esp32_bluetooth_classic_sni.../libs/scapy/contrib/eigrp.uts
Matheus Eduardo Garbelini 86890704fd initial commit
todo: add documentation & wireshark dissector
2021-08-31 19:51:03 +08:00

247 lines
8.1 KiB
Text
Executable file

% EIGRP Tests
* Tests for the Scapy EIGRP layer
+ Basic Layer Tests
* These are just some basic tests
= EIGRP IPv4 Binding
~ eigrp_ipv4_binding
p = IP()/EIGRP()
p[IP].proto == 88
= EIGRP IPv6 Binding
~ eigrp_ipv6_binding
p = IPv6()/EIGRP()
p[IPv6].nh == 88
= EIGRP checksum field
~ eigrp_chksum_field
p = IP()/EIGRP(flags=0xa, seq=23, ack=42, asn=100)
s = p[EIGRP].build()
struct.unpack("!H", s[2:4])[0] == 64843
+ Custom Field Tests
* Test funciontally of custom made fields
= ShortVersionField nice representation
f = ShortVersionField("ver", 3072)
f.i2repr(None, 3072) == "v12.0" and f.i2repr(None, 258) == "v1.2"
= ShortVersionField h2i function
f = ShortVersionField("ver", 0)
f.h2i(None, 3073) == f.h2i(None, "v12.1")
= ShortVersionField error
try:
f = ShortVersionField("ver", None)
f.h2i(None, "Error")
assert False
except Scapy_Exception:
assert True
f = ShortVersionField("ver", "default")
assert f.h2i(None, "Error") == "default"
assert f.i2repr(None, "Error") == "unknown"
assert f.randval() <= 65535
= EigrpIPField length with prefix length of 8 bit
f = EigrpIPField("ipaddr", "192.168.1.0", length=8)
assert f.m2i(None, b"\x01") == '1.0.0.0'
assert f.i2m(None, "1.0.0.0") == b"\x01"
assert f.i2len(None, "") == 1
= EigrpIPField length with prefix length of 12 bit
f = EigrpIPField("ipaddr", "192.168.1.0", length=12)
assert f.m2i(None, b"\x01\x02") == '1.2.0.0'
assert f.i2len(None, "") == 2
= EigrpIPField length with prefix length of 24 bit
f = EigrpIPField("ipaddr", "192.168.1.0", length=24)
assert f.m2i(None, b"\x01\x02\x03") == '1.2.3.0'
assert f.i2len(None, "") == 3
= EigrpIPField length with prefix length of 28 bit
f = EigrpIPField("ipaddr", "192.168.1.0", length=28)
assert f.m2i(None, b"\x01\x02\x03\x04") == '1.2.3.4'
assert f.i2len(None, "") == 4
= EigrpIPField randval
assert inet_pton(socket.AF_INET, f.randval())
= EigrpIP6Field length with prefix length of 8 bit
f = EigrpIP6Field("ipaddr", "2000::", length=8)
f.i2len(None, "") == 2
= EigrpIP6Field length with prefix length of 99 bit
f = EigrpIP6Field("ipaddr", "2000::", length=99)
f.i2len(None, "") == 13
= EigrpIP6Field length with prefix length of 128 bit
f = EigrpIP6Field("ipaddr", "2000::", length=128)
f.i2len(None, "") == 16
= EigrpIP6Field randval
assert inet_pton(socket.AF_INET6, f.randval())
= EIGRPGuessPayloadClass function: Return Parameters TLV
from scapy.contrib.eigrp import _EIGRPGuessPayloadClass
isinstance(_EIGRPGuessPayloadClass(b"\x00\x01"), EIGRPParam)
= EIGRPGuessPayloadClass function: Return Authentication Data TLV
isinstance(_EIGRPGuessPayloadClass(b"\x00\x02"), EIGRPAuthData)
= EIGRPGuessPayloadClass function: Return Sequence TLV
isinstance(_EIGRPGuessPayloadClass(b"\x00\x03"), EIGRPSeq)
