blob: ca6f90de75a0efee8ce1f2b18f4cc131db9fa4ab [file] [log] [blame]
Harald Welteb8b85a12016-06-17 00:06:42 +02001/* Osmocom Visitor Location Register (VLR) code base */
2
3/* (C) 2016 by Harald Welte <laforge@gnumonks.org>
4 *
5 * All Rights Reserved
6 *
7 * This program is free software; you can redistribute it and/or modify
8 * it under the terms of the GNU Affero General Public License as published by
9 * the Free Software Foundation; either version 3 of the License, or
10 * (at your option) any later version.
11 *
12 * This program is distributed in the hope that it will be useful,
13 * but WITHOUT ANY WARRANTY; without even the implied warranty of
14 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 * GNU Affero General Public License for more details.
16 *
17 * You should have received a copy of the GNU Affero General Public License
18 * along with this program. If not, see <http://www.gnu.org/licenses/>.
19 *
20 */
21
22#include <osmocom/core/linuxlist.h>
23#include <osmocom/core/fsm.h>
24#include <osmocom/core/utils.h>
Stefan Sperlingdefc3c82018-05-15 14:48:04 +020025#include <osmocom/core/timer.h>
Harald Welteb8b85a12016-06-17 00:06:42 +020026#include <osmocom/gsm/protocol/gsm_04_08_gprs.h>
27#include <osmocom/gsm/gsup.h>
28#include <osmocom/gsm/apn.h>
Max43b01b02017-09-15 11:22:30 +020029#include <osmocom/gsm/gsm48.h>
Stefan Sperlingafa030d2018-12-06 12:06:59 +010030#include <osmocom/gsm/ipa.h>
Neels Hofmeyr90843962017-09-04 15:04:35 +020031#include <osmocom/msc/gsm_subscriber.h>
Harald Welte1ea6baf2018-07-31 19:40:52 +020032#include <osmocom/gsupclient/gsup_client.h>
Harald Welte0df904d2018-12-03 11:00:04 +010033#include <osmocom/msc/vlr_sgs.h>
Neels Hofmeyr90843962017-09-04 15:04:35 +020034#include <osmocom/msc/vlr.h>
35#include <osmocom/msc/debug.h>
Neels Hofmeyrc4628a32018-12-07 14:47:34 +010036#include <osmocom/msc/gsup_client_mux.h>
Harald Welteb8b85a12016-06-17 00:06:42 +020037
Harald Welteb8b85a12016-06-17 00:06:42 +020038#include <netinet/in.h>
39#include <arpa/inet.h>
40#include <limits.h>
Max43b01b02017-09-15 11:22:30 +020041#include <errno.h>
Harald Welteb8b85a12016-06-17 00:06:42 +020042
43#include "vlr_core.h"
44#include "vlr_auth_fsm.h"
45#include "vlr_lu_fsm.h"
46#include "vlr_access_req_fsm.h"
Harald Welte0df904d2018-12-03 11:00:04 +010047#include "vlr_sgs_fsm.h"
Harald Welteb8b85a12016-06-17 00:06:42 +020048
49#define SGSN_SUBSCR_MAX_RETRIES 3
50#define SGSN_SUBSCR_RETRY_INTERVAL 10
51
52/***********************************************************************
53 * Convenience functions
54 ***********************************************************************/
55
56const struct value_string vlr_ciph_names[] = {
57 OSMO_VALUE_STRING(VLR_CIPH_NONE),
58 OSMO_VALUE_STRING(VLR_CIPH_A5_1),
59 OSMO_VALUE_STRING(VLR_CIPH_A5_2),
60 OSMO_VALUE_STRING(VLR_CIPH_A5_3),
61 { 0, NULL }
62};
63
64uint32_t vlr_timer(struct vlr_instance *vlr, uint32_t timer)
65{
66 uint32_t tidx = 0xffffffff;
67
68 switch (timer) {
69 case 3270:
70 tidx = VLR_T_3270;
71 break;
72 case 3260:
73 tidx = VLR_T_3260;
74 break;
75 case 3250:
76 tidx = VLR_T_3250;
77 break;
78 }
79
80 OSMO_ASSERT(tidx < sizeof(vlr->cfg.timer));
81 return vlr->cfg.timer[tidx];
82}
83
Neels Hofmeyr7a2f58e2018-03-22 16:03:49 +010084/* return static buffer with printable name of VLR subscriber */
Oliver Smith5598aae2019-01-08 11:47:21 +010085const char *vlr_subscr_name(const struct vlr_subscr *vsub)
Neels Hofmeyr7a2f58e2018-03-22 16:03:49 +010086{
Neels Hofmeyr361e5712019-01-03 02:32:14 +010087 static char buf[128];
Neels Hofmeyr83e311f2019-03-19 16:39:10 +010088 struct osmo_strbuf sb = { .buf = buf, .len = sizeof(buf) };
Neels Hofmeyr361e5712019-01-03 02:32:14 +010089 bool present = false;
Neels Hofmeyr7a2f58e2018-03-22 16:03:49 +010090 if (!vsub)
91 return "unknown";
Neels Hofmeyr361e5712019-01-03 02:32:14 +010092 if (vsub->imsi[0]) {
Neels Hofmeyr83e311f2019-03-19 16:39:10 +010093 OSMO_STRBUF_PRINTF(sb, "IMSI-%s", vsub->imsi);
Neels Hofmeyr361e5712019-01-03 02:32:14 +010094 present = true;
95 }
96 if (vsub->msisdn[0]) {
Neels Hofmeyr83e311f2019-03-19 16:39:10 +010097 OSMO_STRBUF_PRINTF(sb, "%sMSISDN-%s", present? ":" : "", vsub->msisdn);
Neels Hofmeyr361e5712019-01-03 02:32:14 +010098 present = true;
99 }
100 if (vsub->tmsi != GSM_RESERVED_TMSI) {
Neels Hofmeyr83e311f2019-03-19 16:39:10 +0100101 OSMO_STRBUF_PRINTF(sb, "%sTMSI-0x%08X", present? ":" : "", vsub->tmsi);
Neels Hofmeyr361e5712019-01-03 02:32:14 +0100102 present = true;
103 }
104 if (vsub->tmsi_new != GSM_RESERVED_TMSI) {
Neels Hofmeyr83e311f2019-03-19 16:39:10 +0100105 OSMO_STRBUF_PRINTF(sb, "%sTMSInew-0x%08X", present? ":" : "", vsub->tmsi_new);
Neels Hofmeyr361e5712019-01-03 02:32:14 +0100106 present = true;
107 }
108 if (!present)
Neels Hofmeyr7a2f58e2018-03-22 16:03:49 +0100109 return "unknown";
Neels Hofmeyr361e5712019-01-03 02:32:14 +0100110
Neels Hofmeyr7a2f58e2018-03-22 16:03:49 +0100111 return buf;
112}
113
Neels Hofmeyrc4628a32018-12-07 14:47:34 +0100114const char *vlr_subscr_short_name(const struct vlr_subscr *vsub, unsigned int maxlen)
115{
116 /* cast away the const so we can shorten the string within the static buffer */
117 char *name = (char*)vlr_subscr_name(vsub);
118 size_t len = strlen(name);
119 if (maxlen < 2)
120 return "-";
121 if (len > maxlen)
122 strcpy(name + maxlen - 2, "..");
123 return name;
124}
125
Oliver Smith5598aae2019-01-08 11:47:21 +0100126const char *vlr_subscr_msisdn_or_name(const struct vlr_subscr *vsub)
Neels Hofmeyr7a2f58e2018-03-22 16:03:49 +0100127{
128 if (!vsub || !vsub->msisdn[0])
129 return vlr_subscr_name(vsub);
130 return vsub->msisdn;
131}
132
Harald Welteb8b85a12016-06-17 00:06:42 +0200133struct vlr_subscr *_vlr_subscr_find_by_imsi(struct vlr_instance *vlr,
134 const char *imsi,
Neels Hofmeyr7c5346c2019-02-19 02:36:35 +0100135 const char *use,
Harald Welteb8b85a12016-06-17 00:06:42 +0200136 const char *file, int line)
137{
138 struct vlr_subscr *vsub;
139
140 if (!imsi || !*imsi)
141 return NULL;
142
143 llist_for_each_entry(vsub, &vlr->subscribers, list) {
Neels Hofmeyr7c5346c2019-02-19 02:36:35 +0100144 if (vlr_subscr_matches_imsi(vsub, imsi)) {
145 vlr_subscr_get_src(vsub, use, file, line);
146 return vsub;
147 }
Harald Welteb8b85a12016-06-17 00:06:42 +0200148 }
149 return NULL;
150}
151
152struct vlr_subscr *_vlr_subscr_find_by_tmsi(struct vlr_instance *vlr,
153 uint32_t tmsi,
Neels Hofmeyr7c5346c2019-02-19 02:36:35 +0100154 const char *use,
Harald Welteb8b85a12016-06-17 00:06:42 +0200155 const char *file, int line)
156{
157 struct vlr_subscr *vsub;
158
159 if (tmsi == GSM_RESERVED_TMSI)
160 return NULL;
161
162 llist_for_each_entry(vsub, &vlr->subscribers, list) {
Neels Hofmeyr7c5346c2019-02-19 02:36:35 +0100163 if (vlr_subscr_matches_tmsi(vsub, tmsi)) {
164 vlr_subscr_get_src(vsub, use, file, line);
165 return vsub;
166 }
Harald Welteb8b85a12016-06-17 00:06:42 +0200167 }
168 return NULL;
169}
170
171struct vlr_subscr *_vlr_subscr_find_by_msisdn(struct vlr_instance *vlr,
172 const char *msisdn,
Neels Hofmeyr7c5346c2019-02-19 02:36:35 +0100173 const char *use,
Harald Welteb8b85a12016-06-17 00:06:42 +0200174 const char *file, int line)
175{
176 struct vlr_subscr *vsub;
177
178 if (!msisdn || !*msisdn)
179 return NULL;
180
181 llist_for_each_entry(vsub, &vlr->subscribers, list) {
Neels Hofmeyr7c5346c2019-02-19 02:36:35 +0100182 if (vlr_subscr_matches_msisdn(vsub, msisdn)) {
183 vlr_subscr_get_src(vsub, use, file, line);
184 return vsub;
185 }
Harald Welteb8b85a12016-06-17 00:06:42 +0200186 }
187 return NULL;
188}
189
Harald Welteb8b85a12016-06-17 00:06:42 +0200190/* Transmit GSUP message for subscriber to HLR, using IMSI from subscriber */
