blob: ec95f4ccf13cc4e5be5a1079bc804447dcbd3f7b [file] [log] [blame]
#!/usr/bin/env python3
#
# Copyright (c) 2020, The OpenThread Authors.
# All rights reserved.
#
# Redistribution and use in source and binary forms, with or without
# modification, are permitted provided that the following conditions are met:
# 1. Redistributions of source code must retain the above copyright
# notice, this list of conditions and the following disclaimer.
# 2. Redistributions in binary form must reproduce the above copyright
# notice, this list of conditions and the following disclaimer in the
# documentation and/or other materials provided with the distribution.
# 3. Neither the name of the copyright holder nor the
# names of its contributors may be used to endorse or promote products
# derived from this software without specific prior written permission.
#
# THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
# AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
# IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
# ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE
# LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
# CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
# SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
# INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
# CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
# ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
# POSSIBILITY OF SUCH DAMAGE.
#
import unittest
from config import ADDRESS_TYPE
from mac802154 import MacHeader
from pktverify import consts
from pktverify.packet_verifier import PacketVerifier
import thread_cert
LEADER = 1
ROUTER = 2
SSED_1 = 3
class LowPower_5_3_01_SSEDAttachment(thread_cert.TestCase):
TOPOLOGY = {
LEADER: {
'version': '1.2',
'name': 'LEADER',
'mode': 'rdn',
'allowlist': [ROUTER, SSED_1]
},
ROUTER: {
'version': '1.2',
'name': 'ROUTER',
'mode': 'rdn',
'allowlist': [LEADER],
},
SSED_1: {
'version': '1.2',
'name': 'SSED_1',
'is_mtd': True,
'mode': '-',
'allowlist': [LEADER],
},
}
def test(self):
self.nodes[LEADER].start()
self.simulator.go(5)
self.assertEqual(self.nodes[LEADER].get_state(), 'leader')
self.nodes[ROUTER].start()
self.simulator.go(5)
self.assertEqual(self.nodes[ROUTER].get_state(), 'router')
self.nodes[SSED_1].set_csl_period(consts.CSL_DEFAULT_PERIOD)
self.nodes[SSED_1].start()
self.simulator.go(5)
self.assertEqual(self.nodes[SSED_1].get_state(), 'child')
self.simulator.go(5)
self.collect_rloc16s()
self.collect_rlocs()
# Verify connectivity by sending an ICMP Echo Request from the Router to SSED_1 mesh-local address via the DUT
self.assertTrue(self.nodes[ROUTER].ping(self.nodes[SSED_1].get_ip6_address(ADDRESS_TYPE.RLOC)))
# Verify fragmented CSL transmission
self.assertTrue(self.nodes[ROUTER].ping(self.nodes[SSED_1].get_ip6_address(ADDRESS_TYPE.RLOC), size=128))
self.simulator.go(5)
def verify(self, pv):
pkts = pv.pkts
pv.summary.show()
LEADER = pv.vars['LEADER']
ROUTER = pv.vars['ROUTER']
SSED_1 = pv.vars['SSED_1']
# Step 1: ensure the Leader is sending MLE Advertisements
pkts.filter_wpan_src64(LEADER) \
.filter_mle_cmd(consts.MLE_ADVERTISEMENT) \
.must_next()
# Step 2: Verify that the frame version is IEEE Std 802.15.4-2015 of the MLE Child Update Response from the
# DUT to SSED_1
pkts.filter_wpan_src64(LEADER) \
.filter_wpan_dst64(SSED_1) \
.filter_mle_cmd(consts.MLE_CHILD_UPDATE_RESPONSE) \
.filter_wpan_version(consts.MAC_FRAME_VERSION_2015) \
.must_next()
# Step 3:
# Verify that SSED_1 does not send a MAC Data Request prior to receiving the ICMP Echo Request from the Leader.
# Verify that the frame version is IEEE Std 802.15.4-2015 of the ICMP Echo Request sent to SSED_1 from the DUT
# Verify that the Router successfully receives an Echo Response from SSED_1
ssed_rloc16 = pv.vars['SSED_1_RLOC16']
ssed_rloc = pv.vars['SSED_1_RLOC']
leader_rloc16 = pv.vars['LEADER_RLOC16']
router_rloc16 = pv.vars['ROUTER_RLOC16']
router_rloc = pv.vars['ROUTER_RLOC']
pkts.filter_wpan_src64(LEADER) \
.filter('wpan.dst16 == {rloc16}', rloc16 = ssed_rloc16) \
.filter_ipv6_dst(ssed_rloc) \
.filter_ping_request() \
.filter_wpan_version(consts.MAC_FRAME_VERSION_2015) \
.must_next()
idx1 = pkts.index
pkts.filter_wpan_src64(SSED_1) \
.filter('wpan.dst16 == {rloc16}', rloc16 = leader_rloc16) \
.filter_ipv6_dst(router_rloc) \
.filter_ping_reply() \
.filter_wpan_version(consts.MAC_FRAME_VERSION_2015) \
.must_next() \
.must_verify(lambda p: (p.wpan.ie_present == 1) and (consts.CSL_IE_ID in p.wpan.header_ie.id))
idx2 = pkts.index
pkts.range(idx1, idx2).filter(lambda p: p.wpan.cmd == MacHeader.CommandIdentifier.DATA_REQUEST) \
.must_not_next()
if __name__ == '__main__':
unittest.main()