blob: 7824858dfd9eee0afe27665ad9d7d924fe553e52 [file] [log] [blame]
Daniel Willmann97374c02015-12-03 09:37:58 +01001/* Test HNB */
2
3/* (C) 2015 by Daniel Willmann <dwillmann@sysmocom.de>
4 * (C) 2015 by Sysmocom s.f.m.c. GmbH
5 * All Rights Reserved
6 *
7 * This program is free software; you can redistribute it and/or modify
8 * it under the terms of the GNU Affero General Public License as published by
9 * the Free Software Foundation; either version 3 of the License, or
10 * (at your option) any later version.
11 *
12 * This program is distributed in the hope that it will be useful,
13 * but WITHOUT ANY WARRANTY; without even the implied warranty of
14 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 * GNU Affero General Public License for more details.
16 *
17 * You should have received a copy of the GNU Affero General Public License
18 * along with this program. If not, see <http://www.gnu.org/licenses/>.
19 *
20 */
21
22#include <unistd.h>
23#include <stdio.h>
24#include <stdlib.h>
25#include <string.h>
26#include <getopt.h>
27#include <errno.h>
28#include <signal.h>
29
30#include <sys/types.h>
31#include <sys/socket.h>
32#include <netinet/in.h>
33#include <netinet/sctp.h>
34#include <arpa/inet.h>
35
36#include <osmocom/core/application.h>
37#include <osmocom/core/talloc.h>
38#include <osmocom/core/select.h>
39#include <osmocom/core/logging.h>
40#include <osmocom/core/socket.h>
41#include <osmocom/core/msgb.h>
42#include <osmocom/core/write_queue.h>
Harald Weltec3851222015-12-24 15:41:21 +010043#include <osmocom/netif/stream.h>
Neels Hofmeyrae937122016-02-29 09:32:00 +010044#include <osmocom/gsm/tlv.h>
45#include <osmocom/gsm/gsm48.h>
Daniel Willmann97374c02015-12-03 09:37:58 +010046
47#include <osmocom/vty/telnet_interface.h>
48#include <osmocom/vty/logging.h>
Harald Weltec3851222015-12-24 15:41:21 +010049#include <osmocom/vty/command.h>
Daniel Willmann97374c02015-12-03 09:37:58 +010050
Neels Hofmeyr26779f82016-04-18 17:04:17 +020051#include <osmocom/crypt/auth.h>
52
Daniel Willmann97374c02015-12-03 09:37:58 +010053#include "hnb-test.h"
Neels Hofmeyr4470f932016-04-19 00:13:53 +020054#include "hnb-test-layers.h"
Neels Hofmeyr83457922016-08-26 23:56:44 +020055#include <osmocom/hnbap/hnbap_common.h>
56#include <osmocom/hnbap/hnbap_ies_defs.h>
Neels Hofmeyrdf63de22016-08-18 13:13:55 +020057#include <osmocom/rua/rua_msg_factory.h>
Harald Weltec3851222015-12-24 15:41:21 +010058#include "asn1helpers.h"
Neels Hofmeyr96979af2016-01-05 15:19:44 +010059#include <osmocom/ranap/iu_helpers.h>
Harald Welte87ffeb92015-12-25 15:34:22 +010060#include "test_common.h"
Harald Weltec3851222015-12-24 15:41:21 +010061
Neels Hofmeyr96979af2016-01-05 15:19:44 +010062#include <osmocom/ranap/ranap_msg_factory.h>
Daniel Willmann97374c02015-12-03 09:37:58 +010063
Neels Hofmeyr0968a582016-01-11 15:19:38 +010064#include <osmocom/rua/RUA_RUA-PDU.h>
65
Neels Hofmeyr860a1292016-02-18 23:03:15 +010066#include <osmocom/gsm/protocol/gsm_04_08.h>
67
68#include <osmocom/ranap/RANAP_ProcedureCode.h>
69#include <osmocom/ranap/RANAP_Criticality.h>
70#include <osmocom/ranap/RANAP_DirectTransfer.h>
71
Daniel Willmann97374c02015-12-03 09:37:58 +010072static void *tall_hnb_ctx;
Daniel Willmann97374c02015-12-03 09:37:58 +010073
74struct hnb_test g_hnb_test = {
Neels Hofmeyr5f9be1e2016-02-29 13:33:44 +010075 .gw_addr = "127.0.0.1",
Daniel Willmann97374c02015-12-03 09:37:58 +010076 .gw_port = IUH_DEFAULT_SCTP_PORT,
77};
78
Harald Weltec3851222015-12-24 15:41:21 +010079struct msgb *rua_new_udt(struct msgb *inmsg);
80
Harald Weltec3851222015-12-24 15:41:21 +010081static int hnb_test_ue_de_register_tx(struct hnb_test *hnb_test)
Daniel Willmann19dedbb2015-12-17 11:57:41 +010082{
83 struct msgb *msg;
Pau Espin Pedrol89f4c802021-01-14 11:13:46 +010084 int rc;
Daniel Willmann19dedbb2015-12-17 11:57:41 +010085 uint32_t ctx_id;
86
87 UEDe_Register_t dereg;
88 UEDe_RegisterIEs_t dereg_ies;
89 memset(&dereg_ies, 0, sizeof(dereg_ies));
90
91 asn1_u24_to_bitstring(&dereg_ies.context_ID, &ctx_id, hnb_test->ctx_id);
92 dereg_ies.cause.present = Cause_PR_radioNetwork;
93 dereg_ies.cause.choice.radioNetwork = CauseRadioNetwork_connection_with_UE_lost;
94
95 memset(&dereg, 0, sizeof(dereg));
96 rc = hnbap_encode_uede_registeries(&dereg, &dereg_ies);
Pau Espin Pedrol96a94bc2021-01-14 11:17:19 +010097 OSMO_ASSERT(rc == 0);
Daniel Willmann19dedbb2015-12-17 11:57:41 +010098
99 msg = hnbap_generate_initiating_message(ProcedureCode_id_UEDe_Register,
100 Criticality_ignore,
101 &asn_DEF_UEDe_Register,
102 &dereg);
103
Harald Weltec3851222015-12-24 15:41:21 +0100104 ASN_STRUCT_FREE_CONTENTS_ONLY(asn_DEF_UEDe_Register, &dereg);
Daniel Willmann19dedbb2015-12-17 11:57:41 +0100105
Harald Weltec3851222015-12-24 15:41:21 +0100106 msgb_sctp_ppid(msg) = IUH_PPI_HNBAP;
Daniel Willmann19dedbb2015-12-17 11:57:41 +0100107
108 return osmo_wqueue_enqueue(&hnb_test->wqueue, msg);
109}
110
Harald Weltec3851222015-12-24 15:41:21 +0100111static int hnb_test_ue_register_tx(struct hnb_test *hnb_test, const char *imsi_str)