Max923a2392018-01-24 13:55:03 +0100191static int vlr_subscr_tx_gsup_message(const struct vlr_subscr *vsub,
Harald Welteb8b85a12016-06-17 00:06:42 +0200192 struct osmo_gsup_message *gsup_msg)
193{
194 struct vlr_instance *vlr = vsub->vlr;
195
196 if (strlen(gsup_msg->imsi) == 0)
Max98f74672018-02-05 12:57:06 +0100197 OSMO_STRLCPY_ARRAY(gsup_msg->imsi, vsub->imsi);
Harald Welteb8b85a12016-06-17 00:06:42 +0200198
Neels Hofmeyrc4628a32018-12-07 14:47:34 +0100199 gsup_msg->message_class = OSMO_GSUP_MESSAGE_CLASS_SUBSCRIBER_MANAGEMENT;
Harald Welteb8b85a12016-06-17 00:06:42 +0200200
Neels Hofmeyrc4628a32018-12-07 14:47:34 +0100201 return gsup_client_mux_tx(vlr->gcm, gsup_msg);
Harald Welteb8b85a12016-06-17 00:06:42 +0200202}
203
Neels Hofmeyr7c5346c2019-02-19 02:36:35 +0100204static int vlr_subscr_use_cb(struct osmo_use_count_entry *e, int32_t old_use_count, const char *file, int line)
Harald Welteb8b85a12016-06-17 00:06:42 +0200205{
Neels Hofmeyr7c5346c2019-02-19 02:36:35 +0100206 struct vlr_subscr *vsub = e->use_count->talloc_object;
207 char buf[128];
Neels Hofmeyrc4628a32018-12-07 14:47:34 +0100208 int32_t total;
209 int level;
Harald Welteb8b85a12016-06-17 00:06:42 +0200210
Neels Hofmeyr7c5346c2019-02-19 02:36:35 +0100211 if (!e->use)
212 return -EINVAL;
213
Neels Hofmeyrc4628a32018-12-07 14:47:34 +0100214 total = osmo_use_count_total(&vsub->use_count);
215
216 if (total == 0
217 || (total == 1 && old_use_count == 0 && e->count == 1))
218 level = LOGL_INFO;
219 else
220 level = LOGL_DEBUG;
221
222 LOGPSRC(DREF, level, file, line, "VLR subscr %s %s %s: now used by %s\n",
Neels Hofmeyr7c5346c2019-02-19 02:36:35 +0100223 vlr_subscr_name(vsub), (e->count - old_use_count) > 0? "+" : "-", e->use,
224 osmo_use_count_name_buf(buf, sizeof(buf), e->use_count));
225
226 if (e->count < 0)
227 return -ERANGE;
228
Neels Hofmeyrc4628a32018-12-07 14:47:34 +0100229 vsub->max_total_use_count = OSMO_MAX(vsub->max_total_use_count, total);
230
231 if (total <= 0)
Neels Hofmeyr7c5346c2019-02-19 02:36:35 +0100232 vlr_subscr_free(vsub);
233 return 0;
Harald Welteb8b85a12016-06-17 00:06:42 +0200234}
235
236/* Allocate a new subscriber and insert it into list */
237static struct vlr_subscr *_vlr_subscr_alloc(struct vlr_instance *vlr)
238{
239 struct vlr_subscr *vsub;
240 int i;
241
242 vsub = talloc_zero(vlr, struct vlr_subscr);
Neels Hofmeyr7c5346c2019-02-19 02:36:35 +0100243 *vsub = (struct vlr_subscr){
244 .vlr = vlr,
245 .tmsi = GSM_RESERVED_TMSI,
246 .tmsi_new = GSM_RESERVED_TMSI,
247 .use_count = (struct osmo_use_count){
248 .talloc_object = vsub,
249 .use_cb = vlr_subscr_use_cb,
250 },
Neels Hofmeyrc4628a32018-12-07 14:47:34 +0100251 .expire_lu = VLR_SUBSCRIBER_NO_EXPIRATION,
Neels Hofmeyr7c5346c2019-02-19 02:36:35 +0100252 };
253 osmo_use_count_make_static_entries(&vsub->use_count, vsub->use_count_buf, ARRAY_SIZE(vsub->use_count_buf));
Harald Welteb8b85a12016-06-17 00:06:42 +0200254
255 for (i = 0; i < ARRAY_SIZE(vsub->auth_tuples); i++)
Neels Hofmeyr8b6e5362018-11-30 02:57:33 +0100256 vsub->auth_tuples[i].key_seq = VLR_KEY_SEQ_INVAL;
Harald Welteb8b85a12016-06-17 00:06:42 +0200257
258 INIT_LLIST_HEAD(&vsub->cs.requests);
259 INIT_LLIST_HEAD(&vsub->ps.pdp_list);
260
Harald Welte0df904d2018-12-03 11:00:04 +0100261 /* Create an SGs FSM, which is needed to control CSFB,
262 * in cases where CSFB/SGs is not in use, this FSM will
263 * just do nothing. (see also: sgs_iface.c) */
264 vlr_sgs_fsm_create(vsub);
265
Harald Welteb8b85a12016-06-17 00:06:42 +0200266 llist_add_tail(&vsub->list, &vlr->subscribers);
267 return vsub;
268}
269
Harald Welteb8b85a12016-06-17 00:06:42 +0200270/* Send a GSUP Purge MS request.
271 * TODO: this should be sent to the *previous* VLR when this VLR is "taking"
272 * this subscriber, not to the HLR? */
273int vlr_subscr_purge(struct vlr_subscr *vsub)
274{
275 struct osmo_gsup_message gsup_msg = {0};
276
277 gsup_msg.message_type = OSMO_GSUP_MSGT_PURGE_MS_REQUEST;
278
279 /* provide HLR number in case we know it */
280 gsup_msg.hlr_enc_len = vsub->hlr.len;
281 gsup_msg.hlr_enc = vsub->hlr.buf;
282
283 return vlr_subscr_tx_gsup_message(vsub, &gsup_msg);
284}
285
Neels Hofmeyr15809592018-04-06 02:57:51 +0200286void vlr_subscr_cancel_attach_fsm(struct vlr_subscr *vsub,
287 enum osmo_fsm_term_cause fsm_cause,
288 uint8_t gsm48_cause)
Harald Welteb8b85a12016-06-17 00:06:42 +0200289{
290 if (!vsub)
291 return;
292
Neels Hofmeyr7c5346c2019-02-19 02:36:35 +0100293 vlr_subscr_get(vsub, __func__);
Neels Hofmeyr15809592018-04-06 02:57:51 +0200294 if (vsub->lu_fsm)
295 vlr_loc_update_cancel(vsub->lu_fsm, fsm_cause, gsm48_cause);
Harald Welteb8b85a12016-06-17 00:06:42 +0200296 if (vsub->proc_arq_fsm)
Neels Hofmeyr15809592018-04-06 02:57:51 +0200297 vlr_parq_cancel(vsub->proc_arq_fsm, fsm_cause, gsm48_cause);
Neels Hofmeyr7c5346c2019-02-19 02:36:35 +0100298 vlr_subscr_put(vsub, __func__);
Harald Welteb8b85a12016-06-17 00:06:42 +0200299}
300
301/* Call vlr_subscr_cancel(), then completely drop the entry from the VLR */
302void vlr_subscr_free(struct vlr_subscr *vsub)
303{
304 llist_del(&vsub->list);
Neels Hofmeyrc4628a32018-12-07 14:47:34 +0100305 DEBUGP(DVLR, "freeing VLR subscr %s (max total use count was %d)\n", vlr_subscr_name(vsub),
306 vsub->max_total_use_count);
Harald Welte0df904d2018-12-03 11:00:04 +0100307
308 /* Make sure SGs timer Ts5 is removed */
309 osmo_timer_del(&vsub->sgs.Ts5);
310
311 /* Remove SGs FSM (see also: sgs_iface.c) */
312 vlr_sgs_fsm_remove(vsub);
313
Harald Welteb8b85a12016-06-17 00:06:42 +0200314 talloc_free(vsub);
315}
316
317/* Generate a new TMSI and store in vsub->tmsi_new.
318 * Search all known subscribers to ensure that the TMSI is unique. */
319int vlr_subscr_alloc_tmsi(struct vlr_subscr *vsub)
320{
321 struct vlr_instance *vlr = vsub->vlr;
322 uint32_t tmsi;
Max753c15d2017-12-21 14:50:44 +0100323 int tried, rc;
Neels Hofmeyr7c5346c2019-02-19 02:36:35 +0100324 struct vlr_subscr *other_vsub;
Harald Welteb8b85a12016-06-17 00:06:42 +0200325
326 for (tried = 0; tried < 100; tried++) {
Max753c15d2017-12-21 14:50:44 +0100327 rc = osmo_get_rand_id((uint8_t *) &tmsi, sizeof(tmsi));
328 if (rc < 0) {
329 LOGP(DDB, LOGL_ERROR, "osmo_get_rand_id() failed: %s\n", strerror(-rc));
330 return rc;
Harald Welteb8b85a12016-06-17 00:06:42 +0200331 }
332 /* throw the dice again, if the TSMI doesn't fit */
333 if (tmsi == GSM_RESERVED_TMSI)
334 continue;
335
336 /* Section 2.4 of 23.003: MSC has two MSB 00/01/10, SGSN 11 */
337 if (vlr->cfg.is_ps) {
338 /* SGSN */
Eric Wild58abc672019-06-14 16:11:08 +0200339 tmsi |= GSM23003_TMSI_SGSN_MASK;
Harald Welteb8b85a12016-06-17 00:06:42 +0200340 } else {
341 /* MSC */
Eric Wild58abc672019-06-14 16:11:08 +0200342 if ((tmsi & GSM23003_TMSI_SGSN_MASK) == GSM23003_TMSI_SGSN_MASK)
343 tmsi &= ~GSM23003_TMSI_SGSN_MASK;
Harald Welteb8b85a12016-06-17 00:06:42 +0200344 }
345
346 /* If this TMSI is already in use, try another one. */
Neels Hofmeyr7c5346c2019-02-19 02:36:35 +0100347 if ((other_vsub = vlr_subscr_find_by_tmsi(vlr, tmsi, __func__))) {
348 vlr_subscr_put(other_vsub, __func__);
Harald Welteb8b85a12016-06-17 00:06:42 +0200349 continue;
Neels Hofmeyr7c5346c2019-02-19 02:36:35 +0100350 }
Harald Welteb8b85a12016-06-17 00:06:42 +0200351
352 vsub->tmsi_new = tmsi;
Neels Hofmeyr361e5712019-01-03 02:32:14 +0100353 vsub->vlr->ops.subscr_update(vsub);
Harald Welteb8b85a12016-06-17 00:06:42 +0200354 return 0;
355 }
356
357 LOGP(DVLR, LOGL_ERROR, "subscr %s: unable to generate valid TMSI"
358 " after %d tries\n", vlr_subscr_name(vsub), tried);
359 return -1;
360}
361
362/* Find subscriber by IMSI, or create new subscriber if not found.
