Network Working Group                  Richard Price, Siemens/Roke Manor
INTERNET-DRAFT                       Abigail Surtees, Siemens/Roke Manor
Expires: November 2003
                                                            May 16, 2003


                           SigComp Torture Tests
              <draft-price-rohc-sigcomp-torture-tests-02.txt>


Status of this memo

   This document is an Internet-Draft and is in full conformance with
   all provisions of Section 10 of RFC2026.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF), its areas, and its working groups.  Note that
   other groups may also distribute working documents as Internet-
   Drafts.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or cite them other than as "work in progress".

   The list of current Internet-Drafts can be accessed at
   http://www.ietf.org/ietf/lid-abstracts.txt

   The list of Internet-Draft Shadow Directories can be accessed at
   http://www.ietf.org/shadow.html

   This document is a submission of the IETF ROHC WG.  Comments should
   be directed to its mailing list, rohc@ietf.org.


Abstract

   This document provides a set of "torture tests" for implementers of
   the SigComp protocol.  The torture tests check each of the SigComp
   Universal Decompressor Virtual Machine instructions in turn, focusing
   in particular on the boundary and error cases that are not generally
   encountered when running well-behaved compression algorithms.  Tests
   are also provided for other SigComp entities such as the dispatcher
   and the state handler.










Price et al.                                                    [Page 1]


INTERNET-DRAFT           SigComp Torture Tests             May 16, 2003


Change history

   Changes relative to <draft-price-rohc-sigcomp-torture-tests-01.txt>:

   1. Added a test for the SigComp dispatcher (covering the case where
      input is requested that lies beyond the end of a message).

   2. Fixed a typo in the input for Section 2.16.

   Changes relative to <draft-price-rohc-sigcomp-torture-tests-00.txt>:

   1. Added tests for the SigComp dispatcher (covering the SigComp
      Useful Values, the SigComp header for message-based transports,
      and the record marking scheme for stream-based transports).

   2. Added tests for the SigComp state handler (covering the SigComp
      feedback mechanism, the state memory management and the
      interaction between multiple compartments).

   3. Updated the cost of the sorting instructions based on the new
      values used in SigComp [RFC-3320].

   4. Updated the stack manipulation test to work correctly when the
      decompression_memory_size is only 2048 bytes.


Table of contents

   1.  Introduction..................................................2
   2.  Torture tests for UDVM........................................3
   3.  Torture tests for dispatcher..................................20
   4.  Torture tests for state handler...............................27
   5.  Security considerations.......................................37
   6.  Authors' addresses............................................37
   7.  References....................................................38
   Appendix A: UDVM bytecode for the torture tests...................39


1.  Introduction

   This document provides a set of torture tests for implementers of the
   SigComp protocol [RFC-3320].  The idea behind SigComp is to
   standardize a Universal Decompressor Virtual Machine (UDVM) that can
   be programmed to understand the output of many well-known compressors
   including DEFLATE and LZW.  The bytecode for the chosen decompressor
   is uploaded to the UDVM as part of the SigComp message flow.

   The SigComp User Guide [USERGUIDE] offers a number of different
   algorithms that can be used by the SigComp protocol.  However, the
   bytecode for the corresponding decompressors is relatively well





Price et al.                                                    [Page 2]


INTERNET-DRAFT           SigComp Torture Tests             May 16, 2003


   behaved and does not test the boundary and error cases that may
   potentially be exploited by malicious SigComp messages.

   The draft is divided into a number of sections, each containing a
   piece of code designed to test a particular function of one of the
   SigComp entities (UDVM, dispatcher and state handler).  The specific
   boundary and error cases tested by the bytecode are also listed, as
   is the expected output of the code.

2.  Torture tests for UDVM

   The following sections each provide code to test one or more UDVM
   instructions.  In the interests of readability the code is given
   using the SigComp assembly language: a description of how to convert
   this assembly code into UDVM bytecode can be found in the SigComp
   User Guide [USERGUIDE].

   The raw UDVM bytecode for each torture test is given in Appendix A.

   Each section also lists the number of UDVM cycles required to execute
   the code.  Note that this figure only takes into account the cost of
   executing each UDVM instruction (in particular it ignores the fact
   that the UDVM can gain extra cycles as a result of inputting more
   data).

2.1.  Bit manipulation

   This section gives assembly code to test the AND, OR, NOT, LSHIFT and
   RSHIFT instructions.  When the instructions have a multitype operand
   the code tests the case where the multitype contains a fixed integer
   value, and the case where it contains a memory address at which the
   2-byte operand value can be found.  In addition the code is designed
   to test that the following boundary cases have been correctly
   implemented:

   1. The instructions overwrite themselves with the result of the bit
   manipulation operation.

   2. The LSHIFT or RSHIFT instructions shift bits beyond the 2-byte
   boundary, in which case the bits must be discarded.

   3. The UDVM registers byte_copy_left and byte_copy_right are used to
   store the results of the bit manipulation operations.  Since no byte
   copying is taking place these registers should behave in exactly the
   same manner as ordinary UDVM memory addresses.

   at (64)

   :a                              pad (2)
   :b                              pad (2)





Price et al.                                                    [Page 3]


INTERNET-DRAFT           SigComp Torture Tests             May 16, 2003


   at (128)

   JUMP (start)

   at (255)

   :start

   AND ($start, 21845)
   OR ($a, 42)
   NOT ($b)
   LSHIFT ($a, 3)
   RSHIFT ($b, 65535)

   OUTPUT (64, 4)

   AND ($a, $start)
   OR ($a, $a)
   NOT ($a)
   LSHIFT ($b, $a)
   RSHIFT ($a, $b)

   OUTPUT (64, 4)
   END-MESSAGE (0, 0, 0, 0, 0, 0, 0)

   The expected output of the code is 0x0150 0000 febf 0000.  Executing
   the code should cost a total of 22 UDVM cycles.

2.2.  Arithmetic

   This section gives assembly code to test the ADD, SUBTRACT, MULTIPLY,
   DIVIDE and REMAINDER instructions.  The code is designed to test that
   the following boundary cases have been correctly implemented:

   1. The instructions overwrite themselves with the result of the
   arithmetic operation.

   2. The result does not lie between 0 and 2^16 - 1 inclusive, in which
   case it must be taken modulo 2^16.

   3. The divisor in the DIVIDE or REMAINDER instructions is 0 (in which
   case decompression failure should occur).

   at (64)

   :a                              pad (2)
   :b                              pad (2)
   :type                           pad (1)
   :type_lsb                       pad (1)

   at (128)




Price et al.                                                    [Page 4]


INTERNET-DRAFT           SigComp Torture Tests             May 16, 2003



   INPUT-BYTES (1, type_lsb, !)
   SUBTRACT ($type, 1)
   JUMP (start)

   at (255)

   :start

   ADD ($start, 63809)
   SUBTRACT ($a, 1)
   MULTIPLY ($a, 1001)
   DIVIDE ($a, 101)
   REMAINDER ($a, 11)

   OUTPUT (64, 4)

   ADD ($b, $start)
   SUBTRACT ($b, $type)
   MULTIPLY ($b, $b)
   DIVIDE ($a, $b)
   REMAINDER ($b, $type)

   OUTPUT (64, 4)
   END-MESSAGE (0, 0, 0, 0, 0, 0, 0)

   If the compressed message is 0x00 then the expected output of the
   code is 0x0000 0000 0000 0004 and the execution cost should be 25
   UDVM cycles.  However, if the compressed message is 0x01 or 0x02 then
   decompression failure should occur.

2.3.  Sorting

   This section gives assembly code to test the SORT-ASCENDING and SORT-
   DESCENDING instructions.  The code is designed to test that the
   following boundary cases have been correctly implemented:

   1. The sorting instructions sort integers with the same value, in
   which case the original ordering of the integers must be preserved.

   at (128)

   SORT-DESCENDING (256, 2, 23)
   SORT-ASCENDING (256, 2, 23)

   OUTPUT (302, 45)
   END-MESSAGE (0, 0, 0, 0, 0, 0, 0)

   at (256)






Price et al.                                                    [Page 5]


INTERNET-DRAFT           SigComp Torture Tests             May 16, 2003


   word (10, 10, 17, 7, 22, 3, 3, 3, 19, 1, 16, 14, 8, 2, 13, 20, 18,
   23, 15, 21, 12, 6, 9)

   word (28263, 8297, 30057, 8308, 26996, 11296, 31087, 29991, 8275,
   18031, 28263, 24864, 30066, 29284, 28448, 29807, 28206, 11776, 28773,
   28704, 28276, 29285, 28265)

   The expected output of the code is 0x466f 7264 2c20 796f 7527 7265
   2074 7572 6e69 6e67 2069 6e74 6f20 6120 7065 6e67 7569 6e2e 2053 746f
   7020 6974 2e, and the expected number of cycles required is 371.
   N.B.  This uses the corrected cost for the sorting instructions,
   which is 1 + k * (ceiling(log2(k)) + n) not 1 + k * ceiling(log2(k)).

