1514 lines
52 KiB
Plaintext
1514 lines
52 KiB
Plaintext
module GGSN_Tests {
|
|
|
|
/* GGSN test suite in TTCN-3
|
|
* (C) 2017-2019 Harald Welte <laforge@gnumonks.org>
|
|
* (C) 2018-2019 sysmocom - s.f.m.c. GmbH
|
|
* All rights reserved.
|
|
*
|
|
* Released under the terms of GNU General Public License, Version 2 or
|
|
* (at your option) any later version.
|
|
*
|
|
* SPDX-License-Identifier: GPL-2.0-or-later
|
|
*/
|
|
|
|
|
|
import from General_Types all;
|
|
import from Osmocom_Types all;
|
|
import from IPL4asp_PortType all;
|
|
import from IPL4asp_Types all;
|
|
import from GTP_CodecPort all;
|
|
import from GTP_CodecPort_CtrlFunct all;
|
|
import from GTP_Templates all;
|
|
import from GTPC_Types all;
|
|
import from GTPU_Types all;
|
|
import from IPCP_Types all;
|
|
import from PAP_Types all;
|
|
import from IP_Types all;
|
|
import from ICMP_Types all;
|
|
import from ICMPv6_Types all;
|
|
import from Native_Functions all;
|
|
import from Osmocom_VTY_Functions all;
|
|
import from TELNETasp_PortType all;
|
|
|
|
const integer GTP0_PORT := 3386;
|
|
const integer GTP1C_PORT := 2123;
|
|
const integer GTP1U_PORT := 2152;
|
|
|
|
modulepar {
|
|
/* Default IP addresses. May be overridden by GGSN_Tests configuration files. */
|
|
|
|
/* The SGSN simulated by TTCN3 will bind to these addresses for GTP control and GTP user planes. */
|
|
charstring m_bind_ip_gtpc := "127.23.42.1";
|
|
charstring m_bind_ip_gtpu := "127.23.42.1";
|
|
|
|
/* Addresses the GGSN which is being tested is listening on for SGSN connections. */
|
|
charstring m_ggsn_ip_gtpc := "127.0.0.6";
|
|
charstring m_ggsn_ip_gtpu := "127.0.0.6";
|
|
|
|
/*
|
|
* Our tests expect to see these DNS servers in 'Create PDP context responses' sent by the GGSN.
|
|
* These addresses must therefore match 'ip[v6] dns' options configured in osmo-ggsn.conf.
|
|
*
|
|
* These addresses are not expected to serve actual DNS requests. However, tests may expect to be
|
|
* able to ping these addresses (currently, IPv4 addresses must respond with an ICMP 'echo reply',
|
|
* and IPv6 addresses may respond with either ICMPv6 'echo reply' or 'destination unreachable').
|
|
*/
|
|
charstring m_ggsn_ip4_dns1 := "192.168.100.1"
|
|
charstring m_ggsn_ip4_dns2 := "8.8.8.8"
|
|
charstring m_ggsn_ip6_dns1 := "2001:4860:4860::8888"
|
|
charstring m_ggsn_ip6_dns2 := "2001:4860:4860::8844"
|
|
|
|
/*
|
|
* Additional address ranges are defined in osmo-ggsn.conf from which addresses are assigned
|
|
* to MS "behind" the simulated SGSN. These addresses appear on tun devices used by osmo-ggsn.
|
|
* The tests expect to be able to send ping packets between any two simulated MS within the same
|
|
* address range. This requires IP forwarding to be enabled on the corresponding tun interfaces.
|
|
*/
|
|
|
|
/*
|
|
* Whether ggsn supports "(no) echo-interval" VTY command
|
|
* (osmo-ggsn.git Id2c84165dc59dff495106758146a701ca488834f).
|
|
* This option can be dropped after osmo-ggsn release > 1.4.0 exists.
|
|
*/
|
|
boolean m_ggsn_supports_echo_interval := true;
|
|
}
|
|
|
|
type set PdpContext {
|
|
hexstring imsi,
|
|
octetstring msisdn optional,
|
|
octetstring apn,
|
|
ProtConfigOptions pco_req optional,
|
|
ProtConfigOptions pco_neg optional,
|
|
EndUserAddress eua,
|
|
OCT16 ip6_prefix optional,
|
|
BIT4 nsapi,
|
|
/* TEI (Data) local side */
|
|
OCT4 teid,
|
|
/* TEI (Control) local side */
|
|
OCT4 teic,
|
|
/* TEI (Data) remote side */
|
|
OCT4 teid_remote,
|
|
/* TEI (Control) remote side */
|
|
OCT4 teic_remote
|
|
}
|
|
|
|
type component GT_CT {
|
|
port GTPC_PT GTPC;
|
|
port GTPU_PT GTPU;
|
|
|
|
var boolean g_initialized := false;
|
|
|
|
var OCT1 g_restart_ctr := '01'O;
|
|
/* FIXME: unify with g_bind_ip + parse from config file */
|
|
var OCT4 g_sgsn_ip_c;
|
|
var OCT4 g_sgsn_ip_u;
|
|
/* FIXME: parse remName from config file */
|
|
var GtpPeer g_peer_c := { connId := 0, remName := m_ggsn_ip_gtpc, remPort := GTP1C_PORT };
|
|
var GtpPeer g_peer_u := { connId := 0, remName := m_ggsn_ip_gtpu, remPort := GTP1U_PORT };
|
|
timer T_default := 3.0;
|
|
|
|
/* next to-be-sent GTP-C sequence number */
|
|
var uint16_t g_c_seq_nr;
|
|
/* next to-be-sent GTP-U sequence number */
|
|
var uint16_t g_d_seq_nr;
|
|
|
|
port TELNETasp_PT GGSNVTY;
|
|
var boolean use_gtpu_txseq := false;
|
|
var boolean g_use_echo := false;
|
|
}
|
|
|
|
private function f_init_vty() runs on GT_CT {
|
|
map(self:GGSNVTY, system:GGSNVTY);
|
|
f_vty_set_prompts(GGSNVTY);
|
|
f_vty_transceive(GGSNVTY, "enable");
|
|
}
|
|
|
|
private function f_vty_set_gpdu_txseq(boolean enable) runs on GT_CT {
|
|
f_vty_enter_config(GGSNVTY);
|
|
f_vty_transceive(GGSNVTY, "ggsn ggsn0");
|
|
|
|
f_vty_transceive(GGSNVTY, "apn internet");
|
|
if (enable) {
|
|
f_vty_transceive(GGSNVTY, "g-pdu tx-sequence-numbers");
|
|
} else {
|
|
f_vty_transceive(GGSNVTY, "no g-pdu tx-sequence-numbers");
|
|
}
|
|
f_vty_transceive(GGSNVTY, "exit");
|
|
|
|
f_vty_transceive(GGSNVTY, "apn inet6");
|
|
if (enable) {
|
|
f_vty_transceive(GGSNVTY, "g-pdu tx-sequence-numbers");
|
|
} else {
|
|
f_vty_transceive(GGSNVTY, "no g-pdu tx-sequence-numbers");
|
|
}
|
|
f_vty_transceive(GGSNVTY, "exit");
|
|
|
|
f_vty_transceive(GGSNVTY, "apn inet46");
|
|
if (enable) {
|
|
f_vty_transceive(GGSNVTY, "g-pdu tx-sequence-numbers");
|
|
} else {
|
|
f_vty_transceive(GGSNVTY, "no g-pdu tx-sequence-numbers");
|
|
}
|
|
f_vty_transceive(GGSNVTY, "end");
|
|
}
|
|
|
|
private function f_verify_gtpu_txseq(in PDU_GTPU gtpu, in boolean expect_gptu_txseq) return boolean {
|
|
if (expect_gptu_txseq) {
|
|
if (gtpu.s_bit != '1'B) {
|
|
log("GTPU sequence number expected but not present")
|
|
return false;
|
|
}
|
|
} else {
|
|
if (gtpu.s_bit != '0'B) {
|
|
log("GTPU sequence number not expected but present")
|
|
return false;
|
|
}
|
|
}
|
|
return true;
|
|
}
|
|
|
|
private function f_vty_enable_echo_interval(boolean enable) runs on GT_CT {
|
|
f_vty_enter_config(GGSNVTY);
|
|
f_vty_transceive(GGSNVTY, "ggsn ggsn0");
|
|
if (enable) {
|
|
f_vty_transceive(GGSNVTY, "echo-interval 5");
|
|
} else {
|
|
f_vty_transceive(GGSNVTY, "no echo-interval");
|
|
}
|
|
f_vty_transceive(GGSNVTY, "end");
|
|
}
|
|
|
|
function f_init() runs on GT_CT {
|
|
if (g_initialized == true) {
|
|
return;
|
|
}
|
|
g_initialized := true;
|
|
|
|
g_sgsn_ip_c := f_inet_addr(m_bind_ip_gtpc);
|
|
g_sgsn_ip_u := f_inet_addr(m_bind_ip_gtpu);
|
|
|
|
var Result res;
|
|
map(self:GTPC, system:GTPC);
|
|
res := GTP_CodecPort_CtrlFunct.f_IPL4_listen(GTPC, m_bind_ip_gtpc, GTP1C_PORT, {udp:={}});
|
|
log("GTP1C ConnectionID: ", res.connId);
|
|
g_peer_c.connId := res.connId;
|
|
|
|
map(self:GTPU, system:GTPU);
|
|
res := GTP_CodecPort_CtrlFunct.f_GTPU_listen(GTPU, m_bind_ip_gtpu, GTP1U_PORT, {udp:={}});
|
|
g_peer_u.connId:= res.connId;
|
|
|
|
g_restart_ctr := f_rnd_octstring(1);
|
|
g_c_seq_nr := f_rnd_int(65535);
|
|
g_d_seq_nr := f_rnd_int(65535);
|
|
|
|
f_init_vty();
|
|
f_vty_set_gpdu_txseq(use_gtpu_txseq);
|
|
if (m_ggsn_supports_echo_interval) {
|
|
f_vty_enable_echo_interval(g_use_echo);
|
|
}
|
|
}
|
|
|
|
/* Altstep implementing responses to any incoming echo requests */
|
|
altstep pingpong() runs on GT_CT {
|
|
var Gtp1cUnitdata ud;
|
|
var Gtp1uUnitdata udu;
|
|
[g_use_echo] GTPC.receive(tr_GTPC_PING(?)) -> value ud {
|
|
var uint16_t seq := oct2int(ud.gtpc.opt_part.sequenceNumber);
|
|
GTPC.send(ts_GTPC_PONG(ud.peer, seq, g_restart_ctr));
|
|
repeat;
|
|
};
|
|