363 * \param[in] vlr VLR instace.
364 * \param[in] imsi IMSI string.
365 * \param[out] created if non-NULL, returns whether a new entry was created. */
366struct vlr_subscr *_vlr_subscr_find_or_create_by_imsi(struct vlr_instance *vlr,
367 const char *imsi,
Neels Hofmeyr7c5346c2019-02-19 02:36:35 +0100368 const char *use,
Harald Welteb8b85a12016-06-17 00:06:42 +0200369 bool *created,
370 const char *file,
371 int line)
372{
373 struct vlr_subscr *vsub;
Neels Hofmeyr7c5346c2019-02-19 02:36:35 +0100374 vsub = _vlr_subscr_find_by_imsi(vlr, imsi, use, file, line);
Harald Welteb8b85a12016-06-17 00:06:42 +0200375 if (vsub) {
376 if (created)
377 *created = false;
378 return vsub;
379 }
380
Neels Hofmeyr7c5346c2019-02-19 02:36:35 +0100381 vsub = _vlr_subscr_alloc(vlr);
Harald Welteb8b85a12016-06-17 00:06:42 +0200382 if (!vsub)
383 return NULL;
Neels Hofmeyr7c5346c2019-02-19 02:36:35 +0100384 vlr_subscr_get_src(vsub, use, file, line);
Harald Welteb8b85a12016-06-17 00:06:42 +0200385 vlr_subscr_set_imsi(vsub, imsi);
386 LOGP(DVLR, LOGL_INFO, "New subscr, IMSI: %s\n", vsub->imsi);
387 if (created)
388 *created = true;
389 return vsub;
390}
391
392/* Find subscriber by TMSI, or create new subscriber if not found.
393 * \param[in] vlr VLR instace.
394 * \param[in] tmsi TMSI.
395 * \param[out] created if non-NULL, returns whether a new entry was created. */
396struct vlr_subscr *_vlr_subscr_find_or_create_by_tmsi(struct vlr_instance *vlr,
397 uint32_t tmsi,
Neels Hofmeyr7c5346c2019-02-19 02:36:35 +0100398 const char *use,
Harald Welteb8b85a12016-06-17 00:06:42 +0200399 bool *created,
400 const char *file,
401 int line)
402{
403 struct vlr_subscr *vsub;
Neels Hofmeyr7c5346c2019-02-19 02:36:35 +0100404 vsub = _vlr_subscr_find_by_tmsi(vlr, tmsi, use, file, line);
Harald Welteb8b85a12016-06-17 00:06:42 +0200405 if (vsub) {
406 if (created)
407 *created = false;
408 return vsub;
409 }
410
Neels Hofmeyr7c5346c2019-02-19 02:36:35 +0100411 vsub = _vlr_subscr_alloc(vlr);
Harald Welteb8b85a12016-06-17 00:06:42 +0200412 if (!vsub)
413 return NULL;
Neels Hofmeyr7c5346c2019-02-19 02:36:35 +0100414 vlr_subscr_get_src(vsub, use, file, line);
Harald Welteb8b85a12016-06-17 00:06:42 +0200415 vsub->tmsi = tmsi;
416 LOGP(DVLR, LOGL_INFO, "New subscr, TMSI: 0x%08x\n", vsub->tmsi);
417 if (created)
418 *created = true;
419 return vsub;
420}
421
422void vlr_subscr_set_imsi(struct vlr_subscr *vsub, const char *imsi)
423{
424 if (!vsub)
425 return;
Stefan Sperling9fbb6002018-06-25 17:31:59 +0200426
427 if (OSMO_STRLCPY_ARRAY(vsub->imsi, imsi) >= sizeof(vsub->imsi)) {
428 LOGP(DVLR, LOGL_NOTICE, "IMSI was truncated: full IMSI=%s, truncated IMSI=%s\n",
429 imsi, vsub->imsi);
430 /* XXX Set truncated IMSI anyway, we currently cannot return an error from here. */
431 }
432
Harald Welteb8b85a12016-06-17 00:06:42 +0200433 vsub->id = atoll(vsub->imsi);
434 DEBUGP(DVLR, "set IMSI on subscriber; IMSI=%s id=%llu\n",
435 vsub->imsi, vsub->id);
436}
437
438void vlr_subscr_set_imei(struct vlr_subscr *vsub, const char *imei)
439{
440 if (!vsub)
441 return;
Max98f74672018-02-05 12:57:06 +0100442 OSMO_STRLCPY_ARRAY(vsub->imei, imei);
Harald Welteb8b85a12016-06-17 00:06:42 +0200443 DEBUGP(DVLR, "set IMEI on subscriber; IMSI=%s IMEI=%s\n",
444 vsub->imsi, vsub->imei);
445}
446
447void vlr_subscr_set_imeisv(struct vlr_subscr *vsub, const char *imeisv)
448{
449 if (!vsub)
450 return;
Max98f74672018-02-05 12:57:06 +0100451 OSMO_STRLCPY_ARRAY(vsub->imeisv, imeisv);
Harald Welteb8b85a12016-06-17 00:06:42 +0200452 DEBUGP(DVLR, "set IMEISV on subscriber; IMSI=%s IMEISV=%s\n",
453 vsub->imsi, vsub->imeisv);
Oliver Smithb8077b02019-05-07 14:13:55 +0200454
455 /* Copy IMEISV to IMEI (additional SV digits get cut off) */
456 vlr_subscr_set_imei(vsub, imeisv);
Harald Welteb8b85a12016-06-17 00:06:42 +0200457}
458
459/* Safely copy the given MSISDN string to vsub->msisdn */
460void vlr_subscr_set_msisdn(struct vlr_subscr *vsub, const char *msisdn)
461{
462 if (!vsub)
463 return;
Max98f74672018-02-05 12:57:06 +0100464 OSMO_STRLCPY_ARRAY(vsub->msisdn, msisdn);
Harald Welteb8b85a12016-06-17 00:06:42 +0200465 DEBUGP(DVLR, "set MSISDN on subscriber; IMSI=%s MSISDN=%s\n",
466 vsub->imsi, vsub->msisdn);
467}
468
469bool vlr_subscr_matches_imsi(struct vlr_subscr *vsub, const char *imsi)
470{
471 return vsub && imsi && vsub->imsi[0] && !strcmp(vsub->imsi, imsi);
472}
473
474bool vlr_subscr_matches_tmsi(struct vlr_subscr *vsub, uint32_t tmsi)
475{
476 return vsub && tmsi != GSM_RESERVED_TMSI
477 && (vsub->tmsi == tmsi || vsub->tmsi_new == tmsi);
478}
479
480bool vlr_subscr_matches_msisdn(struct vlr_subscr *vsub, const char *msisdn)
481{
482 return vsub && msisdn && vsub->msisdn[0]
483 && !strcmp(vsub->msisdn, msisdn);
484}
485
486bool vlr_subscr_matches_imei(struct vlr_subscr *vsub, const char *imei)
487{
488 return vsub && imei && vsub->imei[0]
489 && !strcmp(vsub->imei, imei);
490}
491
492/* Send updated subscriber information to HLR */
493int vlr_subscr_changed(struct vlr_subscr *vsub)
494{
495 /* FIXME */
496 LOGP(DVLR, LOGL_ERROR, "Not implemented: %s\n", __func__);
497 return 0;
498}
499
Stefan Sperlingdefc3c82018-05-15 14:48:04 +0200500void vlr_subscr_enable_expire_lu(struct vlr_subscr *vsub)
501{
502 struct gsm_network *net = vsub->vlr->user_ctx; /* XXX move t3212 into struct vlr_instance? */
503 struct timespec now;
504
505 /* The T3212 timeout value field is coded as the binary representation of the timeout
506 * value for periodic updating in decihours. Mark the subscriber as inactive if it missed
507 * two consecutive location updates. Timeout is twice the t3212 value plus one minute. */
508 if (osmo_clock_gettime(CLOCK_MONOTONIC, &now) == 0) {
509 vsub->expire_lu = now.tv_sec + (net->t3212 * 60 * 6 * 2) + 60;
510 } else {
511 LOGP(DVLR, LOGL_ERROR,
512 "%s: Could not enable Location Update expiry: unable to read current time\n", vlr_subscr_name(vsub));
513 /* Disable LU expiry for this subscriber. This subscriber will only be freed after an explicit IMSI detach. */
514 vsub->expire_lu = VLR_SUBSCRIBER_NO_EXPIRATION;
515 }
516}
517
518void vlr_subscr_expire_lu(void *data)
519{
520 struct vlr_instance *vlr = data;
521 struct vlr_subscr *vsub, *vsub_tmp;
Vadim Yanitskiy718f32f2019-06-19 03:13:40 +0700522 struct gsm_network *net;
Stefan Sperlingdefc3c82018-05-15 14:48:04 +0200523 struct timespec now;
524
Vadim Yanitskiy718f32f2019-06-19 03:13:40 +0700525 /* Periodic location update might be disabled from the VTY,
526 * so we shall not expire subscribers until explicit IMSI Detach. */
527 net = vlr->user_ctx; /* XXX move t3212 into struct vlr_instance? */
528 if (!net->t3212)
529 goto done;
530
Stefan Sperlingdefc3c82018-05-15 14:48:04 +0200531 if (llist_empty(&vlr->subscribers))
532 goto done;
533
534 if (osmo_clock_gettime(CLOCK_MONOTONIC, &now) != 0) {
535 LOGP(DVLR, LOGL_ERROR, "Skipping Location Update expiry: Could not read current time\n");
536 goto done;
537 }
538
539 llist_for_each_entry_safe(vsub, vsub_tmp, &vlr->subscribers, list) {
540 if (vsub->expire_lu == VLR_SUBSCRIBER_NO_EXPIRATION || vsub->expire_lu > now.tv_sec)
541 continue;
542
543 LOGP(DVLR, LOGL_DEBUG, "%s: Location Update expired\n", vlr_subscr_name(vsub));
544 vlr_subscr_rx_imsi_detach(vsub);
545 }
546
547done:
548 osmo_timer_schedule(&vlr->lu_expire_timer, VLR_SUBSCRIBER_LU_EXPIRATION_INTERVAL, 0);
549}
550
Harald Welteb8b85a12016-06-17 00:06:42 +0200551/***********************************************************************
552 * PDP context data
553 ***********************************************************************/