2.4.  SHA-1

   This section gives assembly code to test the SHA-1 instruction.  The
   code performs four tests on the SHA-1 algorithm itself, and
   additionally checks the following boundary cases specific to the
   UDVM:

   1. The input string for the SHA-1 hash is obtained by byte copying
   over an area of the UDVM memory.

   2. The SHA-1 hash overwrites its own input string.

   at (64)

   :byte_copy_left                 pad (2)
   :byte_copy_right                pad (2)
   :hash_value                     pad (20)

   at (128)

   SHA-1 (test_one, 3, hash_value)
   OUTPUT (hash_value, 20)

   SHA-1 (test_two, 56, hash_value)
   OUTPUT (hash_value, 20)

   LOAD (byte_copy_left, test_three)
   LOAD (byte_copy_right, test_four)

   SHA-1 (test_three, 65535, hash_value)
   OUTPUT (hash_value, 20)

   LOAD (byte_copy_left, test_four)
   LOAD (byte_copy_right, test_end)

   SHA-1 (test_four, 640, test_four)
   OUTPUT (test_four, 20)





Price et al.                                                    [Page 6]


INTERNET-DRAFT           SigComp Torture Tests             May 16, 2003


   END-MESSAGE (0, 0, 0, 0, 0, 0, 0)

   :test_one

   byte (97, 98, 99)

   :test_two

   byte (97, 98, 99, 100, 98, 99, 100, 101, 99, 100, 101, 102, 100, 101,
   102, 103, 101, 102, 103, 104, 102, 103, 104, 105, 103, 104, 105, 106,
   104, 105, 106, 107, 105, 106, 107, 108, 106, 107, 108, 109, 107, 108,
   109, 110, 108, 109, 110, 111, 109, 110, 111, 112, 110, 111, 112, 113)

   :test_three

   byte (97)

   :test_four

   byte (48, 49, 50, 51, 52, 53, 54, 55)

   :test_end

   The expected output of the code is as follows:

   0xa999 3e36 4706 816a ba3e 2571 7850 c26c 9cd0 d89d
   0x8498 3e44 1c3b d26e baae 4aa1 f951 29e5 e546 70f1
   0xe1d0 a18d 43d3 a689 af08 8e15 6bd0 434a a0c8 31fc
   0x4f46 0452 ebb5 6393 4f46 0452 ebb5 6393 4f46 0452

   Executing the code is expected to cost a total of 66327 UDVM cycles.

2.5.  LOAD and MULTILOAD

   This section gives assembly code to test the LOAD and MULTILOAD
   instructions.  The code is designed to test the following boundary
   cases:

   1. The MULTILOAD instruction overwrites itself, any of its operands,
   or any memory addresses referenced by its operands (in which case
   decompression failure should occur).

   at (64)

   :start                          pad (1)
   :start_lsb                      pad (1)

   at (128)

   set (location_a, 128)
   set (location_b, 132)




Price et al.                                                    [Page 7]


INTERNET-DRAFT           SigComp Torture Tests             May 16, 2003



   LOAD (128, 132)
   LOAD (130, $location_a)
   LOAD ($location_a, 134)
   LOAD ($location_b, $location_b)
   OUTPUT (128, 8)

   INPUT-BYTES (1, start_lsb, !)
   MULTIPLY ($start, 2)
   ADD ($start, 60)
   MULTILOAD ($start, 3, overlap_start, overlap_end, 128)

   :position

   set (overlap_start, (position - 7))

   MULTILOAD ($start, 4, 42, 128, $location_a, $location_b)

   :end

   set (overlap_end, (end - 1))

   OUTPUT (128, 8)
   END-MESSAGE (0, 0, 0, 0, 0, 0, 0)

   If the compressed message is 0x00 then the expected output of the
   code is 0x0084 0084 0086 0086 002a 0080 002a 002a, and the expected
   cost of executing the code is 36 UDVM cycles.  However, if the
   compressed message is 0x01 or 0x02 then decompression failure is
   expected to occur while executing the second MULTILOAD instruction.

2.6. COPY

   This section gives assembly code to test the COPY instruction.  The
   code is designed to test that the following boundary cases have been
   correctly implemented:

   1. The COPY instruction copies data from both outside the circular
   buffer and inside the circular buffer within the same operation.

   2. The COPY instruction performs byte-by-byte copying (i.e. some of
   the later bytes to be copied are themselves written into the UDVM
   memory by the COPY instruction currently being executed).

   3. The COPY instruction overwrites itself.

   4. The COPY instruction overwrites the UDVM registers byte_copy_left
   and byte_copy_right.

   at (64)





Price et al.                                                    [Page 8]


INTERNET-DRAFT           SigComp Torture Tests             May 16, 2003


   :byte_copy_left                 pad (2)
   :byte_copy_right                pad (2)

   at (128)

   LOAD (32, 16384)
   LOAD (byte_copy_left, 64)
   LOAD (byte_copy_right, 128)

   COPY (32, 128, 33)
   LOAD (64, 16640)
   COPY (64, 76, 65)

   OUTPUT (32, 109)
   END-MESSAGE (0, 0, 0, 0, 0, 0, 0)

   The expected output of the code is 32 consecutive instances of 0x40
   (the ASCII character "@") followed by 77 consecutive instances of
   0x41 (the ASCII character "A").  Executing the code should cost a
   total of 321 UDVM cycles.

2.7.  COPY-LITERAL and COPY-OFFSET

   This section gives assembly code to test the COPY-LITERAL and COPY-
   OFFSET instructions.  The code is designed to test similar boundary
   cases to the code for the COPY instruction, as well as the following
   condition specific to COPY-LITERAL and COPY-OFFSET:

   1. The COPY-LITERAL or COPY-OFFSET instruction overwrites the value
   of its destination or offset operand.

   at (64)

   :byte_copy_left                 pad (2)
   :byte_copy_right                pad (2)
   :destination                    pad (2)
   :offset                         pad (2)

   at (128)

   LOAD (32, 16384)
   LOAD (byte_copy_left, 64)
   LOAD (byte_copy_right, 128)
   LOAD (destination, 33)

   COPY-LITERAL (32, 128, $destination)
   COPY-LITERAL (68, 8, $destination)

   LOAD (byte_copy_left, 66)
   LOAD (byte_copy_right, 74)





Price et al.                                                    [Page 9]


INTERNET-DRAFT           SigComp Torture Tests             May 16, 2003


   COPY-OFFSET (8, 6, $destination)

   LOAD ($offset, 1)

   COPY-OFFSET ($offset, 5, $destination)

   OUTPUT (32, 48)

   END-MESSAGE (0, 0, 0, 0, 0, 0, 0)

   The expected output of the code is 32 instances of 0x40 followed by
   0x0042 004a 0074 4040 4040 004a 0074 4040.  The expected cost of
   executing the code is 208 UDVM cycles.

   N.B.  This uses the corrected cost for COPY-OFFSET, which is 1 +
   length not 1 + length + offset.

2.8.  MEMSET

   This section gives assembly code to test the MEMSET instruction.  The
   code is designed to test that the following boundary cases have been
   correctly implemented:

   1. The MEMSET instruction overwrites the registers byte_copy_left and
   byte_copy_right.

   2. The output values of the MEMSET instruction do not lie between 0
   and 255 inclusive (in which case they must be taken modulo 2^8).

   at (64)

   :byte_copy_left                 pad (2)
   :byte_copy_right                pad (2)

   at (128)

   LOAD (byte_copy_left, 128)
   LOAD (byte_copy_right, 129)
   MEMSET (64, 129, 0, 1)
   MEMSET (129, 15, 64, 15)

   OUTPUT (128, 16)
   END-MESSAGE (0, 0, 0, 0, 0, 0, 0)

   The expected output of the code is 0x8040 4f5e 6d7c 8b9a a9b8 c7d6
   e5f4 0312.  Executing the code is expected to cost 166 UDVM cycles.









Price et al.                                                   [Page 10]


INTERNET-DRAFT           SigComp Torture Tests             May 16, 2003


2.9.  CRC

   This section gives assembly code to test the CRC instruction.  The
   code does not test any specific boundary cases (as there do not
   appear to be any) but focuses instead on verifying the CRC algorithm.

   at (64)

   :byte_copy_left                 pad (2)
   :byte_copy_right                pad (2)
   :crc_value                      pad (2)
   :crc_string_a                   pad (24)
   :crc_string_b                   pad (20)

   at (128)

   MEMSET (crc_string_a, 24, 1, 1)
   MEMSET (crc_string_b, 20, 128, 1)

   INPUT-BYTES (2, crc_value, !)

   CRC ($crc_value, crc_string_a, 44, !)
   END-MESSAGE (0, 0, 0, 0, 0, 0, 0)

   If the compressed message is 0x62cb then the code should successfully
   terminate with no output, and with a total execution cost of 95 UDVM
   cycles.  For different 2-byte compressed messages the code should
   terminate with a decompression failure.

2.10.  INPUT-BITS

   This section gives assembly code to test the INPUT-BITS instruction.
   The code is designed to test that the following boundary cases have
   been correctly implemented:

   1. The INPUT-BITS instruction changes between any of the four
   possible bit orderings defined by the input_bit_order register.

