blob: 1c0107b54332dd854281cef19db22848037bc8a0 [file] [log] [blame]
Harald Weltebb779392018-06-16 20:21:10 +02001/* OsmoHLR SS/USSD implementation */
Harald Welte4956ae12018-06-15 22:04:28 +02002
3/* (C) 2018 Harald Welte <laforge@gnumonks.org>
4 *
5 * All Rights Reserved
6 *
7 * This program is free software; you can redistribute it and/or modify
8 * it under the terms of the GNU Affero General Public License as published by
9 * the Free Software Foundation; either version 3 of the License, or
10 * (at your option) any later version.
11 *
12 * This program is distributed in the hope that it will be useful,
13 * but WITHOUT ANY WARRANTY; without even the implied warranty of
14 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 * GNU Affero General Public License for more details.
16 *
17 * You should have received a copy of the GNU Affero General Public License
18 * along with this program. If not, see <http://www.gnu.org/licenses/>.
19 *
20 */
21
22
23#include <osmocom/core/talloc.h>
Harald Weltebb779392018-06-16 20:21:10 +020024#include <osmocom/core/timer.h>
25#include <osmocom/gsm/gsup.h>
26#include <osmocom/gsm/gsm0480.h>
27#include <osmocom/gsm/protocol/gsm_04_80.h>
Harald Welte4956ae12018-06-15 22:04:28 +020028#include <stdint.h>
29#include <string.h>
Harald Weltedab544e2018-07-29 16:14:48 +020030#include <errno.h>
Harald Welte4956ae12018-06-15 22:04:28 +020031
Neels Hofmeyr2f758032019-11-20 00:37:07 +010032#include <osmocom/hlr/hlr.h>
33#include <osmocom/hlr/hlr_ussd.h>
34#include <osmocom/hlr/gsup_server.h>
35#include <osmocom/hlr/gsup_router.h>
36#include <osmocom/hlr/logging.h>
37#include <osmocom/hlr/db.h>
Harald Weltebb779392018-06-16 20:21:10 +020038
39/***********************************************************************
40 * core data structures expressing config from VTY
41 ***********************************************************************/
Harald Welte4956ae12018-06-15 22:04:28 +020042
43struct hlr_euse *euse_find(struct hlr *hlr, const char *name)
44{
45 struct hlr_euse *euse;
46
47 llist_for_each_entry(euse, &hlr->euse_list, list) {
48 if (!strcmp(euse->name, name))
49 return euse;
50 }
51 return NULL;
52}
53
54struct hlr_euse *euse_alloc(struct hlr *hlr, const char *name)
55{
56 struct hlr_euse *euse = euse_find(hlr, name);
57 if (euse)
58 return NULL;
59
60 euse = talloc_zero(hlr, struct hlr_euse);
61 euse->name = talloc_strdup(euse, name);
62 euse->hlr = hlr;
Harald Welte4956ae12018-06-15 22:04:28 +020063 llist_add_tail(&euse->list, &hlr->euse_list);
64
65 return euse;
66}
67
68void euse_del(struct hlr_euse *euse)
69{
70 llist_del(&euse->list);
71 talloc_free(euse);
72}
73
74
Harald Weltedab544e2018-07-29 16:14:48 +020075struct hlr_ussd_route *ussd_route_find_prefix(struct hlr *hlr, const char *prefix)
Harald Welte4956ae12018-06-15 22:04:28 +020076{
Harald Weltedab544e2018-07-29 16:14:48 +020077 struct hlr_ussd_route *rt;
Harald Welte4956ae12018-06-15 22:04:28 +020078
Harald Weltedab544e2018-07-29 16:14:48 +020079 llist_for_each_entry(rt, &hlr->ussd_routes, list) {
Harald Welte4956ae12018-06-15 22:04:28 +020080 if (!strcmp(rt->prefix, prefix))
81 return rt;
82 }
83 return NULL;
84}
85
Harald Weltedab544e2018-07-29 16:14:48 +020086struct hlr_ussd_route *ussd_route_prefix_alloc_int(struct hlr *hlr, const char *prefix,
87 const struct hlr_iuse *iuse)
Harald Welte4956ae12018-06-15 22:04:28 +020088{
Harald Weltedab544e2018-07-29 16:14:48 +020089 struct hlr_ussd_route *rt;
Harald Welte4956ae12018-06-15 22:04:28 +020090
Harald Weltedab544e2018-07-29 16:14:48 +020091 if (ussd_route_find_prefix(hlr, prefix))
Harald Welte4956ae12018-06-15 22:04:28 +020092 return NULL;
93
Harald Weltedab544e2018-07-29 16:14:48 +020094 rt = talloc_zero(hlr, struct hlr_ussd_route);
Harald Welte4956ae12018-06-15 22:04:28 +020095 rt->prefix = talloc_strdup(rt, prefix);
Harald Weltedab544e2018-07-29 16:14:48 +020096 rt->u.iuse = iuse;
97 llist_add_tail(&rt->list, &hlr->ussd_routes);
Harald Welte4956ae12018-06-15 22:04:28 +020098
99 return rt;
100}
101
Harald Weltedab544e2018-07-29 16:14:48 +0200102struct hlr_ussd_route *ussd_route_prefix_alloc_ext(struct hlr *hlr, const char *prefix,
103 struct hlr_euse *euse)
104{
105 struct hlr_ussd_route *rt;
106
107 if (ussd_route_find_prefix(hlr, prefix))
108 return NULL;
109
110 rt = talloc_zero(hlr, struct hlr_ussd_route);
111 rt->prefix = talloc_strdup(rt, prefix);
112 rt->is_external = true;
113 rt->u.euse = euse;
114 llist_add_tail(&rt->list, &hlr->ussd_routes);
115
116 return rt;
117}
118
119void ussd_route_del(struct hlr_ussd_route *rt)