[not g_use_echo] GTPC.receive(tr_GTPC_PING(?)) {
|
|
setverdict(fail, "GTP Echo Req rceived but not enabled in VTY");
|
|
};
|
|
[] T_default.timeout { setverdict(fail); };
|
|
}
|
|
|
|
/* 'internet' in DNS encoding */
|
|
const octetstring c_ApnInternet := '08696E7465726E6574'O;
|
|
const octetstring c_ApnInet6 := '05696E657436'O;
|
|
const octetstring c_ApnInet46 := '06696E65743436'O;
|
|
|
|
/* return random NSAPI */
|
|
function f_rnd_nsapi() return BIT4 {
|
|
return int2bit(f_rnd_int(16), 4);
|
|
}
|
|
|
|
/* return random TEI[DC] */
|
|
function f_rnd_tei() return OCT4 {
|
|
return int2oct(f_rnd_int(4294967296), 4);
|
|
}
|
|
|
|
/* define an (internal) representation of a PDP context */
|
|
template PdpContext t_DefinePDP(hexstring imsi, octetstring msisdn, octetstring apn,
|
|
EndUserAddress eua) := {
|
|
imsi := imsi,
|
|
msisdn := msisdn,
|
|
nsapi := f_rnd_nsapi(),
|
|
apn := apn,
|
|
pco_req := omit,
|
|
eua := eua,
|
|
teid := f_rnd_tei(),
|
|
teic := f_rnd_tei()
|
|
}
|
|
|
|
/* send GTP-C for a given context and increment sequence number */
|
|
function f_send_gtpc(in template Gtp1cUnitdata data) runs on GT_CT {
|
|
GTPC.send(data);
|
|
g_c_seq_nr := g_c_seq_nr + 1;
|
|
}
|
|
|
|
/* send GTP-U for a given context and increment sequence number */
|
|
function f_send_gtpu(inout PdpContext ctx, in octetstring data) runs on GT_CT {
|
|
if (use_gtpu_txseq) {
|
|
GTPU.send(ts_GTP1U_GPDU(g_peer_u, g_d_seq_nr, ctx.teid_remote, data));
|
|
g_d_seq_nr := g_d_seq_nr + 1;
|
|
} else {
|
|
GTPU.send(ts_GTP1U_GPDU(g_peer_u, omit, ctx.teid_remote, data));
|
|
}
|
|
}
|
|
|
|
function f_handle_create_req(inout PdpContext ctx, in Gtp1cUnitdata ud, in OCT1 exp_cause := '80'O) runs on GT_CT {
|
|
var CreatePDPContextResponse cpr := ud.gtpc.gtpc_pdu.createPDPContextResponse;
|
|
if (exp_cause == '80'O and exp_cause == cpr.cause.causevalue) {
|
|
/* Check if EUA type corresponds to requested type */
|
|
if (match(ctx.eua, t_EuaIPv4(?)) and
|
|
not match(cpr.endUserAddress, tr_EuaIPv4(?))){
|
|
setverdict(fail);
|
|
}
|
|
if (match(ctx.eua, t_EuaIPv6(?)) and
|
|
not match(cpr.endUserAddress, tr_EuaIPv6(?))) {
|
|
setverdict(fail);
|
|
}
|
|
if (match(ctx.eua, t_EuaIPv4v6(?, ?)) and
|
|
not match(cpr.endUserAddress, tr_EuaIPv4v6(?, ?))) {
|
|
setverdict(fail);
|
|
}
|
|
/* Check if PCO response corresponds to request */
|
|
if (ispresent(ctx.pco_req)) {
|
|
if (match(ctx.pco_req, ts_PCO_IPv4_DNS_CONT) and
|
|
not match(cpr.protConfigOptions, tr_PCO_IPv4_DNS_CONT_resp(?))) {
|
|
log("IPv4 DNS Container requested, but missing");
|
|
setverdict(fail);
|
|
}
|
|
if (match(ctx.pco_req, ts_PCO_IPv6_DNS) and
|
|
not match(cpr.protConfigOptions, tr_PCO_IPv6_DNS_resp(?))) {
|
|
log("IPv6 DNS Container requested, but missing");
|
|
setverdict(fail);
|
|
}
|
|
}
|
|
ctx.teid_remote := cpr.teidDataI.teidDataI;
|
|
ctx.teic_remote := cpr.teidControlPlane.teidControlPlane;
|
|
ctx.eua := cpr.endUserAddress;
|
|
ctx.pco_neg := cpr.protConfigOptions;
|
|
setverdict(pass);
|
|
} else if (exp_cause != '80'O and exp_cause == cpr.cause.causevalue) {
|
|
if (ispresent(cpr.endUserAddress)) {
|
|
log("EUA received on createPDPContextResponse cause=" & oct2str(cpr.cause.causevalue));
|
|
setverdict(fail);
|
|
}
|
|
setverdict(pass);
|
|
} else {
|
|
setverdict(fail);
|
|
}
|
|
}
|
|
|
|
/* send a PDP context activation */
|
|
function f_pdp_ctx_act(inout PdpContext ctx, OCT1 exp_cause := '80'O) runs on GT_CT {
|
|
var Gtp1cUnitdata ud;
|
|
var default d;
|
|
|
|
log("sending CreatePDP");
|
|
f_send_gtpc(ts_GTPC_CreatePDP(g_peer_c, g_c_seq_nr, ctx.imsi, g_restart_ctr,
|
|
ctx.teid, ctx.teic, ctx.nsapi, ctx.eua, ctx.apn,
|
|
g_sgsn_ip_c, g_sgsn_ip_u, ctx.msisdn, ctx.pco_req));
|
|
T_default.start;
|
|
d := activate(pingpong());
|
|
alt {
|
|
[] GTPC.receive(tr_GTPC_MsgType(g_peer_c, createPDPContextResponse, ctx.teic)) -> value ud {
|
|
f_handle_create_req(ctx, ud, exp_cause);
|
|
}
|
|
}
|
|
deactivate(d);
|
|
T_default.stop;
|
|
}
|
|
|
|
function f_pdp_ctx_exp_del_req(PdpContext ctx, template (omit) OCT1 expect_cause := omit, boolean expect_teardown := false) runs on GT_CT {
|
|
var Gtp1cUnitdata ud;
|
|
var default d;
|
|
|
|
T_default.start;
|
|
d := activate(pingpong());
|
|
alt {
|
|
[] GTPC.receive(tr_GTPC_MsgType(g_peer_c, deletePDPContextRequest, ctx.teic)) -> value ud {
|
|
if (istemplatekind(expect_cause, "omit") and not ispresent(ud.gtpc.gtpc_pdu.deletePDPContextRequest.cause.causevalue)) {
|
|
setverdict(pass);
|
|
} else if (not istemplatekind(expect_cause, "omit") and
|
|
ispresent(ud.gtpc.gtpc_pdu.deletePDPContextRequest.cause.causevalue) and
|
|
ud.gtpc.gtpc_pdu.deletePDPContextRequest.cause.causevalue == valueof(expect_cause)) {
|
|
setverdict(pass);
|
|
} else {
|
|
setverdict(fail);
|
|
}
|
|
|
|
if (expect_teardown == ispresent(ud.gtpc.gtpc_pdu.deletePDPContextRequest.tearDownIndicator)) {
|
|
setverdict(pass);
|
|
} else {
|
|
setverdict(fail);
|
|
}
|
|
}
|
|
}
|
|
deactivate(d);
|
|
T_default.stop;
|
|
}
|
|
|
|
function f_pdp_ctx_del(PdpContext ctx, template BIT1 teardown_ind, OCT1 expect_causevalue := '80'O) runs on GT_CT {
|
|
var Gtp1cUnitdata ud;
|
|
var default d;
|
|
var OCT4 expect_teid;
|
|
|
|
/* 3GPP TS 29.060 sec 7.3.6 specifies TEID used in response
|
|
message with cause value "Non existent" shall be zero. */
|
|
if (expect_causevalue == 'C0'O) {
|
|
expect_teid := '00000000'O;
|
|
} else {
|
|
expect_teid := ctx.teic;
|
|
}
|
|
|
|
f_send_gtpc(ts_GTPC_DeletePDP(g_peer_c, g_c_seq_nr, ctx.teic_remote, ctx.nsapi, teardown_ind));
|
|
T_default.start;
|
|
d := activate(pingpong());
|
|
alt {
|
|
[] GTPC.receive(tr_GTPC_MsgType(g_peer_c, deletePDPContextResponse, expect_teid)) -> value ud {
|
|
if (ud.gtpc.gtpc_pdu.deletePDPContextResponse.cause.causevalue == expect_causevalue) {
|
|
setverdict(pass);
|
|
} else {
|
|
setverdict(fail);
|
|
}
|
|
}
|
|
}
|
|
deactivate(d);
|
|
T_default.stop;
|
|
}
|
|
/* IPv6 router solicitation fe80::2 -> ff02::2 from 02:88:b5:1f:25:59 */
|
|
const octetstring c_router_solicit := '6000000000103afffe800000000000000000000000000002ff02000000000000000000000000000285009f2b0000000001010288b51f2559'O;
|
|
/* IPv6 neighbor solicitation fe80::2 -> ff02::1:ff00:2 from 02:88:b5:1f:25:59 */
|
|
const octetstring c_neigh_solicit:= '6000000000203afffe800000000000000000000000000002ff0200000000000000000001ff00000287009f9600000000fe80000000000000000000000000000201010288b51f2559'O;
|
|
|
|
/* template for sending an ICMPv4 echo request */
|
|
template PDU_ICMP ts_ICMPv4_ERQ := {
|
|
echo := {
|
|
type_field := 8,
|
|
code := 0,
|
|
checksum := '0000'O,
|
|
identifier := '0345'O,
|
|
sequence_number := '0001'O,
|
|
data := ''O
|
|
}
|
|
}
|
|
|
|
/* template for receiving/matching an ICMPv4 echo request */
|
|
template PDU_ICMP tr_ICMPv4_ERQ := {
|
|
echo := {
|
|
type_field := 8,
|
|
code := 0,
|
|
checksum := ?,
|
|
identifier := ?,
|
|
sequence_number := ?,
|
|
data := ?
|
|
}
|
|
}
|
|
|
|
/* template for receiving/matching an ICMPv4 echo reply */
|
|
template PDU_ICMP tr_ICMPv4_ERP(template octetstring data := *) := {
|
|
echo_reply := {
|
|
type_field := 0,
|
|
code := 0,
|
|
checksum := ?,
|
|
identifier := ?,
|
|
sequence_number := ?,
|
|
data := data
|
|
}
|
|
}
|
|
|
|
/* template for receiving/matching an ICMPv6 Destination Unreachable */
|
|
template PDU_ICMP tr_ICMPv4_DU := {
|
|
destination_unreachable := {
|
|
type_field := 1,
|
|
code := ?,
|
|
checksum := ?,
|
|
unused := ?,
|
|
original_ip_msg := ?
