Loading ttcn3/EtsiAts/AtsIpv6/AtsCommon/AtsIpv6_ModuleParameters.ttcn +0 −30 Original line number Diff line number Diff line Loading @@ -465,34 +465,4 @@ module AtsIpv6_ModuleParameters { } // end group Timers group UnacceptableSecurityParams { /* * @desc Which IKE_SA encryption algorithm is not acceptable for the IUT? */ modulepar {EncryptionAlgo PX_IKE_ENCALGO_UNACCEPTABLE := e_encr_idea} /* * @desc Which IKE_SA pseudo random function is not acceptable for the IUT? */ modulepar {PseudoRandomFunction PX_IKE_PSEUDORNDFCT_UNACCEPTABLE := e_prfAes128Xcbc} /* * @desc Which IKE_SA integrity algorithm is not acceptable for the IUT? */ modulepar {IntegrityAlgo PX_IKE_INTALGO_UNACCEPTABLE := e_auth_aesXcbc_96} /* * @desc Which SA encryption algorithm is not acceptable for the IUT? */ modulepar { EncryptionAlgo PX_ENCALGO_UNACCEPTABLE := e_encr_idea } /* * @desc Which SA integrity algorithm is not acceptable for the IUT? */ modulepar { IntegrityAlgo PX_INTALGO_UNACCEPTABLE := e_auth_kpdkMd5 } } // end group UnacceptableSecurityParams { } // end module LibIpv6_ModuleParameters ttcn3/EtsiAts/AtsIpv6/AtsSecurity/AtsIpv6_Security_Testcases.ttcn +13 −13 Original line number Diff line number Diff line Loading @@ -1592,7 +1592,7 @@ group ikeHeaderAndPayloadFormats { action("Test operator: Configure IUT so that range of IP adresses in the traffic selector for a new CHILD_SA will be rejected!"); // "CREATE_CHILD_SA request containing Traffic Selectors indicating address range" // is achieved by setting start addresses to the unspecified address 0:0:0:0:0:0:0:0 v_ret := f_TP_createAndSendCreateChildSaReq_paramTS( v_ret := f_createAndSendCreateChildSaReq_paramTS( v_cfMsg.paramsHs02.gla, v_cfMsg.paramsIut.gla, v_cfMsg.paramsRt01.gla, Loading Loading @@ -1757,7 +1757,7 @@ group ikeHeaderAndPayloadFormats { // test body // "CREATE_CHILD_SA request containing unacceptable Traffic Selectors" // is achieved by setting start and end port to the port used by IKE instead of ICMP message type and code v_ret := f_TP_createAndSendCreateChildSaReq_paramTS( v_ret := f_createAndSendCreateChildSaReq_paramTS( v_cfMsg.paramsHs02.gla, v_cfMsg.paramsIut.gla, v_cfMsg.paramsRt01.gla, Loading Loading @@ -5644,7 +5644,7 @@ group generalProtocolHandling{ // "unrecognised payload" // is achieved by setting nextPayload field of last but one payload to PIXIT value // test operator decides which payload Id is unrecognised by the IUT v_ret := f_TP_createAndSendCreateChildSaReq_paramPL( v_ret := f_createAndSendCreateChildSaReq_paramPL( v_cfMsg.paramsHs02.gla, v_cfMsg.paramsIut.gla, v_cfMsg.paramsRt01.gla, Loading Loading @@ -5788,7 +5788,7 @@ group generalProtocolHandling{ // "unrecognised payload" // is achieved by setting nextPayload field of last but one payload to PIXIT value // test operator decides which payload Id is unrecognised by the IUT v_ret := f_TP_createAndSendCreateChildSaReq_paramPL( v_ret := f_createAndSendCreateChildSaReq_paramPL( v_cfMsg.paramsHs02.gla, v_cfMsg.paramsIut.gla, v_cfMsg.paramsRt01.gla, Loading Loading @@ -5966,7 +5966,7 @@ group securityParameterNegotiation { f_PR_tn_nut_noEchoProc(v_cfMsg, e_cleanGla, v_cfMsg.paramsRt01, v_cfMsg.paramsIut); // test body