msc: add inter-MSC HO tests with A5 encryption

Related: SYS#5324
Change-Id: Ia1df783be33bf752d291acb857d3c48882c65975
This commit is contained in:
Neels Hofmeyr 2021-06-21 22:27:21 +02:00
parent 0d841d98b6
commit 666d39abb9
1 changed files with 61 additions and 6 deletions

View File

@ -5992,10 +5992,24 @@ private function f_tc_ho_inter_msc_out(charstring id, BSC_ConnHdlrPars pars) run
/* The target cell 017-017 LAC 1 is configured to be a remote MSC of name "msc-017-017-1".
* This MSC tries to reach the other MSC via GSUP. */
var template BSSMAP_IE_EncryptionInformation encryptionInformation;
var template BSSMAP_IE_ChosenEncryptionAlgorithm chosenEncryptionAlgorithm;
var template BSSMAP_IE_KC128 kC128;
var OCT1 a5_perm_alg;
f_get_expected_encryption(encryptionInformation, chosenEncryptionAlgorithm, kC128, a5_perm_alg);
var template PDU_BSSAP expect_ho_request := tr_BSSMAP_HandoverRequest(encryptionInformation, chosenEncryptionAlgorithm, kC128);
var octetstring remote_msc_name := '6D73632D3031372D3031372D3100'O; /* "msc-017-017-1\0" as octetstring */
var GSUP_PDU prep_ho_req;
GSUP.receive(tr_GSUP_E_AN_APDU(OSMO_GSUP_MSGT_E_PREPARE_HANDOVER_REQUEST,
pars.imsi, destination_name := remote_msc_name)) -> value prep_ho_req;
alt {
[] GSUP.receive(tr_GSUP_E_AN_APDU(OSMO_GSUP_MSGT_E_PREPARE_HANDOVER_REQUEST,
pars.imsi, destination_name := remote_msc_name,
an_apdu := t_GSUP_AN_APDU(OSMO_GSUP_AN_PROTO_48006, decmatch expect_ho_request))) -> value prep_ho_req;
[] GSUP.receive(tr_GSUP_E_AN_APDU(OSMO_GSUP_MSGT_E_PREPARE_HANDOVER_REQUEST)) {
setverdict(fail, "Wrong OSMO_GSUP_MSGT_E_PREPARE_HANDOVER_REQUEST message received");
mtc.stop;
}
}
var GSUP_IeValue source_name_ie;
f_gsup_find_ie(prep_ho_req, OSMO_GSUP_SOURCE_NAME_IE, source_name_ie);
@ -6006,7 +6020,8 @@ private function f_tc_ho_inter_msc_out(charstring id, BSC_ConnHdlrPars pars) run
var octetstring rr_ho_cmd_enc := enc_PDU_ML3_NW_MS(rr_ho_cmd);
var PDU_BSSAP ho_req_ack := valueof(ts_BSSMAP_HandoverRequestAcknowledge(rr_ho_cmd_enc, lengthof(rr_ho_cmd_enc),
aoIPTransportLayer := omit,
speechCodec := ts_BSSMAP_IE_SpeechCodec({ts_CodecFR})));
speechCodec := ts_BSSMAP_IE_SpeechCodec({ts_CodecFR}),
chosenEncryptionAlgorithm := chosenEncryptionAlgorithm));
GSUP.send(ts_GSUP_E_PrepareHandoverResult(
pars.imsi,
ho_number,
@ -6142,7 +6157,18 @@ private function f_tc_ho_inter_msc_out(charstring id, BSC_ConnHdlrPars pars) run
));
/* MSC asks local BSS to prepare Handover to it */
BSSAP.receive(tr_BSSMAP_HandoverRequest);
f_get_expected_encryption(encryptionInformation, chosenEncryptionAlgorithm, kC128, a5_perm_alg);
expect_ho_request := tr_BSSMAP_HandoverRequest(encryptionInformation, chosenEncryptionAlgorithm, kC128);