   2. The INPUT-BITS instruction inputs 0 bits.

   3. The INPUT-BITS instruction requests data that lies beyond the end
   of the compressed message.

   at (64)

   :byte_copy_left                 pad (2)
   :byte_copy_right                pad (2)
   :input_bit_order                pad (2)
   :result                         pad (2)

   at (128)




Price et al.                                                   [Page 11]


INTERNET-DRAFT           SigComp Torture Tests             May 16, 2003



   :start

   INPUT-BITS ($input_bit_order, result, end_of_message)
   OUTPUT (result, 2)

   ADD ($input_bit_order, 1)
   REMAINDER ($input_bit_order, 7)
   ADD ($input_bit_order, 1)
   JUMP (start)

   :end_of_message

   END-MESSAGE (0, 0, 0, 0, 0, 0, 0)

   An example compressed message is 0x932e ac71, which decompresses to
   give the output 0x0000 0002 0002 0013 0000 0003 001a 0038.  Executing
   the code should cost 66 UDVM cycles.

2.11.  INPUT-HUFFMAN

   This section gives assembly code to test the INPUT-HUFFMAN
   instruction.  The code is designed to test that the following
   boundary cases have been correctly implemented:

   1. The INPUT-HUFFMAN instruction changes between any of the four
   possible bit orderings defined by the input_bit_order register.

   2. The INPUT-HUFFMAN instruction inputs 0 bits.

   3. The INPUT-HUFFMAN instruction requests data that lies beyond the
   end of the compressed message.

   at (64)

   :byte_copy_left                 pad (2)
   :byte_copy_right                pad (2)
   :input_bit_order                pad (2)
   :result                         pad (2)

   at (128)

   :start

   INPUT-HUFFMAN (result, end_of_message, 2, $input_bit_order, 0,
   $input_bit_order, $input_bit_order, $input_bit_order, 0, 65535, 0)
   OUTPUT (result, 2)

   ADD ($input_bit_order, 1)
   REMAINDER ($input_bit_order, 7)
   ADD ($input_bit_order, 1)




Price et al.                                                   [Page 12]


INTERNET-DRAFT           SigComp Torture Tests             May 16, 2003


   JUMP (start)

   :end_of_message

   END-MESSAGE (0, 0, 0, 0, 0, 0, 0)

   An example compressed message is 0x932e ac71 66d8 6f, which
   decompresses to give the output 0x0000 0003 0008 04d7 0002 0003 0399
   30fe.  Executing the code should cost 84 UDVM cycles.

2.12.  INPUT-BYTES

   This section gives assembly code to test the INPUT-BYTES instruction.
   The code is designed to test that the following boundary cases have
   been correctly implemented:

   1. The INPUT-BYTES instruction inputs 0 bytes.

   2. The INPUT-BYTES instruction requests data that lies beyond the end
   of the compressed message.

   3. The INPUT-BYTES instruction is used after part of a byte has been
   inputted (e.g. by the INPUT-BITS instruction).

   at (64)

   :byte_copy_left                 pad (2)
   :byte_copy_right                pad (2)
   :input_bit_order                pad (2)
   :result                         pad (2)
   :output_start                   pad (4)
   :output_end

   at (128)

   LOAD (byte_copy_left, output_start)
   LOAD (byte_copy_right, output_end)

   :start

   INPUT-BITS ($input_bit_order, result, end_of_message)
   OUTPUT (result, 2)

   ADD ($input_bit_order, 2)
   REMAINDER ($input_bit_order, 7)

   INPUT-BYTES ($input_bit_order, output_start, end_of_message)
   OUTPUT (output_start, $input_bit_order)

   ADD ($input_bit_order, 1)
   JUMP (start)




Price et al.                                                   [Page 13]


INTERNET-DRAFT           SigComp Torture Tests             May 16, 2003



   :end_of_message

   END-MESSAGE (0, 0, 0, 0, 0, 0, 0)

   An example compressed message is 0x932e ac71 66d8 6fb1 592b dc9a 9734
   d847 a733 874e 1bcb cd51 b5dc 9659 9d6a, which decompresses to give
   the output 0x0000 932e 0001 b166 d86f b100 1a2b 0003 9a97 34d8 0007
   0001 3387 4e00 08dc 9651 b5dc 9600 599d 6a.  Executing the code
   should cost 130 UDVM cycles.

2.13.  Stack manipulation

   This section gives assembly code to test the PUSH, POP, CALL and
   RETURN instructions.  The code is designed to test that the following
   boundary cases have been correctly implemented:

   1. The stack manipulation instructions overwrite the UDVM register
   stack_location.

   2. The stack manipulation instructions overwrite themselves.

   3. The CALL instruction specifies a reference operand rather than an
   absolute value.

   4. The PUSH instruction pushes the value contained in stack_fill onto
   the stack.

   5. The stack_location register contains an odd integer.

   at (64)

   :byte_copy_left                 pad (2)
   :byte_copy_right                pad (2)
   :input_bit_order                pad (2)
   :stack_location                 pad (2)
   :next_address                   pad (2)

   at (128)

   LOAD (stack_location, 64)
   PUSH (2)
   PUSH ($64)
   PUSH (66)

   OUTPUT (64, 8)

   POP (64)
   POP ($stack_location)
   POP (stack_location)





Price et al.                                                   [Page 14]


INTERNET-DRAFT           SigComp Torture Tests             May 16, 2003


   OUTPUT (64, 8)
   JUMP (address_a)

   at (192)

   :address_a

   LOAD (stack_location, 32)
   LOAD (next_address, address_c)
   SUBTRACT ($next_address, address_b)
   CALL (address_b)

   at (256)

   :address_b

   CALL ($next_address)

   at (320)

   :address_c

   LOAD (stack_location, 383)
   LOAD (383, 26)
   MULTILOAD (432, 3, 1, 49153, 32768)
   RETURN

   at (448)

   END-MESSAGE (0, 0, 0, 0, 0, 0, 0)

   The expected output of the code is 0x0003 0002 0001 0042 0042 0000
   0001 0001, and a total of 40 UDVM cycles are expected to be used.

2.14.  Program flow

   This section gives assembly code to test the JUMP, COMPARE and SWITCH
   instructions.  The code is designed to test that the following
   boundary cases have been correctly implemented:

   1. The address operands are specified as references to memory
   addresses rather than as absolute values.

   at (64)

   :next_address                   pad (2)
   :counter                        pad (1)
   :counter_lsb                    pad (1)
   :switch_counter                 pad (2)

   at (128)




Price et al.                                                   [Page 15]


INTERNET-DRAFT           SigComp Torture Tests             May 16, 2003



   LOAD (switch_counter, 4)

   :address_a

   LOAD (next_address, address_c)
   SUBTRACT ($next_address, address_b)
   OUTPUT (counter_lsb, 1)

   :address_b

   JUMP ($next_address)

   :address_c

   ADD ($counter, 1)
   LOAD (next_address, address_a)
   SUBTRACT ($next_address, address_d)
   OUTPUT (counter_lsb, 1)

   :address_d

   COMPARE ($counter, 6, $next_address, address_c, address_e)

   :address_e

   SUBTRACT ($switch_counter, 1)
   LOAD (next_address, address_a)
   SUBTRACT ($next_address, address_f)
   OUTPUT (counter_lsb, 1)

   :address_f

   SWITCH (4, $switch_counter, address_g, $next_address, address_c,
   address_e)

   :address_g

   END-MESSAGE (0, 0, 0, 0, 0, 0, 0)

   The expected output of the code is 0x0001 0102 0203 0304 0405 0506
   0707 0708 0808 0909, and a total of 131 UDVM cycles are expected to
   be used.

2.15.  State creation

   This section gives assembly code to test the STATE-CREATE and STATE-
   FREE instructions.  The code is designed to test that the following
   boundary cases have been correctly implemented:






Price et al.                                                   [Page 16]


INTERNET-DRAFT           SigComp Torture Tests             May 16, 2003


   1. An item of state is created that duplicates an existing state
   item.

   2. An item of state is freed when the state has not been created.

   3. An item of state is created and then freed by the same message.

   4. The STATE-FREE instruction frees a state item by sending fewer
   bytes of state_identifier than the minimum_access_length.

   at (64)

   :byte_copy_left                 pad (2)
   :byte_copy_right                pad (2)
   :states                         pad (1)
   :states_lsb                     pad (1)

   set (state_length, 10)

   at (128)

   INPUT-BYTES (1, states_lsb, !)

