: 16 bit u_int
581 * This field holds the sequence number associated with the stream
582 * that was skipped. The stream sequence field holds the largest stream
583 * sequence number in this stream being skipped. The receiver of
584 * the FWD-TSN's can use the Stream-N and Stream Sequence-N fields
585 * to enable delivery of any stranded TSN's that remain on the stream
586 * re-ordering queues. This field MUST NOT report TSN's corresponding
587 * to DATA chunk that are marked as unordered. For ordered DATA
588 * chunks this field MUST be filled in.
589 */
590struct sctp_fwdtsn_skip {
f3ffaf14
AV
591 __be16 stream;
592 __be16 ssn;
85c727b5 593};
1da177e4
LT
594
595struct sctp_fwdtsn_hdr {
f3ffaf14 596 __be32 new_cum_tsn;
1da177e4 597 struct sctp_fwdtsn_skip skip[0];
85c727b5 598};
1da177e4
LT
599
600struct sctp_fwdtsn_chunk {
601 struct sctp_chunkhdr chunk_hdr;
602 struct sctp_fwdtsn_hdr fwdtsn_hdr;
85c727b5 603};
1da177e4 604
2d07a49a
XL
605struct sctp_ifwdtsn_skip {
606 __be16 stream;
607 __u8 reserved;
608 __u8 flags;
609 __be32 mid;
610};
611
612struct sctp_ifwdtsn_hdr {
613 __be32 new_cum_tsn;
614 struct sctp_ifwdtsn_skip skip[0];
615};
616
617struct sctp_ifwdtsn_chunk {
618 struct sctp_chunkhdr chunk_hdr;
619 struct sctp_ifwdtsn_hdr fwdtsn_hdr;
620};
1da177e4
LT
621
622/* ADDIP
623 * Section 3.1.1 Address Configuration Change Chunk (ASCONF)
624 *
625 * Serial Number: 32 bits (unsigned integer)
626 * This value represents a Serial Number for the ASCONF Chunk. The
627 * valid range of Serial Number is from 0 to 2^32-1.
628 * Serial Numbers wrap back to 0 after reaching 2^32 -1.
629 *
630 * Address Parameter: 8 or 20 bytes (depending on type)
631 * The address is an address of the sender of the ASCONF chunk,
632 * the address MUST be considered part of the association by the
633 * peer endpoint. This field may be used by the receiver of the
634 * ASCONF to help in finding the association. This parameter MUST
635 * be present in every ASCONF message i.e. it is a mandatory TLV
636 * parameter.
637 *
638 * ASCONF Parameter: TLV format
639 * Each Address configuration change is represented by a TLV
640 * parameter as defined in Section 3.2. One or more requests may
641 * be present in an ASCONF Chunk.
642 *
643 * Section 3.1.2 Address Configuration Acknowledgement Chunk (ASCONF-ACK)
644 *
645 * Serial Number: 32 bits (unsigned integer)
646 * This value represents the Serial Number for the received ASCONF
647 * Chunk that is acknowledged by this chunk. This value is copied
648 * from the received ASCONF Chunk.
649 *
650 * ASCONF Parameter Response: TLV format
651 * The ASCONF Parameter Response is used in the ASCONF-ACK to
652 * report status of ASCONF processing.
653 */
8b32f234
XL
654struct sctp_addip_param {
655 struct sctp_paramhdr param_hdr;
656 __be32 crr_id;
657};
1da177e4 658
65205cc4 659struct sctp_addiphdr {
f3ffaf14 660 __be32 serial;
1da177e4 661 __u8 params[0];
65205cc4 662};
1da177e4 663
68d75469 664struct sctp_addip_chunk {
922dbc5b 665 struct sctp_chunkhdr chunk_hdr;
65205cc4 666 struct sctp_addiphdr addip_hdr;
68d75469 667};
1da177e4 668
f7b0e93b
VY
669/* AUTH
670 * Section 4.1 Authentication Chunk (AUTH)
671 *
672 * This chunk is used to hold the result of the HMAC calculation.
673 *
674 * 0 1 2 3
675 * 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
676 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
677 * | Type = 0x0F | Flags=0 | Length |
678 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
679 * | Shared Key Identifier | HMAC Identifier |
680 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
681 * | |
682 * \ HMAC /
683 * / \
684 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
685 *
686 * Type: 1 byte (unsigned integer)
687 * This value MUST be set to 0x0F for all AUTH-chunks.
688 *
689 * Flags: 1 byte (unsigned integer)
690 * Set to zero on transmit and ignored on receipt.
