Skip to content

Console Output

Skipping 1,459 KB.. Full Log
TC_ims_registration_423_interval_too_brief-IMS_ConnHdlr-238010000090828(54)@2c36661cae0d: Stopping testcase execution from "IMS_ConnectionHandler.ttcn":271
MC@2c36661cae0d: Test Component 54 has requested to stop MTC. Terminating current testcase execution.
Asterisk_Tests_LOCAL_SIP_EMU(52)@2c36661cae0d: Final verdict of PTC: none
TC_ims_registration_423_interval_too_brief-IMS_ConnHdlr-238010000090828(54)@2c36661cae0d: Final verdict of PTC: fail reason: ""IMS_ConnectionHandler.ttcn:271 : \"TC_ims_registration_423_interval_too_brief-IMS_ConnHdlr-238010000090828: Received unexpected SIP Req message := \"{ requestLine := { method := REGISTER_E (11), requestUri := { scheme := \"sip\", userInfo := omit, hostPort := { host := \"ims.mnc001.mcc238.3gppnetwork.org\", portField := omit }, urlParameters := omit, headers := omit }, sipVersion := \"SIP/2.0\" }, msgHeader := { accept := omit, accept_contact := omit, acceptEncoding := omit, acceptLanguage := omit, acceptResourcePriority := omit, alertInfo := omit, alert_mode := omit, allow := { fieldName := ALLOW_E (7), methods := { \"OPTIONS\", \"REGISTER\", \"SUBSCRIBE\", \"NOTIFY\", \"PUBLISH\", \"INVITE\", \"ACK\", \"BYE\", \"CANCEL\", \"UPDATE\", \"PRACK\", \"INFO\", \"REFER\", \"MESSAGE\" } }, allow_events := omit, answer_mode := omit, authenticationInfo := omit, authorization := omit, callId := { fieldName := CALL_ID_E (12), callid := \"7225aeda-6282-4837-b588-f5425e9c21b9\" }, callInfo := omit, contact := { fieldName := CONTACT_E (14), contactBody := { contactAddresses := { { addressField := { nameAddr := { displayName := omit, addrSpec := { scheme := \"sip\", userInfo := { userOrTelephoneSubscriber := \"5a2eef7b-6caf-476d-b57c-f7b2f6d3102a\", password := omit }, hostPort := { host := \"172.18.69.10\", portField := 5060 }, urlParameters := { { id := \"transport\", paramValue := \"TCP\" }, { id := \"line\", paramValue := \"abqlevz\" } }, headers := omit } } }, contactParams := { { id := \"+g.3gpp.icsi-ref\", paramValue := \"\\\"urn\\\\%3Aurn-7\\\\%3A3gpp-service.ims.icsi.mmtel\\\"\" }, { id := \"audio\", paramValue := omit }, { id := \"+sip.instance\", paramValue := \"\\\"<urn:gsma:imei:35876110-027790-0>\\\"\" } } } } } }, contentDisposition := omit, contentEncoding := omit, contentLanguage := omit, contentLength := { fieldName := CONTENT_LENGTH_E (18), len := 0 }, contentType := omit, cSeq := { fieldName := CSEQ_E (20), seqNumber := 6070, method := \"REGISTER\" }, date := omit, diversion := omit, errorInfo := omit, event := omit, expires := { fieldName := EXPIRES_E (24), deltaSec := \"1200000\" }, feature_caps := omit, fromField := { fieldName := FROM_E (27), addressField := { nameAddr := { displayName := omit, addrSpec := { scheme := \"sip\", userInfo := { userOrTelephoneSubscriber := \"238010000090828\", password := omit }, hostPort := { host := \"ims.mnc001.mcc238.3gppnetwork.org\", portField := omit }, urlParameters := omit, headers := omit } } }, fromParams := { { id := \"tag\", paramValue := \"94d6cee2-3dc0-4b9a-b884-0780eb2c12f2\" } } }, geolocation := omit, geolocation_routing := omit, geolocation_error := omit, historyInfo := omit, info_Package := omit, inReplyTo := omit, join := omit, maxForwards := { fieldName := MAX_FORWARDS_E (35), forwards := 70 }, mimeVersion := omit, minExpires := omit, min_SE := omit, organization := omit, p_access_network_info := omit, p_alerting_mode := omit, p_answer_state := omit, p_Area_Info := omit, passertedID := omit, p_asserted_service := omit, p_associated_uri := omit, p_called_party_id := omit, p_charging_function_address := omit, p_charging_vector := omit, p_DCS_trace_pty_id := omit, p_DCS_OSPS := omit, p_DCS_billing_info := omit, p_DCS_LAES := omit, p_DCS_redirect := omit, p_Early_Media := omit, p_last_access_network_info := omit, p_media_auth := omit, ppreferredID := omit, p_preferred_service := omit, p_profile_key := omit, p_served_user := omit, p_Service_Indication := omit, p_Service_Notification := omit, p_user_database := omit, p_visited_network_id := omit, path := omit, priv_answer_mode := omit, priority := omit, privacy := omit, proxyAuthenticate := omit, proxyAuthorization := omit, proxyRequire := omit, rack := omit, rseq := omit, reason := omit, recordRoute := omit, recv_Info := omit, reject_contact := omit, refer_sub := omit, refer_to := omit, referred_by := omit, replyTo := omit, replaces := omit, require := omit, request_disp := omit, resourcePriority := omit, retryAfter := omit, route := omit, security_client := omit, security_server := omit, security_verify := omit, session_expires := omit, session_id := omit, server := omit, service_route := omit, sip_ETag := omit, sip_If_Match := omit, subject := omit, subscription_state := omit, supported := omit, target_dialog := omit, timestamp := omit, toField := { fieldName := TO_E (103), addressField := { nameAddr := { displayName := omit, addrSpec := { scheme := \"sip\", userInfo := { userOrTelephoneSubscriber := \"238010000090828\", password := omit }, hostPort := { host := \"ims.mnc001.mcc238.3gppnetwork.org\", portField := omit }, urlParameters := omit, headers := omit } } }, toParams := omit }, unsupported := omit, userAgent := { fieldName := USER_AGENT_E (105), userAgentBody := { \"Asterisk\", \"PBX\", \"20.7.0\" } }, via := { fieldName := VIA_E (106), viaBody := { { sentProtocol := { protocolName := \"SIP\", protocolVersion := \"2.0\", transport := \"TCP\" }, sentBy := { host := \"172.18.69.10\", portField := 5060 }, viaParams := { { id := \"rport\", paramValue := omit }, { id := \"branch\", paramValue := \"z9hG4bKPj92474b5c-1d43-4962-b596-a0f15ef7f793\" }, { id := \"alias\", paramValue := omit } } } } }, warning := omit, wwwAuthenticate := omit, x_AUT := omit, x_Carrier_Info := omit, x_CHGDelay := omit, x_CHGInfo := omit, x_FCI := omit, undefinedHeader_List := omit }, messageBody := omit, payload := omit }\nvs exp := \"{ requestLine := { method := REGISTER_E (11), requestUri := { scheme := \\\"sip\\\", userInfo := omit, hostPort := { host := \\\"ims.mnc001.mcc238.3gppnetwork.org\\\", portField := omit }, urlParameters := omit, headers := omit }, sipVersion := \\\"SIP/2.0\\\" }, msgHeader := { accept := *, accept_contact := *, acceptEncoding := *, acceptLanguage := *, acceptResourcePriority := *, alertInfo := *, alert_mode := *, allow := *, allow_events := *, answer_mode := *, authenticationInfo := *, authorization := *, callId := { fieldName := CALL_ID_E (12), callid := ? }, callInfo := *, contact := *, contentDisposition := *, contentEncoding := *, contentLanguage := *, contentLength := *, contentType := *, cSeq := { fieldName := CSEQ_E (20), seqNumber := *, method := \\\"REGISTER\\\" }, date := *, diversion := *, errorInfo := *, event := *, expires := { fieldName := EXPIRES_E (24), deltaSec := \\\"1200000\\\" }, feature_caps := *, fromField := { fieldName := FROM_E (27), addressField := ?, fromParams := * }, geolocation := *, geolocation_routing := *, geolocation_error := *, historyInfo := *, info_Package := *, inReplyTo := *, join := *, maxForwards := *, mimeVersion := *, minExpires := *, min_SE := *, organization := *, p_access_network_info := *, p_alerting_mode := *, p_answer_state := *, p_Area_Info := *, passertedID := *, p_asserted_service := *, p_associated_uri := *, p_called_party_id := *, p_charging_function_address := *, p_charging_vector := *, p_DCS_trace_pty_id := *, p_DCS_OSPS := *, p_DCS_billing_info := *, p_DCS_LAES := *, p_DCS_redirect := *, p_Early_Media := *, p_last_access_network_info := *, p_media_auth := *, ppreferredID := *, p_preferred_service := *, p_profile_key := *, p_served_user := *, p_Service_Indication := *, p_Service_Notification := *, p_user_database := *, p_visited_network_id := *, path := *, priv_answer_mode := *, priority := *, privacy := *, proxyAuthenticate := *, proxyAuthorization := *, proxyRequire := *, rack := *, rseq := *, reason := *, recordRoute := *, recv_Info := *, reject_contact := *, refer_sub := *, refer_to := *, referred_by := *, replyTo := *, replaces := *, require := { fieldName := REQUIRE_E (84), optionsTags := superset(\\\"sec-agree\\\") }, request_disp := *, resourcePriority := *, retryAfter := *, route := *, security_client := { fieldName := SECURITY_CLIENT_E (89), sec_mechanism_list := superset({ mechanism_name := \\\"ipsec-3gpp\\\", mechanism_params := superset({ id := \\\"alg\\\", paramValue := \\\"hmac-sha-1-96\\\" }) }) }, security_server := *, security_verify := *, session_expires := *, session_id := *, server := *, service_route := *, sip_ETag := *, sip_If_Match := *, subject := *, subscription_state := *, supported := { fieldName := SUPPORTED_E (100), optionsTags := superset(\\\"path\\\", \\\"sec-agree\\\") }, target_dialog := *, timestamp := *, toField := { fieldName := TO_E (103), addressField := ?, toParams := * }, unsupported := *, userAgent := *, via := { fieldName := VIA_E (106), viaBody := { { sentProtocol := { protocolName := \\\"SIP\\\", protocolVersion := \\\"2.0\\\", transport := ? }, sentBy := ?, viaParams := * } } }, warning := *, wwwAuthenticate := *, x_AUT := *, x_Carrier_Info := *, x_CHGDelay := *, x_CHGInfo := *, x_FCI := *, undefinedHeader_List := * }, messageBody := *, payload := omit }\"""
Asterisk_Tests_IMS_SIP_EMU(53)@2c36661cae0d: Final verdict of PTC: none
Asterisk_Tests_AMI_EMU(51)@2c36661cae0d: Final verdict of PTC: none
MTC@2c36661cae0d: Setting final verdict of the test case.
MTC@2c36661cae0d: Local verdict of MTC: none
MTC@2c36661cae0d: Local verdict of PTC Asterisk_Tests_AMI_EMU(51): none (none -> none)
MTC@2c36661cae0d: Local verdict of PTC Asterisk_Tests_LOCAL_SIP_EMU(52): none (none -> none)
MTC@2c36661cae0d: Local verdict of PTC Asterisk_Tests_IMS_SIP_EMU(53): none (none -> none)
MTC@2c36661cae0d: Local verdict of PTC TC_ims_registration_423_interval_too_brief-IMS_ConnHdlr-238010000090828(54): fail (none -> fail) reason: ""IMS_ConnectionHandler.ttcn:271 : \"TC_ims_registration_423_interval_too_brief-IMS_ConnHdlr-238010000090828: Received unexpected SIP Req message := \"{ requestLine := { method := REGISTER_E (11), requestUri := { scheme := \"sip\", userInfo := omit, hostPort := { host := \"ims.mnc001.mcc238.3gppnetwork.org\", portField := omit }, urlParameters := omit, headers := omit }, sipVersion := \"SIP/2.0\" }, msgHeader := { accept := omit, accept_contact := omit, acceptEncoding := omit, acceptLanguage := omit, acceptResourcePriority := omit, alertInfo := omit, alert_mode := omit, allow := { fieldName := ALLOW_E (7), methods := { \"OPTIONS\", \"REGISTER\", \"SUBSCRIBE\", \"NOTIFY\", \"PUBLISH\", \"INVITE\", \"ACK\", \"BYE\", \"CANCEL\", \"UPDATE\", \"PRACK\", \"INFO\", \"REFER\", \"MESSAGE\" } }, allow_events := omit, answer_mode := omit, authenticationInfo := omit, authorization := omit, callId := { fieldName := CALL_ID_E (12), callid := \"7225aeda-6282-4837-b588-f5425e9c21b9\" }, callInfo := omit, contact := { fieldName := CONTACT_E (14), contactBody := { contactAddresses := { { addressField := { nameAddr := { displayName := omit, addrSpec := { scheme := \"sip\", userInfo := { userOrTelephoneSubscriber := \"5a2eef7b-6caf-476d-b57c-f7b2f6d3102a\", password := omit }, hostPort := { host := \"172.18.69.10\", portField := 5060 }, urlParameters := { { id := \"transport\", paramValue := \"TCP\" }, { id := \"line\", paramValue := \"abqlevz\" } }, headers := omit } } }, contactParams := { { id := \"+g.3gpp.icsi-ref\", paramValue := \"\\\"urn\\\\%3Aurn-7\\\\%3A3gpp-service.ims.icsi.mmtel\\\"\" }, { id := \"audio\", paramValue := omit }, { id := \"+sip.instance\", paramValue := \"\\\"<urn:gsma:imei:35876110-027790-0>\\\"\" } } } } } }, contentDisposition := omit, contentEncoding := omit, contentLanguage := omit, contentLength := { fieldName := CONTENT_LENGTH_E (18), len := 0 }, contentType := omit, cSeq := { fieldName := CSEQ_E (20), seqNumber := 6070, method := \"REGISTER\" }, date := omit, diversion := omit, errorInfo := omit, event := omit, expires := { fieldName := EXPIRES_E (24), deltaSec := \"1200000\" }, feature_caps := omit, fromField := { fieldName := FROM_E (27), addressField := { nameAddr := { displayName := omit, addrSpec := { scheme := \"sip\", userInfo := { userOrTelephoneSubscriber := \"238010000090828\", password := omit }, hostPort := { host := \"ims.mnc001.mcc238.3gppnetwork.org\", portField := omit }, urlParameters := omit, headers := omit } } }, fromParams := { { id := \"tag\", paramValue := \"94d6cee2-3dc0-4b9a-b884-0780eb2c12f2\" } } }, geolocation := omit, geolocation_routing := omit, geolocation_error := omit, historyInfo := omit, info_Package := omit, inReplyTo := omit, join := omit, maxForwards := { fieldName := MAX_FORWARDS_E (35), forwards := 70 }, mimeVersion := omit, minExpires := omit, min_SE := omit, organization := omit, p_access_network_info := omit, p_alerting_mode := omit, p_answer_state := omit, p_Area_Info := omit, passertedID := omit, p_asserted_service := omit, p_associated_uri := omit, p_called_party_id := omit, p_charging_function_address := omit, p_charging_vector := omit, p_DCS_trace_pty_id := omit, p_DCS_OSPS := omit, p_DCS_billing_info := omit, p_DCS_LAES := omit, p_DCS_redirect := omit, p_Early_Media := omit, p_last_access_network_info := omit, p_media_auth := omit, ppreferredID := omit, p_preferred_service := omit, p_profile_key := omit, p_served_user := omit, p_Service_Indication := omit, p_Service_Notification := omit, p_user_database := omit, p_visited_network_id := omit, path := omit, priv_answer_mode := omit, priority := omit, privacy := omit, proxyAuthenticate := omit, proxyAuthorization := omit, proxyRequire := omit, rack := omit, rseq := omit, reason := omit, recordRoute := omit, recv_Info := omit, reject_contact := omit, refer_sub := omit, refer_to := omit, referred_by := omit, replyTo := omit, replaces := omit, require := omit, request_disp := omit, resourcePriority := omit, retryAfter := omit, route := omit, security_client := omit, security_server := omit, security_verify := omit, session_expires := omit, session_id := omit, server := omit, service_route := omit, sip_ETag := omit, sip_If_Match := omit, subject := omit, subscription_state := omit, supported := omit, target_dialog := omit, timestamp := omit, toField := { fieldName := TO_E (103), addressField := { nameAddr := { displayName := omit, addrSpec := { scheme := \"sip\", userInfo := { userOrTelephoneSubscriber := \"238010000090828\", password := omit }, hostPort := { host := \"ims.mnc001.mcc238.3gppnetwork.org\", portField := omit }, urlParameters := omit, headers := omit } } }, toParams := omit }, unsupported := omit, userAgent := { fieldName := USER_AGENT_E (105), userAgentBody := { \"Asterisk\", \"PBX\", \"20.7.0\" } }, via := { fieldName := VIA_E (106), viaBody := { { sentProtocol := { protocolName := \"SIP\", protocolVersion := \"2.0\", transport := \"TCP\" }, sentBy := { host := \"172.18.69.10\", portField := 5060 }, viaParams := { { id := \"rport\", paramValue := omit }, { id := \"branch\", paramValue := \"z9hG4bKPj92474b5c-1d43-4962-b596-a0f15ef7f793\" }, { id := \"alias\", paramValue := omit } } } } }, warning := omit, wwwAuthenticate := omit, x_AUT := omit, x_Carrier_Info := omit, x_CHGDelay := omit, x_CHGInfo := omit, x_FCI := omit, undefinedHeader_List := omit }, messageBody := omit, payload := omit }\nvs exp := \"{ requestLine := { method := REGISTER_E (11), requestUri := { scheme := \\\"sip\\\", userInfo := omit, hostPort := { host := \\\"ims.mnc001.mcc238.3gppnetwork.org\\\", portField := omit }, urlParameters := omit, headers := omit }, sipVersion := \\\"SIP/2.0\\\" }, msgHeader := { accept := *, accept_contact := *, acceptEncoding := *, acceptLanguage := *, acceptResourcePriority := *, alertInfo := *, alert_mode := *, allow := *, allow_events := *, answer_mode := *, authenticationInfo := *, authorization := *, callId := { fieldName := CALL_ID_E (12), callid := ? }, callInfo := *, contact := *, contentDisposition := *, contentEncoding := *, contentLanguage := *, contentLength := *, contentType := *, cSeq := { fieldName := CSEQ_E (20), seqNumber := *, method := \\\"REGISTER\\\" }, date := *, diversion := *, errorInfo := *, event := *, expires := { fieldName := EXPIRES_E (24), deltaSec := \\\"1200000\\\" }, feature_caps := *, fromField := { fieldName := FROM_E (27), addressField := ?, fromParams := * }, geolocation := *, geolocation_routing := *, geolocation_error := *, historyInfo := *, info_Package := *, inReplyTo := *, join := *, maxForwards := *, mimeVersion := *, minExpires := *, min_SE := *, organization := *, p_access_network_info := *, p_alerting_mode := *, p_answer_state := *, p_Area_Info := *, passertedID := *, p_asserted_service := *, p_associated_uri := *, p_called_party_id := *, p_charging_function_address := *, p_charging_vector := *, p_DCS_trace_pty_id := *, p_DCS_OSPS := *, p_DCS_billing_info := *, p_DCS_LAES := *, p_DCS_redirect := *, p_Early_Media := *, p_last_access_network_info := *, p_media_auth := *, ppreferredID := *, p_preferred_service := *, p_profile_key := *, p_served_user := *, p_Service_Indication := *, p_Service_Notification := *, p_user_database := *, p_visited_network_id := *, path := *, priv_answer_mode := *, priority := *, privacy := *, proxyAuthenticate := *, proxyAuthorization := *, proxyRequire := *, rack := *, rseq := *, reason := *, recordRoute := *, recv_Info := *, reject_contact := *, refer_sub := *, refer_to := *, referred_by := *, replyTo := *, replaces := *, require := { fieldName := REQUIRE_E (84), optionsTags := superset(\\\"sec-agree\\\") }, request_disp := *, resourcePriority := *, retryAfter := *, route := *, security_client := { fieldName := SECURITY_CLIENT_E (89), sec_mechanism_list := superset({ mechanism_name := \\\"ipsec-3gpp\\\", mechanism_params := superset({ id := \\\"alg\\\", paramValue := \\\"hmac-sha-1-96\\\" }) }) }, security_server := *, security_verify := *, session_expires := *, session_id := *, server := *, service_route := *, sip_ETag := *, sip_If_Match := *, subject := *, subscription_state := *, supported := { fieldName := SUPPORTED_E (100), optionsTags := superset(\\\"path\\\", \\\"sec-agree\\\") }, target_dialog := *, timestamp := *, toField := { fieldName := TO_E (103), addressField := ?, toParams := * }, unsupported := *, userAgent := *, via := { fieldName := VIA_E (106), viaBody := { { sentProtocol := { protocolName := \\\"SIP\\\", protocolVersion := \\\"2.0\\\", transport := ? }, sentBy := ?, viaParams := * } } }, warning := *, wwwAuthenticate := *, x_AUT := *, x_Carrier_Info := *, x_CHGDelay := *, x_CHGInfo := *, x_FCI := *, undefinedHeader_List := * }, messageBody := *, payload := omit }\"""
MTC@2c36661cae0d: Test case TC_ims_registration_423_interval_too_brief finished. Verdict: fail reason: "IMS_ConnectionHandler.ttcn:271 : \"TC_ims_registration_423_interval_too_brief-IMS_ConnHdlr-238010000090828: Received unexpected SIP Req message := \"{ requestLine := { method := REGISTER_E (11), requestUri := { scheme := \"sip\", userInfo := omit, hostPort := { host := \"ims.mnc001.mcc238.3gppnetwork.org\", portField := omit }, urlParameters := omit, headers := omit }, sipVersion := \"SIP/2.0\" }, msgHeader := { accept := omit, accept_contact := omit, acceptEncoding := omit, acceptLanguage := omit, acceptResourcePriority := omit, alertInfo := omit, alert_mode := omit, allow := { fieldName := ALLOW_E (7), methods := { \"OPTIONS\", \"REGISTER\", \"SUBSCRIBE\", \"NOTIFY\", \"PUBLISH\", \"INVITE\", \"ACK\", \"BYE\", \"CANCEL\", \"UPDATE\", \"PRACK\", \"INFO\", \"REFER\", \"MESSAGE\" } }, allow_events := omit, answer_mode := omit, authenticationInfo := omit, authorization := omit, callId := { fieldName := CALL_ID_E (12), callid := \"7225aeda-6282-4837-b588-f5425e9c21b9\" }, callInfo := omit, contact := { fieldName := CONTACT_E (14), contactBody := { contactAddresses := { { addressField := { nameAddr := { displayName := omit, addrSpec := { scheme := \"sip\", userInfo := { userOrTelephoneSubscriber := \"5a2eef7b-6caf-476d-b57c-f7b2f6d3102a\", password := omit }, hostPort := { host := \"172.18.69.10\", portField := 5060 }, urlParameters := { { id := \"transport\", paramValue := \"TCP\" }, { id := \"line\", paramValue := \"abqlevz\" } }, headers := omit } } }, contactParams := { { id := \"+g.3gpp.icsi-ref\", paramValue := \"\\\"urn\\\\%3Aurn-7\\\\%3A3gpp-service.ims.icsi.mmtel\\\"\" }, { id := \"audio\", paramValue := omit }, { id := \"+sip.instance\", paramValue := \"\\\"<urn:gsma:imei:35876110-027790-0>\\\"\" } } } } } }, contentDisposition := omit, contentEncoding := omit, contentLanguage := omit, contentLength := { fieldName := CONTENT_LENGTH_E (18), len := 0 }, contentType := omit, cSeq := { fieldName := CSEQ_E (20), seqNumber := 6070, method := \"REGISTER\" }, date := omit, diversion := omit, errorInfo := omit, event := omit, expires := { fieldName := EXPIRES_E (24), deltaSec := \"1200000\" }, feature_caps := omit, fromField := { fieldName := FROM_E (27), addressField := { nameAddr := { displayName := omit, addrSpec := { scheme := \"sip\", userInfo := { userOrTelephoneSubscriber := \"238010000090828\", password := omit }, hostPort := { host := \"ims.mnc001.mcc238.3gppnetwork.org\", portField := omit }, urlParameters := omit, headers := omit } } }, fromParams := { { id := \"tag\", paramValue := \"94d6cee2-3dc0-4b9a-b884-0780eb2c12f2\" } } }, geolocation := omit, geolocation_routing := omit, geolocation_error := omit, historyInfo := omit, info_Package := omit, inReplyTo := omit, join := omit, maxForwards := { fieldName := MAX_FORWARDS_E (35), forwards := 70 }, mimeVersion := omit, minExpires := omit, min_SE := omit, organization := omit, p_access_network_info := omit, p_alerting_mode := omit, p_answer_state := omit, p_Area_Info := omit, passertedID := omit, p_asserted_service := omit, p_associated_uri := omit, p_called_party_id := omit, p_charging_function_address := omit, p_charging_vector := omit, p_DCS_trace_pty_id := omit, p_DCS_OSPS := omit, p_DCS_billing_info := omit, p_DCS_LAES := omit, p_DCS_redirect := omit, p_Early_Media := omit, p_last_access_network_info := omit, p_media_auth := omit, ppreferredID := omit, p_preferred_service := omit, p_profile_key := omit, p_served_user := omit, p_Service_Indication := omit, p_Service_Notification := omit, p_user_database := omit, p_visited_network_id := omit, path := omit, priv_answer_mode := omit, priority := omit, privacy := omit, proxyAuthenticate := omit, proxyAuthorization := omit, proxyRequire := omit, rack := omit, rseq := omit, reason := omit, recordRoute := omit, recv_Info := omit, reject_contact := omit, refer_sub := omit, refer_to := omit, referred_by := omit, replyTo := omit, replaces := omit, require := omit, request_disp := omit, resourcePriority := omit, retryAfter := omit, route := omit, security_client := omit, security_server := omit, security_verify := omit, session_expires := omit, session_id := omit, server := omit, service_route := omit, sip_ETag := omit, sip_If_Match := omit, subject := omit, subscription_state := omit, supported := omit, target_dialog := omit, timestamp := omit, toField := { fieldName := TO_E (103), addressField := { nameAddr := { displayName := omit, addrSpec := { scheme := \"sip\", userInfo := { userOrTelephoneSubscriber := \"238010000090828\", password := omit }, hostPort := { host := \"ims.mnc001.mcc238.3gppnetwork.org\", portField := omit }, urlParameters := omit, headers := omit } } }, toParams := omit }, unsupported := omit, userAgent := { fieldName := USER_AGENT_E (105), userAgentBody := { \"Asterisk\", \"PBX\", \"20.7.0\" } }, via := { fieldName := VIA_E (106), viaBody := { { sentProtocol := { protocolName := \"SIP\", protocolVersion := \"2.0\", transport := \"TCP\" }, sentBy := { host := \"172.18.69.10\", portField := 5060 }, viaParams := { { id := \"rport\", paramValue := omit }, { id := \"branch\", paramValue := \"z9hG4bKPj92474b5c-1d43-4962-b596-a0f15ef7f793\" }, { id := \"alias\", paramValue := omit } } } } }, warning := omit, wwwAuthenticate := omit, x_AUT := omit, x_Carrier_Info := omit, x_CHGDelay := omit, x_CHGInfo := omit, x_FCI := omit, undefinedHeader_List := omit }, messageBody := omit, payload := omit }\nvs exp := \"{ requestLine := { method := REGISTER_E (11), requestUri := { scheme := \\\"sip\\\", userInfo := omit, hostPort := { host := \\\"ims.mnc001.mcc238.3gppnetwork.org\\\", portField := omit }, urlParameters := omit, headers := omit }, sipVersion := \\\"SIP/2.0\\\" }, msgHeader := { accept := *, accept_contact := *, acceptEncoding := *, acceptLanguage := *, acceptResourcePriority := *, alertInfo := *, alert_mode := *, allow := *, allow_events := *, answer_mode := *, authenticationInfo := *, authorization := *, callId := { fieldName := CALL_ID_E (12), callid := ? }, callInfo := *, contact := *, contentDisposition := *, contentEncoding := *, contentLanguage := *, contentLength := *, contentType := *, cSeq := { fieldName := CSEQ_E (20), seqNumber := *, method := \\\"REGISTER\\\" }, date := *, diversion := *, errorInfo := *, event := *, expires := { fieldName := EXPIRES_E (24), deltaSec := \\\"1200000\\\" }, feature_caps := *, fromField := { fieldName := FROM_E (27), addressField := ?, fromParams := * }, geolocation := *, geolocation_routing := *, geolocation_error := *, historyInfo := *, info_Package := *, inReplyTo := *, join := *, maxForwards := *, mimeVersion := *, minExpires := *, min_SE := *, organization := *, p_access_network_info := *, p_alerting_mode := *, p_answer_state := *, p_Area_Info := *, passertedID := *, p_asserted_service := *, p_associated_uri := *, p_called_party_id := *, p_charging_function_address := *, p_charging_vector := *, p_DCS_trace_pty_id := *, p_DCS_OSPS := *, p_DCS_billing_info := *, p_DCS_LAES := *, p_DCS_redirect := *, p_Early_Media := *, p_last_access_network_info := *, p_media_auth := *, ppreferredID := *, p_preferred_service := *, p_profile_key := *, p_served_user := *, p_Service_Indication := *, p_Service_Notification := *, p_user_database := *, p_visited_network_id := *, path := *, priv_answer_mode := *, priority := *, privacy := *, proxyAuthenticate := *, proxyAuthorization := *, proxyRequire := *, rack := *, rseq := *, reason := *, recordRoute := *, recv_Info := *, reject_contact := *, refer_sub := *, refer_to := *, referred_by := *, replyTo := *, replaces := *, require := { fieldName := REQUIRE_E (84), optionsTags := superset(\\\"sec-agree\\\") }, request_disp := *, resourcePriority := *, retryAfter := *, route := *, security_client := { fieldName := SECURITY_CLIENT_E (89), sec_mechanism_list := superset({ mechanism_name := \\\"ipsec-3gpp\\\", mechanism_params := superset({ id := \\\"alg\\\", paramValue := \\\"hmac-sha-1-96\\\" }) }) }, security_server := *, security_verify := *, session_expires := *, session_id := *, server := *, service_route := *, sip_ETag := *, sip_If_Match := *, subject := *, subscription_state := *, supported := { fieldName := SUPPORTED_E (100), optionsTags := superset(\\\"path\\\", \\\"sec-agree\\\") }, target_dialog := *, timestamp := *, toField := { fieldName := TO_E (103), addressField := ?, toParams := * }, unsupported := *, userAgent := *, via := { fieldName := VIA_E (106), viaBody := { { sentProtocol := { protocolName := \\\"SIP\\\", protocolVersion := \\\"2.0\\\", transport := ? }, sentBy := ?, viaParams := * } } }, warning := *, wwwAuthenticate := *, x_AUT := *, x_Carrier_Info := *, x_CHGDelay := *, x_CHGInfo := *, x_FCI := *, undefinedHeader_List := * }, messageBody := *, payload := omit }\""
MTC@2c36661cae0d: Starting external command `../ttcn3-tcpdump-stop.sh Asterisk_Tests.TC_ims_registration_423_interval_too_brief fail'.
