1#!/usr/bin/env python3 2# 3# Copyright (c) 2016, The OpenThread Authors. 4# All rights reserved. 5# 6# Redistribution and use in source and binary forms, with or without 7# modification, are permitted provided that the following conditions are met: 8# 1. Redistributions of source code must retain the above copyright 9# notice, this list of conditions and the following disclaimer. 10# 2. Redistributions in binary form must reproduce the above copyright 11# notice, this list of conditions and the following disclaimer in the 12# documentation and/or other materials provided with the distribution. 13# 3. Neither the name of the copyright holder nor the 14# names of its contributors may be used to endorse or promote products 15# derived from this software without specific prior written permission. 16# 17# THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" 18# AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 19# IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 20# ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE 21# LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR 22# CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF 23# SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS 24# INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN 25# CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) 26# ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE 27# POSSIBILITY OF SUCH DAMAGE. 28# 29 30import unittest 31 32import config 33import thread_cert 34from pktverify.consts import MLE_ADVERTISEMENT, MLE_LINK_REQUEST, MLE_PARENT_REQUEST, MLE_PARENT_RESPONSE, MLE_CHILD_UPDATE_RESPONSE, MLE_CHILD_ID_REQUEST, MLE_CHILD_ID_RESPONSE, RESPONSE_TLV, LINK_LAYER_FRAME_COUNTER_TLV, MODE_TLV, TIMEOUT_TLV, VERSION_TLV, TLV_REQUEST_TLV, ADDRESS16_TLV, NETWORK_DATA_TLV, ROUTE64_TLV, MODE_TLV, TIMEOUT_TLV, CHALLENGE_TLV, SOURCE_ADDRESS_TLV, LEADER_DATA_TLV, ADDRESS_REGISTRATION_TLV 35from pktverify.packet_verifier import PacketVerifier 36from pktverify.addrs import Ipv6Addr 37 38LEADER = 1 39ROUTER = 2 40ED1 = 3 41SED1 = 4 42 43MTDS = [ED1, SED1] 44 45 46class Cert_5_6_1_NetworkDataLeaderAsBr(thread_cert.TestCase): 47 TOPOLOGY = { 48 LEADER: { 49 'name': 'LEADER', 50 'mode': 'rdn', 51 'allowlist': [ROUTER] 52 }, 53 ROUTER: { 54 'name': 'ROUTER', 55 'mode': 'rdn', 56 'allowlist': [LEADER, ED1, SED1] 57 }, 58 ED1: { 59 'name': 'MED', 60 'is_mtd': True, 61 'mode': 'rn', 62 'allowlist': [ROUTER] 63 }, 64 SED1: { 65 'name': 'SED', 66 'is_mtd': True, 67 'mode': '-', 68 'timeout': config.DEFAULT_CHILD_TIMEOUT, 69 'allowlist': [ROUTER] 70 }, 71 } 72 73 def test(self): 74 self.nodes[LEADER].start() 75 self.simulator.go(config.LEADER_STARTUP_DELAY) 76 self.assertEqual(self.nodes[LEADER].get_state(), 'leader') 77 78 self.nodes[LEADER].add_prefix('2001:2:0:1::/64', 'paros') 79 self.nodes[LEADER].add_prefix('2001:2:0:2::/64', 'paro') 80 self.nodes[LEADER].register_netdata() 81 82 # Set lowpan context of sniffer 83 self.simulator.set_lowpan_context(1, '2001:2:0:1::/64') 84 self.simulator.set_lowpan_context(2, '2001:2:0:2::/64') 85 86 self.simulator.go(5) 87 88 self.nodes[ROUTER].start() 89 self.simulator.go(config.ROUTER_STARTUP_DELAY) 90 self.assertEqual(self.nodes[ROUTER].get_state(), 'router') 91 92 self.nodes[ED1].start() 93 self.simulator.go(5) 94 self.assertEqual(self.nodes[ED1].get_state(), 'child') 95 96 self.nodes[SED1].start() 97 self.simulator.go(5) 98 self.assertEqual(self.nodes[SED1].get_state(), 'child') 99 100 self.collect_rloc16s() 101 addrs = self.nodes[ED1].get_addrs() 102 self.assertTrue(any('2001:2:0:1' in addr[0:10] for addr in addrs)) 103 