blob: 66e50f22c4ab964cdde6d024d1a0ca9ecc9fb7be [file] [log] [blame]
Shubham Sharma1ad16632019-11-26 11:09:21 +00001/*
2 * Copyright 2015-present Open Networking Foundation
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16package org.opencord.aaa.impl;
17
18import com.google.common.base.Charsets;
19import org.junit.After;
20import org.junit.Before;
21import org.junit.Test;
22import org.onlab.junit.TestUtils;
23import org.onlab.packet.BasePacket;
24import org.onlab.packet.DeserializationException;
25import org.onlab.packet.EAP;
26import org.onlab.packet.Ethernet;
27import org.onlab.packet.IpAddress;
28import org.onlab.packet.RADIUS;
29import org.onlab.packet.RADIUSAttribute;
30import org.onosproject.core.ApplicationId;
31import org.onosproject.core.CoreServiceAdapter;
32import org.onosproject.event.DefaultEventSinkRegistry;
33import org.onosproject.event.Event;
34import org.onosproject.event.EventDeliveryService;
35import org.onosproject.event.EventSink;
36import org.onosproject.net.config.Config;
37import org.onosproject.net.config.NetworkConfigRegistryAdapter;
38import org.onosproject.net.packet.DefaultInboundPacket;
39import org.onosproject.net.packet.InboundPacket;
40import org.onosproject.net.packet.PacketContext;
41import org.onosproject.net.packet.PacketService;
42import org.opencord.aaa.AaaConfig;
43import org.slf4j.Logger;
44
45import java.lang.reflect.Field;
46import java.net.InetAddress;
47import java.net.UnknownHostException;
48import java.nio.ByteBuffer;
49
50import static com.google.common.base.Preconditions.checkState;
51import static org.hamcrest.Matchers.is;
52import static org.hamcrest.Matchers.notNullValue;
Shubham Sharmac7aa6202019-12-12 10:19:10 +000053import static org.junit.Assert.assertNotEquals;
Shubham Sharma1ad16632019-11-26 11:09:21 +000054import static org.junit.Assert.assertThat;
55import static org.onosproject.net.NetTestTools.connectPoint;
56import static org.slf4j.LoggerFactory.getLogger;
57
58/**
59 * Set of tests of the ONOS application component for AAA Statistics.
60 */
61public class AaaStatisticsTest extends AaaTestBase {
62
63 static final String BAD_IP_ADDRESS = "198.51.100.0";
Shubham Sharmac7aa6202019-12-12 10:19:10 +000064 static final Long ZERO = (long) 0;
Shubham Sharma1ad16632019-11-26 11:09:21 +000065
66 private final Logger log = getLogger(getClass());
67 private AaaManager aaaManager;
68 private AaaStatisticsManager aaaStatisticsManager;
Kartikey Dubeybe14f472019-10-01 12:18:35 +000069 private AaaSupplicantMachineStatsManager aaaSupplicantStatsManager;
Shubham Sharma1ad16632019-11-26 11:09:21 +000070
71 class AaaManagerWithoutRadiusServer extends AaaManager {
72 protected void sendRadiusPacket(RADIUS radiusPacket, InboundPacket inPkt) {
73 super.sendRadiusPacket(radiusPacket, inPkt);
74 aaaManager.aaaStatisticsManager.putOutgoingIdentifierToMap(radiusPacket.getIdentifier());
75 savePacket(radiusPacket);
76 }
77
78 // changed the configuration of parent method to protected
79 protected void configureRadiusCommunication() {
80 PacketService pktService = new MockPacketService();
81 ApplicationId appId = new CoreServiceAdapter().registerApplication("org.opencord.aaa");
82 aaaManager.impl = new TestSocketBasedRadiusCommunicator(appId, pktService, aaaManager);
83 }
84 }
85
86 /**
87 * Mocks the AAAConfig class to force usage of an unroutable address for the
88 * RADIUS server.
89 */
90 static class MockAaaConfig extends AaaConfig {
91 @Override
92 public InetAddress radiusIp() {
93 try {
94 return InetAddress.getByName(BAD_IP_ADDRESS);
95 } catch (UnknownHostException ex) {
96 throw new IllegalStateException(ex);
97 }
98 }
99 }
100
101 /**
102 * Mocks the network config registry.