|
|
}
|
|
}
|
|
|
|
/* template to construct IPv4_packet from input arguments, ready for use in f_IPv4_enc() */
|
|
template IPv4_packet ts_IP4(OCT4 srcaddr, OCT4 dstaddr, LIN1 proto, LIN2_BO_LAST tlen, octetstring payload) := {
|
|
header := {
|
|
ver := 4,
|
|
hlen := 5,
|
|
tos := 0,
|
|
tlen := tlen,
|
|
id := 35902,
|
|
res := '0'B,
|
|
dfrag := '1'B,
|
|
mfrag := '0'B,
|
|
foffset := 0,
|
|
ttl := 64,
|
|
proto := proto,
|
|
cksum := 0,
|
|
srcaddr := srcaddr,
|
|
dstaddr := dstaddr
|
|
},
|
|
ext_headers := omit,
|
|
payload := payload
|
|
}
|
|
|
|
/* template to generate a 'Prefix Information' ICMPv6 option */
|
|
template OptionField ts_ICMP6_OptPrefix(OCT16 prefix, INT1 prefix_len) := {
|
|
prefixInformation := {
|
|
typeField := 3,
|
|
lengthIndicator := 8,
|
|
prefixLength := prefix_len,
|
|
reserved1 := '000000'B,
|
|
a_Bit := '0'B,
|
|
l_Bit := '0'B,
|
|
validLifetime := oct2int('FFFFFFFF'O),
|
|
preferredLifetime := oct2int('FFFFFFFF'O),
|
|
reserved2 := '00000000'O,
|
|
prefix := prefix
|
|
}
|
|
}
|
|
|
|
/* template for sending an ICMPv6 echo request */
|
|
template PDU_ICMPv6 ts_ICMPv6_ERQ := {
|
|
echoRequest := {
|
|
typeField := 128,
|
|
code := 0,
|
|
checksum := '0000'O,
|
|
identifier := 0,
|
|
sequenceNr := 0,
|
|
data := ''O
|
|
}
|
|
}
|
|
|
|
/* template for sending an ICMPv6 router solicitation */
|
|
template PDU_ICMPv6 ts_ICMPv6_RS := {
|
|
routerSolicitation := {
|
|
typeField := 133,
|
|
code := 0,
|
|
checksum := '0000'O,
|
|
reserved := '00000000'O,
|
|
/* TODO: do we need 'Source link-layer address' ? */
|
|
options := omit
|
|
}
|
|
}
|
|
|
|
/* template for sending an ICMPv6 router advertisement */
|
|
template PDU_ICMPv6 ts_ICMPv6_RA(OCT16 prefix, INT1 prefix_len) := {
|
|
routerAdvertisement := {
|
|
typeField := 134,
|
|
code := 0,
|
|
checksum := '0000'O,
|
|
curHopLimit := ?,
|
|
reserved := '000000'B,
|
|
o_Bit := '0'B,
|
|
m_Bit := '0'B,
|
|
routerLifetime := oct2int('FFFF'O),
|
|
reachableTime := oct2int('FFFFFFFF'O),
|
|
retransTimer := oct2int('FFFFFFFF'O),
|
|
options := {
|
|
ts_ICMP6_OptPrefix(prefix, prefix_len)
|
|
}
|
|
}
|
|
}
|
|
|
|
/* template for sending an ICMPv6 neighbor solicitation */
|
|
template PDU_ICMPv6 ts_ICMPv6_NS(OCT16 target_addr) := {
|
|
neighborSolicitation := {
|
|
typeField := 135,
|
|
code := 0,
|
|
checksum := '0000'O,
|
|
reserved := '00000000'O,
|
|
targetAddress := target_addr,
|
|
/* TODO: do we need 'Source link-layer address' ? */
|
|
options := omit
|
|
}
|
|
}
|
|
|
|
/* derive ICMPv6 link-local address from lower 64bit of link_id */
|
|
/* template for receiving/matching an ICMPv6 'Prefix Information' option */
|
|
template OptionField tr_ICMP6_OptPrefix(template OCT16 prefix, template INT1 prefix_len) := {
|
|
prefixInformation := {
|
|
typeField := 3,
|
|
lengthIndicator := 4,
|
|
prefixLength := prefix_len,
|
|
reserved1 := ?,
|
|
a_Bit := ?,
|
|
l_Bit := ?,
|
|
validLifetime := ?,
|
|
preferredLifetime := ?,
|
|
reserved2 := ?,
|
|
prefix := prefix
|
|
}
|
|
}
|
|
|
|
/* template for receiving/matching an ICMPv6 router advertisement */
|
|
template PDU_ICMPv6 tr_ICMPv6_RA(template OCT16 prefix, template INT1 prefix_len) := {
|
|
routerAdvertisement := {
|
|
typeField := 134,
|
|
code := 0,
|
|
checksum := ?,
|
|
curHopLimit := ?,
|
|
reserved := ?,
|
|
o_Bit := '0'B,
|
|
m_Bit := '0'B,
|
|
routerLifetime := ?,
|
|
reachableTime := ?,
|
|
retransTimer := ?,
|
|
options := {
|
|
tr_ICMP6_OptPrefix(prefix, prefix_len)
|
|
}
|
|
}
|
|
}
|
|
|
|
/* template for receiving/matching an ICMPv6 Destination Unreachable */
|
|
template PDU_ICMPv6 tr_ICMPv6_DU := {
|
|
destinationUnreachable := {
|
|
typeField := 1,
|
|
code := ?,
|
|
checksum := ?,
|
|
unused := ?,
|
|
originalIpMsg := ?
|
|
}
|
|
}
|
|
|
|
/* template for receiving/matching an ICMPv6 echo request */
|
|
template PDU_ICMPv6 tr_ICMPv6_ERQ := {
|
|
echoRequest := {
|
|
typeField := 128,
|
|
code := 0,
|
|
checksum := ?,
|
|
identifier := ?,
|
|
sequenceNr := ?,
|
|
data := ?
|
|
}
|
|
}
|
|
|
|
/* template for receiving/matching an ICMPv6 echo reply */
|
|
template PDU_ICMPv6 tr_ICMPv6_ERP(template octetstring data := *) := {
|
|
echoReply := {
|
|
typeField := 129,
|
|
code := 0,
|
|
checksum := ?,
|
|
identifier := ?,
|
|
sequenceNr := ?,
|
|
data := data
|
|
}
|
|
}
|
|
|
|
/* template to construct IPv6_packet from input arguments, ready for use in f_IPv6_enc() */
|
|
template IPv6_packet ts_IP6(OCT16 srcaddr, OCT16 dstaddr, LIN1 nexthead, octetstring payload, LIN1 hlim := 255) := {
|
|
header := {
|
|
ver := 6,
|
|
trclass := 0,
|
|
flabel := 0,
|
|
plen := 0,
|
|
nexthead := nexthead,
|
|
hlim := hlim,
|
|
srcaddr := srcaddr,
|
|
dstaddr := dstaddr
|
|
},
|
|
ext_headers := omit,
|
|
payload := payload
|
|
}
|
|
|
|
function f_ipv6_link_local(in OCT16 link_id) return OCT16 {
|
|
return 'FE80000000000000'O & substr(link_id, 8, 8);
|
|
}
|
|
|
|
function f_ipv6_global(in OCT16 link_id) return OCT16 {
|
|
return substr(link_id, 0, 8) & '1234123412341234'O;
|
|
}
|
|
|
|
/* Create a new different IPv6 addr from input. Starts mangling at byte prefix. */
|
|
function f_ipv6_mangle(in OCT16 addr, in integer prefix := 0) return OCT16 {
|
|
var integer i;
|
|
var octetstring res := substr(addr, 0, prefix);
|
|
for (i := prefix; i < lengthof(addr); i := i + 1) {
|
|
var octetstring a := addr[i] xor4b '11'O;
|
|
res := res & a;
|
|
}
|
|
return res;
|
|
}
|
|
|
|
/* Compute solicited-node multicast address as per RFC4291 2.7.1 */
|
|
function f_ipv6_sol_node_mcast(in OCT16 addr) return OCT16 {
|
|
return 'FF0200000000000000000001FF'O & substr(addr, 13, 3);
|
|
}
|
|
|
|
/* generate and encode ICMPv6 router solicitation */
|
|
function f_gen_icmpv6_router_solicitation(in OCT16 link_id) return octetstring {
|
|
const OCT16 c_ip6_all_router_mcast := 'FF020000000000000000000000000002'O;
|
|
var OCT16 saddr := f_ipv6_link_local(link_id);
|
|
|
|
var octetstring tmp;
|
|
tmp := f_enc_PDU_ICMPv6(valueof(ts_ICMPv6_RS), saddr, c_ip6_all_router_mcast);
|
|
var IPv6_packet ip6 := valueof(ts_IP6(saddr, c_ip6_all_router_mcast, 58, tmp));
|
|
|
|
return f_IPv6_enc(ip6);
|
|
}
|
|
|
|
/* create ICMPv6 router solicitation deriving link-id from PDP Context EUA */
|
|
function f_icmpv6_rs_for_pdp(in PdpContext ctx) return octetstring {
|
|
var OCT16 interface_id := ctx.eua.endUserAddress.endUserAddressIPv6.ipv6_address;
|
|
return f_gen_icmpv6_router_solicitation(interface_id);
|
|
}
|
|
|
|
/* generate and encode ICMPv6 neighbor solicitation */
|
|
function f_gen_icmpv6_neigh_solicit(in OCT16 saddr, in OCT16 daddr, in OCT16 tgt_addr) return octetstring {
|
|
var octetstring tmp;
|
|
tmp := f_enc_PDU_ICMPv6(valueof(ts_ICMPv6_NS(tgt_addr)), saddr, daddr);
|
|
var IPv6_packet ip6 := valueof(ts_IP6(saddr, daddr, 58, tmp));
|
|
return f_IPv6_enc(ip6);
|
|
}
|
|
|
|
/* generate and encode ICMPv6 neighbor solicitation for PDP Context */
|
|
function f_gen_icmpv6_neigh_solicit_for_pdp(in PdpContext ctx) return octetstring {
|
|
var OCT16 interface_id := ctx.eua.endUserAddress.endUserAddressIPv6.ipv6_address;
|
|
var OCT16 link_local := f_ipv6_link_local(interface_id);
|
|
var OCT16 daddr := f_ipv6_sol_node_mcast(link_local);
|
|
|
|
return f_gen_icmpv6_neigh_solicit(link_local, daddr, link_local);
|
|
}
|
|
|
|
/* Send an ICMPv4 echo msg through GTP given pdp ctx, and ip src and dst addr */
|
|
function f_gen_icmpv4_echo(OCT4 saddr, OCT4 daddr) return octetstring {
|
|
var octetstring tmp := f_enc_PDU_ICMP(valueof(ts_ICMPv4_ERQ));
