blob: e73b3a50cd865cfe929e0bfadd57f2161e4d4935 [file] [log] [blame]
Holger Hans Peter Freyther5ada53a2010-02-21 11:11:04 +01001/* A Media Gateway Control Protocol Media Gateway: RFC 3435 */
2/* The protocol implementation */
3
4/*
5 * (C) 2009-2010 by Holger Hans Peter Freyther <zecke@selfish.org>
6 * (C) 2009-2010 by On-Waves
7 * All Rights Reserved
8 *
9 * This program is free software; you can redistribute it and/or modify
10 * it under the terms of the GNU General Public License as published by
11 * the Free Software Foundation; either version 2 of the License, or
12 * (at your option) any later version.
13 *
14 * This program is distributed in the hope that it will be useful,
15 * but WITHOUT ANY WARRANTY; without even the implied warranty of
16 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 * GNU General Public License for more details.
18 *
19 * You should have received a copy of the GNU General Public License along
20 * with this program; if not, write to the Free Software Foundation, Inc.,
21 * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
22 *
23 */
24
25#include <string.h>
26#include <unistd.h>
Holger Hans Peter Freytherf95e3ad2010-02-26 13:42:58 +010027#include <endian.h>
Holger Hans Peter Freyther9d7bd812010-04-07 12:55:40 +020028#include <errno.h>
Holger Hans Peter Freyther5ada53a2010-02-21 11:11:04 +010029
30#include <sys/socket.h>
31#include <arpa/inet.h>
32
Holger Hans Peter Freytherf41fb1f2010-02-26 20:16:37 +010033#include <osmocore/msgb.h>
Holger Hans Peter Freytherf41fb1f2010-02-26 20:16:37 +010034#include <osmocore/select.h>
35
Holger Hans Peter Freyther5ada53a2010-02-21 11:11:04 +010036#include <openbsc/debug.h>
37#include <openbsc/mgcp.h>
38#include <openbsc/mgcp_internal.h>
Holger Hans Peter Freyther5ada53a2010-02-21 11:11:04 +010039
40#warning "Make use of the rtp proxy code"
41
Holger Hans Peter Freytherf95e3ad2010-02-26 13:42:58 +010042/* according to rtp_proxy.c RFC 3550 */
43struct rtp_hdr {
44#if __BYTE_ORDER == __LITTLE_ENDIAN
45 u_int8_t csrc_count:4,
46 extension:1,
47 padding:1,
48 version:2;
49 u_int8_t payload_type:7,
50 marker:1;
51#elif __BYTE_ORDER == __BIG_ENDIAN
52 u_int8_t version:2,
53 padding:1,
54 extension:1,
55 csrc_count:4;
56 u_int8_t marker:1,
57 payload_type:7;
58#endif
59 u_int16_t sequence;
60 u_int32_t timestamp;
61 u_int32_t ssrc;
62} __attribute__((packed));
63
Holger Hans Peter Freyther5ada53a2010-02-21 11:11:04 +010064
65enum {
66 DEST_NETWORK = 0,
67 DEST_BTS = 1,
68};
69
70enum {
71 PROTO_RTP,
72 PROTO_RTCP,
73};
74
Holger Hans Peter Freytherb6894262010-04-21 21:25:13 +080075#define DUMMY_LOAD 0x23
76
Holger Hans Peter Freyther5ada53a2010-02-21 11:11:04 +010077
78static int udp_send(int fd, struct in_addr *addr, int port, char *buf, int len)
79{
80 struct sockaddr_in out;
81 out.sin_family = AF_INET;
82 out.sin_port = port;
83 memcpy(&out.sin_addr, addr, sizeof(*addr));
84
85 return sendto(fd, buf, len, 0, (struct sockaddr *)&out, sizeof(out));
86}
87
Holger Hans Peter Freytherb6894262010-04-21 21:25:13 +080088int mgcp_send_dummy(struct mgcp_endpoint *endp)
89{
90 static char buf[] = { DUMMY_LOAD };
91
92 return udp_send(endp->local_rtp.fd, &endp->remote,
93 endp->net_rtp, buf, 1);
94}
95
Holger Hans Peter Freytherf95e3ad2010-02-26 13:42:58 +010096static void patch_payload(int payload, char *data, int len)
97{
98 struct rtp_hdr *rtp_hdr;
99
100 if (len < sizeof(*rtp_hdr))
101 return;
102
Holger Hans Peter Freyther00529552010-04-06 11:15:50 +0200103 if (payload < 0)
104 return;
105
Holger Hans Peter Freytherf95e3ad2010-02-26 13:42:58 +0100106 rtp_hdr = (struct rtp_hdr *) data;
107 rtp_hdr->payload_type = payload;
108}
109
Holger Hans Peter Freyther5ada53a2010-02-21 11:11:04 +0100110/*
111 * There is data coming. We will have to figure out if it
112 * came from the BTS or the MediaGateway of the MSC. On top
113 * of that we need to figure out if it was RTP or RTCP.