103 */
104 @SuppressWarnings("unchecked")
105 private static final class TestNetworkConfigRegistry extends NetworkConfigRegistryAdapter {
106 @Override
107 public <S, C extends Config<S>> C getConfig(S subject, Class<C> configClass) {
108 AaaConfig aaaConfig = new MockAaaConfig();
109 return (C) aaaConfig;
110 }
111 }
112
113 public static class TestEventDispatcher extends DefaultEventSinkRegistry implements EventDeliveryService {
114
115 @Override
116 @SuppressWarnings("unchecked")
117 public synchronized void post(Event event) {
118 EventSink sink = getSink(event.getClass());
119 checkState(sink != null, "No sink for event %s", event);
120 sink.process(event);
121 }
122
123 @Override
124 public void setDispatchTimeLimit(long millis) {
125 }
126
127 @Override
128 public long getDispatchTimeLimit() {
129 return 0;
130 }
131 }
132
133 /**
134 * Constructs an Ethernet packet containing a RADIUS challenge packet.
135 *
136 * @param challengeCode
137 * code to use in challenge packet
138 * @param challengeType
139 * type to use in challenge packet
140 * @return Ethernet packet
141 */
142 private RADIUS constructRadiusCodeAccessChallengePacket(byte challengeCode, byte challengeType) {
143
Shubham Sharma048cc262019-06-19 14:18:50 +0000144 String challenge = "12345678901234567";
Shubham Sharma1ad16632019-11-26 11:09:21 +0000145
Shubham Sharma048cc262019-06-19 14:18:50 +0000146 EAP eap = new EAP(challengeType, (byte) 4, challengeType,
147 challenge.getBytes(Charsets.US_ASCII));
148 eap.setIdentifier((byte) 4);
Shubham Sharma1ad16632019-11-26 11:09:21 +0000149
Shubham Sharma048cc262019-06-19 14:18:50 +0000150 RADIUS radius = new RADIUS();
151 radius.setCode(challengeCode);
152 radius.setIdentifier((byte) 4);
153 radius.setAttribute(RADIUSAttribute.RADIUS_ATTR_STATE,
154 challenge.getBytes(Charsets.US_ASCII));
Shubham Sharma1ad16632019-11-26 11:09:21 +0000155
Shubham Sharma048cc262019-06-19 14:18:50 +0000156 radius.setPayload(eap);
157 radius.setAttribute(RADIUSAttribute.RADIUS_ATTR_EAP_MESSAGE,
158 eap.serialize());
159 radius.setAttribute(RADIUSAttribute.RADIUS_ATTR_MESSAGE_AUTH,
160 aaaManager.radiusSecret.getBytes());
161 return radius;
Shubham Sharma1ad16632019-11-26 11:09:21 +0000162 }
163
164 public static void injectEventDispatcher(Object manager, EventDeliveryService svc) {
165 Class mc = manager.getClass();
166 for (Field f : mc.getSuperclass().getDeclaredFields()) {
167 if (f.getType().equals(EventDeliveryService.class)) {
168 try {
169 TestUtils.setField(manager, f.getName(), svc);
170 } catch (TestUtils.TestUtilsException e) {
171 throw new IllegalArgumentException("Unable to inject reference", e);
172 }
173 break;
174 }
175 }
176 }
177
178/**
179 * Set up the services required by the AAA application.
180 */
181 @Before
182 public void setUp() {
183 aaaManager = new AaaManagerWithoutRadiusServer();
Shubham Sharma048cc262019-06-19 14:18:50 +0000184 aaaManager.radiusOperationalStatusService = new RadiusOperationalStatusManager();
Shubham Sharma1ad16632019-11-26 11:09:21 +0000185 aaaManager.netCfgService = new TestNetworkConfigRegistry();
186 aaaManager.coreService = new CoreServiceAdapter();
187 aaaManager.packetService = new MockPacketService();
188 aaaManager.deviceService = new TestDeviceService();
189 aaaManager.sadisService = new MockSadisService();
190 aaaManager.cfgService = new MockCfgService();
191 aaaStatisticsManager = new AaaStatisticsManager();
Kartikey Dubeybe14f472019-10-01 12:18:35 +0000192 aaaSupplicantStatsManager = new AaaSupplicantMachineStatsManager();
Shubham Sharma1ad16632019-11-26 11:09:21 +0000193 TestUtils.setField(aaaStatisticsManager, "eventDispatcher", new TestEventDispatcher());
194 aaaStatisticsManager.activate();
Kartikey Dubeybe14f472019-10-01 12:18:35 +0000195 TestUtils.setField(aaaSupplicantStatsManager, "eventDispatcher", new TestEventDispatcher());
196 aaaSupplicantStatsManager.activate();
Shubham Sharma1ad16632019-11-26 11:09:21 +0000197 aaaManager.aaaStatisticsManager = this.aaaStatisticsManager;
Kartikey Dubeybe14f472019-10-01 12:18:35 +0000198 aaaManager.aaaSupplicantStatsManager = this.aaaSupplicantStatsManager;
Shubham Sharma1ad16632019-11-26 11:09:21 +0000199 TestUtils.setField(aaaManager, "eventDispatcher", new TestEventDispatcher());
200 aaaManager.activate(new AaaTestBase.MockComponentContext());
201 }
202
203/**
204 * Tear down the AAA application.
