blob: ae92626cc9c12d41da507a21d0e4d3c7948ad420 [file] [log] [blame]
Harald Welte379d45a2017-08-03 09:55:15 +02001module GGSN_Tests {
2
Harald Welte34b5a952019-05-27 11:54:11 +02003/* GGSN test suite in TTCN-3
4 * (C) 2017-2019 Harald Welte <laforge@gnumonks.org>
5 * (C) 2018-2019 sysmocom - s.f.m.c. GmbH
6 * All rights reserved.
7 *
8 * Released under the terms of GNU General Public License, Version 2 or
9 * (at your option) any later version.
10 *
11 * SPDX-License-Identifier: GPL-2.0-or-later
12 */
13
14
Harald Welte94ade362017-08-04 00:36:55 +020015 import from General_Types all;
Harald Welte811651e2017-08-05 15:25:06 +020016 import from Osmocom_Types all;
Harald Welte94ade362017-08-04 00:36:55 +020017 import from IPL4asp_PortType all;
18 import from IPL4asp_Types all;
19 import from GTP_CodecPort all;
20 import from GTP_CodecPort_CtrlFunct all;
Harald Weltec69cf4e2018-02-17 20:57:02 +010021 import from GTP_Templates all;
Harald Welte94ade362017-08-04 00:36:55 +020022 import from GTPC_Types all;
23 import from GTPU_Types all;
Harald Welte71a36022017-12-04 18:55:58 +010024 import from IPCP_Types all;
Harald Weltef8298542019-04-10 10:15:28 +020025 import from PAP_Types all;
Harald Welte231b9412017-08-09 17:16:31 +020026 import from IP_Types all;
Pau Espin Pedrol3d9338f2018-01-29 20:42:54 +010027 import from ICMP_Types all;
Harald Welte231b9412017-08-09 17:16:31 +020028 import from ICMPv6_Types all;
Harald Welteddeecbb2017-08-18 22:53:30 +020029 import from Native_Functions all;
Stefan Sperlingc479e4f2018-04-03 19:34:16 +020030 import from Osmocom_VTY_Functions all;
31 import from TELNETasp_PortType all;
Harald Welte94ade362017-08-04 00:36:55 +020032
33 const integer GTP0_PORT := 3386;
34 const integer GTP1C_PORT := 2123;
35 const integer GTP1U_PORT := 2152;
Harald Welteddeecbb2017-08-18 22:53:30 +020036
37 modulepar {
Stefan Sperlingcb782b92018-04-03 16:03:15 +020038 /* Default IP addresses. May be overridden by GGSN_Tests configuration files. */
39
40 /* The SGSN simulated by TTCN3 will bind to these addresses for GTP control and GTP user planes. */
Harald Welteddeecbb2017-08-18 22:53:30 +020041 charstring m_bind_ip_gtpc := "127.23.42.1";
42 charstring m_bind_ip_gtpu := "127.23.42.1";
43
Stefan Sperlingcb782b92018-04-03 16:03:15 +020044 /* Addresses the GGSN which is being tested is listening on for SGSN connections. */
Harald Welteddeecbb2017-08-18 22:53:30 +020045 charstring m_ggsn_ip_gtpc := "127.0.0.6";
46 charstring m_ggsn_ip_gtpu := "127.0.0.6";
Pau Espin Pedrolf69a4382018-01-29 13:09:00 +010047
Stefan Sperlingcb782b92018-04-03 16:03:15 +020048 /*
49 * Our tests expect to see these DNS servers in 'Create PDP context responses' sent by the GGSN.
50 * These addresses must therefore match 'ip[v6] dns' options configured in osmo-ggsn.conf.
51 *
52 * These addresses are not expected to serve actual DNS requests. However, tests may expect to be
53 * able to ping these addresses (currently, IPv4 addresses must respond with an ICMP 'echo reply',
54 * and IPv6 addresses may respond with either ICMPv6 'echo reply' or 'destination unreachable').
55 */
Pau Espin Pedrolf69a4382018-01-29 13:09:00 +010056 charstring m_ggsn_ip4_dns1 := "192.168.100.1"
57 charstring m_ggsn_ip4_dns2 := "8.8.8.8"
Pau Espin Pedrol363ba482018-01-29 18:42:00 +010058 charstring m_ggsn_ip6_dns1 := "2001:4860:4860::8888"
59 charstring m_ggsn_ip6_dns2 := "2001:4860:4860::8844"
Stefan Sperlingcb782b92018-04-03 16:03:15 +020060
61 /*
62 * Additional address ranges are defined in osmo-ggsn.conf from which addresses are assigned
63 * to MS "behind" the simulated SGSN. These addresses appear on tun devices used by osmo-ggsn.
64 * The tests expect to be able to send ping packets between any two simulated MS within the same
65 * address range. This requires IP forwarding to be enabled on the corresponding tun interfaces.
66 */
Harald Welteddeecbb2017-08-18 22:53:30 +020067 }
Harald Welte94ade362017-08-04 00:36:55 +020068
Harald Welte811651e2017-08-05 15:25:06 +020069 type set PdpContext {
70 hexstring imsi,
71 octetstring msisdn optional,
72 octetstring apn,
Harald Welteed7a1772017-08-09 20:26:20 +020073 ProtConfigOptions pco_req optional,
74 ProtConfigOptions pco_neg optional,
Harald Welte811651e2017-08-05 15:25:06 +020075 EndUserAddress eua,
Harald Welte231b9412017-08-09 17:16:31 +020076 OCT16 ip6_prefix optional,
Harald Welte811651e2017-08-05 15:25:06 +020077 BIT4 nsapi,
78 /* TEI (Data) local side */
79 OCT4 teid,
80 /* TEI (Control) local side */
81 OCT4 teic,
82 /* TEI (Data) remote side */
83 OCT4 teid_remote,
84 /* TEI (Control) remote side */
Harald Welte5438b9d2017-08-13 13:27:48 +020085 OCT4 teic_remote
Harald Welte811651e2017-08-05 15:25:06 +020086 }
87
Harald Welte94ade362017-08-04 00:36:55 +020088 type component GT_CT {
89 port GTPC_PT GTPC;
90 port GTPU_PT GTPU;
91
Harald Welte0be142b2017-08-13 13:28:10 +020092 var boolean g_initialized := false;
93
Harald Welte94ade362017-08-04 00:36:55 +020094 var OCT1 g_restart_ctr := '01'O;
95 /* FIXME: unify with g_bind_ip + parse from config file */
Harald Welteddeecbb2017-08-18 22:53:30 +020096 var OCT4 g_sgsn_ip_c;
97 var OCT4 g_sgsn_ip_u;
Harald Welte94ade362017-08-04 00:36:55 +020098 /* FIXME: parse remName from config file */
Harald Welteddeecbb2017-08-18 22:53:30 +020099 var GtpPeer g_peer_c := { connId := 0, remName := m_ggsn_ip_gtpc, remPort := GTP1C_PORT };
100 var GtpPeer g_peer_u := { connId := 0, remName := m_ggsn_ip_gtpu, remPort := GTP1U_PORT };
Harald Welte94ade362017-08-04 00:36:55 +0200101 timer T_default := 3.0;
Harald Welte5438b9d2017-08-13 13:27:48 +0200102
103 /* next to-be-sent GTP-C sequence number */
104 var uint16_t g_c_seq_nr;
105 /* next to-be-sent GTP-U sequence number */
106 var uint16_t g_d_seq_nr;
Stefan Sperlingc479e4f2018-04-03 19:34:16 +0200107
108 port TELNETasp_PT GGSNVTY;
Harald Welted2394e92018-04-26 10:21:49 +0200109 var boolean use_gtpu_txseq := false;
Stefan Sperlingc479e4f2018-04-03 19:34:16 +0200110 }
111
112 private function f_init_vty() runs on GT_CT {
113 map(self:GGSNVTY, system:GGSNVTY);
114 f_vty_set_prompts(GGSNVTY);
115 f_vty_transceive(GGSNVTY, "enable");
116 }
117
118 private function f_vty_set_gpdu_txseq(boolean enable) runs on GT_CT {
119 f_vty_enter_config(GGSNVTY);
120 f_vty_transceive(GGSNVTY, "ggsn ggsn0");
Pau Espin Pedrol205a3842018-07-06 13:24:14 +0200121
Stefan Sperlingc479e4f2018-04-03 19:34:16 +0200122 f_vty_transceive(GGSNVTY, "apn internet");
123 if (enable) {
124 f_vty_transceive(GGSNVTY, "g-pdu tx-sequence-numbers");
125 } else {
126 f_vty_transceive(GGSNVTY, "no g-pdu tx-sequence-numbers");
127 }
Pau Espin Pedrol205a3842018-07-06 13:24:14 +0200128 f_vty_transceive(GGSNVTY, "exit");
129
130 f_vty_transceive(GGSNVTY, "apn inet6");
131 if (enable) {
132 f_vty_transceive(GGSNVTY, "g-pdu tx-sequence-numbers");
133 } else {
134 f_vty_transceive(GGSNVTY, "no g-pdu tx-sequence-numbers");
135 }
136 f_vty_transceive(GGSNVTY, "exit");
137
138 f_vty_transceive(GGSNVTY, "apn inet46");
139 if (enable) {
140 f_vty_transceive(GGSNVTY, "g-pdu tx-sequence-numbers");
141 } else {
142 f_vty_transceive(GGSNVTY, "no g-pdu tx-sequence-numbers");
143 }
Stefan Sperlingc479e4f2018-04-03 19:34:16 +0200144 f_vty_transceive(GGSNVTY, "end");
145 }
146
147 private function f_verify_gtpu_txseq(in PDU_GTPU gtpu, in boolean expect_gptu_txseq) return boolean {
148 if (expect_gptu_txseq) {
149 if (gtpu.s_bit != '1'B) {
150 log("GTPU sequence number expected but not present")
151 return false;
152 }
153 } else {
154 if (gtpu.s_bit != '0'B) {
155 log("GTPU sequence number not expected but present")
156 return false;
157 }
158 }
159 return true;
Harald Welte94ade362017-08-04 00:36:55 +0200160 }
161
162 function f_init() runs on GT_CT {
Harald Welte0be142b2017-08-13 13:28:10 +0200163 if (g_initialized == true) {
164 return;
165 }
166 g_initialized := true;
167
Harald Welteddeecbb2017-08-18 22:53:30 +0200168 g_sgsn_ip_c := f_inet_addr(m_bind_ip_gtpc);
169 g_sgsn_ip_u := f_inet_addr(m_bind_ip_gtpu);
170
Harald Welte94ade362017-08-04 00:36:55 +0200171 var Result res;
172 map(self:GTPC, system:GTPC);
Harald Welteddeecbb2017-08-18 22:53:30 +0200173 res := GTP_CodecPort_CtrlFunct.f_IPL4_listen(GTPC, m_bind_ip_gtpc, GTP1C_PORT, {udp:={}});
Harald Welte94ade362017-08-04 00:36:55 +0200174 log("GTP1C ConnectionID: ", res.connId);
Harald Welte811651e2017-08-05 15:25:06 +0200175 g_peer_c.connId := res.connId;
Harald Welte94ade362017-08-04 00:36:55 +0200176
177 map(self:GTPU, system:GTPU);
Harald Welteddeecbb2017-08-18 22:53:30 +0200178 res := GTP_CodecPort_CtrlFunct.f_GTPU_listen(GTPU, m_bind_ip_gtpu, GTP1U_PORT, {udp:={}});
Harald Welte811651e2017-08-05 15:25:06 +0200179 g_peer_u.connId:= res.connId;
Harald Welte5438b9d2017-08-13 13:27:48 +0200180
181 g_restart_ctr := f_rnd_octstring(1);
Harald Welte11dbc7b2017-08-13 18:57:56 +0200182 g_c_seq_nr := f_rnd_int(65535);
183 g_d_seq_nr := f_rnd_int(65535);
Stefan Sperlingc479e4f2018-04-03 19:34:16 +0200184
185 f_init_vty();
Harald Welte3e0b0392018-04-26 09:46:21 +0200186 f_vty_set_gpdu_txseq(use_gtpu_txseq);