   :test_one

   LSHIFT ($states, 13)
   COMPARE ($states, 32768, test_two, create_state_a, create_state_a)

   :create_state_a

   STATE-CREATE (state_length, state_address, 0, 20, 0)

   :test_two

   LSHIFT ($states, 1)
   COMPARE ($states, 32768, test_three, free_state, free_state)

   :free_state

   STATE-FREE (state_identifier, 6)

   :test_three

   LSHIFT ($states, 1)
   COMPARE ($states, 32768, end, create_state_b, create_state_b)

   :create_state_b

   END-MESSAGE (0, 0, state_length, state_address, 0, 20, 0)

   :end




Price et al.                                                   [Page 17]


INTERNET-DRAFT           SigComp Torture Tests             May 16, 2003



   END-MESSAGE (0, 0, 0, 0, 0, 0, 0)

   at (512)

   :state_address

   byte (34, 162, 6, 4, 22, 224, 116, 101, 115, 116)

   :state_identifier

   byte (32, 84, 55, 65, 83, 248, 254, 122, 106, 151, 203, 121, 224, 24,
   194, 221, 214, 143, 254, 155)

   Upon reaching the END-MESSAGE instruction the UDVM does not output
   any decompressed data, but instead may make one or more state
   creation or state free requests to the state handler.  Assuming that
   the application does not veto the state creation request (and that
   sufficient state memory is available) the code should result in
   either 0 or 1 new state items being created in the chosen
   compartment.

   The following table lists eight different 1-byte compressed messages
   and whether the message should cause a new state item to be created
   in the compartment.  The number of UDVM cycles required to execute
   the code is also given:

    Compressed message:     State item in compartment:     UDVM cycles:

         0x00                          No                       9
         0x01                          Yes                      19
         0x02                          No                       10
         0x03                          Yes                      20
         0x04                          Yes                      20
         0x05                          Yes                      30
         0x06                          No                       21
         0x07                          Yes                      31

2.16.  STATE-ACCESS

   This section gives assembly code to test the STATE-ACCESS
   instruction.  The code is designed to test that the following
   boundary cases have been correctly implemented:

   1. A subset of the bytes contained in a state item is copied to the
   UDVM memory.

   2. Bytes are copied from beyond the end of the state value.

   3. The state_instruction operand is set to 0.





Price et al.                                                   [Page 18]


INTERNET-DRAFT           SigComp Torture Tests             May 16, 2003


   4. The state cannot be accessed because the partial state identifier
   is too short.

   5. The state identifier is overwritten by the state item being
   accessed.

   The code assumes that the state item created in the previous section
   is available to the state handler.

   at (64)

   :byte_copy_left                 pad (2)
   :byte_copy_right                pad (2)
   :type                           pad (1)
   :type_lsb                       pad (1)
   :state_value                    pad (4)

   at (128)

   INPUT-BYTES (1, type_lsb, !)
   COMPARE ($type, 1, execute_state, extract_state, error_conditions)

   :execute_state

   STATE-ACCESS (state_identifier, 20, 0, 0, 0, 512)

   :extract_state

   STATE-ACCESS (state_identifier, 20, 6, 4, state_value, 0)
   OUTPUT (state_value, 4)
   JUMP (end)

   :error_conditions

   COMPARE ($type, 3, state_not_found, id_too_short, state_too_short)

   :state_not_found

   STATE-ACCESS (128, 20, 0, 0, 0, 0)
   JUMP (end)

   :id_too_short

   STATE-ACCESS (state_identifier, 19, 6, 4, state_value, 0)
   JUMP (end)

   :state_too_short

   STATE-ACCESS (state_identifier, 20, 6, 5, state_value, 0)
   JUMP (end)





Price et al.                                                   [Page 19]


INTERNET-DRAFT           SigComp Torture Tests             May 16, 2003


   at (484)

   :end

   END-MESSAGE (0, 0, 0, 0, 0, 0, 0)

   at (512)

   :state_identifier

   byte (32, 84, 55, 65, 83, 248, 254, 122, 106, 151, 203, 121, 224, 24,
   194, 221, 214, 143, 254, 155)

   If the compressed message is 0x00 then the expected output of the
   code is 0x7465 7374 and a total of 21 UDVM cycles are expected to be
   used.  If the compressed message is 0x01 then the code should also
   output 0x7465 7374 but in this case using a total of 15 UDVM cycles.
   If the compressed message is 0x02, 0x03 or 0x04 then decompression
   failure should occur.

3.  Torture tests for dispatcher

   The following sections give code to test the various functions of the
   SigComp dispatcher.

3.1.  Useful Values

   This section gives assembly code to test that the SigComp "Useful
   Values" are correctly initialized in the UDVM memory.  It also tests
   that the UDVM is correctly terminated if the bytecode uses too many
   UDVM cycles or tries to write beyond the end of the available memory.

   The code tests that the following boundary cases have been correctly
   implemented:

   1. The bytecode uses exactly as many UDVM cycles as are available (in
   which case no problems should arise) or one cycle too many (in which
   case decompression failure should occur).

   2. The bytecode writes to the highest memory address available (in
   which case no problems should arise) or to the memory address
   immediately following the highest available address (in which case
   decompression failure should occur).

   :udvm_memory_size               pad (2)
   :cycles_per_bit                 pad (2)
   :sigcomp_version                pad (2)
   :partial_state_id_length        pad (2)
   :state_length                   pad (2)

   at (64)




Price et al.                                                   [Page 20]


INTERNET-DRAFT           SigComp Torture Tests             May 16, 2003



   :byte_copy_left                 pad (2)
   :byte_copy_right                pad (2)
   :remaining_cycles               pad (2)
   :check_memory                   pad (1)
   :check_memory_lsb               pad (1)
   :check_cycles                   pad (1)
   :check_cycles_lsb               pad (1)

   at (128)

   LOAD (byte_copy_left, 32)
   LOAD (byte_copy_right, 33)

   :test_version

   COMPARE ($sigcomp_version, 1, !, test_state_access, !)

   :test_state_access

   COMPARE ($partial_state_id_length, 0, !, test_length_equals_zero,
   test_state_length)

   :test_length_equals_zero

   COMPARE ($state_length, 0, !, end, !)

   :test_state_length

   COMPARE ($state_length, 960, !, test_udvm_memory, !)

   :test_udvm_memory

   INPUT-BYTES (1, check_memory_lsb, !)
   ADD ($check_memory, $udvm_memory_size)
   SUBTRACT ($check_memory, 1)
   COPY (32, 1, $check_memory)

   :test_udvm_cycles

   INPUT-BYTES (1, check_cycles_lsb, !)

   ; total_UDVM_cycles = cycles_per_bit * (8 * message_size + 1000)
   ;
   ;       = cycles_per_bit * (8 * (partial_state_id_length + 3) + 1000)

   LOAD (remaining_cycles, $partial_state_id_length)
   ADD ($remaining_cycles, 3)
   MULTIPLY ($remaining_cycles, 8)
   ADD ($remaining_cycles, 1000)
   MULTIPLY ($remaining_cycles, $cycles_per_bit)




Price et al.                                                   [Page 21]


INTERNET-DRAFT           SigComp Torture Tests             May 16, 2003


   ADD ($remaining_cycles, $check_cycles)

   set (cycles_used_by_bytecode, 982)

   SUBTRACT ($remaining_cycles, cycles_used_by_bytecode)
   COPY (32, $remaining_cycles, 32)

   :end

   END-MESSAGE (0, 0, 960, 64, 128, 6, 0)

   The bytecode must be executed a total of four times in order to fully
   test the SigComp Useful Values.  In the first case the bytecode
   should be uploaded as part of the SigComp message (no compressed data
   is required in this case).  This should cause the UDVM to request
   creation of a new state item, and should use a total of 966 UDVM
   cycles.

   Subsequent tests should access this state by uploading the state
   identifier as part of the SigComp message.  Note that the SigComp
   message should not contain a returned feedback item (as this would
   cause the bytecode to calculate the total number of available UDVM
   cycles incorrectly).

   A 2-byte compressed message is required for the second and subsequent
   cases: if the message is 0x0000 then the UDVM should successfully
   terminate using exactly the number of available UDVM cycles.
   However, if the message is 0x0001 then the UDVM should use too many
   cycles and hence terminate with decompression failure.  Furthermore
   if the message is 0x0100 then decompression failure should occur
   because the UDVM attempts to write beyond its available memory.

3.2.  Message-based transport

   This section provides a set of messages to test the SigComp header
   over a message-based transport such as UDP.  The messages test that
   the following boundary cases have been correctly implemented:

   1. The UDVM bytecode is copied to different areas of the UDVM memory.

   2. The decompression memory size is set to an incorrect value.

   3. The SigComp message is too short.

   4. The destination address is invalid.

   The basic version of the code used in the test is given below.  Note
   that the code is designed to calculate the decompression memory size
   based on the Useful Values provided to the UDVM:

   :udvm_memory_size               pad (2)




Price et al.                                                   [Page 22]


INTERNET-DRAFT           SigComp Torture Tests             May 16, 2003


   :cycles_per_bit                 pad (2)
   :sigcomp_version                pad (2)
   :partial_state_id_length        pad (2)
   :state_length                   pad (2)

   at (128)

   :code_start

   ADD ($udvm_memory_size, total_message_size)
   OUTPUT (udvm_memory_size, 2)
   END-MESSAGE (0, 0, 0, 0, 0, 0, 1)

   :code_end

   set (header_size, 3)
   set (code_size, (code_end - code_start))
   set (total_message_size, (header_size + code_size))

   A number of complete SigComp messages are given below, each
   containing some or all of the above code.  In each case it is
   indicated whether the message should successfully output the
   decompression memory size or whether it should cause a decompression
   failure to occur (together with the reason for the failure):

   SigComp message:                Effect:

   0xf8                            Fails (message too short)

   0xf800                          Fails (message too short)

   0xf800 e106 0011 2200 0223      Outputs the decompression_memory_size
   0x0000 0000 0000 01

   0xf800 f106 0011 2200 0223      Fails (message too short)
   0x0000 0000 0000 01

   0xf800 e006 0011 2200 0223      Fails (invalid destination address)
   0x0000 0000 0000 01

   0xf800 ee06 0011 2200 0223      Outputs the decompression_memory_size
   0x0000 0000 0000 01

   The messages should be decompressed in the order given to check that
   an error in one message does not interfere with the successful
   decompression of subsequent messages.