205 */
206@After
207public void tearDown() {
208 aaaManager.deactivate(new AaaTestBase.MockComponentContext());
209}
210
211/**
212 * Extracts the RADIUS packet from a packet sent by the supplicant.
213 *
214 * @param radius
215 * RADIUS packet sent by the supplicant
216 * @throws DeserializationException
217 * if deserialization of the packet contents fails.
218 */
219private void checkRadiusPacketFromSupplicant(RADIUS radius) throws DeserializationException {
220 assertThat(radius, notNullValue());
221 EAP eap = radius.decapsulateMessage();
222 assertThat(eap, notNullValue());
223}
224
225/**
226 * Fetches the sent packet at the given index. The requested packet must be the
227 * last packet on the list.
228 *
229 * @param index
230 * index into sent packets array
231 * @return packet
232 */
233private BasePacket fetchPacket(int index) {
234 BasePacket packet = savedPackets.get(index);
235 assertThat(packet, notNullValue());
236 return packet;
237}
238
239 /** Tests the authentication path through the AAA application.
240 * And counts the aaa Stats for successful transmission.
241 * @throws DeserializationException
242 * if packed deserialization fails.
243 */
244 @Test
245 public void testAaaStatisticsForAcceptedPackets() throws Exception {
246
247 // (1) Supplicant start up
248 Ethernet startPacket = constructSupplicantStartPacket();
249 sendPacket(startPacket);
250
251 Ethernet responsePacket = (Ethernet) fetchPacket(0);
252 checkRadiusPacket(aaaManager, responsePacket, EAP.ATTR_IDENTITY);
253
254 // (2) Supplicant identify
255
256 Ethernet identifyPacket = constructSupplicantIdentifyPacket(null, EAP.ATTR_IDENTITY, (byte) 1, null);
257 sendPacket(identifyPacket);
258
259 RADIUS radiusIdentifyPacket = (RADIUS) fetchPacket(1);
260 checkRadiusPacketFromSupplicant(radiusIdentifyPacket);
261
262 assertThat(radiusIdentifyPacket.getCode(), is(RADIUS.RADIUS_CODE_ACCESS_REQUEST));
263 assertThat(new String(radiusIdentifyPacket.getAttribute(RADIUSAttribute.RADIUS_ATTR_USERNAME).getValue()),
264 is("testuser"));
265 IpAddress nasIp = IpAddress.valueOf(IpAddress.Version.INET,
266 radiusIdentifyPacket.getAttribute(RADIUSAttribute.RADIUS_ATTR_NAS_IP).getValue());
267 assertThat(nasIp.toString(), is(aaaManager.nasIpAddress.getHostAddress()));
268
269 // State machine should have been created by now
270
271 StateMachine stateMachine = StateMachine.lookupStateMachineBySessionId(SESSION_ID);
272 assertThat(stateMachine, notNullValue());
273 assertThat(stateMachine.state(), is(StateMachine.STATE_PENDING));
274
275 // (3) RADIUS MD5 challenge
276
277 RADIUS radiusCodeAccessChallengePacket = constructRadiusCodeAccessChallengePacket(
278 RADIUS.RADIUS_CODE_ACCESS_CHALLENGE, EAP.ATTR_MD5);
279 aaaManager.handleRadiusPacket(radiusCodeAccessChallengePacket);
280
281 Ethernet radiusChallengeMD5Packet = (Ethernet) fetchPacket(2);
282 checkRadiusPacket(aaaManager, radiusChallengeMD5Packet, EAP.ATTR_MD5);
283
284 // (4) Supplicant MD5 response
285
286 Ethernet md5RadiusPacket = constructSupplicantIdentifyPacket(stateMachine, EAP.ATTR_MD5,
287 stateMachine.challengeIdentifier(), radiusChallengeMD5Packet);
288 sendPacket(md5RadiusPacket);
289