Daniel Willmann479cb302015-12-09 17:54:59 +0100112{
Daniel Willmann4e312502015-12-09 17:59:24 +0100113 struct msgb *msg;
114 int rc, imsi_len;
115
Pau Espin Pedrolb4ff1f42021-01-14 11:14:54 +0100116 uint8_t imsi_buf[16];
Daniel Willmann141a0ba2015-12-17 18:03:52 +0100117
Daniel Willmann4e312502015-12-09 17:59:24 +0100118 UERegisterRequest_t request_out;
119 UERegisterRequestIEs_t request;
120 memset(&request, 0, sizeof(request));
121
122 request.uE_Identity.present = UE_Identity_PR_iMSI;
123
Harald Welte056984f2016-01-03 16:31:31 +0100124 imsi_len = ranap_imsi_encode(imsi_buf, sizeof(imsi_buf), imsi_str);
Pau Espin Pedrolb4ff1f42021-01-14 11:14:54 +0100125 OCTET_STRING_fromBuf(&request.uE_Identity.choice.iMSI, (const char*)imsi_buf, imsi_len);
Daniel Willmann4e312502015-12-09 17:59:24 +0100126
127 request.registration_Cause = Registration_Cause_normal;
128 request.uE_Capabilities.access_stratum_release_indicator = Access_stratum_release_indicator_rel_6;
129 request.uE_Capabilities.csg_capability = CSG_Capability_not_csg_capable;
130
131 memset(&request_out, 0, sizeof(request_out));
132 rc = hnbap_encode_ueregisterrequesties(&request_out, &request);
Pau Espin Pedrol96a94bc2021-01-14 11:17:19 +0100133 OSMO_ASSERT(rc == 0);
Daniel Willmann4e312502015-12-09 17:59:24 +0100134
135 msg = hnbap_generate_initiating_message(ProcedureCode_id_UERegister,
136 Criticality_reject,
137 &asn_DEF_UERegisterRequest,
138 &request_out);
139
Harald Weltec3851222015-12-24 15:41:21 +0100140 ASN_STRUCT_FREE_CONTENTS_ONLY(asn_DEF_UERegisterRequest, &request_out);
Daniel Willmann4e312502015-12-09 17:59:24 +0100141
Harald Weltec3851222015-12-24 15:41:21 +0100142 msgb_sctp_ppid(msg) = IUH_PPI_HNBAP;
Daniel Willmann4e312502015-12-09 17:59:24 +0100143
144 return osmo_wqueue_enqueue(&hnb_test->wqueue, msg);
Daniel Willmann479cb302015-12-09 17:54:59 +0100145}
146
Harald Weltec3851222015-12-24 15:41:21 +0100147static int hnb_test_rx_hnb_register_acc(struct hnb_test *hnb, ANY_t *in)
Daniel Willmann479cb302015-12-09 17:54:59 +0100148{
149 int rc;
150 HNBRegisterAcceptIEs_t accept;
151
152 rc = hnbap_decode_hnbregisteraccepties(&accept, in);
153 if (rc < 0) {
154 }
155
156 hnb->rnc_id = accept.rnc_id;
157 printf("HNB Register accept with RNC ID %u\n", hnb->rnc_id);
158
Daniel Willmann11e912a2016-01-07 13:19:30 +0100159 hnbap_free_hnbregisteraccepties(&accept);
Harald Weltec3851222015-12-24 15:41:21 +0100160 return 0;
Daniel Willmann479cb302015-12-09 17:54:59 +0100161}
162
Harald Weltec3851222015-12-24 15:41:21 +0100163static int hnb_test_rx_ue_register_acc(struct hnb_test *hnb, ANY_t *in)
Daniel Willmanna7b02402015-12-09 19:05:09 +0100164{
165 int rc;
166 uint32_t ctx_id;
167 UERegisterAcceptIEs_t accept;
168 char imsi[16];
169
170 rc = hnbap_decode_ueregisteraccepties(&accept, in);
171 if (rc < 0) {
172 return rc;
173 }
174
175 if (accept.uE_Identity.present != UE_Identity_PR_iMSI) {
176 printf("Wrong type in UE register accept\n");
177 return -1;
178 }
179
180 ctx_id = asn1bitstr_to_u24(&accept.context_ID);
181
Harald Welte056984f2016-01-03 16:31:31 +0100182 ranap_bcd_decode(imsi, sizeof(imsi), accept.uE_Identity.choice.iMSI.buf,
Daniel Willmanna7b02402015-12-09 19:05:09 +0100183 accept.uE_Identity.choice.iMSI.size);
184 printf("UE Register accept for IMSI %s, context %u\n", imsi, ctx_id);
185
Daniel Willmann19dedbb2015-12-17 11:57:41 +0100186 hnb->ctx_id = ctx_id;
Daniel Willmann11e912a2016-01-07 13:19:30 +0100187 hnbap_free_ueregisteraccepties(&accept);
Daniel Willmann19dedbb2015-12-17 11:57:41 +0100188
Daniel Willmanna7b02402015-12-09 19:05:09 +0100189 return 0;
190}
191
Neels Hofmeyr860a1292016-02-18 23:03:15 +0100192static struct msgb *gen_nas_id_resp()
193{
194 uint8_t id_resp[] = {
Neels Hofmeyr5c1cc8c2016-02-29 09:28:48 +0100195 GSM48_PDISC_MM,
196 GSM48_MT_MM_ID_RESP,
Neels Hofmeyr860a1292016-02-18 23:03:15 +0100197 /* IMEISV */
198 0x09, /* len */
199 0x03, /* first digit (0000) + even (0) + id IMEISV (011) */
200 0x31, 0x91, 0x06, 0x00, 0x28, 0x47, 0x11, /* digits */
201 0xf2, /* filler (1111) + last digit (0010) */
202 };
203
Neels Hofmeyre1f709f2016-02-28 00:50:45 +0100204 return ranap_new_msg_dt(0, id_resp, sizeof(id_resp));
Neels Hofmeyr860a1292016-02-18 23:03:15 +0100205}
206
Neels Hofmeyrae937122016-02-29 09:32:00 +0100207static struct msgb *gen_nas_tmsi_realloc_compl()
208{
209 uint8_t id_resp[] = {
210 GSM48_PDISC_MM,
211 GSM48_MT_MM_TMSI_REALL_COMPL,
212 };
213
214 return ranap_new_msg_dt(0, id_resp, sizeof(id_resp));
215}
216
Neels Hofmeyr26779f82016-04-18 17:04:17 +0200217static struct msgb *gen_nas_auth_resp(uint8_t *sres)
Neels Hofmeyr35888102016-03-09 01:39:56 +0100218{
219 uint8_t id_resp[] = {
220 GSM48_PDISC_MM,
Neels Hofmeyr99872602016-04-05 11:51:15 +0200221 0x80 | GSM48_MT_MM_AUTH_RESP, /* simulate sequence nr 2 */
Neels Hofmeyr35888102016-03-09 01:39:56 +0100222 0x61, 0xb5, 0x69, 0xf5 /* hardcoded SRES */
223 };
224
Neels Hofmeyr26779f82016-04-18 17:04:17 +0200225 memcpy(id_resp + 2, sres, 4);