554
Neels Hofmeyrbac22762017-07-06 18:39:28 +0200555#define GSM_APN_LENGTH 102
556
557/* see GSM 09.02, 17.7.1, PDP-Context and GPRSSubscriptionData */
558/* see GSM 09.02, B.1, gprsSubscriptionData */
559struct sgsn_subscriber_pdp_data {
560 struct llist_head list;
561
562 unsigned int context_id;
563 uint16_t pdp_type;
564 char apn_str[GSM_APN_LENGTH];
565 uint8_t qos_subscribed[20];
566 size_t qos_subscribed_len;
567};
568
Harald Welteb8b85a12016-06-17 00:06:42 +0200569struct sgsn_subscriber_pdp_data *
570vlr_subscr_pdp_data_alloc(struct vlr_subscr *vsub)
571{
572 struct sgsn_subscriber_pdp_data* pdata;
573
574 pdata = talloc_zero(vsub, struct sgsn_subscriber_pdp_data);
575
576 llist_add_tail(&pdata->list, &vsub->ps.pdp_list);
577
578 return pdata;
579}
580
581static int vlr_subscr_pdp_data_clear(struct vlr_subscr *vsub)
582{
583 struct sgsn_subscriber_pdp_data *pdp, *pdp2;
584 int count = 0;
585
586 llist_for_each_entry_safe(pdp, pdp2, &vsub->ps.pdp_list, list) {
587 llist_del(&pdp->list);
588 talloc_free(pdp);
589 count += 1;
590 }
591
592 return count;
593}
594
595static struct sgsn_subscriber_pdp_data *
596vlr_subscr_pdp_data_get_by_id(struct vlr_subscr *vsub, unsigned context_id)
597{
598 struct sgsn_subscriber_pdp_data *pdp;
599
600 llist_for_each_entry(pdp, &vsub->ps.pdp_list, list) {
601 if (pdp->context_id == context_id)
602 return pdp;
603 }
604
605 return NULL;
606}
607
608/***********************************************************************
609 * Actual Implementation
610 ***********************************************************************/
611
612static int vlr_rx_gsup_unknown_imsi(struct vlr_instance *vlr,
Neels Hofmeyrc4628a32018-12-07 14:47:34 +0100613 const struct osmo_gsup_message *gsup_msg)
Harald Welteb8b85a12016-06-17 00:06:42 +0200614{
615 if (OSMO_GSUP_IS_MSGT_REQUEST(gsup_msg->message_type)) {
Harald Welteb8b85a12016-06-17 00:06:42 +0200616 LOGP(DVLR, LOGL_NOTICE,
617 "Unknown IMSI %s, discarding GSUP request "
618 "of type 0x%02x\n",
619 gsup_msg->imsi, gsup_msg->message_type);
Neels Hofmeyrc4628a32018-12-07 14:47:34 +0100620 gsup_client_mux_tx_error_reply(vlr->gcm, gsup_msg, GMM_CAUSE_IMSI_UNKNOWN);
Harald Welteb8b85a12016-06-17 00:06:42 +0200621 } else if (OSMO_GSUP_IS_MSGT_ERROR(gsup_msg->message_type)) {
622 LOGP(DVLR, LOGL_NOTICE,
623 "Unknown IMSI %s, discarding GSUP error "
624 "of type 0x%02x, cause '%s' (%d)\n",
625 gsup_msg->imsi, gsup_msg->message_type,
626 get_value_string(gsm48_gmm_cause_names, gsup_msg->cause),
627 gsup_msg->cause);
628 } else {
629 LOGP(DVLR, LOGL_NOTICE,
630 "Unknown IMSI %s, discarding GSUP response "
631 "of type 0x%02x\n",
632 gsup_msg->imsi, gsup_msg->message_type);
633 }
634
635 return -GMM_CAUSE_IMSI_UNKNOWN;
636}
637
638static int vlr_rx_gsup_purge_no_subscr(struct vlr_instance *vlr,
Neels Hofmeyrc4628a32018-12-07 14:47:34 +0100639 const struct osmo_gsup_message *gsup_msg)
Harald Welteb8b85a12016-06-17 00:06:42 +0200640{
641 if (OSMO_GSUP_IS_MSGT_ERROR(gsup_msg->message_type)) {
642 LOGGSUPP(LOGL_NOTICE, gsup_msg,
643 "Purge MS has failed with cause '%s' (%d)\n",
644 get_value_string(gsm48_gmm_cause_names, gsup_msg->cause),
645 gsup_msg->cause);
646 return -gsup_msg->cause;
647 }
648 LOGGSUPP(LOGL_INFO, gsup_msg, "Completing purge MS\n");
649 return 0;
650}
651
652/* VLR internal call to request UpdateLocation from HLR */
Philipp Maier6038ad42018-11-13 13:55:09 +0100653int vlr_subscr_req_lu(struct vlr_subscr *vsub)
Harald Welteb8b85a12016-06-17 00:06:42 +0200654{
655 struct osmo_gsup_message gsup_msg = {0};
656 int rc;
657
658 gsup_msg.message_type = OSMO_GSUP_MSGT_UPDATE_LOCATION_REQUEST;
Neels Hofmeyrd0756b12018-09-28 02:41:39 +0200659 gsup_msg.cn_domain = vsub->vlr->cfg.is_ps ? OSMO_GSUP_CN_DOMAIN_PS : OSMO_GSUP_CN_DOMAIN_CS;
Harald Welteb8b85a12016-06-17 00:06:42 +0200660 rc = vlr_subscr_tx_gsup_message(vsub, &gsup_msg);
661
662 return rc;
663}
664
665/* VLR internal call to request tuples from HLR */
666int vlr_subscr_req_sai(struct vlr_subscr *vsub,
667 const uint8_t *auts, const uint8_t *auts_rand)
668{
669 struct osmo_gsup_message gsup_msg = {0};
670
671 gsup_msg.message_type = OSMO_GSUP_MSGT_SEND_AUTH_INFO_REQUEST;
672 gsup_msg.auts = auts;
673 gsup_msg.rand = auts_rand;
674
675 return vlr_subscr_tx_gsup_message(vsub, &gsup_msg);
676}
677
Oliver Smith7d053092018-12-14 17:37:38 +0100678/* Initiate Check_IMEI_VLR Procedure (23.018 Chapter 7.1.2.9) */
679int vlr_subscr_tx_req_check_imei(const struct vlr_subscr *vsub)
680{
Neels Hofmeyrc4628a32018-12-07 14:47:34 +0100681 struct osmo_gsup_message gsup_msg = {
682 .message_class = OSMO_GSUP_MESSAGE_CLASS_SUBSCRIBER_MANAGEMENT,
Vadim Yanitskiyed73ae12019-08-15 22:51:20 +0200683 .message_type = OSMO_GSUP_MSGT_CHECK_IMEI_REQUEST,
Neels Hofmeyrc4628a32018-12-07 14:47:34 +0100684 };
Oliver Smith7d053092018-12-14 17:37:38 +0100685 uint8_t imei_enc[GSM23003_IMEI_NUM_DIGITS+2]; /* +2: IE header */
686 int len;
687
688 /* Encode IMEI */
689 len = gsm48_encode_bcd_number(imei_enc, sizeof(imei_enc), 0, vsub->imei);
690 if (len < 1) {
691 LOGVSUBP(LOGL_ERROR, vsub, "Error: cannot encode IMEI '%s'\n", vsub->imei);
692 return -ENOSPC;
693 }
694 gsup_msg.imei_enc = imei_enc;
695 gsup_msg.imei_enc_len = len;
696
697 /* Send CHECK_IMEI_REQUEST */
Oliver Smith7d053092018-12-14 17:37:38 +0100698 OSMO_STRLCPY_ARRAY(gsup_msg.imsi, vsub->imsi);
Neels Hofmeyrc4628a32018-12-07 14:47:34 +0100699 return gsup_client_mux_tx(vsub->vlr->gcm, &gsup_msg);
Oliver Smith7d053092018-12-14 17:37:38 +0100700}
701
Harald Welteb8b85a12016-06-17 00:06:42 +0200702/* Tell HLR that authentication failure occurred */
Max923a2392018-01-24 13:55:03 +0100703int vlr_subscr_tx_auth_fail_rep(const struct vlr_subscr *vsub)
Harald Welteb8b85a12016-06-17 00:06:42 +0200704{
Neels Hofmeyrc4628a32018-12-07 14:47:34 +0100705 struct osmo_gsup_message gsup_msg = {
706 .message_class = OSMO_GSUP_MESSAGE_CLASS_SUBSCRIBER_MANAGEMENT,
Vadim Yanitskiyed73ae12019-08-15 22:51:20 +0200707 .message_type = OSMO_GSUP_MSGT_AUTH_FAIL_REPORT,
Neels Hofmeyrc4628a32018-12-07 14:47:34 +0100708 };
Harald Welteb8b85a12016-06-17 00:06:42 +0200709
Max98f74672018-02-05 12:57:06 +0100710 OSMO_STRLCPY_ARRAY(gsup_msg.imsi, vsub->imsi);
Neels Hofmeyrc4628a32018-12-07 14:47:34 +0100711 return gsup_client_mux_tx(vsub->vlr->gcm, &gsup_msg);
Harald Welteb8b85a12016-06-17 00:06:42 +0200712}
713
714/* Update the subscriber with GSUP-received auth tuples */
715void vlr_subscr_update_tuples(struct vlr_subscr *vsub,
716 const struct osmo_gsup_message *gsup)
717{
718 unsigned int i;
719 unsigned int got_tuples;
720
721 if (gsup->num_auth_vectors) {
722 memset(&vsub->auth_tuples, 0, sizeof(vsub->auth_tuples));
723 for (i = 0; i < ARRAY_SIZE(vsub->auth_tuples); i++)
Neels Hofmeyr8b6e5362018-11-30 02:57:33 +0100724 vsub->auth_tuples[i].key_seq = VLR_KEY_SEQ_INVAL;
Harald Welteb8b85a12016-06-17 00:06:42 +0200725 }
726
727 got_tuples = 0;
728 for (i = 0; i < gsup->num_auth_vectors; i++) {
729 size_t key_seq = i;
730
731 if (key_seq >= ARRAY_SIZE(vsub->auth_tuples)) {
732 LOGVSUBP(LOGL_NOTICE, vsub,
733 "Skipping auth tuple wih invalid cksn %zu\n",
734 key_seq);
735 continue;
736 }
737 vsub->auth_tuples[i].vec = gsup->auth_vectors[i];
738 vsub->auth_tuples[i].key_seq = key_seq;
Max5e2e9bd2018-02-06 19:31:08 +0100739 got_tuples++;
Harald Welteb8b85a12016-06-17 00:06:42 +0200740 }
741
742 LOGVSUBP(LOGL_DEBUG, vsub, "Received %u auth tuples\n", got_tuples);
743
744 if (!got_tuples) {
745 /* FIXME what now? */
746 // vlr_subscr_cancel(vsub, GMM_CAUSE_GSM_AUTH_UNACCEPT); ?