114 *
115 * Currently we do not communicate with the BSC so we have
116 * no idea where the BTS is listening for RTP and need to
117 * do the classic routing trick. Wait for the first packet
118 * from the BTS and then go ahead.
119 */
120static int rtp_data_cb(struct bsc_fd *fd, unsigned int what)
121{
122 char buf[4096];
123 struct sockaddr_in addr;
124 socklen_t slen = sizeof(addr);
125 struct mgcp_endpoint *endp;
126 struct mgcp_config *cfg;
127 int rc, dest, proto;
128
129 endp = (struct mgcp_endpoint *) fd->data;
130 cfg = endp->cfg;
131
132 rc = recvfrom(fd->fd, &buf, sizeof(buf), 0,
133 (struct sockaddr *) &addr, &slen);
134 if (rc < 0) {
Holger Hans Peter Freyther9d7bd812010-04-07 12:55:40 +0200135 LOGP(DMGCP, LOGL_ERROR, "Failed to receive message on: 0x%x errno: %d/%s\n",
136 ENDPOINT_NUMBER(endp), errno, strerror(errno));
Holger Hans Peter Freyther5ada53a2010-02-21 11:11:04 +0100137 return -1;
138 }
139
140 /* do not forward aynthing... maybe there is a packet from the bts */
Holger Hans Peter Freytherbaefbf42010-03-01 18:53:05 +0100141 if (endp->ci == CI_UNUSED)
Holger Hans Peter Freyther5ada53a2010-02-21 11:11:04 +0100142 return -1;
Holger Hans Peter Freyther5ada53a2010-02-21 11:11:04 +0100143
144 /*
145 * Figure out where to forward it to. This code assumes that we
146 * have received the Connection Modify and know who is a legitimate
147 * partner. According to the spec we could attempt to forward even
148 * after the Create Connection but we will not as we are not really
149 * able to tell if this is legitimate.
150 */
151 #warning "Slight spec violation. With connection mode recvonly we should attempt to forward."
152 dest = memcmp(&addr.sin_addr, &endp->remote, sizeof(addr.sin_addr)) == 0 &&
153 (endp->net_rtp == addr.sin_port || endp->net_rtcp == addr.sin_port)
154 ? DEST_BTS : DEST_NETWORK;
155 proto = fd == &endp->local_rtp ? PROTO_RTP : PROTO_RTCP;
156
157 /* We have no idea who called us, maybe it is the BTS. */
158 if (dest == DEST_NETWORK && (endp->bts_rtp == 0 || cfg->forward_ip)) {
159 /* it was the BTS... */
Holger Hans Peter Freyther27c90f82010-04-01 07:56:04 +0200160 if (!cfg->bts_ip
161 || memcmp(&addr.sin_addr, &cfg->bts_in, sizeof(cfg->bts_in)) == 0
162 || memcmp(&addr.sin_addr, &endp->bts, sizeof(endp->bts)) == 0) {
Holger Hans Peter Freyther5ada53a2010-02-21 11:11:04 +0100163 if (fd == &endp->local_rtp) {
164 endp->bts_rtp = addr.sin_port;
165 } else {
166 endp->bts_rtcp = addr.sin_port;
167 }
168
169 endp->bts = addr.sin_addr;
Holger Hans Peter Freyther9c3f5762010-04-09 18:53:01 +0200170 LOGP(DMGCP, LOGL_NOTICE, "Found BTS for endpoint: 0x%x on port: %d/%d of %s\n",
171 ENDPOINT_NUMBER(endp), ntohs(endp->bts_rtp), ntohs(endp->bts_rtcp),
172 inet_ntoa(addr.sin_addr));
Holger Hans Peter Freytherb6894262010-04-21 21:25:13 +0800173
Holger Hans Peter Freyther5ada53a2010-02-21 11:11:04 +0100174 }
175 }
176
Holger Hans Peter Freyther040c1302010-04-22 12:14:51 +0800177 /* throw away dummy message */
178 if (rc == 1 && buf[0] == DUMMY_LOAD) {
179 LOGP(DMGCP, LOGL_NOTICE, "Filtered dummy on 0x%x\n",
180 ENDPOINT_NUMBER(endp));
181 return 0;
182 }
183