Mon Jul  1 07:45:35 UTC 2024
------ Asterisk_Tests.TC_ims_registration_423_interval_too_brief fail ------

Waiting for packet dumper to finish... 0 (prev_count=-1, count=4003)
Waiting for packet dumper to finish... 1 (prev_count=4003, count=8279)
MTC@2c36661cae0d: External command `../ttcn3-tcpdump-stop.sh Asterisk_Tests.TC_ims_registration_423_interval_too_brief fail' was executed successfully (exit status: 0).
MTC@2c36661cae0d: Starting external command `../ttcn3-tcpdump-start.sh Asterisk_Tests.TC_ims_reregistration'.
------ Asterisk_Tests.TC_ims_reregistration ------
Mon Jul  1 07:45:37 UTC 2024
NOTE: unable to use dumpcap due to missing permissions in /data
 /usr/bin/tcpdump -U -s 1520 -n -i any -w "/data/Asterisk_Tests.TC_ims_reregistration.pcap" >/data/Asterisk_Tests.TC_ims_reregistration.pcap.stdout 2>/tmp/cmderr &
Waiting for packet dumper to start... 0
MTC@2c36661cae0d: External command `../ttcn3-tcpdump-start.sh Asterisk_Tests.TC_ims_reregistration' was executed successfully (exit status: 0).
MTC@2c36661cae0d: Test case TC_ims_reregistration started.
Asterisk_Tests_AMI_EMU(55)@2c36661cae0d: AMI connected, ConnId=1
Asterisk_Tests_AMI_EMU(55)@2c36661cae0d: Warning: There is no GetMsgLen function registered for connId: 1. The messages will not be dissected on this connection! This warning is logged only once per testport.
Asterisk_Tests_AMI_EMU(55)@2c36661cae0d: AMI Welcome message received: '"Asterisk Call Manager/9.0.0\r\n"'
Asterisk_Tests_AMI_EMU(55)@2c36661cae0d: AMI rx: '"Response: Success\r\nActionID: 432DB2175FC874F5\r\nMessage: Authentication accepted\r\n\r\nEvent: FullyBooted\r\nPrivilege: system,all\r\nUptime: 288\r\nLastReload: 288\r\nStatus: Fully Booted\r\n\r\n"'
Asterisk_Tests_AMI_EMU(55)@2c36661cae0d: AMI buf: '"Response: Success\r\nActionID: 432DB2175FC874F5\r\nMessage: Authentication accepted\r\n\r\nEvent: FullyBooted\r\nPrivilege: system,all\r\nUptime: 288\r\nLastReload: 288\r\nStatus: Fully Booted\r\n\r\n"'
Asterisk_Tests_AMI_EMU(55)@2c36661cae0d: AMI split: { "Response: Success\r\nActionID: 432DB2175FC874F5\r\nMessage: Authentication accepted", "Event: FullyBooted\r\nPrivilege: system,all\r\nUptime: 288\r\nLastReload: 288\r\nStatus: Fully Booted" }
Asterisk_Tests_AMI_EMU(55)@2c36661cae0d: AMI dec: '"Response: Success\r\nActionID: 432DB2175FC874F5\r\nMessage: Authentication accepted\r\n"'
Asterisk_Tests_AMI_EMU(55)@2c36661cae0d: AMI patched dec: '"Response: Success\r\nActionID: 432DB2175FC874F5\r\nMessage: Authentication accepted\r\n"'
Asterisk_Tests_AMI_EMU(55)@2c36661cae0d: AMI dec: '"Event: FullyBooted\r\nPrivilege: system,all\r\nUptime: 288\r\nLastReload: 288\r\nStatus: Fully Booted\r\n"'
Asterisk_Tests_AMI_EMU(55)@2c36661cae0d: AMI patched dec: '"Event: FullyBooted\r\nPrivilege: system,all\r\nUptime: 288\r\nLastReload: 288\r\nStatus: Fully Booted\r\n"'
Asterisk_Tests_AMI_EMU(55)@2c36661cae0d: AMI remain buf: '""'
Asterisk_Tests_AMI_EMU(55)@2c36661cae0d: AMI rx: '"Event: SuccessfulAuth\r\nPrivilege: security,all\r\nEventTV: 2024-07-01T07:45:38.656+0000\r\nSeverity: Informational\r\nService: AMI\r\nEventVersion: 1\r\nAccountID: test_user\r\nSessionID: 0x7f2478001090\r\nLocalAddress: IPV4/TCP/172.18.69.10/5038\r\nRemoteAddress: IPV4/TCP/172.18.69.103/36039\r\nUsingPassword: 0\r\nSessionTV: 2024-07-01T07:45:38.656+0000\r\n\r\n"'
Asterisk_Tests_AMI_EMU(55)@2c36661cae0d: AMI buf: '"Event: SuccessfulAuth\r\nPrivilege: security,all\r\nEventTV: 2024-07-01T07:45:38.656+0000\r\nSeverity: Informational\r\nService: AMI\r\nEventVersion: 1\r\nAccountID: test_user\r\nSessionID: 0x7f2478001090\r\nLocalAddress: IPV4/TCP/172.18.69.10/5038\r\nRemoteAddress: IPV4/TCP/172.18.69.103/36039\r\nUsingPassword: 0\r\nSessionTV: 2024-07-01T07:45:38.656+0000\r\n\r\n"'
Asterisk_Tests_AMI_EMU(55)@2c36661cae0d: AMI split: { "Event: SuccessfulAuth\r\nPrivilege: security,all\r\nEventTV: 2024-07-01T07:45:38.656+0000\r\nSeverity: Informational\r\nService: AMI\r\nEventVersion: 1\r\nAccountID: test_user\r\nSessionID: 0x7f2478001090\r\nLocalAddress: IPV4/TCP/172.18.69.10/5038\r\nRemoteAddress: IPV4/TCP/172.18.69.103/36039\r\nUsingPassword: 0\r\nSessionTV: 2024-07-01T07:45:38.656+0000" }
Asterisk_Tests_AMI_EMU(55)@2c36661cae0d: AMI dec: '"Event: SuccessfulAuth\r\nPrivilege: security,all\r\nEventTV: 2024-07-01T07:45:38.656+0000\r\nSeverity: Informational\r\nService: AMI\r\nEventVersion: 1\r\nAccountID: test_user\r\nSessionID: 0x7f2478001090\r\nLocalAddress: IPV4/TCP/172.18.69.10/5038\r\nRemoteAddress: IPV4/TCP/172.18.69.103/36039\r\nUsingPassword: 0\r\nSessionTV: 2024-07-01T07:45:38.656+0000\r\n"'
Asterisk_Tests_AMI_EMU(55)@2c36661cae0d: AMI patched dec: '"Event: SuccessfulAuth\r\nPrivilege: security,all\r\nEventTV: 2024-07-01T07:45:38.656+0000\r\nSeverity: Informational\r\nService: AMI\r\nEventVersion: 1\r\nAccountID: test_user\r\nSessionID: 0x7f2478001090\r\nLocalAddress: IPV4/TCP/172.18.69.10/5038\r\nRemoteAddress: IPV4/TCP/172.18.69.103/36039\r\nUsingPassword: 0\r\nSessionTV: 2024-07-01T07:45:38.656+0000\r\n"'
Asterisk_Tests_AMI_EMU(55)@2c36661cae0d: AMI remain buf: '""'
Asterisk_Tests_LOCAL_SIP_EMU(56)@2c36661cae0d: Warning: The maximum number of open file descriptors (100000) is greater than FD_SETSIZE (1024). Ensure that Test Ports using Install_Handler do not try to wait for events of file descriptors with values greater than FD_SETSIZE (1024). (Current caller of Install_Handler is "SIP")
Asterisk_Tests_IMS_SIP_EMU(57)@2c36661cae0d: Warning: The maximum number of open file descriptors (100000) is greater than FD_SETSIZE (1024). Ensure that Test Ports using Install_Handler do not try to wait for events of file descriptors with values greater than FD_SETSIZE (1024). (Current caller of Install_Handler is "SIP")
MTC@2c36661cae0d: end of f_init
Asterisk_Tests_IMS_SIP_EMU(57)@2c36661cae0d: Created SipExpect[0] for { scheme := "sip", userInfo := { userOrTelephoneSubscriber := "238010000090828", password := omit }, hostPort := { host := "ims.mnc001.mcc238.3gppnetwork.org", portField := omit }, urlParameters := omit, headers := omit } to be handled at TC_ims_reregistration-IMS_ConnHdlr-238010000090828(58)
Asterisk_Tests_AMI_EMU(55)@2c36661cae0d: AMI rx: '"Response: Success\r\nActionID: 4C6540565AE2D963\r\nMessage: Access Network Info set\r\n\r\n"'
Asterisk_Tests_AMI_EMU(55)@2c36661cae0d: AMI buf: '"Response: Success\r\nActionID: 4C6540565AE2D963\r\nMessage: Access Network Info set\r\n\r\n"'
Asterisk_Tests_AMI_EMU(55)@2c36661cae0d: AMI split: { "Response: Success\r\nActionID: 4C6540565AE2D963\r\nMessage: Access Network Info set" }
Asterisk_Tests_AMI_EMU(55)@2c36661cae0d: AMI dec: '"Response: Success\r\nActionID: 4C6540565AE2D963\r\nMessage: Access Network Info set\r\n"'
Asterisk_Tests_AMI_EMU(55)@2c36661cae0d: AMI patched dec: '"Response: Success\r\nActionID: 4C6540565AE2D963\r\nMessage: Access Network Info set\r\n"'
Asterisk_Tests_AMI_EMU(55)@2c36661cae0d: AMI remain buf: '""'
Asterisk_Tests_AMI_EMU(55)@2c36661cae0d: AMI rx: '"Response: Success\r\nActionID: B2B9A8502FF4707F\r\nMessage: Reregistration sent\r\n\r\n"'
Asterisk_Tests_AMI_EMU(55)@2c36661cae0d: AMI buf: '"Response: Success\r\nActionID: B2B9A8502FF4707F\r\nMessage: Reregistration sent\r\n\r\n"'
Asterisk_Tests_AMI_EMU(55)@2c36661cae0d: AMI split: { "Response: Success\r\nActionID: B2B9A8502FF4707F\r\nMessage: Reregistration sent" }
Asterisk_Tests_AMI_EMU(55)@2c36661cae0d: AMI dec: '"Response: Success\r\nActionID: B2B9A8502FF4707F\r\nMessage: Reregistration sent\r\n"'
Asterisk_Tests_AMI_EMU(55)@2c36661cae0d: AMI patched dec: '"Response: Success\r\nActionID: B2B9A8502FF4707F\r\nMessage: Reregistration sent\r\n"'
Asterisk_Tests_AMI_EMU(55)@2c36661cae0d: AMI remain buf: '""'
Asterisk_Tests_IMS_SIP_EMU(57)@2c36661cae0d: Found SipExpect[0] for { scheme := "sip", userInfo := { userOrTelephoneSubscriber := "238010000090828", password := omit }, hostPort := { host := "ims.mnc001.mcc238.3gppnetwork.org", portField := omit }, urlParameters := omit, headers := omit } handled at TC_ims_reregistration-IMS_ConnHdlr-238010000090828(58)
Asterisk_Tests_IMS_SIP_EMU(57)@2c36661cae0d: Added SIP Call Table entry [0] for "7225aeda-6282-4837-b588-f5425e9c21b9" at TC_ims_reregistration-IMS_ConnHdlr-238010000090828(58)
TC_ims_reregistration-IMS_ConnHdlr-238010000090828(58)@2c36661cae0d: Skipping Security Mechansim Algo: "hmac-md5-96"
TC_ims_reregistration-IMS_ConnHdlr-238010000090828(58)@2c36661cae0d: ipsec: remote_spi_c=1005124446 remote_spi_s=769638969local_spi_c=4142 local_spi_s=4143
TC_ims_reregistration-IMS_ConnHdlr-238010000090828(58)@2c36661cae0d: Executing: "/osmo-ttcn3-hacks/asterisk/IMS_ipsec_setup.sh 172.18.69.104 5060 4142 5060 4143 172.18.69.10 5556 1005124446 5066 769638969 0x17141862125bd30c81c4224391a0909a00000000"
TC_ims_reregistration-IMS_ConnHdlr-238010000090828(58)@2c36661cae0d: Result: { stdout := "", stderr := "+ ip xfrm policy flush\n+ ip xfrm state flush\n+ ip_xfrm_state 172.18.69.104 5060 172.18.69.10 5556 1005124446\n+ ip xfrm state add src 172.18.69.104 dst 172.18.69.10 proto esp spi 1005124446 reqid 1005124446 mode transport replay-window 32 auth-trunc sha1 0x17141862125bd30c81c4224391a0909a00000000 96 enc cipher_null  sel src 172.18.69.104/32 dst 172.18.69.10/32 sport 5060 dport 5556\n+ ip_xfrm_state 172.18.69.104 5060 172.18.69.10 5066 769638969\n+ ip xfrm state add src 172.18.69.104 dst 172.18.69.10 proto esp spi 769638969 reqid 769638969 mode transport replay-window 32 auth-trunc sha1 0x17141862125bd30c81c4224391a0909a00000000 96 enc cipher_null  sel src 172.18.69.104/32 dst 172.18.69.10/32 sport 5060 dport 5066\n+ ip_xfrm_state 172.18.69.10 5556 172.18.69.104 5060 4143\n+ ip xfrm state add src 172.18.69.10 dst 172.18.69.104 proto esp spi 4143 reqid 4143 mode transport replay-window 32 auth-trunc sha1 0x17141862125bd30c81c4224391a0909a00000000 96 enc cipher_null  sel src 172.18.69.10/32 dst 172.18.69.104/32 sport 5556 dport 5060\n+ ip_xfrm_state 172.18.69.10 5066 172.18.69.104 5060 4142\n+ ip xfrm state add src 172.18.69.10 dst 172.18.69.104 proto esp spi 4142 reqid 4142 mode transport replay-window 32 auth-trunc sha1 0x17141862125bd30c81c4224391a0909a00000000 96 enc cipher_null  sel src 172.18.69.10/32 dst 172.18.69.104/32 sport 5066 dport 5060\n+ ip_xfrm_policy 172.18.69.104 5060 172.18.69.10 5556 1005124446 out\n+ ip xfrm policy add src 172.18.69.104/32 dst 172.18.69.10/32 sport 5060 dport 5556 dir out tmpl src 172.18.69.104 dst 172.18.69.10 proto esp reqid 1005124446 mode transport\n+ ip_xfrm_policy 172.18.69.104 5060 172.18.69.10 5066 769638969 out\n+ ip xfrm policy add src 172.18.69.104/32 dst 172.18.69.10/32 sport 5060 dport 5066 dir out tmpl src 172.18.69.104 dst 172.18.69.10 proto esp reqid 769638969 mode transport\n+ ip_xfrm_policy 172.18.69.10 5556 172.18.69.104 5060 4143 in\n+ ip xfrm policy add src 172.18.69.10/32 dst 172.18.69.104/32 sport 5556 dport 5060 dir in tmpl src 172.18.69.10 dst 172.18.69.104 proto esp reqid 4143 mode transport\n+ ip_xfrm_policy 172.18.69.10 5066 172.18.69.104 5060 4142 in\n+ ip xfrm policy add src 172.18.69.10/32 dst 172.18.69.104/32 sport 5066 dport 5060 dir in tmpl src 172.18.69.10 dst 172.18.69.104 proto esp reqid 4142 mode transport", code := 0 }
TC_ims_reregistration-IMS_ConnHdlr-238010000090828(58)@2c36661cae0d: rand='D5D5DE2BCE418D7865ED7FA6956618A2'O & autn='D42E61DB5F15800067393A5B7691A227'O => nonce="1dXeK85BjXhl7X+mlWYYotQuYdtfFYAAZzk6W3aRoic="
Asterisk_Tests_AMI_EMU(55)@2c36661cae0d: AMI rx: '"Event: AuthRequest\r\nPrivilege: <none>\r\nRegistration: volte_ims\r\nAlgorithm: AKAv1-MD5\r\nRAND: d5d5de2bce418d7865ed7fa6956618a2\r\nAUTN: d42e61db5f15800067393a5b7691a227\r\n\r\n"'
Asterisk_Tests_AMI_EMU(55)@2c36661cae0d: AMI buf: '"Event: AuthRequest\r\nPrivilege: <none>\r\nRegistration: volte_ims\r\nAlgorithm: AKAv1-MD5\r\nRAND: d5d5de2bce418d7865ed7fa6956618a2\r\nAUTN: d42e61db5f15800067393a5b7691a227\r\n\r\n"'
Asterisk_Tests_AMI_EMU(55)@2c36661cae0d: AMI split: { "Event: AuthRequest\r\nPrivilege: <none>\r\nRegistration: volte_ims\r\nAlgorithm: AKAv1-MD5\r\nRAND: d5d5de2bce418d7865ed7fa6956618a2\r\nAUTN: d42e61db5f15800067393a5b7691a227" }
Asterisk_Tests_AMI_EMU(55)@2c36661cae0d: AMI dec: '"Event: AuthRequest\r\nPrivilege: <none>\r\nRegistration: volte_ims\r\nAlgorithm: AKAv1-MD5\r\nRAND: d5d5de2bce418d7865ed7fa6956618a2\r\nAUTN: d42e61db5f15800067393a5b7691a227\r\n"'
Asterisk_Tests_AMI_EMU(55)@2c36661cae0d: AMI patched dec: '"Event: AuthRequest\r\nPrivilege: <none>\r\nRegistration: volte_ims\r\nAlgorithm: AKAv1-MD5\r\nRAND: d5d5de2bce418d7865ed7fa6956618a2\r\nAUTN: d42e61db5f15800067393a5b7691a227\r\n"'
Asterisk_Tests_AMI_EMU(55)@2c36661cae0d: AMI remain buf: '""'
Asterisk_Tests_AMI_EMU(55)@2c36661cae0d: AMI rx: '"Response: Success\r\nActionID: 6B78ABFC16196C2C\r\nMessage: AuthResponse sent\r\n\r\n"'
Asterisk_Tests_AMI_EMU(55)@2c36661cae0d: AMI buf: '"Response: Success\r\nActionID: 6B78ABFC16196C2C\r\nMessage: AuthResponse sent\r\n\r\n"'
Asterisk_Tests_AMI_EMU(55)@2c36661cae0d: AMI split: { "Response: Success\r\nActionID: 6B78ABFC16196C2C\r\nMessage: AuthResponse sent" }
Asterisk_Tests_AMI_EMU(55)@2c36661cae0d: AMI dec: '"Response: Success\r\nActionID: 6B78ABFC16196C2C\r\nMessage: AuthResponse sent\r\n"'
Asterisk_Tests_AMI_EMU(55)@2c36661cae0d: AMI patched dec: '"Response: Success\r\nActionID: 6B78ABFC16196C2C\r\nMessage: AuthResponse sent\r\n"'
Asterisk_Tests_AMI_EMU(55)@2c36661cae0d: AMI remain buf: '""'
Asterisk_Tests_AMI_EMU(55)@2c36661cae0d: AMI rx: '"Event: Registry\r\nPrivilege: system,all\r\nChannelType: PJSIP\r\nUsername: sip:238010000090828@ims.mnc001.mcc238.3gppnetwork.org\r\nDomain: sip:ims.mnc001.mcc238.3gppnetwork.org\r\nStatus: Rejected\r\n\r\n"'
Asterisk_Tests_AMI_EMU(55)@2c36661cae0d: AMI buf: '"Event: Registry\r\nPrivilege: system,all\r\nChannelType: PJSIP\r\nUsername: sip:238010000090828@ims.mnc001.mcc238.3gppnetwork.org\r\nDomain: sip:ims.mnc001.mcc238.3gppnetwork.org\r\nStatus: Rejected\r\n\r\n"'
Asterisk_Tests_AMI_EMU(55)@2c36661cae0d: AMI split: { "Event: Registry\r\nPrivilege: system,all\r\nChannelType: PJSIP\r\nUsername: sip:238010000090828@ims.mnc001.mcc238.3gppnetwork.org\r\nDomain: sip:ims.mnc001.mcc238.3gppnetwork.org\r\nStatus: Rejected" }
Asterisk_Tests_AMI_EMU(55)@2c36661cae0d: AMI dec: '"Event: Registry\r\nPrivilege: system,all\r\nChannelType: PJSIP\r\nUsername: sip:238010000090828@ims.mnc001.mcc238.3gppnetwork.org\r\nDomain: sip:ims.mnc001.mcc238.3gppnetwork.org\r\nStatus: Rejected\r\n"'
Asterisk_Tests_AMI_EMU(55)@2c36661cae0d: AMI patched dec: '"Event: Registry\r\nPrivilege: system,all\r\nChannelType: PJSIP\r\nUsername: sip:238010000090828@ims.mnc001.mcc238.3gppnetwork.org\r\nDomain: sip:ims.mnc001.mcc238.3gppnetwork.org\r\nStatus: Rejected\r\n"'
Asterisk_Tests_AMI_EMU(55)@2c36661cae0d: AMI remain buf: '""'
MTC@2c36661cae0d: Dynamic test case error: Stand-alone receive statement failed in file Asterisk_Tests.ttcn between lines 409 and 411.