226
Neels Hofmeyr35888102016-03-09 01:39:56 +0100227 return ranap_new_msg_dt(0, id_resp, sizeof(id_resp));
228}
229
Neels Hofmeyrc28ed372016-04-19 01:24:34 +0200230static int hnb_test_tx_dt(struct hnb_test *hnb, struct msgb *txm)
Neels Hofmeyr860a1292016-02-18 23:03:15 +0100231{
232 struct hnbtest_chan *chan;
Neels Hofmeyrae937122016-02-29 09:32:00 +0100233 struct msgb *rua;
Neels Hofmeyr860a1292016-02-18 23:03:15 +0100234
235 chan = hnb->cs.chan;
236 if (!chan) {
Neels Hofmeyrae937122016-02-29 09:32:00 +0100237 printf("hnb_test_nas_tx_tmsi_realloc_compl(): No CS channel established yet.\n");
Neels Hofmeyr860a1292016-02-18 23:03:15 +0100238 return -1;
239 }
240
Neels Hofmeyr860a1292016-02-18 23:03:15 +0100241 rua = rua_new_dt(chan->is_ps, chan->conn_id, txm);
Neels Hofmeyr860a1292016-02-18 23:03:15 +0100242 osmo_wqueue_enqueue(&g_hnb_test.wqueue, rua);
Neels Hofmeyr860a1292016-02-18 23:03:15 +0100243 return 0;
244}
245
Neels Hofmeyr4470f932016-04-19 00:13:53 +0200246static struct tlv_parsed *parse_mm(struct gsm48_hdr *gh, int len)
Neels Hofmeyrd4598fa2016-03-09 01:37:40 +0100247{
248 static struct tlv_parsed tp;
Neels Hofmeyrd4598fa2016-03-09 01:37:40 +0100249 int parse_res;
Neels Hofmeyrd4598fa2016-03-09 01:37:40 +0100250
Neels Hofmeyr4470f932016-04-19 00:13:53 +0200251 len -= (const char *)&gh->data[0] - (const char *)gh;
Neels Hofmeyrd4598fa2016-03-09 01:37:40 +0100252
Neels Hofmeyrd7ad0ac2016-04-05 11:52:27 +0200253 OSMO_ASSERT(gsm48_hdr_pdisc(gh) == GSM48_PDISC_MM);
254
Neels Hofmeyr4470f932016-04-19 00:13:53 +0200255 parse_res = tlv_parse(&tp, &gsm48_mm_att_tlvdef, &gh->data[0], len, 0, 0);
Neels Hofmeyrd4598fa2016-03-09 01:37:40 +0100256 if (parse_res <= 0) {
Neels Hofmeyr7c28f6f2016-04-05 11:49:53 +0200257 uint8_t msg_type = gsm48_hdr_msg_type(gh);
Neels Hofmeyrd4598fa2016-03-09 01:37:40 +0100258 printf("Error parsing MM message 0x%hhx: %d\n", msg_type, parse_res);
259 return NULL;
260 }
261
262 return &tp;
263}
264
Neels Hofmeyr4470f932016-04-19 00:13:53 +0200265int hnb_test_nas_rx_lu_accept(struct gsm48_hdr *gh, int len, int *sent_tmsi)
Neels Hofmeyrae937122016-02-29 09:32:00 +0100266{
267 printf(" :D Location Update Accept :D\n");
Neels Hofmeyrae937122016-02-29 09:32:00 +0100268 struct gsm48_loc_area_id *lai;
Neels Hofmeyrc04eb532016-03-04 12:38:43 +0100269
Neels Hofmeyrae937122016-02-29 09:32:00 +0100270 lai = (struct gsm48_loc_area_id *)&gh->data[0];
271
Neels Hofmeyr30508642018-02-22 04:04:22 +0100272 struct osmo_location_area_id laid;
273 gsm48_decode_lai2(lai, &laid);
274 printf("LU: mcc %s mnc %s lac %hd\n",
275 osmo_mcc_name(laid.plmn.mcc), osmo_mnc_name(laid.plmn.mnc, laid.plmn.mnc_3_digits),
276 laid.lac);
Neels Hofmeyrae937122016-02-29 09:32:00 +0100277
Neels Hofmeyrc04eb532016-03-04 12:38:43 +0100278 struct tlv_parsed tp;
279 int parse_res;
280
Neels Hofmeyr4470f932016-04-19 00:13:53 +0200281 len -= (const char *)&gh->data[0] - (const char *)gh;
282 parse_res = tlv_parse(&tp, &gsm48_mm_att_tlvdef, &gh->data[0], len, 0, 0);
Neels Hofmeyrc04eb532016-03-04 12:38:43 +0100283 if (parse_res <= 0) {
284 printf("Error parsing Location Update Accept message: %d\n", parse_res);
285 return -1;
286 }
287
288 if (TLVP_PRESENT(&tp, GSM48_IE_MOBILE_ID)) {
289 uint8_t type = TLVP_VAL(&tp, GSM48_IE_NAME_SHORT)[0] & 0x0f;
290 if (type == GSM_MI_TYPE_TMSI)
291 *sent_tmsi = 1;
292 else *sent_tmsi = 0;
293 }
294 return 0;
Neels Hofmeyrae937122016-02-29 09:32:00 +0100295}
296
Neels Hofmeyr4470f932016-04-19 00:13:53 +0200297void hnb_test_nas_rx_mm_info(struct gsm48_hdr *gh, int len)
Neels Hofmeyrae937122016-02-29 09:32:00 +0100298{
299 printf(" :) MM Info :)\n");
Neels Hofmeyr4470f932016-04-19 00:13:53 +0200300 struct tlv_parsed *tp = parse_mm(gh, len);
Neels Hofmeyrd4598fa2016-03-09 01:37:40 +0100301 if (!tp)
Neels Hofmeyrae937122016-02-29 09:32:00 +0100302 return;
Neels Hofmeyrae937122016-02-29 09:32:00 +0100303
Neels Hofmeyrd4598fa2016-03-09 01:37:40 +0100304 if (TLVP_PRESENT(tp, GSM48_IE_NAME_SHORT)) {
Neels Hofmeyrae937122016-02-29 09:32:00 +0100305 char name[128] = {0};
306 gsm_7bit_decode_n(name, 127,
Neels Hofmeyrd4598fa2016-03-09 01:37:40 +0100307 TLVP_VAL(tp, GSM48_IE_NAME_SHORT)+1,
308 (TLVP_LEN(tp, GSM48_IE_NAME_SHORT)-1)*8/7);
Neels Hofmeyrae937122016-02-29 09:32:00 +0100309 printf("Info: Short Network Name: %s\n", name);
310 }
311
Neels Hofmeyrd4598fa2016-03-09 01:37:40 +0100312 if (TLVP_PRESENT(tp, GSM48_IE_NAME_LONG)) {
Neels Hofmeyrae937122016-02-29 09:32:00 +0100313 char name[128] = {0};
314 gsm_7bit_decode_n(name, 127,
Neels Hofmeyrd4598fa2016-03-09 01:37:40 +0100315 TLVP_VAL(tp, GSM48_IE_NAME_LONG)+1,
316 (TLVP_LEN(tp, GSM48_IE_NAME_LONG)-1)*8/7);
Neels Hofmeyrae937122016-02-29 09:32:00 +0100317 printf("Info: Long Network Name: %s\n", name);
318 }
Neels Hofmeyrae937122016-02-29 09:32:00 +0100319}
320
Neels Hofmeyr4470f932016-04-19 00:13:53 +0200321static int hnb_test_nas_rx_auth_req(struct hnb_test *hnb, struct gsm48_hdr *gh,
322 int len)
