blob: 0f5b23194ac2bd6c839ec55e401bf67e6619ced2 [file] [log] [blame]
Daniel Willmann97374c02015-12-03 09:37:58 +01001/* Test HNB */
2
3/* (C) 2015 by Daniel Willmann <dwillmann@sysmocom.de>
4 * (C) 2015 by Sysmocom s.f.m.c. GmbH
5 * All Rights Reserved
6 *
7 * This program is free software; you can redistribute it and/or modify
8 * it under the terms of the GNU Affero General Public License as published by
9 * the Free Software Foundation; either version 3 of the License, or
10 * (at your option) any later version.
11 *
12 * This program is distributed in the hope that it will be useful,
13 * but WITHOUT ANY WARRANTY; without even the implied warranty of
14 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 * GNU Affero General Public License for more details.
16 *
17 * You should have received a copy of the GNU Affero General Public License
18 * along with this program. If not, see <http://www.gnu.org/licenses/>.
19 *
20 */
21
22#include <unistd.h>
23#include <stdio.h>
24#include <stdlib.h>
25#include <string.h>
26#include <getopt.h>
27#include <errno.h>
28#include <signal.h>
29
30#include <sys/types.h>
31#include <sys/socket.h>
32#include <netinet/in.h>
33#include <netinet/sctp.h>
34#include <arpa/inet.h>
35
36#include <osmocom/core/application.h>
37#include <osmocom/core/talloc.h>
38#include <osmocom/core/select.h>
39#include <osmocom/core/logging.h>
40#include <osmocom/core/socket.h>
41#include <osmocom/core/msgb.h>
42#include <osmocom/core/write_queue.h>
Harald Weltec3851222015-12-24 15:41:21 +010043#include <osmocom/netif/stream.h>
Neels Hofmeyrae937122016-02-29 09:32:00 +010044#include <osmocom/gsm/tlv.h>
45#include <osmocom/gsm/gsm48.h>
Daniel Willmann97374c02015-12-03 09:37:58 +010046
47#include <osmocom/vty/telnet_interface.h>
48#include <osmocom/vty/logging.h>
Harald Weltec3851222015-12-24 15:41:21 +010049#include <osmocom/vty/command.h>
Daniel Willmann97374c02015-12-03 09:37:58 +010050
Neels Hofmeyr26779f82016-04-18 17:04:17 +020051#include <osmocom/crypt/auth.h>
52
Daniel Willmann97374c02015-12-03 09:37:58 +010053#include "hnb-test.h"
Neels Hofmeyr4470f932016-04-19 00:13:53 +020054#include "hnb-test-layers.h"
Daniel Willmanna1e202e2015-12-07 17:21:07 +010055#include "hnbap_common.h"
56#include "hnbap_ies_defs.h"
Harald Welteb66c5d02016-01-03 18:04:28 +010057#include "rua_msg_factory.h"
Harald Weltec3851222015-12-24 15:41:21 +010058#include "asn1helpers.h"
Neels Hofmeyr96979af2016-01-05 15:19:44 +010059#include <osmocom/ranap/iu_helpers.h>
Harald Welte87ffeb92015-12-25 15:34:22 +010060#include "test_common.h"
Harald Weltec3851222015-12-24 15:41:21 +010061
Neels Hofmeyr96979af2016-01-05 15:19:44 +010062#include <osmocom/ranap/ranap_msg_factory.h>
Daniel Willmann97374c02015-12-03 09:37:58 +010063
Neels Hofmeyr0968a582016-01-11 15:19:38 +010064#include <osmocom/rua/RUA_RUA-PDU.h>
65
Neels Hofmeyr860a1292016-02-18 23:03:15 +010066#include <osmocom/gsm/protocol/gsm_04_08.h>
67
68#include <osmocom/ranap/RANAP_ProcedureCode.h>
69#include <osmocom/ranap/RANAP_Criticality.h>
70#include <osmocom/ranap/RANAP_DirectTransfer.h>
71
Daniel Willmann97374c02015-12-03 09:37:58 +010072static void *tall_hnb_ctx;
Daniel Willmann97374c02015-12-03 09:37:58 +010073
74struct hnb_test g_hnb_test = {
Neels Hofmeyr5f9be1e2016-02-29 13:33:44 +010075 .gw_addr = "127.0.0.1",
Daniel Willmann97374c02015-12-03 09:37:58 +010076 .gw_port = IUH_DEFAULT_SCTP_PORT,
77};
78
Harald Weltec3851222015-12-24 15:41:21 +010079struct msgb *rua_new_udt(struct msgb *inmsg);
80
Harald Weltec3851222015-12-24 15:41:21 +010081static int hnb_test_ue_de_register_tx(struct hnb_test *hnb_test)
Daniel Willmann19dedbb2015-12-17 11:57:41 +010082{
83 struct msgb *msg;
84 int rc, imsi_len;
85 uint32_t ctx_id;
86
87 UEDe_Register_t dereg;
88 UEDe_RegisterIEs_t dereg_ies;
89 memset(&dereg_ies, 0, sizeof(dereg_ies));
90
91 asn1_u24_to_bitstring(&dereg_ies.context_ID, &ctx_id, hnb_test->ctx_id);
92 dereg_ies.cause.present = Cause_PR_radioNetwork;
93 dereg_ies.cause.choice.radioNetwork = CauseRadioNetwork_connection_with_UE_lost;
94
95 memset(&dereg, 0, sizeof(dereg));
96 rc = hnbap_encode_uede_registeries(&dereg, &dereg_ies);
97
98 msg = hnbap_generate_initiating_message(ProcedureCode_id_UEDe_Register,
99 Criticality_ignore,
100 &asn_DEF_UEDe_Register,
101 &dereg);
102
Harald Weltec3851222015-12-24 15:41:21 +0100103 ASN_STRUCT_FREE_CONTENTS_ONLY(asn_DEF_UEDe_Register, &dereg);
Daniel Willmann19dedbb2015-12-17 11:57:41 +0100104
Harald Weltec3851222015-12-24 15:41:21 +0100105 msgb_sctp_ppid(msg) = IUH_PPI_HNBAP;
Daniel Willmann19dedbb2015-12-17 11:57:41 +0100106