Harald Welte94ade362017-08-04 00:36:55 +0200187 }
188
Harald Welte94ade362017-08-04 00:36:55 +0200189 /* Altstep implementing responses to any incoming echo requests */
190 altstep pingpong() runs on GT_CT {
191 var Gtp1cUnitdata ud;
Harald Welte3af89482017-08-04 16:20:23 +0200192 var Gtp1uUnitdata udu;
Harald Welte94ade362017-08-04 00:36:55 +0200193 [] GTPC.receive(tr_GTPC_PING(?)) -> value ud {
Harald Welte811651e2017-08-05 15:25:06 +0200194 var uint16_t seq := oct2int(ud.gtpc.opt_part.sequenceNumber);
195 GTPC.send(ts_GTPC_PONG(ud.peer, seq, '00'O));
Harald Welte94ade362017-08-04 00:36:55 +0200196 repeat;
197 };
Harald Welte3af89482017-08-04 16:20:23 +0200198 [] GTPU.receive(tr_GTPU_PING(?)) -> value udu {
Harald Welte811651e2017-08-05 15:25:06 +0200199 var uint16_t seq := oct2int(udu.gtpu.opt_part.sequenceNumber);
200 GTPU.send(ts_GTPU_PONG(udu.peer, seq, '00'O));
Harald Welte3af89482017-08-04 16:20:23 +0200201 };
Harald Welte94ade362017-08-04 00:36:55 +0200202 [] T_default.timeout { setverdict(fail); };
203 }
204
Harald Welte811651e2017-08-05 15:25:06 +0200205 /* 'internet' in DNS encoding */
Harald Welteed097432017-08-13 13:28:49 +0200206 const octetstring c_ApnInternet := '08696E7465726E6574'O;
207 const octetstring c_ApnInet6 := '05696E657436'O;
208 const octetstring c_ApnInet46 := '06696E65743436'O;
Harald Welte94ade362017-08-04 00:36:55 +0200209
Harald Welte811651e2017-08-05 15:25:06 +0200210 /* return random NSAPI */
211 function f_rnd_nsapi() return BIT4 {
212 return int2bit(f_rnd_int(16), 4);
213 }
214
215 /* return random TEI[DC] */
216 function f_rnd_tei() return OCT4 {
217 return int2oct(f_rnd_int(4294967296), 4);
218 }
219
220 /* define an (internal) representation of a PDP context */
221 template PdpContext t_DefinePDP(hexstring imsi, octetstring msisdn, octetstring apn,
222 EndUserAddress eua) := {
223 imsi := imsi,
224 msisdn := msisdn,
225 nsapi := f_rnd_nsapi(),
226 apn := apn,
Harald Welteed7a1772017-08-09 20:26:20 +0200227 pco_req := omit,
Harald Welte811651e2017-08-05 15:25:06 +0200228 eua := eua,
229 teid := f_rnd_tei(),
Harald Welte5438b9d2017-08-13 13:27:48 +0200230 teic := f_rnd_tei()
Harald Welte811651e2017-08-05 15:25:06 +0200231 }
232
233 /* send GTP-C for a given context and increment sequence number */
Harald Welte41575e92017-08-13 13:49:57 +0200234 function f_send_gtpc(in template Gtp1cUnitdata data) runs on GT_CT {
Harald Welte811651e2017-08-05 15:25:06 +0200235 GTPC.send(data);
Harald Welte5438b9d2017-08-13 13:27:48 +0200236 g_c_seq_nr := g_c_seq_nr + 1;
Harald Welte811651e2017-08-05 15:25:06 +0200237 }
238
239 /* send GTP-U for a given context and increment sequence number */
Harald Welte231b9412017-08-09 17:16:31 +0200240 function f_send_gtpu(inout PdpContext ctx, in octetstring data) runs on GT_CT {
Harald Welte3e0b0392018-04-26 09:46:21 +0200241 if (use_gtpu_txseq) {
Stefan Sperlingc479e4f2018-04-03 19:34:16 +0200242 GTPU.send(ts_GTP1U_GPDU(g_peer_u, g_d_seq_nr, ctx.teid_remote, data));
243 g_d_seq_nr := g_d_seq_nr + 1;
244 } else {
245 GTPU.send(ts_GTP1U_GPDU(g_peer_u, omit, ctx.teid_remote, data));
246 }
Harald Welte811651e2017-08-05 15:25:06 +0200247 }
248
249 /* send a PDP context activation */
Pau Espin Pedrol22d597f2019-08-21 16:16:58 +0200250 function f_pdp_ctx_act(inout PdpContext ctx, OCT1 exp_cause := '80'O) runs on GT_CT {
Harald Welte94ade362017-08-04 00:36:55 +0200251 var Gtp1cUnitdata ud;
Harald Welte94ade362017-08-04 00:36:55 +0200252 var default d;
253
254 log("sending CreatePDP");
Harald Welte41575e92017-08-13 13:49:57 +0200255 f_send_gtpc(ts_GTPC_CreatePDP(g_peer_c, g_c_seq_nr, ctx.imsi, g_restart_ctr,
Harald Welte811651e2017-08-05 15:25:06 +0200256 ctx.teid, ctx.teic, ctx.nsapi, ctx.eua, ctx.apn,
Harald Welteed7a1772017-08-09 20:26:20 +0200257 g_sgsn_ip_c, g_sgsn_ip_u, ctx.msisdn, ctx.pco_req));
Harald Welte94ade362017-08-04 00:36:55 +0200258 T_default.start;
Harald Welte94ade362017-08-04 00:36:55 +0200259 d := activate(pingpong());
260 alt {
Harald Welte811651e2017-08-05 15:25:06 +0200261 [] GTPC.receive(tr_GTPC_MsgType(g_peer_c, createPDPContextResponse, ctx.teic)) -> value ud {
262 var CreatePDPContextResponse cpr := ud.gtpc.gtpc_pdu.createPDPContextResponse;
Pau Espin Pedrol22d597f2019-08-21 16:16:58 +0200263 if (exp_cause == '80'O and exp_cause == cpr.cause.causevalue) {
Harald Welte99ef9a42017-08-14 21:42:03 +0200264 /* Check if EUA type corresponds to requested type */
265 if (match(ctx.eua, t_EuaIPv4(?)) and
266 not match(cpr.endUserAddress, tr_EuaIPv4(?))){
267 setverdict(fail);
268 }
269 if (match(ctx.eua, t_EuaIPv6(?)) and
270 not match(cpr.endUserAddress, tr_EuaIPv6(?))) {
271 setverdict(fail);
272 }
Oliver Smithee6a0882019-03-08 11:05:46 +0100273 if (match(ctx.eua, t_EuaIPv4v6(?, ?)) and
274 not match(cpr.endUserAddress, tr_EuaIPv4v6(?, ?))) {
275 setverdict(fail);
276 }
Harald Welte99ef9a42017-08-14 21:42:03 +0200277 /* Check if PCO response corresponds to request */
278 if (ispresent(ctx.pco_req)) {
279 if (match(ctx.pco_req, ts_PCO_IPv4_DNS_CONT) and
280 not match(cpr.protConfigOptions, tr_PCO_IPv4_DNS_CONT_resp(?))) {
281 log("IPv4 DNS Container requested, but missing");
282 setverdict(fail);
283 }
284 if (match(ctx.pco_req, ts_PCO_IPv6_DNS) and
285 not match(cpr.protConfigOptions, tr_PCO_IPv6_DNS_resp(?))) {
286 log("IPv6 DNS Container requested, but missing");
287 setverdict(fail);
288 }
289 }
Harald Welte811651e2017-08-05 15:25:06 +0200290 ctx.teid_remote := cpr.teidDataI.teidDataI;
291 ctx.teic_remote := cpr.teidControlPlane.teidControlPlane;
Harald Welte231b9412017-08-09 17:16:31 +0200292 ctx.eua := cpr.endUserAddress;
Harald Welteed7a1772017-08-09 20:26:20 +0200293 ctx.pco_neg := cpr.protConfigOptions;
Harald Welte94ade362017-08-04 00:36:55 +0200294 setverdict(pass);
Pau Espin Pedrol22d597f2019-08-21 16:16:58 +0200295 } else if (exp_cause != '80'O and exp_cause == cpr.cause.causevalue) {
296 if (ispresent(cpr.endUserAddress)) {
297 log("EUA received on createPDPContextResponse cause=" & oct2str(cpr.cause.causevalue));
298 setverdict(fail);
299 }
300 setverdict(pass);
Harald Welte94ade362017-08-04 00:36:55 +0200301 } else {
302 setverdict(fail);
303 }
304 }
305 }
306 deactivate(d);
Harald Welte811651e2017-08-05 15:25:06 +0200307 T_default.stop;
Harald Welte94ade362017-08-04 00:36:55 +0200308 }
309
Pau Espin Pedrol9a5f42f2019-05-27 20:04:35 +0200310 function f_pdp_ctx_del(PdpContext ctx, template BIT1 teardown_ind, OCT1 expect_causevalue := '80'O) runs on GT_CT {
Harald Weltef1e0d5a2017-08-05 08:51:22 +0200311 var Gtp1cUnitdata ud;
312 var default d;
Pau Espin Pedrol9a5f42f2019-05-27 20:04:35 +0200313 var OCT4 expect_teid;
314
315 /* 3GPP TS 29.060 sec 7.3.6 specifies TEID used in response
316 message with cause value "Non existent" shall be zero. */
317 if (expect_causevalue == 'C0'O) {
318 expect_teid := '00000000'O;
319 } else {
320 expect_teid := ctx.teic;
321 }
Harald Weltef1e0d5a2017-08-05 08:51:22 +0200322
Harald Welte41575e92017-08-13 13:49:57 +0200323 f_send_gtpc(ts_GTPC_DeletePDP(g_peer_c, g_c_seq_nr, ctx.teic_remote, ctx.nsapi, teardown_ind));
Harald Weltef1e0d5a2017-08-05 08:51:22 +0200324 T_default.start;
Harald Weltef1e0d5a2017-08-05 08:51:22 +0200325 d := activate(pingpong());
326 alt {
Pau Espin Pedrol9a5f42f2019-05-27 20:04:35 +0200327 [] GTPC.receive(tr_GTPC_MsgType(g_peer_c, deletePDPContextResponse, expect_teid)) -> value ud {
328 if (ud.gtpc.gtpc_pdu.deletePDPContextResponse.cause.causevalue == expect_causevalue) {
Harald Weltef1e0d5a2017-08-05 08:51:22 +0200329 setverdict(pass);
330 } else {
331 setverdict(fail);
332 }
333 }
334 }
335 deactivate(d);
Harald Welte811651e2017-08-05 15:25:06 +0200336 T_default.stop;
Harald Weltef1e0d5a2017-08-05 08:51:22 +0200337 }
Harald Welte811651e2017-08-05 15:25:06 +0200338 /* IPv6 router solicitation fe80::2 -> ff02::2 from 02:88:b5:1f:25:59 */
339 const octetstring c_router_solicit := '6000000000103afffe800000000000000000000000000002ff02000000000000000000000000000285009f2b0000000001010288b51f2559'O;
340 /* IPv6 neighbor solicitation fe80::2 -> ff02::1:ff00:2 from 02:88:b5:1f:25:59 */
341 const octetstring c_neigh_solicit:= '6000000000203afffe800000000000000000000000000002ff0200000000000000000001ff00000287009f9600000000fe80000000000000000000000000000201010288b51f2559'O;
Harald Weltef1e0d5a2017-08-05 08:51:22 +0200342
Stefan Sperling6cd217e2018-03-30 15:17:34 +0200343 /* template for sending an ICMPv4 echo request */
Pau Espin Pedrol3d9338f2018-01-29 20:42:54 +0100344 template PDU_ICMP ts_ICMPv4_ERQ := {
345 echo := {
346 type_field := 8,
347 code := 0,
348 checksum := '0000'O,
349 identifier := '0345'O,
350 sequence_number := '0001'O,
351 data := ''O
352 }
353 }
354
Stefan Sperling6cd217e2018-03-30 15:17:34 +0200355 /* template for receiving/matching an ICMPv4 echo request */
Pau Espin Pedrol6c7285d2018-01-30 17:20:22 +0100356 template PDU_ICMP tr_ICMPv4_ERQ := {
357 echo := {
358 type_field := 8,
359 code := 0,
360 checksum := ?,
361 identifier := ?,
362 sequence_number := ?,
363 data := ?