MTC@2c36661cae0d: setverdict(error): none -> error
Asterisk_Tests_IMS_SIP_EMU(57)@2c36661cae0d: Final verdict of PTC: none
Asterisk_Tests_LOCAL_SIP_EMU(56)@2c36661cae0d: Final verdict of PTC: none
Asterisk_Tests_AMI_EMU(55)@2c36661cae0d: Final verdict of PTC: none
TC_ims_reregistration-IMS_ConnHdlr-238010000090828(58)@2c36661cae0d: Final verdict of PTC: none
MTC@2c36661cae0d: Setting final verdict of the test case.
MTC@2c36661cae0d: Local verdict of MTC: error
MTC@2c36661cae0d: Local verdict of PTC Asterisk_Tests_AMI_EMU(55): none (error -> error)
MTC@2c36661cae0d: Local verdict of PTC Asterisk_Tests_LOCAL_SIP_EMU(56): none (error -> error)
MTC@2c36661cae0d: Local verdict of PTC Asterisk_Tests_IMS_SIP_EMU(57): none (error -> error)
MTC@2c36661cae0d: Local verdict of PTC TC_ims_reregistration-IMS_ConnHdlr-238010000090828(58): none (error -> error)
MTC@2c36661cae0d: Test case TC_ims_reregistration finished. Verdict: error
MTC@2c36661cae0d: Starting external command `../ttcn3-tcpdump-stop.sh Asterisk_Tests.TC_ims_reregistration error'.
Mon Jul  1 07:45:49 UTC 2024
------ Asterisk_Tests.TC_ims_reregistration error ------

Waiting for packet dumper to finish... 0 (prev_count=-1, count=4161)
Waiting for packet dumper to finish... 1 (prev_count=4161, count=9119)
MTC@2c36661cae0d: External command `../ttcn3-tcpdump-stop.sh Asterisk_Tests.TC_ims_reregistration error' was executed successfully (exit status: 0).
MTC@2c36661cae0d: Starting external command `../ttcn3-tcpdump-start.sh Asterisk_Tests.TC_ims_call_mo'.
------ Asterisk_Tests.TC_ims_call_mo ------
Mon Jul  1 07:45:51 UTC 2024
NOTE: unable to use dumpcap due to missing permissions in /data
 /usr/bin/tcpdump -U -s 1520 -n -i any -w "/data/Asterisk_Tests.TC_ims_call_mo.pcap" >/data/Asterisk_Tests.TC_ims_call_mo.pcap.stdout 2>/tmp/cmderr &
Waiting for packet dumper to start... 0
MTC@2c36661cae0d: External command `../ttcn3-tcpdump-start.sh Asterisk_Tests.TC_ims_call_mo' was executed successfully (exit status: 0).
MTC@2c36661cae0d: Test case TC_ims_call_mo started.
Asterisk_Tests_AMI_EMU(59)@2c36661cae0d: AMI connected, ConnId=1
Asterisk_Tests_AMI_EMU(59)@2c36661cae0d: Warning: There is no GetMsgLen function registered for connId: 1. The messages will not be dissected on this connection! This warning is logged only once per testport.
Asterisk_Tests_AMI_EMU(59)@2c36661cae0d: AMI Welcome message received: '"Asterisk Call Manager/9.0.0\r\n"'
Asterisk_Tests_AMI_EMU(59)@2c36661cae0d: AMI rx: '"Response: Success\r\nActionID: 5D808586E171ACDA\r\nMessage: Authentication accepted\r\n\r\nEvent: FullyBooted\r\nPrivilege: system,all\r\nUptime: 303\r\nLastReload: 303\r\nStatus: Fully Booted\r\n\r\n"'
Asterisk_Tests_AMI_EMU(59)@2c36661cae0d: AMI buf: '"Response: Success\r\nActionID: 5D808586E171ACDA\r\nMessage: Authentication accepted\r\n\r\nEvent: FullyBooted\r\nPrivilege: system,all\r\nUptime: 303\r\nLastReload: 303\r\nStatus: Fully Booted\r\n\r\n"'
Asterisk_Tests_AMI_EMU(59)@2c36661cae0d: AMI split: { "Response: Success\r\nActionID: 5D808586E171ACDA\r\nMessage: Authentication accepted", "Event: FullyBooted\r\nPrivilege: system,all\r\nUptime: 303\r\nLastReload: 303\r\nStatus: Fully Booted" }
Asterisk_Tests_AMI_EMU(59)@2c36661cae0d: AMI dec: '"Response: Success\r\nActionID: 5D808586E171ACDA\r\nMessage: Authentication accepted\r\n"'
Asterisk_Tests_AMI_EMU(59)@2c36661cae0d: AMI patched dec: '"Response: Success\r\nActionID: 5D808586E171ACDA\r\nMessage: Authentication accepted\r\n"'
Asterisk_Tests_AMI_EMU(59)@2c36661cae0d: AMI dec: '"Event: FullyBooted\r\nPrivilege: system,all\r\nUptime: 303\r\nLastReload: 303\r\nStatus: Fully Booted\r\n"'
Asterisk_Tests_AMI_EMU(59)@2c36661cae0d: AMI patched dec: '"Event: FullyBooted\r\nPrivilege: system,all\r\nUptime: 303\r\nLastReload: 303\r\nStatus: Fully Booted\r\n"'
Asterisk_Tests_AMI_EMU(59)@2c36661cae0d: AMI remain buf: '""'
Asterisk_Tests_AMI_EMU(59)@2c36661cae0d: AMI rx: '"Event: SuccessfulAuth\r\nPrivilege: security,all\r\nEventTV: 2024-07-01T07:45:52.773+0000\r\nSeverity: Informational\r\nService: AMI\r\nEventVersion: 1\r\nAccountID: test_user\r\nSessionID: 0x7f2478001090\r\nLocalAddress: IPV4/TCP/172.18.69.10/5038\r\nRemoteAddress: IPV4/TCP/172.18.69.103/38133\r\nUsingPassword: 0\r\nSessionTV: 2024-07-01T07:45:52.773+0000\r\n\r\n"'
Asterisk_Tests_AMI_EMU(59)@2c36661cae0d: AMI buf: '"Event: SuccessfulAuth\r\nPrivilege: security,all\r\nEventTV: 2024-07-01T07:45:52.773+0000\r\nSeverity: Informational\r\nService: AMI\r\nEventVersion: 1\r\nAccountID: test_user\r\nSessionID: 0x7f2478001090\r\nLocalAddress: IPV4/TCP/172.18.69.10/5038\r\nRemoteAddress: IPV4/TCP/172.18.69.103/38133\r\nUsingPassword: 0\r\nSessionTV: 2024-07-01T07:45:52.773+0000\r\n\r\n"'
Asterisk_Tests_AMI_EMU(59)@2c36661cae0d: AMI split: { "Event: SuccessfulAuth\r\nPrivilege: security,all\r\nEventTV: 2024-07-01T07:45:52.773+0000\r\nSeverity: Informational\r\nService: AMI\r\nEventVersion: 1\r\nAccountID: test_user\r\nSessionID: 0x7f2478001090\r\nLocalAddress: IPV4/TCP/172.18.69.10/5038\r\nRemoteAddress: IPV4/TCP/172.18.69.103/38133\r\nUsingPassword: 0\r\nSessionTV: 2024-07-01T07:45:52.773+0000" }
Asterisk_Tests_AMI_EMU(59)@2c36661cae0d: AMI dec: '"Event: SuccessfulAuth\r\nPrivilege: security,all\r\nEventTV: 2024-07-01T07:45:52.773+0000\r\nSeverity: Informational\r\nService: AMI\r\nEventVersion: 1\r\nAccountID: test_user\r\nSessionID: 0x7f2478001090\r\nLocalAddress: IPV4/TCP/172.18.69.10/5038\r\nRemoteAddress: IPV4/TCP/172.18.69.103/38133\r\nUsingPassword: 0\r\nSessionTV: 2024-07-01T07:45:52.773+0000\r\n"'
Asterisk_Tests_AMI_EMU(59)@2c36661cae0d: AMI patched dec: '"Event: SuccessfulAuth\r\nPrivilege: security,all\r\nEventTV: 2024-07-01T07:45:52.773+0000\r\nSeverity: Informational\r\nService: AMI\r\nEventVersion: 1\r\nAccountID: test_user\r\nSessionID: 0x7f2478001090\r\nLocalAddress: IPV4/TCP/172.18.69.10/5038\r\nRemoteAddress: IPV4/TCP/172.18.69.103/38133\r\nUsingPassword: 0\r\nSessionTV: 2024-07-01T07:45:52.773+0000\r\n"'
Asterisk_Tests_AMI_EMU(59)@2c36661cae0d: AMI remain buf: '""'
Asterisk_Tests_LOCAL_SIP_EMU(60)@2c36661cae0d: Warning: The maximum number of open file descriptors (100000) is greater than FD_SETSIZE (1024). Ensure that Test Ports using Install_Handler do not try to wait for events of file descriptors with values greater than FD_SETSIZE (1024). (Current caller of Install_Handler is "SIP")
Asterisk_Tests_IMS_SIP_EMU(61)@2c36661cae0d: Warning: The maximum number of open file descriptors (100000) is greater than FD_SETSIZE (1024). Ensure that Test Ports using Install_Handler do not try to wait for events of file descriptors with values greater than FD_SETSIZE (1024). (Current caller of Install_Handler is "SIP")
MTC@2c36661cae0d: end of f_init
Asterisk_Tests_IMS_SIP_EMU(61)@2c36661cae0d: Created SipExpect[0] for { scheme := "sip", userInfo := { userOrTelephoneSubscriber := "238010000090828", password := omit }, hostPort := { host := "ims.mnc001.mcc238.3gppnetwork.org", portField := omit }, urlParameters := omit, headers := omit } to be handled at TC_ims_call_mo-IMS_ConnHdlr-238010000090828(62)
Asterisk_Tests_IMS_SIP_EMU(61)@2c36661cae0d: Created SipExpect[1] for { scheme := "sip", userInfo := { userOrTelephoneSubscriber := "90829", password := omit }, hostPort := { host := "ims.mnc001.mcc238.3gppnetwork.org", portField := omit }, urlParameters := omit, headers := omit } to be handled at TC_ims_call_mo-IMS_ConnHdlr-238010000090828(62)
Asterisk_Tests_LOCAL_SIP_EMU(60)@2c36661cae0d: Added SIP Call Table entry [0] for "E778A2632910DB1@172.18.69.103" at TC_ims_call_mo-ConnHdlr-0501(63)
Asterisk_Tests_AMI_EMU(59)@2c36661cae0d: AMI rx: '"Event: ChallengeSent\r\nPrivilege: security,all\r\nEventTV: 2024-07-01T07:45:52.803+0000\r\nSeverity: Informational\r\nService: PJSIP\r\nEventVersion: 1\r\nAccountID: 0501\r\nSessionID: E778A2632910DB1@172.18.69.103\r\nLocalAddress: IPV4/UDP/172.18.69.10/5094\r\nRemoteAddress: IPV4/UDP/172.18.69.103/5061\r\nChallenge: \r\n\r\n"'
Asterisk_Tests_AMI_EMU(59)@2c36661cae0d: AMI buf: '"Event: ChallengeSent\r\nPrivilege: security,all\r\nEventTV: 2024-07-01T07:45:52.803+0000\r\nSeverity: Informational\r\nService: PJSIP\r\nEventVersion: 1\r\nAccountID: 0501\r\nSessionID: E778A2632910DB1@172.18.69.103\r\nLocalAddress: IPV4/UDP/172.18.69.10/5094\r\nRemoteAddress: IPV4/UDP/172.18.69.103/5061\r\nChallenge: \r\n\r\n"'
Asterisk_Tests_AMI_EMU(59)@2c36661cae0d: AMI split: { "Event: ChallengeSent\r\nPrivilege: security,all\r\nEventTV: 2024-07-01T07:45:52.803+0000\r\nSeverity: Informational\r\nService: PJSIP\r\nEventVersion: 1\r\nAccountID: 0501\r\nSessionID: E778A2632910DB1@172.18.69.103\r\nLocalAddress: IPV4/UDP/172.18.69.10/5094\r\nRemoteAddress: IPV4/UDP/172.18.69.103/5061\r\nChallenge: " }
Asterisk_Tests_AMI_EMU(59)@2c36661cae0d: AMI dec: '"Event: ChallengeSent\r\nPrivilege: security,all\r\nEventTV: 2024-07-01T07:45:52.803+0000\r\nSeverity: Informational\r\nService: PJSIP\r\nEventVersion: 1\r\nAccountID: 0501\r\nSessionID: E778A2632910DB1@172.18.69.103\r\nLocalAddress: IPV4/UDP/172.18.69.10/5094\r\nRemoteAddress: IPV4/UDP/172.18.69.103/5061\r\nChallenge: \r\n"'
Asterisk_Tests_AMI_EMU(59)@2c36661cae0d: AMI patched dec: '"Event: ChallengeSent\r\nPrivilege: security,all\r\nEventTV: 2024-07-01T07:45:52.803+0000\r\nSeverity: Informational\r\nService: PJSIP\r\nEventVersion: 1\r\nAccountID: 0501\r\nSessionID: E778A2632910DB1@172.18.69.103\r\nLocalAddress: IPV4/UDP/172.18.69.10/5094\r\nRemoteAddress: IPV4/UDP/172.18.69.103/5061\r\n"'
TC_ims_call_mo-ConnHdlr-0501(63)@2c36661cae0d: A1: md5("0501:asterisk:secret") = "a34a6b1c4db97fc1991e36119c482192"
TC_ims_call_mo-ConnHdlr-0501(63)@2c36661cae0d: A2: md5("REGISTER:sip:172.18.69.10") = "040f3459c8765eb0deb3b33d81871014"
TC_ims_call_mo-ConnHdlr-0501(63)@2c36661cae0d: "Request-Digest: md5(\"a34a6b1c4db97fc1991e36119c482192:1719819952/ce0bed87cc650c190d3d425177d795ee:00000001:0a4f113b:auth:040f3459c8765eb0deb3b33d81871014\") = \"2e908880bdfa9cacb6e2d2210bfb8113\""
Asterisk_Tests_AMI_EMU(59)@2c36661cae0d: AMI remain buf: '""'
Asterisk_Tests_AMI_EMU(59)@2c36661cae0d: AMI rx: '"Event: SuccessfulAuth\r\nPrivilege: security,all\r\nEventTV: 2024-07-01T07:45:52.807+0000\r\nSeverity: Informational\r\nService: PJSIP\r\nEventVersion: 1\r\nAccountID: 0501\r\nSessionID: E778A2632910DB1@172.18.69.103\r\nLocalAddress: IPV4/UDP/172.18.69.10/5094\r\nRemoteAddress: IPV4/UDP/172.18.69.103/5061\r\nUsingPassword: 1\r\n\r\n"'
Asterisk_Tests_AMI_EMU(59)@2c36661cae0d: AMI buf: '"Event: SuccessfulAuth\r\nPrivilege: security,all\r\nEventTV: 2024-07-01T07:45:52.807+0000\r\nSeverity: Informational\r\nService: PJSIP\r\nEventVersion: 1\r\nAccountID: 0501\r\nSessionID: E778A2632910DB1@172.18.69.103\r\nLocalAddress: IPV4/UDP/172.18.69.10/5094\r\nRemoteAddress: IPV4/UDP/172.18.69.103/5061\r\nUsingPassword: 1\r\n\r\n"'
Asterisk_Tests_AMI_EMU(59)@2c36661cae0d: AMI split: { "Event: SuccessfulAuth\r\nPrivilege: security,all\r\nEventTV: 2024-07-01T07:45:52.807+0000\r\nSeverity: Informational\r\nService: PJSIP\r\nEventVersion: 1\r\nAccountID: 0501\r\nSessionID: E778A2632910DB1@172.18.69.103\r\nLocalAddress: IPV4/UDP/172.18.69.10/5094\r\nRemoteAddress: IPV4/UDP/172.18.69.103/5061\r\nUsingPassword: 1" }
Asterisk_Tests_AMI_EMU(59)@2c36661cae0d: AMI dec: '"Event: SuccessfulAuth\r\nPrivilege: security,all\r\nEventTV: 2024-07-01T07:45:52.807+0000\r\nSeverity: Informational\r\nService: PJSIP\r\nEventVersion: 1\r\nAccountID: 0501\r\nSessionID: E778A2632910DB1@172.18.69.103\r\nLocalAddress: IPV4/UDP/172.18.69.10/5094\r\nRemoteAddress: IPV4/UDP/172.18.69.103/5061\r\nUsingPassword: 1\r\n"'
Asterisk_Tests_AMI_EMU(59)@2c36661cae0d: AMI patched dec: '"Event: SuccessfulAuth\r\nPrivilege: security,all\r\nEventTV: 2024-07-01T07:45:52.807+0000\r\nSeverity: Informational\r\nService: PJSIP\r\nEventVersion: 1\r\nAccountID: 0501\r\nSessionID: E778A2632910DB1@172.18.69.103\r\nLocalAddress: IPV4/UDP/172.18.69.10/5094\r\nRemoteAddress: IPV4/UDP/172.18.69.103/5061\r\nUsingPassword: 1\r\n"'
Asterisk_Tests_AMI_EMU(59)@2c36661cae0d: AMI remain buf: '""'
Asterisk_Tests_AMI_EMU(59)@2c36661cae0d: AMI rx: '"Event: PeerStatus\r\nPrivilege: system,all\r\nChannelType: PJSIP\r\nPeer: PJSIP/0501\r\nPeerStatus: Reachable\r\n\r\n"'
Asterisk_Tests_AMI_EMU(59)@2c36661cae0d: AMI buf: '"Event: PeerStatus\r\nPrivilege: system,all\r\nChannelType: PJSIP\r\nPeer: PJSIP/0501\r\nPeerStatus: Reachable\r\n\r\n"'
Asterisk_Tests_AMI_EMU(59)@2c36661cae0d: AMI split: { "Event: PeerStatus\r\nPrivilege: system,all\r\nChannelType: PJSIP\r\nPeer: PJSIP/0501\r\nPeerStatus: Reachable" }
Asterisk_Tests_AMI_EMU(59)@2c36661cae0d: AMI dec: '"Event: PeerStatus\r\nPrivilege: system,all\r\nChannelType: PJSIP\r\nPeer: PJSIP/0501\r\nPeerStatus: Reachable\r\n"'
Asterisk_Tests_AMI_EMU(59)@2c36661cae0d: AMI patched dec: '"Event: PeerStatus\r\nPrivilege: system,all\r\nChannelType: PJSIP\r\nPeer: PJSIP/0501\r\nPeerStatus: Reachable\r\n"'
Asterisk_Tests_AMI_EMU(59)@2c36661cae0d: AMI remain buf: '""'
Asterisk_Tests_AMI_EMU(59)@2c36661cae0d: AMI rx: '"Event: ContactStatus\r\nPrivilege: system,all\r\nURI: sip:0501@172.18.69.103:5061\r\nContactStatus: NonQualified\r\nAOR: 0501\r\nEndpointName: 0501\r\nRoundtripUsec: 0\r\n\r\nEvent: DeviceStateChange\r\nPrivilege: call,all\r\nDevice: PJSIP/0501\r\nState: NOT_INUSE\r\n\r\n"'
Asterisk_Tests_AMI_EMU(59)@2c36661cae0d: AMI buf: '"Event: ContactStatus\r\nPrivilege: system,all\r\nURI: sip:0501@172.18.69.103:5061\r\nContactStatus: NonQualified\r\nAOR: 0501\r\nEndpointName: 0501\r\nRoundtripUsec: 0\r\n\r\nEvent: DeviceStateChange\r\nPrivilege: call,all\r\nDevice: PJSIP/0501\r\nState: NOT_INUSE\r\n\r\n"'
Asterisk_Tests_AMI_EMU(59)@2c36661cae0d: AMI split: { "Event: ContactStatus\r\nPrivilege: system,all\r\nURI: sip:0501@172.18.69.103:5061\r\nContactStatus: NonQualified\r\nAOR: 0501\r\nEndpointName: 0501\r\nRoundtripUsec: 0", "Event: DeviceStateChange\r\nPrivilege: call,all\r\nDevice: PJSIP/0501\r\nState: NOT_INUSE" }
Asterisk_Tests_AMI_EMU(59)@2c36661cae0d: AMI dec: '"Event: ContactStatus\r\nPrivilege: system,all\r\nURI: sip:0501@172.18.69.103:5061\r\nContactStatus: NonQualified\r\nAOR: 0501\r\nEndpointName: 0501\r\nRoundtripUsec: 0\r\n"'
Asterisk_Tests_AMI_EMU(59)@2c36661cae0d: AMI patched dec: '"Event: ContactStatus\r\nPrivilege: system,all\r\nURI: sip:0501@172.18.69.103:5061\r\nContactStatus: NonQualified\r\nAOR: 0501\r\nEndpointName: 0501\r\nRoundtripUsec: 0\r\n"'
Asterisk_Tests_AMI_EMU(59)@2c36661cae0d: AMI dec: '"Event: DeviceStateChange\r\nPrivilege: call,all\r\nDevice: PJSIP/0501\r\nState: NOT_INUSE\r\n"'
Asterisk_Tests_AMI_EMU(59)@2c36661cae0d: AMI patched dec: '"Event: DeviceStateChange\r\nPrivilege: call,all\r\nDevice: PJSIP/0501\r\nState: NOT_INUSE\r\n"'
Asterisk_Tests_AMI_EMU(59)@2c36661cae0d: AMI remain buf: '""'
Asterisk_Tests_AMI_EMU(59)@2c36661cae0d: AMI rx: '"Response: Success\r\nActionID: 69B390BE4571DB93\r\nMessage: Access Network Info set\r\n\r\n"'
Asterisk_Tests_AMI_EMU(59)@2c36661cae0d: AMI buf: '"Response: Success\r\nActionID: 69B390BE4571DB93\r\nMessage: Access Network Info set\r\n\r\n"'
Asterisk_Tests_AMI_EMU(59)@2c36661cae0d: AMI split: { "Response: Success\r\nActionID: 69B390BE4571DB93\r\nMessage: Access Network Info set" }
Asterisk_Tests_AMI_EMU(59)@2c36661cae0d: AMI dec: '"Response: Success\r\nActionID: 69B390BE4571DB93\r\nMessage: Access Network Info set\r\n"'
Asterisk_Tests_AMI_EMU(59)@2c36661cae0d: AMI patched dec: '"Response: Success\r\nActionID: 69B390BE4571DB93\r\nMessage: Access Network Info set\r\n"'
Asterisk_Tests_AMI_EMU(59)@2c36661cae0d: AMI remain buf: '""'
Asterisk_Tests_AMI_EMU(59)@2c36661cae0d: AMI rx: '"Response: Success\r\nActionID: 2982335DD03BF084\r\nMessage: Reregistration sent\r\n\r\n"'
Asterisk_Tests_AMI_EMU(59)@2c36661cae0d: AMI buf: '"Response: Success\r\nActionID: 2982335DD03BF084\r\nMessage: Reregistration sent\r\n\r\n"'
Asterisk_Tests_AMI_EMU(59)@2c36661cae0d: AMI split: { "Response: Success\r\nActionID: 2982335DD03BF084\r\nMessage: Reregistration sent" }
Asterisk_Tests_AMI_EMU(59)@2c36661cae0d: AMI dec: '"Response: Success\r\nActionID: 2982335DD03BF084\r\nMessage: Reregistration sent\r\n"'
Asterisk_Tests_AMI_EMU(59)@2c36661cae0d: AMI patched dec: '"Response: Success\r\nActionID: 2982335DD03BF084\r\nMessage: Reregistration sent\r\n"'
Asterisk_Tests_AMI_EMU(59)@2c36661cae0d: AMI remain buf: '""'
Asterisk_Tests_IMS_SIP_EMU(61)@2c36661cae0d: Found SipExpect[0] for { scheme := "sip", userInfo := { userOrTelephoneSubscriber := "238010000090828", password := omit }, hostPort := { host := "ims.mnc001.mcc238.3gppnetwork.org", portField := omit }, urlParameters := omit, headers := omit } handled at TC_ims_call_mo-IMS_ConnHdlr-238010000090828(62)
Asterisk_Tests_IMS_SIP_EMU(61)@2c36661cae0d: Added SIP Call Table entry [0] for "7225aeda-6282-4837-b588-f5425e9c21b9" at TC_ims_call_mo-IMS_ConnHdlr-238010000090828(62)
TC_ims_call_mo-IMS_ConnHdlr-238010000090828(62)@2c36661cae0d: Skipping Security Mechansim Algo: "hmac-md5-96"
TC_ims_call_mo-IMS_ConnHdlr-238010000090828(62)@2c36661cae0d: ipsec: remote_spi_c=3161176300 remote_spi_s=3999572496local_spi_c=4142 local_spi_s=4143
TC_ims_call_mo-IMS_ConnHdlr-238010000090828(62)@2c36661cae0d: Executing: "/osmo-ttcn3-hacks/asterisk/IMS_ipsec_setup.sh 172.18.69.104 5060 4142 5060 4143 172.18.69.10 5557 3161176300 5068 3999572496 0x17141862125bd30c81c4224391a0909a00000000"
TC_ims_call_mo-IMS_ConnHdlr-238010000090828(62)@2c36661cae0d: Result: { stdout := "", stderr := "+ ip xfrm policy flush\n+ ip xfrm state flush\n+ ip_xfrm_state 172.18.69.104 5060 172.18.69.10 5557 3161176300\n+ ip xfrm state add src 172.18.69.104 dst 172.18.69.10 proto esp spi 3161176300 reqid 3161176300 mode transport replay-window 32 auth-trunc sha1 0x17141862125bd30c81c4224391a0909a00000000 96 enc cipher_null  sel src 172.18.69.104/32 dst 172.18.69.10/32 sport 5060 dport 5557\n+ ip_xfrm_state 172.18.69.104 5060 172.18.69.10 5068 3999572496\n+ ip xfrm state add src 172.18.69.104 dst 172.18.69.10 proto esp spi 3999572496 reqid 3999572496 mode transport replay-window 32 auth-trunc sha1 0x17141862125bd30c81c4224391a0909a00000000 96 enc cipher_null  sel src 172.18.69.104/32 dst 172.18.69.10/32 sport 5060 dport 5068\n+ ip_xfrm_state 172.18.69.10 5557 172.18.69.104 5060 4143\n+ ip xfrm state add src 172.18.69.10 dst 172.18.69.104 proto esp spi 4143 reqid 4143 mode transport replay-window 32 auth-trunc sha1 0x17141862125bd30c81c4224391a0909a00000000 96 enc cipher_null  sel src 172.18.69.10/32 dst 172.18.69.104/32 sport 5557 dport 5060\n+ ip_xfrm_state 172.18.69.10 5068 172.18.69.104 5060 4142\n+ ip xfrm state add src 172.18.69.10 dst 172.18.69.104 proto esp spi 4142 reqid 4142 mode transport replay-window 32 auth-trunc sha1 0x17141862125bd30c81c4224391a0909a00000000 96 enc cipher_null  sel src 172.18.69.10/32 dst 172.18.69.104/32 sport 5068 dport 5060\n+ ip_xfrm_policy 172.18.69.104 5060 172.18.69.10 5557 3161176300 out\n+ ip xfrm policy add src 172.18.69.104/32 dst 172.18.69.10/32 sport 5060 dport 5557 dir out tmpl src 172.18.69.104 dst 172.18.69.10 proto esp reqid 3161176300 mode transport\n+ ip_xfrm_policy 172.18.69.104 5060 172.18.69.10 5068 3999572496 out\n+ ip xfrm policy add src 172.18.69.104/32 dst 172.18.69.10/32 sport 5060 dport 5068 dir out tmpl src 172.18.69.104 dst 172.18.69.10 proto esp reqid 3999572496 mode transport\n+ ip_xfrm_policy 172.18.69.10 5557 172.18.69.104 5060 4143 in\n+ ip xfrm policy add src 172.18.69.10/32 dst 172.18.69.104/32 sport 5557 dport 5060 dir in tmpl src 172.18.69.10 dst 172.18.69.104 proto esp reqid 4143 mode transport\n+ ip_xfrm_policy 172.18.69.10 5068 172.18.69.104 5060 4142 in\n+ ip xfrm policy add src 172.18.69.10/32 dst 172.18.69.104/32 sport 5068 dport 5060 dir in tmpl src 172.18.69.10 dst 172.18.69.104 proto esp reqid 4142 mode transport", code := 0 }