747 }
748
749 /* New tuples means last_tuple becomes invalid */
750 vsub->last_tuple = NULL;
751}
752
753/* Handle SendAuthInfo Result/Error from HLR */
754static int vlr_subscr_handle_sai_res(struct vlr_subscr *vsub,
755 const struct osmo_gsup_message *gsup)
756{
757 struct osmo_fsm_inst *auth_fi = vsub->auth_fsm;
758 void *data = (void *) gsup;
759
Neels Hofmeyr1bfe0e12019-09-16 18:07:54 +0200760 if (!auth_fi) {
761 LOGVSUBP(LOGL_ERROR, vsub, "Received GSUP %s, but there is no auth_fsm\n",
762 osmo_gsup_message_type_name(gsup->message_type));
763 return -1;
764 }
765
Harald Welteb8b85a12016-06-17 00:06:42 +0200766 switch (gsup->message_type) {
767 case OSMO_GSUP_MSGT_SEND_AUTH_INFO_RESULT:
768 osmo_fsm_inst_dispatch(auth_fi, VLR_AUTH_E_HLR_SAI_ACK, data);
769 break;
770 case OSMO_GSUP_MSGT_SEND_AUTH_INFO_ERROR:
771 osmo_fsm_inst_dispatch(auth_fi, VLR_AUTH_E_HLR_SAI_NACK, data);
772 break;
773 default:
774 return -1;
775 }
776
777 return 0;
778}
779
Harald Welteb8b85a12016-06-17 00:06:42 +0200780static void vlr_subscr_gsup_insert_data(struct vlr_subscr *vsub,
781 const struct osmo_gsup_message *gsup_msg)
782{
783 unsigned idx;
784 int rc;
785
Maxa263bb22017-12-27 13:23:44 +0100786 if (gsup_msg->msisdn_enc) {//FIXME: vlr_subscr_set_msisdn()?
Neels Hofmeyrc4628a32018-12-07 14:47:34 +0100787 gsm48_decode_bcd_number2(vsub->msisdn, sizeof(vsub->msisdn),
788 gsup_msg->msisdn_enc,
789 gsup_msg->msisdn_enc_len, 0);
Harald Welteb8b85a12016-06-17 00:06:42 +0200790 LOGP(DVLR, LOGL_DEBUG, "IMSI:%s has MSISDN:%s\n",
791 vsub->imsi, vsub->msisdn);
792 }
793
794 if (gsup_msg->hlr_enc) {
795 if (gsup_msg->hlr_enc_len > sizeof(vsub->hlr.buf)) {
796 LOGP(DVLR, LOGL_ERROR, "HLR-Number too long (%zu)\n",
797 gsup_msg->hlr_enc_len);
798 vsub->hlr.len = 0;
799 } else {
800 memcpy(vsub->hlr.buf, gsup_msg->hlr_enc,
801 gsup_msg->hlr_enc_len);
802 vsub->hlr.len = gsup_msg->hlr_enc_len;
803 }
804 }
805
806 if (gsup_msg->pdp_info_compl) {
807 rc = vlr_subscr_pdp_data_clear(vsub);
808 if (rc > 0)
809 LOGP(DVLR, LOGL_INFO, "Cleared existing PDP info\n");
810 }
811
812 for (idx = 0; idx < gsup_msg->num_pdp_infos; idx++) {
813 const struct osmo_gsup_pdp_info *pdp_info = &gsup_msg->pdp_infos[idx];
814 size_t ctx_id = pdp_info->context_id;
815 struct sgsn_subscriber_pdp_data *pdp_data;
816
817 if (pdp_info->apn_enc_len >= sizeof(pdp_data->apn_str)-1) {
818 LOGVSUBP(LOGL_ERROR, vsub,
819 "APN too long, context id = %zu, APN = %s\n",
820 ctx_id, osmo_hexdump(pdp_info->apn_enc,
821 pdp_info->apn_enc_len));
822 continue;
823 }
824
825 if (pdp_info->qos_enc_len > sizeof(pdp_data->qos_subscribed)) {
826 LOGVSUBP(LOGL_ERROR, vsub,
827 "QoS info too long (%zu)\n",
828 pdp_info->qos_enc_len);
829 continue;
830 }
831
832 LOGVSUBP(LOGL_INFO, vsub,
833 "Will set PDP info, context id = %zu, APN = %s\n",
834 ctx_id, osmo_hexdump(pdp_info->apn_enc, pdp_info->apn_enc_len));
835
836 /* Set PDP info [ctx_id] */
837 pdp_data = vlr_subscr_pdp_data_get_by_id(vsub, ctx_id);
838 if (!pdp_data) {
839 pdp_data = vlr_subscr_pdp_data_alloc(vsub);
840 pdp_data->context_id = ctx_id;
841 }
842
843 OSMO_ASSERT(pdp_data != NULL);
844 pdp_data->pdp_type = pdp_info->pdp_type;
845 osmo_apn_to_str(pdp_data->apn_str,
846 pdp_info->apn_enc, pdp_info->apn_enc_len);
847 memcpy(pdp_data->qos_subscribed, pdp_info->qos_enc, pdp_info->qos_enc_len);
848 pdp_data->qos_subscribed_len = pdp_info->qos_enc_len;
849 }
850}
851
852
853/* Handle InsertSubscrData Result from HLR */
854static int vlr_subscr_handle_isd_req(struct vlr_subscr *vsub,
855 const struct osmo_gsup_message *gsup)
856{
857 struct osmo_gsup_message gsup_reply = {0};
858
859 vlr_subscr_gsup_insert_data(vsub, gsup);
860 vsub->vlr->ops.subscr_update(vsub);
861
862 gsup_reply.message_type = OSMO_GSUP_MSGT_INSERT_DATA_RESULT;
863 return vlr_subscr_tx_gsup_message(vsub, &gsup_reply);
864}
865
866/* Handle UpdateLocation Result from HLR */
867static int vlr_subscr_handle_lu_res(struct vlr_subscr *vsub,
868 const struct osmo_gsup_message *gsup)
869{
Philipp Maier483cea82019-04-03 16:23:29 +0200870 struct sgs_lu_response sgs_lu_response = {0};
Harald Welte0df904d2018-12-03 11:00:04 +0100871 bool sgs_lu_in_progress = false;
872
873 if (vsub->sgs_fsm->state == SGS_UE_ST_LA_UPD_PRES)
874 sgs_lu_in_progress = true;
875
876 if (!vsub->lu_fsm && !sgs_lu_in_progress) {
Harald Welteb8b85a12016-06-17 00:06:42 +0200877 LOGVSUBP(LOGL_ERROR, vsub, "Rx GSUP LU Result "
878 "without LU in progress\n");
879 return -ENODEV;
880 }
881
882 /* contrary to MAP, we allow piggy-backing subscriber data onto the
883 * UPDATE LOCATION RESULT, and don't mandate the use of a separate
884 * nested INSERT SUBSCRIBER DATA transaction */
885 vlr_subscr_gsup_insert_data(vsub, gsup);
886
Harald Welte0df904d2018-12-03 11:00:04 +0100887 if (sgs_lu_in_progress) {
888 sgs_lu_response.accepted = true;
889 sgs_lu_response.vsub = vsub;
890 vsub->sgs.response_cb(&sgs_lu_response);
891 } else
892 osmo_fsm_inst_dispatch(vsub->lu_fsm, VLR_ULA_E_HLR_LU_RES, NULL);
Harald Welteb8b85a12016-06-17 00:06:42 +0200893
894 return 0;
895}
896
897/* Handle UpdateLocation Result from HLR */
898static int vlr_subscr_handle_lu_err(struct vlr_subscr *vsub,
899 const struct osmo_gsup_message *gsup)
900{
Philipp Maier483cea82019-04-03 16:23:29 +0200901 struct sgs_lu_response sgs_lu_response = {0};
Harald Welte0df904d2018-12-03 11:00:04 +0100902 bool sgs_lu_in_progress = false;
903
904 if (vsub->sgs_fsm->state == SGS_UE_ST_LA_UPD_PRES)
905 sgs_lu_in_progress = true;
906
907 if (!vsub->lu_fsm && !sgs_lu_in_progress) {
Harald Welteb8b85a12016-06-17 00:06:42 +0200908 LOGVSUBP(LOGL_ERROR, vsub, "Rx GSUP LU Error "
909 "without LU in progress\n");
910 return -ENODEV;
911 }
912
913 LOGVSUBP(LOGL_DEBUG, vsub, "UpdateLocation failed; gmm_cause: %s\n",
914 get_value_string(gsm48_gmm_cause_names, gsup->cause));
915
Harald Welte0df904d2018-12-03 11:00:04 +0100916 if (sgs_lu_in_progress) {
917 sgs_lu_response.accepted = false;
918 sgs_lu_response.vsub = vsub;
919 vsub->sgs.response_cb(&sgs_lu_response);
920 } else