364 }
365 }
366
Stefan Sperling6cd217e2018-03-30 15:17:34 +0200367 /* template for receiving/matching an ICMPv4 echo reply */
Pau Espin Pedrol3d9338f2018-01-29 20:42:54 +0100368 template PDU_ICMP tr_ICMPv4_ERP(template octetstring data := *) := {
369 echo_reply := {
370 type_field := 0,
371 code := 0,
372 checksum := ?,
373 identifier := ?,
374 sequence_number := ?,
375 data := data
376 }
377 }
378
379 /* template for receiving/matching an ICMPv6 Destination Unreachable */
380 template PDU_ICMP tr_ICMPv4_DU := {
381 destination_unreachable := {
382 type_field := 1,
383 code := ?,
384 checksum := ?,
385 unused := ?,
386 original_ip_msg := ?
387 }
388 }
389
390 /* template to construct IPv4_packet from input arguments, ready for use in f_IPv4_enc() */
391 template IPv4_packet ts_IP4(OCT4 srcaddr, OCT4 dstaddr, LIN1 proto, LIN2_BO_LAST tlen, octetstring payload) := {
392 header := {
393 ver := 4,
394 hlen := 5,
395 tos := 0,
396 tlen := tlen,
397 id := 35902,
398 res := '0'B,
399 dfrag := '1'B,
400 mfrag := '0'B,
401 foffset := 0,
402 ttl := 64,
403 proto := proto,
404 cksum := 0,
405 srcaddr := srcaddr,
406 dstaddr := dstaddr
407 },
408 ext_headers := omit,
409 payload := payload
410 }
411
Harald Welte231b9412017-08-09 17:16:31 +0200412 /* template to generate a 'Prefix Information' ICMPv6 option */
413 template OptionField ts_ICMP6_OptPrefix(OCT16 prefix, INT1 prefix_len) := {
414 prefixInformation := {
415 typeField := 3,
416 lengthIndicator := 8,
417 prefixLength := prefix_len,
418 reserved1 := '000000'B,
419 a_Bit := '0'B,
420 l_Bit := '0'B,
421 validLifetime := oct2int('FFFFFFFF'O),
422 preferredLifetime := oct2int('FFFFFFFF'O),
423 reserved2 := '00000000'O,
424 prefix := prefix
425 }
426 }
427
Stefan Sperling6cd217e2018-03-30 15:17:34 +0200428 /* template for sending an ICMPv6 echo request */
Pau Espin Pedrol3d9338f2018-01-29 20:42:54 +0100429 template PDU_ICMPv6 ts_ICMPv6_ERQ := {
430 echoRequest := {
431 typeField := 128,
432 code := 0,
433 checksum := '0000'O,
434 identifier := 0,
435 sequenceNr := 0,
436 data := ''O
437 }
438 }
439
Stefan Sperling6cd217e2018-03-30 15:17:34 +0200440 /* template for sending an ICMPv6 router solicitation */
Harald Welte231b9412017-08-09 17:16:31 +0200441 template PDU_ICMPv6 ts_ICMPv6_RS := {
442 routerSolicitation := {
443 typeField := 133,
444 code := 0,
445 checksum := '0000'O,
446 reserved := '00000000'O,
447 /* TODO: do we need 'Source link-layer address' ? */
448 options := omit
449 }
450 }
451
Stefan Sperling6cd217e2018-03-30 15:17:34 +0200452 /* template for sending an ICMPv6 router advertisement */
Harald Welte231b9412017-08-09 17:16:31 +0200453 template PDU_ICMPv6 ts_ICMPv6_RA(OCT16 prefix, INT1 prefix_len) := {
454 routerAdvertisement := {
455 typeField := 134,
456 code := 0,
457 checksum := '0000'O,
458 curHopLimit := ?,
459 reserved := '000000'B,
460 o_Bit := '0'B,
461 m_Bit := '0'B,
462 routerLifetime := oct2int('FFFF'O),
463 reachableTime := oct2int('FFFFFFFF'O),
464 retransTimer := oct2int('FFFFFFFF'O),
465 options := {
466 ts_ICMP6_OptPrefix(prefix, prefix_len)
467 }
468 }
469 }
470
Stefan Sperling6cd217e2018-03-30 15:17:34 +0200471 /* template for sending an ICMPv6 neighbor solicitation */
Harald Welte231b9412017-08-09 17:16:31 +0200472 template PDU_ICMPv6 ts_ICMPv6_NS(OCT16 target_addr) := {
473 neighborSolicitation := {
474 typeField := 135,
475 code := 0,
476 checksum := '0000'O,
477 reserved := '00000000'O,
478 targetAddress := target_addr,
479 /* TODO: do we need 'Source link-layer address' ? */
480 options := omit
481 }
482 }
483
484 /* derive ICMPv6 link-local address from lower 64bit of link_id */
485 /* template for receiving/matching an ICMPv6 'Prefix Information' option */
486 template OptionField tr_ICMP6_OptPrefix(template OCT16 prefix, template INT1 prefix_len) := {
487 prefixInformation := {
488 typeField := 3,
489 lengthIndicator := 4,
490 prefixLength := prefix_len,
491 reserved1 := ?,
492 a_Bit := ?,
493 l_Bit := ?,
494 validLifetime := ?,
495 preferredLifetime := ?,
496 reserved2 := ?,
497 prefix := prefix
498 }
499 }
500
501 /* template for receiving/matching an ICMPv6 router advertisement */
502 template PDU_ICMPv6 tr_ICMPv6_RA(template OCT16 prefix, template INT1 prefix_len) := {
503 routerAdvertisement := {
504 typeField := 134,
505 code := 0,
506 checksum := ?,
507 curHopLimit := ?,
508 reserved := ?,
509 o_Bit := '0'B,
510 m_Bit := '0'B,
511 routerLifetime := ?,
512 reachableTime := ?,
513 retransTimer := ?,
514 options := {
515 tr_ICMP6_OptPrefix(prefix, prefix_len)
516 }
517 }
518 }
519
Pau Espin Pedrol3d9338f2018-01-29 20:42:54 +0100520 /* template for receiving/matching an ICMPv6 Destination Unreachable */
521 template PDU_ICMPv6 tr_ICMPv6_DU := {
522 destinationUnreachable := {
523 typeField := 1,
524 code := ?,
525 checksum := ?,
526 unused := ?,
527 originalIpMsg := ?
528 }
529 }
530
Stefan Sperling6cd217e2018-03-30 15:17:34 +0200531 /* template for receiving/matching an ICMPv6 echo request */
Pau Espin Pedrol6c7285d2018-01-30 17:20:22 +0100532 template PDU_ICMPv6 tr_ICMPv6_ERQ := {
533 echoRequest := {
534 typeField := 128,
535 code := 0,
536 checksum := ?,
537 identifier := ?,
538 sequenceNr := ?,
539 data := ?