var PDU_BSSAP ho_request;
alt {
[] BSSAP.receive(expect_ho_request);
[] BSSAP.receive(tr_BSSMAP_HandoverRequest) -> value ho_request {
log("Error: Wrong handoverRequest received. Expected: ", expect_ho_request,
" got ", ho_request);
setverdict(fail, "Wrong handoverRequest received");
mtc.stop;
}
}
/* Make sure the new BSSAP conn continues with the correct N_SD sequence numbers */
f_bssmap_continue_after_n_sd(last_n_sd);
@ -6153,7 +6179,8 @@ private function f_tc_ho_inter_msc_out(charstring id, BSC_ConnHdlrPars pars) run
var BSSMAP_IE_AoIP_TransportLayerAddress tla :=
valueof(f_ts_BSSMAP_IE_AoIP_TLA(cpars.bss_rtp_ip, cpars.bss_rtp_port));
BSSAP.send(ts_BSSMAP_HandoverRequestAcknowledge(rr_ho_cmd_enc, lengthof(rr_ho_cmd_enc),
tla, ts_BSSMAP_IE_SpeechCodec({ts_CodecFR})));
tla, ts_BSSMAP_IE_SpeechCodec({ts_CodecFR}),
chosenEncryptionAlgorithm := chosenEncryptionAlgorithm));
/* HandoverCommand goes out via remote MSC-I */
var GSUP_PDU prep_subsq_ho_res;
@ -6190,15 +6217,40 @@ private function f_tc_ho_inter_msc_out(charstring id, BSC_ConnHdlrPars pars) run
setverdict(pass);
}
testcase TC_ho_inter_msc_out() runs on MTC_CT {
function f_tc_ho_inter_msc_out_a5(integer a5_n) runs on MTC_CT {
var BSC_ConnHdlr vc_conn;
f_init(1);
var BSC_ConnHdlrPars pars := f_init_pars(54);
pars.net.expect_ciph := a5_n > 0;
pars.net.expect_auth := pars.net.expect_ciph;
pars.net.kc_support := bit2oct('00000001'B << a5_n);
pars.cm2.classmarkInformationType2_oct5.a5_3 := '1'B;
pars.cm2.classmarkInformationType2_oct5.a5_2 := '0'B;
pars.cm2.classmarkInformationType2_oct5.cm3 := '1'B;
pars.cm3 := valueof(ts_CM3_default);
pars.use_umts_aka := true;
if (a5_n > 0) {
f_vty_config(MSCVTY, "network", "authentication required");
}
f_vty_config(MSCVTY, "network", "encryption a5 " & int2str(a5_n));
vc_conn := f_start_handler_with_pars(refers(f_tc_ho_inter_msc_out), pars, 0);
vc_conn.done;
}
testcase TC_ho_inter_msc_out() runs on MTC_CT {
f_tc_ho_inter_msc_out_a5(0);
}
testcase TC_ho_inter_msc_out_a5_1() runs on MTC_CT {
f_tc_ho_inter_msc_out_a5(1);
}
testcase TC_ho_inter_msc_out_a5_3() runs on MTC_CT {
f_tc_ho_inter_msc_out_a5(3);
}
testcase TC_ho_inter_msc_out_a5_4() runs on MTC_CT {
f_tc_ho_inter_msc_out_a5(4);
}
testcase TC_ho_inter_msc_out_ipv6() runs on MTC_CT {
var BSC_ConnHdlr vc_conn;
f_init(1);
@ -6683,6 +6735,9 @@ control {
execute( TC_ho_inter_bsc_ipv6() );
execute( TC_ho_inter_msc_out() );
execute( TC_ho_inter_msc_out_a5_1() );
execute( TC_ho_inter_msc_out_a5_3() );
execute( TC_ho_inter_msc_out_a5_4() );
execute( TC_ho_inter_msc_out_ipv6() );
execute( TC_lu_imsi_auth_tmsi_check_imei() );