290 RADIUS responseMd5RadiusPacket = (RADIUS) fetchPacket(3);
291
292 checkRadiusPacketFromSupplicant(responseMd5RadiusPacket);
Shubham Sharma048cc262019-06-19 14:18:50 +0000293 assertThat(responseMd5RadiusPacket.getIdentifier(), is((byte) 9));
Shubham Sharma1ad16632019-11-26 11:09:21 +0000294 assertThat(responseMd5RadiusPacket.getCode(), is(RADIUS.RADIUS_CODE_ACCESS_REQUEST));
295
296 // State machine should be in pending state
297
298 assertThat(stateMachine, notNullValue());
299 assertThat(stateMachine.state(), is(StateMachine.STATE_PENDING));
300
301 // (5) RADIUS Success
302
303 RADIUS successPacket =
304 constructRadiusCodeAccessChallengePacket(RADIUS.RADIUS_CODE_ACCESS_ACCEPT, EAP.SUCCESS);
305 aaaManager.handleRadiusPacket((successPacket));
306 Ethernet supplicantSuccessPacket = (Ethernet) fetchPacket(4);
307
308 checkRadiusPacket(aaaManager, supplicantSuccessPacket, EAP.SUCCESS);
309
310 // State machine should be in authorized state
311
312 assertThat(stateMachine, notNullValue());
313 assertThat(stateMachine.state(), is(StateMachine.STATE_AUTHORIZED));
314
Shubham Sharmac7aa6202019-12-12 10:19:10 +0000315 //Check for increase of Stats
316 assertNotEquals(aaaStatisticsManager.getAaaStats().getEapolResIdentityMsgTrans(), ZERO);
317 assertNotEquals(aaaStatisticsManager.getAaaStats().getEapolAuthSuccessTrans(), ZERO);
318 assertNotEquals(aaaStatisticsManager.getAaaStats().getEapolStartReqTrans(), ZERO);
319 assertNotEquals(aaaStatisticsManager.getAaaStats().getEapolTransRespNotNak(), ZERO);
320 assertNotEquals(aaaStatisticsManager.getAaaStats().getEapPktTxauthChooseEap(), ZERO);
321
Shubham Sharma1ad16632019-11-26 11:09:21 +0000322 // Counts the aaa Statistics count and displays in the log
323 countAaaStatistics();
324
325 }
326
327 /** Tests the count for defected packets.
328 *
329 * @throws DeserializationException
330 * if packed deserialization fails.
331 */
332 @Test
333 public void testAaaStatisticsForDefectivePackets() throws Exception {
334 // (1) Supplicant start up
335 Ethernet startPacket = constructSupplicantStartPacket();
336 sendPacket(startPacket);
337
338 // (2) Supplicant identify
339
340 Ethernet identifyPacket = constructSupplicantIdentifyPacket(null, EAP.ATTR_IDENTITY, (byte) 1, null);
341 sendPacket(identifyPacket);
342
343 RADIUS radiusIdentifyPacket = (RADIUS) fetchPacket(1);
344
345 checkRadiusPacketFromSupplicant(radiusIdentifyPacket);
346
347 // Calling the mock test socket based to handle packet
348 aaaManager.impl.handlePacketFromServer(null);
349 // State machine should have been created by now
350
351 StateMachine stateMachine = StateMachine.lookupStateMachineBySessionId(SESSION_ID);
352
353 // (3) RADIUS MD5 challenge
354
355 RADIUS radiusCodeAccessChallengePacket = constructRadiusCodeAccessChallengePacket(
356 RADIUS.RADIUS_CODE_ACCESS_CHALLENGE, EAP.ATTR_MD5);
357 aaaManager.handleRadiusPacket(radiusCodeAccessChallengePacket);
358
359 Ethernet radiusChallengeMD5Packet = (Ethernet) fetchPacket(2);
360
361 // (4) Supplicant MD5 response
362
363 Ethernet md5RadiusPacket = constructSupplicantIdentifyPacket(stateMachine, EAP.ATTR_MD5,
364 stateMachine.challengeIdentifier(), radiusChallengeMD5Packet);
365 sendPacket(md5RadiusPacket);