107 return osmo_wqueue_enqueue(&hnb_test->wqueue, msg);
108}
109
Harald Weltec3851222015-12-24 15:41:21 +0100110static int hnb_test_ue_register_tx(struct hnb_test *hnb_test, const char *imsi_str)
Daniel Willmann479cb302015-12-09 17:54:59 +0100111{
Daniel Willmann4e312502015-12-09 17:59:24 +0100112 struct msgb *msg;
113 int rc, imsi_len;
114
115 char imsi_buf[16];
Daniel Willmann141a0ba2015-12-17 18:03:52 +0100116
Daniel Willmann4e312502015-12-09 17:59:24 +0100117 UERegisterRequest_t request_out;
118 UERegisterRequestIEs_t request;
119 memset(&request, 0, sizeof(request));
120
121 request.uE_Identity.present = UE_Identity_PR_iMSI;
122
Harald Welte056984f2016-01-03 16:31:31 +0100123 imsi_len = ranap_imsi_encode(imsi_buf, sizeof(imsi_buf), imsi_str);
Harald Weltec3851222015-12-24 15:41:21 +0100124 OCTET_STRING_fromBuf(&request.uE_Identity.choice.iMSI, imsi_buf, imsi_len);
Daniel Willmann4e312502015-12-09 17:59:24 +0100125
126 request.registration_Cause = Registration_Cause_normal;
127 request.uE_Capabilities.access_stratum_release_indicator = Access_stratum_release_indicator_rel_6;
128 request.uE_Capabilities.csg_capability = CSG_Capability_not_csg_capable;
129
130 memset(&request_out, 0, sizeof(request_out));
131 rc = hnbap_encode_ueregisterrequesties(&request_out, &request);
132
133 msg = hnbap_generate_initiating_message(ProcedureCode_id_UERegister,
134 Criticality_reject,
135 &asn_DEF_UERegisterRequest,
136 &request_out);
137
Harald Weltec3851222015-12-24 15:41:21 +0100138 ASN_STRUCT_FREE_CONTENTS_ONLY(asn_DEF_UERegisterRequest, &request_out);
Daniel Willmann4e312502015-12-09 17:59:24 +0100139
Harald Weltec3851222015-12-24 15:41:21 +0100140 msgb_sctp_ppid(msg) = IUH_PPI_HNBAP;
Daniel Willmann4e312502015-12-09 17:59:24 +0100141
142 return osmo_wqueue_enqueue(&hnb_test->wqueue, msg);
Daniel Willmann479cb302015-12-09 17:54:59 +0100143}
144
Harald Weltec3851222015-12-24 15:41:21 +0100145static int hnb_test_rx_hnb_register_acc(struct hnb_test *hnb, ANY_t *in)
Daniel Willmann479cb302015-12-09 17:54:59 +0100146{
147 int rc;
148 HNBRegisterAcceptIEs_t accept;
149
150 rc = hnbap_decode_hnbregisteraccepties(&accept, in);
151 if (rc < 0) {
152 }
153
154 hnb->rnc_id = accept.rnc_id;
155 printf("HNB Register accept with RNC ID %u\n", hnb->rnc_id);
156
Daniel Willmann11e912a2016-01-07 13:19:30 +0100157 hnbap_free_hnbregisteraccepties(&accept);
Harald Weltec3851222015-12-24 15:41:21 +0100158 return 0;
Daniel Willmann479cb302015-12-09 17:54:59 +0100159}
160
Harald Weltec3851222015-12-24 15:41:21 +0100161static int hnb_test_rx_ue_register_acc(struct hnb_test *hnb, ANY_t *in)
Daniel Willmanna7b02402015-12-09 19:05:09 +0100162{
163 int rc;
164 uint32_t ctx_id;
165 UERegisterAcceptIEs_t accept;
166 char imsi[16];
167
168 rc = hnbap_decode_ueregisteraccepties(&accept, in);
169 if (rc < 0) {
170 return rc;
171 }
172
173 if (accept.uE_Identity.present != UE_Identity_PR_iMSI) {
174 printf("Wrong type in UE register accept\n");
175 return -1;
176 }
177
178 ctx_id = asn1bitstr_to_u24(&accept.context_ID);
179
Harald Welte056984f2016-01-03 16:31:31 +0100180 ranap_bcd_decode(imsi, sizeof(imsi), accept.uE_Identity.choice.iMSI.buf,
Daniel Willmanna7b02402015-12-09 19:05:09 +0100181 accept.uE_Identity.choice.iMSI.size);
182 printf("UE Register accept for IMSI %s, context %u\n", imsi, ctx_id);
183
Daniel Willmann19dedbb2015-12-17 11:57:41 +0100184 hnb->ctx_id = ctx_id;
Daniel Willmann11e912a2016-01-07 13:19:30 +0100185 hnbap_free_ueregisteraccepties(&accept);
Daniel Willmann19dedbb2015-12-17 11:57:41 +0100186
Daniel Willmanna7b02402015-12-09 19:05:09 +0100187 return 0;
188}
189
Neels Hofmeyr860a1292016-02-18 23:03:15 +0100190static struct msgb *gen_nas_id_resp()
191{
192 uint8_t id_resp[] = {
Neels Hofmeyr5c1cc8c2016-02-29 09:28:48 +0100193 GSM48_PDISC_MM,
194 GSM48_MT_MM_ID_RESP,
Neels Hofmeyr860a1292016-02-18 23:03:15 +0100195 /* IMEISV */
196 0x09, /* len */
197 0x03, /* first digit (0000) + even (0) + id IMEISV (011) */
198 0x31, 0x91, 0x06, 0x00, 0x28, 0x47, 0x11, /* digits */
199 0xf2, /* filler (1111) + last digit (0010) */
200 };
201
Neels Hofmeyre1f709f2016-02-28 00:50:45 +0100202 return ranap_new_msg_dt(0, id_resp, sizeof(id_resp));
Neels Hofmeyr860a1292016-02-18 23:03:15 +0100203}
204
Neels Hofmeyrae937122016-02-29 09:32:00 +0100205static struct msgb *gen_nas_tmsi_realloc_compl()
206{
207 uint8_t id_resp[] = {
208 GSM48_PDISC_MM,
209 GSM48_MT_MM_TMSI_REALL_COMPL,
210 };
211
212 return ranap_new_msg_dt(0, id_resp, sizeof(id_resp));
213}
214
Neels Hofmeyr26779f82016-04-18 17:04:17 +0200215static struct msgb *gen_nas_auth_resp(uint8_t *sres)