921 osmo_fsm_inst_dispatch(vsub->lu_fsm, VLR_ULA_E_HLR_LU_RES,
922 (void *)&gsup->cause);
Harald Welteb8b85a12016-06-17 00:06:42 +0200923 return 0;
924}
925
Alexander Couzens7312b152019-08-19 15:30:12 +0200926void vlr_gmm_cause_to_mm_cause(enum gsm48_gmm_cause gmm_cause,
927 enum gsm48_reject_value *gsm48_rej_p)
Neels Hofmeyr15809592018-04-06 02:57:51 +0200928{
Neels Hofmeyr15809592018-04-06 02:57:51 +0200929 enum gsm48_reject_value gsm48_rej = GSM48_REJECT_NETWORK_FAILURE;
930 switch (gmm_cause) {
931 case GMM_CAUSE_IMSI_UNKNOWN:
932 gsm48_rej = GSM48_REJECT_IMSI_UNKNOWN_IN_HLR;
933 break;
934 case GMM_CAUSE_ILLEGAL_MS:
935 gsm48_rej = GSM48_REJECT_ILLEGAL_MS;
936 break;
937 case GMM_CAUSE_IMEI_NOT_ACCEPTED:
938 gsm48_rej = GSM48_REJECT_IMEI_NOT_ACCEPTED;
939 break;
940 case GMM_CAUSE_ILLEGAL_ME:
941 gsm48_rej = GSM48_REJECT_ILLEGAL_ME;
942 break;
943 case GMM_CAUSE_GPRS_NOTALLOWED:
944 gsm48_rej = GSM48_REJECT_GPRS_NOT_ALLOWED;
945 break;
946 case GMM_CAUSE_GPRS_OTHER_NOTALLOWED:
947 gsm48_rej = GSM48_REJECT_SERVICES_NOT_ALLOWED;
948 break;
949 case GMM_CAUSE_MS_ID_NOT_DERIVED:
950 gsm48_rej = GSM48_REJECT_MS_IDENTITY_NOT_DERVIVABLE;
951 break;
952 case GMM_CAUSE_IMPL_DETACHED:
953 gsm48_rej = GSM48_REJECT_IMPLICITLY_DETACHED;
954 break;
955 case GMM_CAUSE_PLMN_NOTALLOWED:
956 gsm48_rej = GSM48_REJECT_PLMN_NOT_ALLOWED;
957 break;
958 case GMM_CAUSE_LA_NOTALLOWED:
959 gsm48_rej = GSM48_REJECT_LOC_NOT_ALLOWED;
960 break;
961 case GMM_CAUSE_ROAMING_NOTALLOWED:
962 gsm48_rej = GSM48_REJECT_ROAMING_NOT_ALLOWED;
963 break;
964 case GMM_CAUSE_NO_GPRS_PLMN:
965 gsm48_rej = GSM48_REJECT_GPRS_NOT_ALLOWED_IN_PLMN;
966 break;
967 case GMM_CAUSE_MSC_TEMP_NOTREACH:
968 gsm48_rej = GSM48_REJECT_MSC_TMP_NOT_REACHABLE;
969 break;
970 case GMM_CAUSE_SYNC_FAIL:
971 gsm48_rej = GSM48_REJECT_SYNCH_FAILURE;
972 break;
973 case GMM_CAUSE_CONGESTION:
974 gsm48_rej = GSM48_REJECT_CONGESTION;
975 break;
976 case GMM_CAUSE_SEM_INCORR_MSG:
977 gsm48_rej = GSM48_REJECT_INCORRECT_MESSAGE;
978 break;
979 case GMM_CAUSE_INV_MAND_INFO:
980 gsm48_rej = GSM48_REJECT_INVALID_MANDANTORY_INF;
981 break;
982 case GMM_CAUSE_MSGT_NOTEXIST_NOTIMPL:
983 gsm48_rej = GSM48_REJECT_MSG_TYPE_NOT_IMPLEMENTED;
984 break;
985 case GMM_CAUSE_MSGT_INCOMP_P_STATE:
986 gsm48_rej = GSM48_REJECT_MSG_TYPE_NOT_COMPATIBLE;
987 break;
988 case GMM_CAUSE_IE_NOTEXIST_NOTIMPL:
989 gsm48_rej = GSM48_REJECT_INF_ELEME_NOT_IMPLEMENTED;
990 break;
991 case GMM_CAUSE_COND_IE_ERR:
992 gsm48_rej = GSM48_REJECT_CONDTIONAL_IE_ERROR;
993 break;
994 case GMM_CAUSE_MSG_INCOMP_P_STATE:
995 gsm48_rej = GSM48_REJECT_MSG_NOT_COMPATIBLE;
996 break;
997 case GMM_CAUSE_PROTO_ERR_UNSPEC:
998 gsm48_rej = GSM48_REJECT_PROTOCOL_ERROR;
999 break;
1000
1001 case GMM_CAUSE_NO_SUIT_CELL_IN_LA:
1002 case GMM_CAUSE_MAC_FAIL:
1003 case GMM_CAUSE_GSM_AUTH_UNACCEPT:
1004 case GMM_CAUSE_NOT_AUTH_FOR_CSG:
1005 case GMM_CAUSE_SMS_VIA_GPRS_IN_RA:
1006 case GMM_CAUSE_NO_PDP_ACTIVATED:
1007 case GMM_CAUSE_NET_FAIL:
1008 gsm48_rej = GSM48_REJECT_NETWORK_FAILURE;
1009 break;
1010 }
Alexander Couzenseb1b03a2019-08-19 15:22:25 +02001011
1012 *gsm48_rej_p = gsm48_rej;
Neels Hofmeyr15809592018-04-06 02:57:51 +02001013}
1014
Harald Welteb8b85a12016-06-17 00:06:42 +02001015/* Handle LOCATION CANCEL request from HLR */
1016static int vlr_subscr_handle_cancel_req(struct vlr_subscr *vsub,
Neels Hofmeyrc4628a32018-12-07 14:47:34 +01001017 const struct osmo_gsup_message *gsup_msg)
Harald Welteb8b85a12016-06-17 00:06:42 +02001018{
Neels Hofmeyr15809592018-04-06 02:57:51 +02001019 enum gsm48_reject_value gsm48_rej;
Alexander Couzenseb1b03a2019-08-19 15:22:25 +02001020 enum osmo_fsm_term_cause fsm_cause = OSMO_FSM_TERM_ERROR;
Harald Welteb8b85a12016-06-17 00:06:42 +02001021 struct osmo_gsup_message gsup_reply = {0};
Max770fbd22018-01-24 12:48:33 +01001022 int rc, is_update_procedure = !gsup_msg->cancel_type ||
Harald Welteb8b85a12016-06-17 00:06:42 +02001023 gsup_msg->cancel_type == OSMO_GSUP_CANCEL_TYPE_UPDATE;
1024
1025 LOGVSUBP(LOGL_INFO, vsub, "Cancelling MS subscriber (%s)\n",
1026 is_update_procedure ?
1027 "update procedure" : "subscription withdraw");
1028
1029 gsup_reply.message_type = OSMO_GSUP_MSGT_LOCATION_CANCEL_RESULT;
Max770fbd22018-01-24 12:48:33 +01001030 rc = vlr_subscr_tx_gsup_message(vsub, &gsup_reply);
Harald Welteb8b85a12016-06-17 00:06:42 +02001031
Alexander Couzens7312b152019-08-19 15:30:12 +02001032 vlr_gmm_cause_to_mm_cause(gsup_msg->cause, &gsm48_rej);
Neels Hofmeyr15809592018-04-06 02:57:51 +02001033 vlr_subscr_cancel_attach_fsm(vsub, fsm_cause, gsm48_rej);
Harald Welteb8b85a12016-06-17 00:06:42 +02001034
Stefan Sperlingad797ce2018-12-10 18:33:30 +01001035 vlr_subscr_rx_imsi_detach(vsub);
1036
Max770fbd22018-01-24 12:48:33 +01001037 return rc;
Harald Welteb8b85a12016-06-17 00:06:42 +02001038}
1039
Oliver Smith7d053092018-12-14 17:37:38 +01001040/* Handle Check_IMEI_VLR result and error from HLR */
1041static int vlr_subscr_handle_check_imei(struct vlr_subscr *vsub, const struct osmo_gsup_message *gsup)
1042{
1043 if (!vsub->lu_fsm) {
1044 LOGVSUBP(LOGL_ERROR, vsub, "Rx %s without LU in progress\n",
1045 osmo_gsup_message_type_name(gsup->message_type));
1046 return -ENODEV;
1047 }
1048
Oliver Smithcbf2c932019-05-06 13:09:55 +02001049 /* Dispatch result to vsub->lu_fsm, which will either handle the result by itself (Check IMEI early) or dispatch
1050 * it further to lu_compl_vlr_fsm (Check IMEI after LU). */
Oliver Smith7d053092018-12-14 17:37:38 +01001051 if (gsup->message_type == OSMO_GSUP_MSGT_CHECK_IMEI_RESULT) {
1052 if (gsup->imei_result == OSMO_GSUP_IMEI_RESULT_ACK)
1053 osmo_fsm_inst_dispatch(vsub->lu_fsm, VLR_ULA_E_HLR_IMEI_ACK, NULL);
1054 else
1055 osmo_fsm_inst_dispatch(vsub->lu_fsm, VLR_ULA_E_HLR_IMEI_NACK, NULL);
1056 } else {
1057 LOGVSUBP(LOGL_ERROR, vsub, "Check_IMEI_VLR failed; gmm_cause: %s\n",
1058 get_value_string(gsm48_gmm_cause_names, gsup->cause));
1059 osmo_fsm_inst_dispatch(vsub->lu_fsm, VLR_ULA_E_HLR_IMEI_NACK, NULL);
1060 }
1061
1062 return 0;
1063}
1064
Harald Welteb8b85a12016-06-17 00:06:42 +02001065/* Incoming handler for GSUP from HLR.