Harald Welte4956ae12018-06-15 22:04:28 +0200120{
121 llist_del(&rt->list);
122 talloc_free(rt);
123}
Harald Weltebb779392018-06-16 20:21:10 +0200124
Vadim Yanitskiy5800f3a2023-06-28 19:07:49 +0700125static struct hlr_ussd_route *ussd_route_lookup_for_req(struct hlr *hlr, const struct ss_request *req)
Harald Weltebb779392018-06-16 20:21:10 +0200126{
Vadim Yanitskiy5800f3a2023-06-28 19:07:49 +0700127 const uint8_t cgroup = req->ussd_data_dcs >> 4;
128 const uint8_t lang = req->ussd_data_dcs & 0x0f;
129 char ussd_code[GSM0480_USSD_7BIT_STRING_LEN];
Harald Weltedab544e2018-07-29 16:14:48 +0200130 struct hlr_ussd_route *rt;
Vadim Yanitskiy5800f3a2023-06-28 19:07:49 +0700131
132 ussd_code[0] = '\0';
133
134 /* We support only the Coding Group 0 (GSM 7-bit default alphabeet). In fact,
135 * the USSD request is usually limited to [*#0-9], so we don't really need to
136 * support other coding groups and languages. */
137 switch (cgroup) {
138 case 0:
139 /* The Language is usually set to '1111'B (unspecified), but some UEs
140 * are known to indicate '0000'B (German). */
141 if (lang != 0x0f) {
142 LOGP(DSS, LOGL_NOTICE, "USSD DataCodingScheme (0x%02x): "
143 "the Language is usually set to 15 (unspecified), "
144 "but the request indicates %u - ignoring this\n",
145 req->ussd_data_dcs, lang);
146 /* do not abort, attempt to decode as if it was '1111'B */
147 }
148
149 gsm_7bit_decode_n_ussd(&ussd_code[0], sizeof(ussd_code),
150 req->ussd_data, (req->ussd_data_len * 8) / 7);
151 break;
152 default:
153 LOGP(DSS, LOGL_ERROR, "USSD DataCodingScheme (0x%02x): "
154 "Coding Group %u is not supported, expecting Coding Group 0\n",
155 req->ussd_data_dcs, cgroup);
156 return NULL;
157 }
158
Harald Weltedab544e2018-07-29 16:14:48 +0200159 llist_for_each_entry(rt, &hlr->ussd_routes, list) {
160 if (!strncmp(ussd_code, rt->prefix, strlen(rt->prefix))) {
Vadim Yanitskiye6c839e2018-08-02 23:59:51 +0700161 LOGP(DSS, LOGL_DEBUG, "Found %s '%s' (prefix '%s') for USSD "
162 "Code '%s'\n", rt->is_external ? "EUSE" : "IUSE",
163 rt->is_external ? rt->u.euse->name : rt->u.iuse->name,
164 rt->prefix, ussd_code);
Harald Weltedab544e2018-07-29 16:14:48 +0200165 return rt;
Harald Weltebb779392018-06-16 20:21:10 +0200166 }
167 }
168
Harald Weltedab544e2018-07-29 16:14:48 +0200169 LOGP(DSS, LOGL_DEBUG, "Could not find Route for USSD Code '%s'\n", ussd_code);
Harald Weltebb779392018-06-16 20:21:10 +0200170 return NULL;
171}
172
173/***********************************************************************
174 * handling functions for individual GSUP messages
175 ***********************************************************************/
176
Harald Welte97bfb652018-07-29 12:28:11 +0200177#define LOGPSS(ss, lvl, fmt, args...) \
Harald Welte95b96d42018-07-29 12:47:39 +0200178 LOGP(DSS, lvl, "%s/0x%08x: " fmt, (ss)->imsi, (ss)->session_id, ## args)
Harald Welte97bfb652018-07-29 12:28:11 +0200179
Harald Weltebb779392018-06-16 20:21:10 +0200180struct ss_session {
181 /* link us to hlr->ss_sessions */
182 struct llist_head list;
183 /* imsi of this session */
Neels Hofmeyre21b45a2019-03-18 21:04:23 +0100184 char imsi[OSMO_IMSI_BUF_SIZE];
Harald Weltebb779392018-06-16 20:21:10 +0200185 /* ID of this session (unique per IMSI) */
186 uint32_t session_id;
187 /* state of the session */
188 enum osmo_gsup_session_state state;
189 /* time-out when we will delete the session */
190 struct osmo_timer_list timeout;
191
Harald Weltedab544e2018-07-29 16:14:48 +0200192 /* is this USSD for an external handler (EUSE): true */
193 bool is_external;
194 union {
195 /* external USSD Entity responsible for this session */
196 struct hlr_euse *euse;
197 /* internal USSD Entity responsible for this session */
198 const struct hlr_iuse *iuse;
199 } u;
200
Oliver Smith95abc2b2019-04-04 12:00:24 +0200201 /* subscriber's vlr_number
202 * MO USSD: originating MSC's vlr_number
203 * MT USSD: looked up once per session and cached here */
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100204 struct osmo_ipa_name vlr_name;
Neels Hofmeyrf1fe94c2019-04-02 04:26:55 +0200205
Harald Weltebb779392018-06-16 20:21:10 +0200206 /* we don't keep a pointer to the osmo_gsup_{route,conn} towards the MSC/VLR here,
207 * as this might change during inter-VLR hand-over, and we simply look-up the serving MSC/VLR
208 * every time we receive an USSD component from the EUSE */
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100209
210 struct osmo_gsup_req *initial_req_from_ms;
211 struct osmo_gsup_req *initial_req_from_euse;