v_ret := f_TP_createAndSendIkeSaInitReq_paramProposal( v_ret := f_createAndSendIkeSaInitReq_paramProposal( v_cfMsg.paramsHs02.gla, v_cfMsg.paramsIut.gla, v_cfMsg.paramsRt01.gla, Loading Loading @@ -6051,7 +6051,7 @@ group securityParameterNegotiation { if(v_ret != e_success) {f_selfOrClientSyncAndVerdict(c_tbDone, v_ret);} // test body v_ret := f_TP_createAndSendIkeAuthReq_paramProposal( v_ret := f_createAndSendIkeAuthReq_paramProposal( v_cfMsg.paramsHs02.gla, v_cfMsg.paramsIut.gla, v_cfMsg.paramsRt01.gla, Loading Loading @@ -6112,7 +6112,7 @@ group securityParameterNegotiation { if(v_ret != e_success) {f_selfOrClientSyncAndVerdict(c_prDone, v_ret);} // test body v_ret := f_TP_createAndSendChildSaReq_paramProposal( v_ret := f_createAndSendChildSaReq_paramProposal( v_cfMsg.paramsHs02.gla, v_cfMsg.paramsIut.gla, v_cfMsg.paramsRt01.gla, Loading Loading @@ -6168,7 +6168,7 @@ group securityParameterNegotiation { f_PR_tn_nut_noEchoProc(v_cfMsg, e_cleanGla, v_cfMsg.paramsRt01, v_cfMsg.paramsIut); // test body v_ret := f_TP_createAndSendIkeSaInitReq_paramProposal( v_ret := f_createAndSendIkeSaInitReq_paramProposal( v_cfMsg.paramsHs02.gla, v_cfMsg.paramsIut.gla, v_cfMsg.paramsRt01.gla, Loading Loading @@ -6246,7 +6246,7 @@ group securityParameterNegotiation { if(v_ret != e_success) {f_selfOrClientSyncAndVerdict(c_tbDone, v_ret);} // test body v_ret := f_TP_createAndSendIkeAuthReq_paramProposal( v_ret := f_createAndSendIkeAuthReq_paramProposal( v_cfMsg.paramsHs02.gla, v_cfMsg.paramsIut.gla, v_cfMsg.paramsRt01.gla, Loading Loading @@ -6325,7 +6325,7 @@ group securityParameterNegotiation { if(v_ret != e_success) {f_selfOrClientSyncAndVerdict(c_prDone, v_ret);} // test body v_ret := f_TP_createAndSendChildSaReq_paramProposal( v_ret := f_createAndSendChildSaReq_paramProposal( v_cfMsg.paramsHs02.gla, v_cfMsg.paramsIut.gla, v_cfMsg.paramsRt01.gla, Loading Loading @@ -6504,7 +6504,7 @@ group securityParameterNegotiation { ) ); v_ret := f_TP_waitForIkeSaInitReq_cookie ( v_ret := f_waitForIkeSaInitReq_cookie ( v_cfMsg.paramsHs02.gla, v_cfMsg.paramsIut.gla, v_cfMsg.paramsRt01.gla, Loading Loading @@ -6826,7 +6826,7 @@ group securityParameterNegotiation { // test body // "unacceptable Traffic Selector" // is achieved by setting start and end port to the port used by IKE instead of ICMP message type and code v_ret := f_TP_createAndSendCreateChildSaReq_paramTS( v_ret := f_createAndSendCreateChildSaReq_paramTS( v_cfMsg.paramsHs02.gla, v_cfMsg.paramsIut.gla, v_cfMsg.paramsRt01.gla, Loading Loading @@ -6948,7 +6948,7 @@ group securityParameterNegotiation { // is achieved by setting start address to the unspecified address 0:0:0:0:0:0:0:0 // and end address to FFFF:FFFF:FFFF:FFFF:FFFF:FFFF:FFFF:FFFF action("Test operator: Configure IUT so that it will use only a single pair of IP adresses in the traffic selector for a new CHILD_SA!"); v_ret := f_TP_createAndSendCreateChildSaReq_paramTS( v_ret := f_createAndSendCreateChildSaReq_paramTS( v_cfMsg.paramsHs02.gla, v_cfMsg.paramsIut.gla, v_cfMsg.paramsRt01.gla, Loading ttcn3/EtsiAts/AtsIpv6/AtsSecurity/AtsIpv6_Security_Tp_Functions.ttcn +0 −1365 File changed.Preview size limit exceeded, changes collapsed. Show changes Loading