366 aaaManager.aaaStatisticsManager.calculatePacketRoundtripTime();
367 // (5) RADIUS Rejected
368
369 RADIUS rejectedPacket =
370 constructRadiusCodeAccessChallengePacket(RADIUS.RADIUS_CODE_ACCESS_REJECT, EAP.FAILURE);
371 aaaManager.handleRadiusPacket((rejectedPacket));
372 Ethernet supplicantRejectedPacket = (Ethernet) fetchPacket(4);
373
374 checkRadiusPacket(aaaManager, supplicantRejectedPacket, EAP.FAILURE);
375
376 // State machine should be in unauthorized state
377 assertThat(stateMachine, notNullValue());
378 assertThat(stateMachine.state(), is(StateMachine.STATE_UNAUTHORIZED));
379 // Calculated the total round trip time
380 aaaManager.aaaStatisticsManager.calculatePacketRoundtripTime();
Shubham Sharmac7aa6202019-12-12 10:19:10 +0000381
382 //Check for increase of Stats
383 assertNotEquals(aaaStatisticsManager.getAaaStats().getEapolResIdentityMsgTrans(), ZERO);
384 assertNotEquals(aaaStatisticsManager.getAaaStats().getEapolAuthFailureTrans(), ZERO);
385 assertNotEquals(aaaStatisticsManager.getAaaStats().getEapolStartReqTrans(), ZERO);
386 assertNotEquals(aaaStatisticsManager.getAaaStats().getEapPktTxauthChooseEap(), ZERO);
387 assertNotEquals(aaaStatisticsManager.getAaaStats().getEapolTransRespNotNak(), ZERO);
388
389 // Counts the aaa Statistics count
Shubham Sharma1ad16632019-11-26 11:09:21 +0000390 countAaaStatistics();
391
392 }
393
394 /*
395 * Tests the retransmitted packet and malformed packet count
396 *
397 * @throws DeserializationException
398 * if packed deserialization fails.
399 */
400 @Test
401 public void testRequestRetransmittedCount() throws Exception {
402
403 // (1) Supplicant start up
404 Ethernet startPacket = constructSupplicantStartPacket();
405 sendPacket(startPacket);
406
407 // (2) Supplicant identify
408
409 Ethernet identifyPacket = constructSupplicantIdentifyPacket(null, EAP.ATTR_IDENTITY, (byte) 1, null);
410 sendPacket(identifyPacket);
411
412 RADIUS radiusIdentifyPacket = (RADIUS) fetchPacket(1);
413 checkRadiusPacketFromSupplicant(radiusIdentifyPacket);
414
415 // again creating pending state for same packet
416 constructSupplicantIdentifyPacket(null, EAP.ATTR_IDENTITY, (byte) 1, null);
417 sendPacket(identifyPacket);
418 aaaManager.impl.handlePacketFromServer(null);
419 aaaManager.aaaStatisticsManager.calculatePacketRoundtripTime();
420
421 // creating malformed packet
422 final ByteBuffer byteBuffer = ByteBuffer.wrap(startPacket.serialize());
423 InboundPacket inPacket = new DefaultInboundPacket(connectPoint("1", 1),
424 startPacket, byteBuffer);
425
426 PacketContext context = new TestPacketContext(127L, inPacket, null, false);
427 aaaManager.impl.handlePacketFromServer(context);
Shubham Sharmac7aa6202019-12-12 10:19:10 +0000428
429 // Check for increase of Stats
430 assertNotEquals(aaaStatisticsManager.getAaaStats().getEapolResIdentityMsgTrans(), ZERO);
431 assertNotEquals(aaaStatisticsManager.getAaaStats().getEapolStartReqTrans(), ZERO);
432
Shubham Sharma1ad16632019-11-26 11:09:21 +0000433 countAaaStatistics();
434
435 }
436
Shubham Sharmac7aa6202019-12-12 10:19:10 +0000437 /** Tests the authentication path through the AAA application.
438 * And counts the aaa Stats for logoff transactionXZ.
