// SCTP Conformance Test Suite Implementation // (C) Copyright Fujitsu Ltd. 2008, 2009 // // This file is part of the SCTP Conformance Test Suite implementation. // // The SCTP Conformance Test Suite implementation is free software; // you can redistribute it and/or modify it under the terms of // the GNU General Public License version 2 as published by // the Free Software Foundation. // // The SCTP Conformance Test Suite implementation is distributed in the // hope that it will be useful, but WITHOUT ANY WARRANTY; without even // the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR // PURPOSE. See the GNU General Public License for more details. // // You should have received a copy of the GNU General Public License // along with GNU CC; see the file COPYING. If not, write to // the Free Software Foundation, 59 Temple Place - Suite 330, // Boston, MA 02111-1307, USA. // // Please send any bug reports or fixes you make to the // email address(es): // networktest sctp // // Or submit a bug report through the following website: // http://networktest.sourceforge.net/ // // Written or modified by: // Hiroaki Kago // Wei Yongjun // // Any bugs reported given to us we will try to fix... any fixes shared will // be incorporated into the next SCTP release. // #define NO_STD_SND_CHUNK_INIT_ACK #include "../common/STD_PKT_COMMON.def" #define PMTU 1280 #if (ENABLE_IPV6 == 0) FEM_icmp4_destination_unreachable( icmp_pkt_too_big, _HETHER_tn2nut, { _SRC(v4(SCTP4_TN_NET0_ADDR)); _DST(v4(SCTP4_NUT_NET0_ADDR)); }, { Code = 4; Unused = PMTU; payload = errdata; } ) Payload errdata { data = left(_PACKET_IPV4_NAME(sctp_chunk_data_big), 64); } FEM_hdr_ipv4_exth( sctp_chunk_data_frag_1st, _HETHER_nut2tn, { Protocol = 132; FragmentOffset = 0; DF = 0; MF = 1; Identifier = any; _SRC(v4(SCTP4_NUT_NET0_ADDR)); _DST(v4(SCTP4_TN_NET0_ADDR)); }, { header = _HDR_IPV4_NAME(sctp_chunk_data_frag_1st); upper = payload_1st; } ) Payload payload_1st { data = substr(_PACKET_IPV4_NAME(sctp_chunk_data_big), 20, PMTU - 24); } FEM_hdr_ipv4_exth( sctp_chunk_data_frag_2nd, _HETHER_nut2tn, { Protocol = 132; FragmentOffset = PMTU / 8 - 3; DF = 0; MF = 0; Identifier = any; _SRC(v4(SCTP4_NUT_NET0_ADDR)); _DST(v4(SCTP4_TN_NET0_ADDR)); }, { header = _HDR_IPV4_NAME(sctp_chunk_data_frag_2nd); upper = payload_2nd; } ) Payload payload_2nd { data = right(_PACKET_IPV4_NAME(sctp_chunk_data_big), PMTU - 4); } #else FEM_icmp6_packet_too_big ( icmp_pkt_too_big, _HETHER_tn2nut, { _SRC(SCTP6_TN_NET0_ADDR); _DST(SCTP6_NUT_NET0_ADDR); }, { MTU = PMTU; payload = errdata; } ) Payload errdata { data = left(_PACKET_IPV6_NAME(sctp_chunk_data_big), 64); } FEM_hdr_ipv6_exth( sctp_chunk_data_frag_1st, _HETHER_nut2tn, { _SRC(SCTP6_NUT_NET0_ADDR); _DST(SCTP6_TN_NET0_ADDR); }, { header = _HDR_IPV6_NAME(sctp_chunk_data_frag_1st); exthdr = frag_1st; upper = payload_1st; } ) Hdr_Fragment frag_1st { NextHeader = 132; FragmentOffset = 0; MFlag = 1; Identification = any; } Payload payload_1st { data = substr(_PACKET_IPV6_NAME(sctp_chunk_data_big), 40, PMTU - 48); } FEM_hdr_ipv6_exth( sctp_chunk_data_frag_2nd, _HETHER_nut2tn, { _SRC(SCTP6_NUT_NET0_ADDR); _DST(SCTP6_TN_NET0_ADDR); }, { header = _HDR_IPV6_NAME(sctp_chunk_data_frag_2nd); exthdr = frag_2nd; upper = payload_2nd; } ) Hdr_Fragment frag_2nd { NextHeader = 132; FragmentOffset = PMTU / 8 - 6; MFlag = 0; Identification = any; } Payload payload_2nd { data = right(_PACKET_IPV6_NAME(sctp_chunk_data_big), PMTU - 8); } #endif // // SCTP CHUNK_INIT_ACK // PKG_SCTP_SHORT_SEND( sctp_chunk_init_ack_snd, { chunk = chunk_init_ack_snd; } ) CHUNK_INIT_ACK chunk_init_ack_snd { InitiateTag = INITTAG; AdvRecvWindow = ARWND; NumOfOutbound = OS; NumOfInbound = MIS; TSN = 8; Param = cookie; Param = addrs; Param = addrs2; } StaleCookie cookie { #ifdef COOKIE Cookie = COOKIE; #else Cookie = COOKIE_VALUE; #endif } #if (ENABLE_IPV6 == 0) IPv4Address addrs { Address = v4(SCTP4_TN_NET0_ADDR); } IPv4Address addrs2 { Address = v4(SCTP4_TN_NET1_ADDR); } #else IPv6Address addrs { Address = SCTP6_TN_NET0_ADDR; } IPv6Address addrs2 { Address = SCTP6_TN_NET1_ADDR; } #endif /* #if (ENABLE_IPV6 == 0) */ // // SCTP CHUNK_DATA // PKG_SCTP_SHORT_RECV( sctp_chunk_data_big, { chunk = chunk_data_big; } ) CHUNK_DATA chunk_data_big { UFlag = 0; #ifdef SACK TSN = SACK; #else TSN = any; #endif Identifier = 0; SequenceNumber = 0; #ifdef PROTO Protocol = PROTO; #else Protocol = any; #endif payload = data_big; } Payload data_big { #if ENABLE_IPV6 data = left(data1500, 1432 - 1); #else data = left(data1500, 1452 - 1); #endif data = repeat(0x00, 1); } // // SCTP CHUNK_DATA // PKG_SCTP_NORM_RECV( sctp_chunk_data_big_link1, { _SRC(SCTP_NUT_NET0_ADDR); _DST(SCTP_TN_NET1_ADDR); } , { chunk = chunk_data_big; } ) // // SCTP CHUNK_HEARTBEAT // PKG_SCTP_NORM_RECV( sctp_chunk_heartbeat, { _SRC(SCTP_NUT_NET0_ADDR); _DST(SCTP_TN_NET1_ADDR); }, { chunk = chunk_heartbeat; } ) CHUNK_HEARTBEAT chunk_heartbeat { Information = any; } // // SCTP CHUNK_HEARTBEAT_ACK // PKG_SCTP_NORM_SEND( sctp_chunk_heartbeat_ack, { _SRC(SCTP_TN_NET1_ADDR); _DST(SCTP_NUT_NET0_ADDR); }, { chunk = chunk_heartbeat_ack; } ) CHUNK_HEARTBEAT_ACK chunk_heartbeat_ack { Information = heartbeat_info; } HeartbeatInfo heartbeat_info { #ifdef HBINFO Data = hexstr(HBINFO); #endif }