NS_Emulation: Add [optional] support for FrameRelay transport

This adds a NS_Provider_FR which interfaces between FrameRelay_Emulation
and NS_Emulation.  Include support for it only if enabled at compile
time to avoid pulling in a dependency on the FrameRelay stack for every
user of NS_Emulation.

Change-Id: I42ca811d23e383e362d2527c8ff2c916a62a5b42
diff --git a/library/NS_Emulation.ttcnpp b/library/NS_Emulation.ttcnpp
new file mode 100644
index 0000000..32746b4
--- /dev/null
+++ b/library/NS_Emulation.ttcnpp
@@ -0,0 +1,372 @@
+/* GPRS-NS Emulation in TTCN-3
+ * (C) 2018-2020 Harald Welte <laforge@gnumonks.org>
+ * contributions by sysmocom - s.f.m.c. GmbH
+ * All rights reserved.
+ *
+ * Released under the terms of GNU General Public License, Version 2 or
+ * (at your option) any later version.
+ *
+ * SPDX-License-Identifier: GPL-2.0-or-later
+ */
+
+module NS_Emulation {
+	import from NS_Types all;
+	import from BSSGP_Types all;
+	import from Osmocom_Types all;
+	import from Osmocom_Gb_Types all;
+	import from NS_Provider_IPL4 all;
+#ifdef NS_EMULATION_FR
+	import from NS_Provider_FR all;
+#endif
+	import from IPL4asp_Types all;
+
+	type record NsUnitdataRequest {
+		BssgpBvci	bvci,
+		Nsei		nsei,
+		octetstring	sdu optional,
+		PDU_BSSGP	bssgp optional
+	}
+
+	template NsUnitdataRequest t_NsUdReq(template Nsei nsei, template BssgpBvci bvci, template octetstring sdu,
+					     template PDU_BSSGP bssgp) := {
+		bvci := bvci,
+		nsei := nsei,
+		sdu := sdu,
+		bssgp := bssgp
+	}
+
+	type record NsUnitdataIndication {
+		BssgpBvci	bvci,
+		Nsei		nsei,
+		octetstring	sdu optional,
+		PDU_BSSGP	bssgp optional
+	}
+
+	template NsUnitdataIndication t_NsUdInd(Nsei nsei, BssgpBvci bvci, octetstring sdu) := {
+		bvci := bvci,
+		nsei := nsei,
+		sdu := sdu,
+		bssgp := dec_PDU_BSSGP(sdu)
+	}
+
+	type record NsStatusIndication {
+		Nsei		nsei,
+		Nsvci		nsvci,
+		NseState	old_state,
+		NseState	new_state
+	}
+
+	template NsStatusIndication t_NsStsInd(Nsei nsei, Nsvci nsvci, NseState old_state, NseState state) := {
+		nsei := nsei,
+		nsvci := nsvci,
+		old_state := old_state,
+		new_state := state
+	}
+
+	type enumerated NseState {
+		NSE_S_DEAD_BLOCKED,
+		NSE_S_WAIT_RESET,
+		NSE_S_ALIVE_BLOCKED,
+		NSE_S_ALIVE_UNBLOCKED
+	}
+
+	/* port from our (internal) point of view */
+	type port NS_SP_PT message {
+		in	NsUnitdataRequest;
+		out	NsUnitdataIndication,
+			NsStatusIndication;
+	} with { extension "internal" };
+
+	/* port from the user point of view */
+	type port NS_PT message {
+		in	ASP_Event,
+			NsStatusIndication,
+			NsUnitdataIndication;
+		out	NsUnitdataRequest;
+	} with { extension "internal" };
+
+	function NSStart(NSConfiguration init_config) runs on NS_CT {
+		config := init_config;
+		f_init();
+		f_ScanEvents();
+	}
+
+	private function f_init() runs on NS_CT {
+		var Result res;
+
+		if (ischosen(config.provider.ip)) {
+			/* Connect the UDP socket */
+			vc_NSP_IP := NS_Provider_IPL4_CT.create;
+			connect(self:NSCP, vc_NSP_IP:NSE);
+			vc_NSP_IP.start(NS_Provider_IPL4.main(config));
+#ifdef NS_EMULATION_FR