|
|
var IPv4_packet ip4 := valueof(ts_IP4(saddr, daddr, 1, 50, tmp));
|
|
var octetstring data := f_IPv4_enc(ip4);
|
|
var OCT2 cksum := f_IPv4_checksum(data);
|
|
data[10] := cksum[0];
|
|
data[11] := cksum[1];
|
|
return data;
|
|
}
|
|
|
|
/* Send an ICMPv6 echo msg through GTP given pdp ctx, and ip src and dst addr */
|
|
function f_gen_icmpv6_echo(OCT16 saddr, OCT16 daddr) return octetstring {
|
|
var octetstring tmp := f_enc_PDU_ICMPv6(valueof(ts_ICMPv6_ERQ), saddr, daddr);
|
|
var IPv6_packet ip6 := valueof(ts_IP6(saddr, daddr, 58, tmp));
|
|
var octetstring data := f_IPv6_enc(ip6);
|
|
return data;
|
|
}
|
|
|
|
/* Wait for ICMPv4 from GTP */
|
|
function f_wait_icmp4(PdpContext ctx, template PDU_ICMP expected) runs on GT_CT {
|
|
var Gtp1uUnitdata ud;
|
|
T_default.start;
|
|
alt {
|
|
[] GTPU.receive(tr_GTPU_GPDU(g_peer_u, ?)) -> value ud {
|
|
if (f_verify_gtpu_txseq(ud.gtpu, use_gtpu_txseq) == false) {
|
|
setverdict(fail);
|
|
stop;
|
|
}
|
|
var octetstring gpdu := ud.gtpu.gtpu_IEs.g_PDU_IEs.data;
|
|
var IPv4_packet ip4 := f_IPv4_dec(gpdu);
|
|
if (ip4.header.ver != 4) {
|
|
repeat;
|
|
}
|
|
var PDU_ICMP icmp4 := f_dec_PDU_ICMP(ip4.payload);
|
|
if (not match(icmp4, expected)) {
|
|
repeat;
|
|
}
|
|
}
|
|
[] GTPU.receive { setverdict(fail); }
|
|
[] T_default.timeout { setverdict(fail); }
|
|
}
|
|
T_default.stop;
|
|
}
|
|
|
|
/* Wait for ICMPv4 echo request from GTP */
|
|
function f_wait_icmp4_echo_request(PdpContext ctx) runs on GT_CT {
|
|
f_wait_icmp4(ctx, tr_ICMPv4_ERQ);
|
|
}
|
|
|
|
/* Wait for ICMPv4 echo reply (or unreachable) from GTP */
|
|
function f_wait_icmp4_echo_reply(PdpContext ctx) runs on GT_CT {
|
|
f_wait_icmp4(ctx, (tr_ICMPv4_ERP, tr_ICMPv4_DU));
|
|
}
|
|
|
|
/* Wait for ICMPv6 from GTP */
|
|
function f_wait_icmp6(PdpContext ctx, template PDU_ICMPv6 expected) runs on GT_CT {
|
|
var Gtp1uUnitdata ud;
|
|
T_default.start;
|
|
alt {
|
|
[] GTPU.receive(tr_GTPU_GPDU(g_peer_u, ?)) -> value ud {
|
|
if (f_verify_gtpu_txseq(ud.gtpu, use_gtpu_txseq) == false) {
|
|
setverdict(fail);
|
|
stop;
|
|
}
|
|
var octetstring gpdu := ud.gtpu.gtpu_IEs.g_PDU_IEs.data;
|
|
var IPv6_packet ip6 := f_IPv6_dec(gpdu);
|
|
if (ip6.header.ver != 6 or ip6.header.nexthead != 58) {
|
|
repeat;
|
|
}
|
|
var PDU_ICMPv6 icmp6 := f_dec_PDU_ICMPv6(ip6.payload);
|
|
if (not match(icmp6, expected)) {
|
|
repeat;
|
|
}
|
|
/* We are waiting for RA, update ctx */
|
|
if (match(icmp6, tr_ICMPv6_RA(?, 64))) {
|
|
ctx.ip6_prefix := icmp6.routerAdvertisement.options[0].prefixInformation.prefix;
|
|
log("RA with /64 prefix ", ctx.ip6_prefix);
|
|
}
|
|
}
|
|
[] GTPU.receive(tr_GTPU_GPDU(?, ?)) { repeat; }
|
|
[] GTPU.receive { setverdict(fail); }
|
|
[] T_default.timeout { setverdict(fail); }
|
|
}
|
|
T_default.stop;
|
|
}
|
|
|
|
/* wait for GGSN to send us an ICMPv6 router advertisement */
|
|
function f_wait_rtr_adv(PdpContext ctx) runs on GT_CT {
|
|
f_wait_icmp6(ctx, tr_ICMPv6_RA(?, 64));
|
|
}
|
|
|
|
/* Wait for ICMPv6 echo request from GTP */
|
|
function f_wait_icmp6_echo_request(PdpContext ctx) runs on GT_CT {
|
|
f_wait_icmp6(ctx, tr_ICMPv6_ERQ);
|
|
}
|
|
|
|
/* Wait for ICMPv6 echo reply (or unreachable) from GTP */
|
|
function f_wait_icmp6_echo_reply(PdpContext ctx) runs on GT_CT {
|
|
f_wait_icmp6(ctx, (tr_ICMPv6_ERP,tr_ICMPv6_DU));
|
|
}
|
|
|
|
/* create ICMPv6 router solicitation deriving link-id from PDP Context EUA */
|
|
function f_icmpv6_rs_for_pdp46(in PdpContext ctx) return octetstring {
|
|
var OCT16 interface_id := ctx.eua.endUserAddress.endUserAddressIPv4andIPv6.ipv6_address;
|
|
return f_gen_icmpv6_router_solicitation(interface_id);
|
|
}
|
|
|
|
/* generate and encode ICMPv6 neighbor solicitation for PDP Context */
|
|
function f_gen_icmpv6_neigh_solicit_for_pdp46(in PdpContext ctx) return octetstring {
|
|
var OCT16 interface_id := ctx.eua.endUserAddress.endUserAddressIPv4andIPv6.ipv6_address;
|
|
var OCT16 link_local := f_ipv6_link_local(interface_id);
|
|
var OCT16 daddr := f_ipv6_sol_node_mcast(link_local);
|
|
|
|
return f_gen_icmpv6_neigh_solicit(link_local, daddr, link_local);
|
|
}
|
|
|
|
/* Assert we don't receive a ICMPv4/6 echo reply (or unreachable) from GTP */
|
|
function f_wait_gtpu_fail(PdpContext ctx) runs on GT_CT {
|
|
T_default.start;
|
|
alt {
|
|
[] GTPU.receive { setverdict(fail); }
|
|
[] T_default.timeout { }
|
|
}
|
|
T_default.stop;
|
|
}
|
|
|
|
/* list of protocols where we don't accept duplicates */
|
|
const OCT2List protocol_ids_nodupes := { 'C021'O, 'C023'O, 'C223'O, '8021'O };
|
|
private function f_PCO_permits_duplicates(OCT2 id) return boolean {
|
|
var integer i;
|
|
for (i := 0; i < lengthof(protocol_ids_nodupes); i := i+1) {
|
|
if (id == protocol_ids_nodupes[i]) {
|
|
return false;
|
|
}
|
|
}
|
|
return true;
|
|
}
|
|
|
|
/* ensure that every given protocol Identifier exist only exactly once in the PCO */
|
|
function f_PCO_ensure_no_duplicates(ProtConfigOptions pco) {
|
|
var OCT2List protocol_ids := {};
|
|
var integer i, j;
|
|
for (i := 0; i < lengthof(pco.protocols); i := i+1) {
|
|
var OCT2 id := pco.protocols[i].protocolID;
|
|
for (j := 0; j < lengthof(protocol_ids); j := j+1) {
|
|
if (not f_PCO_permits_duplicates(id) and id == protocol_ids[j]) {
|
|
setverdict(fail, "Duplicate ProtocolID ", id, " already present in ", pco.protocols);
|
|
}
|
|
}
|
|
protocol_ids := protocol_ids & { id };
|
|
}
|
|
}
|
|
|
|
/* Test IPv6 context activation for dynamic IPv6 EUA without request of IPv6 DNS */
|
|
testcase TC_pdp6_act_deact() runs on GT_CT {
|
|
f_init();
|
|
|
|
var PdpContext ctx := valueof(t_DefinePDP(f_rnd_imsi('26242'H), '1234'O, c_ApnInet6, valueof(t_EuaIPv6Dyn)));
|
|
f_pdp_ctx_act(ctx);
|
|
f_pdp_ctx_del(ctx, '1'B);
|
|
}
|
|
|
|
/* Test IPv6 context activation for dynamic IPv6 EUA wirh request of IPv6 DNS in PCO */
|
|
testcase TC_pdp6_act_deact_pcodns() runs on GT_CT {
|
|
f_init();
|
|
|
|
var PdpContext ctx := valueof(t_DefinePDP(f_rnd_imsi('26242'H), '1234'O, c_ApnInet6, valueof(t_EuaIPv6Dyn)));
|
|
ctx.pco_req := valueof(ts_PCO_IPv6_DNS);
|
|
f_pdp_ctx_act(ctx);
|
|
|
|
f_PCO_ensure_no_duplicates(ctx.pco_neg);
|
|
/* verify PCO contains both primary and secondary DNS */
|
|
var OCT4 ggsn_ip6_dns1 := f_inet6_addr(m_ggsn_ip6_dns1);
|
|
if (not match(f_PCO_extract_proto(ctx.pco_neg, '0003'O, 1), ggsn_ip6_dns1)) {
|
|
setverdict(fail, "Primary DNS IPv6 PCO option not found");
|
|
}
|
|
|
|
var OCT4 ggsn_ip6_dns2 := f_inet6_addr(m_ggsn_ip6_dns2);
|
|
if (not match(f_PCO_extract_proto(ctx.pco_neg, '0003'O, 2), ggsn_ip6_dns2)) {
|
|
setverdict(fail, "Secondary DNS IPv6 PCO option not found");
|
|
}
|
|
|
|
f_pdp_ctx_del(ctx, '1'B);
|
|
}
|
|
|
|
/* Test PDP context activation for dynamic IPv6 EUA with IPv6 DNS in PCO and router solicitation/advertisement */
|
|
testcase TC_pdp6_act_deact_icmp6() runs on GT_CT {
|
|
f_init();
|
|
|
|
var PdpContext ctx := valueof(t_DefinePDP(f_rnd_imsi('26242'H), '1234'O, c_ApnInet6, valueof(t_EuaIPv6Dyn)));
|
|
ctx.pco_req := valueof(ts_PCO_IPv6_DNS);
|
|
f_pdp_ctx_act(ctx);
|
|
|
|
f_PCO_ensure_no_duplicates(ctx.pco_neg);
|
|
//f_send_gtpu(ctx, c_router_solicit);
|
|
//f_send_gtpu(ctx, c_neigh_solicit);
|
|
|
|
f_send_gtpu(ctx, f_icmpv6_rs_for_pdp(ctx));
|
|
f_wait_rtr_adv(ctx);
|
|
f_send_gtpu(ctx, f_gen_icmpv6_neigh_solicit_for_pdp(ctx));
|
|
|
|
f_pdp_ctx_del(ctx, '1'B);
|
|
}
|
|
|
|
/* Test PDP context activation for dynamic IPv6 EUA with IPv6 DNS in PCO and router solicitation/advertisement.