= EIGRPGuessPayloadClass function: Return Software Version TLV
isinstance(_EIGRPGuessPayloadClass(b"\x00\x04"), EIGRPSwVer)
= EIGRPGuessPayloadClass function: Return Next Multicast Sequence TLV
isinstance(_EIGRPGuessPayloadClass(b"\x00\x05"), EIGRPNms)
= EIGRPGuessPayloadClass function: Return Stub Router TLV
isinstance(_EIGRPGuessPayloadClass(b"\x00\x06"), EIGRPStub)
= EIGRPGuessPayloadClass function: Return Internal Route TLV
isinstance(_EIGRPGuessPayloadClass(b"\x01\x02"), EIGRPIntRoute)
= EIGRPGuessPayloadClass function: Return External Route TLV
isinstance(_EIGRPGuessPayloadClass(b"\x01\x03"), EIGRPExtRoute)
= EIGRPGuessPayloadClass function: Return IPv6 Internal Route TLV
isinstance(_EIGRPGuessPayloadClass(b"\x04\x02"), EIGRPv6IntRoute)
= EIGRPGuessPayloadClass function: Return IPv6 External Route TLV
isinstance(_EIGRPGuessPayloadClass(b"\x04\x03"), EIGRPv6ExtRoute)
= EIGRPGuessPayloadClass function: Return EIGRPGeneric
isinstance(_EIGRPGuessPayloadClass(b"\x23\x42"), EIGRPGeneric)
+ TLV List
= EIGRP parameters and software version
p = IP()/EIGRP(tlvlist=[EIGRPParam()/EIGRPSwVer()])
s = b'\x45\x00\x00\x3C\x00\x01\x00\x00\x40\x58\x7C\x67\x7F\x00\x00\x01\x7F\x00\x00\x01\x02\x05\xEE\x6C\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x64\x00\x01\x00\x0C\x01\x00\x01\x00\x00\x00\x00\x0F\x00\x04\x00\x08\x0C\x00\x01\x02'
raw(p) == s
= EIGRP Sequence
p = EIGRP(tlvlist=[EIGRPSeq(addrlen=16, ip6addr="45e4:0ecf:cff3:7be2:6059:771e:a221:3342")])
assert raw(p) == b'\x02\x05\x881\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00d\x00\x03\x00\x15\x10E\xe4\x0e\xcf\xcf\xf3{\xe2`Yw\x1e\xa2!3B'
p = EIGRP(raw(p))
assert p.tlvlist[0].ip6addr == "45e4:ecf:cff3:7be2:6059:771e:a221:3342"
= EIGRP Generic
p = EIGRP(opcode=5, ack=1, flags="init", tlvlist=[EIGRPGeneric(value=b"data"), EIGRPGeneric(value=b"doto")])
p = EIGRP(raw(p))
assert p.tlvlist[1].value == b"doto"
assert p.tlvlist[1].len == 8
assert p.summary() == 'EIGRP (AS=100 Opcode=Hello (ACK) Flags=init)'
= EIGRP internal route length field
p = IP()/EIGRP(tlvlist=[EIGRPIntRoute(prefixlen=24, dst="192.168.1.0")])
struct.unpack("!H", p[EIGRPIntRoute].build()[2:4])[0] == 28
p = IP(raw(p))
assert p.tlvlist[0].prefixlen == 24
assert p.tlvlist[0].dst == "192.168.1.0"
= EIGRP external route length field
p = IP()/EIGRP(tlvlist=[EIGRPExtRoute(prefixlen=16, dst="10.1.0.0")])
struct.unpack("!H", p[EIGRPExtRoute].build()[2:4])[0] == 47
= EIGRPv6 internal route length field
p = IP()/EIGRP(tlvlist=[EIGRPv6IntRoute(prefixlen=64, dst="2000::")])
struct.unpack("!H", p[EIGRPv6IntRoute].build()[2:4])[0] == 46
p = IP(raw(p))
assert p.tlvlist[0].prefixlen == 64
assert p.tlvlist[0].dst == "2000::"
= EIGRPv6 external route length field
p = IP()/EIGRP(tlvlist=[EIGRPv6ExtRoute(prefixlen=99, dst="2000::")])
struct.unpack("!H", p[EIGRPv6ExtRoute].build()[2:4])[0] == 70
+ Stub Flags
* The receive-only flag is always set, when a router anounces itself as stub router.