540 }
541 }
542
Pau Espin Pedrol3d9338f2018-01-29 20:42:54 +0100543 /* template for receiving/matching an ICMPv6 echo reply */
544 template PDU_ICMPv6 tr_ICMPv6_ERP(template octetstring data := *) := {
545 echoReply := {
546 typeField := 129,
547 code := 0,
548 checksum := ?,
549 identifier := ?,
550 sequenceNr := ?,
551 data := data
552 }
553 }
554
Harald Welte231b9412017-08-09 17:16:31 +0200555 /* template to construct IPv6_packet from input arguments, ready for use in f_IPv6_enc() */
556 template IPv6_packet ts_IP6(OCT16 srcaddr, OCT16 dstaddr, LIN1 nexthead, octetstring payload, LIN1 hlim := 255) := {
557 header := {
558 ver := 6,
559 trclass := 0,
560 flabel := 0,
561 plen := 0,
562 nexthead := nexthead,
563 hlim := hlim,
564 srcaddr := srcaddr,
565 dstaddr := dstaddr
566 },
567 ext_headers := omit,
568 payload := payload
569 }
570
571 function f_ipv6_link_local(in OCT16 link_id) return OCT16 {
572 return 'FE80000000000000'O & substr(link_id, 8, 8);
573 }
574
Pau Espin Pedrol3d9338f2018-01-29 20:42:54 +0100575 function f_ipv6_global(in OCT16 link_id) return OCT16 {
576 return substr(link_id, 0, 8) & '1234123412341234'O;
577 }
578
579 /* Create a new different IPv6 addr from input. Starts mangling at byte prefix. */
580 function f_ipv6_mangle(in OCT16 addr, in integer prefix := 0) return OCT16 {
581 var integer i;
582 var octetstring res := substr(addr, 0, prefix);
583 for (i := prefix; i < lengthof(addr); i := i + 1) {
584 var octetstring a := addr[i] xor4b '11'O;
585 res := res & a;
586 }
587 return res;
588 }
589
Harald Welte231b9412017-08-09 17:16:31 +0200590 /* Compute solicited-node multicast address as per RFC4291 2.7.1 */
591 function f_ipv6_sol_node_mcast(in OCT16 addr) return OCT16 {
592 return 'FF0200000000000000000001FF'O & substr(addr, 13, 3);
593 }
594
595 /* generate and encode ICMPv6 router solicitation */
596 function f_gen_icmpv6_router_solicitation(in OCT16 link_id) return octetstring {
597 const OCT16 c_ip6_all_router_mcast := 'FF020000000000000000000000000002'O;
598 var OCT16 saddr := f_ipv6_link_local(link_id);
599
600 var octetstring tmp;
601 tmp := f_enc_PDU_ICMPv6(valueof(ts_ICMPv6_RS), saddr, c_ip6_all_router_mcast);
602 var IPv6_packet ip6 := valueof(ts_IP6(saddr, c_ip6_all_router_mcast, 58, tmp));
603
604 return f_IPv6_enc(ip6);
605 }
606
607 /* create ICMPv6 router solicitation deriving link-id from PDP Context EUA */
608 function f_icmpv6_rs_for_pdp(in PdpContext ctx) return octetstring {
609 var OCT16 interface_id := ctx.eua.endUserAddress.endUserAddressIPv6.ipv6_address;
610 return f_gen_icmpv6_router_solicitation(interface_id);
611 }
612
613 /* generate and encode ICMPv6 neighbor solicitation */
614 function f_gen_icmpv6_neigh_solicit(in OCT16 saddr, in OCT16 daddr, in OCT16 tgt_addr) return octetstring {
615 var octetstring tmp;
616 tmp := f_enc_PDU_ICMPv6(valueof(ts_ICMPv6_NS(tgt_addr)), saddr, daddr);
617 var IPv6_packet ip6 := valueof(ts_IP6(saddr, daddr, 58, tmp));
618 return f_IPv6_enc(ip6);
619 }
620
621 /* generate and encode ICMPv6 neighbor solicitation for PDP Context */
622 function f_gen_icmpv6_neigh_solicit_for_pdp(in PdpContext ctx) return octetstring {
623 var OCT16 interface_id := ctx.eua.endUserAddress.endUserAddressIPv6.ipv6_address;
624 var OCT16 link_local := f_ipv6_link_local(interface_id);
625 var OCT16 daddr := f_ipv6_sol_node_mcast(link_local);
626
627 return f_gen_icmpv6_neigh_solicit(link_local, daddr, link_local);
628 }
629
Pau Espin Pedrol3d9338f2018-01-29 20:42:54 +0100630 /* Send an ICMPv4 echo msg through GTP given pdp ctx, and ip src and dst addr */
631 function f_gen_icmpv4_echo(OCT4 saddr, OCT4 daddr) return octetstring {
632 var octetstring tmp := f_enc_PDU_ICMP(valueof(ts_ICMPv4_ERQ));
633 var IPv4_packet ip4 := valueof(ts_IP4(saddr, daddr, 1, 50, tmp));
634 var octetstring data := f_IPv4_enc(ip4);
635 var OCT2 cksum := f_IPv4_checksum(data);
636 data[10] := cksum[0];
637 data[11] := cksum[1];
638 return data;
639 }
640
641 /* Send an ICMPv6 echo msg through GTP given pdp ctx, and ip src and dst addr */
642 function f_gen_icmpv6_echo(OCT16 saddr, OCT16 daddr) return octetstring {
643 var octetstring tmp := f_enc_PDU_ICMPv6(valueof(ts_ICMPv6_ERQ), saddr, daddr);
644 var IPv6_packet ip6 := valueof(ts_IP6(saddr, daddr, 58, tmp));
645 var octetstring data := f_IPv6_enc(ip6);
646 return data;
647 }
648
649 /* Wait for ICMPv4 from GTP */
650 function f_wait_icmp4(PdpContext ctx, template PDU_ICMP expected) runs on GT_CT {
Harald Welte231b9412017-08-09 17:16:31 +0200651 var Gtp1uUnitdata ud;
652 T_default.start;
653 alt {
Pau Espin Pedrol3d9338f2018-01-29 20:42:54 +0100654 [] GTPU.receive(tr_GTPU_GPDU(g_peer_u, ?)) -> value ud {
Harald Welte3e0b0392018-04-26 09:46:21 +0200655 if (f_verify_gtpu_txseq(ud.gtpu, use_gtpu_txseq) == false) {
Stefan Sperlingc479e4f2018-04-03 19:34:16 +0200656 setverdict(fail);
657 stop;
658 }
Pau Espin Pedrol3d9338f2018-01-29 20:42:54 +0100659 var octetstring gpdu := ud.gtpu.gtpu_IEs.g_PDU_IEs.data;
660 var IPv4_packet ip4 := f_IPv4_dec(gpdu);
661 if (ip4.header.ver != 4) {
662 repeat;
663 }
664 var PDU_ICMP icmp4 := f_dec_PDU_ICMP(ip4.payload);
665 if (not match(icmp4, expected)) {
666 repeat;
667 }
668 }
669 [] GTPU.receive { setverdict(fail); }
670 [] T_default.timeout { setverdict(fail); }
671 }
672 T_default.stop;
673 }
674
Pau Espin Pedrol6c7285d2018-01-30 17:20:22 +0100675 /* Wait for ICMPv4 echo request from GTP */
676 function f_wait_icmp4_echo_request(PdpContext ctx) runs on GT_CT {
677 f_wait_icmp4(ctx, tr_ICMPv4_ERQ);
678 }
679
Pau Espin Pedrol3d9338f2018-01-29 20:42:54 +0100680 /* Wait for ICMPv4 echo reply (or unreachable) from GTP */
681 function f_wait_icmp4_echo_reply(PdpContext ctx) runs on GT_CT {
682 f_wait_icmp4(ctx, (tr_ICMPv4_ERP, tr_ICMPv4_DU));
683 }
684
685 /* Wait for ICMPv6 from GTP */
686 function f_wait_icmp6(PdpContext ctx, template PDU_ICMPv6 expected) runs on GT_CT {
687 var Gtp1uUnitdata ud;
688 T_default.start;
689 alt {
Harald Welte231b9412017-08-09 17:16:31 +0200690 [] GTPU.receive(tr_GTPU_GPDU(g_peer_u, ?)) -> value ud {
Harald Welte3e0b0392018-04-26 09:46:21 +0200691 if (f_verify_gtpu_txseq(ud.gtpu, use_gtpu_txseq) == false) {
Stefan Sperlingc479e4f2018-04-03 19:34:16 +0200692 setverdict(fail);
693 stop;
694 }
Harald Welte231b9412017-08-09 17:16:31 +0200695 var octetstring gpdu := ud.gtpu.gtpu_IEs.g_PDU_IEs.data;
696 var IPv6_packet ip6 := f_IPv6_dec(gpdu);
Pau Espin Pedrol3d9338f2018-01-29 20:42:54 +0100697 if (ip6.header.ver != 6 or ip6.header.nexthead != 58) {
Harald Welte231b9412017-08-09 17:16:31 +0200698 repeat;
699 }
700 var PDU_ICMPv6 icmp6 := f_dec_PDU_ICMPv6(ip6.payload);
Pau Espin Pedrol3d9338f2018-01-29 20:42:54 +0100701 if (not match(icmp6, expected)) {
Harald Welte231b9412017-08-09 17:16:31 +0200702 repeat;
703 }
Pau Espin Pedrol3d9338f2018-01-29 20:42:54 +0100704 /* We are waiting for RA, update ctx */
705 if (match(icmp6, tr_ICMPv6_RA(?, 64))) {
706 ctx.ip6_prefix := icmp6.routerAdvertisement.options[0].prefixInformation.prefix;
707 log("RA with /64 prefix ", ctx.ip6_prefix);
708 }
Harald Welte231b9412017-08-09 17:16:31 +0200709 }
710 [] GTPU.receive(tr_GTPU_GPDU(?, ?)) { repeat; }
711 [] GTPU.receive { setverdict(fail); }
712 [] T_default.timeout { setverdict(fail); }
713 }
714 T_default.stop;
715 }
716
Pau Espin Pedrol3d9338f2018-01-29 20:42:54 +0100717 /* wait for GGSN to send us an ICMPv6 router advertisement */
718 function f_wait_rtr_adv(PdpContext ctx) runs on GT_CT {
719 f_wait_icmp6(ctx, tr_ICMPv6_RA(?, 64));
720 }
721
Pau Espin Pedrol6c7285d2018-01-30 17:20:22 +0100722 /* Wait for ICMPv6 echo request from GTP */
723 function f_wait_icmp6_echo_request(PdpContext ctx) runs on GT_CT {
724 f_wait_icmp6(ctx, tr_ICMPv6_ERQ);
725 }
726
Pau Espin Pedrol3d9338f2018-01-29 20:42:54 +0100727 /* Wait for ICMPv6 echo reply (or unreachable) from GTP */
728 function f_wait_icmp6_echo_reply(PdpContext ctx) runs on GT_CT {
729 f_wait_icmp6(ctx, (tr_ICMPv6_ERP,tr_ICMPv6_DU));
730 }
731
Oliver Smithee6a0882019-03-08 11:05:46 +0100732 /* create ICMPv6 router solicitation deriving link-id from PDP Context EUA */
733 function f_icmpv6_rs_for_pdp46(in PdpContext ctx) return octetstring {
734 var OCT16 interface_id := ctx.eua.endUserAddress.endUserAddressIPv4andIPv6.ipv6_address;
735 return f_gen_icmpv6_router_solicitation(interface_id);
736 }
737
738 /* generate and encode ICMPv6 neighbor solicitation for PDP Context */
739 function f_gen_icmpv6_neigh_solicit_for_pdp46(in PdpContext ctx) return octetstring {