|
|
Test we can send ICMPv6 ping over GTPU to DNS server. */
|
|
testcase TC_pdp6_act_deact_gtpu_access() runs on GT_CT {
|
|
f_init();
|
|
var PdpContext ctx := valueof(t_DefinePDP(f_rnd_imsi('26242'H), '1234'O, c_ApnInet6, valueof(t_EuaIPv6Dyn)));
|
|
ctx.pco_req := valueof(ts_PCO_IPv6_DNS);
|
|
f_pdp_ctx_act(ctx);
|
|
|
|
f_send_gtpu(ctx, f_icmpv6_rs_for_pdp(ctx));
|
|
f_wait_rtr_adv(ctx);
|
|
f_send_gtpu(ctx, f_gen_icmpv6_neigh_solicit_for_pdp(ctx));
|
|
|
|
var OCT16 dns1_addr := f_PCO_extract_proto(ctx.pco_neg, '0003'O);
|
|
|
|
/* Check if we can use valid link-local src addr. */
|
|
var OCT16 saddr_ll := f_ipv6_link_local(ctx.eua.endUserAddress.endUserAddressIPv6.ipv6_address);
|
|
f_send_gtpu(ctx, f_gen_icmpv6_echo(saddr_ll, dns1_addr));
|
|
f_wait_icmp6_echo_reply(ctx);
|
|
|
|
/* Check that attempting RA with another ll src addr won't work, packet dropped: */
|
|
var OCT16 saddr_ll_wrong := f_ipv6_mangle(saddr_ll, 8);
|
|
f_send_gtpu(ctx, f_gen_icmpv6_router_solicitation(saddr_ll_wrong));
|
|
f_wait_gtpu_fail(ctx);
|
|
|
|
/* Check if we can use valid global src addr, should work */
|
|
var OCT16 saddr_glob := f_ipv6_global(ctx.eua.endUserAddress.endUserAddressIPv6.ipv6_address);
|
|
f_send_gtpu(ctx, f_gen_icmpv6_echo(saddr_glob, dns1_addr));
|
|
f_wait_icmp6_echo_reply(ctx);
|
|
|
|
/* Assert that packets with wrong global src addr are dropped by GGSN */
|
|
var OCT16 saddr_wrong := f_ipv6_mangle(saddr_glob);
|
|
f_send_gtpu(ctx, f_gen_icmpv6_echo(saddr_wrong, dns1_addr));
|
|
f_wait_gtpu_fail(ctx);
|
|
|
|
/* Send an IPv4 ICMP ECHO REQUEST to APN6, should fail (packet dropped) */
|
|
var OCT4 saddr_v4 := f_inet_addr("192.168.10.2");
|
|
var OCT4 daddr_v4 := f_inet_addr("8.8.8.8");
|
|
f_send_gtpu(ctx, f_gen_icmpv4_echo(saddr_v4, daddr_v4));
|
|
f_wait_gtpu_fail(ctx);
|
|
|
|
f_pdp_ctx_del(ctx, '1'B);
|
|
}
|
|
|
|
/* Validate if different clients (pdp ctx) can reach one another through GGSN. */
|
|
testcase TC_pdp6_clients_interact() runs on GT_CT {
|
|
f_init();
|
|
var PdpContext ctxA := valueof(t_DefinePDP(f_rnd_imsi('26242'H), '1234'O, c_ApnInet6, valueof(t_EuaIPv6Dyn)));
|
|
var PdpContext ctxB := valueof(t_DefinePDP(f_rnd_imsi('26242'H), '1234'O, c_ApnInet6, valueof(t_EuaIPv6Dyn)));
|
|
f_pdp_ctx_act(ctxA);
|
|
f_send_gtpu(ctxA, f_icmpv6_rs_for_pdp(ctxA));
|
|
f_wait_rtr_adv(ctxA);
|
|
f_send_gtpu(ctxA, f_gen_icmpv6_neigh_solicit_for_pdp(ctxA));
|
|
|
|
f_pdp_ctx_act(ctxB);
|
|
f_send_gtpu(ctxB, f_icmpv6_rs_for_pdp(ctxB));
|
|
f_wait_rtr_adv(ctxB);
|
|
f_send_gtpu(ctxB, f_gen_icmpv6_neigh_solicit_for_pdp(ctxB));
|
|
|
|
var OCT16 addrA_ll := f_ipv6_link_local(ctxA.eua.endUserAddress.endUserAddressIPv6.ipv6_address);
|
|
var OCT16 addrB_ll := f_ipv6_link_local(ctxB.eua.endUserAddress.endUserAddressIPv6.ipv6_address);
|
|
var OCT16 addrA_glob := f_ipv6_global(ctxA.eua.endUserAddress.endUserAddressIPv6.ipv6_address);
|
|
var OCT16 addrB_glob := f_ipv6_global(ctxB.eua.endUserAddress.endUserAddressIPv6.ipv6_address);
|
|
|
|
/* Validate if clients can interact using ll addr. */
|
|
f_send_gtpu(ctxA, f_gen_icmpv6_echo(addrA_ll, addrB_ll));
|
|
f_wait_gtpu_fail(ctxB);
|
|
|
|
/* Validate if clients can interact using global addr. */
|
|
f_send_gtpu(ctxA, f_gen_icmpv6_echo(addrA_glob, addrB_glob));
|
|
f_wait_gtpu_fail(ctxB);
|
|
|
|
f_pdp_ctx_del(ctxA, '1'B);
|
|
f_pdp_ctx_del(ctxB, '1'B);
|
|
}
|
|
|
|
/* Test PDP context activation for dynamic IPv4 EUA without DNS request */
|
|
testcase TC_pdp4_act_deact() runs on GT_CT {
|
|
f_init();
|
|
var PdpContext ctx := valueof(t_DefinePDP(f_rnd_imsi('26242'H), '1234'O, c_ApnInternet, valueof(t_EuaIPv4Dyn)));
|
|
f_pdp_ctx_act(ctx);
|
|
f_pdp_ctx_del(ctx, '1'B);
|
|
}
|
|
|
|
/* Test PDP context activation for dynamic IPv4 EUA with IPv4 DNS in IPCP */
|
|
testcase TC_pdp4_act_deact_ipcp() runs on GT_CT {
|
|
f_init();
|
|
var OCT4 ggsn_ip4_dns1 := f_inet_addr(m_ggsn_ip4_dns1);
|
|
var OCT4 ggsn_ip4_dns2 := f_inet_addr(m_ggsn_ip4_dns2);
|
|
var PdpContext ctx := valueof(t_DefinePDP(f_rnd_imsi('26242'H), '1234'O, c_ApnInternet, valueof(t_EuaIPv4Dyn)));
|
|
ctx.pco_req := valueof(ts_PCO_IPv4_DNS_IPCP);
|
|
f_pdp_ctx_act(ctx);
|
|
f_PCO_ensure_no_duplicates(ctx.pco_neg);
|
|
/* verify IPCP is at all contained */
|
|
if (not match(ctx.pco_neg, tr_PCO_Contains('8021'O))) {
|
|
setverdict(fail, "IPCP not found in PCO");
|
|
}
|
|
/* verify IPCP contains both primary and secondary DNS */
|
|
var IpcpPacket ipcp := dec_IpcpPacket(f_PCO_extract_proto(ctx.pco_neg, '8021'O));
|
|
if (not match(ipcp, tr_IPCP_Ack_DNS(0, ggsn_ip4_dns1, ggsn_ip4_dns2))) {
|
|
if (not match(ipcp, tr_IPCP_Ack_DNS(0))) {
|
|
setverdict(fail, "Primary/Secondary DNS PCO IPCP option not found");
|
|
} else {
|
|
setverdict(fail, "Primary/Secondary DNS PCO IPCP option found but not matching expected values");
|
|
}
|
|
}
|
|
f_pdp_ctx_del(ctx, '1'B);
|
|
}
|
|
|
|
/* Test PDP context activation for dynamic IPv4 EUA with IPv4 DNS in IPCP + PAP authentication (broken) */
|
|
testcase TC_pdp4_act_deact_ipcp_pap_broken() runs on GT_CT {
|
|
f_init();
|
|
var OCT4 ggsn_ip4_dns1 := f_inet_addr(m_ggsn_ip4_dns1);
|
|
var OCT4 ggsn_ip4_dns2 := f_inet_addr(m_ggsn_ip4_dns2);
|
|
var PdpContext ctx := valueof(t_DefinePDP(f_rnd_imsi('26242'H), '1234'O, c_ApnInternet, valueof(t_EuaIPv4Dyn)));
|
|
ctx.pco_req := valueof(ts_PCO_PAP_IPv4_DNS);
|
|
f_pdp_ctx_act(ctx);
|
|
f_PCO_ensure_no_duplicates(ctx.pco_neg);
|
|
/* verify IPCP is at all contained */
|
|
if (not match(ctx.pco_neg, tr_PCO_Contains('8021'O))) {
|
|
setverdict(fail, "IPCP not found in PCO");
|
|
}
|
|
/* verify IPCP contains both primary and secondary DNS */
|
|
var IpcpPacket ipcp := dec_IpcpPacket(f_PCO_extract_proto(ctx.pco_neg, '8021'O));
|
|
if (not match(ipcp, tr_IPCP_Ack_DNS(0, ggsn_ip4_dns1, ggsn_ip4_dns2))) {
|
|
if (not match(ipcp, tr_IPCP_Ack_DNS(0))) {
|
|
setverdict(fail, "Primary/Secondary DNS PCO IPCP option not found");
|
|
} else {
|
|
setverdict(fail, "Primary/Secondary DNS PCO IPCP option found but not matching expected values");
|
|
}
|
|
}
|
|
/* verify that PAP is contained */
|
|
if (not match(ctx.pco_neg, tr_PCO_Contains('C023'O))) {
|
|
setverdict(fail, "PAP not found in PCO");
|
|
}
|
|
var PapPacket pap := dec_PapPacket(f_PCO_extract_proto(ctx.pco_neg, 'C023'O));
|
|
if (not match(pap, tr_PAP_AuthAck)) {
|
|
setverdict(fail, "PAP isn't an AuthenticateAck: ", pap);
|
|
}
|
|
f_pdp_ctx_del(ctx, '1'B);
|
|
}
|
|
|
|
/* Test PDP context activation for dynamic IPv4 EUA with IPv4 DNS in PCO */
|
|
testcase TC_pdp4_act_deact_pcodns() runs on GT_CT {
|
|
f_init();
|
|
var PdpContext ctx := valueof(t_DefinePDP(f_rnd_imsi('26242'H), '1234'O, c_ApnInternet, valueof(t_EuaIPv4Dyn)));
|
|
ctx.pco_req := valueof(ts_PCO_IPv4_DNS_CONT);
|
|
f_pdp_ctx_act(ctx);
|
|
|
|
f_PCO_ensure_no_duplicates(ctx.pco_neg);
|
|
/* verify PCO contains both primary and secondary DNS */
|
|
var OCT4 ggsn_ip4_dns1 := f_inet_addr(m_ggsn_ip4_dns1);
|
|
if (not match(f_PCO_extract_proto(ctx.pco_neg, '000d'O, 1), ggsn_ip4_dns1)) {
|
|
setverdict(fail, "Primary DNS IPv4 PCO option not found");
|
|
}
|
|
|
|
var OCT4 ggsn_ip4_dns2 := f_inet_addr(m_ggsn_ip4_dns2);
|
|
if (not match(f_PCO_extract_proto(ctx.pco_neg, '000d'O, 2), ggsn_ip4_dns2)) {
|
|
setverdict(fail, "Secondary DNS IPv4 PCO option not found");
|
|
}
|
|
|
|
f_pdp_ctx_del(ctx, '1'B);
|
|
}
|
|
|
|
/* Test PDP context activation for dynamic IPv4 EUA.