Harald Weltebb779392018-06-16 20:21:10 +0200212};
213
214struct ss_session *ss_session_find(struct hlr *hlr, const char *imsi, uint32_t session_id)
215{
216 struct ss_session *ss;
217 llist_for_each_entry(ss, &hlr->ss_sessions, list) {
218 if (!strcmp(ss->imsi, imsi) && ss->session_id == session_id)
219 return ss;
220 }
221 return NULL;
222}
223
224void ss_session_free(struct ss_session *ss)
225{
226 osmo_timer_del(&ss->timeout);
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100227 if (ss->initial_req_from_ms)
228 osmo_gsup_req_free(ss->initial_req_from_ms);
229 if (ss->initial_req_from_euse)
230 osmo_gsup_req_free(ss->initial_req_from_euse);
Harald Weltebb779392018-06-16 20:21:10 +0200231 llist_del(&ss->list);
232 talloc_free(ss);
233}
234
235static void ss_session_timeout(void *data)
236{
237 struct ss_session *ss = data;
238
Harald Welte97bfb652018-07-29 12:28:11 +0200239 LOGPSS(ss, LOGL_NOTICE, "SS Session Timeout, destroying\n");
Harald Weltebb779392018-06-16 20:21:10 +0200240 /* FIXME: should we send a ReturnError component to the MS? */
241 ss_session_free(ss);
242}
243
244struct ss_session *ss_session_alloc(struct hlr *hlr, const char *imsi, uint32_t session_id)
245{
246 struct ss_session *ss;
247
248 OSMO_ASSERT(!ss_session_find(hlr, imsi, session_id));
249
250 ss = talloc_zero(hlr, struct ss_session);
251 OSMO_ASSERT(ss);
252
253 OSMO_STRLCPY_ARRAY(ss->imsi, imsi);
254 ss->session_id = session_id;
Vadim Yanitskiye6ce52b2018-12-01 00:16:44 +0700255
256 /* Schedule self-destruction timer */
Harald Weltebb779392018-06-16 20:21:10 +0200257 osmo_timer_setup(&ss->timeout, ss_session_timeout, ss);
Vadim Yanitskiyd157a562018-12-01 00:03:39 +0700258 if (g_hlr->ncss_guard_timeout > 0)
259 osmo_timer_schedule(&ss->timeout, g_hlr->ncss_guard_timeout, 0);
Harald Weltebb779392018-06-16 20:21:10 +0200260
261 llist_add_tail(&ss->list, &hlr->ss_sessions);
262 return ss;
263}
264
265/***********************************************************************
Harald Welte72667312018-07-29 12:38:09 +0200266 * handling functions for encoding SS messages + wrapping them in GSUP
267 ***********************************************************************/
268
Neels Hofmeyrf1fe94c2019-04-02 04:26:55 +0200269/* Resolve the target MSC by ss->imsi and send GSUP message. */
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100270static int ss_gsup_send_to_ms(struct ss_session *ss, struct osmo_gsup_server *gs, struct osmo_gsup_message *gsup)
Neels Hofmeyrf1fe94c2019-04-02 04:26:55 +0200271{
272 struct hlr_subscriber subscr = {};
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100273 struct msgb *msg;
Neels Hofmeyrf1fe94c2019-04-02 04:26:55 +0200274 int rc;
275
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100276 if (ss->initial_req_from_ms) {
277 /* Use non-final osmo_gsup_req_respond() to not deallocate the ss->initial_req_from_ms */
278 osmo_gsup_req_respond(ss->initial_req_from_ms, gsup, false, false);
279 return 0;
280 }
281
282 msg = osmo_gsup_msgb_alloc("GSUP USSD FW");
283 rc = osmo_gsup_encode(msg, gsup);
284 if (rc) {
285 LOGPSS(ss, LOGL_ERROR, "Failed to encode GSUP message\n");
286 msgb_free(msg);
287 return rc;
288 }
289
Neels Hofmeyrf1fe94c2019-04-02 04:26:55 +0200290 /* Use vlr_number as looked up by the caller, or look up now. */
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100291 if (!ss->vlr_name.len) {
Neels Hofmeyrf1fe94c2019-04-02 04:26:55 +0200292 rc = db_subscr_get_by_imsi(g_hlr->dbc, ss->imsi, &subscr);
293 if (rc < 0) {
294 LOGPSS(ss, LOGL_ERROR, "Cannot find subscriber, cannot route GSUP message\n");
295 msgb_free(msg);
296 return -EINVAL;
297 }
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100298 osmo_ipa_name_set_str(&ss->vlr_name, subscr.vlr_number);
Neels Hofmeyrf1fe94c2019-04-02 04:26:55 +0200299 }
300
Oliver Smith95abc2b2019-04-04 12:00:24 +0200301 /* Check for empty string (all vlr_number strings end in "\0", because otherwise gsup_route_find() fails) */
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100302 if (ss->vlr_name.len <= 1) {
Neels Hofmeyrf1fe94c2019-04-02 04:26:55 +0200303 LOGPSS(ss, LOGL_ERROR, "Cannot send GSUP message, no VLR number stored for subscriber\n");
304 msgb_free(msg);
305 return -EINVAL;
306 }
307
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100308 LOGPSS(ss, LOGL_DEBUG, "Tx SS/USSD to VLR %s\n", osmo_ipa_name_to_str(&ss->vlr_name));
309 return osmo_gsup_send_to_ipa_name(gs, &ss->vlr_name, msg);
Neels Hofmeyrf1fe94c2019-04-02 04:26:55 +0200310}
311