740 var OCT16 interface_id := ctx.eua.endUserAddress.endUserAddressIPv4andIPv6.ipv6_address;
741 var OCT16 link_local := f_ipv6_link_local(interface_id);
742 var OCT16 daddr := f_ipv6_sol_node_mcast(link_local);
743
744 return f_gen_icmpv6_neigh_solicit(link_local, daddr, link_local);
745 }
746
Pau Espin Pedrol3d9338f2018-01-29 20:42:54 +0100747 /* Assert we don't receive a ICMPv4/6 echo reply (or unreachable) from GTP */
748 function f_wait_gtpu_fail(PdpContext ctx) runs on GT_CT {
749 T_default.start;
750 alt {
751 [] GTPU.receive { setverdict(fail); }
752 [] T_default.timeout { }
753 }
754 T_default.stop;
755 }
756
Harald Welte79737b42019-04-10 10:39:30 +0200757 /* list of protocols where we don't accept duplicates */
758 const OCT2List protocol_ids_nodupes := { 'C021'O, 'C023'O, 'C223'O, '8021'O };
759 private function f_PCO_permits_duplicates(OCT2 id) return boolean {
760 var integer i;
761 for (i := 0; i < lengthof(protocol_ids_nodupes); i := i+1) {
762 if (id == protocol_ids_nodupes[i]) {
763 return false;
764 }
765 }
766 return true;
767 }
768
769 /* ensure that every given protocol Identifier exist only exactly once in the PCO */
770 function f_PCO_ensure_no_duplicates(ProtConfigOptions pco) {
771 var OCT2List protocol_ids := {};
772 var integer i, j;
773 for (i := 0; i < lengthof(pco.protocols); i := i+1) {
774 var OCT2 id := pco.protocols[i].protocolID;
775 for (j := 0; j < lengthof(protocol_ids); j := j+1) {
776 if (not f_PCO_permits_duplicates(id) and id == protocol_ids[j]) {
777 setverdict(fail, "Duplicate ProtocolID ", id, " already present in ", pco.protocols);
778 }
779 }
780 protocol_ids := protocol_ids & { id };
781 }
782 }
783
Harald Welte0ef285b2017-08-13 20:06:01 +0200784 /* Test IPv6 context activation for dynamic IPv6 EUA without request of IPv6 DNS */
Harald Welteed7a1772017-08-09 20:26:20 +0200785 testcase TC_pdp6_act_deact() runs on GT_CT {
Harald Welte94ade362017-08-04 00:36:55 +0200786 f_init();
Harald Welte231b9412017-08-09 17:16:31 +0200787
Harald Welteed097432017-08-13 13:28:49 +0200788 var PdpContext ctx := valueof(t_DefinePDP(f_rnd_imsi('26242'H), '1234'O, c_ApnInet6, valueof(t_EuaIPv6Dyn)));
Harald Welte811651e2017-08-05 15:25:06 +0200789 f_pdp_ctx_act(ctx);
Harald Welteed7a1772017-08-09 20:26:20 +0200790 f_pdp_ctx_del(ctx, '1'B);
791 }
792
Harald Welte0ef285b2017-08-13 20:06:01 +0200793 /* Test IPv6 context activation for dynamic IPv6 EUA wirh request of IPv6 DNS in PCO */
Harald Welteed7a1772017-08-09 20:26:20 +0200794 testcase TC_pdp6_act_deact_pcodns() runs on GT_CT {
795 f_init();
796
Harald Welteed097432017-08-13 13:28:49 +0200797 var PdpContext ctx := valueof(t_DefinePDP(f_rnd_imsi('26242'H), '1234'O, c_ApnInet6, valueof(t_EuaIPv6Dyn)));
Harald Welteed7a1772017-08-09 20:26:20 +0200798 ctx.pco_req := valueof(ts_PCO_IPv6_DNS);
799 f_pdp_ctx_act(ctx);
Pau Espin Pedrol363ba482018-01-29 18:42:00 +0100800
Harald Welte79737b42019-04-10 10:39:30 +0200801 f_PCO_ensure_no_duplicates(ctx.pco_neg);
Pau Espin Pedrol363ba482018-01-29 18:42:00 +0100802 /* verify PCO contains both primary and secondary DNS */
803 var OCT4 ggsn_ip6_dns1 := f_inet6_addr(m_ggsn_ip6_dns1);
804 if (not match(f_PCO_extract_proto(ctx.pco_neg, '0003'O, 1), ggsn_ip6_dns1)) {
805 setverdict(fail, "Primary DNS IPv6 PCO option not found");
806 }
807
808 var OCT4 ggsn_ip6_dns2 := f_inet6_addr(m_ggsn_ip6_dns2);
809 if (not match(f_PCO_extract_proto(ctx.pco_neg, '0003'O, 2), ggsn_ip6_dns2)) {
810 setverdict(fail, "Secondary DNS IPv6 PCO option not found");
811 }
812
Harald Welteed7a1772017-08-09 20:26:20 +0200813 f_pdp_ctx_del(ctx, '1'B);
814 }
815
Harald Welte0ef285b2017-08-13 20:06:01 +0200816 /* Test PDP context activation for dynamic IPv6 EUA with IPv6 DNS in PCO and router solicitation/advertisement */
Harald Welteed7a1772017-08-09 20:26:20 +0200817 testcase TC_pdp6_act_deact_icmp6() runs on GT_CT {
818 f_init();
819
Harald Welteed097432017-08-13 13:28:49 +0200820 var PdpContext ctx := valueof(t_DefinePDP(f_rnd_imsi('26242'H), '1234'O, c_ApnInet6, valueof(t_EuaIPv6Dyn)));
Harald Welteed7a1772017-08-09 20:26:20 +0200821 ctx.pco_req := valueof(ts_PCO_IPv6_DNS);
822 f_pdp_ctx_act(ctx);
Harald Welte231b9412017-08-09 17:16:31 +0200823
Harald Welte79737b42019-04-10 10:39:30 +0200824 f_PCO_ensure_no_duplicates(ctx.pco_neg);
Harald Welte231b9412017-08-09 17:16:31 +0200825 //f_send_gtpu(ctx, c_router_solicit);
826 //f_send_gtpu(ctx, c_neigh_solicit);
827
828 f_send_gtpu(ctx, f_icmpv6_rs_for_pdp(ctx));
829 f_wait_rtr_adv(ctx);
830 f_send_gtpu(ctx, f_gen_icmpv6_neigh_solicit_for_pdp(ctx));
831
Harald Welte811651e2017-08-05 15:25:06 +0200832 f_pdp_ctx_del(ctx, '1'B);
Harald Welte94ade362017-08-04 00:36:55 +0200833 }
834
Pau Espin Pedrol3d9338f2018-01-29 20:42:54 +0100835 /* Test PDP context activation for dynamic IPv6 EUA with IPv6 DNS in PCO and router solicitation/advertisement.
836 Test we can send ICMPv6 ping over GTPU to DNS server. */
837 testcase TC_pdp6_act_deact_gtpu_access() runs on GT_CT {
838 f_init();
839 var PdpContext ctx := valueof(t_DefinePDP(f_rnd_imsi('26242'H), '1234'O, c_ApnInet6, valueof(t_EuaIPv6Dyn)));
840 ctx.pco_req := valueof(ts_PCO_IPv6_DNS);
841 f_pdp_ctx_act(ctx);
842
843 f_send_gtpu(ctx, f_icmpv6_rs_for_pdp(ctx));
844 f_wait_rtr_adv(ctx);
845 f_send_gtpu(ctx, f_gen_icmpv6_neigh_solicit_for_pdp(ctx));
846
847 var OCT16 dns1_addr := f_PCO_extract_proto(ctx.pco_neg, '0003'O);
848
849 /* Check if we can use valid link-local src addr. */
850 var OCT16 saddr_ll := f_ipv6_link_local(ctx.eua.endUserAddress.endUserAddressIPv6.ipv6_address);
851 f_send_gtpu(ctx, f_gen_icmpv6_echo(saddr_ll, dns1_addr));
852 f_wait_icmp6_echo_reply(ctx);
853
854 /* Check that attempting RA with another ll src addr won't work, packet dropped: */
855 var OCT16 saddr_ll_wrong := f_ipv6_mangle(saddr_ll, 8);
856 f_send_gtpu(ctx, f_gen_icmpv6_router_solicitation(saddr_ll_wrong));
857 f_wait_gtpu_fail(ctx);
858
859 /* Check if we can use valid global src addr, should work */
860 var OCT16 saddr_glob := f_ipv6_global(ctx.eua.endUserAddress.endUserAddressIPv6.ipv6_address);
861 f_send_gtpu(ctx, f_gen_icmpv6_echo(saddr_glob, dns1_addr));
862 f_wait_icmp6_echo_reply(ctx);
863
864 /* Assert that packets with wrong global src addr are dropped by GGSN */
865 var OCT16 saddr_wrong := f_ipv6_mangle(saddr_glob);
866 f_send_gtpu(ctx, f_gen_icmpv6_echo(saddr_wrong, dns1_addr));
867 f_wait_gtpu_fail(ctx);
868
869 /* Send an IPv4 ICMP ECHO REQUEST to APN6, should fail (packet dropped) */
870 var OCT4 saddr_v4 := f_inet_addr("192.168.10.2");
871 var OCT4 daddr_v4 := f_inet_addr("8.8.8.8");
872 f_send_gtpu(ctx, f_gen_icmpv4_echo(saddr_v4, daddr_v4));
873 f_wait_gtpu_fail(ctx);
874
875 f_pdp_ctx_del(ctx, '1'B);
876 }
877
Pau Espin Pedrol6c7285d2018-01-30 17:20:22 +0100878 /* Validate if different clients (pdp ctx) can reach one another through GGSN. */
879 testcase TC_pdp6_clients_interact() runs on GT_CT {
880 f_init();
881 var PdpContext ctxA := valueof(t_DefinePDP(f_rnd_imsi('26242'H), '1234'O, c_ApnInet6, valueof(t_EuaIPv6Dyn)));
882 var PdpContext ctxB := valueof(t_DefinePDP(f_rnd_imsi('26242'H), '1234'O, c_ApnInet6, valueof(t_EuaIPv6Dyn)));
883 f_pdp_ctx_act(ctxA);
884 f_send_gtpu(ctxA, f_icmpv6_rs_for_pdp(ctxA));
885 f_wait_rtr_adv(ctxA);
886 f_send_gtpu(ctxA, f_gen_icmpv6_neigh_solicit_for_pdp(ctxA));
887
888 f_pdp_ctx_act(ctxB);
889 f_send_gtpu(ctxB, f_icmpv6_rs_for_pdp(ctxB));
890 f_wait_rtr_adv(ctxB);
891 f_send_gtpu(ctxB, f_gen_icmpv6_neigh_solicit_for_pdp(ctxB));
892
893 var OCT16 addrA_ll := f_ipv6_link_local(ctxA.eua.endUserAddress.endUserAddressIPv6.ipv6_address);
894 var OCT16 addrB_ll := f_ipv6_link_local(ctxB.eua.endUserAddress.endUserAddressIPv6.ipv6_address);
895 var OCT16 addrA_glob := f_ipv6_global(ctxA.eua.endUserAddress.endUserAddressIPv6.ipv6_address);
896 var OCT16 addrB_glob := f_ipv6_global(ctxB.eua.endUserAddress.endUserAddressIPv6.ipv6_address);
897
898 /* Validate if clients can interact using ll addr. */
899 f_send_gtpu(ctxA, f_gen_icmpv6_echo(addrA_ll, addrB_ll));
900 f_wait_gtpu_fail(ctxB);
901
902 /* Validate if clients can interact using global addr. */
903 f_send_gtpu(ctxA, f_gen_icmpv6_echo(addrA_glob, addrB_glob));
904 f_wait_gtpu_fail(ctxB);
905
906 f_pdp_ctx_del(ctxA, '1'B);
907 }
908
Harald Welte0ef285b2017-08-13 20:06:01 +0200909 /* Test PDP context activation for dynamic IPv4 EUA without DNS request */
Harald Welteed7a1772017-08-09 20:26:20 +0200910 testcase TC_pdp4_act_deact() runs on GT_CT {
911 f_init();
