blob: 6bd82d0e1fa2a7541b98489bad68f20198afe311 [file] [log] [blame]
Holger Hans Peter Freytheracf8a0c2010-03-29 08:47:44 +02001/* GSM Mobile Radio Interface Layer 3 messages on the A-bis interface
Harald Welte52b1f982008-12-23 20:25:15 +00002 * 3GPP TS 04.08 version 7.21.0 Release 1998 / ETSI TS 100 940 V7.21.0 */
3
Harald Welte2483f1b2016-06-19 18:06:02 +02004/* (C) 2008-2016 by Harald Welte <laforge@gnumonks.org>
Holger Hans Peter Freytherc121bb32012-12-26 10:17:42 +01005 * (C) 2008-2012 by Holger Hans Peter Freyther <zecke@selfish.org>
Harald Welte8470bf22008-12-25 23:28:35 +00006 *
Harald Welte52b1f982008-12-23 20:25:15 +00007 * All Rights Reserved
8 *
9 * This program is free software; you can redistribute it and/or modify
Harald Welte9af6ddf2011-01-01 15:25:50 +010010 * it under the terms of the GNU Affero General Public License as published by
11 * the Free Software Foundation; either version 3 of the License, or
Harald Welte52b1f982008-12-23 20:25:15 +000012 * (at your option) any later version.
13 *
14 * This program is distributed in the hope that it will be useful,
15 * but WITHOUT ANY WARRANTY; without even the implied warranty of
16 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
Harald Welte9af6ddf2011-01-01 15:25:50 +010017 * GNU Affero General Public License for more details.
Harald Welte52b1f982008-12-23 20:25:15 +000018 *
Harald Welte9af6ddf2011-01-01 15:25:50 +010019 * You should have received a copy of the GNU Affero General Public License
20 * along with this program. If not, see <http://www.gnu.org/licenses/>.
Harald Welte52b1f982008-12-23 20:25:15 +000021 *
22 */
23
24
25#include <stdio.h>
26#include <stdlib.h>
27#include <string.h>
Maxddee01f2016-05-24 14:23:27 +020028#include <stdbool.h>
Harald Welte52b1f982008-12-23 20:25:15 +000029#include <errno.h>
Harald Weltedb253af2008-12-30 17:56:55 +000030#include <time.h>
Harald Welte4b634542008-12-27 01:55:51 +000031#include <netinet/in.h>
Maxddee01f2016-05-24 14:23:27 +020032#include <sys/types.h>
Harald Welte52b1f982008-12-23 20:25:15 +000033
Neels Hofmeyr4ac80092019-03-04 02:46:37 +010034#include "config.h"
Harald Welte9c3dc902012-04-08 16:59:24 +020035
Neels Hofmeyr90843962017-09-04 15:04:35 +020036#include <osmocom/msc/debug.h>
37#include <osmocom/msc/gsm_data.h>
Neels Hofmeyr90843962017-09-04 15:04:35 +020038#include <osmocom/msc/gsm_04_08.h>
Neels Hofmeyr90843962017-09-04 15:04:35 +020039#include <osmocom/msc/signal.h>
Neels Hofmeyr90843962017-09-04 15:04:35 +020040#include <osmocom/msc/transaction.h>
Neels Hofmeyr90843962017-09-04 15:04:35 +020041#include <osmocom/msc/vlr.h>
Neels Hofmeyrc4628a32018-12-07 14:47:34 +010042#include <osmocom/msc/msc_a.h>
Holger Hans Peter Freyther841c2002010-09-30 18:52:23 +080043
Pablo Neira Ayuso136f4532011-03-22 16:47:59 +010044#include <osmocom/gsm/gsm48.h>
Pablo Neira Ayuso136f4532011-03-22 16:47:59 +010045#include <osmocom/gsm/gsm_utils.h>
Max8db12e42016-04-18 23:11:18 +020046#include <osmocom/gsm/protocol/gsm_04_08.h>
Pablo Neira Ayuso136f4532011-03-22 16:47:59 +010047#include <osmocom/core/msgb.h>
48#include <osmocom/core/talloc.h>
Neels Hofmeyr93bafb62017-01-13 03:12:08 +010049#include <osmocom/core/utils.h>
Philipp Maier621ba032017-11-07 17:19:25 +010050#include <osmocom/core/byteswap.h>
Pablo Neira Ayuso136f4532011-03-22 16:47:59 +010051#include <osmocom/gsm/tlv.h>
Neels Hofmeyr84da6b12016-05-20 21:59:55 +020052#include <osmocom/crypt/auth.h>
Harald Welte52b1f982008-12-23 20:25:15 +000053
Neels Hofmeyrc4628a32018-12-07 14:47:34 +010054#include <osmocom/msc/msub.h>
55#include <osmocom/msc/msc_roles.h>
Philipp Maierfbf66102017-04-09 12:32:51 +020056
Holger Hans Peter Freyther1e61b252013-07-06 11:45:38 +020057#include <assert.h>
58
Neels Hofmeyre2f24d52017-05-08 15:12:20 +020059
Harald Welte (local)d19e58b2009-08-15 02:30:58 +020060void *tall_locop_ctx;
Sylvain Munaut30a15382009-12-24 00:27:26 +010061void *tall_authciphop_ctx;
Harald Welte2cf161b2009-06-20 22:36:41 +020062
Neels Hofmeyrc4628a32018-12-07 14:47:34 +010063static int gsm0408_loc_upd_acc(struct msc_a *msc_a, uint32_t send_tmsi);
Harald Welte65e74cc2008-12-29 01:55:35 +000064
Harald Welte27989d42018-06-21 20:39:20 +020065/*! Send a simple GSM 04.08 message without any payload
Neels Hofmeyrc036b792018-11-29 22:37:51 +010066 * \param conn Active RAN connection
Harald Welte27989d42018-06-21 20:39:20 +020067 * \param[in] pdisc Protocol discriminator
68 * \param[in] msg_type Message type
69 * \return result of \ref gsm48_conn_sendmsg
70 */
Neels Hofmeyrc4628a32018-12-07 14:47:34 +010071int gsm48_tx_simple(struct msc_a *msc_a, uint8_t pdisc, uint8_t msg_type)
Harald Welte27989d42018-06-21 20:39:20 +020072{
73 struct msgb *msg = gsm48_msgb_alloc_name("GSM 04.08 TX SIMPLE");
74 struct gsm48_hdr *gh = (struct gsm48_hdr *) msgb_put(msg, sizeof(*gh));
75
76 gh->proto_discr = pdisc;
77 gh->msg_type = msg_type;
78
Neels Hofmeyrc4628a32018-12-07 14:47:34 +010079 return msc_a_tx_dtap_to_i(msc_a, msg);
Holger Hans Peter Freyther9c137a72010-06-15 13:57:40 +080080}
Sylvain Munaut30a15382009-12-24 00:27:26 +010081
Harald Welte2483f1b2016-06-19 18:06:02 +020082/* clear all transactions globally; used in case of MNCC socket disconnect */
Neels Hofmeyrc4628a32018-12-07 14:47:34 +010083void gsm0408_clear_all_trans(struct gsm_network *net, enum trans_type type)
Harald Welte371efe52010-12-22 23:17:50 +010084{
85 struct gsm_trans *trans, *temp;
86
87 LOGP(DCC, LOGL_NOTICE, "Clearing all currently active transactions!!!\n");
88
89 llist_for_each_entry_safe(trans, temp, &net->trans_list, entry) {
Neels Hofmeyrc4628a32018-12-07 14:47:34 +010090 if (trans->type == type) {
Harald Welteeb76c7a2010-12-23 02:47:53 +010091 trans->callref = 0;
Harald Welte371efe52010-12-22 23:17:50 +010092 trans_free(trans);
Harald Welteeb76c7a2010-12-23 02:47:53 +010093 }
Harald Welte371efe52010-12-22 23:17:50 +010094 }
95}
96
Holger Freyther429e7762008-12-30 13:28:30 +000097/* Chapter 9.2.14 : Send LOCATION UPDATING REJECT */
Neels Hofmeyrc4628a32018-12-07 14:47:34 +010098static int gsm0408_loc_upd_rej(struct msc_a *msc_a, uint8_t cause)
Harald Welte52b1f982008-12-23 20:25:15 +000099{
Holger Hans Peter Freyther230a4d82010-06-15 19:40:05 +0800100 struct msgb *msg;
101
Holger Hans Peter Freyther230a4d82010-06-15 19:40:05 +0800102 msg = gsm48_create_loc_upd_rej(cause);
103 if (!msg) {
Neels Hofmeyrc4628a32018-12-07 14:47:34 +0100104 LOG_MSC_A_CAT(msc_a, DMM, LOGL_ERROR, "Failed to create msg for LOCATION UPDATING REJECT.\n");
Holger Hans Peter Freyther230a4d82010-06-15 19:40:05 +0800105 return -1;
106 }
Alexander Couzensfbd96f52016-08-29 18:40:02 +0200107
Neels Hofmeyrc4628a32018-12-07 14:47:34 +0100108 LOG_MSC_A_CAT(msc_a, DMM, LOGL_INFO, "LOCATION UPDATING REJECT\n");
Harald Welte24ff6ee2009-12-22 00:41:05 +0100109
Neels Hofmeyrc4628a32018-12-07 14:47:34 +0100110 return msc_a_tx_dtap_to_i(msc_a, msg);
Harald Welte52b1f982008-12-23 20:25:15 +0000111}
112
113/* Chapter 9.2.13 : Send LOCATION UPDATE ACCEPT */
Neels Hofmeyrc4628a32018-12-07 14:47:34 +0100114static int gsm0408_loc_upd_acc(struct msc_a *msc_a, uint32_t send_tmsi)
Harald Welte52b1f982008-12-23 20:25:15 +0000115{
Holger Hans Peter Freyther8239e062016-01-25 22:03:25 +0100116 struct msgb *msg = gsm48_msgb_alloc_name("GSM 04.08 LOC UPD ACC");
Harald Welte52b1f982008-12-23 20:25:15 +0000117 struct gsm48_hdr *gh;
118 struct gsm48_loc_area_id *lai;
Neels Hofmeyrc4628a32018-12-07 14:47:34 +0100119 struct gsm_network *net = msc_a_net(msc_a);
120 struct vlr_subscr *vsub = msc_a_vsub(msc_a);
Neels Hofmeyr379d5792018-02-22 04:04:54 +0100121 struct osmo_location_area_id laid = {
Neels Hofmeyrc4628a32018-12-07 14:47:34 +0100122 .plmn = net->plmn,
123 .lac = vsub->cgi.lai.lac,
Neels Hofmeyr379d5792018-02-22 04:04:54 +0100124 };
Neels Hofmeyr46d526a2020-05-29 03:27:50 +0200125 uint8_t *l;
126 int rc;
127 struct osmo_mobile_identity mi = {};
Alexander Couzensfbd96f52016-08-29 18:40:02 +0200128
Harald Welte52b1f982008-12-23 20:25:15 +0000129 gh = (struct gsm48_hdr *) msgb_put(msg, sizeof(*gh));
130 gh->proto_discr = GSM48_PDISC_MM;
131 gh->msg_type = GSM48_MT_MM_LOC_UPD_ACCEPT;
132
133 lai = (struct gsm48_loc_area_id *) msgb_put(msg, sizeof(*lai));
Neels Hofmeyr379d5792018-02-22 04:04:54 +0100134 gsm48_generate_lai2(lai, &laid);
Harald Welte52b1f982008-12-23 20:25:15 +0000135
Harald Welte2483f1b2016-06-19 18:06:02 +0200136 if (send_tmsi == GSM_RESERVED_TMSI) {
137 /* we did not allocate a TMSI to the MS, so we need to
138 * include the IMSI in order for the MS to delete any
139 * old TMSI that might still be allocated */
Neels Hofmeyr46d526a2020-05-29 03:27:50 +0200140 mi.type = GSM_MI_TYPE_IMSI;
141 OSMO_STRLCPY_ARRAY(mi.imsi, vsub->imsi);
Neels Hofmeyr84da6b12016-05-20 21:59:55 +0200142 DEBUGP(DMM, "-> %s LOCATION UPDATE ACCEPT\n",
Neels Hofmeyrc4628a32018-12-07 14:47:34 +0100143 vlr_subscr_name(vsub));
Holger Hans Peter Freyther666e36a2015-07-13 20:33:08 +0200144 } else {
Harald Welte2483f1b2016-06-19 18:06:02 +0200145 /* Include the TMSI, which means that the MS will send a
146 * TMSI REALLOCATION COMPLETE, and we should wait for
147 * that until T3250 expiration */
Neels Hofmeyr46d526a2020-05-29 03:27:50 +0200148 mi.type = GSM_MI_TYPE_TMSI;
149 mi.tmsi = send_tmsi;
Neels Hofmeyr84da6b12016-05-20 21:59:55 +0200150 DEBUGP(DMM, "-> %s LOCATION UPDATE ACCEPT (TMSI = 0x%08x)\n",
Neels Hofmeyrc4628a32018-12-07 14:47:34 +0100151 vlr_subscr_name(vsub),
Neels Hofmeyr84da6b12016-05-20 21:59:55 +0200152 send_tmsi);
Holger Hans Peter Freyther666e36a2015-07-13 20:33:08 +0200153 }
Neels Hofmeyr46d526a2020-05-29 03:27:50 +0200154 l = msgb_tl_put(msg, GSM48_IE_MOBILE_ID);
155 rc = osmo_mobile_identity_encode_msgb(msg, &mi, false);
156 if (rc < 0) {
157 msgb_free(msg);
158 return -EINVAL;
159 }
160 *l = rc;
161
Harald Welte2483f1b2016-06-19 18:06:02 +0200162 /* TODO: Follow-on proceed */
163 /* TODO: CTS permission */
164 /* TODO: Equivalent PLMNs */
165 /* TODO: Emergency Number List */
166 /* TODO: Per-MS T3312 */
Harald Welte52b1f982008-12-23 20:25:15 +0000167
Harald Welte52b1f982008-12-23 20:25:15 +0000168
Neels Hofmeyrc4628a32018-12-07 14:47:34 +0100169 return msc_a_tx_dtap_to_i(msc_a, msg);
Harald Welte52b1f982008-12-23 20:25:15 +0000170}
171
Harald Weltebf5e8df2009-02-03 12:59:45 +0000172/* Transmit Chapter 9.2.10 Identity Request */
Neels Hofmeyrc4628a32018-12-07 14:47:34 +0100173static int mm_tx_identity_req(struct msc_a *msc_a, uint8_t id_type)
Harald Welte231ad4f2008-12-27 11:15:38 +0000174{
Holger Hans Peter Freyther8239e062016-01-25 22:03:25 +0100175 struct msgb *msg = gsm48_msgb_alloc_name("GSM 04.08 ID REQ");
Harald Welte231ad4f2008-12-27 11:15:38 +0000176 struct gsm48_hdr *gh;
Harald Weltefc977a82008-12-27 10:19:37 +0000177