Neels Hofmeyr35888102016-03-09 01:39:56 +0100323{
Neels Hofmeyr35888102016-03-09 01:39:56 +0100324 struct gsm48_auth_req *ar;
Neels Hofmeyr35888102016-03-09 01:39:56 +0100325
Neels Hofmeyr4470f932016-04-19 00:13:53 +0200326 len -= (const char *)&gh->data[0] - (const char *)gh;
Neels Hofmeyr35888102016-03-09 01:39:56 +0100327
Neels Hofmeyr4470f932016-04-19 00:13:53 +0200328 if (len < sizeof(*ar)) {
Neels Hofmeyr35888102016-03-09 01:39:56 +0100329 printf("GSM48 Auth Req does not fit.\n");
Martin Haukec593da52020-02-15 23:01:39 +0100330 return -1;
Neels Hofmeyr35888102016-03-09 01:39:56 +0100331 }
332
333 printf(" :) Authentication Request :)\n");
334
335 ar = (struct gsm48_auth_req*) &gh->data[0];
336 int seq = ar->key_seq;
Neels Hofmeyr26779f82016-04-18 17:04:17 +0200337
338 /* Generate SRES from *HARDCODED* Ki for Iuh testing */
339 struct osmo_auth_vector vec;
340 /* Ki 000102030405060708090a0b0c0d0e0f */
341 struct osmo_sub_auth_data auth = {
342 .type = OSMO_AUTH_TYPE_GSM,
343 .algo = OSMO_AUTH_ALG_COMP128v1,
344 .u.gsm.ki = {
345 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06,
346 0x07, 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d,
347 0x0e, 0x0f
348 },
349 };
350
351 memset(&vec, 0, sizeof(vec));
352 osmo_auth_gen_vec(&vec, &auth, ar->rand);
353
354 printf("seq %d rand %s",
355 seq, osmo_hexdump(ar->rand, sizeof(ar->rand)));
356 printf(" --> sres %s\n",
357 osmo_hexdump(vec.sres, 4));
358
Neels Hofmeyrc28ed372016-04-19 01:24:34 +0200359 return hnb_test_tx_dt(hnb, gen_nas_auth_resp(vec.sres));
Neels Hofmeyr35888102016-03-09 01:39:56 +0100360}
361
Neels Hofmeyrbde4d3b2016-04-19 02:38:16 +0200362void hnb_test_tx_iu_release_req(struct hnb_test *hnb)
363{
364 RANAP_Cause_t cause = {
365 .present = RANAP_Cause_PR_radioNetwork,
366 .choice.transmissionNetwork = RANAP_CauseRadioNetwork_release_due_to_UE_generated_signalling_connection_release,
367 };
368 hnb_test_tx_dt(hnb, ranap_new_msg_iu_rel_req(&cause));
369}
370
371void hnb_test_tx_iu_release_compl(struct hnb_test *hnb)
372{
373 hnb_test_tx_dt(hnb, ranap_new_msg_iu_rel_compl());
374}
375
Neels Hofmeyr4470f932016-04-19 00:13:53 +0200376static int hnb_test_nas_rx_mm(struct hnb_test *hnb, struct gsm48_hdr *gh, int len)
Neels Hofmeyr860a1292016-02-18 23:03:15 +0100377{
378 struct hnbtest_chan *chan;
379
380 chan = hnb->cs.chan;
381 if (!chan) {
382 printf("hnb_test_nas_rx_mm(): No CS channel established yet.\n");
383 return -1;
384 }
385
386 OSMO_ASSERT(!chan->is_ps);
387
Neels Hofmeyr7c28f6f2016-04-05 11:49:53 +0200388 uint8_t msg_type = gsm48_hdr_msg_type(gh);
Neels Hofmeyrc04eb532016-03-04 12:38:43 +0100389 int sent_tmsi;
Neels Hofmeyr860a1292016-02-18 23:03:15 +0100390
391 switch (msg_type) {
392 case GSM48_MT_MM_ID_REQ:
Neels Hofmeyrc28ed372016-04-19 01:24:34 +0200393 return hnb_test_tx_dt(hnb, gen_nas_id_resp());
Neels Hofmeyr860a1292016-02-18 23:03:15 +0100394
Neels Hofmeyrae937122016-02-29 09:32:00 +0100395 case GSM48_MT_MM_LOC_UPD_ACCEPT:
Neels Hofmeyr4470f932016-04-19 00:13:53 +0200396 if (hnb_test_nas_rx_lu_accept(gh, len, &sent_tmsi))
Neels Hofmeyrc04eb532016-03-04 12:38:43 +0100397 return -1;
398 if (sent_tmsi)
Neels Hofmeyrc28ed372016-04-19 01:24:34 +0200399 return hnb_test_tx_dt(hnb, gen_nas_tmsi_realloc_compl());
Neels Hofmeyrc04eb532016-03-04 12:38:43 +0100400 else
401 return 0;
Neels Hofmeyrae937122016-02-29 09:32:00 +0100402
Neels Hofmeyr5dbb7b22016-03-09 01:38:13 +0100403 case GSM48_MT_MM_LOC_UPD_REJECT:
404 printf("Received Location Update Reject\n");
405 return 0;
406
Neels Hofmeyrae937122016-02-29 09:32:00 +0100407 case GSM48_MT_MM_INFO:
Neels Hofmeyr4470f932016-04-19 00:13:53 +0200408 hnb_test_nas_rx_mm_info(gh, len);
Neels Hofmeyrbde4d3b2016-04-19 02:38:16 +0200409 hnb_test_tx_iu_release_req(hnb);
Neels Hofmeyrae937122016-02-29 09:32:00 +0100410 return 0;
411
Neels Hofmeyr35888102016-03-09 01:39:56 +0100412 case GSM48_MT_MM_AUTH_REQ:
Neels Hofmeyr4470f932016-04-19 00:13:53 +0200413 return hnb_test_nas_rx_auth_req(hnb, gh, len);
Neels Hofmeyr35888102016-03-09 01:39:56 +0100414
Neels Hofmeyr860a1292016-02-18 23:03:15 +0100415 default:
Neels Hofmeyrae937122016-02-29 09:32:00 +0100416 printf("04.08 message type not handled by hnb-test: 0x%x\n",
Neels Hofmeyr860a1292016-02-18 23:03:15 +0100417 msg_type);
418 return 0;
419 }
420
421}
422
Neels Hofmeyr4470f932016-04-19 00:13:53 +0200423void hnb_test_nas_rx_dtap(struct hnb_test *hnb, void *data, int len)
Neels Hofmeyr860a1292016-02-18 23:03:15 +0100424{
Neels Hofmeyr4470f932016-04-19 00:13:53 +0200425 int rc;
426 printf("got %d bytes: %s\n", len, osmo_hexdump(data, len));
Neels Hofmeyr860a1292016-02-18 23:03:15 +0100427
428 // nas_pdu == '05 08 12' ==> IMEI Identity request
429 // '05 04 0d' ==> LU reject
430
Neels Hofmeyr4470f932016-04-19 00:13:53 +0200431 struct gsm48_hdr *gh = data;
432 if (len < sizeof(*gh)) {
433 printf("hnb_test_nas_rx_dtap(): NAS PDU is too short: %d. Ignoring.\n",
434 len);
435 return;
Neels Hofmeyr8c2b4ec2016-04-04 19:27:53 +0200436 }