Harald Welteed097432017-08-13 13:28:49 +0200912 var PdpContext ctx := valueof(t_DefinePDP(f_rnd_imsi('26242'H), '1234'O, c_ApnInternet, valueof(t_EuaIPv4Dyn)));
Harald Welteed7a1772017-08-09 20:26:20 +0200913 f_pdp_ctx_act(ctx);
914 f_pdp_ctx_del(ctx, '1'B);
915 }
916
Harald Welte0ef285b2017-08-13 20:06:01 +0200917 /* Test PDP context activation for dynamic IPv4 EUA with IPv4 DNS in IPCP */
Harald Welteed7a1772017-08-09 20:26:20 +0200918 testcase TC_pdp4_act_deact_ipcp() runs on GT_CT {
919 f_init();
Pau Espin Pedrolf69a4382018-01-29 13:09:00 +0100920 var OCT4 ggsn_ip4_dns1 := f_inet_addr(m_ggsn_ip4_dns1);
921 var OCT4 ggsn_ip4_dns2 := f_inet_addr(m_ggsn_ip4_dns2);
Harald Welteed097432017-08-13 13:28:49 +0200922 var PdpContext ctx := valueof(t_DefinePDP(f_rnd_imsi('26242'H), '1234'O, c_ApnInternet, valueof(t_EuaIPv4Dyn)));
Harald Weltedca80052017-08-13 20:01:38 +0200923 ctx.pco_req := valueof(ts_PCO_IPv4_DNS_IPCP);
Harald Welteed7a1772017-08-09 20:26:20 +0200924 f_pdp_ctx_act(ctx);
Harald Welte79737b42019-04-10 10:39:30 +0200925 f_PCO_ensure_no_duplicates(ctx.pco_neg);
Harald Welte71a36022017-12-04 18:55:58 +0100926 /* verify IPCP is at all contained */
927 if (not match(ctx.pco_neg, tr_PCO_Contains('8021'O))) {
928 setverdict(fail, "IPCP not found in PCO");
929 }
930 /* verify IPCP contains both primary and secondary DNS */
931 var IpcpPacket ipcp := dec_IpcpPacket(f_PCO_extract_proto(ctx.pco_neg, '8021'O));
Pau Espin Pedrolf69a4382018-01-29 13:09:00 +0100932 if (not match(ipcp, tr_IPCP_Ack_DNS(0, ggsn_ip4_dns1, ggsn_ip4_dns2))) {
933 if (not match(ipcp, tr_IPCP_Ack_DNS(0))) {
934 setverdict(fail, "Primary/Secondary DNS PCO IPCP option not found");
935 } else {
936 setverdict(fail, "Primary/Secondary DNS PCO IPCP option found but not matching expected values");
937 }
Harald Welte71a36022017-12-04 18:55:58 +0100938 }
Harald Welteed7a1772017-08-09 20:26:20 +0200939 f_pdp_ctx_del(ctx, '1'B);
940 }
941
Harald Weltef8298542019-04-10 10:15:28 +0200942 /* Test PDP context activation for dynamic IPv4 EUA with IPv4 DNS in IPCP + PAP authentication (broken) */
943 testcase TC_pdp4_act_deact_ipcp_pap_broken() runs on GT_CT {
944 f_init();
945 var OCT4 ggsn_ip4_dns1 := f_inet_addr(m_ggsn_ip4_dns1);
946 var OCT4 ggsn_ip4_dns2 := f_inet_addr(m_ggsn_ip4_dns2);
947 var PdpContext ctx := valueof(t_DefinePDP(f_rnd_imsi('26242'H), '1234'O, c_ApnInternet, valueof(t_EuaIPv4Dyn)));
948 ctx.pco_req := valueof(ts_PCO_PAP_IPv4_DNS);
949 f_pdp_ctx_act(ctx);
950 f_PCO_ensure_no_duplicates(ctx.pco_neg);
951 /* verify IPCP is at all contained */
952 if (not match(ctx.pco_neg, tr_PCO_Contains('8021'O))) {
953 setverdict(fail, "IPCP not found in PCO");
954 }
955 /* verify IPCP contains both primary and secondary DNS */
956 var IpcpPacket ipcp := dec_IpcpPacket(f_PCO_extract_proto(ctx.pco_neg, '8021'O));
957 if (not match(ipcp, tr_IPCP_Ack_DNS(0, ggsn_ip4_dns1, ggsn_ip4_dns2))) {
958 if (not match(ipcp, tr_IPCP_Ack_DNS(0))) {
959 setverdict(fail, "Primary/Secondary DNS PCO IPCP option not found");
960 } else {
961 setverdict(fail, "Primary/Secondary DNS PCO IPCP option found but not matching expected values");
962 }
963 }
964 /* verify that PAP is contained */
965 if (not match(ctx.pco_neg, tr_PCO_Contains('C023'O))) {
966 setverdict(fail, "PAP not found in PCO");
967 }
968 var PapPacket pap := dec_PapPacket(f_PCO_extract_proto(ctx.pco_neg, 'C023'O));
969 if (not match(pap, tr_PAP_AuthAck)) {
970 setverdict(fail, "PAP isn't an AuthenticateAck: ", pap);
971 }
972 f_pdp_ctx_del(ctx, '1'B);
973 }
974
Harald Welte0ef285b2017-08-13 20:06:01 +0200975 /* Test PDP context activation for dynamic IPv4 EUA with IPv4 DNS in PCO */
Harald Welteed7a1772017-08-09 20:26:20 +0200976 testcase TC_pdp4_act_deact_pcodns() runs on GT_CT {
977 f_init();
Harald Welteed097432017-08-13 13:28:49 +0200978 var PdpContext ctx := valueof(t_DefinePDP(f_rnd_imsi('26242'H), '1234'O, c_ApnInternet, valueof(t_EuaIPv4Dyn)));
Harald Weltedca80052017-08-13 20:01:38 +0200979 ctx.pco_req := valueof(ts_PCO_IPv4_DNS_CONT);
Harald Welteed7a1772017-08-09 20:26:20 +0200980 f_pdp_ctx_act(ctx);
Pau Espin Pedrol363ba482018-01-29 18:42:00 +0100981
Harald Welte79737b42019-04-10 10:39:30 +0200982 f_PCO_ensure_no_duplicates(ctx.pco_neg);
Pau Espin Pedrol363ba482018-01-29 18:42:00 +0100983 /* verify PCO contains both primary and secondary DNS */
984 var OCT4 ggsn_ip4_dns1 := f_inet_addr(m_ggsn_ip4_dns1);
985 if (not match(f_PCO_extract_proto(ctx.pco_neg, '000d'O, 1), ggsn_ip4_dns1)) {
986 setverdict(fail, "Primary DNS IPv4 PCO option not found");
987 }
988
989 var OCT4 ggsn_ip4_dns2 := f_inet_addr(m_ggsn_ip4_dns2);
990 if (not match(f_PCO_extract_proto(ctx.pco_neg, '000d'O, 2), ggsn_ip4_dns2)) {
991 setverdict(fail, "Secondary DNS IPv4 PCO option not found");
992 }
993
Harald Welteed7a1772017-08-09 20:26:20 +0200994 f_pdp_ctx_del(ctx, '1'B);
995 }
996
Pau Espin Pedrol3d9338f2018-01-29 20:42:54 +0100997 /* Test PDP context activation for dynamic IPv4 EUA.
998 Test we can send ICMPv6 ping over GTPU to DNS server. */
999 testcase TC_pdp4_act_deact_gtpu_access() runs on GT_CT {
1000 f_init();
1001 var PdpContext ctx := valueof(t_DefinePDP(f_rnd_imsi('26242'H), '1234'O, c_ApnInternet, valueof(t_EuaIPv4Dyn)));
1002 ctx.pco_req := valueof(ts_PCO_IPv4_DNS_CONT);
1003 f_pdp_ctx_act(ctx);
1004
Harald Welte79737b42019-04-10 10:39:30 +02001005 f_PCO_ensure_no_duplicates(ctx.pco_neg);
Pau Espin Pedrol3d9338f2018-01-29 20:42:54 +01001006 var OCT4 dns1_addr := f_PCO_extract_proto(ctx.pco_neg, '000d'O);
1007
1008 /* Check if we can use valid global src addr, should work */
1009 var OCT4 saddr := ctx.eua.endUserAddress.endUserAddressIPv4.ipv4_address;
1010 f_send_gtpu(ctx, f_gen_icmpv4_echo(saddr, dns1_addr));
1011 f_wait_icmp4_echo_reply(ctx);
1012
1013 /* Assert that packets with wrong global src addr are dropped by GGSN */
1014 var OCT4 saddr_wrong := substr(saddr, 0, 3) & (saddr[3] xor4b '11'O);
1015 f_send_gtpu(ctx, f_gen_icmpv4_echo(saddr_wrong, dns1_addr));
1016 f_wait_gtpu_fail(ctx);
1017
1018 /* Send an IPv6 RA to APN4, should fail (packet dropped) */
1019 var OCT16 saddr_v6 := f_inet6_addr("fde4:8dba:82e1:2000:1:2:3:4");
1020 f_send_gtpu(ctx, f_gen_icmpv6_router_solicitation(saddr_v6));
1021 f_wait_gtpu_fail(ctx);
1022 f_pdp_ctx_del(ctx, '1'B);
1023 }
1024
Stefan Sperlingc479e4f2018-04-03 19:34:16 +02001025 /* Helper function for tests below. */
1026 function f_pdp4_clients_interact() runs on GT_CT {
Pau Espin Pedrol6c7285d2018-01-30 17:20:22 +01001027 f_init();
1028 var PdpContext ctxA := valueof(t_DefinePDP(f_rnd_imsi('26242'H), '1234'O, c_ApnInternet, valueof(t_EuaIPv4Dyn)));
1029 var PdpContext ctxB := valueof(t_DefinePDP(f_rnd_imsi('26242'H), '1234'O, c_ApnInternet, valueof(t_EuaIPv4Dyn)));
1030 f_pdp_ctx_act(ctxA);
1031 f_pdp_ctx_act(ctxB);
1032 var OCT4 addrA := ctxA.eua.endUserAddress.endUserAddressIPv4.ipv4_address;
1033 var OCT4 addrB := ctxB.eua.endUserAddress.endUserAddressIPv4.ipv4_address;
1034 f_send_gtpu(ctxA, f_gen_icmpv4_echo(addrA, addrB));
1035 f_wait_icmp4_echo_request(ctxB);
1036
1037 f_pdp_ctx_del(ctxA, '1'B);
1038 }
1039
Stefan Sperlingc479e4f2018-04-03 19:34:16 +02001040 /* Validate if different clients (pdp ctx) can reach one another through GGSN. */
1041 testcase TC_pdp4_clients_interact_with_txseq() runs on GT_CT {
Harald Welte3e0b0392018-04-26 09:46:21 +02001042 use_gtpu_txseq := true;
Stefan Sperlingc479e4f2018-04-03 19:34:16 +02001043 f_pdp4_clients_interact();
1044 }
1045
1046 /* Validate if different clients (pdp ctx) can reach one another through GGSN (without Tx sequence number). */
1047 testcase TC_pdp4_clients_interact_without_txseq() runs on GT_CT {
Harald Welte3e0b0392018-04-26 09:46:21 +02001048 use_gtpu_txseq := false;
Stefan Sperlingc479e4f2018-04-03 19:34:16 +02001049 f_pdp4_clients_interact();
1050 }
1051
Harald Weltedca80052017-08-13 20:01:38 +02001052 testcase TC_echo_req_resp() runs on GT_CT {
1053 f_init();
1054 f_send_gtpc(ts_GTPC_PING(g_peer_c, g_c_seq_nr));
1055 T_default.start;
1056 alt {
1057 [] GTPC.receive(tr_GTPC_PONG(g_peer_c)) { setverdict(pass); };
1058 [] GTPC.receive { repeat; };
1059 [] T_default.timeout { setverdict(fail); }
1060 }
1061 T_default.stop;
1062 }
1063
Philipp Maier33e52612018-05-30 17:22:02 +02001064 /* Test if the parser can cope with PCO that only contain either a
1065 * single primary DNS or a secondary DNS. */
1066 testcase TC_pdp4_act_deact_with_single_dns() runs on GT_CT {
1067
1068 /* Note: an unpatched osmo-ggsn version will enter an endless-loop when
1069 * the test is executed.