Harald Welte231ad4f2008-12-27 11:15:38 +0000178 gh = (struct gsm48_hdr *) msgb_put(msg, sizeof(*gh) + 1);
179 gh->proto_discr = GSM48_PDISC_MM;
180 gh->msg_type = GSM48_MT_MM_ID_REQ;
181 gh->data[0] = id_type;
182
Neels Hofmeyrc4628a32018-12-07 14:47:34 +0100183 return msc_a_tx_dtap_to_i(msc_a, msg);
Harald Welte231ad4f2008-12-27 11:15:38 +0000184}
185
Harald Weltebf5e8df2009-02-03 12:59:45 +0000186/* Parse Chapter 9.2.11 Identity Response */
Neels Hofmeyrc4628a32018-12-07 14:47:34 +0100187static int mm_rx_id_resp(struct msc_a *msc_a, struct msgb *msg)
Harald Welte231ad4f2008-12-27 11:15:38 +0000188{
189 struct gsm48_hdr *gh = msgb_l3(msg);
Neels Hofmeyr46d526a2020-05-29 03:27:50 +0200190 uint8_t *mi_data = gh->data+1;
Neels Hofmeyrb62289a2019-01-11 00:04:32 +0100191 uint8_t mi_len = gh->data[0];
Neels Hofmeyrc4628a32018-12-07 14:47:34 +0100192 struct vlr_subscr *vsub = msc_a_vsub(msc_a);
Neels Hofmeyr46d526a2020-05-29 03:27:50 +0200193 struct osmo_mobile_identity mi;
194 int rc;
Harald Welte231ad4f2008-12-27 11:15:38 +0000195
Neels Hofmeyrc4628a32018-12-07 14:47:34 +0100196 if (!vsub) {
Harald Welte2483f1b2016-06-19 18:06:02 +0200197 LOGP(DMM, LOGL_ERROR,
198 "Rx MM Identity Response: invalid: no subscriber\n");
199 return -EINVAL;
200 }
201
Vadim Yanitskiya79aac02019-12-28 01:19:19 +0100202 /* There muct be at least one octet with MI type */
203 if (!mi_len) {
204 LOGP(DMM, LOGL_NOTICE, "MM Identity Response contains "
205 "malformed Mobile Identity\n");
206 return -EINVAL;
207 }
208
Neels Hofmeyr46d526a2020-05-29 03:27:50 +0200209 rc = osmo_mobile_identity_decode(&mi, mi_data, mi_len, false);
210 if (rc) {
211 LOGP(DMM, LOGL_ERROR, "Failure to decode Mobile Identity in MM Identity Response (rc=%d)\n", rc);
Vadim Yanitskiya79aac02019-12-28 01:19:19 +0100212 return -EINVAL;
Neels Hofmeyr46d526a2020-05-29 03:27:50 +0200213 }
214
215 /* Make sure we got what we expected */
216 if (mi.type != msc_a->mm_id_req_type) {
Vadim Yanitskiya79aac02019-12-28 01:19:19 +0100217 LOGP(DMM, LOGL_NOTICE, "MM Identity Response contains unexpected "
218 "Mobile Identity type %s (extected %s)\n",
Neels Hofmeyr46d526a2020-05-29 03:27:50 +0200219 gsm48_mi_type_name(mi.type),
Vadim Yanitskiya79aac02019-12-28 01:19:19 +0100220 gsm48_mi_type_name(msc_a->mm_id_req_type));
221 return -EINVAL;
222 }
223
Neels Hofmeyr46d526a2020-05-29 03:27:50 +0200224 DEBUGP(DMM, "IDENTITY RESPONSE: %s\n", osmo_mobile_identity_to_str_c(OTC_SELECT, &mi));
Harald Welte231ad4f2008-12-27 11:15:38 +0000225
Pablo Neira Ayusobbc5b992011-05-06 12:12:31 +0200226 osmo_signal_dispatch(SS_SUBSCR, S_SUBSCR_IDENTITY, gh->data);
Harald Welte7659de12009-12-13 12:39:18 +0100227
Neels Hofmeyr46d526a2020-05-29 03:27:50 +0200228 return vlr_subscr_rx_id_resp(vsub, &mi);
Neels Hofmeyrc4628a32018-12-07 14:47:34 +0100229}
230
231/* 9.2.5 CM service accept */
232static int msc_gsm48_tx_mm_serv_ack(struct msc_a *msc_a)
233{
234 struct msgb *msg;
235 struct gsm48_hdr *gh;
236
237 msg = gsm48_msgb_alloc_name("GSM 04.08 SERV ACC");
238
239 gh = (struct gsm48_hdr *) msgb_put(msg, sizeof(*gh));
240 gh->proto_discr = GSM48_PDISC_MM;
241 gh->msg_type = GSM48_MT_MM_CM_SERV_ACC;
242
243 return msc_a_tx_dtap_to_i(msc_a, msg);
244}
245
246/* 9.2.6 CM service reject */
247static int msc_gsm48_tx_mm_serv_rej(struct msc_a *msc_a,
248 enum gsm48_reject_value value)
249{
250 struct msgb *msg;
251
252 msg = gsm48_create_mm_serv_rej(value);
253 if (!msg) {
254 LOGP(DMM, LOGL_ERROR, "Failed to allocate CM Service Reject.\n");
255 return -1;
256 }
257
258 LOG_MSC_A_CAT(msc_a, DMM, LOGL_DEBUG, "-> CM SERVICE Reject cause: %d\n", value);
259
260 return msc_a_tx_dtap_to_i(msc_a, msg);
261}
262
263
264/* Extract the R99 flag from various Complete Level 3 messages. Depending on the Message Type, extract R99 from the
265 * Classmark Type 1 or the Classmark Type 2. Return 1 for R99, 0 for pre-R99, negative if not a valid Complete Level 3
266 * message. */
267int compl_l3_msg_is_r99(const struct msgb *msg)
268{
269 const struct gsm48_hdr *gh = msgb_l3(msg);
270 uint8_t pdisc = gsm48_hdr_pdisc(gh);
271 const struct gsm48_loc_upd_req *lu;
272 const struct gsm48_imsi_detach_ind *idi;
273 uint8_t cm2_len;
274 const struct gsm48_classmark2 *cm2;
275
276 switch (pdisc) {
277 case GSM48_PDISC_MM:
278 switch (gsm48_hdr_msg_type(gh)) {
279 case GSM48_MT_MM_LOC_UPD_REQUEST:
280 lu = (const struct gsm48_loc_upd_req *) gh->data;
281 return osmo_gsm48_classmark1_is_r99(&lu->classmark1) ? 1 : 0;
282
283 case GSM48_MT_MM_CM_SERV_REQ:
284 case GSM48_MT_MM_CM_REEST_REQ:
285 break;
286
287 case GSM48_MT_MM_IMSI_DETACH_IND:
288 idi = (const struct gsm48_imsi_detach_ind *) gh->data;
289 return osmo_gsm48_classmark1_is_r99(&idi->classmark1) ? 1 : 0;
290
291 default:
292 return -1;
293 }
294 break;
295
296 case GSM48_PDISC_RR:
297 switch (gsm48_hdr_msg_type(gh)) {
298 case GSM48_MT_RR_PAG_RESP:
299 break;
300
301 default:
302 return -1;
303 }
304 break;
305
306 default:
307 return -1;
308 }
309
310 /* Both CM Service Request and Paging Response have Classmark Type 2 at the same location: */
311 cm2_len = gh->data[1];
312 cm2 = (void*)gh->data+2;
313 return osmo_gsm48_classmark2_is_r99(cm2, cm2_len) ? 1 : 0;
Harald Welte231ad4f2008-12-27 11:15:38 +0000314}
315
Harald Welte2483f1b2016-06-19 18:06:02 +0200316/* Chapter 9.2.15: Receive Location Updating Request.
317 * Keep this function non-static for direct invocation by unit tests. */
Neels Hofmeyrc4628a32018-12-07 14:47:34 +0100318static int mm_rx_loc_upd_req(struct msc_a *msc_a, struct msgb *msg)
Harald Welte52b1f982008-12-23 20:25:15 +0000319{
Harald Welte8470bf22008-12-25 23:28:35 +0000320 struct gsm48_hdr *gh = msgb_l3(msg);
Harald Welte52b1f982008-12-23 20:25:15 +0000321 struct gsm48_loc_upd_req *lu;
Harald Welte2483f1b2016-06-19 18:06:02 +0200322 enum vlr_lu_type vlr_lu_type = VLR_LU_TYPE_REGULAR;
Harald Welte2483f1b2016-06-19 18:06:02 +0200323 uint32_t tmsi;
324 char *imsi;
Neels Hofmeyrc4628a32018-12-07 14:47:34 +0100325 struct osmo_location_area_id old_lai;
Harald Welte2483f1b2016-06-19 18:06:02 +0200326 struct osmo_fsm_inst *lu_fsm;
Neels Hofmeyr84da6b12016-05-20 21:59:55 +0200327 bool is_utran;
Neels Hofmeyrc4628a32018-12-07 14:47:34 +0100328 struct gsm_network *net = msc_a_net(msc_a);
329 struct vlr_subscr *vsub;
Neels Hofmeyr46d526a2020-05-29 03:27:50 +0200330 struct osmo_mobile_identity mi;
331 int rc;
332
333 rc = osmo_mobile_identity_decode_from_l3(&mi, msg, false);
334 if (rc) {
335 LOG_MSC_A_CAT(msc_a, DMM, LOGL_ERROR,
336 "Failed to decode Mobile Identity in Location Updating Request\n");
337 return -EINVAL;
338 }
Harald Welte52b1f982008-12-23 20:25:15 +0000339
Harald Welte8470bf22008-12-25 23:28:35 +0000340 lu = (struct gsm48_loc_upd_req *) gh->data;
341
Neels Hofmeyrc4628a32018-12-07 14:47:34 +0100342 if (msc_a_is_establishing_auth_ciph(msc_a)) {
343 LOG_MSC_A_CAT(msc_a, DMM, LOGL_ERROR,
344 "Cannot accept another LU, conn already busy establishing authenticity;"
345 " extraneous LOCATION UPDATING REQUEST: MI=%s LU-type=%s\n",
Neels Hofmeyr46d526a2020-05-29 03:27:50 +0200346 osmo_mobile_identity_to_str_c(OTC_SELECT, &mi), osmo_lu_type_name(lu->type));
Neels Hofmeyre3d3dc62018-03-31 00:02:14 +0200347 return -EINVAL;
348 }
349
Neels Hofmeyrc4628a32018-12-07 14:47:34 +0100350 if (msc_a_is_accepted(msc_a)) {
351 LOG_MSC_A_CAT(msc_a, DMM, LOGL_ERROR,
352 "Cannot accept another LU, conn already established;"
353 " extraneous LOCATION UPDATING REQUEST: MI=%s LU-type=%s\n",
Neels Hofmeyr46d526a2020-05-29 03:27:50 +0200354 osmo_mobile_identity_to_str_c(OTC_SELECT, &mi), osmo_lu_type_name(lu->type));
Neels Hofmeyre3d3dc62018-03-31 00:02:14 +0200355 return -EINVAL;
356 }
Harald Welte2483f1b2016-06-19 18:06:02 +0200357
Neels Hofmeyrc4628a32018-12-07 14:47:34 +0100358 msc_a->complete_layer3_type = COMPLETE_LAYER3_LU;
Neels Hofmeyr46d526a2020-05-29 03:27:50 +0200359
360 msub_update_id_from_mi(msc_a->c.msub, &mi);
Neels Hofmeyr16c42b52018-04-02 12:26:16 +0200361
Neels Hofmeyrc4628a32018-12-07 14:47:34 +0100362 LOG_MSC_A_CAT(msc_a, DMM, LOGL_DEBUG, "LOCATION UPDATING REQUEST: MI=%s LU-type=%s\n",
Neels Hofmeyr46d526a2020-05-29 03:27:50 +0200363 osmo_mobile_identity_to_str_c(OTC_SELECT, &mi), osmo_lu_type_name(lu->type));
Holger Freyther73487a22008-12-31 18:53:57 +0000364
Neels Hofmeyr46d526a2020-05-29 03:27:50 +0200365 osmo_signal_dispatch(SS_SUBSCR, S_SUBSCR_IDENTITY, &mi);
Harald Welte7659de12009-12-13 12:39:18 +0100366
Harald Welte24ff6ee2009-12-22 00:41:05 +0100367 switch (lu->type) {
368 case GSM48_LUPD_NORMAL:
Neels Hofmeyrc4628a32018-12-07 14:47:34 +0100369 rate_ctr_inc(&net->msc_ctrs->ctr[MSC_CTR_LOC_UPDATE_TYPE_NORMAL]);
Harald Welte2483f1b2016-06-19 18:06:02 +0200370 vlr_lu_type = VLR_LU_TYPE_REGULAR;
Harald Welte24ff6ee2009-12-22 00:41:05 +0100371 break;
372 case GSM48_LUPD_IMSI_ATT:
Neels Hofmeyrc4628a32018-12-07 14:47:34 +0100373 rate_ctr_inc(&net->msc_ctrs->ctr[MSC_CTR_LOC_UPDATE_TYPE_ATTACH]);
Harald Welte2483f1b2016-06-19 18:06:02 +0200374 vlr_lu_type = VLR_LU_TYPE_IMSI_ATTACH;
Harald Welte24ff6ee2009-12-22 00:41:05 +0100375 break;
376 case GSM48_LUPD_PERIODIC:
Neels Hofmeyrc4628a32018-12-07 14:47:34 +0100377 rate_ctr_inc(&net->msc_ctrs->ctr[MSC_CTR_LOC_UPDATE_TYPE_PERIODIC]);
Harald Welte2483f1b2016-06-19 18:06:02 +0200378 vlr_lu_type = VLR_LU_TYPE_PERIODIC;
Harald Welte24ff6ee2009-12-22 00:41:05 +0100379 break;
380 }
381
Harald Welte2483f1b2016-06-19 18:06:02 +0200382 /* TODO: 10.5.1.6 MS Classmark for UMTS / Classmark 2 */
Martin Hauke3f07dac2019-11-14 17:49:08 +0100383 /* TODO: 10.5.3.14 Additional update parameters (CS fallback calls) */
Harald Welte2483f1b2016-06-19 18:06:02 +0200384 /* TODO: 10.5.7.8 Device properties */
385 /* TODO: 10.5.1.15 MS network feature support */
Sylvain Munaut2030a2a2010-06-10 13:36:59 +0200386
Neels Hofmeyr46d526a2020-05-29 03:27:50 +0200387 switch (mi.type) {
Harald Welte52b1f982008-12-23 20:25:15 +0000388 case GSM_MI_TYPE_IMSI:
Harald Welte2483f1b2016-06-19 18:06:02 +0200389 tmsi = GSM_RESERVED_TMSI;
Neels Hofmeyr46d526a2020-05-29 03:27:50 +0200390 imsi = mi.imsi;
Harald Welte4b634542008-12-27 01:55:51 +0000391 break;
Harald Welte52b1f982008-12-23 20:25:15 +0000392 case GSM_MI_TYPE_TMSI:
Neels Hofmeyr46d526a2020-05-29 03:27:50 +0200393 tmsi = mi.tmsi;
Harald Welte2483f1b2016-06-19 18:06:02 +0200394 imsi = NULL;
Harald Welte52b1f982008-12-23 20:25:15 +0000395 break;
Alexander Couzensfbd96f52016-08-29 18:40:02 +0200396 default:
Neels Hofmeyrc4628a32018-12-07 14:47:34 +0100397 LOG_MSC_A_CAT(msc_a, DMM, LOGL_ERROR, "unknown mobile identity type\n");
Harald Welte2483f1b2016-06-19 18:06:02 +0200398 tmsi = GSM_RESERVED_TMSI;
399 imsi = NULL;
Harald Welte52b1f982008-12-23 20:25:15 +0000400 break;
401 }
402
Neels Hofmeyr379d5792018-02-22 04:04:54 +0100403 gsm48_decode_lai2(&lu->lai, &old_lai);