TC_ims_call_mo-IMS_ConnHdlr-238010000090828(62)@2c36661cae0d: rand='D5D5DE2BCE418D7865ED7FA6956618A2'O & autn='D42E61DB5F15800067393A5B7691A227'O => nonce="1dXeK85BjXhl7X+mlWYYotQuYdtfFYAAZzk6W3aRoic="
Asterisk_Tests_AMI_EMU(59)@2c36661cae0d: AMI rx: '"Event: AuthRequest\r\nPrivilege: <none>\r\nRegistration: volte_ims\r\nAlgorithm: AKAv1-MD5\r\nRAND: d5d5de2bce418d7865ed7fa6956618a2\r\nAUTN: d42e61db5f15800067393a5b7691a227\r\n\r\n"'
Asterisk_Tests_AMI_EMU(59)@2c36661cae0d: AMI buf: '"Event: AuthRequest\r\nPrivilege: <none>\r\nRegistration: volte_ims\r\nAlgorithm: AKAv1-MD5\r\nRAND: d5d5de2bce418d7865ed7fa6956618a2\r\nAUTN: d42e61db5f15800067393a5b7691a227\r\n\r\n"'
Asterisk_Tests_AMI_EMU(59)@2c36661cae0d: AMI split: { "Event: AuthRequest\r\nPrivilege: <none>\r\nRegistration: volte_ims\r\nAlgorithm: AKAv1-MD5\r\nRAND: d5d5de2bce418d7865ed7fa6956618a2\r\nAUTN: d42e61db5f15800067393a5b7691a227" }
Asterisk_Tests_AMI_EMU(59)@2c36661cae0d: AMI dec: '"Event: AuthRequest\r\nPrivilege: <none>\r\nRegistration: volte_ims\r\nAlgorithm: AKAv1-MD5\r\nRAND: d5d5de2bce418d7865ed7fa6956618a2\r\nAUTN: d42e61db5f15800067393a5b7691a227\r\n"'
Asterisk_Tests_AMI_EMU(59)@2c36661cae0d: AMI patched dec: '"Event: AuthRequest\r\nPrivilege: <none>\r\nRegistration: volte_ims\r\nAlgorithm: AKAv1-MD5\r\nRAND: d5d5de2bce418d7865ed7fa6956618a2\r\nAUTN: d42e61db5f15800067393a5b7691a227\r\n"'
Asterisk_Tests_AMI_EMU(59)@2c36661cae0d: AMI remain buf: '""'
Asterisk_Tests_AMI_EMU(59)@2c36661cae0d: AMI rx: '"Response: Success\r\nActionID: 8FEC4E42F2C29C4D\r\nMessage: AuthResponse sent\r\n\r\n"'
Asterisk_Tests_AMI_EMU(59)@2c36661cae0d: AMI buf: '"Response: Success\r\nActionID: 8FEC4E42F2C29C4D\r\nMessage: AuthResponse sent\r\n\r\n"'
Asterisk_Tests_AMI_EMU(59)@2c36661cae0d: AMI split: { "Response: Success\r\nActionID: 8FEC4E42F2C29C4D\r\nMessage: AuthResponse sent" }
Asterisk_Tests_AMI_EMU(59)@2c36661cae0d: AMI dec: '"Response: Success\r\nActionID: 8FEC4E42F2C29C4D\r\nMessage: AuthResponse sent\r\n"'
Asterisk_Tests_AMI_EMU(59)@2c36661cae0d: AMI patched dec: '"Response: Success\r\nActionID: 8FEC4E42F2C29C4D\r\nMessage: AuthResponse sent\r\n"'
Asterisk_Tests_AMI_EMU(59)@2c36661cae0d: AMI remain buf: '""'
TC_ims_call_mo-ConnHdlr-0501(63)@2c36661cae0d: setverdict(fail): none -> fail reason: "Tguard timeout", new component reason: "Tguard timeout"
MC@2c36661cae0d: Test Component 63 has requested to stop MTC. Terminating current testcase execution.
Asterisk_Tests_AMI_EMU(59)@2c36661cae0d: Final verdict of PTC: none
Asterisk_Tests_LOCAL_SIP_EMU(60)@2c36661cae0d: Final verdict of PTC: none
Asterisk_Tests_IMS_SIP_EMU(61)@2c36661cae0d: Final verdict of PTC: none
TC_ims_call_mo-ConnHdlr-0501(63)@2c36661cae0d: Final verdict of PTC: fail reason: "Tguard timeout"
TC_ims_call_mo-IMS_ConnHdlr-238010000090828(62)@2c36661cae0d: Final verdict of PTC: none
MTC@2c36661cae0d: Setting final verdict of the test case.
MTC@2c36661cae0d: Local verdict of MTC: none
MTC@2c36661cae0d: Local verdict of PTC Asterisk_Tests_AMI_EMU(59): none (none -> none)
MTC@2c36661cae0d: Local verdict of PTC Asterisk_Tests_LOCAL_SIP_EMU(60): none (none -> none)
MTC@2c36661cae0d: Local verdict of PTC Asterisk_Tests_IMS_SIP_EMU(61): none (none -> none)
MTC@2c36661cae0d: Local verdict of PTC TC_ims_call_mo-IMS_ConnHdlr-238010000090828(62): none (none -> none)
MTC@2c36661cae0d: Local verdict of PTC TC_ims_call_mo-ConnHdlr-0501(63): fail (none -> fail) reason: "Tguard timeout"
MTC@2c36661cae0d: Test case TC_ims_call_mo finished. Verdict: fail reason: Tguard timeout
MTC@2c36661cae0d: Starting external command `../ttcn3-tcpdump-stop.sh Asterisk_Tests.TC_ims_call_mo fail'.
Mon Jul  1 07:46:22 UTC 2024
------ Asterisk_Tests.TC_ims_call_mo fail ------

Waiting for packet dumper to finish... 0 (prev_count=-1, count=13552)
Waiting for packet dumper to finish... 1 (prev_count=13552, count=13816)
MTC@2c36661cae0d: External command `../ttcn3-tcpdump-stop.sh Asterisk_Tests.TC_ims_call_mo fail' was executed successfully (exit status: 0).
MTC@2c36661cae0d: Starting external command `../ttcn3-tcpdump-start.sh Asterisk_Tests.TC_ims_call_mo_noprecondition'.
------ Asterisk_Tests.TC_ims_call_mo_noprecondition ------
Mon Jul  1 07:46:24 UTC 2024
NOTE: unable to use dumpcap due to missing permissions in /data
 /usr/bin/tcpdump -U -s 1520 -n -i any -w "/data/Asterisk_Tests.TC_ims_call_mo_noprecondition.pcap" >/data/Asterisk_Tests.TC_ims_call_mo_noprecondition.pcap.stdout 2>/tmp/cmderr &
Waiting for packet dumper to start... 0
MTC@2c36661cae0d: External command `../ttcn3-tcpdump-start.sh Asterisk_Tests.TC_ims_call_mo_noprecondition' was executed successfully (exit status: 0).
MTC@2c36661cae0d: Test case TC_ims_call_mo_noprecondition started.
Asterisk_Tests_AMI_EMU(64)@2c36661cae0d: AMI connected, ConnId=1
Asterisk_Tests_AMI_EMU(64)@2c36661cae0d: Warning: There is no GetMsgLen function registered for connId: 1. The messages will not be dissected on this connection! This warning is logged only once per testport.
Asterisk_Tests_AMI_EMU(64)@2c36661cae0d: AMI Welcome message received: '"Asterisk Call Manager/9.0.0\r\n"'
Asterisk_Tests_AMI_EMU(64)@2c36661cae0d: AMI rx: '"Response: Success\r\nActionID: 2861DE23750EAC8B\r\nMessage: Authentication accepted\r\n\r\n"'
Asterisk_Tests_AMI_EMU(64)@2c36661cae0d: AMI buf: '"Response: Success\r\nActionID: 2861DE23750EAC8B\r\nMessage: Authentication accepted\r\n\r\n"'
Asterisk_Tests_AMI_EMU(64)@2c36661cae0d: AMI split: { "Response: Success\r\nActionID: 2861DE23750EAC8B\r\nMessage: Authentication accepted" }
Asterisk_Tests_AMI_EMU(64)@2c36661cae0d: AMI dec: '"Response: Success\r\nActionID: 2861DE23750EAC8B\r\nMessage: Authentication accepted\r\n"'
Asterisk_Tests_AMI_EMU(64)@2c36661cae0d: AMI patched dec: '"Response: Success\r\nActionID: 2861DE23750EAC8B\r\nMessage: Authentication accepted\r\n"'
Asterisk_Tests_AMI_EMU(64)@2c36661cae0d: AMI remain buf: '""'
Asterisk_Tests_AMI_EMU(64)@2c36661cae0d: AMI rx: '"Event: FullyBooted\r\nPrivilege: system,all\r\nUptime: 336\r\nLastReload: 336\r\nStatus: Fully Booted\r\n\r\nEvent: SuccessfulAuth\r\nPrivilege: security,all\r\nEventTV: 2024-07-01T07:46:25.855+0000\r\nSeverity: Informational\r\nService: AMI\r\nEventVersion: 1\r\nAccountID: test_user\r\nSessionID: 0x7f2478001090\r\nLocalAddress: IPV4/TCP/172.18.69.10/5038\r\nRemoteAddress: IPV4/TCP/172.18.69.103/38311\r\nUsingPassword: 0\r\nSessionTV: 2024-07-01T07:46:25.855+0000\r\n\r\n"'
Asterisk_Tests_AMI_EMU(64)@2c36661cae0d: AMI buf: '"Event: FullyBooted\r\nPrivilege: system,all\r\nUptime: 336\r\nLastReload: 336\r\nStatus: Fully Booted\r\n\r\nEvent: SuccessfulAuth\r\nPrivilege: security,all\r\nEventTV: 2024-07-01T07:46:25.855+0000\r\nSeverity: Informational\r\nService: AMI\r\nEventVersion: 1\r\nAccountID: test_user\r\nSessionID: 0x7f2478001090\r\nLocalAddress: IPV4/TCP/172.18.69.10/5038\r\nRemoteAddress: IPV4/TCP/172.18.69.103/38311\r\nUsingPassword: 0\r\nSessionTV: 2024-07-01T07:46:25.855+0000\r\n\r\n"'
Asterisk_Tests_AMI_EMU(64)@2c36661cae0d: AMI split: { "Event: FullyBooted\r\nPrivilege: system,all\r\nUptime: 336\r\nLastReload: 336\r\nStatus: Fully Booted", "Event: SuccessfulAuth\r\nPrivilege: security,all\r\nEventTV: 2024-07-01T07:46:25.855+0000\r\nSeverity: Informational\r\nService: AMI\r\nEventVersion: 1\r\nAccountID: test_user\r\nSessionID: 0x7f2478001090\r\nLocalAddress: IPV4/TCP/172.18.69.10/5038\r\nRemoteAddress: IPV4/TCP/172.18.69.103/38311\r\nUsingPassword: 0\r\nSessionTV: 2024-07-01T07:46:25.855+0000" }
Asterisk_Tests_AMI_EMU(64)@2c36661cae0d: AMI dec: '"Event: FullyBooted\r\nPrivilege: system,all\r\nUptime: 336\r\nLastReload: 336\r\nStatus: Fully Booted\r\n"'
Asterisk_Tests_AMI_EMU(64)@2c36661cae0d: AMI patched dec: '"Event: FullyBooted\r\nPrivilege: system,all\r\nUptime: 336\r\nLastReload: 336\r\nStatus: Fully Booted\r\n"'
Asterisk_Tests_AMI_EMU(64)@2c36661cae0d: AMI dec: '"Event: SuccessfulAuth\r\nPrivilege: security,all\r\nEventTV: 2024-07-01T07:46:25.855+0000\r\nSeverity: Informational\r\nService: AMI\r\nEventVersion: 1\r\nAccountID: test_user\r\nSessionID: 0x7f2478001090\r\nLocalAddress: IPV4/TCP/172.18.69.10/5038\r\nRemoteAddress: IPV4/TCP/172.18.69.103/38311\r\nUsingPassword: 0\r\nSessionTV: 2024-07-01T07:46:25.855+0000\r\n"'
Asterisk_Tests_AMI_EMU(64)@2c36661cae0d: AMI patched dec: '"Event: SuccessfulAuth\r\nPrivilege: security,all\r\nEventTV: 2024-07-01T07:46:25.855+0000\r\nSeverity: Informational\r\nService: AMI\r\nEventVersion: 1\r\nAccountID: test_user\r\nSessionID: 0x7f2478001090\r\nLocalAddress: IPV4/TCP/172.18.69.10/5038\r\nRemoteAddress: IPV4/TCP/172.18.69.103/38311\r\nUsingPassword: 0\r\nSessionTV: 2024-07-01T07:46:25.855+0000\r\n"'
Asterisk_Tests_AMI_EMU(64)@2c36661cae0d: AMI remain buf: '""'
Asterisk_Tests_LOCAL_SIP_EMU(65)@2c36661cae0d: Warning: The maximum number of open file descriptors (100000) is greater than FD_SETSIZE (1024). Ensure that Test Ports using Install_Handler do not try to wait for events of file descriptors with values greater than FD_SETSIZE (1024). (Current caller of Install_Handler is "SIP")
Asterisk_Tests_IMS_SIP_EMU(66)@2c36661cae0d: Warning: The maximum number of open file descriptors (100000) is greater than FD_SETSIZE (1024). Ensure that Test Ports using Install_Handler do not try to wait for events of file descriptors with values greater than FD_SETSIZE (1024). (Current caller of Install_Handler is "SIP")
MTC@2c36661cae0d: end of f_init
Asterisk_Tests_IMS_SIP_EMU(66)@2c36661cae0d: Created SipExpect[0] for { scheme := "sip", userInfo := { userOrTelephoneSubscriber := "238010000090828", password := omit }, hostPort := { host := "ims.mnc001.mcc238.3gppnetwork.org", portField := omit }, urlParameters := omit, headers := omit } to be handled at TC_ims_call_mo_noprecondition-IMS_ConnHdlr-238010000090828(67)
Asterisk_Tests_IMS_SIP_EMU(66)@2c36661cae0d: Created SipExpect[1] for { scheme := "sip", userInfo := { userOrTelephoneSubscriber := "90829", password := omit }, hostPort := { host := "ims.mnc001.mcc238.3gppnetwork.org", portField := omit }, urlParameters := omit, headers := omit } to be handled at TC_ims_call_mo_noprecondition-IMS_ConnHdlr-238010000090828(67)
Asterisk_Tests_LOCAL_SIP_EMU(65)@2c36661cae0d: Added SIP Call Table entry [0] for "B5C65F8FB925B2C@172.18.69.103" at TC_ims_call_mo_noprecondition-ConnHdlr-0501(68)
Asterisk_Tests_AMI_EMU(64)@2c36661cae0d: AMI rx: '"Event: ChallengeSent\r\nPrivilege: security,all\r\nEventTV: 2024-07-01T07:46:25.884+0000\r\nSeverity: Informational\r\nService: PJSIP\r\nEventVersion: 1\r\nAccountID: 0501\r\nSessionID: B5C65F8FB925B2C@172.18.69.103\r\nLocalAddress: IPV4/UDP/172.18.69.10/5094\r\nRemoteAddress: IPV4/UDP/172.18.69.103/5061\r\nChallenge: \r\n\r\n"'
Asterisk_Tests_AMI_EMU(64)@2c36661cae0d: AMI buf: '"Event: ChallengeSent\r\nPrivilege: security,all\r\nEventTV: 2024-07-01T07:46:25.884+0000\r\nSeverity: Informational\r\nService: PJSIP\r\nEventVersion: 1\r\nAccountID: 0501\r\nSessionID: B5C65F8FB925B2C@172.18.69.103\r\nLocalAddress: IPV4/UDP/172.18.69.10/5094\r\nRemoteAddress: IPV4/UDP/172.18.69.103/5061\r\nChallenge: \r\n\r\n"'
Asterisk_Tests_AMI_EMU(64)@2c36661cae0d: AMI split: { "Event: ChallengeSent\r\nPrivilege: security,all\r\nEventTV: 2024-07-01T07:46:25.884+0000\r\nSeverity: Informational\r\nService: PJSIP\r\nEventVersion: 1\r\nAccountID: 0501\r\nSessionID: B5C65F8FB925B2C@172.18.69.103\r\nLocalAddress: IPV4/UDP/172.18.69.10/5094\r\nRemoteAddress: IPV4/UDP/172.18.69.103/5061\r\nChallenge: " }
Asterisk_Tests_AMI_EMU(64)@2c36661cae0d: AMI dec: '"Event: ChallengeSent\r\nPrivilege: security,all\r\nEventTV: 2024-07-01T07:46:25.884+0000\r\nSeverity: Informational\r\nService: PJSIP\r\nEventVersion: 1\r\nAccountID: 0501\r\nSessionID: B5C65F8FB925B2C@172.18.69.103\r\nLocalAddress: IPV4/UDP/172.18.69.10/5094\r\nRemoteAddress: IPV4/UDP/172.18.69.103/5061\r\nChallenge: \r\n"'
Asterisk_Tests_AMI_EMU(64)@2c36661cae0d: AMI patched dec: '"Event: ChallengeSent\r\nPrivilege: security,all\r\nEventTV: 2024-07-01T07:46:25.884+0000\r\nSeverity: Informational\r\nService: PJSIP\r\nEventVersion: 1\r\nAccountID: 0501\r\nSessionID: B5C65F8FB925B2C@172.18.69.103\r\nLocalAddress: IPV4/UDP/172.18.69.10/5094\r\nRemoteAddress: IPV4/UDP/172.18.69.103/5061\r\n"'
TC_ims_call_mo_noprecondition-ConnHdlr-0501(68)@2c36661cae0d: A1: md5("0501:asterisk:secret") = "a34a6b1c4db97fc1991e36119c482192"
TC_ims_call_mo_noprecondition-ConnHdlr-0501(68)@2c36661cae0d: A2: md5("REGISTER:sip:172.18.69.10") = "040f3459c8765eb0deb3b33d81871014"
TC_ims_call_mo_noprecondition-ConnHdlr-0501(68)@2c36661cae0d: "Request-Digest: md5(\"a34a6b1c4db97fc1991e36119c482192:1719819985/cddb744996082df6f1a73a2d5c79c3e4:00000001:0a4f113b:auth:040f3459c8765eb0deb3b33d81871014\") = \"5c44e3e08631dda48e17a4ed6a1a5844\""
Asterisk_Tests_AMI_EMU(64)@2c36661cae0d: AMI remain buf: '""'
Asterisk_Tests_AMI_EMU(64)@2c36661cae0d: AMI rx: '"Event: SuccessfulAuth\r\nPrivilege: security,all\r\nEventTV: 2024-07-01T07:46:25.888+0000\r\nSeverity: Informational\r\nService: PJSIP\r\nEventVersion: 1\r\nAccountID: 0501\r\nSessionID: B5C65F8FB925B2C@172.18.69.103\r\nLocalAddress: IPV4/UDP/172.18.69.10/5094\r\nRemoteAddress: IPV4/UDP/172.18.69.103/5061\r\nUsingPassword: 1\r\n\r\n"'
Asterisk_Tests_AMI_EMU(64)@2c36661cae0d: AMI buf: '"Event: SuccessfulAuth\r\nPrivilege: security,all\r\nEventTV: 2024-07-01T07:46:25.888+0000\r\nSeverity: Informational\r\nService: PJSIP\r\nEventVersion: 1\r\nAccountID: 0501\r\nSessionID: B5C65F8FB925B2C@172.18.69.103\r\nLocalAddress: IPV4/UDP/172.18.69.10/5094\r\nRemoteAddress: IPV4/UDP/172.18.69.103/5061\r\nUsingPassword: 1\r\n\r\n"'
Asterisk_Tests_AMI_EMU(64)@2c36661cae0d: AMI split: { "Event: SuccessfulAuth\r\nPrivilege: security,all\r\nEventTV: 2024-07-01T07:46:25.888+0000\r\nSeverity: Informational\r\nService: PJSIP\r\nEventVersion: 1\r\nAccountID: 0501\r\nSessionID: B5C65F8FB925B2C@172.18.69.103\r\nLocalAddress: IPV4/UDP/172.18.69.10/5094\r\nRemoteAddress: IPV4/UDP/172.18.69.103/5061\r\nUsingPassword: 1" }
Asterisk_Tests_AMI_EMU(64)@2c36661cae0d: AMI dec: '"Event: SuccessfulAuth\r\nPrivilege: security,all\r\nEventTV: 2024-07-01T07:46:25.888+0000\r\nSeverity: Informational\r\nService: PJSIP\r\nEventVersion: 1\r\nAccountID: 0501\r\nSessionID: B5C65F8FB925B2C@172.18.69.103\r\nLocalAddress: IPV4/UDP/172.18.69.10/5094\r\nRemoteAddress: IPV4/UDP/172.18.69.103/5061\r\nUsingPassword: 1\r\n"'
Asterisk_Tests_AMI_EMU(64)@2c36661cae0d: AMI patched dec: '"Event: SuccessfulAuth\r\nPrivilege: security,all\r\nEventTV: 2024-07-01T07:46:25.888+0000\r\nSeverity: Informational\r\nService: PJSIP\r\nEventVersion: 1\r\nAccountID: 0501\r\nSessionID: B5C65F8FB925B2C@172.18.69.103\r\nLocalAddress: IPV4/UDP/172.18.69.10/5094\r\nRemoteAddress: IPV4/UDP/172.18.69.103/5061\r\nUsingPassword: 1\r\n"'
Asterisk_Tests_AMI_EMU(64)@2c36661cae0d: AMI remain buf: '""'
Asterisk_Tests_AMI_EMU(64)@2c36661cae0d: AMI rx: '"Response: Success\r\nActionID: 20DA190CBA5C19E2\r\nMessage: Access Network Info set\r\n\r\n"'
Asterisk_Tests_AMI_EMU(64)@2c36661cae0d: AMI buf: '"Response: Success\r\nActionID: 20DA190CBA5C19E2\r\nMessage: Access Network Info set\r\n\r\n"'
Asterisk_Tests_AMI_EMU(64)@2c36661cae0d: AMI split: { "Response: Success\r\nActionID: 20DA190CBA5C19E2\r\nMessage: Access Network Info set" }
Asterisk_Tests_AMI_EMU(64)@2c36661cae0d: AMI dec: '"Response: Success\r\nActionID: 20DA190CBA5C19E2\r\nMessage: Access Network Info set\r\n"'
Asterisk_Tests_AMI_EMU(64)@2c36661cae0d: AMI patched dec: '"Response: Success\r\nActionID: 20DA190CBA5C19E2\r\nMessage: Access Network Info set\r\n"'
Asterisk_Tests_AMI_EMU(64)@2c36661cae0d: AMI remain buf: '""'
Asterisk_Tests_AMI_EMU(64)@2c36661cae0d: AMI rx: '"Response: Success\r\nActionID: 551CC3A7E97CACA7\r\nMessage: Reregistration sent\r\n\r\n"'
Asterisk_Tests_AMI_EMU(64)@2c36661cae0d: AMI buf: '"Response: Success\r\nActionID: 551CC3A7E97CACA7\r\nMessage: Reregistration sent\r\n\r\n"'
Asterisk_Tests_AMI_EMU(64)@2c36661cae0d: AMI split: { "Response: Success\r\nActionID: 551CC3A7E97CACA7\r\nMessage: Reregistration sent" }
Asterisk_Tests_AMI_EMU(64)@2c36661cae0d: AMI dec: '"Response: Success\r\nActionID: 551CC3A7E97CACA7\r\nMessage: Reregistration sent\r\n"'
Asterisk_Tests_AMI_EMU(64)@2c36661cae0d: AMI patched dec: '"Response: Success\r\nActionID: 551CC3A7E97CACA7\r\nMessage: Reregistration sent\r\n"'
Asterisk_Tests_AMI_EMU(64)@2c36661cae0d: AMI remain buf: '""'
Asterisk_Tests_AMI_EMU(64)@2c36661cae0d: AMI rx: '"Event: Registry\r\nPrivilege: system,all\r\nChannelType: PJSIP\r\nUsername: sip:238010000090828@ims.mnc001.mcc238.3gppnetwork.org\r\nDomain: sip:ims.mnc001.mcc238.3gppnetwork.org\r\nStatus: Rejected\r\n\r\n"'
Asterisk_Tests_AMI_EMU(64)@2c36661cae0d: AMI buf: '"Event: Registry\r\nPrivilege: system,all\r\nChannelType: PJSIP\r\nUsername: sip:238010000090828@ims.mnc001.mcc238.3gppnetwork.org\r\nDomain: sip:ims.mnc001.mcc238.3gppnetwork.org\r\nStatus: Rejected\r\n\r\n"'
Asterisk_Tests_AMI_EMU(64)@2c36661cae0d: AMI split: { "Event: Registry\r\nPrivilege: system,all\r\nChannelType: PJSIP\r\nUsername: sip:238010000090828@ims.mnc001.mcc238.3gppnetwork.org\r\nDomain: sip:ims.mnc001.mcc238.3gppnetwork.org\r\nStatus: Rejected" }
Asterisk_Tests_AMI_EMU(64)@2c36661cae0d: AMI dec: '"Event: Registry\r\nPrivilege: system,all\r\nChannelType: PJSIP\r\nUsername: sip:238010000090828@ims.mnc001.mcc238.3gppnetwork.org\r\nDomain: sip:ims.mnc001.mcc238.3gppnetwork.org\r\nStatus: Rejected\r\n"'
Asterisk_Tests_AMI_EMU(64)@2c36661cae0d: AMI patched dec: '"Event: Registry\r\nPrivilege: system,all\r\nChannelType: PJSIP\r\nUsername: sip:238010000090828@ims.mnc001.mcc238.3gppnetwork.org\r\nDomain: sip:ims.mnc001.mcc238.3gppnetwork.org\r\nStatus: Rejected\r\n"'
Asterisk_Tests_AMI_EMU(64)@2c36661cae0d: AMI remain buf: '""'
MTC@2c36661cae0d: Dynamic test case error: None of the branches can be chosen in altstep as_AMI_IMS_register_Auth.