439 * @throws DeserializationException
440 * if packed deserialization fails.
441 */
442 @Test
443 public void testAaaStatisticsForLogoffPackets() throws Exception {
444
445 // (1) Supplicant start up
446 Ethernet startPacket = constructSupplicantStartPacket();
447 sendPacket(startPacket);
448
449 Ethernet responsePacket = (Ethernet) fetchPacket(0);
450 checkRadiusPacket(aaaManager, responsePacket, EAP.ATTR_IDENTITY);
451
452 // (2) Supplicant identify
453
454 Ethernet identifyPacket = constructSupplicantIdentifyPacket(null, EAP.ATTR_IDENTITY, (byte) 1, null);
455 sendPacket(identifyPacket);
456
457 RADIUS radiusIdentifyPacket = (RADIUS) fetchPacket(1);
458 checkRadiusPacketFromSupplicant(radiusIdentifyPacket);
459
460 assertThat(radiusIdentifyPacket.getCode(), is(RADIUS.RADIUS_CODE_ACCESS_REQUEST));
461 assertThat(new String(radiusIdentifyPacket.getAttribute(RADIUSAttribute.RADIUS_ATTR_USERNAME).getValue()),
462 is("testuser"));
463 IpAddress nasIp = IpAddress.valueOf(IpAddress.Version.INET,
464 radiusIdentifyPacket.getAttribute(RADIUSAttribute.RADIUS_ATTR_NAS_IP).getValue());
465 assertThat(nasIp.toString(), is(aaaManager.nasIpAddress.getHostAddress()));
466
467 // State machine should have been created by now
468
469 StateMachine stateMachine = StateMachine.lookupStateMachineBySessionId(SESSION_ID);
470 assertThat(stateMachine, notNullValue());
471 assertThat(stateMachine.state(), is(StateMachine.STATE_PENDING));
472
473 // (3) RADIUS MD5 challenge
474
475 RADIUS radiusCodeAccessChallengePacket = constructRadiusCodeAccessChallengePacket(
476 RADIUS.RADIUS_CODE_ACCESS_CHALLENGE, EAP.ATTR_MD5);
477 aaaManager.handleRadiusPacket(radiusCodeAccessChallengePacket);
478
479 Ethernet radiusChallengeMD5Packet = (Ethernet) fetchPacket(2);
480 checkRadiusPacket(aaaManager, radiusChallengeMD5Packet, EAP.ATTR_MD5);
481
482 // (4) Supplicant MD5 response
483
484 Ethernet md5RadiusPacket = constructSupplicantIdentifyPacket(stateMachine, EAP.ATTR_MD5,
485 stateMachine.challengeIdentifier(), radiusChallengeMD5Packet);
486 sendPacket(md5RadiusPacket);
487
488 RADIUS responseMd5RadiusPacket = (RADIUS) fetchPacket(3);
489
490 checkRadiusPacketFromSupplicant(responseMd5RadiusPacket);
491 assertThat(responseMd5RadiusPacket.getIdentifier(), is((byte) 9));
492 assertThat(responseMd5RadiusPacket.getCode(), is(RADIUS.RADIUS_CODE_ACCESS_REQUEST));
493
494 // State machine should be in pending state
495
496 assertThat(stateMachine, notNullValue());
497 assertThat(stateMachine.state(), is(StateMachine.STATE_PENDING));
498
499 // (5) RADIUS Success
500
501 RADIUS successPacket =
502 constructRadiusCodeAccessChallengePacket(RADIUS.RADIUS_CODE_ACCESS_ACCEPT, EAP.SUCCESS);
503 aaaManager.handleRadiusPacket((successPacket));
504 Ethernet supplicantSuccessPacket = (Ethernet) fetchPacket(4);
505
506 checkRadiusPacket(aaaManager, supplicantSuccessPacket, EAP.SUCCESS);
507
508 // State machine should be in authorized state
509
510 assertThat(stateMachine, notNullValue());
511 assertThat(stateMachine.state(), is(StateMachine.STATE_AUTHORIZED));
512
513 // Supplicant trigger EAP Logoff
514 Ethernet loggoffPacket = constructSupplicantLogoffPacket();
515 sendPacket(loggoffPacket);
516
517 // State machine should be in logoff state
518 assertThat(stateMachine, notNullValue());
519 assertThat(stateMachine.state(), is(StateMachine.STATE_IDLE));
520
521 //Check for increase in stats
522 assertNotEquals(aaaStatisticsManager.getAaaStats().getEapolLogoffRx(), ZERO);
523 assertNotEquals(aaaStatisticsManager.getAaaStats().getEapolResIdentityMsgTrans(), ZERO);
524 assertNotEquals(aaaStatisticsManager.getAaaStats().getEapolAuthSuccessTrans(), ZERO);
525 assertNotEquals(aaaStatisticsManager.getAaaStats().getEapolStartReqTrans(), ZERO);
526 assertNotEquals(aaaStatisticsManager.getAaaStats().getEapolTransRespNotNak(), ZERO);
527 assertNotEquals(aaaStatisticsManager.getAaaStats().getEapPktTxauthChooseEap(), ZERO);
528 // Counts the aaa Statistics count
529 countAaaStatistics();
530
531 }
532
Shubham Sharma1ad16632019-11-26 11:09:21 +0000533 // Calculates the AAA statistics count.