Neels Hofmeyr35888102016-03-09 01:39:56 +0100216{
217 uint8_t id_resp[] = {
218 GSM48_PDISC_MM,
Neels Hofmeyr99872602016-04-05 11:51:15 +0200219 0x80 | GSM48_MT_MM_AUTH_RESP, /* simulate sequence nr 2 */
Neels Hofmeyr35888102016-03-09 01:39:56 +0100220 0x61, 0xb5, 0x69, 0xf5 /* hardcoded SRES */
221 };
222
Neels Hofmeyr26779f82016-04-18 17:04:17 +0200223 memcpy(id_resp + 2, sres, 4);
224
Neels Hofmeyr35888102016-03-09 01:39:56 +0100225 return ranap_new_msg_dt(0, id_resp, sizeof(id_resp));
226}
227
Neels Hofmeyrae937122016-02-29 09:32:00 +0100228static int hnb_test_nas_tx_dt(struct hnb_test *hnb, struct msgb *txm)
Neels Hofmeyr860a1292016-02-18 23:03:15 +0100229{
230 struct hnbtest_chan *chan;
Neels Hofmeyrae937122016-02-29 09:32:00 +0100231 struct msgb *rua;
Neels Hofmeyr860a1292016-02-18 23:03:15 +0100232
233 chan = hnb->cs.chan;
234 if (!chan) {
Neels Hofmeyrae937122016-02-29 09:32:00 +0100235 printf("hnb_test_nas_tx_tmsi_realloc_compl(): No CS channel established yet.\n");
Neels Hofmeyr860a1292016-02-18 23:03:15 +0100236 return -1;
237 }
238
Neels Hofmeyr860a1292016-02-18 23:03:15 +0100239 rua = rua_new_dt(chan->is_ps, chan->conn_id, txm);
Neels Hofmeyr860a1292016-02-18 23:03:15 +0100240 osmo_wqueue_enqueue(&g_hnb_test.wqueue, rua);
Neels Hofmeyr860a1292016-02-18 23:03:15 +0100241 return 0;
242}
243
Neels Hofmeyr4470f932016-04-19 00:13:53 +0200244static struct tlv_parsed *parse_mm(struct gsm48_hdr *gh, int len)
Neels Hofmeyrd4598fa2016-03-09 01:37:40 +0100245{
246 static struct tlv_parsed tp;
Neels Hofmeyrd4598fa2016-03-09 01:37:40 +0100247 int parse_res;
Neels Hofmeyrd4598fa2016-03-09 01:37:40 +0100248
Neels Hofmeyr4470f932016-04-19 00:13:53 +0200249 len -= (const char *)&gh->data[0] - (const char *)gh;
Neels Hofmeyrd4598fa2016-03-09 01:37:40 +0100250
Neels Hofmeyrd7ad0ac2016-04-05 11:52:27 +0200251 OSMO_ASSERT(gsm48_hdr_pdisc(gh) == GSM48_PDISC_MM);
252
Neels Hofmeyr4470f932016-04-19 00:13:53 +0200253 parse_res = tlv_parse(&tp, &gsm48_mm_att_tlvdef, &gh->data[0], len, 0, 0);
Neels Hofmeyrd4598fa2016-03-09 01:37:40 +0100254 if (parse_res <= 0) {
Neels Hofmeyr7c28f6f2016-04-05 11:49:53 +0200255 uint8_t msg_type = gsm48_hdr_msg_type(gh);
Neels Hofmeyrd4598fa2016-03-09 01:37:40 +0100256 printf("Error parsing MM message 0x%hhx: %d\n", msg_type, parse_res);
257 return NULL;
258 }
259
260 return &tp;
261}
262
Neels Hofmeyr4470f932016-04-19 00:13:53 +0200263int hnb_test_nas_rx_lu_accept(struct gsm48_hdr *gh, int len, int *sent_tmsi)
Neels Hofmeyrae937122016-02-29 09:32:00 +0100264{
265 printf(" :D Location Update Accept :D\n");
Neels Hofmeyrae937122016-02-29 09:32:00 +0100266 struct gsm48_loc_area_id *lai;
Neels Hofmeyrc04eb532016-03-04 12:38:43 +0100267
Neels Hofmeyrae937122016-02-29 09:32:00 +0100268 lai = (struct gsm48_loc_area_id *)&gh->data[0];
269
270 uint16_t mcc, mnc, lac;
271 gsm48_decode_lai(lai, &mcc, &mnc, &lac);
272 printf("LU: mcc %hd mnc %hd lac %hd\n",
273 mcc, mnc, lac);
274
Neels Hofmeyrc04eb532016-03-04 12:38:43 +0100275 struct tlv_parsed tp;
276 int parse_res;
277
Neels Hofmeyr4470f932016-04-19 00:13:53 +0200278 len -= (const char *)&gh->data[0] - (const char *)gh;
279 parse_res = tlv_parse(&tp, &gsm48_mm_att_tlvdef, &gh->data[0], len, 0, 0);
Neels Hofmeyrc04eb532016-03-04 12:38:43 +0100280 if (parse_res <= 0) {
281 printf("Error parsing Location Update Accept message: %d\n", parse_res);
282 return -1;
283 }
284
285 if (TLVP_PRESENT(&tp, GSM48_IE_MOBILE_ID)) {
286 uint8_t type = TLVP_VAL(&tp, GSM48_IE_NAME_SHORT)[0] & 0x0f;
287 if (type == GSM_MI_TYPE_TMSI)
288 *sent_tmsi = 1;
289 else *sent_tmsi = 0;
290 }
291 return 0;
Neels Hofmeyrae937122016-02-29 09:32:00 +0100292}
293
Neels Hofmeyr4470f932016-04-19 00:13:53 +0200294void hnb_test_nas_rx_mm_info(struct gsm48_hdr *gh, int len)
Neels Hofmeyrae937122016-02-29 09:32:00 +0100295{
296 printf(" :) MM Info :)\n");
Neels Hofmeyr4470f932016-04-19 00:13:53 +0200297 struct tlv_parsed *tp = parse_mm(gh, len);
Neels Hofmeyrd4598fa2016-03-09 01:37:40 +0100298 if (!tp)
Neels Hofmeyrae937122016-02-29 09:32:00 +0100299 return;
Neels Hofmeyrae937122016-02-29 09:32:00 +0100300
Neels Hofmeyrd4598fa2016-03-09 01:37:40 +0100301 if (TLVP_PRESENT(tp, GSM48_IE_NAME_SHORT)) {
Neels Hofmeyrae937122016-02-29 09:32:00 +0100302 char name[128] = {0};
303 gsm_7bit_decode_n(name, 127,
Neels Hofmeyrd4598fa2016-03-09 01:37:40 +0100304 TLVP_VAL(tp, GSM48_IE_NAME_SHORT)+1,
305 (TLVP_LEN(tp, GSM48_IE_NAME_SHORT)-1)*8/7);
Neels Hofmeyrae937122016-02-29 09:32:00 +0100306 printf("Info: Short Network Name: %s\n", name);
307 }
308
Neels Hofmeyrd4598fa2016-03-09 01:37:40 +0100309 if (TLVP_PRESENT(tp, GSM48_IE_NAME_LONG)) {