MTC@2c36661cae0d: setverdict(error): none -> error
Asterisk_Tests_IMS_SIP_EMU(66)@2c36661cae0d: Final verdict of PTC: none
TC_ims_call_mo_noprecondition-ConnHdlr-0501(68)@2c36661cae0d: Final verdict of PTC: none
Asterisk_Tests_LOCAL_SIP_EMU(65)@2c36661cae0d: Final verdict of PTC: none
Asterisk_Tests_AMI_EMU(64)@2c36661cae0d: Final verdict of PTC: none
TC_ims_call_mo_noprecondition-IMS_ConnHdlr-238010000090828(67)@2c36661cae0d: Final verdict of PTC: none
MTC@2c36661cae0d: Setting final verdict of the test case.
MTC@2c36661cae0d: Local verdict of MTC: error
MTC@2c36661cae0d: Local verdict of PTC Asterisk_Tests_AMI_EMU(64): none (error -> error)
MTC@2c36661cae0d: Local verdict of PTC Asterisk_Tests_LOCAL_SIP_EMU(65): none (error -> error)
MTC@2c36661cae0d: Local verdict of PTC Asterisk_Tests_IMS_SIP_EMU(66): none (error -> error)
MTC@2c36661cae0d: Local verdict of PTC TC_ims_call_mo_noprecondition-IMS_ConnHdlr-238010000090828(67): none (error -> error)
MTC@2c36661cae0d: Local verdict of PTC TC_ims_call_mo_noprecondition-ConnHdlr-0501(68): none (error -> error)
MTC@2c36661cae0d: Test case TC_ims_call_mo_noprecondition finished. Verdict: error
MTC@2c36661cae0d: Starting external command `../ttcn3-tcpdump-stop.sh Asterisk_Tests.TC_ims_call_mo_noprecondition error'.
Mon Jul  1 07:46:27 UTC 2024
------ Asterisk_Tests.TC_ims_call_mo_noprecondition error ------

Waiting for packet dumper to finish... 0 (prev_count=-1, count=7086)
Waiting for packet dumper to finish... 1 (prev_count=7086, count=8139)
MTC@2c36661cae0d: External command `../ttcn3-tcpdump-stop.sh Asterisk_Tests.TC_ims_call_mo_noprecondition error' was executed successfully (exit status: 0).
MTC@2c36661cae0d: Starting external command `../ttcn3-tcpdump-start.sh Asterisk_Tests.TC_ims_call_mt'.
------ Asterisk_Tests.TC_ims_call_mt ------
Mon Jul  1 07:46:29 UTC 2024
NOTE: unable to use dumpcap due to missing permissions in /data
 /usr/bin/tcpdump -U -s 1520 -n -i any -w "/data/Asterisk_Tests.TC_ims_call_mt.pcap" >/data/Asterisk_Tests.TC_ims_call_mt.pcap.stdout 2>/tmp/cmderr &
Waiting for packet dumper to start... 0
MTC@2c36661cae0d: External command `../ttcn3-tcpdump-start.sh Asterisk_Tests.TC_ims_call_mt' was executed successfully (exit status: 0).
MTC@2c36661cae0d: Test case TC_ims_call_mt started.
Asterisk_Tests_AMI_EMU(69)@2c36661cae0d: AMI connected, ConnId=1
Asterisk_Tests_AMI_EMU(69)@2c36661cae0d: Warning: There is no GetMsgLen function registered for connId: 1. The messages will not be dissected on this connection! This warning is logged only once per testport.
Asterisk_Tests_AMI_EMU(69)@2c36661cae0d: AMI Welcome message received: '"Asterisk Call Manager/9.0.0\r\n"'
Asterisk_Tests_AMI_EMU(69)@2c36661cae0d: AMI rx: '"Response: Success\r\nActionID: FA33BDF1811EA06C\r\nMessage: Authentication accepted\r\n\r\n"'
Asterisk_Tests_AMI_EMU(69)@2c36661cae0d: AMI buf: '"Response: Success\r\nActionID: FA33BDF1811EA06C\r\nMessage: Authentication accepted\r\n\r\n"'
Asterisk_Tests_AMI_EMU(69)@2c36661cae0d: AMI split: { "Response: Success\r\nActionID: FA33BDF1811EA06C\r\nMessage: Authentication accepted" }
Asterisk_Tests_AMI_EMU(69)@2c36661cae0d: AMI dec: '"Response: Success\r\nActionID: FA33BDF1811EA06C\r\nMessage: Authentication accepted\r\n"'
Asterisk_Tests_AMI_EMU(69)@2c36661cae0d: AMI patched dec: '"Response: Success\r\nActionID: FA33BDF1811EA06C\r\nMessage: Authentication accepted\r\n"'
Asterisk_Tests_AMI_EMU(69)@2c36661cae0d: AMI remain buf: '""'
Asterisk_Tests_AMI_EMU(69)@2c36661cae0d: AMI rx: '"Event: FullyBooted\r\nPrivilege: system,all\r\nUptime: 341\r\nLastReload: 341\r\nStatus: Fully Booted\r\n\r\nEvent: SuccessfulAuth\r\nPrivilege: security,all\r\nEventTV: 2024-07-01T07:46:30.897+0000\r\nSeverity: Informational\r\nService: AMI\r\nEventVersion: 1\r\nAccountID: test_user\r\nSessionID: 0x7f2478001090\r\nLocalAddress: IPV4/TCP/172.18.69.10/5038\r\nRemoteAddress: IPV4/TCP/172.18.69.103/37795\r\nUsingPassword: 0\r\nSessionTV: 2024-07-01T07:46:30.897+0000\r\n\r\n"'
Asterisk_Tests_AMI_EMU(69)@2c36661cae0d: AMI buf: '"Event: FullyBooted\r\nPrivilege: system,all\r\nUptime: 341\r\nLastReload: 341\r\nStatus: Fully Booted\r\n\r\nEvent: SuccessfulAuth\r\nPrivilege: security,all\r\nEventTV: 2024-07-01T07:46:30.897+0000\r\nSeverity: Informational\r\nService: AMI\r\nEventVersion: 1\r\nAccountID: test_user\r\nSessionID: 0x7f2478001090\r\nLocalAddress: IPV4/TCP/172.18.69.10/5038\r\nRemoteAddress: IPV4/TCP/172.18.69.103/37795\r\nUsingPassword: 0\r\nSessionTV: 2024-07-01T07:46:30.897+0000\r\n\r\n"'
Asterisk_Tests_AMI_EMU(69)@2c36661cae0d: AMI split: { "Event: FullyBooted\r\nPrivilege: system,all\r\nUptime: 341\r\nLastReload: 341\r\nStatus: Fully Booted", "Event: SuccessfulAuth\r\nPrivilege: security,all\r\nEventTV: 2024-07-01T07:46:30.897+0000\r\nSeverity: Informational\r\nService: AMI\r\nEventVersion: 1\r\nAccountID: test_user\r\nSessionID: 0x7f2478001090\r\nLocalAddress: IPV4/TCP/172.18.69.10/5038\r\nRemoteAddress: IPV4/TCP/172.18.69.103/37795\r\nUsingPassword: 0\r\nSessionTV: 2024-07-01T07:46:30.897+0000" }
Asterisk_Tests_AMI_EMU(69)@2c36661cae0d: AMI dec: '"Event: FullyBooted\r\nPrivilege: system,all\r\nUptime: 341\r\nLastReload: 341\r\nStatus: Fully Booted\r\n"'
Asterisk_Tests_AMI_EMU(69)@2c36661cae0d: AMI patched dec: '"Event: FullyBooted\r\nPrivilege: system,all\r\nUptime: 341\r\nLastReload: 341\r\nStatus: Fully Booted\r\n"'
Asterisk_Tests_AMI_EMU(69)@2c36661cae0d: AMI dec: '"Event: SuccessfulAuth\r\nPrivilege: security,all\r\nEventTV: 2024-07-01T07:46:30.897+0000\r\nSeverity: Informational\r\nService: AMI\r\nEventVersion: 1\r\nAccountID: test_user\r\nSessionID: 0x7f2478001090\r\nLocalAddress: IPV4/TCP/172.18.69.10/5038\r\nRemoteAddress: IPV4/TCP/172.18.69.103/37795\r\nUsingPassword: 0\r\nSessionTV: 2024-07-01T07:46:30.897+0000\r\n"'
Asterisk_Tests_AMI_EMU(69)@2c36661cae0d: AMI patched dec: '"Event: SuccessfulAuth\r\nPrivilege: security,all\r\nEventTV: 2024-07-01T07:46:30.897+0000\r\nSeverity: Informational\r\nService: AMI\r\nEventVersion: 1\r\nAccountID: test_user\r\nSessionID: 0x7f2478001090\r\nLocalAddress: IPV4/TCP/172.18.69.10/5038\r\nRemoteAddress: IPV4/TCP/172.18.69.103/37795\r\nUsingPassword: 0\r\nSessionTV: 2024-07-01T07:46:30.897+0000\r\n"'
Asterisk_Tests_AMI_EMU(69)@2c36661cae0d: AMI remain buf: '""'
Asterisk_Tests_LOCAL_SIP_EMU(70)@2c36661cae0d: Warning: The maximum number of open file descriptors (100000) is greater than FD_SETSIZE (1024). Ensure that Test Ports using Install_Handler do not try to wait for events of file descriptors with values greater than FD_SETSIZE (1024). (Current caller of Install_Handler is "SIP")
Asterisk_Tests_IMS_SIP_EMU(71)@2c36661cae0d: Warning: The maximum number of open file descriptors (100000) is greater than FD_SETSIZE (1024). Ensure that Test Ports using Install_Handler do not try to wait for events of file descriptors with values greater than FD_SETSIZE (1024). (Current caller of Install_Handler is "SIP")
MTC@2c36661cae0d: end of f_init
Asterisk_Tests_IMS_SIP_EMU(71)@2c36661cae0d: Created SipExpect[0] for { scheme := "sip", userInfo := { userOrTelephoneSubscriber := "238010000090828", password := omit }, hostPort := { host := "ims.mnc001.mcc238.3gppnetwork.org", portField := omit }, urlParameters := omit, headers := omit } to be handled at TC_ims_call_mt-IMS_ConnHdlr-238010000090828(72)
Asterisk_Tests_LOCAL_SIP_EMU(70)@2c36661cae0d: Created SipExpect[0] for { scheme := "sip", userInfo := { userOrTelephoneSubscriber := "0501", password := omit }, hostPort := { host := "172.18.69.103", portField := omit }, urlParameters := omit, headers := omit } to be handled at TC_ims_call_mt-ConnHdlr-0501(73)
Asterisk_Tests_LOCAL_SIP_EMU(70)@2c36661cae0d: Added SIP Call Table entry [0] for "712E66743A14A44@172.18.69.103" at TC_ims_call_mt-ConnHdlr-0501(73)
Asterisk_Tests_AMI_EMU(69)@2c36661cae0d: AMI rx: '"Event: ChallengeSent\r\nPrivilege: security,all\r\nEventTV: 2024-07-01T07:46:30.926+0000\r\nSeverity: Informational\r\nService: PJSIP\r\nEventVersion: 1\r\nAccountID: 0501\r\nSessionID: 712E66743A14A44@172.18.69.103\r\nLocalAddress: IPV4/UDP/172.18.69.10/5094\r\nRemoteAddress: IPV4/UDP/172.18.69.103/5061\r\nChallenge: \r\n\r\n"'
Asterisk_Tests_AMI_EMU(69)@2c36661cae0d: AMI buf: '"Event: ChallengeSent\r\nPrivilege: security,all\r\nEventTV: 2024-07-01T07:46:30.926+0000\r\nSeverity: Informational\r\nService: PJSIP\r\nEventVersion: 1\r\nAccountID: 0501\r\nSessionID: 712E66743A14A44@172.18.69.103\r\nLocalAddress: IPV4/UDP/172.18.69.10/5094\r\nRemoteAddress: IPV4/UDP/172.18.69.103/5061\r\nChallenge: \r\n\r\n"'
Asterisk_Tests_AMI_EMU(69)@2c36661cae0d: AMI split: { "Event: ChallengeSent\r\nPrivilege: security,all\r\nEventTV: 2024-07-01T07:46:30.926+0000\r\nSeverity: Informational\r\nService: PJSIP\r\nEventVersion: 1\r\nAccountID: 0501\r\nSessionID: 712E66743A14A44@172.18.69.103\r\nLocalAddress: IPV4/UDP/172.18.69.10/5094\r\nRemoteAddress: IPV4/UDP/172.18.69.103/5061\r\nChallenge: " }
Asterisk_Tests_AMI_EMU(69)@2c36661cae0d: AMI dec: '"Event: ChallengeSent\r\nPrivilege: security,all\r\nEventTV: 2024-07-01T07:46:30.926+0000\r\nSeverity: Informational\r\nService: PJSIP\r\nEventVersion: 1\r\nAccountID: 0501\r\nSessionID: 712E66743A14A44@172.18.69.103\r\nLocalAddress: IPV4/UDP/172.18.69.10/5094\r\nRemoteAddress: IPV4/UDP/172.18.69.103/5061\r\nChallenge: \r\n"'
Asterisk_Tests_AMI_EMU(69)@2c36661cae0d: AMI patched dec: '"Event: ChallengeSent\r\nPrivilege: security,all\r\nEventTV: 2024-07-01T07:46:30.926+0000\r\nSeverity: Informational\r\nService: PJSIP\r\nEventVersion: 1\r\nAccountID: 0501\r\nSessionID: 712E66743A14A44@172.18.69.103\r\nLocalAddress: IPV4/UDP/172.18.69.10/5094\r\nRemoteAddress: IPV4/UDP/172.18.69.103/5061\r\n"'
Asterisk_Tests_AMI_EMU(69)@2c36661cae0d: AMI remain buf: '""'
TC_ims_call_mt-ConnHdlr-0501(73)@2c36661cae0d: A1: md5("0501:asterisk:secret") = "a34a6b1c4db97fc1991e36119c482192"
TC_ims_call_mt-ConnHdlr-0501(73)@2c36661cae0d: A2: md5("REGISTER:sip:172.18.69.10") = "040f3459c8765eb0deb3b33d81871014"
TC_ims_call_mt-ConnHdlr-0501(73)@2c36661cae0d: "Request-Digest: md5(\"a34a6b1c4db97fc1991e36119c482192:1719819990/5f138a6d6377a186e3af9cee2514f69c:00000001:0a4f113b:auth:040f3459c8765eb0deb3b33d81871014\") = \"fda512ff83df5fddcd183e2834963c15\""
Asterisk_Tests_AMI_EMU(69)@2c36661cae0d: AMI rx: '"Event: SuccessfulAuth\r\nPrivilege: security,all\r\nEventTV: 2024-07-01T07:46:30.933+0000\r\nSeverity: Informational\r\nService: PJSIP\r\nEventVersion: 1\r\nAccountID: 0501\r\nSessionID: 712E66743A14A44@172.18.69.103\r\nLocalAddress: IPV4/UDP/172.18.69.10/5094\r\nRemoteAddress: IPV4/UDP/172.18.69.103/5061\r\nUsingPassword: 1\r\n\r\n"'
Asterisk_Tests_AMI_EMU(69)@2c36661cae0d: AMI buf: '"Event: SuccessfulAuth\r\nPrivilege: security,all\r\nEventTV: 2024-07-01T07:46:30.933+0000\r\nSeverity: Informational\r\nService: PJSIP\r\nEventVersion: 1\r\nAccountID: 0501\r\nSessionID: 712E66743A14A44@172.18.69.103\r\nLocalAddress: IPV4/UDP/172.18.69.10/5094\r\nRemoteAddress: IPV4/UDP/172.18.69.103/5061\r\nUsingPassword: 1\r\n\r\n"'
Asterisk_Tests_AMI_EMU(69)@2c36661cae0d: AMI split: { "Event: SuccessfulAuth\r\nPrivilege: security,all\r\nEventTV: 2024-07-01T07:46:30.933+0000\r\nSeverity: Informational\r\nService: PJSIP\r\nEventVersion: 1\r\nAccountID: 0501\r\nSessionID: 712E66743A14A44@172.18.69.103\r\nLocalAddress: IPV4/UDP/172.18.69.10/5094\r\nRemoteAddress: IPV4/UDP/172.18.69.103/5061\r\nUsingPassword: 1" }
Asterisk_Tests_AMI_EMU(69)@2c36661cae0d: AMI dec: '"Event: SuccessfulAuth\r\nPrivilege: security,all\r\nEventTV: 2024-07-01T07:46:30.933+0000\r\nSeverity: Informational\r\nService: PJSIP\r\nEventVersion: 1\r\nAccountID: 0501\r\nSessionID: 712E66743A14A44@172.18.69.103\r\nLocalAddress: IPV4/UDP/172.18.69.10/5094\r\nRemoteAddress: IPV4/UDP/172.18.69.103/5061\r\nUsingPassword: 1\r\n"'
Asterisk_Tests_AMI_EMU(69)@2c36661cae0d: AMI patched dec: '"Event: SuccessfulAuth\r\nPrivilege: security,all\r\nEventTV: 2024-07-01T07:46:30.933+0000\r\nSeverity: Informational\r\nService: PJSIP\r\nEventVersion: 1\r\nAccountID: 0501\r\nSessionID: 712E66743A14A44@172.18.69.103\r\nLocalAddress: IPV4/UDP/172.18.69.10/5094\r\nRemoteAddress: IPV4/UDP/172.18.69.103/5061\r\nUsingPassword: 1\r\n"'
Asterisk_Tests_AMI_EMU(69)@2c36661cae0d: AMI remain buf: '""'
Asterisk_Tests_AMI_EMU(69)@2c36661cae0d: AMI rx: '"Response: Success\r\nActionID: 9E6D40EC71F8C15E\r\nMessage: Access Network Info set\r\n\r\n"'
Asterisk_Tests_AMI_EMU(69)@2c36661cae0d: AMI buf: '"Response: Success\r\nActionID: 9E6D40EC71F8C15E\r\nMessage: Access Network Info set\r\n\r\n"'
Asterisk_Tests_AMI_EMU(69)@2c36661cae0d: AMI split: { "Response: Success\r\nActionID: 9E6D40EC71F8C15E\r\nMessage: Access Network Info set" }
Asterisk_Tests_AMI_EMU(69)@2c36661cae0d: AMI dec: '"Response: Success\r\nActionID: 9E6D40EC71F8C15E\r\nMessage: Access Network Info set\r\n"'
Asterisk_Tests_AMI_EMU(69)@2c36661cae0d: AMI patched dec: '"Response: Success\r\nActionID: 9E6D40EC71F8C15E\r\nMessage: Access Network Info set\r\n"'
Asterisk_Tests_AMI_EMU(69)@2c36661cae0d: AMI remain buf: '""'
Asterisk_Tests_AMI_EMU(69)@2c36661cae0d: AMI rx: '"Response: Success\r\nActionID: 5B38D635F3108476\r\nMessage: Reregistration sent\r\n\r\n"'
Asterisk_Tests_AMI_EMU(69)@2c36661cae0d: AMI buf: '"Response: Success\r\nActionID: 5B38D635F3108476\r\nMessage: Reregistration sent\r\n\r\n"'
Asterisk_Tests_AMI_EMU(69)@2c36661cae0d: AMI split: { "Response: Success\r\nActionID: 5B38D635F3108476\r\nMessage: Reregistration sent" }
Asterisk_Tests_AMI_EMU(69)@2c36661cae0d: AMI dec: '"Response: Success\r\nActionID: 5B38D635F3108476\r\nMessage: Reregistration sent\r\n"'
Asterisk_Tests_AMI_EMU(69)@2c36661cae0d: AMI patched dec: '"Response: Success\r\nActionID: 5B38D635F3108476\r\nMessage: Reregistration sent\r\n"'
Asterisk_Tests_AMI_EMU(69)@2c36661cae0d: AMI remain buf: '""'
Asterisk_Tests_IMS_SIP_EMU(71)@2c36661cae0d: Found SipExpect[0] for { scheme := "sip", userInfo := { userOrTelephoneSubscriber := "238010000090828", password := omit }, hostPort := { host := "ims.mnc001.mcc238.3gppnetwork.org", portField := omit }, urlParameters := omit, headers := omit } handled at TC_ims_call_mt-IMS_ConnHdlr-238010000090828(72)
Asterisk_Tests_IMS_SIP_EMU(71)@2c36661cae0d: Added SIP Call Table entry [0] for "7225aeda-6282-4837-b588-f5425e9c21b9" at TC_ims_call_mt-IMS_ConnHdlr-238010000090828(72)
TC_ims_call_mt-IMS_ConnHdlr-238010000090828(72)@2c36661cae0d: Skipping Security Mechansim Algo: "hmac-md5-96"
TC_ims_call_mt-IMS_ConnHdlr-238010000090828(72)@2c36661cae0d: ipsec: remote_spi_c=3376102974 remote_spi_s=3100853558local_spi_c=4142 local_spi_s=4143