|
|
Test we can send ICMPv6 ping over GTPU to DNS server. */
|
|
testcase TC_pdp4_act_deact_gtpu_access() runs on GT_CT {
|
|
f_init();
|
|
var PdpContext ctx := valueof(t_DefinePDP(f_rnd_imsi('26242'H), '1234'O, c_ApnInternet, valueof(t_EuaIPv4Dyn)));
|
|
ctx.pco_req := valueof(ts_PCO_IPv4_DNS_CONT);
|
|
f_pdp_ctx_act(ctx);
|
|
|
|
f_PCO_ensure_no_duplicates(ctx.pco_neg);
|
|
var OCT4 dns1_addr := f_PCO_extract_proto(ctx.pco_neg, '000d'O);
|
|
|
|
/* Check if we can use valid global src addr, should work */
|
|
var OCT4 saddr := ctx.eua.endUserAddress.endUserAddressIPv4.ipv4_address;
|
|
f_send_gtpu(ctx, f_gen_icmpv4_echo(saddr, dns1_addr));
|
|
f_wait_icmp4_echo_reply(ctx);
|
|
|
|
/* Assert that packets with wrong global src addr are dropped by GGSN */
|
|
var OCT4 saddr_wrong := substr(saddr, 0, 3) & (saddr[3] xor4b '11'O);
|
|
f_send_gtpu(ctx, f_gen_icmpv4_echo(saddr_wrong, dns1_addr));
|
|
f_wait_gtpu_fail(ctx);
|
|
|
|
/* Send an IPv6 RA to APN4, should fail (packet dropped) */
|
|
var OCT16 saddr_v6 := f_inet6_addr("fde4:8dba:82e1:2000:1:2:3:4");
|
|
f_send_gtpu(ctx, f_gen_icmpv6_router_solicitation(saddr_v6));
|
|
f_wait_gtpu_fail(ctx);
|
|
f_pdp_ctx_del(ctx, '1'B);
|
|
}
|
|
|
|
/* Helper function for tests below. */
|
|
function f_pdp4_clients_interact() runs on GT_CT {
|
|
f_init();
|
|
var PdpContext ctxA := valueof(t_DefinePDP(f_rnd_imsi('26242'H), '1234'O, c_ApnInternet, valueof(t_EuaIPv4Dyn)));
|
|
var PdpContext ctxB := valueof(t_DefinePDP(f_rnd_imsi('26242'H), '1234'O, c_ApnInternet, valueof(t_EuaIPv4Dyn)));
|
|
f_pdp_ctx_act(ctxA);
|
|
f_pdp_ctx_act(ctxB);
|
|
var OCT4 addrA := ctxA.eua.endUserAddress.endUserAddressIPv4.ipv4_address;
|
|
var OCT4 addrB := ctxB.eua.endUserAddress.endUserAddressIPv4.ipv4_address;
|
|
f_send_gtpu(ctxA, f_gen_icmpv4_echo(addrA, addrB));
|
|
f_wait_icmp4_echo_request(ctxB);
|
|
|
|
f_pdp_ctx_del(ctxA, '1'B);
|
|
f_pdp_ctx_del(ctxB, '1'B);
|
|
}
|
|
|
|
/* Validate if different clients (pdp ctx) can reach one another through GGSN. */
|
|
testcase TC_pdp4_clients_interact_with_txseq() runs on GT_CT {
|
|
use_gtpu_txseq := true;
|
|
f_pdp4_clients_interact();
|
|
}
|
|
|
|
/* Validate if different clients (pdp ctx) can reach one another through GGSN (without Tx sequence number). */
|
|
testcase TC_pdp4_clients_interact_without_txseq() runs on GT_CT {
|
|
use_gtpu_txseq := false;
|
|
f_pdp4_clients_interact();
|
|
}
|
|
|
|
testcase TC_echo_req_resp() runs on GT_CT {
|
|
f_init();
|
|
f_send_gtpc(ts_GTPC_PING(g_peer_c, g_c_seq_nr));
|
|
T_default.start;
|
|
alt {
|
|
[] GTPC.receive(tr_GTPC_PONG(g_peer_c)) { setverdict(pass); };
|
|
[] GTPC.receive { repeat; };
|
|
[] T_default.timeout { setverdict(fail); }
|
|
}
|
|
T_default.stop;
|
|
}
|
|
|
|
/* Test if the parser can cope with PCO that only contain either a
|
|
* single primary DNS or a secondary DNS. */
|
|
testcase TC_pdp4_act_deact_with_single_dns() runs on GT_CT {
|
|
|
|
/* Note: an unpatched osmo-ggsn version will enter an endless-loop when
|
|
* the test is executed.
|
|
* see also: Change-Id Icffde89f9bc5d8fcadf6e2dd6c0b4de03440edd5 and OS#3288 */
|
|
|
|
f_init();
|
|
var PdpContext ctx := valueof(t_DefinePDP(f_rnd_imsi('26242'H), '1234'O, c_ApnInternet, valueof(t_EuaIPv4Dyn)));
|
|
var OCT4 ggsn_ip4_dns1 := f_inet_addr(m_ggsn_ip4_dns1);
|
|
var OCT4 ggsn_ip4_dns2 := f_inet_addr(m_ggsn_ip4_dns2);
|
|
var octetstring pco_neg_dns;
|
|
var octetstring pco_neg_dns_expected;
|
|
|
|
/* PCO with primary DNS only */
|
|
ctx.pco_req := valueof(ts_PCO_IPv4_PRI_DNS_IPCP);
|
|
f_pdp_ctx_act(ctx);
|
|
f_PCO_ensure_no_duplicates(ctx.pco_neg);
|
|
pco_neg_dns := f_PCO_extract_proto(ctx.pco_neg, '8021'O, 1);
|
|
pco_neg_dns_expected := '0200000A8106'O & ggsn_ip4_dns1
|
|
/* Note: The prepended hex bytes encode the following information:
|
|
* 0x02 = Configuration ACK
|
|
* 0x00 = Identifier
|
|
* 0x000a = Length
|
|
* 0x81 = Type (Primary DNS Server Address)
|
|
* 0x06 = Length
|
|
* (4 byte IP-Address appended) */
|
|
if (not match(pco_neg_dns, pco_neg_dns_expected)) {
|
|
setverdict(fail, "Primary DNS IPv4 PCO option not found");
|
|
}
|
|
f_pdp_ctx_del(ctx, '1'B);
|
|
|
|
/* PCO with secondary DNS only */
|
|
ctx.pco_req := valueof(ts_PCO_IPv4_SEC_DNS_IPCP);
|
|
f_pdp_ctx_act(ctx);
|
|
pco_neg_dns := f_PCO_extract_proto(ctx.pco_neg, '8021'O, 1);
|
|
pco_neg_dns_expected := '0200000A8306'O & ggsn_ip4_dns2
|
|
if (not match(pco_neg_dns, pco_neg_dns_expected)) {
|
|
setverdict(fail, "Secondary DNS IPv4 PCO option not found");
|
|
}
|
|
f_pdp_ctx_del(ctx, '1'B);
|
|
}
|
|
|
|
/* Test if the parser can cope with PCO that contains primary and secondary DNS in a separate IPCP container.
|
|
* Note: an unpatched osmo-ggsn version will enter an endless-loop when the test is run
|
|
* see Change-Id Icffde89f9bc5d8fcadf6e2dd6c0b4de03440edd5 and OS#3288. */
|
|
testcase TC_pdp4_act_deact_with_separate_dns() runs on GT_CT {
|
|
|
|
/* Note: an unpatched osmo-ggsn version will enter an endless-loop when
|
|
* the test is executed.