1066 * Keep this function non-static for direct invocation by unit tests. */
Neels Hofmeyrc4628a32018-12-07 14:47:34 +01001067int vlr_gsup_rx(struct gsup_client_mux *gcm, void *data, const struct osmo_gsup_message *gsup)
Harald Welteb8b85a12016-06-17 00:06:42 +02001068{
Neels Hofmeyrc4628a32018-12-07 14:47:34 +01001069 struct vlr_instance *vlr = data;
Harald Welteb8b85a12016-06-17 00:06:42 +02001070 struct vlr_subscr *vsub;
Harald Welteb8b85a12016-06-17 00:06:42 +02001071 int rc;
1072
Neels Hofmeyrc4628a32018-12-07 14:47:34 +01001073 vsub = vlr_subscr_find_by_imsi(vlr, gsup->imsi, __func__);
Harald Welteb8b85a12016-06-17 00:06:42 +02001074 if (!vsub) {
Neels Hofmeyrc4628a32018-12-07 14:47:34 +01001075 switch (gsup->message_type) {
Harald Welteb8b85a12016-06-17 00:06:42 +02001076 case OSMO_GSUP_MSGT_PURGE_MS_RESULT:
1077 case OSMO_GSUP_MSGT_PURGE_MS_ERROR:
Neels Hofmeyrc4628a32018-12-07 14:47:34 +01001078 return vlr_rx_gsup_purge_no_subscr(vlr, gsup);
Harald Welteb8b85a12016-06-17 00:06:42 +02001079 default:
Neels Hofmeyrc4628a32018-12-07 14:47:34 +01001080 return vlr_rx_gsup_unknown_imsi(vlr, gsup);
Harald Welteb8b85a12016-06-17 00:06:42 +02001081 }
1082 }
1083
Neels Hofmeyrc4628a32018-12-07 14:47:34 +01001084 switch (gsup->message_type) {
Harald Welteb8b85a12016-06-17 00:06:42 +02001085 case OSMO_GSUP_MSGT_SEND_AUTH_INFO_RESULT:
1086 case OSMO_GSUP_MSGT_SEND_AUTH_INFO_ERROR:
Neels Hofmeyrc4628a32018-12-07 14:47:34 +01001087 rc = vlr_subscr_handle_sai_res(vsub, gsup);
Harald Welteb8b85a12016-06-17 00:06:42 +02001088 break;
1089 case OSMO_GSUP_MSGT_INSERT_DATA_REQUEST:
Neels Hofmeyrc4628a32018-12-07 14:47:34 +01001090 rc = vlr_subscr_handle_isd_req(vsub, gsup);
Harald Welteb8b85a12016-06-17 00:06:42 +02001091 break;
1092 case OSMO_GSUP_MSGT_LOCATION_CANCEL_REQUEST:
Neels Hofmeyrc4628a32018-12-07 14:47:34 +01001093 rc = vlr_subscr_handle_cancel_req(vsub, gsup);
Harald Welteb8b85a12016-06-17 00:06:42 +02001094 break;
1095 case OSMO_GSUP_MSGT_UPDATE_LOCATION_RESULT:
Neels Hofmeyrc4628a32018-12-07 14:47:34 +01001096 rc = vlr_subscr_handle_lu_res(vsub, gsup);
Harald Welteb8b85a12016-06-17 00:06:42 +02001097 break;
1098 case OSMO_GSUP_MSGT_UPDATE_LOCATION_ERROR:
Neels Hofmeyrc4628a32018-12-07 14:47:34 +01001099 rc = vlr_subscr_handle_lu_err(vsub, gsup);
Harald Welteb8b85a12016-06-17 00:06:42 +02001100 break;
1101 case OSMO_GSUP_MSGT_PURGE_MS_ERROR:
1102 case OSMO_GSUP_MSGT_PURGE_MS_RESULT:
1103 case OSMO_GSUP_MSGT_DELETE_DATA_REQUEST:
1104 LOGVSUBP(LOGL_ERROR, vsub,
1105 "Rx GSUP msg_type=%d not yet implemented\n",
Neels Hofmeyrc4628a32018-12-07 14:47:34 +01001106 gsup->message_type);
Harald Welteb8b85a12016-06-17 00:06:42 +02001107 rc = -GMM_CAUSE_MSGT_NOTEXIST_NOTIMPL;
1108 break;
Oliver Smith7d053092018-12-14 17:37:38 +01001109 case OSMO_GSUP_MSGT_CHECK_IMEI_ERROR:
1110 case OSMO_GSUP_MSGT_CHECK_IMEI_RESULT:
Neels Hofmeyrc4628a32018-12-07 14:47:34 +01001111 rc = vlr_subscr_handle_check_imei(vsub, gsup);
Oliver Smith7d053092018-12-14 17:37:38 +01001112 break;
Harald Welteb8b85a12016-06-17 00:06:42 +02001113 default:
Neels Hofmeyrc4628a32018-12-07 14:47:34 +01001114 LOGP(DLGSUP, LOGL_ERROR, "GSUP Message type not handled by VLR: %d\n", gsup->message_type);
1115 rc = -EINVAL;
Harald Welteb8b85a12016-06-17 00:06:42 +02001116 break;
1117 }
1118
Neels Hofmeyr7c5346c2019-02-19 02:36:35 +01001119 vlr_subscr_put(vsub, __func__);
Harald Welteb8b85a12016-06-17 00:06:42 +02001120 return rc;
1121}
1122
1123/* MSC->VLR: Subscriber has provided IDENTITY RESPONSE */
1124int vlr_subscr_rx_id_resp(struct vlr_subscr *vsub,
1125 const uint8_t *mi, size_t mi_len)
1126{
1127 char mi_string[GSM48_MI_SIZE];
1128 uint8_t mi_type = mi[0] & GSM_MI_TYPE_MASK;
1129
1130 gsm48_mi_to_string(mi_string, sizeof(mi_string), mi, mi_len);
1131
1132 /* update the vlr_subscr with the given identity */
1133 switch (mi_type) {
1134 case GSM_MI_TYPE_IMSI:
Stefan Sperling9fbb6002018-06-25 17:31:59 +02001135 if (strlen(mi_string) >= sizeof(vsub->imsi)) {
1136 LOGVSUBP(LOGL_ERROR, vsub, "IMSI in ID RESP too long (>%zu bytes): %s\n",
1137 sizeof(vsub->imsi) - 1, mi_string);
1138 return -ENOSPC; /* ignore message; do not avance LU FSM */
1139 } else if (vsub->imsi[0]
Harald Welteb8b85a12016-06-17 00:06:42 +02001140 && !vlr_subscr_matches_imsi(vsub, mi_string)) {
1141 LOGVSUBP(LOGL_ERROR, vsub, "IMSI in ID RESP differs:"
1142 " %s\n", mi_string);
Stefan Sperling9fbb6002018-06-25 17:31:59 +02001143 /* XXX Should we return an error, e.g. -EINVAL ? */
Harald Welteb8b85a12016-06-17 00:06:42 +02001144 } else
1145 vlr_subscr_set_imsi(vsub, mi_string);
1146 break;
1147 case GSM_MI_TYPE_IMEI:
1148 vlr_subscr_set_imei(vsub, mi_string);
1149 break;
1150 case GSM_MI_TYPE_IMEISV:
1151 vlr_subscr_set_imeisv(vsub, mi_string);
1152 break;
1153 }
1154
1155 if (vsub->auth_fsm) {
1156 switch (mi_type) {
1157 case GSM_MI_TYPE_IMSI:
1158 osmo_fsm_inst_dispatch(vsub->auth_fsm,
1159 VLR_AUTH_E_MS_ID_IMSI, mi_string);
1160 break;
1161 }
1162 }
1163
1164 if (vsub->lu_fsm) {
1165 uint32_t event = 0;
1166 switch (mi_type) {
1167 case GSM_MI_TYPE_IMSI:
1168 event = VLR_ULA_E_ID_IMSI;
1169 break;
1170 case GSM_MI_TYPE_IMEI:
1171 event = VLR_ULA_E_ID_IMEI;
1172 break;
1173 case GSM_MI_TYPE_IMEISV:
1174 event = VLR_ULA_E_ID_IMEISV;
1175 break;
1176 default:
1177 OSMO_ASSERT(0);
1178 break;
1179 }
1180 osmo_fsm_inst_dispatch(vsub->lu_fsm, event, mi_string);
Harald Welteb8b85a12016-06-17 00:06:42 +02001181 }
1182
1183 return 0;
1184}
1185
1186/* MSC->VLR: Subscriber has provided IDENTITY RESPONSE */
1187int vlr_subscr_rx_tmsi_reall_compl(struct vlr_subscr *vsub)
1188{
1189 if (vsub->lu_fsm) {
1190 return osmo_fsm_inst_dispatch(vsub->lu_fsm,
1191 VLR_ULA_E_NEW_TMSI_ACK, NULL);
1192 } else if (vsub->proc_arq_fsm) {
1193 return osmo_fsm_inst_dispatch(vsub->proc_arq_fsm,
1194 PR_ARQ_E_TMSI_ACK, NULL);
1195 } else {
1196 LOGVSUBP(LOGL_NOTICE, vsub,
Neels Hofmeyr5b1e0302019-05-06 23:45:09 +02001197 "gratuitous TMSI REALLOC COMPL\n");
Harald Welteb8b85a12016-06-17 00:06:42 +02001198 return -EINVAL;
1199 }
1200}
1201
Maxdcc193d2017-12-27 19:34:15 +01001202bool vlr_subscr_expire(struct vlr_subscr *vsub)
1203{
1204 if (vsub->lu_complete) {
Neels Hofmeyr5c8b1442018-12-11 12:43:10 +01001205 /* balancing the get from vlr_lu_compl_fsm_success() */
Maxdcc193d2017-12-27 19:34:15 +01001206 vsub->lu_complete = false;
Neels Hofmeyr7c5346c2019-02-19 02:36:35 +01001207 vlr_subscr_put(vsub, VSUB_USE_ATTACHED);
Maxdcc193d2017-12-27 19:34:15 +01001208
1209 return true;
1210 }
1211
1212 return false;
1213}
1214
Stefan Sperlingdefc3c82018-05-15 14:48:04 +02001215/* See TS 23.012 version 9.10.0 4.3.2.1 "Process Detach_IMSI_VLR" */
Harald Welteb8b85a12016-06-17 00:06:42 +02001216int vlr_subscr_rx_imsi_detach(struct vlr_subscr *vsub)
1217{
1218 /* paranoia: should any LU or PARQ FSMs still be running, stop them. */
Neels Hofmeyr15809592018-04-06 02:57:51 +02001219 vlr_subscr_cancel_attach_fsm(vsub, OSMO_FSM_TERM_ERROR, GSM48_REJECT_CONGESTION);
Harald Welteb8b85a12016-06-17 00:06:42 +02001220
1221 vsub->imsi_detached_flag = true;
Stefan Sperlingdefc3c82018-05-15 14:48:04 +02001222 vsub->expire_lu = VLR_SUBSCRIBER_NO_EXPIRATION;
Maxdcc193d2017-12-27 19:34:15 +01001223
Harald Welte0df904d2018-12-03 11:00:04 +01001224 /* Inform the UE-SGs FSM that the subscriber has been detached */
1225 osmo_fsm_inst_dispatch(vsub->sgs_fsm, SGS_UE_E_RX_DETACH_IND_FROM_UE, NULL);
1226
Maxdcc193d2017-12-27 19:34:15 +01001227 vlr_subscr_expire(vsub);
1228
Harald Welteb8b85a12016-06-17 00:06:42 +02001229 return 0;
1230}
1231
1232/* Tear down any running FSMs due to MSC connection timeout.
1233 * Visit all vsub->*_fsm pointers and give them a queue to send a final reject
1234 * message before the entire connection is torn down.