   The two messages that successfully decompress should each use a total
   of 5 UDVM cycles.






Price et al.                                                   [Page 23]


INTERNET-DRAFT           SigComp Torture Tests             May 16, 2003


3.3.  Stream-based transport

   This section provides a byte stream to test the SigComp header and
   delimiters over a stream-based transport such as TCP.  The byte
   stream tests all of the boundary cases covered in Section 3.2, as
   well as the following cases specific to stream-based transports:

   1. Quoted bytes are used by the record marking scheme.

   2. Multiple delimiters are used between the same pair of messages.

   3. Unnecessary delimiters are included at the start of the stream.

   The basic version of the code used in the test is given below.  Note
   that the code is designed to calculate the decompression memory size
   based on the Useful Values provided to the UDVM:

   :udvm_memory_size               pad (2)
   :cycles_per_bit                 pad (2)
   :sigcomp_version                pad (2)
   :partial_state_id_length        pad (2)
   :state_length                   pad (2)

   at (128)

   MULTIPLY ($udvm_memory_size, 2)
   OUTPUT (udvm_memory_size, 2)
   OUTPUT (test_record_marking, 5)
   END-MESSAGE (0, 0, 0, 0, 0, 0, 0)

   :test_record_marking

   byte (255, 255, 255, 255, 255)

   The above assembly code has been compiled and used to generate the
   following byte stream:

   0xffff f801 7108 0002 2200 0222 a092 0523 0000 0000 0000 00ff 00ff
   0x03ff ffff ffff ffff f801 7e08 0002 2200 0222 a3d2 0523 0000 0000
   0x0000 00ff 04ff ffff ffff ffff ffff ff

   Note that this byte stream can be divided into five distinct portions
   (two SigComp messages and three sets of delimiters) as illustrated
   below:

   Portion of byte stream:                                Meaning:

   0xffff                                                 Delimiter

   0xf801 7108 0002 2200 0222 a092 0523                   First message
   0x0000 0000 0000 00ff 00ff 03ff ffff




Price et al.                                                   [Page 24]


INTERNET-DRAFT           SigComp Torture Tests             May 16, 2003



   0xffff ffff                                            Delimiter

   0xf801 7e08 0002 2200 0222 a3d2 0523                   Second message
   0x0000 0000 0000 00ff 04ff ffff ff

   0xffff ffff ffff                                       Delimiter

   When the complete byte stream is supplied to the decompressor
   dispatcher, the record marking scheme should use the delimiters to
   partition the stream into two distinct SigComp messages.  Both of
   these messages should successfully output the decompression memory
   size (as a 2-byte value), followed by five consecutive 0xff bytes to
   test that the record marking scheme is working correctly.  A total of
   11 UDVM cycles should be used in each case.

   It must also be checked that the dispatcher can handle the same error
   cases as covered in Section 3.2.  Each of the following byte streams
   should cause a decompression failure to occur for the reason stated:

   Byte stream:                                      Reason for failure:

   0xf8ff ff                                         Message too short

   0xf800 ffff                                       Message too short

   0xf801 8108 0002 2200 0222 a092 0523 ffff         Message too short
   0x0000 0000 0000 00ff 00ff 03ff ffff

   0xf801 7008 0002 2200 0222 a092 0523 ffff         Invalid destination
   0x0000 0000 0000 00ff 04ff ffff ff

   Note that when a decompression failure occurs it is an implementation
   decision whether to close the entire stream or whether to ignore the
   error and attempt to decompress subsequent messages in the stream.

3.4.  Input past the end of a message

   This section gives assembly code to test that the implementation
   correctly handles input past the end of a SigComp message.  The code
   is designed to test that the following boundary cases have been
   correctly implemented:

   1. An INPUT instruction requests data that lies beyond the end of the
   message.  In this case the dispatcher should not return any data to
   the UDVM.  Moreover, the message bytes held by the dispatcher should
   still be available for retrieval by subsequent INPUT instructions.

   2. The INPUT-BYTES instruction is used after part of a byte has been
   inputted (e.g. by the INPUT-BITS instruction).  In this case the





Price et al.                                                   [Page 25]


INTERNET-DRAFT           SigComp Torture Tests             May 16, 2003


   remaining partial byte should be discarded, even if the INPUT-BYTES
   instruction requests data that lies beyond the end of the message.

   at (64)

   :byte_copy_left                 pad (2)
   :byte_copy_right                pad (2)
   :input_bit_order                pad (2)
   :result                         pad (1)
   :result_lsb                     pad (6)
   :right

   at (128)

   LOAD (byte_copy_left, result)
   LOAD (byte_copy_right, right)

   :start

   ; Input bits to ensure that the remaining message is not byte aligned

   INPUT-BITS (9, result, !)

   ; Attempt to read 7 bytes

   INPUT-BYTES (7, result, next_bytes)
   OUTPUT (result, 7)
   JUMP (bits)

   :next_bytes

   ; Read 7 bits - this should remove the byte alignment of the message

   ; If the bits have not been thrown away where they should then the
   ; message will be 1 byte longer than necessary

   INPUT-BITS (7, result, !)

   ; Read 2 bytes

   INPUT-BYTES (2, result, !)
   OUTPUT (result, 2)

   :bits

   ; Attempt to read 16 bits

   INPUT-BITS (16, result, next_bits)
   OUTPUT (result, 2)
   JUMP (end_message)





Price et al.                                                   [Page 26]


INTERNET-DRAFT           SigComp Torture Tests             May 16, 2003


   :next_bits

   ; Read 8 bits

   INPUT-BITS (8, result, !)
   OUTPUT (result_lsb, 1)

   :end_message

   END-MESSAGE (0, 0, 0, 0, 0, 0, 0)

   If the compressed message is 0xfffa 0068 6921 then the code is
   expected to terminate successfully with the output 0x6869 21, and a
   total of 23 UDVM cycles should be used.  However, if the compressed
   message is 0xfffa 0068 69 then decompression failure is expected to
   occur (after outputting the message 0x6869).

4.  Torture tests for state handler

   The following sections give code to test the various functions of the
   SigComp state handler.

4.1.  SigComp feedback mechanism

   This section gives assembly code to test the SigComp feedback
   mechanism.  The code is designed to test that the following boundary
   cases have been correctly implemented:

   1. Both the short and the long versions of the SigComp feedback item
   are used.

   2. The chain of returned SigComp parameters is terminated by a non-
   zero value.

   at (64)

   :type                           pad (1)
   :type_lsb                       pad (1)

   :requested_feedback_location    pad (1)
   :requested_feedback_length      pad (1)
   :requested_feedback_bytes       pad (127)

   :returned_parameters_location   pad (2)
   :length_of_partial_state_id_a   pad (1)
   :partial_state_identifier_a     pad (6)
   :length_of_partial_state_id_b   pad (1)
   :partial_state_identifier_b     pad (12)
   :length_of_partial_state_id_c   pad (1)
   :partial_state_identifier_c     pad (20)
   :terminate_returned_parameters  pad (1)




Price et al.                                                   [Page 27]


INTERNET-DRAFT           SigComp Torture Tests             May 16, 2003



   align (128)

   set (q_bit, 1)
   set (s_bit, 0)
   set (i_bit, 0)
   set (flags, (((4 * q_bit) + (2 * s_bit)) + i_bit))

   INPUT-BYTES (1, type_lsb, !)
   COMPARE ($type, 1, short_feedback_item, long_feedback_item, !)