Neels Hofmeyr7c28f6f2016-04-05 11:49:53 +0200437 uint8_t pdisc = gsm48_hdr_pdisc(gh);
Neels Hofmeyr860a1292016-02-18 23:03:15 +0100438
439 switch (pdisc) {
440 case GSM48_PDISC_MM:
Neels Hofmeyr4470f932016-04-19 00:13:53 +0200441 rc = hnb_test_nas_rx_mm(hnb, gh, len);
442 if (rc != 0)
443 printf("Error receiving MM message: %d\n", rc);
444 return;
Neels Hofmeyr860a1292016-02-18 23:03:15 +0100445 default:
446 printf("04.08 discriminator not handled by hnb-test: %d\n",
447 pdisc);
Neels Hofmeyr4470f932016-04-19 00:13:53 +0200448 return;
Neels Hofmeyr860a1292016-02-18 23:03:15 +0100449 }
Neels Hofmeyr860a1292016-02-18 23:03:15 +0100450}
451
Neels Hofmeyr4a0a69a2016-04-19 00:06:28 +0200452void hnb_test_rx_secmode_cmd(struct hnb_test *hnb, long ip_alg)
453{
454 printf(" :) Security Mode Command :)\n");
455 /* not caring about encryption yet, just pass 0 for No Encryption. */
456 hnb_test_tx_dt(hnb, ranap_new_msg_sec_mod_compl(ip_alg, 0));
457}
458
Neels Hofmeyrbde4d3b2016-04-19 02:38:16 +0200459void hnb_test_rx_iu_release(struct hnb_test *hnb)
460{
461 hnb_test_tx_iu_release_compl(hnb);
462}
463
Neels Hofmeyr5ad72b92016-04-19 18:09:05 +0200464void hnb_test_rx_paging(struct hnb_test *hnb, const char *imsi)
465{
466 printf(" :) Paging Request for %s :)\n", imsi);
467 /* TODO reply */
468}
469
Daniel Willmann479cb302015-12-09 17:54:59 +0100470int hnb_test_hnbap_rx(struct hnb_test *hnb, struct msgb *msg)
471{
472 HNBAP_PDU_t _pdu, *pdu = &_pdu;
473 asn_dec_rval_t dec_ret;
474 int rc;
475
476 memset(pdu, 0, sizeof(*pdu));
477 dec_ret = aper_decode(NULL, &asn_DEF_HNBAP_PDU, (void **) &pdu,
478 msg->data, msgb_length(msg), 0, 0);
479 if (dec_ret.code != RC_OK) {
480 LOGP(DMAIN, LOGL_ERROR, "Error in ASN.1 decode\n");
Pau Espin Pedrol84c3e862021-01-14 11:21:09 +0100481 return -EINVAL;
Daniel Willmann479cb302015-12-09 17:54:59 +0100482 }
483
484 if (pdu->present != HNBAP_PDU_PR_successfulOutcome) {
485 printf("Unexpected HNBAP message received\n");
486 }
487
488 switch (pdu->choice.successfulOutcome.procedureCode) {
489 case ProcedureCode_id_HNBRegister:
490 /* Get HNB id and send UE Register request */
491 rc = hnb_test_rx_hnb_register_acc(hnb, &pdu->choice.successfulOutcome.value);
492 break;
493 case ProcedureCode_id_UERegister:
Daniel Willmanna7b02402015-12-09 19:05:09 +0100494 rc = hnb_test_rx_ue_register_acc(hnb, &pdu->choice.successfulOutcome.value);
Daniel Willmann479cb302015-12-09 17:54:59 +0100495 break;
496 default:
497 break;
498 }
499
500 return rc;
501}
502
Neels Hofmeyrb984f362016-02-18 01:18:20 +0100503extern void direct_transfer_nas_pdu_print(ANY_t *in);
504
Neels Hofmeyr0968a582016-01-11 15:19:38 +0100505int hnb_test_rua_rx(struct hnb_test *hnb, struct msgb *msg)
506{
507 RUA_RUA_PDU_t _pdu, *pdu = &_pdu;
508 asn_dec_rval_t dec_ret;
Neels Hofmeyr0968a582016-01-11 15:19:38 +0100509
510 memset(pdu, 0, sizeof(*pdu));
511 dec_ret = aper_decode(NULL, &asn_DEF_RUA_RUA_PDU, (void **) &pdu,
512 msg->data, msgb_length(msg), 0, 0);
513 if (dec_ret.code != RC_OK) {
514 LOGP(DMAIN, LOGL_ERROR, "Error in ASN.1 decode\n");
Pau Espin Pedrol84c3e862021-01-14 11:21:09 +0100515 return -EINVAL;
Neels Hofmeyr0968a582016-01-11 15:19:38 +0100516 }
517
518 switch (pdu->present) {
519 case RUA_RUA_PDU_PR_successfulOutcome:
520 printf("RUA_RUA_PDU_PR_successfulOutcome\n");
521 break;
522 case RUA_RUA_PDU_PR_initiatingMessage:
523 printf("RUA_RUA_PDU_PR_initiatingMessage\n");
524 break;
525 case RUA_RUA_PDU_PR_NOTHING:
526 printf("RUA_RUA_PDU_PR_NOTHING\n");
527 break;
528 case RUA_RUA_PDU_PR_unsuccessfulOutcome:
529 printf("RUA_RUA_PDU_PR_unsuccessfulOutcome\n");
530 break;
531 default:
532 printf("Unexpected RUA message received\n");
533 break;
534 }
535
536 switch (pdu->choice.successfulOutcome.procedureCode) {
537 case RUA_ProcedureCode_id_ConnectionlessTransfer:
538 printf("RUA rx Connectionless Transfer\n");
Neels Hofmeyr5ad72b92016-04-19 18:09:05 +0200539 hnb_test_rua_cl_handle(hnb, &pdu->choice.successfulOutcome.value);
Neels Hofmeyr0968a582016-01-11 15:19:38 +0100540 break;
541 case RUA_ProcedureCode_id_Connect:
542 printf("RUA rx Connect\n");
543 break;
544 case RUA_ProcedureCode_id_DirectTransfer:
545 printf("RUA rx DirectTransfer\n");
Neels Hofmeyr4470f932016-04-19 00:13:53 +0200546 hnb_test_rua_dt_handle(hnb, &pdu->choice.successfulOutcome.value);
Neels Hofmeyr0968a582016-01-11 15:19:38 +0100547 break;
548 case RUA_ProcedureCode_id_Disconnect:
549 printf("RUA rx Disconnect\n");
550 break;
551 case RUA_ProcedureCode_id_ErrorIndication:
552 printf("RUA rx ErrorIndication\n");
553 break;
554 case RUA_ProcedureCode_id_privateMessage:
555 printf("RUA rx privateMessage\n");
556 break;
557 default:
558 printf("RUA rx unknown message\n");
559 break;
560 }
561
Pau Espin Pedrol84c3e862021-01-14 11:21:09 +0100562 return 0;
Neels Hofmeyr0968a582016-01-11 15:19:38 +0100563}
564
Daniel Willmann97374c02015-12-03 09:37:58 +0100565static int hnb_read_cb(struct osmo_fd *fd)
566{
567 struct hnb_test *hnb_test = fd->data;
568 struct sctp_sndrcvinfo sinfo;