TC_ims_call_mt-IMS_ConnHdlr-238010000090828(72)@2c36661cae0d: Executing: "/osmo-ttcn3-hacks/asterisk/IMS_ipsec_setup.sh 172.18.69.104 5060 4142 5060 4143 172.18.69.10 5559 3376102974 5068 3100853558 0x17141862125bd30c81c4224391a0909a00000000"
TC_ims_call_mt-IMS_ConnHdlr-238010000090828(72)@2c36661cae0d: Result: { stdout := "", stderr := "+ ip xfrm policy flush\n+ ip xfrm state flush\n+ ip_xfrm_state 172.18.69.104 5060 172.18.69.10 5559 3376102974\n+ ip xfrm state add src 172.18.69.104 dst 172.18.69.10 proto esp spi 3376102974 reqid 3376102974 mode transport replay-window 32 auth-trunc sha1 0x17141862125bd30c81c4224391a0909a00000000 96 enc cipher_null  sel src 172.18.69.104/32 dst 172.18.69.10/32 sport 5060 dport 5559\n+ ip_xfrm_state 172.18.69.104 5060 172.18.69.10 5068 3100853558\n+ ip xfrm state add src 172.18.69.104 dst 172.18.69.10 proto esp spi 3100853558 reqid 3100853558 mode transport replay-window 32 auth-trunc sha1 0x17141862125bd30c81c4224391a0909a00000000 96 enc cipher_null  sel src 172.18.69.104/32 dst 172.18.69.10/32 sport 5060 dport 5068\n+ ip_xfrm_state 172.18.69.10 5559 172.18.69.104 5060 4143\n+ ip xfrm state add src 172.18.69.10 dst 172.18.69.104 proto esp spi 4143 reqid 4143 mode transport replay-window 32 auth-trunc sha1 0x17141862125bd30c81c4224391a0909a00000000 96 enc cipher_null  sel src 172.18.69.10/32 dst 172.18.69.104/32 sport 5559 dport 5060\n+ ip_xfrm_state 172.18.69.10 5068 172.18.69.104 5060 4142\n+ ip xfrm state add src 172.18.69.10 dst 172.18.69.104 proto esp spi 4142 reqid 4142 mode transport replay-window 32 auth-trunc sha1 0x17141862125bd30c81c4224391a0909a00000000 96 enc cipher_null  sel src 172.18.69.10/32 dst 172.18.69.104/32 sport 5068 dport 5060\n+ ip_xfrm_policy 172.18.69.104 5060 172.18.69.10 5559 3376102974 out\n+ ip xfrm policy add src 172.18.69.104/32 dst 172.18.69.10/32 sport 5060 dport 5559 dir out tmpl src 172.18.69.104 dst 172.18.69.10 proto esp reqid 3376102974 mode transport\n+ ip_xfrm_policy 172.18.69.104 5060 172.18.69.10 5068 3100853558 out\n+ ip xfrm policy add src 172.18.69.104/32 dst 172.18.69.10/32 sport 5060 dport 5068 dir out tmpl src 172.18.69.104 dst 172.18.69.10 proto esp reqid 3100853558 mode transport\n+ ip_xfrm_policy 172.18.69.10 5559 172.18.69.104 5060 4143 in\n+ ip xfrm policy add src 172.18.69.10/32 dst 172.18.69.104/32 sport 5559 dport 5060 dir in tmpl src 172.18.69.10 dst 172.18.69.104 proto esp reqid 4143 mode transport\n+ ip_xfrm_policy 172.18.69.10 5068 172.18.69.104 5060 4142 in\n+ ip xfrm policy add src 172.18.69.10/32 dst 172.18.69.104/32 sport 5068 dport 5060 dir in tmpl src 172.18.69.10 dst 172.18.69.104 proto esp reqid 4142 mode transport", code := 0 }
TC_ims_call_mt-IMS_ConnHdlr-238010000090828(72)@2c36661cae0d: rand='D5D5DE2BCE418D7865ED7FA6956618A2'O & autn='D42E61DB5F15800067393A5B7691A227'O => nonce="1dXeK85BjXhl7X+mlWYYotQuYdtfFYAAZzk6W3aRoic="
Asterisk_Tests_AMI_EMU(69)@2c36661cae0d: AMI rx: '"Event: AuthRequest\r\nPrivilege: <none>\r\nRegistration: volte_ims\r\nAlgorithm: AKAv1-MD5\r\nRAND: d5d5de2bce418d7865ed7fa6956618a2\r\nAUTN: d42e61db5f15800067393a5b7691a227\r\n\r\n"'
Asterisk_Tests_AMI_EMU(69)@2c36661cae0d: AMI buf: '"Event: AuthRequest\r\nPrivilege: <none>\r\nRegistration: volte_ims\r\nAlgorithm: AKAv1-MD5\r\nRAND: d5d5de2bce418d7865ed7fa6956618a2\r\nAUTN: d42e61db5f15800067393a5b7691a227\r\n\r\n"'
Asterisk_Tests_AMI_EMU(69)@2c36661cae0d: AMI split: { "Event: AuthRequest\r\nPrivilege: <none>\r\nRegistration: volte_ims\r\nAlgorithm: AKAv1-MD5\r\nRAND: d5d5de2bce418d7865ed7fa6956618a2\r\nAUTN: d42e61db5f15800067393a5b7691a227" }
Asterisk_Tests_AMI_EMU(69)@2c36661cae0d: AMI dec: '"Event: AuthRequest\r\nPrivilege: <none>\r\nRegistration: volte_ims\r\nAlgorithm: AKAv1-MD5\r\nRAND: d5d5de2bce418d7865ed7fa6956618a2\r\nAUTN: d42e61db5f15800067393a5b7691a227\r\n"'
Asterisk_Tests_AMI_EMU(69)@2c36661cae0d: AMI patched dec: '"Event: AuthRequest\r\nPrivilege: <none>\r\nRegistration: volte_ims\r\nAlgorithm: AKAv1-MD5\r\nRAND: d5d5de2bce418d7865ed7fa6956618a2\r\nAUTN: d42e61db5f15800067393a5b7691a227\r\n"'
Asterisk_Tests_AMI_EMU(69)@2c36661cae0d: AMI remain buf: '""'
Asterisk_Tests_AMI_EMU(69)@2c36661cae0d: AMI rx: '"Response: Success\r\nActionID: 847699E2325C2D73\r\nMessage: AuthResponse sent\r\n\r\n"'
Asterisk_Tests_AMI_EMU(69)@2c36661cae0d: AMI buf: '"Response: Success\r\nActionID: 847699E2325C2D73\r\nMessage: AuthResponse sent\r\n\r\n"'
Asterisk_Tests_AMI_EMU(69)@2c36661cae0d: AMI split: { "Response: Success\r\nActionID: 847699E2325C2D73\r\nMessage: AuthResponse sent" }
Asterisk_Tests_AMI_EMU(69)@2c36661cae0d: AMI dec: '"Response: Success\r\nActionID: 847699E2325C2D73\r\nMessage: AuthResponse sent\r\n"'
Asterisk_Tests_AMI_EMU(69)@2c36661cae0d: AMI patched dec: '"Response: Success\r\nActionID: 847699E2325C2D73\r\nMessage: AuthResponse sent\r\n"'
Asterisk_Tests_AMI_EMU(69)@2c36661cae0d: AMI remain buf: '""'
TC_ims_call_mt-IMS_ConnHdlr-238010000090828(72)@2c36661cae0d: A1-octpwd: md5('32333830313030303030393038323840696D732E6D6E633030312E6D63633233382E336770706E6574776F726B2E6F72673A696D732E6D6E633030312E6D63633233382E336770706E6574776F726B2E6F72673A6F2556BBE4366AB1'O) = "166349de6fc5125bcf595875459f9ad1"
TC_ims_call_mt-IMS_ConnHdlr-238010000090828(72)@2c36661cae0d: A2: md5("REGISTER:sip:ims.mnc001.mcc238.3gppnetwork.org") = "7207ad0e603a41bb10153473e9ce7c33"
TC_ims_call_mt-IMS_ConnHdlr-238010000090828(72)@2c36661cae0d: "Request-Digest: md5(\"166349de6fc5125bcf595875459f9ad1:1dXeK85BjXhl7X+mlWYYotQuYdtfFYAAZzk6W3aRoic=:00000001:839a347c889142fe9d3477eff2e0390e:auth:7207ad0e603a41bb10153473e9ce7c33\") = \"e3a5826c4dc58fb1c986c1df8550936c\""
TC_ims_call_mt-IMS_ConnHdlr-238010000090828(72)@2c36661cae0d: setverdict(pass): none -> pass
Asterisk_Tests_AMI_EMU(69)@2c36661cae0d: AMI rx: '"Event: Registry\r\nPrivilege: system,all\r\nChannelType: PJSIP\r\nUsername: sip:238010000090828@ims.mnc001.mcc238.3gppnetwork.org\r\nDomain: sip:ims.mnc001.mcc238.3gppnetwork.org\r\nStatus: Registered\r\n\r\n"'
Asterisk_Tests_AMI_EMU(69)@2c36661cae0d: AMI buf: '"Event: Registry\r\nPrivilege: system,all\r\nChannelType: PJSIP\r\nUsername: sip:238010000090828@ims.mnc001.mcc238.3gppnetwork.org\r\nDomain: sip:ims.mnc001.mcc238.3gppnetwork.org\r\nStatus: Registered\r\n\r\n"'
Asterisk_Tests_AMI_EMU(69)@2c36661cae0d: AMI split: { "Event: Registry\r\nPrivilege: system,all\r\nChannelType: PJSIP\r\nUsername: sip:238010000090828@ims.mnc001.mcc238.3gppnetwork.org\r\nDomain: sip:ims.mnc001.mcc238.3gppnetwork.org\r\nStatus: Registered" }
Asterisk_Tests_AMI_EMU(69)@2c36661cae0d: AMI dec: '"Event: Registry\r\nPrivilege: system,all\r\nChannelType: PJSIP\r\nUsername: sip:238010000090828@ims.mnc001.mcc238.3gppnetwork.org\r\nDomain: sip:ims.mnc001.mcc238.3gppnetwork.org\r\nStatus: Registered\r\n"'
Asterisk_Tests_AMI_EMU(69)@2c36661cae0d: AMI patched dec: '"Event: Registry\r\nPrivilege: system,all\r\nChannelType: PJSIP\r\nUsername: sip:238010000090828@ims.mnc001.mcc238.3gppnetwork.org\r\nDomain: sip:ims.mnc001.mcc238.3gppnetwork.org\r\nStatus: Registered\r\n"'
Asterisk_Tests_AMI_EMU(69)@2c36661cae0d: AMI remain buf: '""'
Asterisk_Tests_IMS_SIP_EMU(71)@2c36661cae0d: Added SIP Call Table entry [1] for "2FC287388E34F99" at TC_ims_call_mt-IMS_ConnHdlr-238010000090828(72)
TC_ims_call_mt-IMS_ConnHdlr-238010000090828(72)@2c36661cae0d: Ignoring { statusLine := { sipVersion := "SIP/2.0", statusCode := 100, reasonPhrase := "Trying" }, msgHeader := { accept := omit, accept_contact := omit, acceptEncoding := omit, acceptLanguage := omit, acceptResourcePriority := omit, alertInfo := omit, alert_mode := omit, allow := omit, allow_events := omit, answer_mode := omit, authenticationInfo := omit, authorization := omit, callId := { fieldName := CALL_ID_E (12), callid := "2FC287388E34F99" }, callInfo := omit, contact := omit, contentDisposition := omit, contentEncoding := omit, contentLanguage := omit, contentLength := { fieldName := CONTENT_LENGTH_E (18), len := 0 }, contentType := omit, cSeq := { fieldName := CSEQ_E (20), seqNumber := 2064247995, method := "INVITE" }, date := omit, diversion := omit, errorInfo := omit, event := omit, expires := omit, feature_caps := omit, fromField := { fieldName := FROM_E (27), addressField := { nameAddr := { displayName := omit, addrSpec := { scheme := "sip", userInfo := { userOrTelephoneSubscriber := "90829", password := omit }, hostPort := { host := "ims.mnc001.mcc238.3gppnetwork.org", portField := omit }, urlParameters := omit, headers := omit } } }, fromParams := { { id := "tag", paramValue := "2E4B9742-6D429331" } } }, geolocation := omit, geolocation_routing := omit, geolocation_error := omit, historyInfo := omit, info_Package := omit, inReplyTo := omit, join := omit, maxForwards := omit, mimeVersion := omit, minExpires := omit, min_SE := omit, organization := omit, p_access_network_info := omit, p_alerting_mode := omit, p_answer_state := omit, p_Area_Info := omit, passertedID := omit, p_asserted_service := omit, p_associated_uri := omit, p_called_party_id := omit, p_charging_function_address := omit, p_charging_vector := omit, p_DCS_trace_pty_id := omit, p_DCS_OSPS := omit, p_DCS_billing_info := omit, p_DCS_LAES := omit, p_DCS_redirect := omit, p_Early_Media := omit, p_last_access_network_info := omit, p_media_auth := omit, ppreferredID := omit, p_preferred_service := omit, p_profile_key := omit, p_served_user := omit, p_Service_Indication := omit, p_Service_Notification := omit, p_user_database := omit, p_visited_network_id := omit, path := omit, priv_answer_mode := omit, priority := omit, privacy := omit, proxyAuthenticate := omit, proxyAuthorization := omit, proxyRequire := omit, rack := omit, rseq := omit, reason := omit, recordRoute := omit, recv_Info := omit, reject_contact := omit, refer_sub := omit, refer_to := omit, referred_by := omit, replyTo := omit, replaces := omit, require := omit, request_disp := omit, resourcePriority := omit, retryAfter := omit, route := omit, security_client := omit, security_server := omit, security_verify := omit, session_expires := omit, session_id := omit, server := { fieldName := SERVER_E (94), serverBody := { "Asterisk", "PBX", "20.7.0" } }, service_route := omit, sip_ETag := omit, sip_If_Match := omit, subject := omit, subscription_state := omit, supported := omit, target_dialog := omit, timestamp := omit, toField := { fieldName := TO_E (103), addressField := { nameAddr := { displayName := omit, addrSpec := { scheme := "sip", userInfo := { userOrTelephoneSubscriber := "90828", password := omit }, hostPort := { host := "ims.mnc001.mcc238.3gppnetwork.org", portField := omit }, urlParameters := omit, headers := omit } } }, toParams := omit }, unsupported := omit, userAgent := omit, via := { fieldName := VIA_E (106), viaBody := { { sentProtocol := { protocolName := "SIP", protocolVersion := "2.0", transport := "UDP" }, sentBy := { host := "172.18.69.104", portField := 5060 }, viaParams := { { id := "rport", paramValue := "5060" }, { id := "received", paramValue := "172.18.69.104" }, { id := "branch", paramValue := "z9hG4bK18A0C7A51981C9EBD6D6443AF5532799" } } } } }, warning := omit, wwwAuthenticate := omit, x_AUT := omit, x_Carrier_Info := omit, x_CHGDelay := omit, x_CHGInfo := omit, x_FCI := omit, undefinedHeader_List := omit }, messageBody := omit, payload := omit }
MTC@2c36661cae0d: setverdict(fail): none -> fail reason: ""AMI_Functions.ttcn:704 : AMI msg timeout: superset({ key := pattern @nocase \"Event\", val := \"Newchannel\" }, { key := pattern @nocase \"Context\", val := \"volte_ims\" })"", new component reason: ""AMI_Functions.ttcn:704 : AMI msg timeout: superset({ key := pattern @nocase \"Event\", val := \"Newchannel\" }, { key := pattern @nocase \"Context\", val := \"volte_ims\" })""
MTC@2c36661cae0d: Stopping testcase execution from "AMI_Functions.ttcn":704
Asterisk_Tests_LOCAL_SIP_EMU(70)@2c36661cae0d: Final verdict of PTC: none
Asterisk_Tests_AMI_EMU(69)@2c36661cae0d: Final verdict of PTC: none
TC_ims_call_mt-IMS_ConnHdlr-238010000090828(72)@2c36661cae0d: Final verdict of PTC: pass
TC_ims_call_mt-ConnHdlr-0501(73)@2c36661cae0d: Final verdict of PTC: none
Asterisk_Tests_IMS_SIP_EMU(71)@2c36661cae0d: Final verdict of PTC: none
MTC@2c36661cae0d: Setting final verdict of the test case.
MTC@2c36661cae0d: Local verdict of MTC: fail reason: ""AMI_Functions.ttcn:704 : AMI msg timeout: superset({ key := pattern @nocase \"Event\", val := \"Newchannel\" }, { key := pattern @nocase \"Context\", val := \"volte_ims\" })""
MTC@2c36661cae0d: Local verdict of PTC Asterisk_Tests_AMI_EMU(69): none (fail -> fail)
MTC@2c36661cae0d: Local verdict of PTC Asterisk_Tests_LOCAL_SIP_EMU(70): none (fail -> fail)
MTC@2c36661cae0d: Local verdict of PTC Asterisk_Tests_IMS_SIP_EMU(71): none (fail -> fail)
MTC@2c36661cae0d: Local verdict of PTC TC_ims_call_mt-IMS_ConnHdlr-238010000090828(72): pass (fail -> fail)
MTC@2c36661cae0d: Local verdict of PTC TC_ims_call_mt-ConnHdlr-0501(73): none (fail -> fail)
MTC@2c36661cae0d: Test case TC_ims_call_mt finished. Verdict: fail reason: "AMI_Functions.ttcn:704 : AMI msg timeout: superset({ key := pattern @nocase \"Event\", val := \"Newchannel\" }, { key := pattern @nocase \"Context\", val := \"volte_ims\" })"
MTC@2c36661cae0d: Starting external command `../ttcn3-tcpdump-stop.sh Asterisk_Tests.TC_ims_call_mt fail'.
Mon Jul  1 07:46:48 UTC 2024
------ Asterisk_Tests.TC_ims_call_mt fail ------

Waiting for packet dumper to finish... 0 (prev_count=-1, count=19380)
Waiting for packet dumper to finish... 1 (prev_count=19380, count=20388)
MTC@2c36661cae0d: External command `../ttcn3-tcpdump-stop.sh Asterisk_Tests.TC_ims_call_mt fail' was executed successfully (exit status: 0).
MTC@2c36661cae0d: Starting external command `../ttcn3-tcpdump-start.sh Asterisk_Tests.TC_ims_call_mt_noprecondition'.
------ Asterisk_Tests.TC_ims_call_mt_noprecondition ------
Mon Jul  1 07:46:50 UTC 2024
NOTE: unable to use dumpcap due to missing permissions in /data
 /usr/bin/tcpdump -U -s 1520 -n -i any -w "/data/Asterisk_Tests.TC_ims_call_mt_noprecondition.pcap" >/data/Asterisk_Tests.TC_ims_call_mt_noprecondition.pcap.stdout 2>/tmp/cmderr &
Waiting for packet dumper to start... 0
MTC@2c36661cae0d: External command `../ttcn3-tcpdump-start.sh Asterisk_Tests.TC_ims_call_mt_noprecondition' was executed successfully (exit status: 0).
MTC@2c36661cae0d: Test case TC_ims_call_mt_noprecondition started.
Asterisk_Tests_AMI_EMU(74)@2c36661cae0d: AMI connected, ConnId=1
Asterisk_Tests_AMI_EMU(74)@2c36661cae0d: Warning: There is no GetMsgLen function registered for connId: 1. The messages will not be dissected on this connection! This warning is logged only once per testport.