Neels Hofmeyrc4628a32018-12-07 14:47:34 +0100404 LOG_MSC_A_CAT(msc_a, DMM, LOGL_DEBUG, "USIM: old LAI: %s\n", osmo_lai_name(&old_lai));
Harald Welte24516ea2009-07-04 10:18:00 +0200405
Neels Hofmeyrc4628a32018-12-07 14:47:34 +0100406 msc_a_get(msc_a, __func__);
407 msc_a_get(msc_a, MSC_A_USE_LOCATION_UPDATING);
408
409 is_utran = (msc_a->c.ran->type == OSMO_RAT_UTRAN_IU);
410 lu_fsm = vlr_loc_update(msc_a->c.fi,
411 MSC_A_EV_AUTHENTICATED, MSC_A_EV_CN_CLOSE, NULL,
412 net->vlr, msc_a, vlr_lu_type, tmsi, imsi,
413 &old_lai, &msc_a->via_cell.lai,
414 is_utran || net->authentication_required,
Neels Hofmeyr4dfb2ba2019-08-13 16:00:37 +0200415 is_utran ? net->uea_encryption : net->a5_encryption_mask > 0x01,
Sylvain Munautda9f37e2019-03-14 11:02:36 +0100416 lu->key_seq,
Neels Hofmeyrc4628a32018-12-07 14:47:34 +0100417 osmo_gsm48_classmark1_is_r99(&lu->classmark1),
Neels Hofmeyr84da6b12016-05-20 21:59:55 +0200418 is_utran,
Harald Welte2483f1b2016-06-19 18:06:02 +0200419 net->vlr->cfg.assign_tmsi);
420 if (!lu_fsm) {
Neels Hofmeyrc4628a32018-12-07 14:47:34 +0100421 LOG_MSC_A(msc_a, LOGL_ERROR, "Can't start LU FSM\n");
422 msc_a_put(msc_a, MSC_A_USE_LOCATION_UPDATING);
423 msc_a_put(msc_a, __func__);
Harald Welte2483f1b2016-06-19 18:06:02 +0200424 return 0;
Harald Welte4bfdfe72009-06-10 23:11:52 +0800425 }
426
Harald Welte2483f1b2016-06-19 18:06:02 +0200427 /* From vlr_loc_update() we expect an implicit dispatch of
428 * VLR_ULA_E_UPDATE_LA, and thus we expect msc_vlr_subscr_assoc() to
Thorsten Alteholz3a357de2019-07-16 20:51:16 +0200429 * already have been called and completed. Has an error occurred? */
Harald Welte255539c2008-12-28 02:26:27 +0000430
Neels Hofmeyrc4628a32018-12-07 14:47:34 +0100431 vsub = msc_a_vsub(msc_a);
432 if (!vsub) {
433 msc_a_put(msc_a, __func__);
434 return 0;
435 }
436
437 if (vsub->lu_fsm != lu_fsm) {
438 LOG_MSC_A(msc_a, LOGL_ERROR, "Internal Error during Location Updating attempt\n");
439 msc_a_release_cn(msc_a);
440 msc_a_put(msc_a, __func__);
Harald Welte2483f1b2016-06-19 18:06:02 +0200441 return -EIO;
442 }
443
Neels Hofmeyrc4628a32018-12-07 14:47:34 +0100444 vsub->classmark.classmark1 = lu->classmark1;
445 vsub->classmark.classmark1_set = true;
446 msc_a_put(msc_a, __func__);
Harald Welte2483f1b2016-06-19 18:06:02 +0200447 return 0;
Harald Welte52b1f982008-12-23 20:25:15 +0000448}
449
Gus Bourg1c5dd2c2011-12-02 10:18:17 +0100450/* Turn int into semi-octet representation: 98 => 0x89 */
Harald Welte2483f1b2016-06-19 18:06:02 +0200451/* FIXME: libosmocore/libosmogsm */
Gus Bourg1c5dd2c2011-12-02 10:18:17 +0100452static uint8_t bcdify(uint8_t value)
Harald Welte4bfdfe72009-06-10 23:11:52 +0800453{
Gus Bourg1c5dd2c2011-12-02 10:18:17 +0100454 uint8_t ret;
455
456 ret = value / 10;
457 ret |= (value % 10) << 4;
458
459 return ret;
Harald Welte4bfdfe72009-06-10 23:11:52 +0800460}
Gus Bourg1c5dd2c2011-12-02 10:18:17 +0100461
Harald Welte0df904d2018-12-03 11:00:04 +0100462/* Generate a message buffer that contains a valid MM info message,
463 * See also 3GPP TS 24.008, chapter 9.2.15a */
464struct msgb *gsm48_create_mm_info(struct gsm_network *net)
Harald Weltedb253af2008-12-30 17:56:55 +0000465{
Holger Hans Peter Freyther8239e062016-01-25 22:03:25 +0100466 struct msgb *msg = gsm48_msgb_alloc_name("GSM 04.08 MM INF");
Harald Weltedb253af2008-12-30 17:56:55 +0000467 struct gsm48_hdr *gh;
Holger Hans Peter Freytherc42ad8b2011-04-18 17:04:00 +0200468 uint8_t *ptr8;
Daniel Willmanneea93372009-08-13 03:42:07 +0200469 int name_len, name_pad;
Gus Bourg1c5dd2c2011-12-02 10:18:17 +0100470
Harald Welte4bfdfe72009-06-10 23:11:52 +0800471 time_t cur_t;
Gus Bourg1c5dd2c2011-12-02 10:18:17 +0100472 struct tm* gmt_time;
473 struct tm* local_time;
474 int tzunits;
Jacob Erlbeckf46e2262014-01-07 15:05:16 +0100475 int dst = 0;
Harald Weltedb253af2008-12-30 17:56:55 +0000476
Harald Weltedb253af2008-12-30 17:56:55 +0000477 gh = (struct gsm48_hdr *) msgb_put(msg, sizeof(*gh));
478 gh->proto_discr = GSM48_PDISC_MM;
479 gh->msg_type = GSM48_MT_MM_INFO;
480
481 if (net->name_long) {
Daniel Willmanneea93372009-08-13 03:42:07 +0200482#if 0
Harald Weltedb253af2008-12-30 17:56:55 +0000483 name_len = strlen(net->name_long);
484 /* 10.5.3.5a */
485 ptr8 = msgb_put(msg, 3);
486 ptr8[0] = GSM48_IE_NAME_LONG;
487 ptr8[1] = name_len*2 +1;
488 ptr8[2] = 0x90; /* UCS2, no spare bits, no CI */
489
Holger Hans Peter Freytherc42ad8b2011-04-18 17:04:00 +0200490 ptr16 = (uint16_t *) msgb_put(msg, name_len*2);
Harald Weltedb253af2008-12-30 17:56:55 +0000491 for (i = 0; i < name_len; i++)
Harald Welte179f0642008-12-31 23:59:18 +0000492 ptr16[i] = htons(net->name_long[i]);
Harald Weltedb253af2008-12-30 17:56:55 +0000493
494 /* FIXME: Use Cell Broadcast, not UCS-2, since
495 * UCS-2 is only supported by later revisions of the spec */
Daniel Willmanneea93372009-08-13 03:42:07 +0200496#endif
497 name_len = (strlen(net->name_long)*7)/8;
498 name_pad = (8 - strlen(net->name_long)*7)%8;
499 if (name_pad > 0)
500 name_len++;
501 /* 10.5.3.5a */
502 ptr8 = msgb_put(msg, 3);
503 ptr8[0] = GSM48_IE_NAME_LONG;
504 ptr8[1] = name_len +1;
505 ptr8[2] = 0x80 | name_pad; /* Cell Broadcast DCS, no CI */
506
507 ptr8 = msgb_put(msg, name_len);
Harald Welte5468f762015-01-01 12:41:17 +0100508 gsm_7bit_encode_n(ptr8, name_len, net->name_long, NULL);
Daniel Willmanneea93372009-08-13 03:42:07 +0200509
Harald Weltedb253af2008-12-30 17:56:55 +0000510 }
511
512 if (net->name_short) {
Daniel Willmanneea93372009-08-13 03:42:07 +0200513#if 0
Harald Weltedb253af2008-12-30 17:56:55 +0000514 name_len = strlen(net->name_short);
515 /* 10.5.3.5a */
Holger Hans Peter Freytherc42ad8b2011-04-18 17:04:00 +0200516 ptr8 = (uint8_t *) msgb_put(msg, 3);
Harald Welte7543eb72009-07-19 17:51:36 +0200517 ptr8[0] = GSM48_IE_NAME_SHORT;
Harald Weltedb253af2008-12-30 17:56:55 +0000518 ptr8[1] = name_len*2 + 1;
519 ptr8[2] = 0x90; /* UCS2, no spare bits, no CI */
520
Holger Hans Peter Freytherc42ad8b2011-04-18 17:04:00 +0200521 ptr16 = (uint16_t *) msgb_put(msg, name_len*2);
Harald Weltedb253af2008-12-30 17:56:55 +0000522 for (i = 0; i < name_len; i++)
Harald Welte179f0642008-12-31 23:59:18 +0000523 ptr16[i] = htons(net->name_short[i]);
Daniel Willmanneea93372009-08-13 03:42:07 +0200524#endif
525 name_len = (strlen(net->name_short)*7)/8;
526 name_pad = (8 - strlen(net->name_short)*7)%8;
527 if (name_pad > 0)
528 name_len++;
529 /* 10.5.3.5a */
Holger Hans Peter Freytherc42ad8b2011-04-18 17:04:00 +0200530 ptr8 = (uint8_t *) msgb_put(msg, 3);
Daniel Willmanneea93372009-08-13 03:42:07 +0200531 ptr8[0] = GSM48_IE_NAME_SHORT;
532 ptr8[1] = name_len +1;
533 ptr8[2] = 0x80 | name_pad; /* Cell Broadcast DCS, no CI */
534
535 ptr8 = msgb_put(msg, name_len);
Harald Welte5468f762015-01-01 12:41:17 +0100536 gsm_7bit_encode_n(ptr8, name_len, net->name_short, NULL);
Daniel Willmanneea93372009-08-13 03:42:07 +0200537
Harald Weltedb253af2008-12-30 17:56:55 +0000538 }
539
Harald Weltedb253af2008-12-30 17:56:55 +0000540 /* Section 10.5.3.9 */
541 cur_t = time(NULL);
Gus Bourg1c5dd2c2011-12-02 10:18:17 +0100542 gmt_time = gmtime(&cur_t);
543
Harald Weltedb253af2008-12-30 17:56:55 +0000544 ptr8 = msgb_put(msg, 8);
545 ptr8[0] = GSM48_IE_NET_TIME_TZ;
Gus Bourg1c5dd2c2011-12-02 10:18:17 +0100546 ptr8[1] = bcdify(gmt_time->tm_year % 100);
547 ptr8[2] = bcdify(gmt_time->tm_mon + 1);
548 ptr8[3] = bcdify(gmt_time->tm_mday);
549 ptr8[4] = bcdify(gmt_time->tm_hour);
550 ptr8[5] = bcdify(gmt_time->tm_min);
551 ptr8[6] = bcdify(gmt_time->tm_sec);
552
Neels Hofmeyr73983952016-05-10 13:29:33 +0200553 if (net->tz.override) {
Harald Welte45f91712012-07-08 16:48:11 +0200554 /* Convert tz.hr and tz.mn to units */
Neels Hofmeyr73983952016-05-10 13:29:33 +0200555 if (net->tz.hr < 0) {
556 tzunits = ((net->tz.hr/-1)*4);
557 tzunits = tzunits + (net->tz.mn/15);
Gus Bourg1c5dd2c2011-12-02 10:18:17 +0100558 ptr8[7] = bcdify(tzunits);
559 /* Set negative time */
560 ptr8[7] |= 0x08;
561 }
562 else {
Neels Hofmeyr73983952016-05-10 13:29:33 +0200563 tzunits = net->tz.hr*4;
564 tzunits = tzunits + (net->tz.mn/15);
Gus Bourg1c5dd2c2011-12-02 10:18:17 +0100565 ptr8[7] = bcdify(tzunits);
566 }
Jacob Erlbeckf46e2262014-01-07 15:05:16 +0100567 /* Convert DST value */
Neels Hofmeyr73983952016-05-10 13:29:33 +0200568 if (net->tz.dst >= 0 && net->tz.dst <= 2)
569 dst = net->tz.dst;
Gus Bourg1c5dd2c2011-12-02 10:18:17 +0100570 }
571 else {
572 /* Need to get GSM offset and convert into 15 min units */
573 /* This probably breaks if gmtoff returns a value not evenly divisible by 15? */
Harald Welte9c3dc902012-04-08 16:59:24 +0200574#ifdef HAVE_TM_GMTOFF_IN_TM
Benoit Bolsee38bb3442017-07-05 12:57:16 +0200575 local_time = localtime(&cur_t);
Gus Bourg1c5dd2c2011-12-02 10:18:17 +0100576 tzunits = (local_time->tm_gmtoff/60)/15;
Harald Welte9c3dc902012-04-08 16:59:24 +0200577#else
Benoit Bolsee38bb3442017-07-05 12:57:16 +0200578 /* find timezone offset */
579 time_t utc;
580 double offsetFromUTC;
581 utc = mktime(gmt_time);
582 local_time = localtime(&cur_t);
583 offsetFromUTC = difftime(cur_t, utc);
584 if (local_time->tm_isdst)
585 offsetFromUTC += 3600.0;
586 tzunits = ((int)offsetFromUTC) / 60 / 15;
Harald Welte9c3dc902012-04-08 16:59:24 +0200587#endif
Gus Bourg1c5dd2c2011-12-02 10:18:17 +0100588 if (tzunits < 0) {
589 tzunits = tzunits/-1;
590 ptr8[7] = bcdify(tzunits);
591 /* Flip it to negative */
592 ptr8[7] |= 0x08;
593 }
594 else
595 ptr8[7] = bcdify(tzunits);
Jacob Erlbeckf46e2262014-01-07 15:05:16 +0100596
597 /* Does not support DST +2 */
598 if (local_time->tm_isdst)
599 dst = 1;
600 }
601
602 if (dst) {
603 ptr8 = msgb_put(msg, 3);
604 ptr8[0] = GSM48_IE_NET_DST;
605 ptr8[1] = 1;
606 ptr8[2] = dst;
Gus Bourg1c5dd2c2011-12-02 10:18:17 +0100607 }
Harald Weltedb253af2008-12-30 17:56:55 +0000608
Harald Welte0df904d2018-12-03 11:00:04 +0100609 return msg;
610}
Daniel Willmanneea93372009-08-13 03:42:07 +0200611
Harald Welte0df904d2018-12-03 11:00:04 +0100612/* Section 9.2.15a */
Neels Hofmeyrc4628a32018-12-07 14:47:34 +0100613int gsm48_tx_mm_info(struct msc_a *msc_a)
Harald Welte0df904d2018-12-03 11:00:04 +0100614{
Neels Hofmeyrc4628a32018-12-07 14:47:34 +0100615 struct gsm_network *net = msc_a_net(msc_a);
Harald Welte0df904d2018-12-03 11:00:04 +0100616 struct msgb *msg;
617
618 msg = gsm48_create_mm_info(net);
619
Neels Hofmeyrc4628a32018-12-07 14:47:34 +0100620 LOG_MSC_A(msc_a, LOGL_DEBUG, "Tx MM INFO\n");
621 return msc_a_tx_dtap_to_i(msc_a, msg);
Harald Weltedb253af2008-12-30 17:56:55 +0000622}
623
Neels Hofmeyrc036b792018-11-29 22:37:51 +0100624/*! Send an Authentication Request to MS on the given RAN connection
Neels Hofmeyrd6755152017-01-27 00:25:47 +0100625 * according to 3GPP/ETSI TS 24.008, Section 9.2.2.