= Receive-Only
p = IP()/EIGRP(tlvlist=[EIGRPStub(flags="receive-only")])
p[EIGRPStub].flags == 0x0008
= Connected
p = IP()/EIGRP(tlvlist=[EIGRPStub(flags="connected+receive-only")])
p[EIGRPStub].flags == 0x0009
= Static
p = IP()/EIGRP(tlvlist=[EIGRPStub(flags="static+receive-only")])
p[EIGRPStub].flags == 0x000a
= Summary
p = IP()/EIGRP(tlvlist=[EIGRPStub(flags="summary+receive-only")])
p[EIGRPStub].flags == 0x000c
= Connected, Summary
p = IP()/EIGRP(tlvlist=[EIGRPStub(flags="connected+summary+receive-only")])
p[EIGRPStub].flags == 0x000d
= Static, Summary
p = IP()/EIGRP(tlvlist=[EIGRPStub(flags="static+summary+receive-only")])
p[EIGRPStub].flags == 0x000e
= Redistributed, Connected
p = IP()/EIGRP(tlvlist=[EIGRPStub(flags="redistributed+connected+receive-only")])
p[EIGRPStub].flags == 0x0019
= Redistributed, Static
p = IP()/EIGRP(tlvlist=[EIGRPStub(flags="redistributed+static+receive-only")])
p[EIGRPStub].flags == 0x001a
= Redistributed, Static, Connected
p = IP()/EIGRP(tlvlist=[EIGRPStub(flags="redistributed+static+connected+receive-only")])
p[EIGRPStub].flags == 0x001b
= Redistributed, Summary
p = IP()/EIGRP(tlvlist=[EIGRPStub(flags="redistributed+summary+receive-only")])
p[EIGRPStub].flags == 0x001c
= Redistributed, Connected, Summary
p = IP()/EIGRP(tlvlist=[EIGRPStub(flags="redistributed+connected+summary+receive-only")])
p[EIGRPStub].flags == 0x001d
= Connected, Redistributed, Static, Summary
p = IP()/EIGRP(tlvlist=[EIGRPStub(flags="connected+redistributed+static+summary+receive-only")])
p[EIGRPStub].flags == 0x001f
= Leak-Map
p = IP()/EIGRP(tlvlist=[EIGRPStub(flags="leak-map+receive-only")])
p[EIGRPStub].flags == 0x0028
= Connected, Leak-Map
p = IP()/EIGRP(tlvlist=[EIGRPStub(flags="connected+leak-map+receive-only")])
p[EIGRPStub].flags == 0x0029
+ Routing Updates
= External route flag external
p = EIGRPExtRoute(flags="external")
p.flags == 0x1
= External route flag candidate-default route
p = EIGRPExtRoute(flags="candidate-default")
p.flags == 0x2
= Multiple internal routing updates
p = IP()/EIGRP(tlvlist=[EIGRPIntRoute(), EIGRPIntRoute(hopcount=12), EIGRPIntRoute()])
p[EIGRPIntRoute:2].hopcount == 12
= Multiple external routing updates
p = IP()/EIGRP(tlvlist=[EIGRPExtRoute(), EIGRPExtRoute(mtu=23), EIGRPExtRoute()])
p[EIGRPExtRoute:2].mtu == 23
+ Authentication Data TLV
= Verify keysize calculation
p = IP()/EIGRP(tlvlist=[EIGRPAuthData(authdata=b"\xaa\xbb\xcc")])
p[EIGRPAuthData].build()[6:8] == b"\x00\x03"
= Verify length calculation
p = IP()/EIGRP(tlvlist=[EIGRPAuthData(authdata=b"\xaa\xbb\xcc\xdd")])
p[EIGRPAuthData].build()[2:4] == b"\x00\x1c"