Neels Hofmeyrae937122016-02-29 09:32:00 +0100310 char name[128] = {0};
311 gsm_7bit_decode_n(name, 127,
Neels Hofmeyrd4598fa2016-03-09 01:37:40 +0100312 TLVP_VAL(tp, GSM48_IE_NAME_LONG)+1,
313 (TLVP_LEN(tp, GSM48_IE_NAME_LONG)-1)*8/7);
Neels Hofmeyrae937122016-02-29 09:32:00 +0100314 printf("Info: Long Network Name: %s\n", name);
315 }
Neels Hofmeyrae937122016-02-29 09:32:00 +0100316}
317
Neels Hofmeyr4470f932016-04-19 00:13:53 +0200318static int hnb_test_nas_rx_auth_req(struct hnb_test *hnb, struct gsm48_hdr *gh,
319 int len)
Neels Hofmeyr35888102016-03-09 01:39:56 +0100320{
Neels Hofmeyr35888102016-03-09 01:39:56 +0100321 struct gsm48_auth_req *ar;
322 int parse_res;
Neels Hofmeyr35888102016-03-09 01:39:56 +0100323
Neels Hofmeyr4470f932016-04-19 00:13:53 +0200324 len -= (const char *)&gh->data[0] - (const char *)gh;
Neels Hofmeyr35888102016-03-09 01:39:56 +0100325
Neels Hofmeyr4470f932016-04-19 00:13:53 +0200326 if (len < sizeof(*ar)) {
Neels Hofmeyr35888102016-03-09 01:39:56 +0100327 printf("GSM48 Auth Req does not fit.\n");
328 return;
329 }
330
331 printf(" :) Authentication Request :)\n");
332
333 ar = (struct gsm48_auth_req*) &gh->data[0];
334 int seq = ar->key_seq;
Neels Hofmeyr26779f82016-04-18 17:04:17 +0200335
336 /* Generate SRES from *HARDCODED* Ki for Iuh testing */
337 struct osmo_auth_vector vec;
338 /* Ki 000102030405060708090a0b0c0d0e0f */
339 struct osmo_sub_auth_data auth = {
340 .type = OSMO_AUTH_TYPE_GSM,
341 .algo = OSMO_AUTH_ALG_COMP128v1,
342 .u.gsm.ki = {
343 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06,
344 0x07, 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d,
345 0x0e, 0x0f
346 },
347 };
348
349 memset(&vec, 0, sizeof(vec));
350 osmo_auth_gen_vec(&vec, &auth, ar->rand);
351
352 printf("seq %d rand %s",
353 seq, osmo_hexdump(ar->rand, sizeof(ar->rand)));
354 printf(" --> sres %s\n",
355 osmo_hexdump(vec.sres, 4));
356
357 return hnb_test_nas_tx_dt(hnb, gen_nas_auth_resp(vec.sres));
Neels Hofmeyr35888102016-03-09 01:39:56 +0100358}
359
Neels Hofmeyr4470f932016-04-19 00:13:53 +0200360static int hnb_test_nas_rx_mm(struct hnb_test *hnb, struct gsm48_hdr *gh, int len)
Neels Hofmeyr860a1292016-02-18 23:03:15 +0100361{
362 struct hnbtest_chan *chan;
363
364 chan = hnb->cs.chan;
365 if (!chan) {
366 printf("hnb_test_nas_rx_mm(): No CS channel established yet.\n");
367 return -1;
368 }
369
370 OSMO_ASSERT(!chan->is_ps);
371
Neels Hofmeyr7c28f6f2016-04-05 11:49:53 +0200372 uint8_t msg_type = gsm48_hdr_msg_type(gh);
Neels Hofmeyrc04eb532016-03-04 12:38:43 +0100373 int sent_tmsi;
Neels Hofmeyr860a1292016-02-18 23:03:15 +0100374
375 switch (msg_type) {
376 case GSM48_MT_MM_ID_REQ:
Neels Hofmeyrae937122016-02-29 09:32:00 +0100377 return hnb_test_nas_tx_dt(hnb, gen_nas_id_resp());
Neels Hofmeyr860a1292016-02-18 23:03:15 +0100378
Neels Hofmeyrae937122016-02-29 09:32:00 +0100379 case GSM48_MT_MM_LOC_UPD_ACCEPT:
Neels Hofmeyr4470f932016-04-19 00:13:53 +0200380 if (hnb_test_nas_rx_lu_accept(gh, len, &sent_tmsi))
Neels Hofmeyrc04eb532016-03-04 12:38:43 +0100381 return -1;
382 if (sent_tmsi)
383 return hnb_test_nas_tx_dt(hnb, gen_nas_tmsi_realloc_compl());
384 else
385 return 0;
Neels Hofmeyrae937122016-02-29 09:32:00 +0100386
Neels Hofmeyr5dbb7b22016-03-09 01:38:13 +0100387 case GSM48_MT_MM_LOC_UPD_REJECT:
388 printf("Received Location Update Reject\n");
389 return 0;
390
Neels Hofmeyrae937122016-02-29 09:32:00 +0100391 case GSM48_MT_MM_INFO:
Neels Hofmeyr4470f932016-04-19 00:13:53 +0200392 hnb_test_nas_rx_mm_info(gh, len);
Neels Hofmeyrae937122016-02-29 09:32:00 +0100393 return 0;
394
Neels Hofmeyr35888102016-03-09 01:39:56 +0100395 case GSM48_MT_MM_AUTH_REQ:
Neels Hofmeyr4470f932016-04-19 00:13:53 +0200396 return hnb_test_nas_rx_auth_req(hnb, gh, len);
Neels Hofmeyr35888102016-03-09 01:39:56 +0100397
Neels Hofmeyr860a1292016-02-18 23:03:15 +0100398 default:
Neels Hofmeyrae937122016-02-29 09:32:00 +0100399 printf("04.08 message type not handled by hnb-test: 0x%x\n",
Neels Hofmeyr860a1292016-02-18 23:03:15 +0100400 msg_type);
401 return 0;
402 }
403
404}
405
Neels Hofmeyr4470f932016-04-19 00:13:53 +0200406void hnb_test_nas_rx_dtap(struct hnb_test *hnb, void *data, int len)
Neels Hofmeyr860a1292016-02-18 23:03:15 +0100407{
Neels Hofmeyr4470f932016-04-19 00:13:53 +0200408 int rc;
409 printf("got %d bytes: %s\n", len, osmo_hexdump(data, len));
Neels Hofmeyr860a1292016-02-18 23:03:15 +0100410
411 // nas_pdu == '05 08 12' ==> IMEI Identity request
412 // '05 04 0d' ==> LU reject
413
Neels Hofmeyr4470f932016-04-19 00:13:53 +0200414 struct gsm48_hdr *gh = data;
