Title | The HMAC algorithm based on SHA-1 MUST be supported and included in the HMAC-ALGO parameter |
CommandLine | ./HMACAlgoWithoutSha1.seq -pkt ./HMACAlgoWithoutSha1.def -log 17.html -ti The HMAC algorithm based on SHA-1 MUST be supported and included in the HMAC-ALGO parameter |
TestVersion | REL_1_0_0 |
ToolVersion | REL_3_1_0 |
Start | 2009/02/13 13:50:59 |
Tn | .//../etc//tn.def |
Nu | .//../etc//nut.def |
Pkt | ./HMACAlgoWithoutSha1.def |
System | linux-v6 |
TargetName | RHEL5GA |
HostName | FNST |
Type | IPv4 |
13:51:01 | Start |
13:51:01 | Start Capturing Packets (Link0) |
=============== sctpCheckEnv =============== | |
13:51:01 |
vRemote(rcommand.rmt) ``/usr/local/v6eval//bin/linux-v6//rcommand.rmt -t linux-v6 -u root -p goodluck -d ttyS0 -o 1 cmd="killall -9 sctp_test ; killall -9 sctp_darn ; killall -9 sctp_status; checksctp" ''
Connected. [root@RHEL ~]# [root@RHEL ~]# killall -9 sctp_test ; killall -9 sctp_darn ; killall -9 sctp_sta tus; checksctp [1]+ Killed sctp_test -H 192.168.0.21 -P 4566 -T -l -x 1 -X 1 > /tmp/tstcmd.log 2>&1 sctp_darn: no process killed sctp_status: no process killed SCTP supported [root@RHEL ~]# sendMessagesSync: never got killall -9 sctp_test ; killall -9 sctp_darn ; killall -9 sctp_status; checksctp echo $? 0 [~.~. ~. Disconnected. |
============== sctpPingToHost ============== | |
13:51:10 |
vSend(Link0,echo4_request_on_link0) Send Echo Request on Link0 |
13:51:11 | vRecv(Link0,echo4_reply_on_link0 arp_request_on_link0) timeout:5 cntLimit:0 seektime:0 Recv Echo Reply on Link0 |
============== sctpStartServer ============= | |
13:51:11 |
vRemote(rcommandasync.rmt) ``/usr/local/v6eval//bin/linux-v6//rcommandasync.rmt -t linux-v6 -u root -p goodluck -d ttyS0 -o 1 cmd="sctp_test -H 192.168.0.21 -P 4567 -T -l -x 1 -X 1 > /tmp/tstcmd.log 2>&1 &" ''
Connected. [root@RHEL ~]# [root@RHEL ~]# sctp_test ~. Disconnected. |
================ Main Test ================= | |
13:51:15 |
vSend(Link0,sctp_chunk_init_hmac_algo_no_sha1) Send SCTP CHUNK_INIT (without SHA-1 in the HMAC-ALGO parameter) |
13:51:15 | vRecv(Link0,sctp_chunk_abort_no_sha1 arp_request_on_link0 ) timeout:30 cntLimit:0 seektime:0 Recv SCTP CHUNK_ABORT (Protocol Violation) |
OK | |
13:51:15 | End |
Frame_Ether (length:66) | Hdr_Ether (length:14) | | DestinationAddress = 0:c:29:f:17:34 | | SourceAddress = 0:0:0:0:1:0 | | Type = 2048 | Packet_IPv4 (length:52) | | Hdr_IPv4 (length:20) | | | Version = 4 | | | IHL = 5 | | | TypeOfService = 0 | | | TotalLength = 52 | | | Identifier = 0 | | | Reserved = 0 | | | DF = 0 | | | MF = 0 | | | FragmentOffset = 0 | | | TTL = 255 | | | Protocol = 1 | | | HeaderChecksum = 14847 calc(14847) | | | SourceAddress = 192.168.0.100 | | | DestinationAddress = 192.168.0.21 | | ICMPv4_EchoRequest (length:32) | | | Type = 8 | | | Code = 0 | | | Checksum = 50238 calc(50238) | | | Identifier = 65535 | | | SequenceNumber = 1 | | | Payload (length:24) | | | | data = | | | | 4563686f 44617461 4563686f 44617461 4563686f 44617461