626 * \param[in] conn Subscriber connection to send on.
627 * \param[in] rand Random challenge token to send, must be 16 bytes long.
628 * \param[in] autn r99: In case of UMTS mutual authentication, AUTN token to
629 * send; must be 16 bytes long, or pass NULL for plain GSM auth.
630 * \param[in] key_seq auth tuple's sequence number.
631 */
Neels Hofmeyrc4628a32018-12-07 14:47:34 +0100632int gsm48_tx_mm_auth_req(struct msc_a *msc_a, uint8_t *rand,
Neels Hofmeyrd6755152017-01-27 00:25:47 +0100633 uint8_t *autn, int key_seq)
Harald Welte7984d5c2009-08-12 22:56:50 +0200634{
Holger Hans Peter Freyther8239e062016-01-25 22:03:25 +0100635 struct msgb *msg = gsm48_msgb_alloc_name("GSM 04.08 AUTH REQ");
Harald Welte7984d5c2009-08-12 22:56:50 +0200636 struct gsm48_hdr *gh = (struct gsm48_hdr *) msgb_put(msg, sizeof(*gh));
Sylvain Munaut849f5542009-09-27 11:10:17 +0200637 struct gsm48_auth_req *ar = (struct gsm48_auth_req *) msgb_put(msg, sizeof(*ar));
Harald Welte7984d5c2009-08-12 22:56:50 +0200638
Neels Hofmeyr46c06e22019-01-04 17:42:05 +0100639 DEBUGP(DMM, "Tx AUTH REQ (rand = %s)\n", osmo_hexdump_nospc(rand, 16));
Neels Hofmeyrd6755152017-01-27 00:25:47 +0100640 if (autn)
Neels Hofmeyr3355fd62017-02-14 17:42:25 +0100641 DEBUGP(DMM, " AUTH REQ (autn = %s)\n", osmo_hexdump_nospc(autn, 16));
Harald Welte7984d5c2009-08-12 22:56:50 +0200642
Harald Welte7984d5c2009-08-12 22:56:50 +0200643 gh->proto_discr = GSM48_PDISC_MM;
644 gh->msg_type = GSM48_MT_MM_AUTH_REQ;
645
Sylvain Munautbd55a6d2009-12-24 00:23:46 +0100646 ar->key_seq = key_seq;
Sylvain Munaut849f5542009-09-27 11:10:17 +0200647
Harald Welte7984d5c2009-08-12 22:56:50 +0200648 /* 16 bytes RAND parameters */
Neels Hofmeyrd6755152017-01-27 00:25:47 +0100649 osmo_static_assert(sizeof(ar->rand) == 16, sizeof_auth_req_r99_rand);
Harald Welte7984d5c2009-08-12 22:56:50 +0200650 if (rand)
Sylvain Munaut849f5542009-09-27 11:10:17 +0200651 memcpy(ar->rand, rand, 16);
Harald Welte7984d5c2009-08-12 22:56:50 +0200652
Neels Hofmeyrd6755152017-01-27 00:25:47 +0100653
654 /* 16 bytes AUTN */
655 if (autn)
656 msgb_tlv_put(msg, GSM48_IE_AUTN, 16, autn);
657
Neels Hofmeyrc4628a32018-12-07 14:47:34 +0100658 return msc_a_tx_dtap_to_i(msc_a, msg);
Harald Welte7984d5c2009-08-12 22:56:50 +0200659}
660
661/* Section 9.2.1 */
Neels Hofmeyrc4628a32018-12-07 14:47:34 +0100662int gsm48_tx_mm_auth_rej(struct msc_a *msc_a)
Harald Welte7984d5c2009-08-12 22:56:50 +0200663{
Neels Hofmeyrc4628a32018-12-07 14:47:34 +0100664 LOG_MSC_A_CAT(msc_a, DMM, LOGL_DEBUG, "-> AUTH REJECT\n");
665 return gsm48_tx_simple(msc_a, GSM48_PDISC_MM, GSM48_MT_MM_AUTH_REJ);
Harald Welte7984d5c2009-08-12 22:56:50 +0200666}
667
Neels Hofmeyrc4628a32018-12-07 14:47:34 +0100668static int msc_vlr_tx_cm_serv_rej(void *msc_conn_ref, enum osmo_cm_service_type cm_service_type,
669 enum gsm48_reject_value cause);
Harald Welte2483f1b2016-06-19 18:06:02 +0200670
Neels Hofmeyr46d526a2020-05-29 03:27:50 +0200671static int cm_serv_reuse_conn(struct msc_a *msc_a, const struct osmo_mobile_identity *mi, enum osmo_cm_service_type cm_serv_type)
Holger Hans Peter Freyther2147bc42013-12-27 17:19:19 +0100672{
Neels Hofmeyrc4628a32018-12-07 14:47:34 +0100673 struct gsm_network *net = msc_a_net(msc_a);
674 struct vlr_subscr *vsub = msc_a_vsub(msc_a);
Holger Hans Peter Freyther2147bc42013-12-27 17:19:19 +0100675
Neels Hofmeyr46d526a2020-05-29 03:27:50 +0200676 switch (mi->type) {
Harald Welte2483f1b2016-06-19 18:06:02 +0200677 case GSM_MI_TYPE_IMSI:
Neels Hofmeyr46d526a2020-05-29 03:27:50 +0200678 if (vlr_subscr_matches_imsi(vsub, mi->imsi))
Harald Welte2483f1b2016-06-19 18:06:02 +0200679 goto accept_reuse;
680 break;
681 case GSM_MI_TYPE_TMSI:
Neels Hofmeyr46d526a2020-05-29 03:27:50 +0200682 if (vlr_subscr_matches_tmsi(vsub, mi->tmsi))
Harald Welte2483f1b2016-06-19 18:06:02 +0200683 goto accept_reuse;
684 break;
685 case GSM_MI_TYPE_IMEI:
Neels Hofmeyr46d526a2020-05-29 03:27:50 +0200686 if (vlr_subscr_matches_imei(vsub, mi->imei))
Harald Welte2483f1b2016-06-19 18:06:02 +0200687 goto accept_reuse;
688 break;
689 default:
690 break;
691 }
Holger Hans Peter Freyther2147bc42013-12-27 17:19:19 +0100692
Neels Hofmeyr46d526a2020-05-29 03:27:50 +0200693 LOG_MSC_A_CAT(msc_a, DMM, LOGL_ERROR, "CM Service Request with mismatching mobile identity: %s\n",
694 osmo_mobile_identity_to_str_c(OTC_SELECT, mi));
Neels Hofmeyrc4628a32018-12-07 14:47:34 +0100695 msc_vlr_tx_cm_serv_rej(msc_a, cm_serv_type, GSM48_REJECT_ILLEGAL_MS);
Harald Welte2483f1b2016-06-19 18:06:02 +0200696 return -EINVAL;
Sylvain Munautba87f452009-12-24 00:28:46 +0100697
Harald Welte2483f1b2016-06-19 18:06:02 +0200698accept_reuse:
Neels Hofmeyrc4628a32018-12-07 14:47:34 +0100699 LOG_MSC_A_CAT(msc_a, DMM, LOGL_DEBUG, "re-using already accepted connection\n");
Neels Hofmeyre3d3dc62018-03-31 00:02:14 +0200700
Neels Hofmeyrc4628a32018-12-07 14:47:34 +0100701 msc_a_get(msc_a, msc_a_cm_service_type_to_use(cm_serv_type));
702 msub_update_id(msc_a->c.msub);
703 return net->vlr->ops.tx_cm_serv_acc(msc_a, cm_serv_type);
Sylvain Munautba87f452009-12-24 00:28:46 +0100704}
705
Harald Welte4ed0e922009-01-10 03:17:30 +0000706/*
707 * Handle CM Service Requests
708 * a) Verify that the packet is long enough to contain the information
Martin Hauke3f07dac2019-11-14 17:49:08 +0100709 * we require otherwise reject with INCORRECT_MESSAGE
Harald Welte4ed0e922009-01-10 03:17:30 +0000710 * b) Try to parse the TMSI. If we do not have one reject
711 * c) Check that we know the subscriber with the TMSI otherwise reject
712 * with a HLR cause
Neels Hofmeyre2f24d52017-05-08 15:12:20 +0200713 * d) Set the subscriber on the conn and accept
Harald Welte2483f1b2016-06-19 18:06:02 +0200714 *
715 * Keep this function non-static for direct invocation by unit tests.