Harald Welte72667312018-07-29 12:38:09 +0200312static int ss_tx_to_ms(struct ss_session *ss, enum osmo_gsup_message_type gsup_msg_type,
Vadim Yanitskiy6a6c7f82020-11-17 04:02:11 +0700313 struct msgb *ss_msg)
Harald Welte72667312018-07-29 12:38:09 +0200314
315{
Vadim Yanitskiy6a6c7f82020-11-17 04:02:11 +0700316 struct osmo_gsup_message resp;
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100317 int rc;
Harald Welte72667312018-07-29 12:38:09 +0200318
Vadim Yanitskiy6a6c7f82020-11-17 04:02:11 +0700319 resp = (struct osmo_gsup_message) {
320 .message_type = gsup_msg_type,
321 .session_id = ss->session_id,
322 .session_state = ss->state,
323 };
324
Harald Welte72667312018-07-29 12:38:09 +0200325 OSMO_STRLCPY_ARRAY(resp.imsi, ss->imsi);
Vadim Yanitskiy6a6c7f82020-11-17 04:02:11 +0700326
Harald Welte72667312018-07-29 12:38:09 +0200327 if (ss_msg) {
328 resp.ss_info = msgb_data(ss_msg);
329 resp.ss_info_len = msgb_length(ss_msg);
330 }
331
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100332 rc = ss_gsup_send_to_ms(ss, g_hlr->gs, &resp);
Harald Welte72667312018-07-29 12:38:09 +0200333
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100334 msgb_free(ss_msg);
335 return rc;
Harald Welte72667312018-07-29 12:38:09 +0200336}
337
338#if 0
339static int ss_tx_reject(struct ss_session *ss, int invoke_id, uint8_t problem_tag,
340 uint8_t problem_code)
341{
342 struct msgb *msg = gsm0480_gen_reject(invoke_id, problem_tag, problem_code);
343 LOGPSS(ss, LOGL_NOTICE, "Tx Reject(%u, 0x%02x, 0x%02x)\n", invoke_id,
344 problem_tag, problem_code);
345 OSMO_ASSERT(msg);
Vadim Yanitskiy6a6c7f82020-11-17 04:02:11 +0700346 ss->state = OSMO_GSUP_SESSION_STATE_END;
347 return ss_tx_to_ms(ss, OSMO_GSUP_MSGT_PROC_SS_RESULT, msg);
Harald Welte72667312018-07-29 12:38:09 +0200348}
349#endif
350
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100351static int ss_tx_to_ms_error(struct ss_session *ss, uint8_t invoke_id, uint8_t error_code)
Harald Welte72667312018-07-29 12:38:09 +0200352{
353 struct msgb *msg = gsm0480_gen_return_error(invoke_id, error_code);
354 LOGPSS(ss, LOGL_NOTICE, "Tx ReturnError(%u, 0x%02x)\n", invoke_id, error_code);
355 OSMO_ASSERT(msg);
Vadim Yanitskiy6a6c7f82020-11-17 04:02:11 +0700356 ss->state = OSMO_GSUP_SESSION_STATE_END;
357 return ss_tx_to_ms(ss, OSMO_GSUP_MSGT_PROC_SS_RESULT, msg);
Harald Welte72667312018-07-29 12:38:09 +0200358}
359
Vadim Yanitskiy6a6c7f82020-11-17 04:02:11 +0700360static int ss_tx_to_ms_ussd_7bit(struct ss_session *ss, uint8_t invoke_id, const char *text)
Harald Weltedab544e2018-07-29 16:14:48 +0200361{
362 struct msgb *msg = gsm0480_gen_ussd_resp_7bit(invoke_id, text);
363 LOGPSS(ss, LOGL_INFO, "Tx USSD '%s'\n", text);
364 OSMO_ASSERT(msg);
Vadim Yanitskiy6a6c7f82020-11-17 04:02:11 +0700365 return ss_tx_to_ms(ss, OSMO_GSUP_MSGT_PROC_SS_RESULT, msg);
Harald Weltedab544e2018-07-29 16:14:48 +0200366}
367
368/***********************************************************************
369 * Internal USSD Handlers
370 ***********************************************************************/
371
Neels Hofmeyr2f758032019-11-20 00:37:07 +0100372#include <osmocom/hlr/db.h>
Harald Weltedab544e2018-07-29 16:14:48 +0200373
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100374static int handle_ussd_own_msisdn(struct ss_session *ss,
Harald Weltedab544e2018-07-29 16:14:48 +0200375 const struct osmo_gsup_message *gsup, const struct ss_request *req)
376{
377 struct hlr_subscriber subscr;
378 char buf[GSM0480_USSD_7BIT_STRING_LEN+1];
379 int rc;
380
Vadim Yanitskiy6a6c7f82020-11-17 04:02:11 +0700381 ss->state = OSMO_GSUP_SESSION_STATE_END;
382
Harald Weltedab544e2018-07-29 16:14:48 +0200383 rc = db_subscr_get_by_imsi(g_hlr->dbc, ss->imsi, &subscr);
384 switch (rc) {
385 case 0:
386 if (strlen(subscr.msisdn) == 0)
387 snprintf(buf, sizeof(buf), "You have no MSISDN!");
388 else
Vadim Yanitskiy3adb33d2018-08-03 00:07:54 +0700389 snprintf(buf, sizeof(buf), "Your extension is %s", subscr.msisdn);
Vadim Yanitskiy6a6c7f82020-11-17 04:02:11 +0700390 ss_tx_to_ms_ussd_7bit(ss, req->invoke_id, buf);
Harald Weltedab544e2018-07-29 16:14:48 +0200391 break;
392 case -ENOENT:
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100393 ss_tx_to_ms_error(ss, req->invoke_id, GSM0480_ERR_CODE_UNKNOWN_SUBSCRIBER);
Harald Weltedab544e2018-07-29 16:14:48 +0200394 break;
395 case -EIO:
396 default:
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100397 ss_tx_to_ms_error(ss, req->invoke_id, GSM0480_ERR_CODE_SYSTEM_FAILURE);
Harald Weltedab544e2018-07-29 16:14:48 +0200398 break;
399 }
400 return 0;
401}
402