   :short_feedback_item

   set (requested_feedback_data, 127)
   set (short_feedback_value, ((flags * 256) + requested_feedback_data))

   LOAD (requested_feedback_location, short_feedback_value)
   JUMP (return_sigcomp_parameters)

   :long_feedback_item

   set (requested_feedback_field, 255)
   set (long_feedback_value, ((flags * 256) + requested_feedback_field))

   LOAD (requested_feedback_location, long_feedback_value)
   MEMSET (requested_feedback_bytes, 127, 1, 1)

   :return_sigcomp_parameters

   set (cpb, 0)
   set (dms, 1)
   set (sms, 0)
   set (sigcomp_version, 1)

   set (parameters_msb, (((64 * cpb) + (8 * dms)) + sms))
   set (sigcomp_parameters, ((256 * parameters_msb) + sigcomp_version))

   LOAD (returned_parameters_location, sigcomp_parameters)

   LOAD (length_of_partial_state_id_a, 1536)
   LOAD (length_of_partial_state_id_b, 3072)
   LOAD (length_of_partial_state_id_c, 5120)
   LOAD (terminate_returned_parameters, 5376)

   MEMSET (partial_state_identifier_a, 6, 0, 1)
   MEMSET (partial_state_identifier_b, 12, 0, 1)
   MEMSET (partial_state_identifier_c, 20, 0, 1)

   END-MESSAGE (requested_feedback_location,
   returned_parameters_location, 0, 0, 0, 0, 0)





Price et al.                                                   [Page 28]


INTERNET-DRAFT           SigComp Torture Tests             May 16, 2003


   When the above code is executed it supplies a requested feedback item
   to the state handler.  If the compressed message is 0x00 then the
   short (1-byte) version of the feedback is used.  Assuming that the
   feedback request is successful the feedback item should be returned
   in the first SigComp message to be sent in the reverse direction.
   The SigComp message returning the feedback should begin as follows:

   +---+---+---+---+---+---+---+---+
   | 1   1   1   1   1   1 |   X   |   first header byte
   +---+---+---+---+---+---+---+---+
   | 0 |            127            |   returned feedback field
   +---+---+---+---+---+---+---+---+

   So the first 2 bytes of the returning SigComp message should be
   0xfn7f where n = c, d, e or f (the choice of n is determined by the
   compressor generating the returning SigComp message, which is not
   under the control of the above code).  Executing the bytecode in this
   case should cost a total of 52 UDVM cycles.

   If the compressed message is 0x01 then the long version of the
   feedback item is used.  In this case the SigComp message returning
   the feedback should begin as follows:

   +---+---+---+---+---+---+---+---+
   | 1   1   1   1   1   1 |   X   |   first header byte
   +---+---+---+---+---+---+---+---+
   | 1 |            127            |   returned feedback length
   +---+---+---+---+---+---+---+---+
   |               1               |              ^
   +---+---+---+---+---+---+---+---+              |
   |               2               |              |
   +---+---+---+---+---+---+---+---+
   |               3               |   returned feedback field
   +---+---+---+---+---+---+---+---+
             :           :                        |
   +---+---+---+---+---+---+---+---+              |
   |              127              |              v
   +---+---+---+---+---+---+---+---+

   So the first 129 bytes of the SigComp message should be 0xfnff 0102
   0304 ... 7e7f where n = c, d, e or f.  Executing the bytecode in this
   case should cost a total of 179 UDVM cycles.

   As well as testing the requested and returned feedback items, the
   above code also announces values for each of the SigComp parameters.
   The supplied version of the code announces only the minimum possible
   values for the cycles_per_bit, decompression_memory_size,
   state_memory_size and SigComp_version (although this can easily be
   adjusted to test different values for these parameters).






Price et al.                                                   [Page 29]


INTERNET-DRAFT           SigComp Torture Tests             May 16, 2003


   The code should also announce the availability of state items with
   the following partial state identifiers:

   0x0001 0203 0405
   0x0001 0203 0405 0607 0809 0a0b
   0x0001 0203 0405 0607 0809 0a0b 0c0d 0e0f 1011 1213

   Note that different implementations may make use of the announcement
   information in different ways.  It is a valid implementation choice
   to simply ignore all of the announcement data and use only the
   minimum resources that are guaranteed to be available to all
   endpoints.  However the above code is useful for checking that an
   endpoint interprets the announcement data correctly (in particular
   ensuring that it does not mistakenly use resources that have not in
   fact been announced).

4.2.  State memory management

   The following section gives assembly code to test the memory
   management features of the state handler.  The code checks that the
   correct states are retained by the state handler when insufficient
   memory is available to store all of the requested states.

   The code is designed to test that the following boundary cases have
   been correctly implemented:

   1. A state item is created that exceeds the total state_memory_size
   for the compartment.

   2. States are created with a non-zero state_retention_priority.

   3. A new state item is created that has a lower
   state_retention_priority than existing state items in the
   compartment.

   For the duration of this test it is assumed that all states will be
   saved in a single compartment with a state_memory_size of 2048 bytes.

   at (64)

   :byte_copy_left                 pad (2)
   :byte_copy_right                pad (2)
   :order                          pad (2)
   :type                           pad (1)
   :type_lsb                       pad (1)
   :state_length                   pad (2)
   :state_retention_priority       pad (2)

   at (128)

   MULTILOAD (byte_copy_left, 2, state_start, order_data)




Price et al.                                                   [Page 30]


INTERNET-DRAFT           SigComp Torture Tests             May 16, 2003


   INPUT-BYTES (1, type_lsb, !)
   COMPARE ($type, 5, general_test, large_state, verify_state)

   :general_test

   COMPARE ($type, 3, start, state_present, state_not_present)

   :start

   MULTIPLY ($type, 6)
   ADD ($type, order_data)
   LOAD (order, $type)
   ADD ($type, 6)

   :loop

   COPY ($order, 2, state_retention_priority)
   COMPARE ($order, $type, continue, end, !)

   :continue

   LOAD (state_length, $state_retention_priority)
   MULTIPLY ($state_length, 256)
   STATE-CREATE ($state_length, state_start, 0, 6,
   $state_retention_priority)

   ADD ($order, 2)
   JUMP (loop)

   :state_present

   STATE-ACCESS (state_identifier_a, 6, 0, 0, 0, 0)
   STATE-ACCESS (state_identifier_b, 6, 0, 0, 0, 0)
   STATE-ACCESS (state_identifier_c, 6, 0, 0, 0, 0)
   STATE-ACCESS (state_identifier_e, 6, 0, 0, 0, 0)
   JUMP (end)

   :state_not_present

   STATE-ACCESS (state_identifier_d, 6, 0, 0, 0, 0)
   JUMP (end)

   :large_state

   STATE-CREATE (2048, state_start, 0, 6, 0)
   JUMP (end)

   :verify_state

   STATE-ACCESS (large_state_identifier, 6, 0, 0, 0, 0)
   JUMP (end)




Price et al.                                                   [Page 31]


INTERNET-DRAFT           SigComp Torture Tests             May 16, 2003



   :end

   END-MESSAGE (0, 0, 0, 0, 0, 0, 0)

   at (512)

   :state_start

   byte (116, 101, 115, 116)

   :order_data

   word (0, 1, 2, 3, 4, 3, 2, 1, 0)

   :state_identifier_a

   byte (142, 234, 75, 67, 167, 135)

   :state_identifier_b

   byte (249, 1, 14, 239, 86, 123)

   :state_identifier_c

   byte (35, 154, 52, 107, 21, 166)

   :state_identifier_d

   byte (180, 15, 192, 228, 77, 44)

   :state_identifier_e

   byte (212, 162, 33, 71, 230, 10)

   :large_state_identifier

   byte (239, 242, 188, 15, 182, 175)

   The above code must be executed a total of 7 times in order to
   complete the test.  Each time the code is executed a 1-byte
   compressed message should be provided, taking the values 0x00 to 0x06
   in ascending order (so the compressed message should be 0x00 the
   first time the code is run, 0x01 the second and so on).

   When the compressed message is 0x00, 0x01 or 0x02 the code makes
   three state creation requests per message, establishing a total of
   nine states in the compartment.  Note however that as new states are
   created some of the existing states should be pushed out of the
   compartment due to lack of memory.





Price et al.                                                   [Page 32]


INTERNET-DRAFT           SigComp Torture Tests             May 16, 2003


   When the compressed message is 0x03 the code checks that the correct
   state items remain in the compartment.  Decompression should
   successfully terminate in this case.

   When the compressed message is 0x04 the code attempts to access a
   state that has been pushed out of the compartment by states of higher
   priority.  Decompression failure should occur in this case because
   the relevant state is no longer available.

   When the compressed message is 0x05 the code attempts to create a
   state that is larger than the entire compartment.  In this case the
   state handler should save only the first part of the requested state.

   When the compressed message is 0x06 the code verifies that the first
   part of the large state item created by the previous message has been
   successfully saved.

   The cost in UDVM cycles for each compressed message is given below
   (except for message 0x04 where decompression failure should occur):

   Compressed message:   0x00   0x01   0x02   0x03   0x04   0x05   0x06

   Cost in UDVM cycles:   811   2603    811   1805    N/A   2057   1993

4.3.  Multiple compartments

   This section gives assembly code to test the interaction between
   multiple SigComp compartments.  The code is designed to test that the
   following boundary cases have been correctly implemented:

   1. The same state item is saved in more than one compartment.

   2. A state item stored in multiple compartments has the same state
   identifier but a different state_retention_priority in each case.

   3. A state item is deleted from one compartment but still belongs to
   a different compartment.

   4. A state item belonging to multiple compartments is deleted from
   every compartment to which it belongs.

   The test requires a total of three compartments to be available,
   which will be referred to as Compartment 0, Compartment 1 and
   Compartment 2.  Each of the three compartments should have a
   state_memory_size of 2048 bytes.