691 *
692 * Length: 2 bytes (unsigned integer)
693 * This value holds the length of the HMAC in bytes plus 8.
694 *
695 * Shared Key Identifier: 2 bytes (unsigned integer)
696 * This value describes which endpoint pair shared key is used.
697 *
698 * HMAC Identifier: 2 bytes (unsigned integer)
699 * This value describes which message digest is being used. Table 2
700 * shows the currently defined values.
701 *
702 * The following Table 2 shows the currently defined values for HMAC
703 * identifiers.
704 *
705 * +-----------------+--------------------------+
706 * | HMAC Identifier | Message Digest Algorithm |
707 * +-----------------+--------------------------+
708 * | 0 | Reserved |
709 * | 1 | SHA-1 defined in [8] |
710 * | 2 | Reserved |
711 * | 3 | SHA-256 defined in [8] |
712 * +-----------------+--------------------------+
713 *
714 *
715 * HMAC: n bytes (unsigned integer) This hold the result of the HMAC
716 * calculation.
717 */
96f7ef4d 718struct sctp_authhdr {
f7b0e93b
VY
719 __be16 shkey_id;
720 __be16 hmac_id;
721 __u8 hmac[0];
96f7ef4d 722};
f7b0e93b 723
bb96dec7 724struct sctp_auth_chunk {
922dbc5b 725 struct sctp_chunkhdr chunk_hdr;
96f7ef4d 726 struct sctp_authhdr auth_hdr;
bb96dec7 727};
f7b0e93b 728
52c52a61
XL
729struct sctp_infox {
730 struct sctp_info *sctpinfo;
731 struct sctp_association *asoc;
732};
733
cc16f00f 734struct sctp_reconf_chunk {
922dbc5b 735 struct sctp_chunkhdr chunk_hdr;
cc16f00f 736 __u8 params[0];
9faf1c0f 737};
cc16f00f
XL
738
739struct sctp_strreset_outreq {
3c918704 740 struct sctp_paramhdr param_hdr;
1da4fc97
XL
741 __be32 request_seq;
742 __be32 response_seq;
743 __be32 send_reset_at_tsn;
744 __be16 list_of_streams[0];
9faf1c0f 745};
cc16f00f
XL
746
747struct sctp_strreset_inreq {
3c918704 748 struct sctp_paramhdr param_hdr;
1da4fc97
XL
749 __be32 request_seq;
750 __be16 list_of_streams[0];
9faf1c0f 751};
cc16f00f 752
c56480a1 753struct sctp_strreset_tsnreq {
3c918704 754 struct sctp_paramhdr param_hdr;
1da4fc97 755 __be32 request_seq;
c56480a1
XL
756};
757
78098117 758struct sctp_strreset_addstrm {
3c918704 759 struct sctp_paramhdr param_hdr;
1da4fc97
XL
760 __be32 request_seq;
761 __be16 number_of_streams;
762 __be16 reserved;
78098117
XL
763};
764
bd4b9f8b
XL
765enum {
766 SCTP_STRRESET_NOTHING_TO_DO = 0x00,
767 SCTP_STRRESET_PERFORMED = 0x01,
768 SCTP_STRRESET_DENIED = 0x02,
769 SCTP_STRRESET_ERR_WRONG_SSN = 0x03,
770 SCTP_STRRESET_ERR_IN_PROGRESS = 0x04,
771 SCTP_STRRESET_ERR_BAD_SEQNO = 0x05,
772 SCTP_STRRESET_IN_PROGRESS = 0x06,
773};
774
775struct sctp_strreset_resp {
3c918704 776 struct sctp_paramhdr param_hdr;
1da4fc97
XL
777 __be32 response_seq;
778 __be32 result;
bd4b9f8b
XL
779};
780
781struct sctp_strreset_resptsn {
3c918704 782 struct sctp_paramhdr param_hdr;
1da4fc97
XL
783 __be32 response_seq;
784 __be32 result;
785 __be32 senders_next_tsn;
786 __be32 receivers_next_tsn;
bd4b9f8b
XL
787};
788
8a9c58d2
XL
789enum {
790 SCTP_DSCP_SET_MASK = 0x1,
791 SCTP_DSCP_VAL_MASK = 0xfc,
792 SCTP_FLOWLABEL_SET_MASK = 0x100000,
793 SCTP_FLOWLABEL_VAL_MASK = 0xfffff
794};
795
1da177e4 796#endif /* __LINUX_SCTP_H__ */