Lines Matching full:association
208 * association (and thus the association enters the CLOSED state).
274 * association (and thus the association enters the CLOSED in sctp_sf_do_4_C()
296 * We are the side that is being asked for an association.
298 * Section: 5.1 Normal Establishment of an Association, B
343 * error, but since we don't have an association, we'll in sctp_sf_do_5_1B_init()
413 /* Update socket peer label if first association. */ in sctp_sf_do_5_1B_init()
473 * new association. Otherwise, "Z" will be vulnerable to resource in sctp_sf_do_5_1B_init()
490 * We are the side that is initiating the association.
492 * Section: 5.1 Normal Establishment of an Association, C
506 * association by transmitting an ABORT.
556 * the association. in sctp_sf_do_5_1C_ack()
577 * down an association in an authenticated way only, the in sctp_sf_do_5_1C_ack()
579 * tearing down the association. in sctp_sf_do_5_1C_ack()
583 * can't destroy this association just because the packet in sctp_sf_do_5_1C_ack()
618 /* SCTP-AUTH: generate the association shared keys so that in sctp_sf_do_5_1C_ack()
645 * authentication. We've just recreated the association using in sctp_auth_chunk_verify()
669 * We are the side that is being asked for an association.
671 * Section: 5.1 Normal Establishment of an Association, D
763 * [We should abort the association. --piggy] in sctp_sf_do_5_1D_ce()
791 * Re-build the bind address for the association is done in in sctp_sf_do_5_1D_ce()
794 /* This is a brand-new association, so these are not yet side in sctp_sf_do_5_1D_ce()
804 * sctp_process_init, set up the association shared keys as in sctp_sf_do_5_1D_ce()
820 /* RFC 2960 5.1 Normal Establishment of an Association in sctp_sf_do_5_1D_ce()
900 * We are the side that is asking for an association.
902 * RFC 2960 5.1 Normal Establishment of an Association
907 * establishment of the association with a Communication Up
952 /* RFC 2960 5.1 Normal Establishment of an Association in sctp_sf_do_5_1E_ca()
970 * establishment of the association with a Communication Up in sctp_sf_do_5_1E_ca()
1071 /* Set transport error counter and association error counter in sctp_sf_sendbeat_8_3()
1220 * clear the association overall error count as well (as defined
1270 net_warn_ratelimited("%s association %p could not find address %pI6\n", in sctp_sf_backbeat_8_3()
1275 net_warn_ratelimited("%s association %p could not find address %pI4\n", in sctp_sf_backbeat_8_3()
1351 /* Association is NULL since this may be a restart attack and we in sctp_sf_send_restart_abort()
1399 * unexpected INIT adds new addresses to the association. If new in sctp_sf_check_restart_addrs()
1400 * addresses are added to the association, the endpoint MUST respond in sctp_sf_check_restart_addrs()
1456 * existing parameters of the association (e.g. number of in sctp_tietags_populate()
1588 * existing parameters of the association (e.g. number of in sctp_sf_do_unexpected_init()
1591 * association. in sctp_sf_do_unexpected_init()
1597 /* Update socket peer label if first association. */ in sctp_sf_do_unexpected_init()
1672 * "Z" MUST NOT allocate any resources for this new association. in sctp_sf_do_unexpected_init()
1699 * association with the other endpoint.
1712 * a TCB exists will resolve the duplicate INITs to a single association.
1751 * this association, the endpoint shall generate an INIT ACK with a
1760 * existing parameters of the association (e.g. number of outbound
1764 * actions, i.e., the existing association, including its current state,
1767 * Note: Only when a TCB exists and the association is not in a COOKIE-
1768 * WAIT state are the Tie-Tags populated. For a normal association INIT
1868 /* new_asoc is a brand-new association, so these are not yet in sctp_sf_do_dupcook_a()
1891 * association but instead resend the SHUTDOWN ACK and send an ERROR in sctp_sf_do_dupcook_a()
1927 /* Update the content of current association. */ in sctp_sf_do_dupcook_a()
1935 /* Report association restart to upper layer. */ in sctp_sf_do_dupcook_a()
1972 * B) In this case, both sides may be attempting to start an association
1988 /* new_asoc is a brand-new association, so these are not yet in sctp_sf_do_dupcook_b()
2008 /* Update the content of current association. */ in sctp_sf_do_dupcook_b()
2018 /* RFC 2960 5.1 Normal Establishment of an Association in sctp_sf_do_dupcook_b()
2025 * we are not guaranteed to have set the association id of the real in sctp_sf_do_dupcook_b()
2026 * association and so these notifications need to be delayed until in sctp_sf_do_dupcook_b()
2027 * the association id is allocated. in sctp_sf_do_dupcook_b()
2115 /* RFC 2960 5.1 Normal Establishment of an Association in sctp_sf_do_dupcook_d()
2232 * current association, consider the State Cookie valid even if in sctp_sf_do_5_2_4_dupcook()
2242 * [We should abort the association. --piggy] in sctp_sf_do_5_2_4_dupcook()
2262 /* Update socket peer label if first association. */ in sctp_sf_do_5_2_4_dupcook()
2272 * current association. in sctp_sf_do_5_2_4_dupcook()
2277 case 'A': /* Association restart. */ in sctp_sf_do_5_2_4_dupcook()
2302 /* Delete the temporary new association. */ in sctp_sf_do_5_2_4_dupcook()
2306 /* Restore association pointer to provide SCTP command interpreter in sctp_sf_do_5_2_4_dupcook()
2341 * association that doesn't exist, it MUST silently discard it. in sctp_sf_shutdown_pending_abort()
2387 * association that doesn't exist, it MUST silently discard it. in sctp_sf_shutdown_sent_abort()
2495 * If the association is in the COOKIE-ECHOED state, the endpoint may elect
2613 * remove the association from its record, and shall report the
2657 * association that doesn't exist, it MUST silently discard it. in sctp_sf_do_9_1_abort()
2731 * association that doesn't exist, it MUST silently discard it. in sctp_sf_cookie_wait_abort()
2782 * Stop T1 timer and abort association with "INIT failed".
