def verify(self, pv: PacketVerifier): pkts = pv.pkts pv.add_common_vars() pv.summary.show() pv.verify_attached('BR_1') MM = pv.vars['MM_PORT'] BB = pv.vars['BB_PORT'] BR_1 = pv.vars['BR_1'] BR_1_ETH = pv.vars['BR_1_ETH'] Host_ETH = pv.vars['Host_ETH'] BR_1_BGUA = pv.vars['BR_1_BGUA'] Host_BGUA = pv.vars['Host_BGUA'] Dg = pv.vars['Dg'] # DUA of Router_2 ROUTER2 = pv.vars['Router_2'] # Step 3: BR_1: Checks received Network Data and determines that it needs to send its BBR Dataset to the # leader to become primary BBR. pkts.filter_wpan_src64(BR_1).filter_coap_request( '/a/sd', port=MM).must_next().must_verify(""" thread_nwd.tlv.server_16 is not null and thread_nwd.tlv.service.s_data.seqno is not null and thread_nwd.tlv.service.s_data.rrdelay is not null and thread_nwd.tlv.service.s_data.mlrtimeout is not null """) pv.verify_dua_registration(ROUTER2, Dg, pbbr_eth=BR_1_ETH, pbbr_src64=BR_1) # Verify Host ping BBR pkts.filter_eth_src(Host_ETH).filter_ipv6_src_dst( Host_BGUA, BR_1_BGUA).filter_ping_request().must_next() pkts.filter_eth_src(BR_1_ETH).filter_ipv6_src_dst( BR_1_BGUA, Host_BGUA).filter_ping_reply().must_next() # Verify BR_1 ping Host pkts.filter_eth_src(BR_1_ETH).filter_ipv6_src_dst( BR_1_BGUA, Host_BGUA).filter_ping_request().must_next() pkts.filter_eth_src(Host_ETH).filter_ipv6_src_dst( Host_BGUA, BR_1_BGUA).filter_ping_reply().must_next() # Step 16: Host: Queries DUA, Dg, with ND-NS pkts.filter_eth_src(Host_ETH).filter_icmpv6_nd_ns(Dg).must_next() # Step 17: BR_1: Responds with a neighbor advertisement. pkts.filter_eth_src(BR_1_ETH).filter_icmpv6_nd_na(Dg).must_next()
def verify(self, pv: PacketVerifier): pkts = pv.pkts pv.add_common_vars() pv.summary.show() PBBR = pv.vars['PBBR'] ROUTER1 = pv.vars['ROUTER1'] ROUTER1_DUA = pv.vars['ROUTER1_DUA'] ROUTER2 = pv.vars['ROUTER2'] ROUTER2_DUA = pv.vars['ROUTER2_DUA'] PBBR_ETH = pv.vars['PBBR_ETH'] SBBR_ETH = pv.vars['SBBR_ETH'] PBBR2 = pv.vars['PBBR2'] PBBR2_ETH = pv.vars['PBBR2_ETH'] MM = pv.vars['MM_PORT'] BB = pv.vars['BB_PORT'] # Verify the whole DAD process for ROUTER1 pv.verify_dua_registration(ROUTER1, ROUTER1_DUA, pbbr_eth=PBBR_ETH, pbbr_src64=PBBR, sbbr_eth=SBBR_ETH) # Verify the whole DAD process for ROUTER2 pv.verify_dua_registration(ROUTER2, ROUTER2_DUA, pbbr_eth=PBBR2_ETH, pbbr_src64=PBBR2) ############################################################################################################### # Now we verify Extending ADDR.qry to BB.qry works for the Ping Request from Router2 to Router1 ############################################################################################################### # Router2 should send ADDR.qry in the Thread network for Router1's DUA pkts.filter_wpan_src64(ROUTER2).filter_coap_request( '/a/aq', port=MM).filter('thread_address.tlv.target_eid == {ROUTER1_DUA}', ROUTER1_DUA=ROUTER1_DUA).must_next() # PBBR2 should extend ADDR.qry to BB.qry pkts.filter_backbone_query(ROUTER1_DUA, eth_src=PBBR2_ETH, port=BB).must_next() # SBBR should not answer with BB.ans pkts.filter_backbone_query(ROUTER1_DUA, eth_src=SBBR_ETH, port=BB).must_not_next() # PBBR1 should answer with BB.ans