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100403static int handle_ussd_own_imsi(struct ss_session *ss,
Harald Weltedab544e2018-07-29 16:14:48 +0200404 const struct osmo_gsup_message *gsup, const struct ss_request *req)
405{
406 char buf[GSM0480_USSD_7BIT_STRING_LEN+1];
Vadim Yanitskiy3adb33d2018-08-03 00:07:54 +0700407 snprintf(buf, sizeof(buf), "Your IMSI is %s", ss->imsi);
Vadim Yanitskiy6a6c7f82020-11-17 04:02:11 +0700408 ss->state = OSMO_GSUP_SESSION_STATE_END;
409 ss_tx_to_ms_ussd_7bit(ss, req->invoke_id, buf);
Harald Weltedab544e2018-07-29 16:14:48 +0200410 return 0;
411}
412
Vadim Yanitskiydac855e2020-11-17 04:17:46 +0700413/* This handler just keeps the session idle unless the guard timer expires. */
414static int handle_ussd_test_idle(struct ss_session *ss,
415 const struct osmo_gsup_message *gsup,
416 const struct ss_request *req)
417{
418 char buf[GSM0480_USSD_7BIT_STRING_LEN + 1];
419 snprintf(buf, sizeof(buf), "Keeping your session idle, it will expire "
420 "at most in %u seconds.", g_hlr->ncss_guard_timeout);
421 ss->state = OSMO_GSUP_SESSION_STATE_CONTINUE;
422 ss_tx_to_ms_ussd_7bit(ss, req->invoke_id, buf);
423 return 0;
424}
425
Harald Weltedab544e2018-07-29 16:14:48 +0200426
427static const struct hlr_iuse hlr_iuses[] = {
428 {
429 .name = "own-msisdn",
430 .handle_ussd = handle_ussd_own_msisdn,
431 },
432 {
433 .name = "own-imsi",
434 .handle_ussd = handle_ussd_own_imsi,
435 },
Vadim Yanitskiydac855e2020-11-17 04:17:46 +0700436 {
437 .name = "test-idle",
438 .handle_ussd = handle_ussd_test_idle,
439 },
Harald Weltedab544e2018-07-29 16:14:48 +0200440};
441
442const struct hlr_iuse *iuse_find(const char *name)
443{
444 unsigned int i;
445
446 for (i = 0; i < ARRAY_SIZE(hlr_iuses); i++) {
447 const struct hlr_iuse *iuse = &hlr_iuses[i];
448 if (!strcmp(name, iuse->name))
449 return iuse;
450 }
451 return NULL;
452}
Harald Welte72667312018-07-29 12:38:09 +0200453
454
455/***********************************************************************
Harald Weltebb779392018-06-16 20:21:10 +0200456 * handling functions for individual GSUP messages
457 ***********************************************************************/
458
459static bool ss_op_is_ussd(uint8_t opcode)
460{
461 switch (opcode) {
462 case GSM0480_OP_CODE_PROCESS_USS_DATA:
463 case GSM0480_OP_CODE_PROCESS_USS_REQ:
464 case GSM0480_OP_CODE_USS_REQUEST:
465 case GSM0480_OP_CODE_USS_NOTIFY:
466 return true;
467 default:
468 return false;
469 }
470}
471
472/* is this GSUP connection an EUSE (true) or not (false)? */
Neels Hofmeyrc79bcde2019-12-04 01:04:32 +0100473static bool peer_name_is_euse(const struct osmo_cni_peer_id *peer_name)
Harald Weltebb779392018-06-16 20:21:10 +0200474{
Neels Hofmeyrc79bcde2019-12-04 01:04:32 +0100475 if (peer_name->type != OSMO_CNI_PEER_ID_IPA_NAME)
Harald Weltebb779392018-06-16 20:21:10 +0200476 return false;
Neels Hofmeyrc79bcde2019-12-04 01:04:32 +0100477 if (peer_name->ipa_name.len <= 5)
Harald Weltebb779392018-06-16 20:21:10 +0200478 return false;
Neels Hofmeyrc79bcde2019-12-04 01:04:32 +0100479 return strncmp((char *)(peer_name->ipa_name.val), "EUSE-", 5) == 0;
Harald Weltebb779392018-06-16 20:21:10 +0200480}
481
Neels Hofmeyrc79bcde2019-12-04 01:04:32 +0100482static struct hlr_euse *euse_by_name(const struct osmo_cni_peer_id *peer_name)
Harald Weltebb779392018-06-16 20:21:10 +0200483{
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100484 if (!peer_name_is_euse(peer_name))
Harald Weltebb779392018-06-16 20:21:10 +0200485 return NULL;
486
Neels Hofmeyrc79bcde2019-12-04 01:04:32 +0100487 /* above peer_name_is_euse() ensures this: */
488 OSMO_ASSERT(peer_name->type == OSMO_CNI_PEER_ID_IPA_NAME);
489
490 return euse_find(g_hlr, (const char*)(peer_name->ipa_name.val)+5);
Harald Weltebb779392018-06-16 20:21:10 +0200491}
492
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100493static int handle_ss(struct ss_session *ss, bool is_euse_originated, const struct osmo_gsup_message *gsup,
494 const struct ss_request *req)
Harald Weltebb779392018-06-16 20:21:10 +0200495{
496 uint8_t comp_type = gsup->ss_info[0];
497
Harald Welte7f32f5f2018-07-29 12:43:49 +0200498 LOGPSS(ss, LOGL_INFO, "SS CompType=%s, OpCode=%s\n",
Harald Weltebb779392018-06-16 20:21:10 +0200499 gsm0480_comp_type_name(comp_type), gsm0480_op_code_name(req->opcode));
Vadim Yanitskiy4a4bdcd2018-10-12 21:44:07 +0200500
501 /**
502 * FIXME: As we don't store any SS related information
503 * (e.g. call forwarding preferences) in the database,
504 * we don't handle "structured" SS requests at all.