Harald Welte4ed0e922009-01-10 03:17:30 +0000716 */
Neels Hofmeyrc4628a32018-12-07 14:47:34 +0100717int gsm48_rx_mm_serv_req(struct msc_a *msc_a, struct msgb *msg)
Harald Welte4b634542008-12-27 01:55:51 +0000718{
Neels Hofmeyrc4628a32018-12-07 14:47:34 +0100719 struct gsm_network *net = msc_a_net(msc_a);
Vadim Yanitskiyb380a8c2019-05-08 16:11:29 +0700720 struct gsm48_hdr *gh;
721 struct gsm48_service_request *req;
722 struct gsm48_classmark2 *cm2;
723 uint8_t *cm2_buf, cm2_len;
Neels Hofmeyr84da6b12016-05-20 21:59:55 +0200724 bool is_utran;
Neels Hofmeyrc4628a32018-12-07 14:47:34 +0100725 struct vlr_subscr *vsub;
Neels Hofmeyr46d526a2020-05-29 03:27:50 +0200726 struct osmo_mobile_identity mi;
727 int rc;
Harald Welteba4cf162009-01-10 01:49:35 +0000728
Vadim Yanitskiyb380a8c2019-05-08 16:11:29 +0700729 /* Make sure that both header and CM Service Request fit into the buffer */
730 if (msgb_l3len(msg) < sizeof(*gh) + sizeof(*req)) {
Neels Hofmeyrc4628a32018-12-07 14:47:34 +0100731 LOG_MSC_A(msc_a, LOGL_ERROR, "Rx CM SERVICE REQUEST: wrong message size (%u < %zu)\n",
Vadim Yanitskiyb380a8c2019-05-08 16:11:29 +0700732 msgb_l3len(msg), sizeof(*gh) + sizeof(*req));
Neels Hofmeyrc4628a32018-12-07 14:47:34 +0100733 return msc_gsm48_tx_mm_serv_rej(msc_a, GSM48_REJECT_INCORRECT_MESSAGE);
Harald Welteba4cf162009-01-10 01:49:35 +0000734 }
735
Neels Hofmeyr46d526a2020-05-29 03:27:50 +0200736 rc = osmo_mobile_identity_decode_from_l3(&mi, msg, false);
737 if (rc) {
738 LOG_MSC_A(msc_a, LOGL_ERROR, "Rx CM SERVICE REQUEST: unable to decode Mobile Identity\n");
739 return msc_gsm48_tx_mm_serv_rej(msc_a, GSM48_REJECT_INCORRECT_MESSAGE);
740 }
741
Vadim Yanitskiyb380a8c2019-05-08 16:11:29 +0700742 gh = (struct gsm48_hdr *) msgb_l3(msg);
743 req = (struct gsm48_service_request *) gh->data;
744
745 /* Unfortunately in Phase1 the Classmark2 length is variable, so we cannot
746 * just use gsm48_service_request struct, and need to parse it manually. */
747 cm2_len = gh->data[1];
748 cm2_buf = gh->data + 2;
749 cm2 = (struct gsm48_classmark2 *) cm2_buf;
750
751 /* Prevent buffer overrun: check the length of Classmark2 */
752 if (cm2_buf + cm2_len > msg->tail) {
753 LOG_MSC_A(msc_a, LOGL_ERROR, "Rx CM SERVICE REQUEST: Classmark2 "
754 "length=%u is too big\n", cm2_len);
755 return msc_gsm48_tx_mm_serv_rej(msc_a, GSM48_REJECT_INCORRECT_MESSAGE);
756 }
757
Neels Hofmeyrc4628a32018-12-07 14:47:34 +0100758 if (msc_a_is_establishing_auth_ciph(msc_a)) {
759 LOG_MSC_A(msc_a, LOGL_ERROR,
760 "Cannot accept CM Service Request, conn already busy establishing authenticity\n");
761 return msc_gsm48_tx_mm_serv_rej(msc_a, GSM48_REJECT_CONGESTION);
Neels Hofmeyr7ce21dc2019-01-04 17:42:05 +0100762 /* or should we accept and note down the service request anyway? */
763 }
764
Neels Hofmeyrc4628a32018-12-07 14:47:34 +0100765 msc_a->complete_layer3_type = COMPLETE_LAYER3_CM_SERVICE_REQ;
Neels Hofmeyr46d526a2020-05-29 03:27:50 +0200766 msub_update_id_from_mi(msc_a->c.msub, &mi);
Neels Hofmeyrc4628a32018-12-07 14:47:34 +0100767 LOG_MSC_A_CAT(msc_a, DMM, LOGL_DEBUG, "Rx CM SERVICE REQUEST cm_service_type=%s\n",
768 osmo_cm_service_type_name(req->cm_service_type));
Neels Hofmeyr46c06e22019-01-04 17:42:05 +0100769
Neels Hofmeyr46d526a2020-05-29 03:27:50 +0200770 switch (mi.type) {
Harald Welte3995d2e2018-01-24 11:23:54 +0100771 case GSM_MI_TYPE_IMSI:
772 case GSM_MI_TYPE_TMSI:
773 /* continue below */
774 break;
775 case GSM_MI_TYPE_IMEI:
776 if (req->cm_service_type == GSM48_CMSERV_EMERGENCY) {
777 /* We don't do emergency calls by IMEI */
Vadim Yanitskiy44560652019-05-09 21:05:41 +0700778 LOG_MSC_A(msc_a, LOGL_NOTICE, "Tx CM SERVICE REQUEST REJECT: "
779 "emergency services by IMEI are not supported\n");
Neels Hofmeyrc4628a32018-12-07 14:47:34 +0100780 return msc_gsm48_tx_mm_serv_rej(msc_a, GSM48_REJECT_IMEI_NOT_ACCEPTED);
Harald Welte3995d2e2018-01-24 11:23:54 +0100781 }
782 /* fall-through for non-emergency setup */
783 default:
Neels Hofmeyr46d526a2020-05-29 03:27:50 +0200784 LOG_MSC_A(msc_a, LOGL_ERROR, "MI type is not expected: %s\n", gsm48_mi_type_name(mi.type));
Neels Hofmeyrc4628a32018-12-07 14:47:34 +0100785 return msc_gsm48_tx_mm_serv_rej(msc_a, GSM48_REJECT_INCORRECT_MESSAGE);
Harald Welteba4cf162009-01-10 01:49:35 +0000786 }
787
Neels Hofmeyrc4628a32018-12-07 14:47:34 +0100788 if (!msc_a_cm_service_type_to_use(req->cm_service_type))
789 return msc_gsm48_tx_mm_serv_rej(msc_a, GSM48_REJECT_SRV_OPT_NOT_SUPPORTED);
Harald Welte37382ec2018-01-24 12:49:34 +0100790
Neels Hofmeyrc4628a32018-12-07 14:47:34 +0100791 if (msc_a_is_accepted(msc_a))
Neels Hofmeyr46d526a2020-05-29 03:27:50 +0200792 return cm_serv_reuse_conn(msc_a, &mi, req->cm_service_type);
Harald Welte2483f1b2016-06-19 18:06:02 +0200793
Neels Hofmeyr46d526a2020-05-29 03:27:50 +0200794 osmo_signal_dispatch(SS_SUBSCR, S_SUBSCR_IDENTITY, &mi);
Neels Hofmeyre3d3dc62018-03-31 00:02:14 +0200795
Neels Hofmeyrc4628a32018-12-07 14:47:34 +0100796 msc_a_get(msc_a, msc_a_cm_service_type_to_use(req->cm_service_type));
797
798 is_utran = (msc_a->c.ran->type == OSMO_RAT_UTRAN_IU);
799 vlr_proc_acc_req(msc_a->c.fi,
800 MSC_A_EV_AUTHENTICATED, MSC_A_EV_CN_CLOSE, NULL,
801 net->vlr, msc_a,
802 VLR_PR_ARQ_T_CM_SERV_REQ,
803 req->cm_service_type,
Neels Hofmeyr46d526a2020-05-29 03:27:50 +0200804 &mi, &msc_a->via_cell.lai,
Neels Hofmeyrc4628a32018-12-07 14:47:34 +0100805 is_utran || net->authentication_required,
Neels Hofmeyr4dfb2ba2019-08-13 16:00:37 +0200806 is_utran ? net->uea_encryption : net->a5_encryption_mask > 0x01,
Sylvain Munautda9f37e2019-03-14 11:02:36 +0100807 req->cipher_key_seq,
Vadim Yanitskiyb380a8c2019-05-08 16:11:29 +0700808 osmo_gsm48_classmark2_is_r99(cm2, cm2_len),
Neels Hofmeyr84da6b12016-05-20 21:59:55 +0200809 is_utran);
Holger Freythereb443982009-06-04 13:58:42 +0000810
Neels Hofmeyr986fe7e2018-09-13 03:05:52 +0200811 /* From vlr_proc_acc_req() we expect an implicit dispatch of PR_ARQ_E_START we expect
Thorsten Alteholz3a357de2019-07-16 20:51:16 +0200812 * msc_vlr_subscr_assoc() to already have been called and completed. Has an error occurred? */
Neels Hofmeyrc4628a32018-12-07 14:47:34 +0100813 vsub = msc_a_vsub(msc_a);
814 if (!vsub) {
815 LOG_MSC_A(msc_a, LOGL_ERROR, "subscriber not allowed to do a CM Service Request\n");
Neels Hofmeyr986fe7e2018-09-13 03:05:52 +0200816 return -EIO;
817 }
818
Neels Hofmeyrc4628a32018-12-07 14:47:34 +0100819 vsub->classmark.classmark2 = *cm2;
Vadim Yanitskiyb380a8c2019-05-08 16:11:29 +0700820 vsub->classmark.classmark2_len = cm2_len;
Harald Welte2483f1b2016-06-19 18:06:02 +0200821 return 0;
Harald Welte4b634542008-12-27 01:55:51 +0000822}
823
Harald Welte49f8fcb2018-01-24 21:40:19 +0100824/* Receive a CM Re-establish Request */
Neels Hofmeyrc4628a32018-12-07 14:47:34 +0100825static int gsm48_rx_cm_reest_req(struct msc_a *msc_a, struct msgb *msg)
Harald Welte49f8fcb2018-01-24 21:40:19 +0100826{
Neels Hofmeyr46d526a2020-05-29 03:27:50 +0200827 struct osmo_mobile_identity mi;
828 osmo_mobile_identity_decode_from_l3(&mi, msg, false);
829 DEBUGP(DMM, "<- CM RE-ESTABLISH REQUEST %s\n", osmo_mobile_identity_to_str_c(OTC_SELECT, &mi));
Harald Welte49f8fcb2018-01-24 21:40:19 +0100830
831 /* we don't support CM call re-establishment */
Neels Hofmeyrc4628a32018-12-07 14:47:34 +0100832 return msc_gsm48_tx_mm_serv_rej(msc_a, GSM48_REJECT_SRV_OPT_NOT_SUPPORTED);
Harald Welte49f8fcb2018-01-24 21:40:19 +0100833}
834
Neels Hofmeyrc4628a32018-12-07 14:47:34 +0100835static int gsm48_rx_mm_imsi_detach_ind(struct msc_a *msc_a, struct msgb *msg)
Harald Welte2a139372009-02-22 21:14:55 +0000836{
Neels Hofmeyrc4628a32018-12-07 14:47:34 +0100837 struct gsm_network *net = msc_a_net(msc_a);
Harald Welte2a139372009-02-22 21:14:55 +0000838 struct gsm48_hdr *gh = msgb_l3(msg);
839 struct gsm48_imsi_detach_ind *idi =
840 (struct gsm48_imsi_detach_ind *) gh->data;
Neels Hofmeyr46d526a2020-05-29 03:27:50 +0200841 struct osmo_mobile_identity mi;
Harald Welte2483f1b2016-06-19 18:06:02 +0200842 struct vlr_subscr *vsub = NULL;
Harald Welte2a139372009-02-22 21:14:55 +0000843
Neels Hofmeyr46d526a2020-05-29 03:27:50 +0200844 int rc = osmo_mobile_identity_decode_from_l3(&mi, msg, false);
845 if (rc) {
846 LOGP(DMM, LOGL_ERROR, "IMSI DETACH INDICATION: cannot decode Mobile Identity\n");
847 return -EINVAL;
848 }
849
850 DEBUGP(DMM, "IMSI DETACH INDICATION: %s\n", osmo_mobile_identity_to_str_c(OTC_SELECT, &mi));
Harald Welte2a139372009-02-22 21:14:55 +0000851
Neels Hofmeyrc4628a32018-12-07 14:47:34 +0100852 rate_ctr_inc(&net->msc_ctrs->ctr[MSC_CTR_LOC_UPDATE_TYPE_DETACH]);
Harald Welte24ff6ee2009-12-22 00:41:05 +0100853
Neels Hofmeyr46d526a2020-05-29 03:27:50 +0200854 switch (mi.type) {
Harald Welte2a139372009-02-22 21:14:55 +0000855 case GSM_MI_TYPE_TMSI:
Neels Hofmeyr46d526a2020-05-29 03:27:50 +0200856 vsub = vlr_subscr_find_by_tmsi(net->vlr, mi.tmsi, __func__);
Harald Welte2a139372009-02-22 21:14:55 +0000857 break;
858 case GSM_MI_TYPE_IMSI:
Neels Hofmeyr46d526a2020-05-29 03:27:50 +0200859 vsub = vlr_subscr_find_by_imsi(net->vlr, mi.imsi, __func__);
Harald Welte2a139372009-02-22 21:14:55 +0000860 break;
861 case GSM_MI_TYPE_IMEI:
862 case GSM_MI_TYPE_IMEISV:
863 /* no sim card... FIXME: what to do ? */
Neels Hofmeyr46d526a2020-05-29 03:27:50 +0200864 LOGP(DMM, LOGL_ERROR, "%s: unimplemented mobile identity type\n",
865 osmo_mobile_identity_to_str_c(OTC_SELECT, &mi));
Harald Welte2a139372009-02-22 21:14:55 +0000866 break;
Alexander Couzensfbd96f52016-08-29 18:40:02 +0200867 default:
Neels Hofmeyr46d526a2020-05-29 03:27:50 +0200868 LOGP(DMM, LOGL_ERROR, "%s: unknown mobile identity type\n",
869 osmo_mobile_identity_to_str_c(OTC_SELECT, &mi));
Harald Welte2a139372009-02-22 21:14:55 +0000870 break;
871 }
872
Harald Welte2483f1b2016-06-19 18:06:02 +0200873 if (!vsub) {
Neels Hofmeyr46d526a2020-05-29 03:27:50 +0200874 LOGP(DMM, LOGL_ERROR, "IMSI DETACH for unknown subscriber %s\n",
875 osmo_mobile_identity_to_str_c(OTC_SELECT, &mi));
Harald Welte2483f1b2016-06-19 18:06:02 +0200876 } else {
877 LOGP(DMM, LOGL_INFO, "IMSI DETACH for %s\n", vlr_subscr_name(vsub));
Neels Hofmeyrc4628a32018-12-07 14:47:34 +0100878 msub_set_vsub(msc_a->c.msub, vsub);
Neels Hofmeyrfacd57a2017-12-15 03:48:48 +0100879
880 if (vsub->cs.is_paging)
Neels Hofmeyrc4628a32018-12-07 14:47:34 +0100881 paging_expired(vsub);
Neels Hofmeyrfacd57a2017-12-15 03:48:48 +0100882
Neels Hofmeyr986fe7e2018-09-13 03:05:52 +0200883 vsub->classmark.classmark1 = idi->classmark1;
884