Asterisk_Tests_AMI_EMU(74)@2c36661cae0d: AMI Welcome message received: '"Asterisk Call Manager/9.0.0\r\n"'
Asterisk_Tests_AMI_EMU(74)@2c36661cae0d: AMI rx: '"Response: Success\r\nActionID: 974C41C9A97CA5F2\r\nMessage: Authentication accepted\r\n\r\n"'
Asterisk_Tests_AMI_EMU(74)@2c36661cae0d: AMI buf: '"Response: Success\r\nActionID: 974C41C9A97CA5F2\r\nMessage: Authentication accepted\r\n\r\n"'
Asterisk_Tests_AMI_EMU(74)@2c36661cae0d: AMI split: { "Response: Success\r\nActionID: 974C41C9A97CA5F2\r\nMessage: Authentication accepted" }
Asterisk_Tests_AMI_EMU(74)@2c36661cae0d: AMI dec: '"Response: Success\r\nActionID: 974C41C9A97CA5F2\r\nMessage: Authentication accepted\r\n"'
Asterisk_Tests_AMI_EMU(74)@2c36661cae0d: AMI patched dec: '"Response: Success\r\nActionID: 974C41C9A97CA5F2\r\nMessage: Authentication accepted\r\n"'
Asterisk_Tests_AMI_EMU(74)@2c36661cae0d: AMI remain buf: '""'
Asterisk_Tests_AMI_EMU(74)@2c36661cae0d: AMI rx: '"Event: FullyBooted\r\nPrivilege: system,all\r\nUptime: 361\r\nLastReload: 361\r\nStatus: Fully Booted\r\n\r\nEvent: SuccessfulAuth\r\nPrivilege: security,all\r\nEventTV: 2024-07-01T07:46:51.048+0000\r\nSeverity: Informational\r\nService: AMI\r\nEventVersion: 1\r\nAccountID: test_user\r\nSessionID: 0x7f2478001090\r\nLocalAddress: IPV4/TCP/172.18.69.10/5038\r\nRemoteAddress: IPV4/TCP/172.18.69.103/40727\r\nUsingPassword: 0\r\nSessionTV: 2024-07-01T07:46:51.048+0000\r\n\r\n"'
Asterisk_Tests_AMI_EMU(74)@2c36661cae0d: AMI buf: '"Event: FullyBooted\r\nPrivilege: system,all\r\nUptime: 361\r\nLastReload: 361\r\nStatus: Fully Booted\r\n\r\nEvent: SuccessfulAuth\r\nPrivilege: security,all\r\nEventTV: 2024-07-01T07:46:51.048+0000\r\nSeverity: Informational\r\nService: AMI\r\nEventVersion: 1\r\nAccountID: test_user\r\nSessionID: 0x7f2478001090\r\nLocalAddress: IPV4/TCP/172.18.69.10/5038\r\nRemoteAddress: IPV4/TCP/172.18.69.103/40727\r\nUsingPassword: 0\r\nSessionTV: 2024-07-01T07:46:51.048+0000\r\n\r\n"'
Asterisk_Tests_AMI_EMU(74)@2c36661cae0d: AMI split: { "Event: FullyBooted\r\nPrivilege: system,all\r\nUptime: 361\r\nLastReload: 361\r\nStatus: Fully Booted", "Event: SuccessfulAuth\r\nPrivilege: security,all\r\nEventTV: 2024-07-01T07:46:51.048+0000\r\nSeverity: Informational\r\nService: AMI\r\nEventVersion: 1\r\nAccountID: test_user\r\nSessionID: 0x7f2478001090\r\nLocalAddress: IPV4/TCP/172.18.69.10/5038\r\nRemoteAddress: IPV4/TCP/172.18.69.103/40727\r\nUsingPassword: 0\r\nSessionTV: 2024-07-01T07:46:51.048+0000" }
Asterisk_Tests_AMI_EMU(74)@2c36661cae0d: AMI dec: '"Event: FullyBooted\r\nPrivilege: system,all\r\nUptime: 361\r\nLastReload: 361\r\nStatus: Fully Booted\r\n"'
Asterisk_Tests_AMI_EMU(74)@2c36661cae0d: AMI patched dec: '"Event: FullyBooted\r\nPrivilege: system,all\r\nUptime: 361\r\nLastReload: 361\r\nStatus: Fully Booted\r\n"'
Asterisk_Tests_AMI_EMU(74)@2c36661cae0d: AMI dec: '"Event: SuccessfulAuth\r\nPrivilege: security,all\r\nEventTV: 2024-07-01T07:46:51.048+0000\r\nSeverity: Informational\r\nService: AMI\r\nEventVersion: 1\r\nAccountID: test_user\r\nSessionID: 0x7f2478001090\r\nLocalAddress: IPV4/TCP/172.18.69.10/5038\r\nRemoteAddress: IPV4/TCP/172.18.69.103/40727\r\nUsingPassword: 0\r\nSessionTV: 2024-07-01T07:46:51.048+0000\r\n"'
Asterisk_Tests_AMI_EMU(74)@2c36661cae0d: AMI patched dec: '"Event: SuccessfulAuth\r\nPrivilege: security,all\r\nEventTV: 2024-07-01T07:46:51.048+0000\r\nSeverity: Informational\r\nService: AMI\r\nEventVersion: 1\r\nAccountID: test_user\r\nSessionID: 0x7f2478001090\r\nLocalAddress: IPV4/TCP/172.18.69.10/5038\r\nRemoteAddress: IPV4/TCP/172.18.69.103/40727\r\nUsingPassword: 0\r\nSessionTV: 2024-07-01T07:46:51.048+0000\r\n"'
Asterisk_Tests_AMI_EMU(74)@2c36661cae0d: AMI remain buf: '""'
Asterisk_Tests_LOCAL_SIP_EMU(75)@2c36661cae0d: Warning: The maximum number of open file descriptors (100000) is greater than FD_SETSIZE (1024). Ensure that Test Ports using Install_Handler do not try to wait for events of file descriptors with values greater than FD_SETSIZE (1024). (Current caller of Install_Handler is "SIP")
Asterisk_Tests_IMS_SIP_EMU(76)@2c36661cae0d: Warning: The maximum number of open file descriptors (100000) is greater than FD_SETSIZE (1024). Ensure that Test Ports using Install_Handler do not try to wait for events of file descriptors with values greater than FD_SETSIZE (1024). (Current caller of Install_Handler is "SIP")
MTC@2c36661cae0d: end of f_init
Asterisk_Tests_IMS_SIP_EMU(76)@2c36661cae0d: Created SipExpect[0] for { scheme := "sip", userInfo := { userOrTelephoneSubscriber := "238010000090828", password := omit }, hostPort := { host := "ims.mnc001.mcc238.3gppnetwork.org", portField := omit }, urlParameters := omit, headers := omit } to be handled at TC_ims_call_mt_noprecondition-IMS_ConnHdlr-238010000090828(77)
Asterisk_Tests_LOCAL_SIP_EMU(75)@2c36661cae0d: Created SipExpect[0] for { scheme := "sip", userInfo := { userOrTelephoneSubscriber := "0501", password := omit }, hostPort := { host := "172.18.69.103", portField := omit }, urlParameters := omit, headers := omit } to be handled at TC_ims_call_mt_noprecondition-ConnHdlr-0501(78)
Asterisk_Tests_LOCAL_SIP_EMU(75)@2c36661cae0d: Added SIP Call Table entry [0] for "7D9666C8C5B4365@172.18.69.103" at TC_ims_call_mt_noprecondition-ConnHdlr-0501(78)
Asterisk_Tests_AMI_EMU(74)@2c36661cae0d: AMI rx: '"Event: ChallengeSent\r\nPrivilege: security,all\r\nEventTV: 2024-07-01T07:46:51.085+0000\r\nSeverity: Informational\r\nService: PJSIP\r\nEventVersion: 1\r\nAccountID: 0501\r\nSessionID: 7D9666C8C5B4365@172.18.69.103\r\nLocalAddress: IPV4/UDP/172.18.69.10/5094\r\nRemoteAddress: IPV4/UDP/172.18.69.103/5061\r\nChallenge: \r\n\r\n"'
Asterisk_Tests_AMI_EMU(74)@2c36661cae0d: AMI buf: '"Event: ChallengeSent\r\nPrivilege: security,all\r\nEventTV: 2024-07-01T07:46:51.085+0000\r\nSeverity: Informational\r\nService: PJSIP\r\nEventVersion: 1\r\nAccountID: 0501\r\nSessionID: 7D9666C8C5B4365@172.18.69.103\r\nLocalAddress: IPV4/UDP/172.18.69.10/5094\r\nRemoteAddress: IPV4/UDP/172.18.69.103/5061\r\nChallenge: \r\n\r\n"'
Asterisk_Tests_AMI_EMU(74)@2c36661cae0d: AMI split: { "Event: ChallengeSent\r\nPrivilege: security,all\r\nEventTV: 2024-07-01T07:46:51.085+0000\r\nSeverity: Informational\r\nService: PJSIP\r\nEventVersion: 1\r\nAccountID: 0501\r\nSessionID: 7D9666C8C5B4365@172.18.69.103\r\nLocalAddress: IPV4/UDP/172.18.69.10/5094\r\nRemoteAddress: IPV4/UDP/172.18.69.103/5061\r\nChallenge: " }
Asterisk_Tests_AMI_EMU(74)@2c36661cae0d: AMI dec: '"Event: ChallengeSent\r\nPrivilege: security,all\r\nEventTV: 2024-07-01T07:46:51.085+0000\r\nSeverity: Informational\r\nService: PJSIP\r\nEventVersion: 1\r\nAccountID: 0501\r\nSessionID: 7D9666C8C5B4365@172.18.69.103\r\nLocalAddress: IPV4/UDP/172.18.69.10/5094\r\nRemoteAddress: IPV4/UDP/172.18.69.103/5061\r\nChallenge: \r\n"'
Asterisk_Tests_AMI_EMU(74)@2c36661cae0d: AMI patched dec: '"Event: ChallengeSent\r\nPrivilege: security,all\r\nEventTV: 2024-07-01T07:46:51.085+0000\r\nSeverity: Informational\r\nService: PJSIP\r\nEventVersion: 1\r\nAccountID: 0501\r\nSessionID: 7D9666C8C5B4365@172.18.69.103\r\nLocalAddress: IPV4/UDP/172.18.69.10/5094\r\nRemoteAddress: IPV4/UDP/172.18.69.103/5061\r\n"'
TC_ims_call_mt_noprecondition-ConnHdlr-0501(78)@2c36661cae0d: A1: md5("0501:asterisk:secret") = "a34a6b1c4db97fc1991e36119c482192"
TC_ims_call_mt_noprecondition-ConnHdlr-0501(78)@2c36661cae0d: A2: md5("REGISTER:sip:172.18.69.10") = "040f3459c8765eb0deb3b33d81871014"
TC_ims_call_mt_noprecondition-ConnHdlr-0501(78)@2c36661cae0d: "Request-Digest: md5(\"a34a6b1c4db97fc1991e36119c482192:1719820011/381c6cda7268809a195459645e7bc425:00000001:0a4f113b:auth:040f3459c8765eb0deb3b33d81871014\") = \"896bc8785ed93518a90cdc0624df93ed\""
Asterisk_Tests_AMI_EMU(74)@2c36661cae0d: AMI remain buf: '""'
Asterisk_Tests_AMI_EMU(74)@2c36661cae0d: AMI rx: '"Event: SuccessfulAuth\r\nPrivilege: security,all\r\nEventTV: 2024-07-01T07:46:51.096+0000\r\nSeverity: Informational\r\nService: PJSIP\r\nEventVersion: 1\r\nAccountID: 0501\r\nSessionID: 7D9666C8C5B4365@172.18.69.103\r\nLocalAddress: IPV4/UDP/172.18.69.10/5094\r\nRemoteAddress: IPV4/UDP/172.18.69.103/5061\r\nUsingPassword: 1\r\n\r\n"'
Asterisk_Tests_AMI_EMU(74)@2c36661cae0d: AMI buf: '"Event: SuccessfulAuth\r\nPrivilege: security,all\r\nEventTV: 2024-07-01T07:46:51.096+0000\r\nSeverity: Informational\r\nService: PJSIP\r\nEventVersion: 1\r\nAccountID: 0501\r\nSessionID: 7D9666C8C5B4365@172.18.69.103\r\nLocalAddress: IPV4/UDP/172.18.69.10/5094\r\nRemoteAddress: IPV4/UDP/172.18.69.103/5061\r\nUsingPassword: 1\r\n\r\n"'
Asterisk_Tests_AMI_EMU(74)@2c36661cae0d: AMI split: { "Event: SuccessfulAuth\r\nPrivilege: security,all\r\nEventTV: 2024-07-01T07:46:51.096+0000\r\nSeverity: Informational\r\nService: PJSIP\r\nEventVersion: 1\r\nAccountID: 0501\r\nSessionID: 7D9666C8C5B4365@172.18.69.103\r\nLocalAddress: IPV4/UDP/172.18.69.10/5094\r\nRemoteAddress: IPV4/UDP/172.18.69.103/5061\r\nUsingPassword: 1" }
Asterisk_Tests_AMI_EMU(74)@2c36661cae0d: AMI dec: '"Event: SuccessfulAuth\r\nPrivilege: security,all\r\nEventTV: 2024-07-01T07:46:51.096+0000\r\nSeverity: Informational\r\nService: PJSIP\r\nEventVersion: 1\r\nAccountID: 0501\r\nSessionID: 7D9666C8C5B4365@172.18.69.103\r\nLocalAddress: IPV4/UDP/172.18.69.10/5094\r\nRemoteAddress: IPV4/UDP/172.18.69.103/5061\r\nUsingPassword: 1\r\n"'
Asterisk_Tests_AMI_EMU(74)@2c36661cae0d: AMI patched dec: '"Event: SuccessfulAuth\r\nPrivilege: security,all\r\nEventTV: 2024-07-01T07:46:51.096+0000\r\nSeverity: Informational\r\nService: PJSIP\r\nEventVersion: 1\r\nAccountID: 0501\r\nSessionID: 7D9666C8C5B4365@172.18.69.103\r\nLocalAddress: IPV4/UDP/172.18.69.10/5094\r\nRemoteAddress: IPV4/UDP/172.18.69.103/5061\r\nUsingPassword: 1\r\n"'
Asterisk_Tests_AMI_EMU(74)@2c36661cae0d: AMI remain buf: '""'
Asterisk_Tests_AMI_EMU(74)@2c36661cae0d: AMI rx: '"Response: Success\r\nActionID: 6807D047A145CAD7\r\nMessage: Access Network Info set\r\n\r\n"'
Asterisk_Tests_AMI_EMU(74)@2c36661cae0d: AMI buf: '"Response: Success\r\nActionID: 6807D047A145CAD7\r\nMessage: Access Network Info set\r\n\r\n"'
Asterisk_Tests_AMI_EMU(74)@2c36661cae0d: AMI split: { "Response: Success\r\nActionID: 6807D047A145CAD7\r\nMessage: Access Network Info set" }
Asterisk_Tests_AMI_EMU(74)@2c36661cae0d: AMI dec: '"Response: Success\r\nActionID: 6807D047A145CAD7\r\nMessage: Access Network Info set\r\n"'
Asterisk_Tests_AMI_EMU(74)@2c36661cae0d: AMI patched dec: '"Response: Success\r\nActionID: 6807D047A145CAD7\r\nMessage: Access Network Info set\r\n"'
Asterisk_Tests_AMI_EMU(74)@2c36661cae0d: AMI remain buf: '""'
Asterisk_Tests_AMI_EMU(74)@2c36661cae0d: AMI rx: '"Response: Success\r\nActionID: C3EB589D46882E84\r\nMessage: Reregistration sent\r\n\r\n"'
Asterisk_Tests_AMI_EMU(74)@2c36661cae0d: AMI buf: '"Response: Success\r\nActionID: C3EB589D46882E84\r\nMessage: Reregistration sent\r\n\r\n"'
Asterisk_Tests_AMI_EMU(74)@2c36661cae0d: AMI split: { "Response: Success\r\nActionID: C3EB589D46882E84\r\nMessage: Reregistration sent" }
Asterisk_Tests_AMI_EMU(74)@2c36661cae0d: AMI dec: '"Response: Success\r\nActionID: C3EB589D46882E84\r\nMessage: Reregistration sent\r\n"'
Asterisk_Tests_AMI_EMU(74)@2c36661cae0d: AMI patched dec: '"Response: Success\r\nActionID: C3EB589D46882E84\r\nMessage: Reregistration sent\r\n"'
Asterisk_Tests_AMI_EMU(74)@2c36661cae0d: AMI remain buf: '""'
Asterisk_Tests_IMS_SIP_EMU(76)@2c36661cae0d: Found SipExpect[0] for { scheme := "sip", userInfo := { userOrTelephoneSubscriber := "238010000090828", password := omit }, hostPort := { host := "ims.mnc001.mcc238.3gppnetwork.org", portField := omit }, urlParameters := omit, headers := omit } handled at TC_ims_call_mt_noprecondition-IMS_ConnHdlr-238010000090828(77)
Asterisk_Tests_IMS_SIP_EMU(76)@2c36661cae0d: Added SIP Call Table entry [0] for "7225aeda-6282-4837-b588-f5425e9c21b9" at TC_ims_call_mt_noprecondition-IMS_ConnHdlr-238010000090828(77)
TC_ims_call_mt_noprecondition-IMS_ConnHdlr-238010000090828(77)@2c36661cae0d: Skipping Security Mechansim Algo: "hmac-md5-96"
TC_ims_call_mt_noprecondition-IMS_ConnHdlr-238010000090828(77)@2c36661cae0d: ipsec: remote_spi_c=1074441914 remote_spi_s=3234185780local_spi_c=4142 local_spi_s=4143
TC_ims_call_mt_noprecondition-IMS_ConnHdlr-238010000090828(77)@2c36661cae0d: Executing: "/osmo-ttcn3-hacks/asterisk/IMS_ipsec_setup.sh 172.18.69.104 5060 4142 5060 4143 172.18.69.10 5557 1074441914 5063 3234185780 0x17141862125bd30c81c4224391a0909a00000000"
TC_ims_call_mt_noprecondition-IMS_ConnHdlr-238010000090828(77)@2c36661cae0d: Result: { stdout := "", stderr := "+ ip xfrm policy flush\n+ ip xfrm state flush\n+ ip_xfrm_state 172.18.69.104 5060 172.18.69.10 5557 1074441914\n+ ip xfrm state add src 172.18.69.104 dst 172.18.69.10 proto esp spi 1074441914 reqid 1074441914 mode transport replay-window 32 auth-trunc sha1 0x17141862125bd30c81c4224391a0909a00000000 96 enc cipher_null  sel src 172.18.69.104/32 dst 172.18.69.10/32 sport 5060 dport 5557\n+ ip_xfrm_state 172.18.69.104 5060 172.18.69.10 5063 3234185780\n+ ip xfrm state add src 172.18.69.104 dst 172.18.69.10 proto esp spi 3234185780 reqid 3234185780 mode transport replay-window 32 auth-trunc sha1 0x17141862125bd30c81c4224391a0909a00000000 96 enc cipher_null  sel src 172.18.69.104/32 dst 172.18.69.10/32 sport 5060 dport 5063\n+ ip_xfrm_state 172.18.69.10 5557 172.18.69.104 5060 4143\n+ ip xfrm state add src 172.18.69.10 dst 172.18.69.104 proto esp spi 4143 reqid 4143 mode transport replay-window 32 auth-trunc sha1 0x17141862125bd30c81c4224391a0909a00000000 96 enc cipher_null  sel src 172.18.69.10/32 dst 172.18.69.104/32 sport 5557 dport 5060\n+ ip_xfrm_state 172.18.69.10 5063 172.18.69.104 5060 4142\n+ ip xfrm state add src 172.18.69.10 dst 172.18.69.104 proto esp spi 4142 reqid 4142 mode transport replay-window 32 auth-trunc sha1 0x17141862125bd30c81c4224391a0909a00000000 96 enc cipher_null  sel src 172.18.69.10/32 dst 172.18.69.104/32 sport 5063 dport 5060\n+ ip_xfrm_policy 172.18.69.104 5060 172.18.69.10 5557 1074441914 out\n+ ip xfrm policy add src 172.18.69.104/32 dst 172.18.69.10/32 sport 5060 dport 5557 dir out tmpl src 172.18.69.104 dst 172.18.69.10 proto esp reqid 1074441914 mode transport\n+ ip_xfrm_policy 172.18.69.104 5060 172.18.69.10 5063 3234185780 out\n+ ip xfrm policy add src 172.18.69.104/32 dst 172.18.69.10/32 sport 5060 dport 5063 dir out tmpl src 172.18.69.104 dst 172.18.69.10 proto esp reqid 3234185780 mode transport\n+ ip_xfrm_policy 172.18.69.10 5557 172.18.69.104 5060 4143 in\n+ ip xfrm policy add src 172.18.69.10/32 dst 172.18.69.104/32 sport 5557 dport 5060 dir in tmpl src 172.18.69.10 dst 172.18.69.104 proto esp reqid 4143 mode transport\n+ ip_xfrm_policy 172.18.69.10 5063 172.18.69.104 5060 4142 in\n+ ip xfrm policy add src 172.18.69.10/32 dst 172.18.69.104/32 sport 5063 dport 5060 dir in tmpl src 172.18.69.10 dst 172.18.69.104 proto esp reqid 4142 mode transport", code := 0 }
TC_ims_call_mt_noprecondition-IMS_ConnHdlr-238010000090828(77)@2c36661cae0d: rand='D5D5DE2BCE418D7865ED7FA6956618A2'O & autn='D42E61DB5F15800067393A5B7691A227'O => nonce="1dXeK85BjXhl7X+mlWYYotQuYdtfFYAAZzk6W3aRoic="
Asterisk_Tests_AMI_EMU(74)@2c36661cae0d: AMI rx: '"Event: AuthRequest\r\nPrivilege: <none>\r\nRegistration: volte_ims\r\nAlgorithm: AKAv1-MD5\r\nRAND: d5d5de2bce418d7865ed7fa6956618a2\r\nAUTN: d42e61db5f15800067393a5b7691a227\r\n\r\n"'
Asterisk_Tests_AMI_EMU(74)@2c36661cae0d: AMI buf: '"Event: AuthRequest\r\nPrivilege: <none>\r\nRegistration: volte_ims\r\nAlgorithm: AKAv1-MD5\r\nRAND: d5d5de2bce418d7865ed7fa6956618a2\r\nAUTN: d42e61db5f15800067393a5b7691a227\r\n\r\n"'
Asterisk_Tests_AMI_EMU(74)@2c36661cae0d: AMI split: { "Event: AuthRequest\r\nPrivilege: <none>\r\nRegistration: volte_ims\r\nAlgorithm: AKAv1-MD5\r\nRAND: d5d5de2bce418d7865ed7fa6956618a2\r\nAUTN: d42e61db5f15800067393a5b7691a227" }
Asterisk_Tests_AMI_EMU(74)@2c36661cae0d: AMI dec: '"Event: AuthRequest\r\nPrivilege: <none>\r\nRegistration: volte_ims\r\nAlgorithm: AKAv1-MD5\r\nRAND: d5d5de2bce418d7865ed7fa6956618a2\r\nAUTN: d42e61db5f15800067393a5b7691a227\r\n"'
Asterisk_Tests_AMI_EMU(74)@2c36661cae0d: AMI patched dec: '"Event: AuthRequest\r\nPrivilege: <none>\r\nRegistration: volte_ims\r\nAlgorithm: AKAv1-MD5\r\nRAND: d5d5de2bce418d7865ed7fa6956618a2\r\nAUTN: d42e61db5f15800067393a5b7691a227\r\n"'
Asterisk_Tests_AMI_EMU(74)@2c36661cae0d: AMI remain buf: '""'
Asterisk_Tests_AMI_EMU(74)@2c36661cae0d: AMI rx: '"Response: Success\r\nActionID: 078A3A192669D6AD\r\nMessage: AuthResponse sent\r\n\r\n"'
Asterisk_Tests_AMI_EMU(74)@2c36661cae0d: AMI buf: '"Response: Success\r\nActionID: 078A3A192669D6AD\r\nMessage: AuthResponse sent\r\n\r\n"'
Asterisk_Tests_AMI_EMU(74)@2c36661cae0d: AMI split: { "Response: Success\r\nActionID: 078A3A192669D6AD\r\nMessage: AuthResponse sent" }
Asterisk_Tests_AMI_EMU(74)@2c36661cae0d: AMI dec: '"Response: Success\r\nActionID: 078A3A192669D6AD\r\nMessage: AuthResponse sent\r\n"'
Asterisk_Tests_AMI_EMU(74)@2c36661cae0d: AMI patched dec: '"Response: Success\r\nActionID: 078A3A192669D6AD\r\nMessage: AuthResponse sent\r\n"'
Asterisk_Tests_AMI_EMU(74)@2c36661cae0d: AMI remain buf: '""'
TC_ims_call_mt_noprecondition-IMS_ConnHdlr-238010000090828(77)@2c36661cae0d: A1-octpwd: md5('32333830313030303030393038323840696D732E6D6E633030312E6D63633233382E336770706E6574776F726B2E6F72673A696D732E6D6E633030312E6D63633233382E336770706E6574776F726B2E6F72673A6F2556BBE4366AB1'O) = "166349de6fc5125bcf595875459f9ad1"
TC_ims_call_mt_noprecondition-IMS_ConnHdlr-238010000090828(77)@2c36661cae0d: A2: md5("REGISTER:sip:ims.mnc001.mcc238.3gppnetwork.org") = "7207ad0e603a41bb10153473e9ce7c33"
TC_ims_call_mt_noprecondition-IMS_ConnHdlr-238010000090828(77)@2c36661cae0d: "Request-Digest: md5(\"166349de6fc5125bcf595875459f9ad1:1dXeK85BjXhl7X+mlWYYotQuYdtfFYAAZzk6W3aRoic=:00000001:a240646a5b754a859f17cfc14b42ef5b:auth:7207ad0e603a41bb10153473e9ce7c33\") = \"767036e9b29df7b04eaa0f8ecbe6970f\""
TC_ims_call_mt_noprecondition-IMS_ConnHdlr-238010000090828(77)@2c36661cae0d: setverdict(pass): none -> pass
Asterisk_Tests_AMI_EMU(74)@2c36661cae0d: AMI rx: '"Event: Registry\r\nPrivilege: system,all\r\nChannelType: PJSIP\r\nUsername: sip:238010000090828@ims.mnc001.mcc238.3gppnetwork.org\r\nDomain: sip:ims.mnc001.mcc238.3gppnetwork.org\r\nStatus: Registered\r\n\r\n"'
Asterisk_Tests_AMI_EMU(74)@2c36661cae0d: AMI buf: '"Event: Registry\r\nPrivilege: system,all\r\nChannelType: PJSIP\r\nUsername: sip:238010000090828@ims.mnc001.mcc238.3gppnetwork.org\r\nDomain: sip:ims.mnc001.mcc238.3gppnetwork.org\r\nStatus: Registered\r\n\r\n"'
Asterisk_Tests_AMI_EMU(74)@2c36661cae0d: AMI split: { "Event: Registry\r\nPrivilege: system,all\r\nChannelType: PJSIP\r\nUsername: sip:238010000090828@ims.mnc001.mcc238.3gppnetwork.org\r\nDomain: sip:ims.mnc001.mcc238.3gppnetwork.org\r\nStatus: Registered" }
Asterisk_Tests_AMI_EMU(74)@2c36661cae0d: AMI dec: '"Event: Registry\r\nPrivilege: system,all\r\nChannelType: PJSIP\r\nUsername: sip:238010000090828@ims.mnc001.mcc238.3gppnetwork.org\r\nDomain: sip:ims.mnc001.mcc238.3gppnetwork.org\r\nStatus: Registered\r\n"'
Asterisk_Tests_AMI_EMU(74)@2c36661cae0d: AMI patched dec: '"Event: Registry\r\nPrivilege: system,all\r\nChannelType: PJSIP\r\nUsername: sip:238010000090828@ims.mnc001.mcc238.3gppnetwork.org\r\nDomain: sip:ims.mnc001.mcc238.3gppnetwork.org\r\nStatus: Registered\r\n"'
Asterisk_Tests_AMI_EMU(74)@2c36661cae0d: AMI remain buf: '""'
Asterisk_Tests_IMS_SIP_EMU(76)@2c36661cae0d: Added SIP Call Table entry [1] for "A0F71C726AC1692" at TC_ims_call_mt_noprecondition-IMS_ConnHdlr-238010000090828(77)
TC_ims_call_mt_noprecondition-IMS_ConnHdlr-238010000090828(77)@2c36661cae0d: Ignoring { statusLine := { sipVersion := "SIP/2.0", statusCode := 100, reasonPhrase := "Trying" }, msgHeader := { accept := omit, accept_contact := omit, acceptEncoding := omit, acceptLanguage := omit, acceptResourcePriority := omit, alertInfo := omit, alert_mode := omit, allow := omit, allow_events := omit, answer_mode := omit, authenticationInfo := omit, authorization := omit, callId := { fieldName := CALL_ID_E (12), callid := "A0F71C726AC1692" }, callInfo := omit, contact := omit, contentDisposition := omit, contentEncoding := omit, contentLanguage := omit, contentLength := { fieldName := CONTENT_LENGTH_E (18), len := 0 }, contentType := omit, cSeq := { fieldName := CSEQ_E (20), seqNumber := 742491113, method := "INVITE" }, date := omit, diversion := omit, errorInfo := omit, event := omit, expires := omit, feature_caps := omit, fromField := { fieldName := FROM_E (27), addressField := { nameAddr := { displayName := omit, addrSpec := { scheme := "sip", userInfo := { userOrTelephoneSubscriber := "90829", password := omit }, hostPort := { host := "ims.mnc001.mcc238.3gppnetwork.org", portField := omit }, urlParameters := omit, headers := omit } } }, fromParams := { { id := "tag", paramValue := "D0EF6A73-6D42E5E9" } } }, geolocation := omit, geolocation_routing := omit, geolocation_error := omit, historyInfo := omit, info_Package := omit, inReplyTo := omit, join := omit, maxForwards := omit, mimeVersion := omit, minExpires := omit, min_SE := omit, organization := omit, p_access_network_info := omit, p_alerting_mode := omit, p_answer_state := omit, p_Area_Info := omit, passertedID := omit, p_asserted_service := omit, p_associated_uri := omit, p_called_party_id := omit, p_charging_function_address := omit, p_charging_vector := omit, p_DCS_trace_pty_id := omit, p_DCS_OSPS := omit, p_DCS_billing_info := omit, p_DCS_LAES := omit, p_DCS_redirect := omit, p_Early_Media := omit, p_last_access_network_info := omit, p_media_auth := omit, ppreferredID := omit, p_preferred_service := omit, p_profile_key := omit, p_served_user := omit, p_Service_Indication := omit, p_Service_Notification := omit, p_user_database := omit, p_visited_network_id := omit, path := omit, priv_answer_mode := omit, priority := omit, privacy := omit, proxyAuthenticate := omit, proxyAuthorization := omit, proxyRequire := omit, rack := omit, rseq := omit, reason := omit, recordRoute := omit, recv_Info := omit, reject_contact := omit, refer_sub := omit, refer_to := omit, referred_by := omit, replyTo := omit, replaces := omit, require := omit, request_disp := omit, resourcePriority := omit, retryAfter := omit, route := omit, security_client := omit, security_server := omit, security_verify := omit, session_expires := omit, session_id := omit, server := { fieldName := SERVER_E (94), serverBody := { "Asterisk", "PBX", "20.7.0" } }, service_route := omit, sip_ETag := omit, sip_If_Match := omit, subject := omit, subscription_state := omit, supported := omit, target_dialog := omit, timestamp := omit, toField := { fieldName := TO_E (103), addressField := { nameAddr := { displayName := omit, addrSpec := { scheme := "sip", userInfo := { userOrTelephoneSubscriber := "90828", password := omit }, hostPort := { host := "ims.mnc001.mcc238.3gppnetwork.org", portField := omit }, urlParameters := omit, headers := omit } } }, toParams := omit }, unsupported := omit, userAgent := omit, via := { fieldName := VIA_E (106), viaBody := { { sentProtocol := { protocolName := "SIP", protocolVersion := "2.0", transport := "UDP" }, sentBy := { host := "172.18.69.104", portField := 5060 }, viaParams := { { id := "rport", paramValue := "5060" }, { id := "received", paramValue := "172.18.69.104" }, { id := "branch", paramValue := "z9hG4bK6FBBFA56E29D8C9C647864CAFC5514E5" } } } } }, warning := omit, wwwAuthenticate := omit, x_AUT := omit, x_Carrier_Info := omit, x_CHGDelay := omit, x_CHGInfo := omit, x_FCI := omit, undefinedHeader_List := omit }, messageBody := omit, payload := omit }
MTC@2c36661cae0d: setverdict(fail): none -> fail reason: ""AMI_Functions.ttcn:704 : AMI msg timeout: superset({ key := pattern @nocase \"Event\", val := \"Newchannel\" }, { key := pattern @nocase \"Context\", val := \"volte_ims\" })"", new component reason: ""AMI_Functions.ttcn:704 : AMI msg timeout: superset({ key := pattern @nocase \"Event\", val := \"Newchannel\" }, { key := pattern @nocase \"Context\", val := \"volte_ims\" })""
MTC@2c36661cae0d: Stopping testcase execution from "AMI_Functions.ttcn":704
Asterisk_Tests_LOCAL_SIP_EMU(75)@2c36661cae0d: Final verdict of PTC: none
TC_ims_call_mt_noprecondition-ConnHdlr-0501(78)@2c36661cae0d: Final verdict of PTC: none
TC_ims_call_mt_noprecondition-IMS_ConnHdlr-238010000090828(77)@2c36661cae0d: Final verdict of PTC: pass
Asterisk_Tests_AMI_EMU(74)@2c36661cae0d: Final verdict of PTC: none
Asterisk_Tests_IMS_SIP_EMU(76)@2c36661cae0d: Final verdict of PTC: none
MTC@2c36661cae0d: Setting final verdict of the test case.
