NAME

  AuthWithBadShareID.seq - Authentication Chunk is received with Message Authentication Code not match


PURPOSE

  To verify that if the AUTH chunk is received with bad Message Authentication
  Code, all authenticated chunks MUST be silently discarded.


SYNOPSIS

  ./AuthWithBadHmac.seq [-tooloption ...] -pkt ./AuthWithBadHmac.def
    -tooloption : v6eval tool option
  See Also: ../common/STD_PKT_COMMON.def
            ../common/SCTP_COMMON.def


PRE-TEST CONDITION

  Association is established between endpoint A and B. Arrange data 
  in endpoint A such that AUTH chunk with bad Message Authentication
  Code is sent to endpoint B.


TEST PROCEDURE

  Endpoint A                             Endpoint B               ULP
  (ESTABLISHED)                          (ESTABLISHED)
    AUTH          ------------------>
    (with Message Authentication Code)
                                        Silently discard
  TEST DESCRIPTION:
  1. Send AUTH chunk from endpoint A to B with bad Message Authentication
     Code.
  2. Check A: All authenticated chunks be silently discarded.


NOTE

  None


REFERENCE

  RFC 4895
  6.3.  Receiving Authenticated Chunks
    The receiver has a list of chunk types that it expects to be received
    only after an AUTH-chunk.  This list has been sent to the peer during
    the association setup.  It MUST silently discard these chunks if they
    are not placed after an AUTH chunk in the packet.
    The receiver MUST use the HMAC algorithm indicated in the HMAC
    Identifier field.  If this algorithm was not specified by the
    receiver in the HMAC-ALGO parameter in the INIT or INIT-ACK chunk
    during association setup, the AUTH chunk and all the chunks after it
    MUST be discarded and an ERROR chunk SHOULD be sent with the error
    cause defined in Section 4.1.
    If an endpoint with no shared key receives a Shared Key Identifier
    other than 0, it MUST silently discard all authenticated chunks. If
    the endpoint has at least one endpoint pair shared key for the peer,
    it MUST use the key specified by the Shared Key Identifier if a key
    has been configured for that Shared Key Identifier.  If no endpoint
    pair shared key has been configured for that Shared Key Identifier,
    all authenticated chunks MUST be silently discarded.
    The receiver now performs the same calculation as described for the
    sender based on Figure 6.  If the result of the calculation is the
    same as given in the HMAC field, all the chunks following the AUTH
    chunk are processed.  If the field does not match the result of the
    calculation, all the chunks following the AUTH chunk MUST be silently
    discarded.