505 */
506 LOGPSS(ss, LOGL_NOTICE, "Structured SS requests are not supported, rejecting...\n");
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100507 ss_tx_to_ms_error(ss, req->invoke_id, GSM0480_ERR_CODE_FACILITY_NOT_SUPPORTED);
Vadim Yanitskiy4a4bdcd2018-10-12 21:44:07 +0200508 return -ENOTSUP;
Harald Weltebb779392018-06-16 20:21:10 +0200509}
510
Harald Weltedab544e2018-07-29 16:14:48 +0200511/* Handle a USSD GSUP message for a given SS Session received from VLR or EUSE */
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100512static int handle_ussd(struct ss_session *ss, bool is_euse_originated, const struct osmo_gsup_message *gsup,
513 const struct ss_request *req)
Harald Weltebb779392018-06-16 20:21:10 +0200514{
515 uint8_t comp_type = gsup->ss_info[0];
516 struct msgb *msg_out;
Harald Weltebb779392018-06-16 20:21:10 +0200517
Harald Welte7f32f5f2018-07-29 12:43:49 +0200518 LOGPSS(ss, LOGL_INFO, "USSD CompType=%s, OpCode=%s '%s'\n",
Harald Weltebb779392018-06-16 20:21:10 +0200519 gsm0480_comp_type_name(comp_type), gsm0480_op_code_name(req->opcode),
520 req->ussd_text);
521
Harald Weltedab544e2018-07-29 16:14:48 +0200522 if ((ss->is_external && !ss->u.euse) || !ss->u.iuse) {
Harald Welte7f32f5f2018-07-29 12:43:49 +0200523 LOGPSS(ss, LOGL_NOTICE, "USSD for unknown code '%s'\n", req->ussd_text);
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100524 ss_tx_to_ms_error(ss, req->invoke_id, GSM0480_ERR_CODE_SS_NOT_AVAILABLE);
Harald Weltebb779392018-06-16 20:21:10 +0200525 return 0;
526 }
527
528 if (is_euse_originated) {
529 /* Received from EUSE, Forward to VLR */
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100530 /* Need a non-const osmo_gsup_message, because sending might modify some (routing related?) parts. */
531 struct osmo_gsup_message forward = *gsup;
532 ss_gsup_send_to_ms(ss, g_hlr->gs, &forward);
Harald Weltebb779392018-06-16 20:21:10 +0200533 } else {
Harald Weltedab544e2018-07-29 16:14:48 +0200534 /* Received from VLR (MS) */
535 if (ss->is_external) {
536 /* Forward to EUSE */
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100537 struct osmo_ipa_name euse_name;
538 struct osmo_gsup_conn *conn;
539 osmo_ipa_name_set_str(&euse_name, "EUSE-%s", ss->u.euse->name);
540 conn = gsup_route_find_by_ipa_name(g_hlr->gs, &euse_name);
Harald Weltedab544e2018-07-29 16:14:48 +0200541 if (!conn) {
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100542 LOGPSS(ss, LOGL_ERROR, "Cannot find conn for EUSE %s\n",
543 osmo_ipa_name_to_str(&euse_name));
544 ss_tx_to_ms_error(ss, req->invoke_id, GSM0480_ERR_CODE_SYSTEM_FAILURE);
Harald Weltedab544e2018-07-29 16:14:48 +0200545 } else {
Neels Hofmeyra7d0f872019-10-30 02:08:28 +0100546 msg_out = osmo_gsup_msgb_alloc("GSUP USSD FW");
Harald Weltedab544e2018-07-29 16:14:48 +0200547 osmo_gsup_encode(msg_out, gsup);
548 osmo_gsup_conn_send(conn, msg_out);
549 }
Harald Welte72667312018-07-29 12:38:09 +0200550 } else {
Harald Weltedab544e2018-07-29 16:14:48 +0200551 /* Handle internally */
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100552 ss->u.iuse->handle_ussd(ss, gsup, req);
Vadim Yanitskiy6a6c7f82020-11-17 04:02:11 +0700553 /* Release session if the handler has changed its state to END */
554 if (ss->state == OSMO_GSUP_SESSION_STATE_END)
555 ss_session_free(ss);
Harald Weltebb779392018-06-16 20:21:10 +0200556 }
Harald Weltebb779392018-06-16 20:21:10 +0200557 }
558
559 return 0;
560}
561
562
563/* this function is called for any SS_REQ/SS_RESP messages from both the MSC/VLR side as well
564 * as from the EUSE side */
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100565void rx_proc_ss_req(struct osmo_gsup_req *gsup_req)
Harald Weltebb779392018-06-16 20:21:10 +0200566{
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100567 struct hlr *hlr = g_hlr;
Harald Weltebb779392018-06-16 20:21:10 +0200568 struct ss_session *ss;
569 struct ss_request req = {0};
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100570 const struct osmo_gsup_message *gsup = &gsup_req->gsup;
571 /* Remember whether this function should free the incoming gsup_req: if it is placed as ss->initial_req_from_*,
572 * do not free it here. If not, free it here. */
573 struct osmo_gsup_req *free_gsup_req = gsup_req;
574 bool is_euse_originated = peer_name_is_euse(&gsup_req->source_name);
Harald Weltebb779392018-06-16 20:21:10 +0200575