Harald Welte2483f1b2016-06-19 18:06:02 +0200885 vlr_subscr_rx_imsi_detach(vsub);
886 osmo_signal_dispatch(SS_SUBSCR, S_SUBSCR_DETACHED, vsub);
Neels Hofmeyr7c5346c2019-02-19 02:36:35 +0100887 vlr_subscr_put(vsub, __func__);
Harald Welte2483f1b2016-06-19 18:06:02 +0200888 }
Harald Welte2a139372009-02-22 21:14:55 +0000889
Neels Hofmeyrc4628a32018-12-07 14:47:34 +0100890 msc_a_release_cn(msc_a);
Harald Welte2a139372009-02-22 21:14:55 +0000891 return 0;
892}
893
Harald Welted2a7f5a2009-06-05 20:08:20 +0000894static int gsm48_rx_mm_status(struct msgb *msg)
895{
896 struct gsm48_hdr *gh = msgb_l3(msg);
897
898 DEBUGP(DMM, "MM STATUS (reject cause 0x%02x)\n", gh->data[0]);
899
900 return 0;
901}
902
Neels Hofmeyr22a735b2017-02-03 01:22:40 +0100903static int parse_gsm_auth_resp(uint8_t *res, uint8_t *res_len,
Neels Hofmeyrc4628a32018-12-07 14:47:34 +0100904 struct msc_a *msc_a,
Neels Hofmeyr22a735b2017-02-03 01:22:40 +0100905 struct msgb *msg)
Sylvain Munaut30a15382009-12-24 00:27:26 +0100906{
907 struct gsm48_hdr *gh = msgb_l3(msg);
908 struct gsm48_auth_resp *ar = (struct gsm48_auth_resp*) gh->data;
Sylvain Munaut30a15382009-12-24 00:27:26 +0100909
Neels Hofmeyr22a735b2017-02-03 01:22:40 +0100910 if (msgb_l3len(msg) < sizeof(*gh) + sizeof(*ar)) {
Neels Hofmeyrc4628a32018-12-07 14:47:34 +0100911 LOG_MSC_A_CAT(msc_a, DMM, LOGL_ERROR, "MM AUTHENTICATION RESPONSE: l3 length invalid: %u\n",
912 msgb_l3len(msg));
Neels Hofmeyr22a735b2017-02-03 01:22:40 +0100913 return -EINVAL;
914 }
915
916 *res_len = sizeof(ar->sres);
917 memcpy(res, ar->sres, sizeof(ar->sres));
918 return 0;
919}
920
921static int parse_umts_auth_resp(uint8_t *res, uint8_t *res_len,
Neels Hofmeyrc4628a32018-12-07 14:47:34 +0100922 struct msc_a *msc_a,
Neels Hofmeyr22a735b2017-02-03 01:22:40 +0100923 struct msgb *msg)
924{
925 struct gsm48_hdr *gh;
926 uint8_t *data;
927 uint8_t iei;
928 uint8_t ie_len;
929 unsigned int data_len;
930
931 /* First parse the GSM part */
Neels Hofmeyrc4628a32018-12-07 14:47:34 +0100932 if (parse_gsm_auth_resp(res, res_len, msc_a, msg))
Neels Hofmeyr22a735b2017-02-03 01:22:40 +0100933 return -EINVAL;
934 OSMO_ASSERT(*res_len == 4);
935
936 /* Then add the extended res part */
937 gh = msgb_l3(msg);
938 data = gh->data + sizeof(struct gsm48_auth_resp);
939 data_len = msgb_l3len(msg) - (data - (uint8_t*)msgb_l3(msg));
940
941 if (data_len < 3) {
Vadim Yanitskiy2fca80e2019-05-08 16:53:23 +0700942 LOG_MSC_A_CAT(msc_a, DMM, LOGL_ERROR, "MM AUTHENTICATION RESPONSE: "
943 "message length=%u is too short\n", data_len);
Neels Hofmeyr22a735b2017-02-03 01:22:40 +0100944 return -EINVAL;
945 }
946
947 iei = data[0];
948 ie_len = data[1];
949 if (iei != GSM48_IE_AUTH_RES_EXT) {
Neels Hofmeyrc4628a32018-12-07 14:47:34 +0100950 LOG_MSC_A_CAT(msc_a, DMM, LOGL_ERROR, "MM R99 AUTHENTICATION RESPONSE: expected IEI 0x%02x, got 0x%02x\n",
951 GSM48_IE_AUTH_RES_EXT, iei);
Neels Hofmeyr22a735b2017-02-03 01:22:40 +0100952 return -EINVAL;
953 }
954
955 if (ie_len > 12) {
Neels Hofmeyrc4628a32018-12-07 14:47:34 +0100956 LOG_MSC_A_CAT(msc_a, DMM, LOGL_ERROR,
957 "MM R99 AUTHENTICATION RESPONSE: extended Auth Resp IE 0x%02x is too large: %u bytes\n",
958 GSM48_IE_AUTH_RES_EXT, ie_len);
Neels Hofmeyr22a735b2017-02-03 01:22:40 +0100959 return -EINVAL;
960 }
961
962 *res_len += ie_len;
963 memcpy(res + 4, &data[2], ie_len);
964 return 0;
965}
966
967/* Chapter 9.2.3: Authentication Response */
Neels Hofmeyrc4628a32018-12-07 14:47:34 +0100968static int gsm48_rx_mm_auth_resp(struct msc_a *msc_a, struct msgb *msg)
Neels Hofmeyr22a735b2017-02-03 01:22:40 +0100969{
Neels Hofmeyr22a735b2017-02-03 01:22:40 +0100970 uint8_t res[16];
971 uint8_t res_len;
972 int rc;
Neels Hofmeyr25f69d52018-03-10 03:44:06 +0100973 bool is_umts;
Neels Hofmeyrc4628a32018-12-07 14:47:34 +0100974 struct vlr_subscr *vsub = msc_a_vsub(msc_a);
Neels Hofmeyr22a735b2017-02-03 01:22:40 +0100975
Neels Hofmeyrc4628a32018-12-07 14:47:34 +0100976 if (!vsub) {
977 LOG_MSC_A_CAT(msc_a, DMM, LOGL_ERROR, "MM AUTHENTICATION RESPONSE: invalid: no subscriber\n");
978 msc_a_release_mo(msc_a, GSM_CAUSE_AUTH_FAILED);
Neels Hofmeyr22a735b2017-02-03 01:22:40 +0100979 return -EINVAL;
980 }
981
Neels Hofmeyr25f69d52018-03-10 03:44:06 +0100982 is_umts = (msgb_l3len(msg) > sizeof(struct gsm48_hdr) + sizeof(struct gsm48_auth_resp));
983
984 if (is_umts)
Neels Hofmeyrc4628a32018-12-07 14:47:34 +0100985 rc = parse_umts_auth_resp(res, &res_len, msc_a, msg);
Neels Hofmeyr25f69d52018-03-10 03:44:06 +0100986 else
Neels Hofmeyrc4628a32018-12-07 14:47:34 +0100987 rc = parse_gsm_auth_resp(res, &res_len, msc_a, msg);
Neels Hofmeyr22a735b2017-02-03 01:22:40 +0100988
989 if (rc) {
Neels Hofmeyrc4628a32018-12-07 14:47:34 +0100990 LOG_MSC_A_CAT(msc_a, DMM, LOGL_ERROR,
991 "MM AUTHENTICATION RESPONSE: invalid: parsing %s AKA Auth Response"
992 " failed with rc=%d; dispatching zero length SRES/RES to trigger failure\n",
993 is_umts ? "UMTS" : "GSM", rc);
Neels Hofmeyr8e0af0b2018-03-10 03:32:18 +0100994 memset(res, 0, sizeof(res));
995 res_len = 0;
Neels Hofmeyr22a735b2017-02-03 01:22:40 +0100996 }
997
Neels Hofmeyrc4628a32018-12-07 14:47:34 +0100998 LOG_MSC_A_CAT(msc_a, DMM, LOGL_DEBUG, "MM %s AUTHENTICATION RESPONSE (%s = %s)\n",
999 is_umts ? "UMTS" : "GSM", is_umts ? "res" : "sres",
1000 osmo_hexdump_nospc(res, res_len));
Neels Hofmeyr22a735b2017-02-03 01:22:40 +01001001
Neels Hofmeyrc4628a32018-12-07 14:47:34 +01001002 return vlr_subscr_rx_auth_resp(vsub, osmo_gsm48_classmark_is_r99(&vsub->classmark),
1003 msc_a->c.ran->type == OSMO_RAT_UTRAN_IU,
Harald Welte2483f1b2016-06-19 18:06:02 +02001004 res, res_len);
Sylvain Munaut30a15382009-12-24 00:27:26 +01001005}
1006
Neels Hofmeyrc4628a32018-12-07 14:47:34 +01001007static int gsm48_rx_mm_auth_fail(struct msc_a *msc_a, struct msgb *msg)
Neels Hofmeyr22a735b2017-02-03 01:22:40 +01001008{
1009 struct gsm48_hdr *gh = msgb_l3(msg);
1010 uint8_t cause;
1011 uint8_t auts_tag;
1012 uint8_t auts_len;
1013 uint8_t *auts;
Neels Hofmeyrc4628a32018-12-07 14:47:34 +01001014 struct vlr_subscr *vsub = msc_a_vsub(msc_a);
Neels Hofmeyr22a735b2017-02-03 01:22:40 +01001015
Neels Hofmeyrc4628a32018-12-07 14:47:34 +01001016 if (!vsub) {
1017 LOG_MSC_A_CAT(msc_a, DMM, LOGL_ERROR, "MM R99 AUTHENTICATION FAILURE: invalid: no subscriber\n");
1018 msc_a_release_mo(msc_a, GSM_CAUSE_AUTH_FAILED);
Neels Hofmeyr22a735b2017-02-03 01:22:40 +01001019 return -EINVAL;
1020 }
1021
1022 if (msgb_l3len(msg) < sizeof(*gh) + 1) {
Neels Hofmeyrc4628a32018-12-07 14:47:34 +01001023 LOG_MSC_A_CAT(msc_a, DMM, LOGL_ERROR, "MM R99 AUTHENTICATION FAILURE: l3 length invalid: %u\n",
1024 msgb_l3len(msg));
1025 msc_a_release_mo(msc_a, GSM_CAUSE_AUTH_FAILED);
Neels Hofmeyr22a735b2017-02-03 01:22:40 +01001026 return -EINVAL;
1027 }
1028
1029 cause = gh->data[0];
1030
1031 if (cause != GSM48_REJECT_SYNCH_FAILURE) {
Neels Hofmeyrc4628a32018-12-07 14:47:34 +01001032 LOG_MSC_A_CAT(msc_a, DMM, LOGL_INFO, "MM R99 AUTHENTICATION FAILURE: cause 0x%0x\n", cause);
1033 vlr_subscr_rx_auth_fail(vsub, NULL);
Harald Welte2483f1b2016-06-19 18:06:02 +02001034 return 0;
Neels Hofmeyr22a735b2017-02-03 01:22:40 +01001035 }
1036
1037 /* This is a Synch Failure procedure, which should pass an AUTS to
1038 * resynchronize the sequence nr with the HLR. Expecting exactly one
1039 * TLV with 14 bytes of AUTS. */
1040
1041 if (msgb_l3len(msg) < sizeof(*gh) + 1 + 2) {
Neels Hofmeyrc4628a32018-12-07 14:47:34 +01001042 LOG_MSC_A_CAT(msc_a, DMM, LOGL_INFO,
1043 "MM R99 AUTHENTICATION FAILURE: invalid Synch Failure: missing AUTS IE\n");
1044 msc_a_release_mo(msc_a, GSM_CAUSE_AUTH_FAILED);
Neels Hofmeyr22a735b2017-02-03 01:22:40 +01001045 return -EINVAL;
1046 }
1047
1048 auts_tag = gh->data[1];
1049 auts_len = gh->data[2];
1050 auts = &gh->data[3];
1051
1052 if (auts_tag != GSM48_IE_AUTS
1053 || auts_len != 14) {
Neels Hofmeyrc4628a32018-12-07 14:47:34 +01001054 LOG_MSC_A_CAT(msc_a, DMM, LOGL_INFO,
1055 "MM R99 AUTHENTICATION FAILURE: invalid Synch Failure:"
1056 " expected AUTS IE 0x%02x of 14 bytes,"
1057 " got IE 0x%02x of %u bytes\n",
1058 GSM48_IE_AUTS, auts_tag, auts_len);
1059 msc_a_release_mo(msc_a, GSM_CAUSE_AUTH_FAILED);
Neels Hofmeyr22a735b2017-02-03 01:22:40 +01001060 return -EINVAL;
1061 }
1062
1063 if (msgb_l3len(msg) < sizeof(*gh) + 1 + 2 + auts_len) {
Neels Hofmeyrc4628a32018-12-07 14:47:34 +01001064 LOG_MSC_A_CAT(msc_a, DMM, LOGL_INFO,
1065 "MM R99 AUTHENTICATION FAILURE: invalid Synch Failure msg: message truncated (%u)\n",
1066 msgb_l3len(msg));
1067 msc_a_release_mo(msc_a, GSM_CAUSE_AUTH_FAILED);
Neels Hofmeyr22a735b2017-02-03 01:22:40 +01001068 return -EINVAL;
1069 }
1070
1071 /* We have an AUTS IE with exactly 14 bytes of AUTS and the msgb is
1072 * large enough. */
1073
Neels Hofmeyrc4628a32018-12-07 14:47:34 +01001074 LOG_MSC_A_CAT(msc_a, DMM, LOGL_DEBUG, "MM R99 AUTHENTICATION SYNCH (AUTS = %s)\n",
1075 osmo_hexdump_nospc(auts, 14));
Neels Hofmeyr22a735b2017-02-03 01:22:40 +01001076
Neels Hofmeyrc4628a32018-12-07 14:47:34 +01001077 return vlr_subscr_rx_auth_fail(vsub, auts);
Harald Welte2483f1b2016-06-19 18:06:02 +02001078}
Neels Hofmeyr22a735b2017-02-03 01:22:40 +01001079
Neels Hofmeyrc4628a32018-12-07 14:47:34 +01001080static int gsm48_rx_mm_tmsi_reall_compl(struct msc_a *msc_a)
Harald Welte2483f1b2016-06-19 18:06:02 +02001081{
Neels Hofmeyrc4628a32018-12-07 14:47:34 +01001082 struct vlr_subscr *vsub = msc_a_vsub(msc_a);
1083 if (!vsub) {
1084 LOG_MSC_A_CAT(msc_a, DMM, LOGL_ERROR, "Rx MM TMSI Reallocation Complete: invalid: no subscriber\n");
Harald Welte2483f1b2016-06-19 18:06:02 +02001085 return -EINVAL;
1086 }
Neels Hofmeyrc4628a32018-12-07 14:47:34 +01001087 LOG_MSC_A_CAT(msc_a, DMM, LOGL_DEBUG, "TMSI Reallocation Completed\n");
1088 return vlr_subscr_rx_tmsi_reall_compl(vsub);
Neels Hofmeyr22a735b2017-02-03 01:22:40 +01001089}
1090
Harald Weltebf5e8df2009-02-03 12:59:45 +00001091/* Receive a GSM 04.08 Mobility Management (MM) message */
Neels Hofmeyrc4628a32018-12-07 14:47:34 +01001092int gsm0408_rcv_mm(struct msc_a *msc_a, struct msgb *msg)
Harald Welte52b1f982008-12-23 20:25:15 +00001093{
1094 struct gsm48_hdr *gh = msgb_l3(msg);
Harald Welte4bfdfe72009-06-10 23:11:52 +08001095 int rc = 0;
Harald Welte52b1f982008-12-23 20:25:15 +00001096
Neels Hofmeyr531734a2016-03-14 16:13:24 +01001097 switch (gsm48_hdr_msg_type(gh)) {
Harald Welte52b1f982008-12-23 20:25:15 +00001098 case GSM48_MT_MM_LOC_UPD_REQUEST:
Neels Hofmeyrc4628a32018-12-07 14:47:34 +01001099 rc = mm_rx_loc_upd_req(msc_a, msg);