|
|
* see also: Change-Id Icffde89f9bc5d8fcadf6e2dd6c0b4de03440edd5 and OS#3288 */
|
|
|
|
f_init();
|
|
var PdpContext ctx := valueof(t_DefinePDP(f_rnd_imsi('26242'H), '1234'O, c_ApnInternet, valueof(t_EuaIPv4Dyn)));
|
|
var OCT4 ggsn_ip4_dns1 := f_inet_addr(m_ggsn_ip4_dns1);
|
|
var OCT4 ggsn_ip4_dns2 := f_inet_addr(m_ggsn_ip4_dns2);
|
|
var octetstring pco_neg_dns;
|
|
var octetstring pco_neg_dns_expected;
|
|
|
|
ctx.pco_req := valueof(ts_PCO_IPv4_SEPARATE_DNS_IPCP);
|
|
f_pdp_ctx_act(ctx);
|
|
|
|
/* Check if primary DNS is contained */
|
|
pco_neg_dns := f_PCO_extract_proto(ctx.pco_neg, '8021'O, 1);
|
|
pco_neg_dns_expected := '0200000A8106'O & ggsn_ip4_dns1
|
|
if (not match(pco_neg_dns, pco_neg_dns_expected)) {
|
|
setverdict(fail, "Primary DNS IPv4 PCO option not found");
|
|
}
|
|
|
|
/* Check if secondary DNS is contained */
|
|
/* This used to fail due to a bug in osmo-ggsn, see OS#3381 */
|
|
pco_neg_dns := f_PCO_extract_proto(ctx.pco_neg, '8021'O, 2);
|
|
pco_neg_dns_expected := '0200000A8306'O & ggsn_ip4_dns2
|
|
if (not match(pco_neg_dns, pco_neg_dns_expected)) {
|
|
setverdict(fail, "Secondary DNS IPv4 PCO option not found");
|
|
}
|
|
f_pdp_ctx_del(ctx, '1'B);
|
|
}
|
|
|
|
/* Test IPv4v6 context activation for dynamic IPv4v6 EUA without DNS request */
|
|
testcase TC_pdp46_act_deact() runs on GT_CT {
|
|
f_init();
|
|
var PdpContext ctx := valueof(t_DefinePDP(f_rnd_imsi('26242'H), '1234'O, c_ApnInet46, valueof(t_EuaIPv4Dynv6Dyn)));
|
|
f_pdp_ctx_act(ctx);
|
|
f_pdp_ctx_del(ctx, '1'B);
|
|
}
|
|
|
|
/* Test PDP context activation for dynamic IPv4v6 EUA with IPv4 DNS in IPCP */
|
|
testcase TC_pdp46_act_deact_ipcp() runs on GT_CT {
|
|
f_init();
|
|
var OCT4 ggsn_ip4_dns1 := f_inet_addr(m_ggsn_ip4_dns1);
|
|
var OCT4 ggsn_ip4_dns2 := f_inet_addr(m_ggsn_ip4_dns2);
|
|
var PdpContext ctx := valueof(t_DefinePDP(f_rnd_imsi('26242'H), '1234'O, c_ApnInet46, valueof(t_EuaIPv4Dynv6Dyn)));
|
|
ctx.pco_req := valueof(ts_PCO_IPv4_DNS_IPCP);
|
|
f_pdp_ctx_act(ctx);
|
|
f_PCO_ensure_no_duplicates(ctx.pco_neg);
|
|
/* verify IPCP is at all contained */
|
|
if (not match(ctx.pco_neg, tr_PCO_Contains('8021'O))) {
|
|
setverdict(fail, "IPCP not found in PCO");
|
|
}
|
|
f_PCO_ensure_no_duplicates(ctx.pco_neg);
|
|
/* verify IPCP contains both primary and secondary IPv4 DNS */
|
|
var IpcpPacket ipcp := dec_IpcpPacket(f_PCO_extract_proto(ctx.pco_neg, '8021'O));
|
|
if (not match(ipcp, tr_IPCP_Ack_DNS(0, ggsn_ip4_dns1, ggsn_ip4_dns2))) {
|
|
if (not match(ipcp, tr_IPCP_Ack_DNS(0))) {
|
|
setverdict(fail, "Primary/Secondary DNS PCO IPCP option not found");
|
|
} else {
|
|
setverdict(fail, "Primary/Secondary DNS PCO IPCP option found but not matching expected values");
|
|
}
|
|
}
|
|
f_pdp_ctx_del(ctx, '1'B);
|
|
}
|
|
|
|
/* Test PDP context activation for dynamic IPv4v6 EUA with IPv6 DNS in PCO and router solicitation/advertisement */
|
|
testcase TC_pdp46_act_deact_icmp6() runs on GT_CT {
|
|
f_init();
|
|
var PdpContext ctx := valueof(t_DefinePDP(f_rnd_imsi('26242'H), '1234'O, c_ApnInet46, valueof(t_EuaIPv4Dynv6Dyn)));
|
|
ctx.pco_req := valueof(ts_PCO_IPv6_DNS);
|
|
f_pdp_ctx_act(ctx);
|
|
|
|
f_send_gtpu(ctx, f_icmpv6_rs_for_pdp46(ctx));
|
|
f_wait_rtr_adv(ctx);
|
|
f_send_gtpu(ctx, f_gen_icmpv6_neigh_solicit_for_pdp46(ctx));
|
|
|
|
f_pdp_ctx_del(ctx, '1'B);
|
|
}
|
|
|
|
/* Test IPv4v6 context activation for dynamic IPv4v6 EUA with request of IPv4 DNS in PCO */
|
|
testcase TC_pdp46_act_deact_pcodns4() runs on GT_CT {
|
|
f_init();
|
|
|
|
var PdpContext ctx := valueof(t_DefinePDP(f_rnd_imsi('26242'H), '1234'O, c_ApnInet46, valueof(t_EuaIPv4Dynv6Dyn)));
|
|
ctx.pco_req := valueof(ts_PCO_IPv4_DNS_CONT);
|
|
f_pdp_ctx_act(ctx);
|
|
|
|
f_PCO_ensure_no_duplicates(ctx.pco_neg);
|
|
/* verify PCO contains both primary and secondary IPv4 DNS */
|
|
var OCT4 ggsn_ip4_dns1 := f_inet_addr(m_ggsn_ip4_dns1);
|
|
if (not match(f_PCO_extract_proto(ctx.pco_neg, '000d'O, 1), ggsn_ip4_dns1)) {
|
|
setverdict(fail, "Primary DNS IPv4 PCO option not found");
|
|
}
|
|
|
|
var OCT4 ggsn_ip4_dns2 := f_inet_addr(m_ggsn_ip4_dns2);
|
|
if (not match(f_PCO_extract_proto(ctx.pco_neg, '000d'O, 2), ggsn_ip4_dns2)) {
|
|
setverdict(fail, "Secondary DNS IPv4 PCO option not found");
|
|
}
|
|
|
|
f_pdp_ctx_del(ctx, '1'B);
|
|
}
|
|
|
|
/* Test IPv4v6 context activation for dynamic IPv4v6 EUA with request of IPv6 DNS in PCO */
|
|
testcase TC_pdp46_act_deact_pcodns6() runs on GT_CT {
|
|
f_init();
|
|
|
|
var PdpContext ctx := valueof(t_DefinePDP(f_rnd_imsi('26242'H), '1234'O, c_ApnInet46, valueof(t_EuaIPv4Dynv6Dyn)));
|
|
ctx.pco_req := valueof(ts_PCO_IPv6_DNS);
|
|
f_pdp_ctx_act(ctx);
|
|
|
|
f_PCO_ensure_no_duplicates(ctx.pco_neg);
|
|
/* verify PCO contains both primary and secondary IPv6 DNS */
|
|
var OCT4 ggsn_ip6_dns1 := f_inet6_addr(m_ggsn_ip6_dns1);
|
|
if (not match(f_PCO_extract_proto(ctx.pco_neg, '0003'O, 1), ggsn_ip6_dns1)) {
|
|
setverdict(fail, "Primary DNS IPv6 PCO option not found");
|
|
}
|
|
|
|
var OCT4 ggsn_ip6_dns2 := f_inet6_addr(m_ggsn_ip6_dns2);
|
|
if (not match(f_PCO_extract_proto(ctx.pco_neg, '0003'O, 2), ggsn_ip6_dns2)) {
|
|
setverdict(fail, "Secondary DNS IPv6 PCO option not found");
|
|
}
|
|
|
|
f_pdp_ctx_del(ctx, '1'B);
|
|
}
|
|
|
|
/* Test PDP context activation for dynamic IPv4v6 EUA.