   The assembly code for the test is given below:

   at (64)

   :byte_copy_left                 pad (2)




Price et al.                                                   [Page 33]


INTERNET-DRAFT           SigComp Torture Tests             May 16, 2003


   :byte_copy_right                pad (2)
   :type                           pad (1)
   :type_lsb                       pad (1)

   at (128)

   MULTILOAD (byte_copy_left, 2, state_start, state_end)
   INPUT-BYTES (1, type_lsb, !)
   COMPARE ($type, 3, create_state, overwrite_state, temp)

   :temp

   COMPARE ($type, 5, overwrite_state, access_state, error_conditions)

   :create_state

   ADD ($type, state_start)
   STATE-CREATE (448, $type, 0, 6, 0)

   :duplicate_state

   ADD ($type, 3)
   STATE-CREATE (448, $type, 0, 6, 0)

   SUBTRACT ($type, temp_one)
   REMAINDER ($type, 3)
   ADD ($type, temp_two)
   STATE-CREATE (448, $type, 0, 6, 0)

   :common_state

   STATE-CREATE (448, temp_three, 0, 6, $type)
   JUMP (end)

   :overwrite_state

   STATE-CREATE (1984, 32, 0, 6, 0)
   JUMP (end)

   :access_state

   STATE-ACCESS (state_identifier_c, 6, 0, 0, 0, 0)
   STATE-ACCESS (state_identifier_d, 6, 0, 0, 0, 0)
   STATE-ACCESS (state_identifier_f, 6, 0, 0, 0, 0)
   STATE-ACCESS (state_identifier_g, 6, 0, 0, 0, 0)

   :end

   END-MESSAGE (0, 0, 0, 0, 0, 0, 0)

   :error_conditions




Price et al.                                                   [Page 34]


INTERNET-DRAFT           SigComp Torture Tests             May 16, 2003



   COMPARE ($type, 7, access_a, access_b, access_e)

   :access_a

   STATE-ACCESS (state_identifier_a, 6, 0, 0, 0, 0)
   JUMP (end)

   :access_b

   STATE-ACCESS (state_identifier_b, 6, 0, 0, 0, 0)
   JUMP (end)

   :access_e

   STATE-ACCESS (state_identifier_e, 6, 0, 0, 0, 0)
   JUMP (end)

   at (512)

   :state_start

   byte (0, 1, 2, 3, 4, 5, 6)

   :state_end

   set (temp_one, (state_start + 2))
   set (temp_two, (state_start + 3))
   set (temp_three, (state_end - 1))

   :state_identifier_a

   byte (172, 166, 11, 142, 178, 131)

   :state_identifier_b

   byte (157, 191, 175, 198, 61, 210)

   :state_identifier_c

   byte (52, 197, 217, 29, 83, 97)

   :state_identifier_d

   byte (189, 214, 186, 42, 198, 90)

   :state_identifier_e

   byte (71, 194, 24, 20, 238, 7)

   :state_identifier_f




Price et al.                                                   [Page 35]


INTERNET-DRAFT           SigComp Torture Tests             May 16, 2003



   byte (194, 117, 148, 29, 215, 161)

   :state_identifier_g

   byte (72, 135, 156, 141, 233, 14)

   The above code must be executed a total of 9 times in order to
   complete the test.  Each time the code is executed a 1-byte
   compressed message N should be provided, taking the values 0x00 to
   0x08 in ascending order (so the compressed message should be 0x00 the
   first time the code is run, 0x01 the second and so on).

   If the code makes a state creation request then the state must be
   saved in Compartment (N modulo 3).

   When the compressed message is 0x00, 0x01 or 0x02 the code makes four
   state creation requests in compartments 0, 1 and 2 respectively.
   This creates a total of seven distinct state items referred to as
   State A through to State G.  The states should be distributed amongst
   the three compartments as illustrated in Figure 1 (note that some
   states belong to more than one compartment).

   When the compressed message is 0x03 or 0x04 the code overwrites all
   of the states in compartments 0 and 1 respectively.  This means that
   states A, B and E should be unavailable because they are no longer
   present in any of the three compartments.

   When the compressed message is 0x05 the code checks that the states
   C, D, F and G are still available.  Decompression should successfully
   terminate in this case.

   When the compressed message is 0x06, 0x07 or 0x08 the code attempts
   to access states A, B and E respectively.  Decompression failure
   should occur in this case because the relevant states are no longer
   available.

   The cost in UDVM cycles for each compressed message is given below
   (except for messages 0x06, 0x07 and 0x08 where decompression failure
   is expected to occur):

   Compressed message:  0x00 0x01 0x02 0x03 0x04 0x05 0x06 0x07 0x08

   Cost in UDVM cycles: 1809 1809 1809 1993 1994 1804  N/A  N/A  N/A











Price et al.                                                   [Page 36]


INTERNET-DRAFT           SigComp Torture Tests             May 16, 2003


                     +-----------------------------+
                     |        Compartment 0        |
                     |                             |
                     |                             |
                     |           State A           |
                     |                             |
                     |         +-------------------+---------+
                     |         |                   |         |
                     |         |                   |         |
                     |         |           State D |         |
                     |         |                   |         |
                     |         |                   |         |
           +---------+---------+---------+         |         |
           |         |         |         |         |         |
           |         |         |         |         |         |
           |         | State E | State G |         | State C |
           |         |         |         |         |         |
           |         |         |         |         |         |
           |         +---------+---------+---------+         |
           |                   |         |                   |
           |                   |         |                   |
           |           State B | State F |                   |
           |                   |         |                   |
           |                   |         |   Compartment 2   |
           |                   +---------+-------------------+
           |                             |
           |                             |
           |                             |
           |                             |
           |        Compartment 1        |
           +-----------------------------+

            Figure 1: States created in the three compartments

5.  Security considerations

   This draft describes implementation options for the SigComp protocol
   [RFC-3320].  Consequently the security considerations for this draft
   match those of SigComp.

6.  Authors' addresses

   Richard Price        Tel: +44 1794 833681
   Email:               richard.price@roke.co.uk

   Abigail Surtees      Tel: +44 1794 833131
   Email:               abigail.surtees@roke.co.uk

   Roke Manor Research Ltd
   Romsey, Hants, SO51 0ZN
   United Kingdom




Price et al.                                                   [Page 37]


INTERNET-DRAFT           SigComp Torture Tests             May 16, 2003


7.  References

   [USERGUIDE] "SigComp User Guide", R. Price et al.,
               <draft-price-rohc-sigcomp-user-guide-02.txt>, May 2003

   [RFC-2026]  "The Internet Standards Process - Revision 3", Scott
               Bradner, Internet Engineering Task Force, October 1996

   [RFC-2119]  "Key words for use in RFCs to Indicate Requirement
               Levels", Scott Bradner, Internet Engineering Task Force,
               March 1997

   [RFC-3320]  "Signaling Compression (SigComp)", R. Price et al.,
               Internet Engineering Task Force, January 2003









































Price et al.                                                   [Page 38]


INTERNET-DRAFT           SigComp Torture Tests             May 16, 2003


Appendix A: UDVM bytecode for the torture tests

   The following sections list the raw UDVM bytecode generated for each
   test.  The bytecode is presented in the form of a complete SigComp
   message, including the appropriate header and any compressed message
   required by the code.

   In some cases the test is designed to be run several times with
   different compressed messages appended to the code; for each of these
   tests the first compressed message is always supplied.

   Note that the different assemblers can output different bytecode for
   the same piece of assembly code, so a valid assembler can produce
   results different from those presented below.  However, the following
   bytecode should always generate the same results on any UDVM.

A.1.1.  Bit manipulation

   0xf80a 7116 a07f 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000
   0x0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000
   0x0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000
   0x0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000
   0x0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000
   0x01c0 00ff 8055 5502 202a 0321 0420 0305 21ff 2286 0401 20c0 ff02
   0x2060 0320 0421 6005 2061 2286 0423

A.1.2.  Arithmetic

   0xf80a a11c 01a0 459f 9f07 2201 16a0 7600 0000 0000 0000 0000 0000
   0x0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000
   0x0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000
   0x0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000
   0x0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000
   0x06c0 00ff 9941 0720 0108 20a3 e909 20a0 650a 200b 2286 0406 21c0
   0xff07 2162 0821 6109 2061 0a21 6222 8604 2300

A.1.3.  Sorting

   0xf80d c10c 8802 170b 8802 1722 a12e 2d23 0000 0000 0000 0000 0000
   0x0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000
   0x0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000
   0x0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000
   0x0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000
   0x0000 0a00 0a00 1100 0700 1600 0300 0300 0300 1300 0100 1000 0e00
   0x0800 0200 0d00 1400 1200 1700 0f00 1500 0c00 0600 096e 6720 6975
   0x6920 7469 742c 2079 6f75 2720 5346 6f6e 6761 2075 7272 646f 2074
   0x6f6e 2e2e 0070 6570 206e 7472 656e 69