569 struct msgb *msg = msgb_alloc(IUH_MSGB_SIZE, "Iuh rx");
570 int flags = 0;
571 int rc;
572
573 if (!msg)
574 return -ENOMEM;
575
576 rc = sctp_recvmsg(fd->fd, msgb_data(msg), msgb_tailroom(msg),
577 NULL, NULL, &sinfo, &flags);
578 if (rc < 0) {
579 LOGP(DMAIN, LOGL_ERROR, "Error during sctp_recvmsg()\n");
580 /* FIXME: clean up after disappeared HNB */
Daniel Willmann6637a282015-12-17 14:47:51 +0100581 close(fd->fd);
582 osmo_fd_unregister(fd);
Daniel Willmann97374c02015-12-03 09:37:58 +0100583 return rc;
Daniel Willmann6637a282015-12-17 14:47:51 +0100584 } else if (rc == 0) {
585 LOGP(DMAIN, LOGL_INFO, "Connection to HNB closed\n");
586 close(fd->fd);
587 osmo_fd_unregister(fd);
588 fd->fd = -1;
589
590 return -1;
591 } else {
Daniel Willmann97374c02015-12-03 09:37:58 +0100592 msgb_put(msg, rc);
Daniel Willmann6637a282015-12-17 14:47:51 +0100593 }
Daniel Willmann97374c02015-12-03 09:37:58 +0100594
595 if (flags & MSG_NOTIFICATION) {
Daniel Willmann32797802015-12-17 12:53:05 +0100596 LOGP(DMAIN, LOGL_DEBUG, "Ignoring SCTP notification\n");
Daniel Willmann97374c02015-12-03 09:37:58 +0100597 msgb_free(msg);
598 return 0;
599 }
600
601 sinfo.sinfo_ppid = ntohl(sinfo.sinfo_ppid);
602
603 switch (sinfo.sinfo_ppid) {
604 case IUH_PPI_HNBAP:
Neels Hofmeyr0968a582016-01-11 15:19:38 +0100605 printf("HNBAP message received\n");
Daniel Willmann479cb302015-12-09 17:54:59 +0100606 rc = hnb_test_hnbap_rx(hnb_test, msg);
Daniel Willmann97374c02015-12-03 09:37:58 +0100607 break;
608 case IUH_PPI_RUA:
Neels Hofmeyr0968a582016-01-11 15:19:38 +0100609 printf("RUA message received\n");
610 rc = hnb_test_rua_rx(hnb_test, msg);
Daniel Willmann97374c02015-12-03 09:37:58 +0100611 break;
612 case IUH_PPI_SABP:
613 case IUH_PPI_RNA:
614 case IUH_PPI_PUA:
615 LOGP(DMAIN, LOGL_ERROR, "Unimplemented SCTP PPID=%u received\n",
616 sinfo.sinfo_ppid);
617 rc = 0;
618 break;
619 default:
620 LOGP(DMAIN, LOGL_ERROR, "Unknown SCTP PPID=%u received\n",
621 sinfo.sinfo_ppid);
622 rc = 0;
623 break;
624 }
625
626 msgb_free(msg);
627 return rc;
628}
629
630static int hnb_write_cb(struct osmo_fd *fd, struct msgb *msg)
631{
Pau Espin Pedrol89f4c802021-01-14 11:13:46 +0100632 /* struct hnb_test *ctx = fd->data; */
Daniel Willmann97374c02015-12-03 09:37:58 +0100633 struct sctp_sndrcvinfo sinfo = {
Harald Weltec3851222015-12-24 15:41:21 +0100634 .sinfo_ppid = htonl(msgb_sctp_ppid(msg)),
Daniel Willmann97374c02015-12-03 09:37:58 +0100635 .sinfo_stream = 0,
636 };
637 int rc;
638
Neels Hofmeyre25faa82016-03-04 02:49:52 +0100639 printf("Sending: %s\n", osmo_hexdump(msgb_data(msg), msgb_length(msg)));
Daniel Willmann97374c02015-12-03 09:37:58 +0100640 rc = sctp_send(fd->fd, msgb_data(msg), msgb_length(msg),
641 &sinfo, 0);
642 /* we don't need to msgb_free(), write_queue does this for us */
643 return rc;
644}
645
Daniel Willmann4aeef6c2015-12-03 17:02:13 +0100646static void hnb_send_register_req(struct hnb_test *hnb_test)
647{
Daniel Willmanna1e202e2015-12-07 17:21:07 +0100648 HNBRegisterRequest_t request_out;
Daniel Willmann4aeef6c2015-12-03 17:02:13 +0100649 struct msgb *msg;
650 int rc;
Daniel Willmanna1e202e2015-12-07 17:21:07 +0100651 uint16_t lac, sac;
652 uint8_t rac;
653 uint32_t cid;
654 uint8_t plmn[] = {0x09, 0xf1, 0x99};
655 char identity[50] = "ATestHNB@";
Daniel Willmann4aeef6c2015-12-03 17:02:13 +0100656
Daniel Willmanna1e202e2015-12-07 17:21:07 +0100657 HNBRegisterRequestIEs_t request;
658 memset(&request, 0, sizeof(request));
Daniel Willmann4aeef6c2015-12-03 17:02:13 +0100659
Daniel Willmanna1e202e2015-12-07 17:21:07 +0100660 lac = 0xc0fe;
661 sac = 0xabab;
662 rac = 0x42;
Daniel Willmannd6a45b42015-12-08 13:55:17 +0100663 cid = 0xadceaab;
Daniel Willmann4aeef6c2015-12-03 17:02:13 +0100664
Daniel Willmanna1e202e2015-12-07 17:21:07 +0100665 asn1_u16_to_str(&request.lac, &lac, lac);
666 asn1_u16_to_str(&request.sac, &sac, sac);
667 asn1_u8_to_str(&request.rac, &rac, rac);
Daniel Willmannd6a45b42015-12-08 13:55:17 +0100668 asn1_u28_to_bitstring(&request.cellIdentity, &cid, cid);
Daniel Willmanna1e202e2015-12-07 17:21:07 +0100669
Pau Espin Pedrol4c928482021-01-14 11:27:34 +0100670 request.hnB_Identity.hNB_Identity_Info.buf = (uint8_t*) identity;
Daniel Willmanna1e202e2015-12-07 17:21:07 +0100671 request.hnB_Identity.hNB_Identity_Info.size = strlen(identity);
672
673 request.plmNidentity.buf = plmn;
674 request.plmNidentity.size = 3;
675
676
677
678 memset(&request_out, 0, sizeof(request_out));
679 rc = hnbap_encode_hnbregisterrequesties(&request_out, &request);
680 if (rc < 0) {
681 printf("Could not encode HNB register request IEs\n");
682 }
683
684 msg = hnbap_generate_initiating_message(ProcedureCode_id_HNBRegister,
685 Criticality_reject,
686 &asn_DEF_HNBRegisterRequest,
687 &request_out);
688
Daniel Willmann4aeef6c2015-12-03 17:02:13 +0100689
Harald Weltec3851222015-12-24 15:41:21 +0100690 msgb_sctp_ppid(msg) = IUH_PPI_HNBAP;
691
692 osmo_wqueue_enqueue(&hnb_test->wqueue, msg);
693}
694