415 if (len < sizeof(*gh)) {
416 printf("hnb_test_nas_rx_dtap(): NAS PDU is too short: %d. Ignoring.\n",
417 len);
418 return;
Neels Hofmeyr8c2b4ec2016-04-04 19:27:53 +0200419 }
Neels Hofmeyr7c28f6f2016-04-05 11:49:53 +0200420 uint8_t pdisc = gsm48_hdr_pdisc(gh);
Neels Hofmeyr860a1292016-02-18 23:03:15 +0100421
422 switch (pdisc) {
423 case GSM48_PDISC_MM:
Neels Hofmeyr4470f932016-04-19 00:13:53 +0200424 rc = hnb_test_nas_rx_mm(hnb, gh, len);
425 if (rc != 0)
426 printf("Error receiving MM message: %d\n", rc);
427 return;
Neels Hofmeyr860a1292016-02-18 23:03:15 +0100428 default:
429 printf("04.08 discriminator not handled by hnb-test: %d\n",
430 pdisc);
Neels Hofmeyr4470f932016-04-19 00:13:53 +0200431 return;
Neels Hofmeyr860a1292016-02-18 23:03:15 +0100432 }
Neels Hofmeyr860a1292016-02-18 23:03:15 +0100433}
434
Daniel Willmann479cb302015-12-09 17:54:59 +0100435int hnb_test_hnbap_rx(struct hnb_test *hnb, struct msgb *msg)
436{
437 HNBAP_PDU_t _pdu, *pdu = &_pdu;
438 asn_dec_rval_t dec_ret;
439 int rc;
440
441 memset(pdu, 0, sizeof(*pdu));
442 dec_ret = aper_decode(NULL, &asn_DEF_HNBAP_PDU, (void **) &pdu,
443 msg->data, msgb_length(msg), 0, 0);
444 if (dec_ret.code != RC_OK) {
445 LOGP(DMAIN, LOGL_ERROR, "Error in ASN.1 decode\n");
446 return rc;
447 }
448
449 if (pdu->present != HNBAP_PDU_PR_successfulOutcome) {
450 printf("Unexpected HNBAP message received\n");
451 }
452
453 switch (pdu->choice.successfulOutcome.procedureCode) {
454 case ProcedureCode_id_HNBRegister:
455 /* Get HNB id and send UE Register request */
456 rc = hnb_test_rx_hnb_register_acc(hnb, &pdu->choice.successfulOutcome.value);
457 break;
458 case ProcedureCode_id_UERegister:
Daniel Willmanna7b02402015-12-09 19:05:09 +0100459 rc = hnb_test_rx_ue_register_acc(hnb, &pdu->choice.successfulOutcome.value);
Daniel Willmann479cb302015-12-09 17:54:59 +0100460 break;
461 default:
462 break;
463 }
464
465 return rc;
466}
467
Neels Hofmeyrb984f362016-02-18 01:18:20 +0100468extern void direct_transfer_nas_pdu_print(ANY_t *in);
469
Neels Hofmeyr0968a582016-01-11 15:19:38 +0100470int hnb_test_rua_rx(struct hnb_test *hnb, struct msgb *msg)
471{
472 RUA_RUA_PDU_t _pdu, *pdu = &_pdu;
473 asn_dec_rval_t dec_ret;
474 int rc;
475
476 memset(pdu, 0, sizeof(*pdu));
477 dec_ret = aper_decode(NULL, &asn_DEF_RUA_RUA_PDU, (void **) &pdu,
478 msg->data, msgb_length(msg), 0, 0);
479 if (dec_ret.code != RC_OK) {
480 LOGP(DMAIN, LOGL_ERROR, "Error in ASN.1 decode\n");
481 return rc;
482 }
483
484 switch (pdu->present) {
485 case RUA_RUA_PDU_PR_successfulOutcome:
486 printf("RUA_RUA_PDU_PR_successfulOutcome\n");
487 break;
488 case RUA_RUA_PDU_PR_initiatingMessage:
489 printf("RUA_RUA_PDU_PR_initiatingMessage\n");
490 break;
491 case RUA_RUA_PDU_PR_NOTHING:
492 printf("RUA_RUA_PDU_PR_NOTHING\n");
493 break;
494 case RUA_RUA_PDU_PR_unsuccessfulOutcome:
495 printf("RUA_RUA_PDU_PR_unsuccessfulOutcome\n");
496 break;
497 default:
498 printf("Unexpected RUA message received\n");
499 break;
500 }
501
502 switch (pdu->choice.successfulOutcome.procedureCode) {
503 case RUA_ProcedureCode_id_ConnectionlessTransfer:
504 printf("RUA rx Connectionless Transfer\n");
505 break;
506 case RUA_ProcedureCode_id_Connect:
507 printf("RUA rx Connect\n");
508 break;
509 case RUA_ProcedureCode_id_DirectTransfer:
510 printf("RUA rx DirectTransfer\n");
Neels Hofmeyr4470f932016-04-19 00:13:53 +0200511 hnb_test_rua_dt_handle(hnb, &pdu->choice.successfulOutcome.value);
Neels Hofmeyr0968a582016-01-11 15:19:38 +0100512 break;
513 case RUA_ProcedureCode_id_Disconnect:
514 printf("RUA rx Disconnect\n");
515 break;
516 case RUA_ProcedureCode_id_ErrorIndication:
517 printf("RUA rx ErrorIndication\n");
518 break;
519 case RUA_ProcedureCode_id_privateMessage:
520 printf("RUA rx privateMessage\n");
521 break;
522 default:
523 printf("RUA rx unknown message\n");
524 break;
525 }
526
527 return rc;
528}
529
Daniel Willmann97374c02015-12-03 09:37:58 +0100530static int hnb_read_cb(struct osmo_fd *fd)
531{
532 struct hnb_test *hnb_test = fd->data;
533 struct sctp_sndrcvinfo sinfo;
534 struct msgb *msg = msgb_alloc(IUH_MSGB_SIZE, "Iuh rx");
535 int flags = 0;
536 int rc;
537
538 if (!msg)
539 return -ENOMEM;
540
541 rc = sctp_recvmsg(fd->fd, msgb_data(msg), msgb_tailroom(msg),
542 NULL, NULL, &sinfo, &flags);
543 if (rc < 0) {
544 LOGP(DMAIN, LOGL_ERROR, "Error during sctp_recvmsg()\n");
545 /* FIXME: clean up after disappeared HNB */
Daniel Willmann6637a282015-12-17 14:47:51 +0100546 close(fd->fd);
547 osmo_fd_unregister(fd);
Daniel Willmann97374c02015-12-03 09:37:58 +0100548 return rc;
Daniel Willmann6637a282015-12-17 14:47:51 +0100549 } else if (rc == 0) {