MTC@2c36661cae0d: Local verdict of MTC: fail reason: ""AMI_Functions.ttcn:704 : AMI msg timeout: superset({ key := pattern @nocase \"Event\", val := \"Newchannel\" }, { key := pattern @nocase \"Context\", val := \"volte_ims\" })""
MTC@2c36661cae0d: Local verdict of PTC Asterisk_Tests_AMI_EMU(74): none (fail -> fail)
MTC@2c36661cae0d: Local verdict of PTC Asterisk_Tests_LOCAL_SIP_EMU(75): none (fail -> fail)
MTC@2c36661cae0d: Local verdict of PTC Asterisk_Tests_IMS_SIP_EMU(76): none (fail -> fail)
MTC@2c36661cae0d: Local verdict of PTC TC_ims_call_mt_noprecondition-IMS_ConnHdlr-238010000090828(77): pass (fail -> fail)
MTC@2c36661cae0d: Local verdict of PTC TC_ims_call_mt_noprecondition-ConnHdlr-0501(78): none (fail -> fail)
MTC@2c36661cae0d: Test case TC_ims_call_mt_noprecondition finished. Verdict: fail reason: "AMI_Functions.ttcn:704 : AMI msg timeout: superset({ key := pattern @nocase \"Event\", val := \"Newchannel\" }, { key := pattern @nocase \"Context\", val := \"volte_ims\" })"
MTC@2c36661cae0d: Starting external command `../ttcn3-tcpdump-stop.sh Asterisk_Tests.TC_ims_call_mt_noprecondition fail'.
Mon Jul  1 07:47:09 UTC 2024
------ Asterisk_Tests.TC_ims_call_mt_noprecondition fail ------

Waiting for packet dumper to finish... 0 (prev_count=-1, count=19433)
Waiting for packet dumper to finish... 1 (prev_count=19433, count=20441)
MTC@2c36661cae0d: External command `../ttcn3-tcpdump-stop.sh Asterisk_Tests.TC_ims_call_mt_noprecondition fail' was executed successfully (exit status: 0).
MC@2c36661cae0d: Test execution finished.
Execution of [EXECUTE] section finished.
emtc
MC@2c36661cae0d: Terminating MTC.
MC@2c36661cae0d: MTC terminated.
MC2> exit
MC@2c36661cae0d: Shutting down session.
MC@2c36661cae0d: Shutdown complete.

Comparing expected results '/osmo-ttcn3-hacks/asterisk/expected-results.xml' against results in 'junit-xml-22.log'
--------------------
pass->FAIL Asterisk_Tests.TC_internal_registration
pass->FAIL Asterisk_Tests.TC_internal_call_momt
pass Asterisk_Tests.TC_internal_call_all_2registered
pass Asterisk_Tests.TC_internal_call_all_3registered
pass Asterisk_Tests.TC_internal_call_all_4registered
pass Asterisk_Tests.TC_ims_registration
pass Asterisk_Tests.TC_ims_registration_resync
pass Asterisk_Tests.TC_ims_registration_timeout_initial_100Trying
pass Asterisk_Tests.TC_ims_registration_timeout_initial_401Unauthorized
pass Asterisk_Tests.TC_ims_registration_timeout_resync_401Unauthorized
pass Asterisk_Tests.TC_ims_registration_timeout_protected_100Trying
pass Asterisk_Tests.TC_ims_registration_timeout_protected_200OK
pass->FAIL Asterisk_Tests.TC_ims_registration_423_interval_too_brief
pass->FAIL Asterisk_Tests.TC_ims_reregistration
pass->FAIL Asterisk_Tests.TC_ims_call_mo
pass->FAIL Asterisk_Tests.TC_ims_call_mo_noprecondition
pass->FAIL Asterisk_Tests.TC_ims_call_mt
pass->FAIL Asterisk_Tests.TC_ims_call_mt_noprecondition

Summary:
  pass->FAIL: 8
  pass: 10


+ exit_code=0
+ /osmo-ttcn3-hacks/log_merge.sh Asterisk_Tests --rm
Generated Asterisk_Tests.TC_ims_call_mo.merged
Generated Asterisk_Tests.TC_ims_call_mo_noprecondition.merged
Generated Asterisk_Tests.TC_ims_call_mt.merged
Generated Asterisk_Tests.TC_ims_call_mt_noprecondition.merged
Generated Asterisk_Tests.TC_ims_registration.merged
Generated Asterisk_Tests.TC_ims_registration_423_interval_too_brief.merged
Generated Asterisk_Tests.TC_ims_registration_resync.merged
Generated Asterisk_Tests.TC_ims_registration_timeout_initial_100Trying.merged
Generated Asterisk_Tests.TC_ims_registration_timeout_initial_401Unauthorized.merged
Generated Asterisk_Tests.TC_ims_registration_timeout_protected_100Trying.merged
Generated Asterisk_Tests.TC_ims_registration_timeout_protected_200OK.merged
Generated Asterisk_Tests.TC_ims_registration_timeout_resync_401Unauthorized.merged
Generated Asterisk_Tests.TC_ims_reregistration.merged
Generated Asterisk_Tests.TC_internal_call_all_2registered.merged
Generated Asterisk_Tests.TC_internal_call_all_3registered.merged
Generated Asterisk_Tests.TC_internal_call_all_4registered.merged
Generated Asterisk_Tests.TC_internal_call_momt.merged
Generated Asterisk_Tests.TC_internal_registration.merged
Removing Input log files !!!
+ exit 0
+ clean_up_common
+ set +e
+ set +x

### Clean up ###

+ trap - EXIT INT TERM 0
+ type clean_up
+ network_clean
+ docker network inspect ttcn3-asterisk-ims-ue-test-69
+ grep Name
+ cut -d : -f2
+ awk -F" NR>1{print $2}
+ local containers=jenkins-ttcn3-asterisk-ims-ue-test-91-asterisk
jenkins-ttcn3-asterisk-ims-ue-test-91-dnsmasq
+ [ -n jenkins-ttcn3-asterisk-ims-ue-test-91-asterisk
jenkins-ttcn3-asterisk-ims-ue-test-91-dnsmasq ]
+ docker_kill_wait jenkins-ttcn3-asterisk-ims-ue-test-91-asterisk jenkins-ttcn3-asterisk-ims-ue-test-91-dnsmasq
+ docker kill jenkins-ttcn3-asterisk-ims-ue-test-91-asterisk jenkins-ttcn3-asterisk-ims-ue-test-91-dnsmasq
jenkins-ttcn3-asterisk-ims-ue-test-91-asterisk
jenkins-ttcn3-asterisk-ims-ue-test-91-dnsmasq
+ docker wait jenkins-ttcn3-asterisk-ims-ue-test-91-asterisk jenkins-ttcn3-asterisk-ims-ue-test-91-dnsmasq
Error response from daemon: No such container: jenkins-ttcn3-asterisk-ims-ue-test-91-asterisk
Error response from daemon: No such container: jenkins-ttcn3-asterisk-ims-ue-test-91-dnsmasq
+ true
+ network_remove
+ set +x
Removing network ttcn3-asterisk-ims-ue-test-69
+ docker network remove ttcn3-asterisk-ims-ue-test-69
ttcn3-asterisk-ims-ue-test-69
+ rm -rf /home/osmocom-build/jenkins/workspace/ttcn3-asterisk-ims-ue-test/logs/unix
+ fix_perms
+ set +x
Fixing permissions
+ id -u
+ id -g
+ docker run --rm -v /home/osmocom-build/jenkins/workspace/ttcn3-asterisk-ims-ue-test/logs:/data -v /home/osmocom-build/jenkins/workspace/ttcn3-asterisk-ims-ue-test/_cache:/cache --name jenkins-ttcn3-asterisk-ims-ue-test-91-cleaner debian:bookworm sh -e -x -c 
				chmod -R a+rX /data/ /cache/
				chown -R 1000:1000 /data /cache
			
+ chmod -R a+rX /data/ /cache/
+ chown -R 1000:1000 /data /cache
+ collect_logs
+ cat /home/osmocom-build/jenkins/workspace/ttcn3-asterisk-ims-ue-test/logs/asterisk-ims-ue-tester/junit-xml-22.log
<?xml version="1.0"?>
<testsuite name='Titan' tests='18' failures='6' errors='2' skipped='0' inconc='0' time='378.00'>
  <testcase classname='Asterisk_Tests' name='TC_internal_registration' time='10.018206'>
    <failure type='fail-verdict'>"Asterisk_Tests.ttcn:118 : AMI FullyBooted timeout: "
      Asterisk_Tests.ttcn:827 Asterisk_Tests control part
      Asterisk_Tests.ttcn:198 TC_internal_registration testcase
    </failure>
  </testcase>
  <testcase classname='Asterisk_Tests' name='TC_internal_call_momt' time='10.018145'>
    <failure type='fail-verdict'>"Asterisk_Tests.ttcn:118 : AMI FullyBooted timeout: "
      Asterisk_Tests.ttcn:828 Asterisk_Tests control part
      Asterisk_Tests.ttcn:253 TC_internal_call_momt testcase
    </failure>
  </testcase>
  <testcase classname='Asterisk_Tests' name='TC_internal_call_all_2registered' time='1.208896'/>
  <testcase classname='Asterisk_Tests' name='TC_internal_call_all_3registered' time='1.214487'/>
  <testcase classname='Asterisk_Tests' name='TC_internal_call_all_4registered' time='1.217796'/>
  <testcase classname='Asterisk_Tests' name='TC_ims_registration' time='9.093651'/>
  <testcase classname='Asterisk_Tests' name='TC_ims_registration_resync' time='4.131367'/>
  <testcase classname='Asterisk_Tests' name='TC_ims_registration_timeout_initial_100Trying' time='41.074518'/>
  <testcase classname='Asterisk_Tests' name='TC_ims_registration_timeout_initial_401Unauthorized' time='35.074516'/>
  <testcase classname='Asterisk_Tests' name='TC_ims_registration_timeout_resync_401Unauthorized' time='43.083848'/>
  <testcase classname='Asterisk_Tests' name='TC_ims_registration_timeout_protected_100Trying' time='40.212408'/>
  <testcase classname='Asterisk_Tests' name='TC_ims_registration_timeout_protected_200OK' time='39.225104'/>
  <testcase classname='Asterisk_Tests' name='TC_ims_registration_423_interval_too_brief' time='10.114623'>
    <failure type='fail-verdict'>"IMS_ConnectionHandler.ttcn:271 : \"TC_ims_registration_423_interval_too_brief-IMS_ConnHdlr-238010000090828: Received unexpected SIP Req message := \"{ requestLine := { method := REGISTER_E (11), requestUri := { scheme := \"sip\", userInfo := omit, hostPort := { host := \"ims.mnc001.mcc238.3gppnetwork.org\", portField := omit }, urlParameters := omit, headers := omit }, sipVersion := \"SIP/2.0\" }, msgHeader := { accept := omit, accept_contact := omit, acceptEncoding := omit, acceptLanguage := omit, acceptResourcePriority := omit, alertInfo := omit, alert_mode := omit, allow := { fieldName := ALLOW_E (7), methods := { \"OPTIONS\", \"REGISTER\", \"SUBSCRIBE\", \"NOTIFY\", \"PUBLISH\", \"INVITE\", \"ACK\", \"BYE\", \"CANCEL\", \"UPDATE\", \"PRACK\", \"INFO\", \"REFER\", \"MESSAGE\" } }, allow_events := omit, answer_mode := omit, authenticationInfo := omit, authorization := omit, callId := { fieldName := CALL_ID_E (12), callid := \"7225aeda-6282-4837-b588-f5425e9c21b9\" }, callInfo := omit, contact := { fieldName := CONTACT_E (14), contactBody := { contactAddresses := { { addressField := { nameAddr := { displayName := omit, addrSpec := { scheme := \"sip\", userInfo := { userOrTelephoneSubscriber := \"5a2eef7b-6caf-476d-b57c-f7b2f6d3102a\", password := omit }, hostPort := { host := \"172.18.69.10\", portField := 5060 }, urlParameters := { { id := \"transport\", paramValue := \"TCP\" }, { id := \"line\", paramValue := \"abqlevz\" } }, headers := omit } } }, contactParams := { { id := \"+g.3gpp.icsi-ref\", paramValue := \"\\\"urn\\\\%3Aurn-7\\\\%3A3gpp-service.ims.icsi.mmtel\\\"\" }, { id := \"audio\", paramValue := omit }, { id := \"+sip.instance\", paramValue := \"\\\"&lt;urn:gsma:imei:35876110-027790-0>\\\"\" } } } } } }, contentDisposition := omit, contentEncoding := omit, contentLanguage := omit, contentLength := { fieldName := CONTENT_LENGTH_E (18), len := 0 }, contentType := omit, cSeq := { fieldName := CSEQ_E (20), seqNumber := 6070, method := \"REGISTER\" }, date := omit, diversion := omit, errorInfo := omit, event := omit, expires := { fieldName := EXPIRES_E (24), deltaSec := \"1200000\" }, feature_caps := omit, fromField := { fieldName := FROM_E (27), addressField := { nameAddr := { displayName := omit, addrSpec := { scheme := \"sip\", userInfo := { userOrTelephoneSubscriber := \"238010000090828\", password := omit }, hostPort := { host := \"ims.mnc001.mcc238.3gppnetwork.org\", portField := omit }, urlParameters := omit, headers := omit } } }, fromParams := { { id := \"tag\", paramValue := \"94d6cee2-3dc0-4b9a-b884-0780eb2c12f2\" } } }, geolocation := omit, geolocation_routing := omit, geolocation_error := omit, historyInfo := omit, info_Package := omit, inReplyTo := omit, join := omit, maxForwards := { fieldName := MAX_FORWARDS_E (35), forwards := 70 }, mimeVersion := omit, minExpires := omit, min_SE := omit, organization := omit, p_access_network_info := omit, p_alerting_mode := omit, p_answer_state := omit, p_Area_Info := omit, passertedID := omit, p_asserted_service := omit, p_associated_uri := omit, p_called_party_id := omit, p_charging_function_address := omit, p_charging_vector := omit, p_DCS_trace_pty_id := omit, p_DCS_OSPS := omit, p_DCS_billing_info := omit, p_DCS_LAES := omit, p_DCS_redirect := omit, p_Early_Media := omit, p_last_access_network_info := omit, p_media_auth := omit, ppreferredID := omit, p_preferred_service := omit, p_profile_key := omit, p_served_user := omit, p_Service_Indication := omit, p_Service_Notification := omit, p_user_database := omit, p_visited_network_id := omit, path := omit, priv_answer_mode := omit, priority := omit, privacy := omit, proxyAuthenticate := omit, proxyAuthorization := omit, proxyRequire := omit, rack := omit, rseq := omit, reason := omit, recordRoute := omit, recv_Info := omit, reject_contact := omit, refer_sub := omit, refer_to := omit, referred_by := omit, replyTo := omit, replaces := omit, require := omit, request_disp := omit, resourcePriority := omit, retryAfter := omit, route := omit, security_client := omit, security_server := omit, security_verify := omit, session_expires := omit, session_id := omit, server := omit, service_route := omit, sip_ETag := omit, sip_If_Match := omit, subject := omit, subscription_state := omit, supported := omit, target_dialog := omit, timestamp := omit, toField := { fieldName := TO_E (103), addressField := { nameAddr := { displayName := omit, addrSpec := { scheme := \"sip\", userInfo := { userOrTelephoneSubscriber := \"238010000090828\", password := omit }, hostPort := { host := \"ims.mnc001.mcc238.3gppnetwork.org\", portField := omit }, urlParameters := omit, headers := omit } } }, toParams := omit }, unsupported := omit, userAgent := { fieldName := USER_AGENT_E (105), userAgentBody := { \"Asterisk\", \"PBX\", \"20.7.0\" } }, via := { fieldName := VIA_E (106), viaBody := { { sentProtocol := { protocolName := \"SIP\", protocolVersion := \"2.0\", transport := \"TCP\" }, sentBy := { host := \"172.18.69.10\", portField := 5060 }, viaParams := { { id := \"rport\", paramValue := omit }, { id := \"branch\", paramValue := \"z9hG4bKPj92474b5c-1d43-4962-b596-a0f15ef7f793\" }, { id := \"alias\", paramValue := omit } } } } }, warning := omit, wwwAuthenticate := omit, x_AUT := omit, x_Carrier_Info := omit, x_CHGDelay := omit, x_CHGInfo := omit, x_FCI := omit, undefinedHeader_List := omit }, messageBody := omit, payload := omit }\nvs exp := \"{ requestLine := { method := REGISTER_E (11), requestUri := { scheme := \\\"sip\\\", userInfo := omit, hostPort := { host := \\\"ims.mnc001.mcc238.3gppnetwork.org\\\", portField := omit }, urlParameters := omit, headers := omit }, sipVersion := \\\"SIP/2.0\\\" }, msgHeader := { accept := *, accept_contact := *, acceptEncoding := *, acceptLanguage := *, acceptResourcePriority := *, alertInfo := *, alert_mode := *, allow := *, allow_events := *, answer_mode := *, authenticationInfo := *, authorization := *, callId := { fieldName := CALL_ID_E (12), callid := ? }, callInfo := *, contact := *, contentDisposition := *, contentEncoding := *, contentLanguage := *, contentLength := *, contentType := *, cSeq := { fieldName := CSEQ_E (20), seqNumber := *, method := \\\"REGISTER\\\" }, date := *, diversion := *, errorInfo := *, event := *, expires := { fieldName := EXPIRES_E (24), deltaSec := \\\"1200000\\\" }, feature_caps := *, fromField := { fieldName := FROM_E (27), addressField := ?, fromParams := * }, geolocation := *, geolocation_routing := *, geolocation_error := *, historyInfo := *, info_Package := *, inReplyTo := *, join := *, maxForwards := *, mimeVersion := *, minExpires := *, min_SE := *, organization := *, p_access_network_info := *, p_alerting_mode := *, p_answer_state := *, p_Area_Info := *, passertedID := *, p_asserted_service := *, p_associated_uri := *, p_called_party_id := *, p_charging_function_address := *, p_charging_vector := *, p_DCS_trace_pty_id := *, p_DCS_OSPS := *, p_DCS_billing_info := *, p_DCS_LAES := *, p_DCS_redirect := *, p_Early_Media := *, p_last_access_network_info := *, p_media_auth := *, ppreferredID := *, p_preferred_service := *, p_profile_key := *, p_served_user := *, p_Service_Indication := *, p_Service_Notification := *, p_user_database := *, p_visited_network_id := *, path := *, priv_answer_mode := *, priority := *, privacy := *, proxyAuthenticate := *, proxyAuthorization := *, proxyRequire := *, rack := *, rseq := *, reason := *, recordRoute := *, recv_Info := *, reject_contact := *, refer_sub := *, refer_to := *, referred_by := *, replyTo := *, replaces := *, require := { fieldName := REQUIRE_E (84), optionsTags := superset(\\\"sec-agree\\\") }, request_disp := *, resourcePriority := *, retryAfter := *, route := *, security_client := { fieldName := SECURITY_CLIENT_E (89), sec_mechanism_list := superset({ mechanism_name := \\\"ipsec-3gpp\\\", mechanism_params := superset({ id := \\\"alg\\\", paramValue := \\\"hmac-sha-1-96\\\" }) }) }, security_server := *, security_verify := *, session_expires := *, session_id := *, server := *, service_route := *, sip_ETag := *, sip_If_Match := *, subject := *, subscription_state := *, supported := { fieldName := SUPPORTED_E (100), optionsTags := superset(\\\"path\\\", \\\"sec-agree\\\") }, target_dialog := *, timestamp := *, toField := { fieldName := TO_E (103), addressField := ?, toParams := * }, unsupported := *, userAgent := *, via := { fieldName := VIA_E (106), viaBody := { { sentProtocol := { protocolName := \\\"SIP\\\", protocolVersion := \\\"2.0\\\", transport := ? }, sentBy := ?, viaParams := * } } }, warning := *, wwwAuthenticate := *, x_AUT := *, x_Carrier_Info := *, x_CHGDelay := *, x_CHGInfo := *, x_FCI := *, undefinedHeader_List := * }, messageBody := *, payload := omit }\""
      Asterisk_Tests.ttcn:839 Asterisk_Tests control part
      Asterisk_Tests.ttcn:608 TC_ims_registration_423_interval_too_brief testcase
    </failure>
  </testcase>
  <testcase classname='Asterisk_Tests' name='TC_ims_reregistration' time='11.091410'>
    <error type='DTE'>Dynamic test case error: Stand-alone receive statement failed in file Asterisk_Tests.ttcn between lines 409 and 411.</error>
  </testcase>
  <testcase classname='Asterisk_Tests' name='TC_ims_call_mo' time='30.058529'>
    <failure type='fail-verdict'>Tguard timeout
      Asterisk_Tests.ttcn:841 Asterisk_Tests control part
      Asterisk_Tests.ttcn:733 TC_ims_call_mo testcase
    </failure>
  </testcase>
  <testcase classname='Asterisk_Tests' name='TC_ims_call_mo_noprecondition' time='2.018255'>
    <error type='DTE'>Dynamic test case error: None of the branches can be chosen in altstep as_AMI_IMS_register_Auth.</error>
  </testcase>
  <testcase classname='Asterisk_Tests' name='TC_ims_call_mt' time='17.119482'>
    <failure type='fail-verdict'>"AMI_Functions.ttcn:704 : AMI msg timeout: superset({ key := pattern @nocase \"Event\", val := \"Newchannel\" }, { key := pattern @nocase \"Context\", val := \"volte_ims\" })"
      Asterisk_Tests.ttcn:843 Asterisk_Tests control part
      Asterisk_Tests.ttcn:820 TC_ims_call_mt testcase
    </failure>
  </testcase>
  <testcase classname='Asterisk_Tests' name='TC_ims_call_mt_noprecondition' time='18.152990'>
    <failure type='fail-verdict'>"AMI_Functions.ttcn:704 : AMI msg timeout: superset({ key := pattern @nocase \"Event\", val := \"Newchannel\" }, { key := pattern @nocase \"Context\", val := \"volte_ims\" })"
      Asterisk_Tests.ttcn:844 Asterisk_Tests control part
      Asterisk_Tests.ttcn:823 TC_ims_call_mt_noprecondition testcase
    </failure>
  </testcase>
</testsuite>
Recording test results
[Checks API] No suitable checks publisher found.
Build step 'Publish JUnit test result report' changed build result to UNSTABLE
Archiving artifacts
Finished: UNSTABLE