695static void hnb_send_deregister_req(struct hnb_test *hnb_test)
696{
697 struct msgb *msg;
698 int rc;
699
700 HNBDe_RegisterIEs_t request;
701 memset(&request, 0, sizeof(request));
702
703 request.cause.present = Cause_PR_misc;
704 request.cause.choice.misc = CauseMisc_o_and_m_intervention;
705
706 HNBDe_Register_t request_out;
707 memset(&request_out, 0, sizeof(request_out));
708 rc = hnbap_encode_hnbde_registeries(&request_out, &request);
709 if (rc < 0) {
710 printf("Could not encode HNB deregister request IEs\n");
711 }
712
713 msg = hnbap_generate_initiating_message(ProcedureCode_id_HNBDe_Register,
714 Criticality_reject,
715 &asn_DEF_HNBDe_Register,
716 &request_out);
717
718 msgb_sctp_ppid(msg) = IUH_PPI_HNBAP;
Daniel Willmann4aeef6c2015-12-03 17:02:13 +0100719
720 osmo_wqueue_enqueue(&hnb_test->wqueue, msg);
721}
722
723
Daniel Willmann97374c02015-12-03 09:37:58 +0100724static const struct log_info_cat log_cat[] = {
725 [DMAIN] = {
Daniel Willmann32797802015-12-17 12:53:05 +0100726 .name = "DMAIN", .loglevel = LOGL_INFO, .enabled = 1,
Daniel Willmann97374c02015-12-03 09:37:58 +0100727 .color = "",
728 .description = "Main program",
729 },
Daniel Willmann32797802015-12-17 12:53:05 +0100730 [DHNBAP] = {
731 .name = "DHNBAP", .loglevel = LOGL_DEBUG, .enabled = 1,
732 .color = "",
733 .description = "Home Node B Application Part",
734 },
Daniel Willmann97374c02015-12-03 09:37:58 +0100735};
736
737static const struct log_info hnb_test_log_info = {
738 .cat = log_cat,
739 .num_cat = ARRAY_SIZE(log_cat),
740};
741
742static struct vty_app_info vty_info = {
743 .name = "OsmoHNB-Test",
744 .version = "0",
745};
746
Daniel Willmann4abdee02015-12-09 17:57:32 +0100747static int sctp_sock_init(int fd)
748{
749 struct sctp_event_subscribe event;
750 int rc;
751
752 /* subscribe for all events */
753 memset((uint8_t *)&event, 1, sizeof(event));
754 rc = setsockopt(fd, IPPROTO_SCTP, SCTP_EVENTS,
755 &event, sizeof(event));
756
757 return rc;
758}
759
Harald Weltec3851222015-12-24 15:41:21 +0100760#define HNBAP_STR "HNBAP related commands\n"
761#define HNB_STR "HomeNodeB commands\n"
762#define UE_STR "User Equipment commands\n"
763#define RANAP_STR "RANAP related commands\n"
764#define CSPS_STR "Circuit Switched\n" "Packet Switched\n"
765
766DEFUN(hnb_register, hnb_register_cmd,
767 "hnbap hnb register", HNBAP_STR HNB_STR "Send HNB-REGISTER REQUEST")
768{
769 hnb_send_register_req(&g_hnb_test);
770
771 return CMD_SUCCESS;
772}
773
774DEFUN(hnb_deregister, hnb_deregister_cmd,
775 "hnbap hnb deregister", HNBAP_STR HNB_STR "Send HNB-DEREGISTER REQUEST")
776{
777 hnb_send_deregister_req(&g_hnb_test);
778
779 return CMD_SUCCESS;
780}
781
782DEFUN(ue_register, ue_register_cmd,
783 "hnbap ue register IMSI", HNBAP_STR UE_STR "Send UE-REGISTER REQUEST")
784{
785 hnb_test_ue_register_tx(&g_hnb_test, argv[0]);
786
787 return CMD_SUCCESS;
788}
789
790DEFUN(asn_dbg, asn_dbg_cmd,
791 "asn-debug (1|0)", "Enable or disabel libasn1c debugging")
792{
793 asn_debug = atoi(argv[0]);
794
795 return CMD_SUCCESS;
796}
797
798DEFUN(ranap_reset, ranap_reset_cmd,
799 "ranap reset (cs|ps)", RANAP_STR "Send RANAP RESET\n" CSPS_STR)
800{
801 int is_ps = 0;
802 struct msgb *msg, *rua;
803
804 RANAP_Cause_t cause = {
805 .present = RANAP_Cause_PR_transmissionNetwork,
806 .choice.transmissionNetwork = RANAP_CauseTransmissionNetwork_signalling_transport_resource_failure,
807 };
808
809 if (!strcmp(argv[0], "ps"))
810 is_ps = 1;
811
812 msg = ranap_new_msg_reset(is_ps, &cause);
813 rua = rua_new_udt(msg);
814 //msgb_free(msg);
815 osmo_wqueue_enqueue(&g_hnb_test.wqueue, rua);
816
817 return CMD_SUCCESS;
818}
819
820
821enum my_vty_nodes {
822 CHAN_NODE = _LAST_OSMOVTY_NODE,
823};
824
825static struct cmd_node chan_node = {
826 CHAN_NODE,
827 "%s(chan)> ",
828 1,
829};
830
831
Harald Weltec3851222015-12-24 15:41:21 +0100832static struct msgb *gen_initue_lu(int is_ps, uint32_t conn_id, const char *imsi)
833{
Neels Hofmeyr5c1cc8c2016-02-29 09:28:48 +0100834 uint8_t lu[] = { GSM48_PDISC_MM, GSM48_MT_MM_LOC_UPD_REQUEST,
835 0x70, 0x62, 0xf2, 0x30, 0xff, 0xf3, 0x57,
Neels Hofmeyr32828702016-01-14 13:06:47 +0100836 /* len, IMSI/type, IMSI-------------------------------- */
Harald Weltec3851222015-12-24 15:41:21 +0100837 0x08, 0x29, 0x26, 0x24, 0x10, 0x32, 0x54, 0x76, 0x98,
838 0x33, 0x03, 0x57, 0x18 , 0xb2 };
839 uint8_t plmn_id[] = { 0x09, 0x01, 0x99 };
840 RANAP_GlobalRNC_ID_t rnc_id = {
841 .rNC_ID = 23,
842 .pLMNidentity.buf = plmn_id,
843 .pLMNidentity.size = sizeof(plmn_id),
844 };
Harald Weltec3851222015-12-24 15:41:21 +0100845
846 /* FIXME: patch imsi */
Neels Hofmeyr7b811282016-01-14 13:05:24 +0100847 /* Note: the Mobile Identitiy IE's IMSI data has the identity type and
848 * an even/odd indicator bit encoded in the first octet. So the first
849 * octet looks like this:
850 *
851 * 8 7 6 5 | 4 | 3 2 1
852 * IMSI-digit | even/odd | type
853 *
854 * followed by the remaining IMSI digits.
855 * If digit count is even (bit 4 == 0), that first high-nibble is 0xf.
