Newer
Older
/*
* @author STF 276
* @version $Id$
* @desc - Here all module parameters from every RFC shall be collected.
*
*/
module LibIpv6_ModuleParameters {
//LibCommon
import from LibCommon_DataStrings all;
import from LibCommon_BasicTypesAndValues all;
import from LibCommon_TextStrings all;
//LibIpv6
import from LibIpv6_Interface_TypesAndValues all ;
* @desc Length of Source Link-Layer and Target Link-Layer options
* @remark Length is specified in units of 8 octets including type+length field
* @desc What time does the IUT need to build its global address?
/*
* @desc Shall IPSEC be tested?
*/
modulepar { IpSecSwitch PX_IP_SEC := e_securityOff }
/*
* @desc Which protocol (ESP or AH) shall be used?
*/
modulepar { IpSecProtocol PX_IP_SEC_PROTOCOL := e_esp }
/*
* @desc Which protocol mode shall be used in vc_sad[c_saRes]?
*/
modulepar { IpSecProtocolMode PX_IP_SEC_PROTOCOL_MODE := e_transportMode }
/*
* @desc Which Algo mode shall be used for Encryption in vc_sad[c_saRes]?
modulepar { EncryptionAlgo PX_ENCRYPTION_ALGO := e_encr_3Des }
* @desc Which Algo mode shall be used for Integrity in vc_sad[c_saRes]?
modulepar { IntegrityAlgo PX_INTEGRITY_ALGO := e_auth_hmacSha1_96 }
*/
modulepar {octetstring PX_INTEGRITY_KEY := '000102030405'O }
/*
*/
modulepar {octetstring PX_ESP_ENCR_KEY := 'A1A2A3A4'O}
} // end group security
group ikeSecurity
{
/*
* @desc Which SPI shall be used for testing IKE?
*/
modulepar {Oct8 PX_IKE_SPI := '0000000000000001'O} //SMU this can be random, no pixit needed, delete later
/*
* @desc Which protocol (ESP or AH) shall be requested in IKE_AUTH messages when testing IKE?
*/
modulepar {UInt8 PX_AH_OR_ESP := c_protocolEsp}
/*
* @desc Which encryption algorithm shall be used for testing IKE?
*/
modulepar {EncryptionAlgo PX_IKE_ENCALGO := e_encr_3Des}
/*
* @desc Which pseudo random function shall be used for testing IKE?
*/
modulepar {PseudoRandomFunction PX_IKE_PSEUDORANDOM_FCT := e_prfHmacMd5}
/*
* @desc Which integrity algorithm shall be used for testing IKE?
*/
modulepar {IntegrityAlgo PX_IKE_INTALGO := e_auth_hmacMd5_96}
/*
* @desc Which Diffie-Hellman group shall be used for testing IKE?
*/
modulepar {DiffieHellmanGroup PX_IKE_DIFFIEHELLMAN_GROUP := e_group2ModP1024Bit}
/*
* @desc Which private key for the Diffie-Hellman exchange shall be used for testing IKE?
*/
modulepar {octetstring PX_IKE_DIFFIEHELLMAN_PRIVKEY := '0123456789ABCDEF'O}
* @desc AAre security parameters configured manually or is IKE used to negotiate security parameters?
*/
modulepar {IpSecControl PX_IPSEC_CONTROL := e_useIKEforSecParamsSetup }
/*
* @desc Which pre-shared secret shall be used for calculating the AUTH value?
*/
modulepar {octetstring PX_PRE_SHARED_KEY := '0123456789ABCDEF'O}
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
group UnacceptableSecurityParams {
/*
* @desc Which IKE_SA encryption algorithm is not acceptable for the IUT?
*/
modulepar {EncryptionAlgo PX_IKE_ENCALGO_UNACCEPTABLE := e_encr_idea}
/*
* @desc Which IKE_SA pseudo random function is not acceptable for the IUT?
*/
modulepar {PseudoRandomFunction PX_IKE_PSEUDORNDFCT_UNACCEPTABLE := e_prfAes128Xcbc}
/*
* @desc Which IKE_SA integrity algorithm is not acceptable for the IUT?
*/
modulepar {IntegrityAlgo PX_IKE_INTALGO_UNACCEPTABLE := e_auth_aesXcbc_96}
/*
* @desc Which SA encryption algorithm is not acceptable for the IUT?
*/
modulepar { EncryptionAlgo PX_ENCALGO_UNACCEPTABLE := e_encr_idea }
/*
* @desc Which SA integrity algorithm is not acceptable for the IUT?
*/
modulepar { IntegrityAlgo PX_INTALGO_UNACCEPTABLE := e_auth_kpdkMd5 }
} // end group UnacceptableSecurityParams {
modulepar {UInt16 PX_UDP_PORT_IUT_1 := 500}
modulepar {UInt16 PX_UDP_PORT_HS02 := 500}