1#!/usr/bin/env python3 2# 3# Copyright (c) 2016, The OpenThread Authors. 4# All rights reserved. 5# 6# Redistribution and use in source and binary forms, with or without 7# modification, are permitted provided that the following conditions are met: 8# 1. Redistributions of source code must retain the above copyright 9# notice, this list of conditions and the following disclaimer. 10# 2. Redistributions in binary form must reproduce the above copyright 11# notice, this list of conditions and the following disclaimer in the 12# documentation and/or other materials provided with the distribution. 13# 3. Neither the name of the copyright holder nor the 14# names of its contributors may be used to endorse or promote products 15# derived from this software without specific prior written permission. 16# 17# THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" 18# AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 19# IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 20# ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE 21# LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR 22# CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF 23# SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS 24# INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN 25# CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) 26# ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE 27# POSSIBILITY OF SUCH DAMAGE. 28# 29 30import unittest 31 32import config 33import thread_cert 34from pktverify.consts import MLE_ADVERTISEMENT, MLE_CHILD_ID_RESPONSE 35from pktverify.packet_verifier import PacketVerifier 36 37LEADER = 1 38ROUTER = 2 39 40 41class Cert_5_8_3_KeyIncrementRollOver(thread_cert.TestCase): 42 TOPOLOGY = { 43 LEADER: { 44 'name': 'LEADER', 45 'key_sequence_counter': 127, 46 'mode': 'rdn', 47 'allowlist': [ROUTER] 48 }, 49 ROUTER: { 50 'name': 'ROUTER', 51 'mode': 'rdn', 52 'allowlist': [LEADER] 53 }, 54 } 55 56 def test(self): 57 self.nodes[LEADER].start() 58 self.simulator.go(config.LEADER_STARTUP_DELAY) 59 self.assertEqual(self.nodes[LEADER].get_state(), 'leader') 60 61 self.nodes[ROUTER].start() 62 self.simulator.go(config.ROUTER_STARTUP_DELAY) 63 self.assertEqual(self.nodes[ROUTER].get_state(), 'router') 64 65 self.collect_ipaddrs() 66 addrs = self.nodes[ROUTER].get_addrs() 67 for addr in addrs: 68 if addr[0:4] != 'fe80': 69 self.assertTrue(self.nodes[LEADER].ping(addr)) 70 71 key_sequence_counter = self.nodes[LEADER].get_key_sequence_counter() 72 self.nodes[LEADER].set_key_sequence_counter(key_sequence_counter + 1) 73 74 addrs = self.nodes[ROUTER].get_addrs() 75 for addr in addrs: 76 if addr[0:4] != 'fe80': 77 self.assertTrue(self.nodes[LEADER].ping(addr)) 78 79 def verify(self, pv): 80 pkts = pv.pkts 81 pv.summary.show() 82 83 LEADER = pv.vars['LEADER'] 84 ROUTER = pv.vars['ROUTER'] 85 leader_pkts = pkts.filter_wpan_src64(LEADER) 86 router_pkts = pkts.filter_wpan_src64(ROUTER) 87 88 # Step 1: The DUT must start the network using 89 # thrKeySequenceCounter = 127 90 _lpkts = leader_pkts.filter_mle_cmd(MLE_ADVERTISEMENT).must_next() 91 self.assertTrue(_lpkts.wpan.aux_sec.key_source == 127) 92 93 # Step 2: Verify that the topology described above is created. 94 # MLE Auxiliary security header shall contain Key Source = 127, 95 # KeyIndex = 128, KeyID Mode = 2 96 leader_pkts.filter_mle_cmd(MLE_CHILD_ID_RESPONSE).must_next() 97 _lpkts = leader_pkts.copy() 98 _rpkts = router_pkts.range(leader_pkts.index) 99 100 _rpkts.filter_mle_cmd( 101 MLE_ADVERTISEMENT).must_next().must_verify(lambda p: p.wpan.aux_sec.key_index == 128 and p.wpan.aux_sec. 102 key_id_mode == 2 and p.wpan.aux_sec.key_source == 127) 103 104 # Step 3: Leader send an ICMPv6 Echo Request to Router_1. 105 # The MAC Auxiliary security header must contain 106 # KeyIndex = 128, KeyID Mode = 1 107 leader_mleid = pv.vars['LEADER_MLEID'] 108 router_mleid = pv.vars['ROUTER_MLEID'] 109 _lpkts.filter(lambda p: p.ipv6.dst == router_mleid).filter_ping_request().must_next().must_verify( 110 lambda p: p.wpan.aux_sec.key_index == 128 and p.wpan.aux_sec.key_id_mode == 1) 111 112 # Step 4: Router_1 send an ICMPv6 Echo Reply to Leader. 113 # The MAC Auxiliary security header must contain 114 # KeyIndex = 128, KeyID Mode = 1 115 _rpkts.filter(lambda p: p.ipv6.dst == leader_mleid).filter_ping_reply().must_next().must_verify( 116 lambda p: p.wpan.aux_sec.key_index == 128 and p.wpan.aux_sec.key_id_mode == 1) 117 118 # Step 5: The DUT MUST implementation specific means increment 119 # thrKeySequenceCounter by 1 to force a key switch 120 # Step 6: Leader Send an ICMPv6 Echo Request to Router_1. 121 # The MAC Auxiliary security header must contain 122 # KeyIndex = 1, KeyID Mode = 1 123 _lpkts.filter(lambda p: p.ipv6.dst == router_mleid).filter_ping_request().must_next().must_verify( 124 lambda p: p.wpan.aux_sec.key_index == 1 and p.wpan.aux_sec.key_id_mode == 1) 125 126 # Step 7: Router_1 send an ICMPv6 Echo Reply to Leader. 127 # The MAC Auxiliary security header must contain 128 # KeyIndex = 1, KeyID Mode = 1 129 _rpkts.filter(lambda p: p.ipv6.dst == leader_mleid).filter_ping_reply().must_next().must_verify( 130 lambda p: p.wpan.aux_sec.key_index == 1 and p.wpan.aux_sec.key_id_mode == 1) 131 132 133if __name__ == '__main__': 134 unittest.main() 135