550 LOGP(DMAIN, LOGL_INFO, "Connection to HNB closed\n");
551 close(fd->fd);
552 osmo_fd_unregister(fd);
553 fd->fd = -1;
554
555 return -1;
556 } else {
Daniel Willmann97374c02015-12-03 09:37:58 +0100557 msgb_put(msg, rc);
Daniel Willmann6637a282015-12-17 14:47:51 +0100558 }
Daniel Willmann97374c02015-12-03 09:37:58 +0100559
560 if (flags & MSG_NOTIFICATION) {
Daniel Willmann32797802015-12-17 12:53:05 +0100561 LOGP(DMAIN, LOGL_DEBUG, "Ignoring SCTP notification\n");
Daniel Willmann97374c02015-12-03 09:37:58 +0100562 msgb_free(msg);
563 return 0;
564 }
565
566 sinfo.sinfo_ppid = ntohl(sinfo.sinfo_ppid);
567
568 switch (sinfo.sinfo_ppid) {
569 case IUH_PPI_HNBAP:
Neels Hofmeyr0968a582016-01-11 15:19:38 +0100570 printf("HNBAP message received\n");
Daniel Willmann479cb302015-12-09 17:54:59 +0100571 rc = hnb_test_hnbap_rx(hnb_test, msg);
Daniel Willmann97374c02015-12-03 09:37:58 +0100572 break;
573 case IUH_PPI_RUA:
Neels Hofmeyr0968a582016-01-11 15:19:38 +0100574 printf("RUA message received\n");
575 rc = hnb_test_rua_rx(hnb_test, msg);
Daniel Willmann97374c02015-12-03 09:37:58 +0100576 break;
577 case IUH_PPI_SABP:
578 case IUH_PPI_RNA:
579 case IUH_PPI_PUA:
580 LOGP(DMAIN, LOGL_ERROR, "Unimplemented SCTP PPID=%u received\n",
581 sinfo.sinfo_ppid);
582 rc = 0;
583 break;
584 default:
585 LOGP(DMAIN, LOGL_ERROR, "Unknown SCTP PPID=%u received\n",
586 sinfo.sinfo_ppid);
587 rc = 0;
588 break;
589 }
590
591 msgb_free(msg);
592 return rc;
593}
594
595static int hnb_write_cb(struct osmo_fd *fd, struct msgb *msg)
596{
597 struct hnb_test *ctx = fd->data;
598 struct sctp_sndrcvinfo sinfo = {
Harald Weltec3851222015-12-24 15:41:21 +0100599 .sinfo_ppid = htonl(msgb_sctp_ppid(msg)),
Daniel Willmann97374c02015-12-03 09:37:58 +0100600 .sinfo_stream = 0,
601 };
602 int rc;
603
Neels Hofmeyre25faa82016-03-04 02:49:52 +0100604 printf("Sending: %s\n", osmo_hexdump(msgb_data(msg), msgb_length(msg)));
Daniel Willmann97374c02015-12-03 09:37:58 +0100605 rc = sctp_send(fd->fd, msgb_data(msg), msgb_length(msg),
606 &sinfo, 0);
607 /* we don't need to msgb_free(), write_queue does this for us */
608 return rc;
609}
610
Daniel Willmann4aeef6c2015-12-03 17:02:13 +0100611static void hnb_send_register_req(struct hnb_test *hnb_test)
612{
Daniel Willmanna1e202e2015-12-07 17:21:07 +0100613 HNBRegisterRequest_t request_out;
Daniel Willmann4aeef6c2015-12-03 17:02:13 +0100614 struct msgb *msg;
615 int rc;
Daniel Willmanna1e202e2015-12-07 17:21:07 +0100616 uint16_t lac, sac;
617 uint8_t rac;
618 uint32_t cid;
619 uint8_t plmn[] = {0x09, 0xf1, 0x99};
620 char identity[50] = "ATestHNB@";
Daniel Willmann4aeef6c2015-12-03 17:02:13 +0100621
Daniel Willmanna1e202e2015-12-07 17:21:07 +0100622 HNBRegisterRequestIEs_t request;
623 memset(&request, 0, sizeof(request));
Daniel Willmann4aeef6c2015-12-03 17:02:13 +0100624
Daniel Willmanna1e202e2015-12-07 17:21:07 +0100625 lac = 0xc0fe;
626 sac = 0xabab;
627 rac = 0x42;
Daniel Willmannd6a45b42015-12-08 13:55:17 +0100628 cid = 0xadceaab;
Daniel Willmann4aeef6c2015-12-03 17:02:13 +0100629
Daniel Willmanna1e202e2015-12-07 17:21:07 +0100630 asn1_u16_to_str(&request.lac, &lac, lac);
631 asn1_u16_to_str(&request.sac, &sac, sac);
632 asn1_u8_to_str(&request.rac, &rac, rac);
Daniel Willmannd6a45b42015-12-08 13:55:17 +0100633 asn1_u28_to_bitstring(&request.cellIdentity, &cid, cid);
Daniel Willmanna1e202e2015-12-07 17:21:07 +0100634
635 request.hnB_Identity.hNB_Identity_Info.buf = identity;
636 request.hnB_Identity.hNB_Identity_Info.size = strlen(identity);
637
638 request.plmNidentity.buf = plmn;
639 request.plmNidentity.size = 3;
640
641
642
643 memset(&request_out, 0, sizeof(request_out));
644 rc = hnbap_encode_hnbregisterrequesties(&request_out, &request);
645 if (rc < 0) {
646 printf("Could not encode HNB register request IEs\n");
647 }
648
649 msg = hnbap_generate_initiating_message(ProcedureCode_id_HNBRegister,
650 Criticality_reject,
651 &asn_DEF_HNBRegisterRequest,
652 &request_out);
653
Daniel Willmann4aeef6c2015-12-03 17:02:13 +0100654
Harald Weltec3851222015-12-24 15:41:21 +0100655 msgb_sctp_ppid(msg) = IUH_PPI_HNBAP;
656
657 osmo_wqueue_enqueue(&hnb_test->wqueue, msg);
658}
659
660static void hnb_send_deregister_req(struct hnb_test *hnb_test)
661{
662 struct msgb *msg;
663 int rc;
664
665 HNBDe_RegisterIEs_t request;
666 memset(&request, 0, sizeof(request));
667
668 request.cause.present = Cause_PR_misc;
669 request.cause.choice.misc = CauseMisc_o_and_m_intervention;
670
671 HNBDe_Register_t request_out;
672 memset(&request_out, 0, sizeof(request_out));