Harald Welte95b96d42018-07-29 12:47:39 +0200576 LOGP(DSS, LOGL_DEBUG, "%s/0x%08x: Process SS (%s)\n", gsup->imsi, gsup->session_id,
Harald Weltebb779392018-06-16 20:21:10 +0200577 osmo_gsup_session_state_name(gsup->session_state));
578
Neels Hofmeyrc79bcde2019-12-04 01:04:32 +0100579 if (gsup_req->source_name.type != OSMO_CNI_PEER_ID_IPA_NAME) {
580 LOGP(DSS, LOGL_ERROR, "%s/0x%082x: Unable to process SS request: Unsupported GSUP peer id type%s\n",
581 gsup->imsi, gsup->session_id,
582 osmo_cni_peer_id_type_name(gsup_req->source_name.type));
583 osmo_gsup_req_respond_err(gsup_req, GMM_CAUSE_PROTO_ERR_UNSPEC, "error processing SS request");
584 return;
585 }
586
Harald Weltebb779392018-06-16 20:21:10 +0200587 /* decode and find out what kind of SS message it is */
588 if (gsup->ss_info && gsup->ss_info_len) {
589 if (gsm0480_parse_facility_ie(gsup->ss_info, gsup->ss_info_len, &req)) {
Harald Welte95b96d42018-07-29 12:47:39 +0200590 LOGP(DSS, LOGL_ERROR, "%s/0x%082x: Unable to parse SS request: %s\n",
Harald Weltebb779392018-06-16 20:21:10 +0200591 gsup->imsi, gsup->session_id,
592 osmo_hexdump(gsup->ss_info, gsup->ss_info_len));
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100593 osmo_gsup_req_respond_err(gsup_req, GMM_CAUSE_INV_MAND_INFO, "error parsing SS request");
594 return;
Harald Weltebb779392018-06-16 20:21:10 +0200595 }
Vadim Yanitskiy937f5832019-07-24 19:14:32 +0700596 } else if (gsup->session_state != OSMO_GSUP_SESSION_STATE_END) {
597 LOGP(DSS, LOGL_ERROR, "%s/0x%082x: Missing SS payload for '%s'\n",
598 gsup->imsi, gsup->session_id,
599 osmo_gsup_session_state_name(gsup->session_state));
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100600 osmo_gsup_req_respond_err(gsup_req, GMM_CAUSE_INV_MAND_INFO, "missing SS payload");
601 return;
Harald Weltebb779392018-06-16 20:21:10 +0200602 }
603
604 switch (gsup->session_state) {
605 case OSMO_GSUP_SESSION_STATE_BEGIN:
606 /* Check for overlapping Session ID usage */
607 if (ss_session_find(hlr, gsup->imsi, gsup->session_id)) {
Harald Welte95b96d42018-07-29 12:47:39 +0200608 LOGP(DSS, LOGL_ERROR, "%s/0x%08x: BEGIN with non-unique session ID!\n",
Harald Weltebb779392018-06-16 20:21:10 +0200609 gsup->imsi, gsup->session_id);
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100610 osmo_gsup_req_respond_err(gsup_req, GMM_CAUSE_INV_MAND_INFO, "BEGIN with non-unique session ID");
611 return;
Harald Weltebb779392018-06-16 20:21:10 +0200612 }
613 ss = ss_session_alloc(hlr, gsup->imsi, gsup->session_id);
614 if (!ss) {
Harald Welte95b96d42018-07-29 12:47:39 +0200615 LOGP(DSS, LOGL_ERROR, "%s/0x%08x: Unable to allocate SS session\n",
Harald Weltebb779392018-06-16 20:21:10 +0200616 gsup->imsi, gsup->session_id);
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100617 osmo_gsup_req_respond_err(gsup_req, GMM_CAUSE_NET_FAIL, "Unable to allocate SS session");
618 return;
Harald Weltebb779392018-06-16 20:21:10 +0200619 }
Oliver Smith95abc2b2019-04-04 12:00:24 +0200620 /* Get IPA name from VLR conn and save as ss->vlr_number */
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100621 if (!is_euse_originated) {
622 ss->initial_req_from_ms = gsup_req;
623 free_gsup_req = NULL;
Neels Hofmeyrc79bcde2019-12-04 01:04:32 +0100624 OSMO_ASSERT(gsup_req->source_name.type == OSMO_CNI_PEER_ID_IPA_NAME); /* checked above */
625 ss->vlr_name = gsup_req->source_name.ipa_name;
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100626 } else {
627 ss->initial_req_from_euse = gsup_req;
628 free_gsup_req = NULL;
Oliver Smith95abc2b2019-04-04 12:00:24 +0200629 }
Harald Weltebb779392018-06-16 20:21:10 +0200630 if (ss_op_is_ussd(req.opcode)) {
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100631 if (is_euse_originated) {
Harald Weltebb779392018-06-16 20:21:10 +0200632 /* EUSE->VLR: MT USSD. EUSE is known ('conn'), VLR is to be resolved */
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100633 ss->u.euse = euse_by_name(&gsup_req->source_name);
Harald Weltebb779392018-06-16 20:21:10 +0200634 } else {
635 /* VLR->EUSE: MO USSD. VLR is known ('conn'), EUSE is to be resolved */
Harald Weltedab544e2018-07-29 16:14:48 +0200636 struct hlr_ussd_route *rt;
Vadim Yanitskiy5800f3a2023-06-28 19:07:49 +0700637 rt = ussd_route_lookup_for_req(hlr, &req);
Harald Weltedab544e2018-07-29 16:14:48 +0200638 if (rt) {
639 if (rt->is_external) {
640 ss->is_external = true;
641 ss->u.euse = rt->u.euse;
642 } else if (rt) {
643 ss->is_external = false;
644 ss->u.iuse = rt->u.iuse;