534 public void countAaaStatistics() {
535 assertThat(aaaStatisticsManager.getAaaStats().getAcceptResponsesRx(), notNullValue());
536 assertThat(aaaStatisticsManager.getAaaStats().getAccessRequestsTx(), notNullValue());
537 assertThat(aaaStatisticsManager.getAaaStats().getChallengeResponsesRx(), notNullValue());
538 assertThat(aaaStatisticsManager.getAaaStats().getDroppedResponsesRx(), notNullValue());
539 assertThat(aaaStatisticsManager.getAaaStats().getInvalidValidatorsRx(), notNullValue());
540 assertThat(aaaStatisticsManager.getAaaStats().getMalformedResponsesRx(), notNullValue());
541 assertThat(aaaStatisticsManager.getAaaStats().getPendingRequests(), notNullValue());
542 assertThat(aaaStatisticsManager.getAaaStats().getRejectResponsesRx(), notNullValue());
543 assertThat(aaaStatisticsManager.getAaaStats().getRequestReTx(), notNullValue());
544 assertThat(aaaStatisticsManager.getAaaStats().getRequestRttMilis(), notNullValue());
545 assertThat(aaaStatisticsManager.getAaaStats().getUnknownServerRx(), notNullValue());
546 assertThat(aaaStatisticsManager.getAaaStats().getUnknownTypeRx(), notNullValue());
Shubham Sharmac7aa6202019-12-12 10:19:10 +0000547
Shubham Sharma1ad16632019-11-26 11:09:21 +0000548 }
549
550 /*
551 * Mock implementation of SocketBasedRadiusCommunicator class.
552 *
553 */
554 class TestSocketBasedRadiusCommunicator extends SocketBasedRadiusCommunicator {
555
556 TestSocketBasedRadiusCommunicator(ApplicationId appId, PacketService pktService, AaaManager aaaManager) {
557 super(appId, pktService, aaaManager);
558 }
559
560 // Implementation of socketBasedRadiusCommunicator--> run() method
561 public void handlePacketFromServer(PacketContext context) {
562
563 RADIUS incomingPkt = (RADIUS) fetchPacket(savedPackets.size() - 1);
564 try {
565 if (context == null) {
566 aaaStatisticsManager.handleRoundtripTime(incomingPkt.getIdentifier());
567 aaaManager.handleRadiusPacket(incomingPkt);
568 } else if (null != context) {
569 aaaManager.checkForPacketFromUnknownServer("100.100.100.0");
570 aaaStatisticsManager.handleRoundtripTime(incomingPkt.getIdentifier());
571 aaaManager.handleRadiusPacket(incomingPkt);
572 incomingPkt =
573 RADIUS.deserializer().deserialize(incomingPkt.generateAuthCode(), 0, 1);
574 }
575 } catch (DeserializationException dex) {
576 aaaManager.aaaStatisticsManager.getAaaStats().increaseMalformedResponsesRx();
577 aaaStatisticsManager.getAaaStats().countDroppedResponsesRx();
578 log.error("Cannot deserialize packet", dex);
579 } catch (StateMachineException sme) {
580 log.error("Illegal state machine operation", sme);
581 }
582
583 }
584
585 }
586
Kartikey Dubeybe14f472019-10-01 12:18:35 +0000587}