A.1.4.  SHA-1

   0xf808 710d a0c3 03a0 4422 a044 140d a0c6 38a0 4422 a044 140e 86a0




Price et al.                                                   [Page 39]


INTERNET-DRAFT           SigComp Torture Tests             May 16, 2003


   0xfe0e a042 a0ff 0da0 feff a044 22a0 4414 0e86 a0ff 0ea0 42a1 070d
   0xa0ff a280 a0ff 22a0 ff14 2300 0000 0000 0000 6162 6361 6263 6462
   0x6364 6563 6465 6664 6566 6765 6667 6866 6768 6967 6869 6a68 696a
   0x6b69 6a6b 6c6a 6b6c 6d6b 6c6d 6e6c 6d6e 6f6d 6e6f 706e 6f70 7161
   0x3031 3233 3435 3637

A.1.5.  LOAD and MULTILOAD

   0xf803 710e 87a0 840e a082 c080 0ec0 80a0 860e c084 c084 2287 081c
   0x01a0 419f 8908 2002 0620 3c0f 6003 a0a3 a0b2 870f 6004 2a87 c080
   0xc084 2287 0823 00

A.1.6.  COPY

   0xf801 e10e 208e 0e86 860e a042 8712 2087 210e 8680 4100 1286 a04c
   0xa041 2220 a06d 23

A.1.7.  COPY-LITERAL and COPY-OFFSET

   0xf802 f10e 208e 0e86 860e a042 870e a044 2113 2087 2213 a044 0822
   0x0e86 a042 0ea0 42a0 4a14 0806 220e 6301 1463 0522 2220 3023

A.1.8.  MEMSET

   0xf801 810e 8687 0ea0 42a0 8115 86a0 8100 0115 a081 0f86 0f22 8710
   0x23

A.1.9.  CRC

   0xf801 a115 a046 1801 0115 a05e 1487 011c 02a0 449f 931b 62a0 462c
   0x9f8d 2362 cb

A.1.10.  INPUT-BITS

   0xf801 511d 62a0 4614 22a0 4602 0622 010a 2207 0622 0116 ee23 932e
   0xac71

A.1.11.  INPUT-HUFFMAN

   0xf801 d11e a046 1c02 6200 6262 6200 ff00 22a0 4602 0622 010a 2207
   0x0622 0116 e623 932e ac71 66d8 6f

A.1.12.  INPUT-BYTES

   0xf802 710e 86a0 480e a042 a04c 1d62 a046 1d22 a046 0206 2202 0a22
   0x071c 62a0 480e 22a0 4862 0622 0116 e523 932e ac71 66d8 6fb1 592b
   0xdc9a 9734 d847 a733 874e 1bcb cd51 b5dc 9659 9d6a

A.1.13.  Stack manipulation

   0xf814 110e a046 8610 0210 6010 a042 2286 0811 8611 6311 a046 2286




Price et al.                                                   [Page 40]


INTERNET-DRAFT           SigComp Torture Tests             May 16, 2003


   0x0816 2800 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000
   0x0000 0000 0000 0000 0000 0000 0000 000e a046 200e a048 a140 0724
   0x8818 3400 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000
   0x0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000
   0x0018 6400 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000
   0x0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000
   0x0000 0000 0000 0000 0000 0000 000e a046 a17f 0ea1 7f1a 0fa1 b003
   0x0180 c001 8f19 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000
   0x0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000
   0x0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000
   0x0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000
   0x0000 0000 0000 0000 0000 0023

A.1.14.  Program flow

   0xf803 f10e a044 040e 86a0 9207 20a0 9022 a043 0116 6006 2101 0e86
   0xa084 0720 a0a1 22a0 4301 1761 0660 f106 0722 010e 86a0 8407 20a0
   0xb622 a043 011a 0462 0860 9fdc f123

A.1.15.  State creation

   0xf819 e11c 01a0 459f 9f04 220d 1762 8f0c 0606 200a 8900 1400 0422
   0x0117 628f 0a06 0621 a20a 0604 2201 1762 8f0e 0606 2300 000a 8900
   0x1400 2300 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000
   0x0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000
   0x0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000
   0x0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000
   0x0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000
   0x0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000
   0x0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000
   0x0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000
   0x0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000
   0x0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000
   0x0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000
   0x0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000
   0x0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0022 a206
   0x0416 e074 6573 7420 5437 4153 f8fe 7a6a 97cb 79e0 18c2 ddd6 8ffe
   0x9b00

A.1.16.  STATE-ACCESS

   0xf819 411c 01a0 459f 9f17 6201 060d 1c1f 8914 0000 0089 1f89 1406
   0x04a0 4600 22a0 4604 16a1 4517 6203 0610 1b1f 8714 0000 0000 16a1
   0x351f 8913 0604 a046 0016 a12a 1f89 1406 05a0 4600 16a1 1f00 0000
   0x0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000
   0x0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000
   0x0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000
   0x0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000
   0x0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000
   0x0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000
   0x0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000




Price et al.                                                   [Page 41]


INTERNET-DRAFT           SigComp Torture Tests             May 16, 2003


   0x0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000
   0x0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000
   0x0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000
   0x0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0023 0000 0000
   0x0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0020 5437
   0x4153 f8fe 7a6a 97cb 79e0 18c2 ddd6 8ffe 9b00

A.2.1.  Useful Values

   0xf805 b10e 8620 0ea0 4221 1742 019f 9808 9f98 1743 009f 9007 0d17
   0x4400 fb3d fb17 44a3 c0fc 07fc 1c01 a047 f506 2340 0723 0112 2001
   0x631c 01a0 49e6 0ea0 4443 0622 0308 2208 0622 a3e8 0822 4106 2264
   0x0722 a3d6 1220 6220 2300 00a3 c086 8706 0000

A.2.2.  Message-based transport

   The bytecode for this test is given in Section 3.2.

A.2.3.  Stream-based transport

   The bytecode for this test is given in Section 3.3.

A.2.4.  Input past the end of a message

   0xf804 010e 86a0 460e a042 a04d 1d09 a046 9f96 1c07 a046 0b22 a046
   0x0716 121d 07a0 469f 851c 02a0 469f 7f22 a046 021d 10a0 460b 22a0
   0x4602 160c 1d08 a046 9f6a 22a0 4701 23

A.3.1.  SigComp feedback mechanism

   0xf805 031c 01a0 419f 1f17 6001 070e 9f19 0ea0 42a4 7f16 0e0e a042
   0xa4ff 15a0 44a0 7f01 010e a0c3 a801 0ea0 c5a6 000e a0cc ac00 0ea0
   0xd9b4 000e a0ee b500 15a0 c606 0001 15a0 cd0c 0001 15a0 da14 0001
   0x23a0 42a0 c300

A.3.2.  State memory management

   0xf81b a10f 8602 89a2 041c 01a0 479f 9917 6305 08a0 68a0 7017 6303
   0x0734 a056 0823 0606 23a2 040e a044 6306 2306 1262 02a0 4a17 6263
   0x08a0 589f 710e a048 6508 2488 2064 8900 0665 0622 0216 e31f a216
   0x0600 0000 001f a21c 0600 0000 001f a222 0600 0000 001f a22e 0600
   0x0000 0016 1e1f a228 0600 0000 0016 1420 8b89 0006 0016 0c1f a234
   0x0600 0000 0016 0223 0000 0000 0000 0000 0000 0000 0000 0000 0000
   0x0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000
   0x0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000
   0x0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000
   0x0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000
   0x0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000
   0x0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000
   0x0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000
   0x0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000




Price et al.                                                   [Page 42]


INTERNET-DRAFT           SigComp Torture Tests             May 16, 2003


   0x0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0074 6573
   0x7400 0000 0100 0200 0300 0400 0300 0200 0100 008e ea4b 43a7 87f9
   0x010e ef56 7b23 9a34 6b15 a6b4 0fc0 e44d 2cd4 a221 47e6 0aef f2bc
   0x0fb6 af00

A.3.3.  Multiple compartments

   0xf81b 110f 8602 89a2 071c 01a0 459f 9917 6203 0d3d 0617 6205 3786
   0xa068 0622 8920 a1c0 6200 0600 0622 0320 a1c0 6200 0600 0722 a202
   0x0a22 0306 22a2 0320 a1c0 6200 0600 20a1 c0a2 0600 0662 162b 20a7
   0xc020 0006 0016 221f a213 0600 0000 001f a219 0600 0000 001f a225
   0x0600 0000 001f a22b 0600 0000 0023 0000 0000 0000 0017 6207 0610
   0x1a1f a207 0600 0000 0016 ea1f a20d 0600 0000 0016 e01f a21f 0600
   0x0000 0016 9fd6 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000
   0x0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000
   0x0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000
   0x0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000
   0x0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000
   0x0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000
   0x0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000
   0x0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000
   0x0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0102
   0x0304 0506 aca6 0b8e b283 9dbf afc6 3dd2 34c5 d91d 5361 bdd6 ba2a
   0xc65a 47c2 1814 ee07 c275 941d d7a1 4887 9c8d e90e 00































Price et al.                                                   [Page 43]