1070 * see also: Change-Id Icffde89f9bc5d8fcadf6e2dd6c0b4de03440edd5 and OS#3288 */
1071
1072 f_init();
1073 var PdpContext ctx := valueof(t_DefinePDP(f_rnd_imsi('26242'H), '1234'O, c_ApnInternet, valueof(t_EuaIPv4Dyn)));
1074 var OCT4 ggsn_ip4_dns1 := f_inet_addr(m_ggsn_ip4_dns1);
1075 var OCT4 ggsn_ip4_dns2 := f_inet_addr(m_ggsn_ip4_dns2);
1076 var octetstring pco_neg_dns;
1077 var octetstring pco_neg_dns_expected;
1078
1079 /* PCO with primary DNS only */
1080 ctx.pco_req := valueof(ts_PCO_IPv4_PRI_DNS_IPCP);
1081 f_pdp_ctx_act(ctx);
Harald Welte79737b42019-04-10 10:39:30 +02001082 f_PCO_ensure_no_duplicates(ctx.pco_neg);
Philipp Maier33e52612018-05-30 17:22:02 +02001083 pco_neg_dns := f_PCO_extract_proto(ctx.pco_neg, '8021'O, 1);
1084 pco_neg_dns_expected := '0200000A8106'O & ggsn_ip4_dns1
1085 /* Note: The prepended hex bytes encode the following information:
1086 * 0x02 = Configuration ACK
1087 * 0x00 = Identifier
1088 * 0x000a = Length
1089 * 0x81 = Type (Primary DNS Server Address)
1090 * 0x06 = Length
1091 * (4 byte IP-Address appended) */
1092 if (not match(pco_neg_dns, pco_neg_dns_expected)) {
1093 setverdict(fail, "Primary DNS IPv4 PCO option not found");
1094 }
1095 f_pdp_ctx_del(ctx, '1'B);
1096
1097 /* PCO with secondary DNS only */
1098 ctx.pco_req := valueof(ts_PCO_IPv4_SEC_DNS_IPCP);
1099 f_pdp_ctx_act(ctx);
1100 pco_neg_dns := f_PCO_extract_proto(ctx.pco_neg, '8021'O, 1);
1101 pco_neg_dns_expected := '0200000A8306'O & ggsn_ip4_dns2
1102 if (not match(pco_neg_dns, pco_neg_dns_expected)) {
1103 setverdict(fail, "Secondary DNS IPv4 PCO option not found");
1104 }
1105 f_pdp_ctx_del(ctx, '1'B);
1106 }
1107
1108 /* Test if the parser can cope with PCO that contains primary and secondary DNS in a separate IPCP container.
1109 * Note: an unpatched osmo-ggsn version will enter an endless-loop when the test is run
1110 * see Change-Id Icffde89f9bc5d8fcadf6e2dd6c0b4de03440edd5 and OS#3288. */
1111 testcase TC_pdp4_act_deact_with_separate_dns() runs on GT_CT {
1112
1113 /* Note: an unpatched osmo-ggsn version will enter an endless-loop when
1114 * the test is executed.
1115 * see also: Change-Id Icffde89f9bc5d8fcadf6e2dd6c0b4de03440edd5 and OS#3288 */
1116
1117 f_init();
1118 var PdpContext ctx := valueof(t_DefinePDP(f_rnd_imsi('26242'H), '1234'O, c_ApnInternet, valueof(t_EuaIPv4Dyn)));
1119 var OCT4 ggsn_ip4_dns1 := f_inet_addr(m_ggsn_ip4_dns1);
1120 var OCT4 ggsn_ip4_dns2 := f_inet_addr(m_ggsn_ip4_dns2);
1121 var octetstring pco_neg_dns;
1122 var octetstring pco_neg_dns_expected;
1123
1124 ctx.pco_req := valueof(ts_PCO_IPv4_SEPARATE_DNS_IPCP);
1125 f_pdp_ctx_act(ctx);
1126
1127 /* Check if primary DNS is contained */
1128 pco_neg_dns := f_PCO_extract_proto(ctx.pco_neg, '8021'O, 1);
1129 pco_neg_dns_expected := '0200000A8106'O & ggsn_ip4_dns1
1130 if (not match(pco_neg_dns, pco_neg_dns_expected)) {
1131 setverdict(fail, "Primary DNS IPv4 PCO option not found");
1132 }
Philipp Maier33e52612018-05-30 17:22:02 +02001133
1134 /* Check if secondary DNS is contained */
Stefan Sperling8e7a3962018-07-19 19:24:38 +02001135 /* This used to fail due to a bug in osmo-ggsn, see OS#3381 */
1136 pco_neg_dns := f_PCO_extract_proto(ctx.pco_neg, '8021'O, 2);
Philipp Maier33e52612018-05-30 17:22:02 +02001137 pco_neg_dns_expected := '0200000A8306'O & ggsn_ip4_dns2
1138 if (not match(pco_neg_dns, pco_neg_dns_expected)) {
1139 setverdict(fail, "Secondary DNS IPv4 PCO option not found");
1140 }
1141 f_pdp_ctx_del(ctx, '1'B);
1142 }
1143
Oliver Smithee6a0882019-03-08 11:05:46 +01001144 /* Test IPv4v6 context activation for dynamic IPv4v6 EUA without DNS request */
1145 testcase TC_pdp46_act_deact() runs on GT_CT {
1146 f_init();
1147 var PdpContext ctx := valueof(t_DefinePDP(f_rnd_imsi('26242'H), '1234'O, c_ApnInet46, valueof(t_EuaIPv4Dynv6Dyn)));
1148 f_pdp_ctx_act(ctx);
1149 f_pdp_ctx_del(ctx, '1'B);
1150 }
1151
1152 /* Test PDP context activation for dynamic IPv4v6 EUA with IPv4 DNS in IPCP */
1153 testcase TC_pdp46_act_deact_ipcp() runs on GT_CT {
1154 f_init();
1155 var OCT4 ggsn_ip4_dns1 := f_inet_addr(m_ggsn_ip4_dns1);
1156 var OCT4 ggsn_ip4_dns2 := f_inet_addr(m_ggsn_ip4_dns2);
1157 var PdpContext ctx := valueof(t_DefinePDP(f_rnd_imsi('26242'H), '1234'O, c_ApnInet46, valueof(t_EuaIPv4Dynv6Dyn)));
1158 ctx.pco_req := valueof(ts_PCO_IPv4_DNS_IPCP);
1159 f_pdp_ctx_act(ctx);
Harald Welte79737b42019-04-10 10:39:30 +02001160 f_PCO_ensure_no_duplicates(ctx.pco_neg);
Oliver Smithee6a0882019-03-08 11:05:46 +01001161 /* verify IPCP is at all contained */
1162 if (not match(ctx.pco_neg, tr_PCO_Contains('8021'O))) {
1163 setverdict(fail, "IPCP not found in PCO");
1164 }
Harald Welte79737b42019-04-10 10:39:30 +02001165 f_PCO_ensure_no_duplicates(ctx.pco_neg);
Oliver Smithee6a0882019-03-08 11:05:46 +01001166 /* verify IPCP contains both primary and secondary IPv4 DNS */
1167 var IpcpPacket ipcp := dec_IpcpPacket(f_PCO_extract_proto(ctx.pco_neg, '8021'O));
1168 if (not match(ipcp, tr_IPCP_Ack_DNS(0, ggsn_ip4_dns1, ggsn_ip4_dns2))) {
1169 if (not match(ipcp, tr_IPCP_Ack_DNS(0))) {
1170 setverdict(fail, "Primary/Secondary DNS PCO IPCP option not found");
1171 } else {
1172 setverdict(fail, "Primary/Secondary DNS PCO IPCP option found but not matching expected values");
1173 }
1174 }
1175 f_pdp_ctx_del(ctx, '1'B);
1176 }
1177
1178 /* Test PDP context activation for dynamic IPv4v6 EUA with IPv6 DNS in PCO and router solicitation/advertisement */
1179 testcase TC_pdp46_act_deact_icmp6() runs on GT_CT {
1180 f_init();
1181 var PdpContext ctx := valueof(t_DefinePDP(f_rnd_imsi('26242'H), '1234'O, c_ApnInet46, valueof(t_EuaIPv4Dynv6Dyn)));
1182 ctx.pco_req := valueof(ts_PCO_IPv6_DNS);
1183 f_pdp_ctx_act(ctx);
1184
1185 f_send_gtpu(ctx, f_icmpv6_rs_for_pdp46(ctx));
1186 f_wait_rtr_adv(ctx);
1187 f_send_gtpu(ctx, f_gen_icmpv6_neigh_solicit_for_pdp46(ctx));
1188
1189 f_pdp_ctx_del(ctx, '1'B);
1190 }
1191
1192 /* Test IPv4v6 context activation for dynamic IPv4v6 EUA with request of IPv4 DNS in PCO */
1193 testcase TC_pdp46_act_deact_pcodns4() runs on GT_CT {
1194 f_init();
1195
1196 var PdpContext ctx := valueof(t_DefinePDP(f_rnd_imsi('26242'H), '1234'O, c_ApnInet46, valueof(t_EuaIPv4Dynv6Dyn)));
1197 ctx.pco_req := valueof(ts_PCO_IPv4_DNS_CONT);
1198 f_pdp_ctx_act(ctx);
1199
Harald Welte79737b42019-04-10 10:39:30 +02001200 f_PCO_ensure_no_duplicates(ctx.pco_neg);
Oliver Smithee6a0882019-03-08 11:05:46 +01001201 /* verify PCO contains both primary and secondary IPv4 DNS */
1202 var OCT4 ggsn_ip4_dns1 := f_inet_addr(m_ggsn_ip4_dns1);
1203 if (not match(f_PCO_extract_proto(ctx.pco_neg, '000d'O, 1), ggsn_ip4_dns1)) {
1204 setverdict(fail, "Primary DNS IPv4 PCO option not found");
1205 }
1206
1207 var OCT4 ggsn_ip4_dns2 := f_inet_addr(m_ggsn_ip4_dns2);
1208 if (not match(f_PCO_extract_proto(ctx.pco_neg, '000d'O, 2), ggsn_ip4_dns2)) {
1209 setverdict(fail, "Secondary DNS IPv4 PCO option not found");
1210 }
1211
1212 f_pdp_ctx_del(ctx, '1'B);
1213 }
1214
1215 /* Test IPv4v6 context activation for dynamic IPv4v6 EUA with request of IPv6 DNS in PCO */
1216 testcase TC_pdp46_act_deact_pcodns6() runs on GT_CT {
1217 f_init();
1218
1219 var PdpContext ctx := valueof(t_DefinePDP(f_rnd_imsi('26242'H), '1234'O, c_ApnInet46, valueof(t_EuaIPv4Dynv6Dyn)));
1220 ctx.pco_req := valueof(ts_PCO_IPv6_DNS);
1221 f_pdp_ctx_act(ctx);
1222
Harald Welte79737b42019-04-10 10:39:30 +02001223 f_PCO_ensure_no_duplicates(ctx.pco_neg);
Oliver Smithee6a0882019-03-08 11:05:46 +01001224 /* verify PCO contains both primary and secondary IPv6 DNS */
1225 var OCT4 ggsn_ip6_dns1 := f_inet6_addr(m_ggsn_ip6_dns1);
1226 if (not match(f_PCO_extract_proto(ctx.pco_neg, '0003'O, 1), ggsn_ip6_dns1)) {
1227 setverdict(fail, "Primary DNS IPv6 PCO option not found");
1228 }
1229
1230 var OCT4 ggsn_ip6_dns2 := f_inet6_addr(m_ggsn_ip6_dns2);
1231 if (not match(f_PCO_extract_proto(ctx.pco_neg, '0003'O, 2), ggsn_ip6_dns2)) {
1232 setverdict(fail, "Secondary DNS IPv6 PCO option not found");
1233 }
1234
1235 f_pdp_ctx_del(ctx, '1'B);
1236 }
1237
1238 /* Test PDP context activation for dynamic IPv4v6 EUA.