self.assertTrue(any('2001:2:0:2' in addr[0:10] for addr in addrs)) 104 for addr in addrs: 105 if addr[0:10] == '2001:2:0:1' or addr[0:10] == '2001:2:0:2': 106 self.assertTrue(self.nodes[LEADER].ping(addr)) 107 108 addrs = self.nodes[SED1].get_addrs() 109 self.assertTrue(any('2001:2:0:1' in addr[0:10] for addr in addrs)) 110 self.assertFalse(any('2001:2:0:2' in addr[0:10] for addr in addrs)) 111 for addr in addrs: 112 if addr[0:10] == '2001:2:0:1' or addr[0:10] == '2001:2:0:2': 113 self.assertTrue(self.nodes[LEADER].ping(addr)) 114 115 def verify(self, pv): 116 pkts = pv.pkts 117 pv.summary.show() 118 119 ROUTER = pv.vars['ROUTER'] 120 MED = pv.vars['MED'] 121 SED = pv.vars['SED'] 122 _rpkts = pkts.filter_wpan_src64(ROUTER) 123 _mpkts = pkts.filter_wpan_src64(MED) 124 _spkts = pkts.filter_wpan_src64(SED) 125 126 # Step 3: The DUT MUST request the Network Data TLV during the 127 # attaching procedure when sending MLE Child ID Request frame 128 _rpkts.filter_mle_cmd(MLE_CHILD_ID_REQUEST).must_next().must_verify( 129 lambda p: { 130 RESPONSE_TLV, LINK_LAYER_FRAME_COUNTER_TLV, MODE_TLV, TIMEOUT_TLV, VERSION_TLV, TLV_REQUEST_TLV, 131 ADDRESS16_TLV, NETWORK_DATA_TLV, ROUTE64_TLV 132 } <= set(p.mle.tlv.type)) 133 _rpkts_med = _rpkts.copy() 134 _rpkts_sed = _rpkts.copy() 135 136 # Step 6: The DUT MUST send an MLE Child ID Response to SED_1, 137 # containing only stable Network Data 138 _rpkts_sed.filter_mle_cmd(MLE_CHILD_ID_RESPONSE).filter_wpan_dst64(SED).must_next().must_verify( 139 lambda p: {MODE_TLV, TIMEOUT_TLV, CHALLENGE_TLV} <= set(p.thread_nwd.tlv.type) and 140 {Ipv6Addr('2001:2:0:1::')} == set(p.thread_nwd.tlv.prefix) and p.thread_nwd.tlv.border_router.flag.p == 141 [1] and p.thread_nwd.tlv.border_router.flag.s == [1] and p.thread_nwd.tlv.border_router.flag.r == [1] and p 142 .thread_nwd.tlv.border_router.flag.o == [1] and p.thread_nwd.tlv.stable == [1, 1, 1]) 143 144 # Step 8: The DUT MUST send a MLE Child ID Response to MED_1, 145 # containing the full Network Data 146 _rpkts_med.filter_mle_cmd(MLE_CHILD_ID_RESPONSE).filter_wpan_dst64(MED).must_next().must_verify( 147 lambda p: {Ipv6Addr('2001:2:0:1::'), Ipv6Addr('2001:2:0:2::')} == set( 148 p.thread_nwd.tlv.prefix) and p.thread_nwd.tlv.border_router.flag.p == [1, 1] and p.thread_nwd.tlv. 149 border_router.flag.s == [1, 1] and p.thread_nwd.tlv.border_router.flag.r == [1, 1] and p.thread_nwd.tlv. 150 border_router.flag.o == [1, 1] and p.thread_nwd.tlv.stable == [0, 1, 1, 1, 0, 0, 0]) 151 152 # Step 10: The DUT MUST send a unicast MLE Child Update 153 # Response to each of MED_1 and SED_1 154 _rpkts_med.filter_mle_cmd(MLE_CHILD_UPDATE_RESPONSE).must_next().must_verify( 155 lambda p: p.wpan.dst64 == MED and 156 {SOURCE_ADDRESS_TLV, MODE_TLV, LEADER_DATA_TLV, ADDRESS_REGISTRATION_TLV} <= set(p.mle.tlv.type)) 157 _rpkts_sed.filter_mle_cmd(MLE_CHILD_UPDATE_RESPONSE).must_next().must_verify( 158 lambda p: p.wpan.dst64 == SED and 159 {SOURCE_ADDRESS_TLV, MODE_TLV, LEADER_DATA_TLV, ADDRESS_REGISTRATION_TLV} <= set(p.mle.tlv.type)) 160 161 # Step 11: MED_1 and SED_1 MUST respond to each ICMPv6 Echo Request 162 # with an ICMPv6 Echo Reply 163 med_rloc16 = pv.vars['MED_RLOC16'] 164 sed_rloc16 = pv.vars['SED_RLOC16'] 165 router_rloc16 = pv.vars['ROUTER_RLOC16'] 166 _mpkts.range(_rpkts_med.index).filter( 167 lambda p: p.wpan.src16 == med_rloc16 and p.wpan.dst16 == router_rloc16).filter_ping_reply().must_next() 168 _spkts.range(_rpkts_sed.index).filter( 169 lambda p: p.wpan.src16 == sed_rloc16 and p.wpan.dst16 == router_rloc16).filter_ping_reply().must_next() 170 171 172if __name__ == '__main__': 173 unittest.main() 174