Holger Hans Peter Freyther6de5b112010-04-07 09:37:17 +0200184 /* do this before the loop handling */
185 if (dest == DEST_NETWORK)
186 ++endp->in_bts;
187 else
188 ++endp->in_remote;
189
Holger Hans Peter Freyther5ada53a2010-02-21 11:11:04 +0100190 /* dispatch */
191 if (cfg->audio_loop)
192 dest = !dest;
193
194 if (dest == DEST_NETWORK) {
Holger Hans Peter Freytherf95e3ad2010-02-26 13:42:58 +0100195 patch_payload(endp->net_payload_type, buf, rc);
Holger Hans Peter Freyther5ada53a2010-02-21 11:11:04 +0100196 return udp_send(fd->fd, &endp->remote,
197 proto == PROTO_RTP ? endp->net_rtp : endp->net_rtcp,
198 buf, rc);
199 } else {
Holger Hans Peter Freytherf95e3ad2010-02-26 13:42:58 +0100200 patch_payload(endp->bts_payload_type, buf, rc);
Holger Hans Peter Freyther5ada53a2010-02-21 11:11:04 +0100201 return udp_send(fd->fd, &endp->bts,
202 proto == PROTO_RTP ? endp->bts_rtp : endp->bts_rtcp,
203 buf, rc);
204 }
205}
206
207static int create_bind(const char *source_addr, struct bsc_fd *fd, int port)
208{
209 struct sockaddr_in addr;
210 int on = 1;
211
212 fd->fd = socket(AF_INET, SOCK_DGRAM, 0);
213 if (fd->fd < 0) {
214 LOGP(DMGCP, LOGL_ERROR, "Failed to create UDP port.\n");
215 return -1;
216 }
217
218 setsockopt(fd->fd, SOL_SOCKET, SO_REUSEADDR, &on, sizeof(on));
219 memset(&addr, 0, sizeof(addr));
220 addr.sin_family = AF_INET;
221 addr.sin_port = htons(port);
222 inet_aton(source_addr, &addr.sin_addr);
223
224 if (bind(fd->fd, (struct sockaddr *) &addr, sizeof(addr)) < 0) {
225 return -1;
226 }
227
228 return 0;
229}
230
231static int bind_rtp(struct mgcp_endpoint *endp)
232{
233 struct mgcp_config *cfg = endp->cfg;
234
235 if (create_bind(cfg->source_addr, &endp->local_rtp, endp->rtp_port) != 0) {
236 LOGP(DMGCP, LOGL_ERROR, "Failed to create RTP port: %s:%d on 0x%x\n",
237 cfg->source_addr, endp->rtp_port, ENDPOINT_NUMBER(endp));
238 goto cleanup0;
239 }
240
241 if (create_bind(cfg->source_addr, &endp->local_rtcp, endp->rtp_port + 1) != 0) {
242 LOGP(DMGCP, LOGL_ERROR, "Failed to create RTCP port: %s:%d on 0x%x\n",
243 cfg->source_addr, endp->rtp_port + 1, ENDPOINT_NUMBER(endp));
244 goto cleanup1;
245 }
246
247 endp->local_rtp.cb = rtp_data_cb;
248 endp->local_rtp.data = endp;
249 endp->local_rtp.when = BSC_FD_READ;
250 if (bsc_register_fd(&endp->local_rtp) != 0) {
251 LOGP(DMGCP, LOGL_ERROR, "Failed to register RTP port %d on 0x%x\n",
252 endp->rtp_port, ENDPOINT_NUMBER(endp));
253 goto cleanup2;
254 }
255
256 endp->local_rtcp.cb = rtp_data_cb;
257 endp->local_rtcp.data = endp;
258 endp->local_rtcp.when = BSC_FD_READ;
259 if (bsc_register_fd(&endp->local_rtcp) != 0) {
260 LOGP(DMGCP, LOGL_ERROR, "Failed to register RTCP port %d on 0x%x\n",
261 endp->rtp_port + 1, ENDPOINT_NUMBER(endp));
262 goto cleanup3;
263 }
264
265 return 0;
266
267cleanup3:
268 bsc_unregister_fd(&endp->local_rtp);
269cleanup2:
270 close(endp->local_rtcp.fd);
271 endp->local_rtcp.fd = -1;
272cleanup1:
273 close(endp->local_rtp.fd);
274 endp->local_rtp.fd = -1;
275cleanup0:
276 return -1;
277}
278
279int mgcp_bind_rtp_port(struct mgcp_endpoint *endp, int rtp_port)
280{
281 endp->rtp_port = rtp_port;
282 return bind_rtp(endp);
283}