1235 * \param[in] vsub subscriber to tear down
1236 */
Neels Hofmeyrc036b792018-11-29 22:37:51 +01001237void vlr_ran_conn_timeout(struct vlr_subscr *vsub)
Harald Welteb8b85a12016-06-17 00:06:42 +02001238{
Neels Hofmeyr15809592018-04-06 02:57:51 +02001239 vlr_subscr_cancel_attach_fsm(vsub, OSMO_FSM_TERM_TIMEOUT, GSM48_REJECT_CONGESTION);
Harald Welteb8b85a12016-06-17 00:06:42 +02001240}
1241
1242struct vlr_instance *vlr_alloc(void *ctx, const struct vlr_ops *ops)
1243{
1244 struct vlr_instance *vlr = talloc_zero(ctx, struct vlr_instance);
1245 OSMO_ASSERT(vlr);
Neels Hofmeyr84da6b12016-05-20 21:59:55 +02001246
1247 /* Some of these are needed only on UTRAN, but in case the caller wants
1248 * only GERAN, she should just provide dummy callbacks. */
Harald Welteb8b85a12016-06-17 00:06:42 +02001249 OSMO_ASSERT(ops->tx_auth_req);
1250 OSMO_ASSERT(ops->tx_auth_rej);
1251 OSMO_ASSERT(ops->tx_id_req);
1252 OSMO_ASSERT(ops->tx_lu_acc);
1253 OSMO_ASSERT(ops->tx_lu_rej);
1254 OSMO_ASSERT(ops->tx_cm_serv_acc);
1255 OSMO_ASSERT(ops->tx_cm_serv_rej);
1256 OSMO_ASSERT(ops->set_ciph_mode);
Neels Hofmeyr84da6b12016-05-20 21:59:55 +02001257 OSMO_ASSERT(ops->tx_common_id);
Harald Welteb8b85a12016-06-17 00:06:42 +02001258 OSMO_ASSERT(ops->subscr_update);
1259 OSMO_ASSERT(ops->subscr_assoc);
1260
1261 INIT_LLIST_HEAD(&vlr->subscribers);
1262 INIT_LLIST_HEAD(&vlr->operations);
1263 memcpy(&vlr->ops, ops, sizeof(vlr->ops));
1264
Neels Hofmeyr0b8dec72017-10-29 01:57:35 +02001265 /* defaults */
1266 vlr->cfg.assign_tmsi = true;
1267
Harald Welteb8b85a12016-06-17 00:06:42 +02001268 /* osmo_auth_fsm.c */
Neels Hofmeyrc4628a32018-12-07 14:47:34 +01001269 OSMO_ASSERT(osmo_fsm_register(&vlr_auth_fsm) == 0);
Harald Welteb8b85a12016-06-17 00:06:42 +02001270 /* osmo_lu_fsm.c */
1271 vlr_lu_fsm_init();
1272 /* vlr_access_request_fsm.c */
1273 vlr_parq_fsm_init();
Harald Welte0df904d2018-12-03 11:00:04 +01001274 /* vlr_sgs_fsm.c */
1275 vlr_sgs_fsm_init();
Harald Welteb8b85a12016-06-17 00:06:42 +02001276
1277 return vlr;
1278}
1279
Neels Hofmeyrc4628a32018-12-07 14:47:34 +01001280int vlr_start(struct vlr_instance *vlr, struct gsup_client_mux *gcm)
Harald Welteb8b85a12016-06-17 00:06:42 +02001281{
1282 OSMO_ASSERT(vlr);
1283
Neels Hofmeyrc4628a32018-12-07 14:47:34 +01001284 vlr->gcm = gcm;
1285 gcm->rx_cb[OSMO_GSUP_MESSAGE_CLASS_SUBSCRIBER_MANAGEMENT] = (struct gsup_client_mux_rx_cb){
1286 .func = vlr_gsup_rx,
1287 .data = vlr,
1288 };
Harald Welteb8b85a12016-06-17 00:06:42 +02001289
Stefan Sperlingdefc3c82018-05-15 14:48:04 +02001290 osmo_timer_setup(&vlr->lu_expire_timer, vlr_subscr_expire_lu, vlr);
1291 osmo_timer_schedule(&vlr->lu_expire_timer, VLR_SUBSCRIBER_LU_EXPIRATION_INTERVAL, 0);
Harald Welteb8b85a12016-06-17 00:06:42 +02001292 return 0;
1293}
1294
1295/* MSC->VLR: Subscribre has disconnected */
1296int vlr_subscr_disconnected(struct vlr_subscr *vsub)
1297{
1298 /* This corresponds to a MAP-ABORT from MSC->VLR on a classic B
1299 * interface */
1300 osmo_fsm_inst_term(vsub->lu_fsm, OSMO_FSM_TERM_REQUEST, NULL);
1301 osmo_fsm_inst_term(vsub->auth_fsm, OSMO_FSM_TERM_REQUEST, NULL);
1302 vsub->msc_conn_ref = NULL;
1303
1304 return 0;
1305}
1306
1307/* MSC->VLR: Receive Authentication Failure from Subscriber */
1308int vlr_subscr_rx_auth_fail(struct vlr_subscr *vsub, const uint8_t *auts)
1309{
1310 struct vlr_auth_resp_par par = {0};
1311 par.auts = auts;
1312
1313 osmo_fsm_inst_dispatch(vsub->auth_fsm, VLR_AUTH_E_MS_AUTH_FAIL, &par);
1314 return 0;
1315}
1316
1317/* MSC->VLR: Receive Authentication Response from MS
1318 * \returns 1 in case of success, 0 in case of delay, -1 on auth error */
1319int vlr_subscr_rx_auth_resp(struct vlr_subscr *vsub, bool is_r99,
1320 bool is_utran, const uint8_t *res, uint8_t res_len)
1321{
1322 struct osmo_fsm_inst *auth_fi = vsub->auth_fsm;
1323 struct vlr_auth_resp_par par;
1324
1325 par.is_r99 = is_r99;
1326 par.is_utran = is_utran;
1327 par.res = res;
1328 par.res_len = res_len;
1329 osmo_fsm_inst_dispatch(auth_fi, VLR_AUTH_E_MS_AUTH_RESP, (void *) &par);
1330
1331 return 0;
1332}
1333
1334/* MSC->VLR: Receive result of Ciphering Mode Command from MS */
Neels Hofmeyrc4628a32018-12-07 14:47:34 +01001335void vlr_subscr_rx_ciph_res(struct vlr_subscr *vsub, enum vlr_ciph_result_cause result)
Harald Welteb8b85a12016-06-17 00:06:42 +02001336{
1337 if (vsub->lu_fsm && vsub->lu_fsm->state == VLR_ULA_S_WAIT_CIPH)
Neels Hofmeyrc4628a32018-12-07 14:47:34 +01001338 osmo_fsm_inst_dispatch(vsub->lu_fsm, VLR_ULA_E_CIPH_RES, &result);
Harald Welteb8b85a12016-06-17 00:06:42 +02001339 if (vsub->proc_arq_fsm
1340 && vsub->proc_arq_fsm->state == PR_ARQ_S_WAIT_CIPH)
Neels Hofmeyrc4628a32018-12-07 14:47:34 +01001341 osmo_fsm_inst_dispatch(vsub->proc_arq_fsm, PR_ARQ_E_CIPH_RES, &result);
Harald Welteb8b85a12016-06-17 00:06:42 +02001342}
1343
1344/* Internal evaluation of requested ciphering mode.
1345 * Send set_ciph_mode() to MSC depending on the ciph_mode argument.
1346 * \param[in] vlr VLR instance.
1347 * \param[in] fi Calling FSM instance, for logging.
1348 * \param[in] msc_conn_ref MSC conn to send to.
1349 * \param[in] ciph_mode Ciphering config, to decide whether to do ciphering.
1350 * \returns 0 if no ciphering is needed or message was sent successfully,
1351 * or a negative value if ciph_mode is invalid or sending failed.
1352 */
1353int vlr_set_ciph_mode(struct vlr_instance *vlr,
1354 struct osmo_fsm_inst *fi,
1355 void *msc_conn_ref,
Harald Welte71c51df2017-12-23 18:51:48 +01001356 bool ciph_required,
Neels Hofmeyr2ef2da52017-12-18 01:23:42 +01001357 bool umts_aka,
Harald Welteb8b85a12016-06-17 00:06:42 +02001358 bool retrieve_imeisv)
1359{
Harald Welte71c51df2017-12-23 18:51:48 +01001360 if (!ciph_required)
Harald Welteb8b85a12016-06-17 00:06:42 +02001361 return 0;
1362
Harald Welte71c51df2017-12-23 18:51:48 +01001363 LOGPFSML(fi, LOGL_DEBUG, "Set Ciphering Mode\n");
1364 return vlr->ops.set_ciph_mode(msc_conn_ref, umts_aka, retrieve_imeisv);
Harald Welteb8b85a12016-06-17 00:06:42 +02001365}
1366
Neels Hofmeyre3d72d72017-12-18 02:06:44 +01001367/* Decide whether UMTS AKA should be used.
1368 * UTRAN networks are by definition R99 capable, and the auth vector is required to contain UMTS AKA
1369 * tokens. This is expected to be verified by the caller. On GERAN, UMTS AKA must be used iff MS and
1370 * GERAN are R99 capable and UMTS AKA tokens are available.
1371 * \param[in] vec Auth tokens (received from the HLR).
1372 * \param[in] is_r99 True when BTS and GERAN are R99 capable.
1373 * \returns true to use UMTS AKA, false to use pre-R99 GSM AKA.
1374 */
1375bool vlr_use_umts_aka(struct osmo_auth_vector *vec, bool is_r99)
1376{
1377 if (!is_r99)
1378 return false;
1379 if (!(vec->auth_types & OSMO_AUTH_TYPE_UMTS))
1380 return false;
1381 return true;
1382}
1383
Harald Welteb8b85a12016-06-17 00:06:42 +02001384void log_set_filter_vlr_subscr(struct log_target *target,
1385 struct vlr_subscr *vlr_subscr)
1386{
1387 struct vlr_subscr **fsub = (void*)&target->filter_data[LOG_FLT_VLR_SUBSCR];
Neels Hofmeyr7c5346c2019-02-19 02:36:35 +01001388 const char *use = "logfilter";
Harald Welteb8b85a12016-06-17 00:06:42 +02001389
1390 /* free the old data */
1391 if (*fsub) {
Neels Hofmeyr7c5346c2019-02-19 02:36:35 +01001392 vlr_subscr_put(*fsub, use);
Harald Welteb8b85a12016-06-17 00:06:42 +02001393 *fsub = NULL;
1394 }
1395
1396 if (vlr_subscr) {
1397 target->filter_map |= (1 << LOG_FLT_VLR_SUBSCR);
Neels Hofmeyr7c5346c2019-02-19 02:36:35 +01001398 vlr_subscr_get(vlr_subscr, use);
1399 *fsub = vlr_subscr;
Harald Welteb8b85a12016-06-17 00:06:42 +02001400 } else
1401 target->filter_map &= ~(1 << LOG_FLT_VLR_SUBSCR);
1402}