Frame_Ether (length:66) | Hdr_Ether (length:14) | | DestinationAddress = 0:0:0:0:1:0 | | SourceAddress = 0:c:29:f:17:34 | | Type = 2048 | Packet_IPv4 (length:52) | | Hdr_IPv4 (length:20) | | | Version = 4 | | | IHL = 5 | | | TypeOfService = 0 | | | TotalLength = 52 | | | Identifier = 22725 | | | Reserved = 0 | | | DF = 0 | | | MF = 0 | | | FragmentOffset = 0 | | | TTL = 64 | | | Protocol = 1 | | | HeaderChecksum = 41018 calc(41018) | | | SourceAddress = 192.168.0.21 | | | DestinationAddress = 192.168.0.100 | | ICMPv4_EchoReply (length:32) | | | Type = 0 | | | Code = 0 | | | Checksum = 52286 calc(52286) | | | Identifier = 65535 | | | SequenceNumber = 1 | | | Payload (length:24) | | | | data = | | | | 4563686f 44617461 4563686f 44617461 4563686f 44617461 ===echo4_reply_on_link0=================================
Frame_Ether (length:74) | Hdr_Ether (length:14) | | DestinationAddress = 0:c:29:f:17:34 | | SourceAddress = 0:0:0:0:1:0 | | Type = 2048 | Packet_IPv4 (length:60) | | Hdr_IPv4 (length:20) | | | Version = 4 | | | IHL = 5 | | | TypeOfService = 0 | | | TotalLength = 60 | | | Identifier = 0 | | | Reserved = 0 | | | DF = 0 | | | MF = 0 | | | FragmentOffset = 0 | | | TTL = 255 | | | Protocol = 132 | | | HeaderChecksum = 14708 calc(14708) | | | SourceAddress = 192.168.0.100 | | | DestinationAddress = 192.168.0.21 | | Upp_SCTP (length:40) | | | Hdr_SCTP (length:12) | | | | SourcePort = 3567 | | | | DestinationPort = 4567 | | | | VerificationTag = 0 | | | | Checksum = 3598010414 calc(3598010414) | | | CHUNK_INIT (length:28) | | | | Type = 1 | | | | Flags = 0 | | | | Length = 28 | | | | InitiateTag = 1 | | | | AdvRecvWindow = 54784 | | | | NumOfOutbound = 100 | | | | NumOfInbound = 65535 | | | | TSN = 100 | | | | RequestedHMACAlgorithm (length:8) | | | | | Type = 32772 | | | | | Length = 8 | | | | | HMACIdentifier = 100 | | | | | HMACIdentifier = 300
Frame_Ether (length:102) | Hdr_Ether (length:14) | | DestinationAddress = 0:0:0:0:1:0 | | SourceAddress = 0:c:29:f:17:34 | | Type = 2048 | Packet_IPv4 (length:88) | | Hdr_IPv4 (length:20) | | | Version = 4 | | | IHL = 5 | | | TypeOfService = 2 | | | TotalLength = 88 | | | Identifier = 0 | | | Reserved = 0 | | | DF = 1 | | | MF = 0 | | | FragmentOffset = 0 | | | TTL = 64 | | | Protocol = 132 | | | HeaderChecksum = 47190 calc(47190) | | | SourceAddress = 192.168.0.21 | | | DestinationAddress = 192.168.0.100 | | Upp_SCTP (length:68) | | | Hdr_SCTP (length:12) | | | | SourcePort = 4567 | | | | DestinationPort = 3567 | | | | VerificationTag = 1 | | | | Checksum = 4025607498 calc(4025607498) | | | CHUNK_ABORT (length:56) | | | | Type = 6 | | | | Reserved = 0 | | | | TFlag = 0 | | | | Length = 56 | | | | ProtocolViolation (length:52) | | | | | Code = 13 | | | | | Length = 52 | | | | | Information = | | | | | 54686520 666f6c6c 6f77696e 67207061 72616d65 74657220 68616420 696e7661 | | | | | 6c696420 6c656e67 74683a00 80040008 ===sctp_chunk_abort_no_sha1=================================