Harald Welte52b1f982008-12-23 20:25:15 +00001100 break;
1101 case GSM48_MT_MM_ID_RESP:
Neels Hofmeyrc4628a32018-12-07 14:47:34 +01001102 rc = mm_rx_id_resp(msc_a, msg);
Harald Welte231ad4f2008-12-27 11:15:38 +00001103 break;
Harald Welte52b1f982008-12-23 20:25:15 +00001104 case GSM48_MT_MM_CM_SERV_REQ:
Neels Hofmeyrc4628a32018-12-07 14:47:34 +01001105 rc = gsm48_rx_mm_serv_req(msc_a, msg);
Harald Welte4b634542008-12-27 01:55:51 +00001106 break;
Harald Welte231ad4f2008-12-27 11:15:38 +00001107 case GSM48_MT_MM_STATUS:
Harald Welted2a7f5a2009-06-05 20:08:20 +00001108 rc = gsm48_rx_mm_status(msg);
Harald Welte231ad4f2008-12-27 11:15:38 +00001109 break;
Harald Welte231ad4f2008-12-27 11:15:38 +00001110 case GSM48_MT_MM_TMSI_REALL_COMPL:
Neels Hofmeyrc4628a32018-12-07 14:47:34 +01001111 rc = gsm48_rx_mm_tmsi_reall_compl(msc_a);
Harald Welte69b2af22009-01-06 19:47:00 +00001112 break;
Harald Welte231ad4f2008-12-27 11:15:38 +00001113 case GSM48_MT_MM_IMSI_DETACH_IND:
Neels Hofmeyrc4628a32018-12-07 14:47:34 +01001114 rc = gsm48_rx_mm_imsi_detach_ind(msc_a, msg);
Harald Welte2a139372009-02-22 21:14:55 +00001115 break;
1116 case GSM48_MT_MM_CM_REEST_REQ:
Neels Hofmeyrc4628a32018-12-07 14:47:34 +01001117 rc = gsm48_rx_cm_reest_req(msc_a, msg);
Harald Welte2a139372009-02-22 21:14:55 +00001118 break;
1119 case GSM48_MT_MM_AUTH_RESP:
Neels Hofmeyrc4628a32018-12-07 14:47:34 +01001120 rc = gsm48_rx_mm_auth_resp(msc_a, msg);
Harald Welte52b1f982008-12-23 20:25:15 +00001121 break;
Neels Hofmeyr22a735b2017-02-03 01:22:40 +01001122 case GSM48_MT_MM_AUTH_FAIL:
Neels Hofmeyrc4628a32018-12-07 14:47:34 +01001123 rc = gsm48_rx_mm_auth_fail(msc_a, msg);
Neels Hofmeyr22a735b2017-02-03 01:22:40 +01001124 break;
Harald Welte52b1f982008-12-23 20:25:15 +00001125 default:
Harald Welte5d24ba12009-12-24 12:13:17 +01001126 LOGP(DMM, LOGL_NOTICE, "Unknown GSM 04.08 MM msg type 0x%02x\n",
Harald Welte52b1f982008-12-23 20:25:15 +00001127 gh->msg_type);
1128 break;
1129 }
1130
1131 return rc;
1132}
Harald Weltebf5e8df2009-02-03 12:59:45 +00001133
Harald Welte2d35ae62009-02-06 12:02:13 +00001134/* Receive a PAGING RESPONSE message from the MS */
Neels Hofmeyrc4628a32018-12-07 14:47:34 +01001135static int gsm48_rx_rr_pag_resp(struct msc_a *msc_a, struct msgb *msg)
Harald Welte2d35ae62009-02-06 12:02:13 +00001136{
Neels Hofmeyrc4628a32018-12-07 14:47:34 +01001137 struct gsm_network *net = msc_a_net(msc_a);
Harald Welte2d35ae62009-02-06 12:02:13 +00001138 struct gsm48_hdr *gh = msgb_l3(msg);
Sylvain Munautda9f37e2019-03-14 11:02:36 +01001139 struct gsm48_pag_resp *pr =
1140 (struct gsm48_pag_resp *)gh->data;
Neels Hofmeyr986fe7e2018-09-13 03:05:52 +02001141 uint8_t classmark2_len = gh->data[1];
Neels Hofmeyrc4628a32018-12-07 14:47:34 +01001142 uint8_t *classmark2_buf = gh->data+2;
1143 struct gsm48_classmark2 *cm2 = (void*)classmark2_buf;
Neels Hofmeyr84da6b12016-05-20 21:59:55 +02001144 bool is_utran;
Neels Hofmeyrc4628a32018-12-07 14:47:34 +01001145 struct vlr_subscr *vsub;
Neels Hofmeyr46d526a2020-05-29 03:27:50 +02001146 struct osmo_mobile_identity mi;
1147 int rc;
Harald Welte2483f1b2016-06-19 18:06:02 +02001148
Neels Hofmeyrc4628a32018-12-07 14:47:34 +01001149 if (msc_a_is_establishing_auth_ciph(msc_a)) {
Vadim Yanitskiy5b19f6e2020-01-25 07:02:47 +07001150 LOG_MSC_A_CAT(msc_a, DRR, LOGL_ERROR,
Neels Hofmeyrc4628a32018-12-07 14:47:34 +01001151 "Ignoring Paging Response, conn already busy establishing authenticity\n");
Neels Hofmeyre3d3dc62018-03-31 00:02:14 +02001152 return 0;
1153 }
1154
Neels Hofmeyrc4628a32018-12-07 14:47:34 +01001155 if (msc_a_is_accepted(msc_a)) {
Vadim Yanitskiy5b19f6e2020-01-25 07:02:47 +07001156 LOG_MSC_A_CAT(msc_a, DRR, LOGL_ERROR, "Ignoring Paging Response, conn already established\n");
Neels Hofmeyre3d3dc62018-03-31 00:02:14 +02001157 return 0;
1158 }
1159
Neels Hofmeyr46d526a2020-05-29 03:27:50 +02001160 rc = osmo_mobile_identity_decode_from_l3(&mi, msg, false);
1161 if (rc) {
1162 LOG_MSC_A_CAT(msc_a, DRR, LOGL_ERROR, "Paging Response: cannot decode Mobile Identity\n");
1163 return -EINVAL;
1164 }
1165
Neels Hofmeyrc4628a32018-12-07 14:47:34 +01001166 msc_a->complete_layer3_type = COMPLETE_LAYER3_PAGING_RESP;
Neels Hofmeyr46d526a2020-05-29 03:27:50 +02001167 msub_update_id_from_mi(msc_a->c.msub, &mi);
1168 LOG_MSC_A_CAT(msc_a, DRR, LOGL_DEBUG, "Rx PAGING RESPONSE %s\n", osmo_mobile_identity_to_str_c(OTC_SELECT, &mi));
Neels Hofmeyr6d804b12017-02-18 22:20:46 +01001169
Neels Hofmeyrc4628a32018-12-07 14:47:34 +01001170 msc_a_get(msc_a, MSC_A_USE_PAGING_RESPONSE);
1171
1172 is_utran = (msc_a->c.ran->type == OSMO_RAT_UTRAN_IU);
1173 vlr_proc_acc_req(msc_a->c.fi,
1174 MSC_A_EV_AUTHENTICATED, MSC_A_EV_CN_CLOSE, NULL,
1175 net->vlr, msc_a,
Neels Hofmeyr46d526a2020-05-29 03:27:50 +02001176 VLR_PR_ARQ_T_PAGING_RESP, 0, &mi, &msc_a->via_cell.lai,
Neels Hofmeyrc4628a32018-12-07 14:47:34 +01001177 is_utran || net->authentication_required,
Neels Hofmeyr4dfb2ba2019-08-13 16:00:37 +02001178 is_utran ? net->uea_encryption : net->a5_encryption_mask > 0x01,
Sylvain Munautda9f37e2019-03-14 11:02:36 +01001179 pr->key_seq,
Neels Hofmeyrc4628a32018-12-07 14:47:34 +01001180 osmo_gsm48_classmark2_is_r99(cm2, classmark2_len),
Neels Hofmeyr84da6b12016-05-20 21:59:55 +02001181 is_utran);
Holger Freyther053e09d2009-02-14 22:51:06 +00001182
Neels Hofmeyr986fe7e2018-09-13 03:05:52 +02001183 /* From vlr_proc_acc_req() we expect an implicit dispatch of PR_ARQ_E_START we expect
Thorsten Alteholz3a357de2019-07-16 20:51:16 +02001184 * msc_vlr_subscr_assoc() to already have been called and completed. Has an error occurred? */
Neels Hofmeyrc4628a32018-12-07 14:47:34 +01001185 vsub = msc_a_vsub(msc_a);
1186 if (!vsub) {
Vadim Yanitskiy5b19f6e2020-01-25 07:02:47 +07001187 LOG_MSC_A_CAT(msc_a, DRR, LOGL_ERROR, "subscriber not allowed to do a Paging Response\n");
Neels Hofmeyr667d5e02020-08-19 13:40:33 +00001188
1189 /* Above MSC_A_USE_PAGING_RESPONSE may already have been removed by a forced release, put that use only
1190 * if it still exists. (see msc_a_fsm_releasing_onenter()) */
1191 if (osmo_use_count_by(&msc_a->use_count, MSC_A_USE_PAGING_RESPONSE))
1192 msc_a_put(msc_a, MSC_A_USE_PAGING_RESPONSE);
1193
Neels Hofmeyr986fe7e2018-09-13 03:05:52 +02001194 return -EIO;
1195 }
1196
Neels Hofmeyrc4628a32018-12-07 14:47:34 +01001197 vsub->classmark.classmark2 = *cm2;
1198 vsub->classmark.classmark2_len = classmark2_len;
Neels Hofmeyr84da6b12016-05-20 21:59:55 +02001199 return 0;
Harald Welte2d35ae62009-02-06 12:02:13 +00001200}
1201
Neels Hofmeyrc4628a32018-12-07 14:47:34 +01001202static int gsm48_rx_rr_ciphering_mode_complete(struct msc_a *msc_a, struct msgb *msg)
1203{
1204 struct vlr_subscr *vsub = msc_a_vsub(msc_a);
1205 struct gsm48_hdr *gh = msgb_l3(msg);
1206 unsigned int payload_len = msgb_l3len(msg) - sizeof(*gh);
1207 struct tlv_parsed tp;
Neels Hofmeyr46d526a2020-05-29 03:27:50 +02001208 struct tlv_p_entry *mi_tlv;
1209 struct osmo_mobile_identity mi;
Neels Hofmeyrc4628a32018-12-07 14:47:34 +01001210
1211 tlv_parse(&tp, &gsm48_att_tlvdef, gh->data, payload_len, 0, 0);
Neels Hofmeyr46d526a2020-05-29 03:27:50 +02001212 mi_tlv = TLVP_GET(&tp, GSM48_IE_MOBILE_ID);
Neels Hofmeyrc4628a32018-12-07 14:47:34 +01001213
Vadim Yanitskiya79aac02019-12-28 01:19:19 +01001214 /* IMEI(SV) is optional for this message */
Neels Hofmeyr46d526a2020-05-29 03:27:50 +02001215 if (!mi_tlv)
Neels Hofmeyrc4628a32018-12-07 14:47:34 +01001216 return 0;
Neels Hofmeyr46d526a2020-05-29 03:27:50 +02001217 if (!mi_tlv->len)
Vadim Yanitskiya79aac02019-12-28 01:19:19 +01001218 return -EINVAL;
Neels Hofmeyr46d526a2020-05-29 03:27:50 +02001219
1220 if (osmo_mobile_identity_decode(&mi, mi_tlv->val, mi_tlv->len, false)) {
1221 LOGP(DMM, LOGL_ERROR, "RR Ciphering Mode Complete contains invalid Mobile Identity %s\n",
1222 osmo_hexdump(mi_tlv->val, mi_tlv->len));
1223 return -EINVAL;
1224 }
1225 if (mi.type != GSM_MI_TYPE_IMEISV) {
Vadim Yanitskiya79aac02019-12-28 01:19:19 +01001226 LOGP(DMM, LOGL_ERROR, "RR Ciphering Mode Complete contains "
1227 "unexpected Mobile Identity type %s\n",
Neels Hofmeyr46d526a2020-05-29 03:27:50 +02001228 osmo_mobile_identity_to_str_c(OTC_SELECT, &mi));
Vadim Yanitskiya79aac02019-12-28 01:19:19 +01001229 return -EINVAL;
1230 }
Neels Hofmeyrc4628a32018-12-07 14:47:34 +01001231
Neels Hofmeyr38816da2019-08-29 00:43:18 +02001232 LOG_MSC_A(msc_a, LOGL_DEBUG, "RR Ciphering Mode Complete contains Mobile Identity: %s\n",
Neels Hofmeyr46d526a2020-05-29 03:27:50 +02001233 osmo_mobile_identity_to_str_c(OTC_SELECT, &mi));
Neels Hofmeyrc4628a32018-12-07 14:47:34 +01001234
1235 if (!vsub)
1236 return 0;
1237
Neels Hofmeyr46d526a2020-05-29 03:27:50 +02001238 return vlr_subscr_rx_id_resp(vsub, &mi);
Neels Hofmeyrc4628a32018-12-07 14:47:34 +01001239}
1240
1241static int gsm48_rx_rr_app_info(struct msc_a *msc_a, struct msgb *msg)
Harald Welte (local)6eef5642009-08-15 23:32:44 +02001242{
1243 struct gsm48_hdr *gh = msgb_l3(msg);
Holger Hans Peter Freytherc42ad8b2011-04-18 17:04:00 +02001244 uint8_t apdu_id_flags;
1245 uint8_t apdu_len;
1246 uint8_t *apdu_data;
Harald Welte (local)6eef5642009-08-15 23:32:44 +02001247
1248 apdu_id_flags = gh->data[0];
1249 apdu_len = gh->data[1];
1250 apdu_data = gh->data+2;
Alexander Couzensfbd96f52016-08-29 18:40:02 +02001251
Vadim Yanitskiy6a9a3a72020-01-25 06:53:50 +07001252 LOG_MSC_A_CAT(msc_a, DRR, LOGL_DEBUG, "Rx RR APPLICATION INFO "
1253 "(id/flags=0x%02x apdu_len=%u apdu=%s)\n",
1254 apdu_id_flags, apdu_len, osmo_hexdump(apdu_data, apdu_len));
Harald Welte (local)6eef5642009-08-15 23:32:44 +02001255
Harald Welte2483f1b2016-06-19 18:06:02 +02001256 /* we're not using the app info blob anywhere, so ignore. */
1257#if 0
Holger Hans Peter Freyther3f122be2010-06-17 17:14:35 +08001258 return db_apdu_blob_store(conn->subscr, apdu_id_flags, apdu_len, apdu_data);
Harald Welte2483f1b2016-06-19 18:06:02 +02001259#else
1260 return 0;
1261#endif
Harald Welte (local)6eef5642009-08-15 23:32:44 +02001262}
1263
Harald Weltebf5e8df2009-02-03 12:59:45 +00001264/* Receive a GSM 04.08 Radio Resource (RR) message */
Neels Hofmeyrc4628a32018-12-07 14:47:34 +01001265int gsm0408_rcv_rr(struct msc_a *msc_a, struct msgb *msg)
Harald Welte52b1f982008-12-23 20:25:15 +00001266{
1267 struct gsm48_hdr *gh = msgb_l3(msg);
Harald Welte2d35ae62009-02-06 12:02:13 +00001268 int rc = 0;
Harald Welte52b1f982008-12-23 20:25:15 +00001269
1270 switch (gh->msg_type) {
Harald Welte52b1f982008-12-23 20:25:15 +00001271 case GSM48_MT_RR_PAG_RESP:
Neels Hofmeyrc4628a32018-12-07 14:47:34 +01001272 rc = gsm48_rx_rr_pag_resp(msc_a, msg);
1273 break;
1274 case GSM48_MT_RR_CIPH_M_COMPL:
1275 rc = gsm48_rx_rr_ciphering_mode_complete(msc_a, msg);
Harald Welte2d35ae62009-02-06 12:02:13 +00001276 break;
Harald Welte (local)6eef5642009-08-15 23:32:44 +02001277 case GSM48_MT_RR_APP_INFO:
Neels Hofmeyrc4628a32018-12-07 14:47:34 +01001278 rc = gsm48_rx_rr_app_info(msc_a, msg);
Harald Welte (local)6eef5642009-08-15 23:32:44 +02001279 break;
Harald Welte52b1f982008-12-23 20:25:15 +00001280 default:
Neels Hofmeyrc4628a32018-12-07 14:47:34 +01001281 LOG_MSC_A_CAT(msc_a, DRR, LOGL_NOTICE, "MSC: Unimplemented %s GSM 04.08 RR "
1282 "message\n", gsm48_rr_msg_name(gh->msg_type));
Harald Welte52b1f982008-12-23 20:25:15 +00001283 break;
1284 }
1285
Harald Welte2d35ae62009-02-06 12:02:13 +00001286 return rc;
Harald Welte52b1f982008-12-23 20:25:15 +00001287}
1288
Neels Hofmeyrc4628a32018-12-07 14:47:34 +01001289int gsm48_send_rr_app_info(struct msc_a *msc_a, uint8_t apdu_id,
Holger Hans Peter Freytherc42ad8b2011-04-18 17:04:00 +02001290 uint8_t apdu_len, const uint8_t *apdu)
Harald Welte (local)6eef5642009-08-15 23:32:44 +02001291{
Holger Hans Peter Freyther8239e062016-01-25 22:03:25 +01001292 struct msgb *msg = gsm48_msgb_alloc_name("GSM 04.08 APP INF");
Harald Welte (local)6eef5642009-08-15 23:32:44 +02001293 struct gsm48_hdr *gh;
1294
Harald Welte (local)6eef5642009-08-15 23:32:44 +02001295 DEBUGP(DRR, "TX APPLICATION INFO id=0x%02x, len=%u\n",
1296 apdu_id, apdu_len);
Alexander Couzensfbd96f52016-08-29 18:40:02 +02001297
Harald Welte (local)6eef5642009-08-15 23:32:44 +02001298 gh = (struct gsm48_hdr *) msgb_put(msg, sizeof(*gh) + 2 + apdu_len);
1299 gh->proto_discr = GSM48_PDISC_RR;
1300 gh->msg_type = GSM48_MT_RR_APP_INFO;
1301 gh->data[0] = apdu_id;
1302 gh->data[1] = apdu_len;
1303 memcpy(gh->data+2, apdu, apdu_len);
1304
Neels Hofmeyrc4628a32018-12-07 14:47:34 +01001305 return msc_a_tx_dtap_to_i(msc_a, msg);
Harald Welte (local)6eef5642009-08-15 23:32:44 +02001306}
1307
Neels Hofmeyrc4628a32018-12-07 14:47:34 +01001308extern int gsm0408_rcv_cc(struct msc_a *msc_a, struct msgb *msg);
Harald Welte8470bf22008-12-25 23:28:35 +00001309
Harald Welte2483f1b2016-06-19 18:06:02 +02001310/***********************************************************************
1311 * VLR integration
1312 ***********************************************************************/
1313
1314/* VLR asks us to send an authentication request */
Neels Hofmeyr8b6e5362018-11-30 02:57:33 +01001315static int msc_vlr_tx_auth_req(void *msc_conn_ref, struct vlr_auth_tuple *at,
Harald Welte2483f1b2016-06-19 18:06:02 +02001316 bool send_autn)
1317{
Neels Hofmeyrc4628a32018-12-07 14:47:34 +01001318 struct msc_a *msc_a = msc_conn_ref;
1319 return gsm48_tx_mm_auth_req(msc_a, at->vec.rand,
Harald Welte2483f1b2016-06-19 18:06:02 +02001320 send_autn? at->vec.autn : NULL,
1321 at->key_seq);
1322}
1323
1324/* VLR asks us to send an authentication reject */
1325static int msc_vlr_tx_auth_rej(void *msc_conn_ref)
1326{
Neels Hofmeyrc4628a32018-12-07 14:47:34 +01001327 struct msc_a *msc_a = msc_conn_ref;
1328 return gsm48_tx_mm_auth_rej(msc_a);
Harald Welte2483f1b2016-06-19 18:06:02 +02001329}
1330
1331/* VLR asks us to transmit an Identity Request of given type */
1332static int msc_vlr_tx_id_req(void *msc_conn_ref, uint8_t mi_type)
1333{
Neels Hofmeyrc4628a32018-12-07 14:47:34 +01001334 struct msc_a *msc_a = msc_conn_ref;
Vadim Yanitskiya79aac02019-12-28 01:19:19 +01001335
1336 /* Store requested MI type, so we can check the response */
1337 msc_a->mm_id_req_type = mi_type;
1338
Neels Hofmeyrc4628a32018-12-07 14:47:34 +01001339 return mm_tx_identity_req(msc_a, mi_type);
Harald Welte2483f1b2016-06-19 18:06:02 +02001340}
1341
1342/* VLR asks us to transmit a Location Update Accept */
1343static int msc_vlr_tx_lu_acc(void *msc_conn_ref, uint32_t send_tmsi)
1344{
Neels Hofmeyrc4628a32018-12-07 14:47:34 +01001345 struct msc_a *msc_a = msc_conn_ref;
1346 return gsm0408_loc_upd_acc(msc_a, send_tmsi);
Harald Welte2483f1b2016-06-19 18:06:02 +02001347}
1348
1349/* VLR asks us to transmit a Location Update Reject */
Neels Hofmeyr15809592018-04-06 02:57:51 +02001350static int msc_vlr_tx_lu_rej(void *msc_conn_ref, enum gsm48_reject_value cause)
Harald Welte2483f1b2016-06-19 18:06:02 +02001351{
Neels Hofmeyrc4628a32018-12-07 14:47:34 +01001352 struct msc_a *msc_a = msc_conn_ref;
1353 return gsm0408_loc_upd_rej(msc_a, cause);
Harald Welte2483f1b2016-06-19 18:06:02 +02001354}
1355
1356/* VLR asks us to transmit a CM Service Accept */
Neels Hofmeyrc4628a32018-12-07 14:47:34 +01001357int msc_vlr_tx_cm_serv_acc(void *msc_conn_ref, enum osmo_cm_service_type cm_service_type)
Harald Welte2483f1b2016-06-19 18:06:02 +02001358{
Neels Hofmeyrc4628a32018-12-07 14:47:34 +01001359 struct msc_a *msc_a = msc_conn_ref;
1360 return msc_gsm48_tx_mm_serv_ack(msc_a);
Neels Hofmeyr84da6b12016-05-20 21:59:55 +02001361}
1362
1363static int msc_vlr_tx_common_id(void *msc_conn_ref)
1364{
Neels Hofmeyrc4628a32018-12-07 14:47:34 +01001365 struct msc_a *msc_a = msc_conn_ref;
1366 struct ran_msg msg = {
1367 .msg_type = RAN_MSG_COMMON_ID,
1368 .common_id = {
1369 .imsi = msc_a_vsub(msc_a)->imsi,
1370 },
1371 };
1372 return msc_a_ran_down(msc_a, MSC_ROLE_I, &msg);
Harald Welte2483f1b2016-06-19 18:06:02 +02001373}
1374
Stefan Sperling3a741282018-03-13 21:11:49 +01001375/* VLR asks us to transmit MM info. */
1376static int msc_vlr_tx_mm_info(void *msc_conn_ref)
1377{
Neels Hofmeyrc4628a32018-12-07 14:47:34 +01001378 struct msc_a *msc_a = msc_conn_ref;
1379 struct gsm_network *net = msc_a_net(msc_a);
1380 if (!net->send_mm_info)
Stefan Sperling3a741282018-03-13 21:11:49 +01001381 return 0;
Neels Hofmeyrc4628a32018-12-07 14:47:34 +01001382 return gsm48_tx_mm_info(msc_a);
Stefan Sperling3a741282018-03-13 21:11:49 +01001383}
1384
Harald Welte2483f1b2016-06-19 18:06:02 +02001385/* VLR asks us to transmit a CM Service Reject */
Neels Hofmeyrc4628a32018-12-07 14:47:34 +01001386static int msc_vlr_tx_cm_serv_rej(void *msc_conn_ref, enum osmo_cm_service_type cm_service_type,
1387 enum gsm48_reject_value cause)
Harald Welte2483f1b2016-06-19 18:06:02 +02001388{
Neels Hofmeyrc4628a32018-12-07 14:47:34 +01001389 struct msc_a *msc_a = msc_conn_ref;
1390 msc_gsm48_tx_mm_serv_rej(msc_a, cause);
1391 msc_a_put(msc_a, msc_a_cm_service_type_to_use(cm_service_type));
1392 return 0;
Harald Welte2483f1b2016-06-19 18:06:02 +02001393}
1394
1395/* VLR informs us that the subscriber data has somehow been modified */
1396static void msc_vlr_subscr_update(struct vlr_subscr *subscr)
1397{
Neels Hofmeyrc4628a32018-12-07 14:47:34 +01001398 struct msub *msub = msub_for_vsub(subscr);
1399 LOGVSUBP(LOGL_NOTICE, subscr, "VLR: update for IMSI=%s (MSISDN=%s)%s\n",
1400 subscr->imsi, subscr->msisdn, msub ? "" : " (NO CONN!)");
1401 msub_update_id(msub);
Neels Hofmeyr68cf9572018-09-18 15:52:58 +02001402}
1403
Neels Hofmeyr68f50da2020-06-24 14:22:52 +02001404/* VLR informs us that the subscriber has been associated with a conn.
1405 * The subscriber has *not* been authenticated yet, so the vsub should be protected from potentially invalid information
1406 * from the msc_a. */
Neels Hofmeyr1035d902018-12-28 21:22:32 +01001407static int msc_vlr_subscr_assoc(void *msc_conn_ref,
Harald Welte2483f1b2016-06-19 18:06:02 +02001408 struct vlr_subscr *vsub)
1409{
Neels Hofmeyrc4628a32018-12-07 14:47:34 +01001410 struct msc_a *msc_a = msc_conn_ref;
1411 struct msub *msub = msc_a->c.msub;
Max48d4ec02018-02-12 16:51:03 +01001412 OSMO_ASSERT(vsub);
Neels Hofmeyr1035d902018-12-28 21:22:32 +01001413
Neels Hofmeyrc4628a32018-12-07 14:47:34 +01001414 if (msub_set_vsub(msub, vsub))
1415 return -EINVAL;
Neels Hofmeyr68f50da2020-06-24 14:22:52 +02001416
1417 /* FIXME: would be better to modify vsub->* only after the subscriber is authenticated, in
1418 * evaluate_acceptance_outcome(conn_accepted == true). */
1419
Neels Hofmeyrc4628a32018-12-07 14:47:34 +01001420 vsub->cs.attached_via_ran = msc_a->c.ran->type;
Neels Hofmeyr68cf9572018-09-18 15:52:58 +02001421
1422 /* In case we have already received Classmark Information before the VLR Subscriber was
1423 * associated with the conn: merge the new Classmark into vsub->classmark. Don't overwrite valid
1424 * vsub->classmark with unset classmark, though. */
Neels Hofmeyrc4628a32018-12-07 14:47:34 +01001425 osmo_gsm48_classmark_update(&vsub->classmark, &msc_a->temporary_classmark);
1426
1427 msub_update_id(msub);
1428
1429 osmo_fsm_inst_dispatch(msc_a->c.fi, MSC_A_EV_COMPLETE_LAYER_3_OK, NULL);
Neels Hofmeyr1035d902018-12-28 21:22:32 +01001430 return 0;
Harald Welte2483f1b2016-06-19 18:06:02 +02001431}
1432
1433/* operations that we need to implement for libvlr */
Neels Hofmeyrc4628a32018-12-07 14:47:34 +01001434const struct vlr_ops msc_vlr_ops = {
Harald Welte2483f1b2016-06-19 18:06:02 +02001435 .tx_auth_req = msc_vlr_tx_auth_req,
1436 .tx_auth_rej = msc_vlr_tx_auth_rej,
1437 .tx_id_req = msc_vlr_tx_id_req,
1438 .tx_lu_acc = msc_vlr_tx_lu_acc,
1439 .tx_lu_rej = msc_vlr_tx_lu_rej,
1440 .tx_cm_serv_acc = msc_vlr_tx_cm_serv_acc,
1441 .tx_cm_serv_rej = msc_vlr_tx_cm_serv_rej,
Neels Hofmeyrc4628a32018-12-07 14:47:34 +01001442 .set_ciph_mode = msc_a_vlr_set_cipher_mode,
Neels Hofmeyr84da6b12016-05-20 21:59:55 +02001443 .tx_common_id = msc_vlr_tx_common_id,
Stefan Sperling3a741282018-03-13 21:11:49 +01001444 .tx_mm_info = msc_vlr_tx_mm_info,
Harald Welte2483f1b2016-06-19 18:06:02 +02001445 .subscr_update = msc_vlr_subscr_update,
1446 .subscr_assoc = msc_vlr_subscr_assoc,
1447};
1448
Neels Hofmeyr79e580b2018-03-22 16:48:22 +01001449struct msgb *gsm48_create_mm_serv_rej(enum gsm48_reject_value value)
1450{
1451 struct msgb *msg;
1452 struct gsm48_hdr *gh;
1453
1454 msg = gsm48_msgb_alloc_name("GSM 04.08 SERV REJ");
1455 if (!msg)
1456 return NULL;
1457
1458 gh = (struct gsm48_hdr *) msgb_put(msg, sizeof(*gh) + 1);
1459 gh->proto_discr = GSM48_PDISC_MM;
1460 gh->msg_type = GSM48_MT_MM_CM_SERV_REJ;
1461 gh->data[0] = value;
1462
1463 return msg;
1464}
1465
1466struct msgb *gsm48_create_loc_upd_rej(uint8_t cause)
1467{
1468 struct gsm48_hdr *gh;
1469 struct msgb *msg;
1470
1471 msg = gsm48_msgb_alloc_name("GSM 04.08 LOC UPD REJ");
1472 if (!msg)
1473 return NULL;
1474
1475 gh = (struct gsm48_hdr *) msgb_put(msg, sizeof(*gh) + 1);
1476 gh->proto_discr = GSM48_PDISC_MM;
1477 gh->msg_type = GSM48_MT_MM_LOC_UPD_REJECT;
1478 gh->data[0] = cause;
1479 return msg;
1480}