|
|
Test we can send ICMPv6 ping over GTPU to DNS server. */
|
|
testcase TC_pdp46_act_deact_gtpu_access() runs on GT_CT {
|
|
f_init();
|
|
var PdpContext ctx := valueof(t_DefinePDP(f_rnd_imsi('26242'H), '1234'O, c_ApnInet46, valueof(t_EuaIPv4Dynv6Dyn)));
|
|
ctx.pco_req := valueof(ts_PCO_IPv4_DNS_CONT);
|
|
f_pdp_ctx_act(ctx);
|
|
|
|
var OCT4 dns1_addr := f_PCO_extract_proto(ctx.pco_neg, '000d'O);
|
|
|
|
/* Check if we can use valid global src addr, should work */
|
|
var OCT4 saddr := ctx.eua.endUserAddress.endUserAddressIPv4andIPv6.ipv4_address;
|
|
f_send_gtpu(ctx, f_gen_icmpv4_echo(saddr, dns1_addr));
|
|
f_wait_icmp4_echo_reply(ctx);
|
|
|
|
/* Assert that packets with wrong global src addr are dropped by GGSN */
|
|
var OCT4 saddr_wrong := substr(saddr, 0, 3) & (saddr[3] xor4b '11'O);
|
|
f_send_gtpu(ctx, f_gen_icmpv4_echo(saddr_wrong, dns1_addr));
|
|
f_wait_gtpu_fail(ctx);
|
|
|
|
/* Send an IPv6 RA to APN4, should fail (packet dropped) */
|
|
var OCT16 saddr_v6 := f_inet6_addr("fde4:8dba:82e1:2000:1:2:3:4");
|
|
f_send_gtpu(ctx, f_gen_icmpv6_router_solicitation(saddr_v6));
|
|
f_wait_gtpu_fail(ctx);
|
|
f_pdp_ctx_del(ctx, '1'B);
|
|
}
|
|
|
|
/* Validate if different clients (pdp ctx) can reach one another through GGSN. */
|
|
testcase TC_pdp46_clients_interact() runs on GT_CT {
|
|
f_init();
|
|
var PdpContext ctxA := valueof(t_DefinePDP(f_rnd_imsi('26242'H), '1234'O, c_ApnInet46, valueof(t_EuaIPv4Dynv6Dyn)));
|
|
var PdpContext ctxB := valueof(t_DefinePDP(f_rnd_imsi('26242'H), '1234'O, c_ApnInet46, valueof(t_EuaIPv4Dynv6Dyn)));
|
|
f_pdp_ctx_act(ctxA);
|
|
f_send_gtpu(ctxA, f_icmpv6_rs_for_pdp46(ctxA));
|
|
f_wait_rtr_adv(ctxA);
|
|
f_send_gtpu(ctxA, f_gen_icmpv6_neigh_solicit_for_pdp46(ctxA));
|
|
|
|
f_pdp_ctx_act(ctxB);
|
|
f_send_gtpu(ctxB, f_icmpv6_rs_for_pdp46(ctxB));
|
|
f_wait_rtr_adv(ctxB);
|
|
f_send_gtpu(ctxB, f_gen_icmpv6_neigh_solicit_for_pdp46(ctxB));
|
|
|
|
var OCT16 addrA_ll := f_ipv6_link_local(ctxA.eua.endUserAddress.endUserAddressIPv4andIPv6.ipv6_address);
|
|
var OCT16 addrB_ll := f_ipv6_link_local(ctxB.eua.endUserAddress.endUserAddressIPv4andIPv6.ipv6_address);
|
|
var OCT16 addrA_glob := f_ipv6_global(ctxA.eua.endUserAddress.endUserAddressIPv4andIPv6.ipv6_address);
|
|
var OCT16 addrB_glob := f_ipv6_global(ctxB.eua.endUserAddress.endUserAddressIPv4andIPv6.ipv6_address);
|
|
|
|
/* Validate if clients can interact using ll addr. */
|
|
f_send_gtpu(ctxA, f_gen_icmpv6_echo(addrA_ll, addrB_ll));
|
|
f_wait_gtpu_fail(ctxB);
|
|
|
|
/* Validate if clients can interact using global addr. */
|
|
f_send_gtpu(ctxA, f_gen_icmpv6_echo(addrA_glob, addrB_glob));
|
|
f_wait_gtpu_fail(ctxB);
|
|
|
|
f_pdp_ctx_del(ctxA, '1'B);
|
|
f_pdp_ctx_del(ctxB, '1'B);
|
|
}
|
|
|
|
/* Test IPv4v6 context activation for dynamic IPv4v6 EUA on a v4-only APN */
|
|
testcase TC_pdp46_act_deact_apn4() runs on GT_CT {
|
|
f_init();
|
|
/* A typical MS first attempts v4v6, and if rejected, then tries v4 and v6 separetly */
|
|
var PdpContext ctx46 := valueof(t_DefinePDP(f_rnd_imsi('26242'H), '1234'O, c_ApnInternet, valueof(t_EuaIPv4Dynv6Dyn)));
|
|
f_pdp_ctx_act(ctx46, 'DC'O); /* Cause: Unknown PDP address or PDP type */
|
|
|
|
var PdpContext ctx4 := valueof(t_DefinePDP(f_rnd_imsi('26242'H), '1234'O, c_ApnInternet, valueof(t_EuaIPv4Dyn)));
|
|
f_pdp_ctx_act(ctx4, '80'O); /* Normal accept cause */
|
|
|
|
var PdpContext ctx6 := valueof(t_DefinePDP(f_rnd_imsi('26242'H), '1234'O, c_ApnInternet, valueof(t_EuaIPv6Dyn)));
|
|
f_pdp_ctx_act(ctx6, 'DC'O); /* Cause: Unknown PDP address or PDP type */
|
|
|
|
f_pdp_ctx_del(ctx4, '1'B);
|
|
}
|
|
|
|
/* Validate if 2nd CtxCreateReq with increased Recovery IE causes ggsn to drop 1st one (while keeping 2nd one). */
|
|
testcase TC_pdp_act2_recovery() runs on GT_CT {
|
|
var Gtp1cUnitdata ud;
|
|
var default d;
|
|
var boolean ctxA_deleted := false;
|
|
var boolean ctxB_created := false;
|
|
|
|
f_init();
|
|
var PdpContext ctxA := valueof(t_DefinePDP(f_rnd_imsi('26242'H), '1234'O, c_ApnInternet, valueof(t_EuaIPv4Dyn)));
|
|
var PdpContext ctxB := valueof(t_DefinePDP(f_rnd_imsi('26242'H), '1234'O, c_ApnInternet, valueof(t_EuaIPv4Dyn)));
|
|
f_pdp_ctx_act(ctxA);
|
|
|
|
g_restart_ctr := int2oct(oct2int(g_restart_ctr) + 1, 1);
|
|
|
|
log("sending 2nd CreatePDP (recovery increased)");
|
|
f_send_gtpc(ts_GTPC_CreatePDP(g_peer_c, g_c_seq_nr, ctxB.imsi, g_restart_ctr,
|
|
ctxB.teid, ctxB.teic, ctxB.nsapi, ctxB.eua, ctxB.apn,
|
|
g_sgsn_ip_c, g_sgsn_ip_u, ctxB.msisdn, ctxB.pco_req));
|
|
T_default.start;
|
|
d := activate(pingpong());
|
|
alt {
|
|
[] GTPC.receive(tr_GTPC_MsgType(g_peer_c, createPDPContextResponse, ctxB.teic)) -> value ud {
|
|
f_handle_create_req(ctxB, ud);
|
|
if (not ctxB_created) {
|
|
ctxB_created := true;
|
|
setverdict(pass);
|
|
} else {
|
|
setverdict(fail, "Repeated createPDPContextResponse(ctxB)");
|
|
}
|
|
|
|
if (not ctxA_deleted) {
|
|
repeat;
|
|
}
|
|
}
|
|
[] GTPC.receive(tr_GTPC_MsgType(g_peer_c, deletePDPContextRequest, ctxA.teic)) -> value ud {
|
|
if (ispresent(ud.gtpc.gtpc_pdu.deletePDPContextRequest.tearDownIndicator)) {
|
|
setverdict(pass);
|
|
} else {
|
|
setverdict(fail);
|
|
}
|
|
|
|
if (not ctxA_deleted) {
|
|
ctxA_deleted := true;
|
|
setverdict(pass);
|
|
} else {
|
|
setverdict(fail, "Repeated deletePDPContextRequest(ctxA)");
|
|
}
|
|
|
|
if (not ctxB_created) {
|
|
repeat;
|
|
}
|
|
}
|
|
[] GTPC.receive(tr_GTPC_MsgType(g_peer_c, deletePDPContextRequest, ctxB.teic)) -> value ud {
|
|
setverdict(fail, "GGSN dropping still valid pdp ctx");
|
|
}
|
|
}
|
|
deactivate(d);
|
|
T_default.stop;
|
|
|
|
f_pdp_ctx_del(ctxB, '1'B);
|
|
}
|
|
|
|
|
|
/* Send a duplicate echo req. osmo-ggsn maintains a queue for sent
|
|
responses (60 seconds): If same delete req is sent and duplicate is
|
|
detected, saved duplicate response should be sent back. */
|
|
testcase TC_act_deact_retrans_duplicate() runs on GT_CT {
|
|
f_init();
|
|
var PdpContext ctx := valueof(t_DefinePDP(f_rnd_imsi('26242'H), '1234'O, c_ApnInternet, valueof(t_EuaIPv4Dyn)));
|
|
f_pdp_ctx_act(ctx);
|
|
f_pdp_ctx_del(ctx, '1'B);
|
|
/* leave some time in between to make sure retransmit response queue keeps packets for a while */
|
|
f_sleep(1.0);
|
|
/* g_c_seq_nr was increased during f_pdp_ctx_del(), we want a
|
|
duplicate. If it was not a duplicate, osmo-ggsn would answer
|
|
with a failure since that PDP ctx was already deleted. */
|
|
g_c_seq_nr := g_c_seq_nr - 1;
|
|
f_pdp_ctx_del(ctx, '1'B);
|
|
|
|
/* Now send a new pdp ctx del (increased seqnum). It should fail with cause "non-existent": */
|
|
var OCT1 cause_nonexistent := 'C0'O;
|
|
f_pdp_ctx_del(ctx, '1'B, cause_nonexistent);
|
|
}
|
|
|
|
/* Activate PDP context + trigger Recovery procedure through EchoResp */
|
|
testcase TC_pdp_act_restart_ctr_echo() runs on GT_CT {
|
|
var Gtp1cUnitdata ud;
|
|
g_use_echo := true;
|
|
f_init();
|
|
var PdpContext ctx := valueof(t_DefinePDP(f_rnd_imsi('26242'H), '1234'O, c_ApnInternet, valueof(t_EuaIPv4Dyn)));
|
|
f_pdp_ctx_act(ctx);
|
|
|
|
/* Wait to receive echo request and send initial Restart counter */
|
|
GTPC.receive(tr_GTPC_PING(?)) -> value ud {
|
|
var uint16_t seq := oct2int(ud.gtpc.opt_part.sequenceNumber);
|
|
GTPC.send(ts_GTPC_PONG(ud.peer, seq, g_restart_ctr));
|
|
};
|
|
|
|
/* Wait to receive second echo request and send incremented Restart
|
|
counter. This will fake a restarted SGSN, and pdp ctx allocated
|
|
should be released by GGSN */
|
|
g_restart_ctr := int2oct(oct2int(g_restart_ctr) + 1, 1);
|
|
GTPC.receive(tr_GTPC_PING(?)) -> value ud {
|
|
var uint16_t seq := oct2int(ud.gtpc.opt_part.sequenceNumber);
|
|
GTPC.send(ts_GTPC_PONG(ud.peer, seq, g_restart_ctr));
|
|
};
|
|
f_pdp_ctx_exp_del_req(ctx, omit, true);
|
|
setverdict(pass);
|
|
}
|
|
|
|
control {
|
|
execute(TC_pdp4_act_deact());
|
|
execute(TC_pdp4_act_deact_ipcp());
|
|
execute(TC_pdp4_act_deact_ipcp_pap_broken());
|
|
execute(TC_pdp4_act_deact_pcodns());
|
|
execute(TC_pdp4_act_deact_gtpu_access());
|
|
execute(TC_pdp4_clients_interact_with_txseq());
|
|
execute(TC_pdp4_clients_interact_without_txseq());
|
|
execute(TC_pdp4_act_deact_with_single_dns());
|
|
execute(TC_pdp4_act_deact_with_separate_dns());
|
|
|
|
execute(TC_pdp6_act_deact());
|
|
execute(TC_pdp6_act_deact_pcodns());
|
|
execute(TC_pdp6_act_deact_icmp6());
|
|
execute(TC_pdp6_act_deact_gtpu_access());
|
|
execute(TC_pdp6_clients_interact());
|
|
|
|
execute(TC_pdp46_act_deact());
|
|
execute(TC_pdp46_act_deact_ipcp());
|
|
execute(TC_pdp46_act_deact_icmp6());
|
|
execute(TC_pdp46_act_deact_pcodns4());
|
|
execute(TC_pdp46_act_deact_pcodns6());
|
|
execute(TC_pdp46_act_deact_gtpu_access());
|
|
execute(TC_pdp46_clients_interact());
|
|
execute(TC_pdp46_act_deact_apn4());
|
|
|
|
execute(TC_echo_req_resp());
|
|
execute(TC_pdp_act2_recovery());
|
|
execute(TC_act_deact_retrans_duplicate());
|
|
|
|
if (m_ggsn_supports_echo_interval) {
|
|
execute(TC_pdp_act_restart_ctr_echo());
|
|
}
|
|
}
|
|
}
|