ttcn3/EtsiAts/AtsIpv6/AtsCommon/AtsIpv6_ModuleParameters.ttcn +0 −30 Original line number Diff line number Diff line Loading @@ -465,34 +465,4 @@ module AtsIpv6_ModuleParameters { } // end group Timers group UnacceptableSecurityParams { /* * @desc Which IKE_SA encryption algorithm is not acceptable for the IUT? */ modulepar {EncryptionAlgo PX_IKE_ENCALGO_UNACCEPTABLE := e_encr_idea} /* * @desc Which IKE_SA pseudo random function is not acceptable for the IUT? */ modulepar {PseudoRandomFunction PX_IKE_PSEUDORNDFCT_UNACCEPTABLE := e_prfAes128Xcbc} /* * @desc Which IKE_SA integrity algorithm is not acceptable for the IUT? */ modulepar {IntegrityAlgo PX_IKE_INTALGO_UNACCEPTABLE := e_auth_aesXcbc_96} /* * @desc Which SA encryption algorithm is not acceptable for the IUT? */ modulepar { EncryptionAlgo PX_ENCALGO_UNACCEPTABLE := e_encr_idea } /* * @desc Which SA integrity algorithm is not acceptable for the IUT? */ modulepar { IntegrityAlgo PX_INTALGO_UNACCEPTABLE := e_auth_kpdkMd5 } } // end group UnacceptableSecurityParams { } // end module LibIpv6_ModuleParameters
ttcn3/EtsiAts/AtsIpv6/AtsSecurity/AtsIpv6_Security_Testcases.ttcn +13 −13 Original line number Diff line number Diff line Loading @@ -1592,7 +1592,7 @@ group ikeHeaderAndPayloadFormats { action("Test operator: Configure IUT so that range of IP adresses in the traffic selector for a new CHILD_SA will be rejected!"); // "CREATE_CHILD_SA request containing Traffic Selectors indicating address range" // is achieved by setting start addresses to the unspecified address 0:0:0:0:0:0:0:0 v_ret := f_TP_createAndSendCreateChildSaReq_paramTS( v_ret := f_createAndSendCreateChildSaReq_paramTS( v_cfMsg.paramsHs02.gla, v_cfMsg.paramsIut.gla, v_cfMsg.paramsRt01.gla, Loading Loading @@ -1757,7 +1757,7 @@ group ikeHeaderAndPayloadFormats { // test body // "CREATE_CHILD_SA request containing unacceptable Traffic Selectors" // is achieved by setting start and end port to the port used by IKE instead of ICMP message type and code v_ret := f_TP_createAndSendCreateChildSaReq_paramTS( v_ret := f_createAndSendCreateChildSaReq_paramTS( v_cfMsg.paramsHs02.gla, v_cfMsg.paramsIut.gla, v_cfMsg.paramsRt01.gla, Loading Loading @@ -5644,7 +5644,7 @@ group generalProtocolHandling{ // "unrecognised payload" // is achieved by setting nextPayload field of last but one payload to PIXIT value // test operator decides which payload Id is unrecognised by the IUT v_ret := f_TP_createAndSendCreateChildSaReq_paramPL( v_ret := f_createAndSendCreateChildSaReq_paramPL( v_cfMsg.paramsHs02.gla, v_cfMsg.paramsIut.gla, v_cfMsg.paramsRt01.gla, Loading Loading @@ -5788,7 +5788,7 @@ group generalProtocolHandling{ // "unrecognised payload" // is achieved by setting nextPayload field of last but one payload to PIXIT value // test operator decides which payload Id is unrecognised by the IUT v_ret := f_TP_createAndSendCreateChildSaReq_paramPL( v_ret := f_createAndSendCreateChildSaReq_paramPL( v_cfMsg.paramsHs02.gla, v_cfMsg.paramsIut.gla, v_cfMsg.paramsRt01.gla, Loading Loading @@ -5966,7 +5966,7 @@ group securityParameterNegotiation { f_PR_tn_nut_noEchoProc(v_cfMsg, e_cleanGla, v_cfMsg.paramsRt01, v_cfMsg.paramsIut); // test body