2877 * send, terminating the association and respond to the in sctp_sf_do_9_2_shutdown()
2962 * send, terminating the association and respond to the in sctp_sf_do_9_2_shut_ctsn()
2982 * that belong to this association, it should discard the INIT chunk and
3420 * send, terminating the association and respond to the in sctp_sf_eat_sack_6_2()
3592 * peer, and remove all record of the association.
3649 /* ...and remove all record of the association. */ in sctp_sf_do_9_2_final()
3848 /* Although we do have an association in this case, it corresponds in sctp_sf_do_8_5_1_E_sa()
3849 * to a restarted association. So the packet is treated as an OOTB in sctp_sf_do_8_5_1_E_sa()
3851 * called with a NULL association. in sctp_sf_do_8_5_1_E_sa()
3902 * the endpoint stored in a new association variable in sctp_sf_do_asconf()
4053 * outstanding the endpoint MUST ABORT the association. Note that a in sctp_sf_do_asconf_ack()
4330 * during association setup, the AUTH chunk and all chunks after it MUST
4705 * down an association in an authenticated way only, the in sctp_sf_abort_violation()
4707 * tearing down the association. in sctp_sf_abort_violation()
4711 * can't destroy this association just because the packet in sctp_sf_abort_violation()
4805 * Generate an ABORT chunk and terminate the association.
4885 * when we have an association and we receive bundled INIT-ACK, or
4914 * -> association id [,destination transport addr list] [,outbound stream
4917 * This primitive allows the upper layer to initiate an association to a
4928 * An association id, which is a local handle to the SCTP association,
4929 * will be returned on successful establishment of the association. If
4930 * SCTP is not able to open an SCTP association with the peer endpoint,
4935 * Other association parameters may be returned, including the
4951 * addresses of the peer endpoint with which the association is to be
4980 /* RFC 2960 5.1 Normal Establishment of an Association in sctp_sf_do_prm_asoc()
5020 * Format: SEND(association id, buffer address, byte count [,context]
5029 * o association id - local handle to the SCTP association
5094 * Format: SHUTDOWN(association id)
5097 * Gracefully closes an association. Any locally queued user data
5098 * will be delivered to the peer. The association will be terminated only
5100 * will be returned on successful termination of the association. If
5101 * attempting to terminate the association results in a failure, an error
5106 * o association id - local handle to the SCTP association
5124 /* From 9.2 Shutdown of an Association in sctp_sf_do_9_2_prm_shutdown()
5150 * Format: Abort(association id [, cause code])
5153 * Ungracefully closes an association. Any locally queued user data
5155 * will be returned on successful abortion of the association. If
5156 * attempting to abort the association results in a failure, an error
5161 * o association id - local handle to the SCTP association
5179 /* From 9.1 Abort of an Association in sctp_sf_do_9_1_prm_abort()
5198 /* Delete the established association. */ in sctp_sf_do_9_1_prm_abort()
5208 /* We tried an illegal operation on an association which is closed. */
5220 /* We tried an illegal operation on an association which is shutting
5341 /* Delete the established association. */ in sctp_sf_cookie_wait_prm_abort()
5466 * Format: REQUESTHEARTBEAT(association id, destination transport address)
5471 * destination transport address of the given association. The returned
5477 * o association id - local handle to the SCTP association
5480 * association on which a heartbeat should be issued.
5498 * transport address of a given association. in sctp_sf_do_prm_requestheartbeat()
6004 * SHUTDOWN chunk to the protocol parameter 'Association.Max.Retrans'.
6007 * thus the association enters the CLOSED state). The reception of any
6108 /* ADDIP 4.1 B2) Increment the association error counters and perform in sctp_sf_t4_timer_expire()
6109 * endpoint failure detection on the association as defined in in sctp_sf_t4_timer_expire()
6111 * association error counter is incremented in SCTP_CMD_STRIKE. in sctp_sf_t4_timer_expire()
6153 * At the expiration of this timer the sender SHOULD abort the association
6189 * the association is automatically closed by starting the shutdown process.
6205 /* From 9.2 Shutdown of an Association in sctp_sf_autoclose_timer_expire()
6266 * when the association is in the wrong state. This event should
6375 * association exists, otherwise, use the peer's vtag. in sctp_ootb_pkt_new()