645 }
Harald Welte1eb98692018-08-08 08:57:26 +0200646 } else {
647 if (hlr->euse_default) {
648 ss->is_external = true;
649 ss->u.euse = hlr->euse_default;
650 }
Harald Weltedab544e2018-07-29 16:14:48 +0200651 }
Harald Weltebb779392018-06-16 20:21:10 +0200652 }
653 /* dispatch unstructured SS to routing */
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100654 handle_ussd(ss, is_euse_originated, &gsup_req->gsup, &req);
Harald Weltebb779392018-06-16 20:21:10 +0200655 } else {
656 /* dispatch non-call SS to internal code */
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100657 handle_ss(ss, is_euse_originated, &gsup_req->gsup, &req);
Harald Weltebb779392018-06-16 20:21:10 +0200658 }
659 break;
660 case OSMO_GSUP_SESSION_STATE_CONTINUE:
661 ss = ss_session_find(hlr, gsup->imsi, gsup->session_id);
662 if (!ss) {
Harald Welte95b96d42018-07-29 12:47:39 +0200663 LOGP(DSS, LOGL_ERROR, "%s/0x%08x: CONTINUE for unknown SS session\n",
Harald Weltebb779392018-06-16 20:21:10 +0200664 gsup->imsi, gsup->session_id);
Vadim Yanitskiyf4223f52023-07-05 00:24:04 +0700665 osmo_gsup_req_respond_err(gsup_req, GMM_CAUSE_MSGT_INCOMP_P_STATE,
666 "CONTINUE for unknown SS session");
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100667 return;
Harald Weltebb779392018-06-16 20:21:10 +0200668 }
Vadim Yanitskiye6ce52b2018-12-01 00:16:44 +0700669
670 /* Reschedule self-destruction timer */
671 if (g_hlr->ncss_guard_timeout > 0)
672 osmo_timer_schedule(&ss->timeout, g_hlr->ncss_guard_timeout, 0);
673
Harald Weltebb779392018-06-16 20:21:10 +0200674 if (ss_op_is_ussd(req.opcode)) {
675 /* dispatch unstructured SS to routing */
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100676 handle_ussd(ss, is_euse_originated, &gsup_req->gsup, &req);
Harald Weltebb779392018-06-16 20:21:10 +0200677 } else {
678 /* dispatch non-call SS to internal code */
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100679 handle_ss(ss, is_euse_originated, &gsup_req->gsup, &req);
Harald Weltebb779392018-06-16 20:21:10 +0200680 }
681 break;
682 case OSMO_GSUP_SESSION_STATE_END:
683 ss = ss_session_find(hlr, gsup->imsi, gsup->session_id);
684 if (!ss) {
Harald Welte95b96d42018-07-29 12:47:39 +0200685 LOGP(DSS, LOGL_ERROR, "%s/0x%08x: END for unknown SS session\n",
Harald Weltebb779392018-06-16 20:21:10 +0200686 gsup->imsi, gsup->session_id);
Vadim Yanitskiyf4223f52023-07-05 00:24:04 +0700687 osmo_gsup_req_respond_err(gsup_req, GMM_CAUSE_MSGT_INCOMP_P_STATE,
688 "END for unknown SS session");
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100689 return;
Harald Weltebb779392018-06-16 20:21:10 +0200690 }
Vadim Yanitskiy937f5832019-07-24 19:14:32 +0700691
692 /* SS payload is optional for END */
693 if (gsup->ss_info && gsup->ss_info_len) {
694 if (ss_op_is_ussd(req.opcode)) {
695 /* dispatch unstructured SS to routing */
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100696 handle_ussd(ss, is_euse_originated, &gsup_req->gsup, &req);
Vadim Yanitskiy937f5832019-07-24 19:14:32 +0700697 } else {
698 /* dispatch non-call SS to internal code */
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100699 handle_ss(ss, is_euse_originated, &gsup_req->gsup, &req);
Vadim Yanitskiy937f5832019-07-24 19:14:32 +0700700 }
Harald Weltebb779392018-06-16 20:21:10 +0200701 }
Vadim Yanitskiy937f5832019-07-24 19:14:32 +0700702
Harald Weltebb779392018-06-16 20:21:10 +0200703 ss_session_free(ss);
704 break;
705 default:
Harald Welte95b96d42018-07-29 12:47:39 +0200706 LOGP(DSS, LOGL_ERROR, "%s/0x%08x: Unknown SS State %d\n", gsup->imsi,
Harald Welte7f32f5f2018-07-29 12:43:49 +0200707 gsup->session_id, gsup->session_state);
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100708 break;
Harald Weltebb779392018-06-16 20:21:10 +0200709 }
710
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100711 if (free_gsup_req)
712 osmo_gsup_req_free(free_gsup_req);
Harald Weltebb779392018-06-16 20:21:10 +0200713}
714
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100715void rx_proc_ss_error(struct osmo_gsup_req *req)
Harald Weltebb779392018-06-16 20:21:10 +0200716{
Neels Hofmeyrad868e22019-11-20 02:36:45 +0100717 LOGP(DSS, LOGL_NOTICE, "%s/0x%08x: Process SS ERROR (%s)\n", req->gsup.imsi, req->gsup.session_id,
718 osmo_gsup_session_state_name(req->gsup.session_state));
Vadim Yanitskiyf4223f52023-07-05 00:24:04 +0700719 osmo_gsup_req_free(req);
Harald Weltebb779392018-06-16 20:21:10 +0200720}