673 rc = hnbap_encode_hnbde_registeries(&request_out, &request);
674 if (rc < 0) {
675 printf("Could not encode HNB deregister request IEs\n");
676 }
677
678 msg = hnbap_generate_initiating_message(ProcedureCode_id_HNBDe_Register,
679 Criticality_reject,
680 &asn_DEF_HNBDe_Register,
681 &request_out);
682
683 msgb_sctp_ppid(msg) = IUH_PPI_HNBAP;
Daniel Willmann4aeef6c2015-12-03 17:02:13 +0100684
685 osmo_wqueue_enqueue(&hnb_test->wqueue, msg);
686}
687
688
Daniel Willmann97374c02015-12-03 09:37:58 +0100689static const struct log_info_cat log_cat[] = {
690 [DMAIN] = {
Daniel Willmann32797802015-12-17 12:53:05 +0100691 .name = "DMAIN", .loglevel = LOGL_INFO, .enabled = 1,
Daniel Willmann97374c02015-12-03 09:37:58 +0100692 .color = "",
693 .description = "Main program",
694 },
Daniel Willmann32797802015-12-17 12:53:05 +0100695 [DHNBAP] = {
696 .name = "DHNBAP", .loglevel = LOGL_DEBUG, .enabled = 1,
697 .color = "",
698 .description = "Home Node B Application Part",
699 },
Daniel Willmann97374c02015-12-03 09:37:58 +0100700};
701
702static const struct log_info hnb_test_log_info = {
703 .cat = log_cat,
704 .num_cat = ARRAY_SIZE(log_cat),
705};
706
707static struct vty_app_info vty_info = {
708 .name = "OsmoHNB-Test",
709 .version = "0",
710};
711
Daniel Willmann4abdee02015-12-09 17:57:32 +0100712static int sctp_sock_init(int fd)
713{
714 struct sctp_event_subscribe event;
715 int rc;
716
717 /* subscribe for all events */
718 memset((uint8_t *)&event, 1, sizeof(event));
719 rc = setsockopt(fd, IPPROTO_SCTP, SCTP_EVENTS,
720 &event, sizeof(event));
721
722 return rc;
723}
724
Harald Weltec3851222015-12-24 15:41:21 +0100725#define HNBAP_STR "HNBAP related commands\n"
726#define HNB_STR "HomeNodeB commands\n"
727#define UE_STR "User Equipment commands\n"
728#define RANAP_STR "RANAP related commands\n"
729#define CSPS_STR "Circuit Switched\n" "Packet Switched\n"
730
731DEFUN(hnb_register, hnb_register_cmd,
732 "hnbap hnb register", HNBAP_STR HNB_STR "Send HNB-REGISTER REQUEST")
733{
734 hnb_send_register_req(&g_hnb_test);
735
736 return CMD_SUCCESS;
737}
738
739DEFUN(hnb_deregister, hnb_deregister_cmd,
740 "hnbap hnb deregister", HNBAP_STR HNB_STR "Send HNB-DEREGISTER REQUEST")
741{
742 hnb_send_deregister_req(&g_hnb_test);
743
744 return CMD_SUCCESS;
745}
746
747DEFUN(ue_register, ue_register_cmd,
748 "hnbap ue register IMSI", HNBAP_STR UE_STR "Send UE-REGISTER REQUEST")
749{
750 hnb_test_ue_register_tx(&g_hnb_test, argv[0]);
751
752 return CMD_SUCCESS;
753}
754
755DEFUN(asn_dbg, asn_dbg_cmd,
756 "asn-debug (1|0)", "Enable or disabel libasn1c debugging")
757{
758 asn_debug = atoi(argv[0]);
759
760 return CMD_SUCCESS;
761}
762
763DEFUN(ranap_reset, ranap_reset_cmd,
764 "ranap reset (cs|ps)", RANAP_STR "Send RANAP RESET\n" CSPS_STR)
765{
766 int is_ps = 0;
767 struct msgb *msg, *rua;
768
769 RANAP_Cause_t cause = {
770 .present = RANAP_Cause_PR_transmissionNetwork,
771 .choice.transmissionNetwork = RANAP_CauseTransmissionNetwork_signalling_transport_resource_failure,
772 };
773
774 if (!strcmp(argv[0], "ps"))
775 is_ps = 1;
776
777 msg = ranap_new_msg_reset(is_ps, &cause);
778 rua = rua_new_udt(msg);
779 //msgb_free(msg);
780 osmo_wqueue_enqueue(&g_hnb_test.wqueue, rua);
781
782 return CMD_SUCCESS;
783}
784
785
786enum my_vty_nodes {
787 CHAN_NODE = _LAST_OSMOVTY_NODE,
788};
789
790static struct cmd_node chan_node = {
791 CHAN_NODE,
792 "%s(chan)> ",
793 1,
794};
795
796
Harald Weltec3851222015-12-24 15:41:21 +0100797static struct msgb *gen_initue_lu(int is_ps, uint32_t conn_id, const char *imsi)
798{
Neels Hofmeyr5c1cc8c2016-02-29 09:28:48 +0100799 uint8_t lu[] = { GSM48_PDISC_MM, GSM48_MT_MM_LOC_UPD_REQUEST,
800 0x70, 0x62, 0xf2, 0x30, 0xff, 0xf3, 0x57,
Neels Hofmeyr32828702016-01-14 13:06:47 +0100801 /* len, IMSI/type, IMSI-------------------------------- */
Harald Weltec3851222015-12-24 15:41:21 +0100802 0x08, 0x29, 0x26, 0x24, 0x10, 0x32, 0x54, 0x76, 0x98,
803 0x33, 0x03, 0x57, 0x18 , 0xb2 };
804 uint8_t plmn_id[] = { 0x09, 0x01, 0x99 };
805 RANAP_GlobalRNC_ID_t rnc_id = {
806 .rNC_ID = 23,
807 .pLMNidentity.buf = plmn_id,
808 .pLMNidentity.size = sizeof(plmn_id),
809 };
Harald Weltec3851222015-12-24 15:41:21 +0100810
811 /* FIXME: patch imsi */
Neels Hofmeyr7b811282016-01-14 13:05:24 +0100812 /* Note: the Mobile Identitiy IE's IMSI data has the identity type and
813 * an even/odd indicator bit encoded in the first octet. So the first
814 * octet looks like this:
815 *
816 * 8 7 6 5 | 4 | 3 2 1
817 * IMSI-digit | even/odd | type
818 *
819 * followed by the remaining IMSI digits.
820 * If digit count is even (bit 4 == 0), that first high-nibble is 0xf.