1239 Test we can send ICMPv6 ping over GTPU to DNS server. */
1240 testcase TC_pdp46_act_deact_gtpu_access() runs on GT_CT {
1241 f_init();
1242 var PdpContext ctx := valueof(t_DefinePDP(f_rnd_imsi('26242'H), '1234'O, c_ApnInet46, valueof(t_EuaIPv4Dynv6Dyn)));
1243 ctx.pco_req := valueof(ts_PCO_IPv4_DNS_CONT);
1244 f_pdp_ctx_act(ctx);
1245
1246 var OCT4 dns1_addr := f_PCO_extract_proto(ctx.pco_neg, '000d'O);
1247
1248 /* Check if we can use valid global src addr, should work */
1249 var OCT4 saddr := ctx.eua.endUserAddress.endUserAddressIPv4andIPv6.ipv4_address;
1250 f_send_gtpu(ctx, f_gen_icmpv4_echo(saddr, dns1_addr));
1251 f_wait_icmp4_echo_reply(ctx);
1252
1253 /* Assert that packets with wrong global src addr are dropped by GGSN */
1254 var OCT4 saddr_wrong := substr(saddr, 0, 3) & (saddr[3] xor4b '11'O);
1255 f_send_gtpu(ctx, f_gen_icmpv4_echo(saddr_wrong, dns1_addr));
1256 f_wait_gtpu_fail(ctx);
1257
1258 /* Send an IPv6 RA to APN4, should fail (packet dropped) */
1259 var OCT16 saddr_v6 := f_inet6_addr("fde4:8dba:82e1:2000:1:2:3:4");
1260 f_send_gtpu(ctx, f_gen_icmpv6_router_solicitation(saddr_v6));
1261 f_wait_gtpu_fail(ctx);
1262 f_pdp_ctx_del(ctx, '1'B);
1263 }
1264
1265 /* Validate if different clients (pdp ctx) can reach one another through GGSN. */
1266 testcase TC_pdp46_clients_interact() runs on GT_CT {
1267 f_init();
1268 var PdpContext ctxA := valueof(t_DefinePDP(f_rnd_imsi('26242'H), '1234'O, c_ApnInet46, valueof(t_EuaIPv4Dynv6Dyn)));
1269 var PdpContext ctxB := valueof(t_DefinePDP(f_rnd_imsi('26242'H), '1234'O, c_ApnInet46, valueof(t_EuaIPv4Dynv6Dyn)));
1270 f_pdp_ctx_act(ctxA);
1271 f_send_gtpu(ctxA, f_icmpv6_rs_for_pdp46(ctxA));
1272 f_wait_rtr_adv(ctxA);
1273 f_send_gtpu(ctxA, f_gen_icmpv6_neigh_solicit_for_pdp46(ctxA));
1274
1275 f_pdp_ctx_act(ctxB);
1276 f_send_gtpu(ctxB, f_icmpv6_rs_for_pdp46(ctxB));
1277 f_wait_rtr_adv(ctxB);
1278 f_send_gtpu(ctxB, f_gen_icmpv6_neigh_solicit_for_pdp46(ctxB));
1279
1280 var OCT16 addrA_ll := f_ipv6_link_local(ctxA.eua.endUserAddress.endUserAddressIPv4andIPv6.ipv6_address);
1281 var OCT16 addrB_ll := f_ipv6_link_local(ctxB.eua.endUserAddress.endUserAddressIPv4andIPv6.ipv6_address);
1282 var OCT16 addrA_glob := f_ipv6_global(ctxA.eua.endUserAddress.endUserAddressIPv4andIPv6.ipv6_address);
1283 var OCT16 addrB_glob := f_ipv6_global(ctxB.eua.endUserAddress.endUserAddressIPv4andIPv6.ipv6_address);
1284
1285 /* Validate if clients can interact using ll addr. */
1286 f_send_gtpu(ctxA, f_gen_icmpv6_echo(addrA_ll, addrB_ll));
1287 f_wait_gtpu_fail(ctxB);
1288
1289 /* Validate if clients can interact using global addr. */
1290 f_send_gtpu(ctxA, f_gen_icmpv6_echo(addrA_glob, addrB_glob));
1291 f_wait_gtpu_fail(ctxB);
1292
1293 f_pdp_ctx_del(ctxA, '1'B);
1294 }
1295
Pau Espin Pedrol22d597f2019-08-21 16:16:58 +02001296 /* Test IPv4v6 context activation for dynamic IPv4v6 EUA on a v4-only APN */
1297 testcase TC_pdp46_act_deact_apn4() runs on GT_CT {
1298 f_init();
1299 /* A typical MS first attempts v4v6, and if rejected, then tries v4 and v6 separetly */
1300 var PdpContext ctx46 := valueof(t_DefinePDP(f_rnd_imsi('26242'H), '1234'O, c_ApnInternet, valueof(t_EuaIPv4Dynv6Dyn)));
1301 f_pdp_ctx_act(ctx46, 'DC'O); /* Cause: Unknown PDP address or PDP type */
1302
1303 var PdpContext ctx4 := valueof(t_DefinePDP(f_rnd_imsi('26242'H), '1234'O, c_ApnInternet, valueof(t_EuaIPv4Dyn)));
1304 f_pdp_ctx_act(ctx4, '80'O); /* Normal accept cause */
1305
1306 var PdpContext ctx6 := valueof(t_DefinePDP(f_rnd_imsi('26242'H), '1234'O, c_ApnInternet, valueof(t_EuaIPv6Dyn)));
1307 f_pdp_ctx_act(ctx6, 'DC'O); /* Cause: Unknown PDP address or PDP type */
1308
1309 f_pdp_ctx_del(ctx4, '1'B);
1310 }
1311
Pau Espin Pedrol9a5f42f2019-05-27 20:04:35 +02001312 /* Send a duplicate echo req. osmo-ggsn maintains a queue for sent
1313 responses (60 seconds): If same delete req is sent and duplicate is
1314 detected, saved duplicate response should be sent back. */
1315 testcase TC_act_deact_retrans_duplicate() runs on GT_CT {
1316 f_init();
1317 var PdpContext ctx := valueof(t_DefinePDP(f_rnd_imsi('26242'H), '1234'O, c_ApnInternet, valueof(t_EuaIPv4Dyn)));
1318 f_pdp_ctx_act(ctx);
1319 f_pdp_ctx_del(ctx, '1'B);
1320 /* leave some time in between to make sure retransmit response queue keeps packets for a while */
1321 f_sleep(1.0);
1322 /* g_c_seq_nr was increased during f_pdp_ctx_del(), we want a
1323 duplicate. If it was not a duplicate, osmo-ggsn would answer
1324 with a failure since that PDP ctx was already deleted. */
1325 g_c_seq_nr := g_c_seq_nr - 1;
1326 f_pdp_ctx_del(ctx, '1'B);
1327
1328 /* Now send a new pdp ctx del (increased seqnum). It should fail with cause "non-existent": */
1329 var OCT1 cause_nonexistent := 'C0'O;
1330 f_pdp_ctx_del(ctx, '1'B, cause_nonexistent);
1331 }
1332
Harald Welte94ade362017-08-04 00:36:55 +02001333 control {
Harald Welteed7a1772017-08-09 20:26:20 +02001334 execute(TC_pdp4_act_deact());
1335 execute(TC_pdp4_act_deact_ipcp());
Harald Weltef8298542019-04-10 10:15:28 +02001336 execute(TC_pdp4_act_deact_ipcp_pap_broken());
Harald Welteed7a1772017-08-09 20:26:20 +02001337 execute(TC_pdp4_act_deact_pcodns());
Pau Espin Pedrol3d9338f2018-01-29 20:42:54 +01001338 execute(TC_pdp4_act_deact_gtpu_access());
Stefan Sperlingc479e4f2018-04-03 19:34:16 +02001339 execute(TC_pdp4_clients_interact_with_txseq());
1340 execute(TC_pdp4_clients_interact_without_txseq());
Philipp Maier33e52612018-05-30 17:22:02 +02001341 execute(TC_pdp4_act_deact_with_single_dns());
1342 execute(TC_pdp4_act_deact_with_separate_dns());
Harald Welteed7a1772017-08-09 20:26:20 +02001343
1344 execute(TC_pdp6_act_deact());
1345 execute(TC_pdp6_act_deact_pcodns());
1346 execute(TC_pdp6_act_deact_icmp6());
Pau Espin Pedrol3d9338f2018-01-29 20:42:54 +01001347 execute(TC_pdp6_act_deact_gtpu_access());
Pau Espin Pedrol6c7285d2018-01-30 17:20:22 +01001348 execute(TC_pdp6_clients_interact());
Harald Weltedca80052017-08-13 20:01:38 +02001349
Oliver Smithee6a0882019-03-08 11:05:46 +01001350 execute(TC_pdp46_act_deact());
1351 execute(TC_pdp46_act_deact_ipcp());
1352 execute(TC_pdp46_act_deact_icmp6());
1353 execute(TC_pdp46_act_deact_pcodns4());
1354 execute(TC_pdp46_act_deact_pcodns6());
1355 execute(TC_pdp46_act_deact_gtpu_access());
1356 execute(TC_pdp46_clients_interact());
Pau Espin Pedrol22d597f2019-08-21 16:16:58 +02001357 execute(TC_pdp46_act_deact_apn4());
Oliver Smithee6a0882019-03-08 11:05:46 +01001358
Harald Weltedca80052017-08-13 20:01:38 +02001359 execute(TC_echo_req_resp());
Pau Espin Pedrol9a5f42f2019-05-27 20:04:35 +02001360 execute(TC_act_deact_retrans_duplicate());
Harald Welte94ade362017-08-04 00:36:55 +02001361 }
Harald Welte379d45a2017-08-03 09:55:15 +02001362}