v_ret := f_TP_createAndSendIkeSaInitReq_paramProposal( v_ret := f_createAndSendIkeSaInitReq_paramProposal( v_cfMsg.paramsHs02.gla, v_cfMsg.paramsIut.gla, v_cfMsg.paramsRt01.gla, Loading Loading @@ -6051,7 +6051,7 @@ group securityParameterNegotiation { if(v_ret != e_success) {f_selfOrClientSyncAndVerdict(c_tbDone, v_ret);} // test body v_ret := f_TP_createAndSendIkeAuthReq_paramProposal( v_ret := f_createAndSendIkeAuthReq_paramProposal( v_cfMsg.paramsHs02.gla, v_cfMsg.paramsIut.gla, v_cfMsg.paramsRt01.gla, Loading Loading @@ -6112,7 +6112,7 @@ group securityParameterNegotiation { if(v_ret != e_success) {f_selfOrClientSyncAndVerdict(c_prDone, v_ret);} // test body v_ret := f_TP_createAndSendChildSaReq_paramProposal( v_ret := f_createAndSendChildSaReq_paramProposal( v_cfMsg.paramsHs02.gla, v_cfMsg.paramsIut.gla, v_cfMsg.paramsRt01.gla, Loading Loading @@ -6168,7 +6168,7 @@ group securityParameterNegotiation { f_PR_tn_nut_noEchoProc(v_cfMsg, e_cleanGla, v_cfMsg.paramsRt01, v_cfMsg.paramsIut); // test body v_ret := f_TP_createAndSendIkeSaInitReq_paramProposal( v_ret := f_createAndSendIkeSaInitReq_paramProposal( v_cfMsg.paramsHs02.gla, v_cfMsg.paramsIut.gla, v_cfMsg.paramsRt01.gla, Loading Loading @@ -6246,7 +6246,7 @@ group securityParameterNegotiation { if(v_ret != e_success) {f_selfOrClientSyncAndVerdict(c_tbDone, v_ret);} // test body v_ret := f_TP_createAndSendIkeAuthReq_paramProposal( v_ret := f_createAndSendIkeAuthReq_paramProposal( v_cfMsg.paramsHs02.gla, v_cfMsg.paramsIut.gla, v_cfMsg.paramsRt01.gla, Loading Loading @@ -6325,7 +6325,7 @@ group securityParameterNegotiation { if(v_ret != e_success) {f_selfOrClientSyncAndVerdict(c_prDone, v_ret);} // test body v_ret := f_TP_createAndSendChildSaReq_paramProposal( v_ret := f_createAndSendChildSaReq_paramProposal( v_cfMsg.paramsHs02.gla, v_cfMsg.paramsIut.gla, v_cfMsg.paramsRt01.gla, Loading Loading @@ -6504,7 +6504,7 @@ group securityParameterNegotiation { ) ); v_ret := f_TP_waitForIkeSaInitReq_cookie ( v_ret := f_waitForIkeSaInitReq_cookie ( v_cfMsg.paramsHs02.gla, v_cfMsg.paramsIut.gla, v_cfMsg.paramsRt01.gla, Loading Loading @@ -6826,7 +6826,7 @@ group securityParameterNegotiation { // test body // "unacceptable Traffic Selector" // is achieved by setting start and end port to the port used by IKE instead of ICMP message type and code v_ret := f_TP_createAndSendCreateChildSaReq_paramTS( v_ret := f_createAndSendCreateChildSaReq_paramTS( v_cfMsg.paramsHs02.gla, v_cfMsg.paramsIut.gla, v_cfMsg.paramsRt01.gla, Loading Loading @@ -6948,7 +6948,7 @@ group securityParameterNegotiation { // is achieved by setting start address to the unspecified address 0:0:0:0:0:0:0:0 // and end address to FFFF:FFFF:FFFF:FFFF:FFFF:FFFF:FFFF:FFFF action("Test operator: Configure IUT so that it will use only a single pair of IP adresses in the traffic selector for a new CHILD_SA!"); v_ret := f_TP_createAndSendCreateChildSaReq_paramTS( v_ret := f_createAndSendCreateChildSaReq_paramTS( v_cfMsg.paramsHs02.gla, v_cfMsg.paramsIut.gla, v_cfMsg.paramsRt01.gla, Loading
ttcn3/EtsiAts/AtsIpv6/AtsSecurity/AtsIpv6_Security_Tp_Functions.ttcn +0 −1365 File changed.Preview size limit exceeded, changes collapsed. Show changes