856 * (derived from Iu pcap Location Update Request msg and TS 25.413)
857 *
858 * TODO I'm only 90% sure about this
859 */
Harald Weltec3851222015-12-24 15:41:21 +0100860
Neels Hofmeyr6a62e542016-01-15 03:07:45 +0100861 return ranap_new_msg_initial_ue(conn_id, is_ps, &rnc_id, lu, sizeof(lu));
Harald Weltec3851222015-12-24 15:41:21 +0100862}
863
864DEFUN(chan, chan_cmd,
865 "channel (cs|ps) lu imsi IMSI",
866 "Open a new Signalling Connection\n"
867 "To Circuit-Switched CN\n"
868 "To Packet-Switched CN\n"
869 "Performing a Location Update\n"
870 )
871{
872 struct hnbtest_chan *chan;
873 struct msgb *msg, *rua;
Daniel Willmann85927162016-01-14 15:36:49 +0100874 static uint16_t conn_id = 42;
Harald Weltec3851222015-12-24 15:41:21 +0100875
876 chan = talloc_zero(tall_hnb_ctx, struct hnbtest_chan);
877 if (!strcmp(argv[0], "ps"))
878 chan->is_ps = 1;
879 chan->imsi = talloc_strdup(chan, argv[1]);
Daniel Willmann85927162016-01-14 15:36:49 +0100880 chan->conn_id = conn_id;
881 conn_id++;
Harald Weltec3851222015-12-24 15:41:21 +0100882
883 msg = gen_initue_lu(chan->is_ps, chan->conn_id, chan->imsi);
884 rua = rua_new_conn(chan->is_ps, chan->conn_id, msg);
885
886 osmo_wqueue_enqueue(&g_hnb_test.wqueue, rua);
887
888 vty->index = chan;
889 vty->node = CHAN_NODE;
890
Neels Hofmeyr860a1292016-02-18 23:03:15 +0100891 if (!chan->is_ps)
892 g_hnb_test.cs.chan = chan;
893
894
Harald Weltec3851222015-12-24 15:41:21 +0100895 return CMD_SUCCESS;
896}
897
898static void hnbtest_vty_init(void)
899{
900 install_element_ve(&asn_dbg_cmd);
901 install_element_ve(&hnb_register_cmd);
902 install_element_ve(&hnb_deregister_cmd);
903 install_element_ve(&ue_register_cmd);
904 install_element_ve(&ranap_reset_cmd);
905 install_element_ve(&chan_cmd);
906
907 install_node(&chan_node, NULL);
Harald Weltec3851222015-12-24 15:41:21 +0100908}
909
Daniel Willmann141a0ba2015-12-17 18:03:52 +0100910static void handle_options(int argc, char **argv)
911{
912 while (1) {
913 int idx = 0, c;
914 static const struct option long_options[] = {
915 { "ues", 1, 0, 'u' },
Neels Hofmeyr5f9be1e2016-02-29 13:33:44 +0100916 { "gw-addr", 1, 0, 'g' },
Daniel Willmann141a0ba2015-12-17 18:03:52 +0100917 { 0, 0, 0, 0 },
918 };
919
Neels Hofmeyr5f9be1e2016-02-29 13:33:44 +0100920 c = getopt_long(argc, argv, "u:g:", long_options, &idx);
Daniel Willmann141a0ba2015-12-17 18:03:52 +0100921
922 if (c == -1)
923 break;
924
925 switch (c) {
926 case 'u':
927 g_hnb_test.ues = atoi(optarg);
928 break;
Neels Hofmeyr5f9be1e2016-02-29 13:33:44 +0100929 case 'g':
930 g_hnb_test.gw_addr = optarg;
931 break;
Daniel Willmann141a0ba2015-12-17 18:03:52 +0100932 }
933 }
934}
935
Harald Weltec3851222015-12-24 15:41:21 +0100936int main(int argc, char **argv)
Daniel Willmann97374c02015-12-03 09:37:58 +0100937{
938 int rc;
939
Harald Welte87ffeb92015-12-25 15:34:22 +0100940 test_common_init();
Daniel Willmann97374c02015-12-03 09:37:58 +0100941
Harald Welte87ffeb92015-12-25 15:34:22 +0100942 tall_hnb_ctx = talloc_named_const(NULL, 0, "hnb_context");
Daniel Willmann97374c02015-12-03 09:37:58 +0100943
944 vty_init(&vty_info);
Harald Weltec3851222015-12-24 15:41:21 +0100945 hnbtest_vty_init();
946
Neels Hofmeyra0d21472016-02-24 20:50:31 +0100947 rc = telnet_init_dynif(NULL, NULL, vty_get_bind_addr(), 2324);
Harald Weltec3851222015-12-24 15:41:21 +0100948 if (rc < 0) {
949 perror("Error binding VTY port");
950 exit(1);
951 }
Daniel Willmann97374c02015-12-03 09:37:58 +0100952
Daniel Willmann141a0ba2015-12-17 18:03:52 +0100953 handle_options(argc, argv);
954
Daniel Willmann97374c02015-12-03 09:37:58 +0100955 osmo_wqueue_init(&g_hnb_test.wqueue, 16);
956 g_hnb_test.wqueue.bfd.data = &g_hnb_test;
957 g_hnb_test.wqueue.read_cb = hnb_read_cb;
958 g_hnb_test.wqueue.write_cb = hnb_write_cb;
959
960 rc = osmo_sock_init_ofd(&g_hnb_test.wqueue.bfd, AF_INET, SOCK_STREAM,
Neels Hofmeyr5f9be1e2016-02-29 13:33:44 +0100961 IPPROTO_SCTP, g_hnb_test.gw_addr,
Daniel Willmann97374c02015-12-03 09:37:58 +0100962 g_hnb_test.gw_port, OSMO_SOCK_F_CONNECT);
963 if (rc < 0) {
964 perror("Error connecting to Iuh port");
965 exit(1);
966 }
Daniel Willmann4abdee02015-12-09 17:57:32 +0100967 sctp_sock_init(g_hnb_test.wqueue.bfd.fd);
Daniel Willmann97374c02015-12-03 09:37:58 +0100968
Harald Weltec3851222015-12-24 15:41:21 +0100969#if 0
970 /* some hard-coded message generation. Doesn't make sense from
971 * a protocol point of view but enables to look at the encoded
972 * results in wireshark for manual verification */
973 {
974 struct msgb *msg, *rua;
975 const uint8_t nas[] = { 0, 1, 2, 3 };
976 const uint8_t ik[] = { 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15 };
977
978 msg = ranap_new_msg_dt(0, nas, sizeof(nas));
979 rua = rua_new_udt(msg);
980 osmo_wqueue_enqueue(&g_hnb_test.wqueue, rua);
981
Daniel Willmannf44d12c2016-04-20 10:16:37 +0200982 msg = ranap_new_msg_sec_mod_cmd(ik, ik, RANAP_KeyStatus_new);
Harald Weltec3851222015-12-24 15:41:21 +0100983 rua = rua_new_udt(msg);
984 osmo_wqueue_enqueue(&g_hnb_test.wqueue, rua);
985
986 msg = ranap_new_msg_iu_rel_cmd()
987 rua = rua_new_udt(msg);
988 osmo_wqueue_enqueue(&g_hnb_test.wqueue, rua);
989
990 msg = ranap_new_msg_paging_cmd("901990123456789", NULL, 0, 0);
991 rua = rua_new_udt(msg);
992 osmo_wqueue_enqueue(&g_hnb_test.wqueue, rua);
993
994 msg = ranap_new_msg_rab_assign_voice(1, 0x01020304, 0x1020);
995 rua = rua_new_udt(msg);
996 osmo_wqueue_enqueue(&g_hnb_test.wqueue, rua);
997
998 msg = ranap_new_msg_rab_assign_data(2, 0x01020304, 0x11223344);
999 rua = rua_new_udt(msg);
1000 osmo_wqueue_enqueue(&g_hnb_test.wqueue, rua);
1001 }
1002#endif
Daniel Willmann4aeef6c2015-12-03 17:02:13 +01001003
Daniel Willmann97374c02015-12-03 09:37:58 +01001004 while (1) {
1005 rc = osmo_select_main(0);
1006 if (rc < 0)
1007 exit(3);
1008 }
1009
1010 /* not reached */
1011 exit(0);
1012}