821 * (derived from Iu pcap Location Update Request msg and TS 25.413)
822 *
823 * TODO I'm only 90% sure about this
824 */
Harald Weltec3851222015-12-24 15:41:21 +0100825
Neels Hofmeyr6a62e542016-01-15 03:07:45 +0100826 return ranap_new_msg_initial_ue(conn_id, is_ps, &rnc_id, lu, sizeof(lu));
Harald Weltec3851222015-12-24 15:41:21 +0100827}
828
829DEFUN(chan, chan_cmd,
830 "channel (cs|ps) lu imsi IMSI",
831 "Open a new Signalling Connection\n"
832 "To Circuit-Switched CN\n"
833 "To Packet-Switched CN\n"
834 "Performing a Location Update\n"
835 )
836{
837 struct hnbtest_chan *chan;
838 struct msgb *msg, *rua;
Daniel Willmann85927162016-01-14 15:36:49 +0100839 static uint16_t conn_id = 42;
Harald Weltec3851222015-12-24 15:41:21 +0100840
841 chan = talloc_zero(tall_hnb_ctx, struct hnbtest_chan);
842 if (!strcmp(argv[0], "ps"))
843 chan->is_ps = 1;
844 chan->imsi = talloc_strdup(chan, argv[1]);
Daniel Willmann85927162016-01-14 15:36:49 +0100845 chan->conn_id = conn_id;
846 conn_id++;
Harald Weltec3851222015-12-24 15:41:21 +0100847
848 msg = gen_initue_lu(chan->is_ps, chan->conn_id, chan->imsi);
849 rua = rua_new_conn(chan->is_ps, chan->conn_id, msg);
850
851 osmo_wqueue_enqueue(&g_hnb_test.wqueue, rua);
852
853 vty->index = chan;
854 vty->node = CHAN_NODE;
855
Neels Hofmeyr860a1292016-02-18 23:03:15 +0100856 if (!chan->is_ps)
857 g_hnb_test.cs.chan = chan;
858
859
Harald Weltec3851222015-12-24 15:41:21 +0100860 return CMD_SUCCESS;
861}
862
863static void hnbtest_vty_init(void)
864{
865 install_element_ve(&asn_dbg_cmd);
866 install_element_ve(&hnb_register_cmd);
867 install_element_ve(&hnb_deregister_cmd);
868 install_element_ve(&ue_register_cmd);
869 install_element_ve(&ranap_reset_cmd);
870 install_element_ve(&chan_cmd);
871
872 install_node(&chan_node, NULL);
873 vty_install_default(CHAN_NODE);
874}
875
Daniel Willmann141a0ba2015-12-17 18:03:52 +0100876static void handle_options(int argc, char **argv)
877{
878 while (1) {
879 int idx = 0, c;
880 static const struct option long_options[] = {
881 { "ues", 1, 0, 'u' },
Neels Hofmeyr5f9be1e2016-02-29 13:33:44 +0100882 { "gw-addr", 1, 0, 'g' },
Daniel Willmann141a0ba2015-12-17 18:03:52 +0100883 { 0, 0, 0, 0 },
884 };
885
Neels Hofmeyr5f9be1e2016-02-29 13:33:44 +0100886 c = getopt_long(argc, argv, "u:g:", long_options, &idx);
Daniel Willmann141a0ba2015-12-17 18:03:52 +0100887
888 if (c == -1)
889 break;
890
891 switch (c) {
892 case 'u':
893 g_hnb_test.ues = atoi(optarg);
894 break;
Neels Hofmeyr5f9be1e2016-02-29 13:33:44 +0100895 case 'g':
896 g_hnb_test.gw_addr = optarg;
897 break;
Daniel Willmann141a0ba2015-12-17 18:03:52 +0100898 }
899 }
900}
901
Harald Weltec3851222015-12-24 15:41:21 +0100902int main(int argc, char **argv)
Daniel Willmann97374c02015-12-03 09:37:58 +0100903{
904 int rc;
905
Harald Welte87ffeb92015-12-25 15:34:22 +0100906 test_common_init();
Daniel Willmann97374c02015-12-03 09:37:58 +0100907
Harald Welte87ffeb92015-12-25 15:34:22 +0100908 tall_hnb_ctx = talloc_named_const(NULL, 0, "hnb_context");
Daniel Willmann97374c02015-12-03 09:37:58 +0100909
910 vty_init(&vty_info);
Harald Weltec3851222015-12-24 15:41:21 +0100911 hnbtest_vty_init();
912
Neels Hofmeyra0d21472016-02-24 20:50:31 +0100913 printf("VTY at %s %d\n", vty_get_bind_addr(), 2324);
914 rc = telnet_init_dynif(NULL, NULL, vty_get_bind_addr(), 2324);
Harald Weltec3851222015-12-24 15:41:21 +0100915 if (rc < 0) {
916 perror("Error binding VTY port");
917 exit(1);
918 }
Daniel Willmann97374c02015-12-03 09:37:58 +0100919
Daniel Willmann141a0ba2015-12-17 18:03:52 +0100920 handle_options(argc, argv);
921
Daniel Willmann97374c02015-12-03 09:37:58 +0100922 osmo_wqueue_init(&g_hnb_test.wqueue, 16);
923 g_hnb_test.wqueue.bfd.data = &g_hnb_test;
924 g_hnb_test.wqueue.read_cb = hnb_read_cb;
925 g_hnb_test.wqueue.write_cb = hnb_write_cb;
926
927 rc = osmo_sock_init_ofd(&g_hnb_test.wqueue.bfd, AF_INET, SOCK_STREAM,
Neels Hofmeyr5f9be1e2016-02-29 13:33:44 +0100928 IPPROTO_SCTP, g_hnb_test.gw_addr,
Daniel Willmann97374c02015-12-03 09:37:58 +0100929 g_hnb_test.gw_port, OSMO_SOCK_F_CONNECT);
930 if (rc < 0) {
931 perror("Error connecting to Iuh port");
932 exit(1);
933 }
Daniel Willmann4abdee02015-12-09 17:57:32 +0100934 sctp_sock_init(g_hnb_test.wqueue.bfd.fd);
Daniel Willmann97374c02015-12-03 09:37:58 +0100935
Harald Weltec3851222015-12-24 15:41:21 +0100936#if 0
937 /* some hard-coded message generation. Doesn't make sense from
938 * a protocol point of view but enables to look at the encoded
939 * results in wireshark for manual verification */
940 {
941 struct msgb *msg, *rua;
942 const uint8_t nas[] = { 0, 1, 2, 3 };
943 const uint8_t ik[] = { 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15 };
944
945 msg = ranap_new_msg_dt(0, nas, sizeof(nas));
946 rua = rua_new_udt(msg);
947 osmo_wqueue_enqueue(&g_hnb_test.wqueue, rua);
948
949 msg = ranap_new_msg_sec_mod_cmd(ik, ik);
950 rua = rua_new_udt(msg);
951 osmo_wqueue_enqueue(&g_hnb_test.wqueue, rua);
952
953 msg = ranap_new_msg_iu_rel_cmd()
954 rua = rua_new_udt(msg);
955 osmo_wqueue_enqueue(&g_hnb_test.wqueue, rua);
956
957 msg = ranap_new_msg_paging_cmd("901990123456789", NULL, 0, 0);
958 rua = rua_new_udt(msg);
959 osmo_wqueue_enqueue(&g_hnb_test.wqueue, rua);
960
961 msg = ranap_new_msg_rab_assign_voice(1, 0x01020304, 0x1020);
962 rua = rua_new_udt(msg);
963 osmo_wqueue_enqueue(&g_hnb_test.wqueue, rua);
964
965 msg = ranap_new_msg_rab_assign_data(2, 0x01020304, 0x11223344);
966 rua = rua_new_udt(msg);
967 osmo_wqueue_enqueue(&g_hnb_test.wqueue, rua);
968 }
969#endif
Daniel Willmann4aeef6c2015-12-03 17:02:13 +0100970
Daniel Willmann97374c02015-12-03 09:37:58 +0100971 while (1) {
972 rc = osmo_select_main(0);
973 if (rc < 0)
974 exit(3);
975 }
976
977 /* not reached */
978 exit(0);
979}