pkts.filter_backbone_answer(ROUTER1_DUA, eth_src=PBBR_ETH, port=BB).must_next() # PBBR2 should send ADDR.ntf to Router2 pkts.filter_wpan_src64(PBBR2).filter_coap_request( '/a/an', port=MM).filter('thread_address.tlv.target_eid == {ROUTER1_DUA}', ROUTER1_DUA=ROUTER1_DUA).must_next() # Now, Router2 should send the Ping Request to PBBR2 pkts.filter_wpan_src64(ROUTER2).filter_ping_request().filter_ipv6_dst( ROUTER1_DUA).must_next() ############################################################################################################### # Now we start to verify that DAD duplicate is handled correctly ############################################################################################################### # PBBR should send /b/bq for DUPLICATE_DUA pkts.filter_backbone_query(DUPLICATE_DUA, eth_src=PBBR_ETH, port=BB).must_next() # PBBR2 should send /b/ba for DUPLICATE_DUA ba = pkts.filter_backbone_answer(DUPLICATE_DUA, eth_src=PBBR2_ETH, port=BB).must_next() ba.must_verify(""" set(thread_bl.tlv.type) == {tlvs} and thread_bl.tlv.last_transaction_time > 0 and thread_meshcop.tlv.net_name == {NET_NAME} """, tlvs={0, 3, 6, 12}, **pv.vars) # PBBR should NOT send /b/bq for DUPLICATE_DUA anymore pkts.filter_backbone_query(DUPLICATE_DUA, eth_src=PBBR_ETH, port=BB).must_not_next() # PBBR should send ADDR_ERR.ntf to Router1 ROUTER1_RLOC = pv.vars['ROUTER1_RLOC'] pkts.filter_wpan_src64(PBBR).filter_ipv6_dst(ROUTER1_RLOC).filter_coap_request('/a/ae', port=MM).must_next() \ .must_verify(""" thread_address.tlv.target_eid == {DUPLICATE_DUA} and thread_address.tlv.ml_eid == {ml_eid} """, DUPLICATE_DUA=DUPLICATE_DUA, ml_eid=ba.thread_bl.tlv.ml_eid) # Router1 should generate new DUA and register again # Router1 should generate and register a new DUA with pkts.save_index(): new_dr = pkts.filter_wpan_src64(ROUTER1).filter_coap_request( '/n/dr', port=MM).must_next().must_verify(""" thread_nm.tlv.target_eid != {DUPLICATE_DUA} """, DUPLICATE_DUA=DUPLICATE_DUA) router1_dua2 = new_dr.thread_nm.tlv.target_eid # Verify the DAD process for the new DUA pv.verify_dua_registration(ROUTER1, router1_dua2, pbbr_eth=PBBR_ETH, pbbr_src64=PBBR, sbbr_eth=SBBR_ETH) ############################################################################################################### # Now we start to verify that PRO_BB.ntf is handled correctly ############################################################################################################### # Scripted: PBBR2 should send PRO_BB.ntf for Router1's DUA pkts.filter_eth_src(PBBR2_ETH).filter_backbone_answer( router1_dua2, port=BB, confirmable=False, mliid=DUPLICATE_IID).must_next() # PBBR should broadcaset /a/ae to the Thread network pkts.filter_wpan_src64(PBBR).filter_coap_request( '/a/ae', port=MM, confirmable=False).filter_RLARMA().must_next() # Router1 should generate and register a new DUA with pkts.save_index(): new_dr = pkts.filter_wpan_src64(ROUTER1).filter_coap_request( '/n/dr', port=MM).must_next() router1_dua3 = new_dr.thread_nm.tlv.target_eid # Verify the DAD process for the new DUA pv.verify_dua_registration(ROUTER1, router1_dua3, pbbr_eth=PBBR_ETH, pbbr_src64=PBBR, sbbr_eth=SBBR_ETH)