+		} else if (ischosen(config.provider.fr)) {
+			vc_NSP_FR := NS_Provider_FR_CT.create;
+			connect(self:NSCP, vc_NSP_FR:NSE);
+			vc_NSP_FR.start(NS_Provider_FR.main(config));
+#endif
+		}
+
+		f_change_state(NSE_S_DEAD_BLOCKED);
+		/* Send the first NS-ALIVE to test the connection */
+		if (not config.role_sgsn) {
+			f_sendReset();
+		}
+	}
+
+	type component NS_Provider_CT {
+		/* upper port, facing to NS_Emulation:NSCP */
+		port NS_PROVIDER_PT NSE;
+		/* lower layer ports (UDP/IP, Frame Relay) are added in derived components */
+	};
+
+	/* port between NS_Provider and NS_CT */
+	type port NS_PROVIDER_PT message {
+		inout PDU_NS;
+	} with { extension "internal" };
+
+	type component NS_CT {
+		/* UDP port towards the bottom (IUT) */
+		port NS_PROVIDER_PT NSCP;
+		var NS_Provider_IPL4_CT vc_NSP_IP;
+#ifdef NS_EMULATION_FR
+		var NS_Provider_FR_CT vc_NSP_FR;
+#endif
+
+		/* NS-User SAP towards the user */
+		port NS_SP_PT NS_SP;
+
+		var NSConfiguration config;
+
+		var NseState		g_state := NSE_S_DEAD_BLOCKED;
+
+		timer Tns_alive := 3.0;
+		timer Tns_test := 10.0;
+		timer Tns_block := 10.0;
+	}
+
+	type record NSConfigurationIP {
+		AddressFamily address_family,
+		PortNumber local_udp_port,
+		charstring local_ip,
+		PortNumber remote_udp_port,
+		charstring remote_ip
+	};
+	type record NSConfigurationFR {
+		charstring netdev,	/* HDLC net-device for AF_PACKET socket */
+		integer dlci
+	};
+	type union NSConfigurationP {
+		NSConfigurationIP ip,
+		NSConfigurationFR fr
+	};
+	type record NSConfiguration {
+		NSConfigurationP provider,
+		Nsvci nsvci,
+		Nsvci nsei,
+		boolean role_sgsn,
+		boolean handle_sns
+	}
+
+	private function f_change_state(NseState new_state) runs on NS_CT {
+		var NseState old_state := g_state;
+		g_state := new_state;
+		log("NS State Transition: ", old_state, " -> ", new_state);
+		NS_SP.send(t_NsStsInd(config.nsei, config.nsvci, old_state, new_state));
+	}
+
+	private function f_sendReset() runs on NS_CT {
+		NSCP.send(ts_NS_RESET(NS_CAUSE_OM_INTERVENTION, config.nsvci, config.nsei));
+		g_state := NSE_S_WAIT_RESET;
+	}
+
+	private function f_sendAlive() runs on NS_CT {
+		NSCP.send(t_NS_ALIVE);
+		Tns_alive.start;
+	}
+
+	private function f_sendUnblock() runs on NS_CT {
+		NSCP.send(t_NS_UNBLOCK);
+		Tns_block.start;
+	}
+
+	private function f_sendBlock(NsCause cause) runs on NS_CT {
+		NSCP.send(ts_NS_BLOCK(cause, config.nsvci));
+		Tns_block.start;
+	}
+
+	altstep as_allstate() runs on NS_CT {
+		var PDU_NS rf;
+		var ASP_Event evt;
+
+		/* transition to DEAD if t_alive times out */
+		[] Tns_alive.timeout {
+			log("Tns-alive expired: changing to DEAD_BLOCKED + starting Tns-test");
+			f_change_state(NSE_S_DEAD_BLOCKED);
+			Tns_test.start;
+		}
+
+		[] Tns_test.timeout {
+			log("Tns-test expired: sending NS-ALIVE");
+			f_sendAlive();
+		}
+
+		/* Stop t_alive when receiving ALIVE-ACK */
+		[Tns_alive.running] NSCP.receive(t_NS_ALIVE_ACK) {
+			log("NS-ALIVE-ACK received: stopping Tns-alive; starting Tns-test");
+			Tns_alive.stop;
+			Tns_test.start;
+		}
+
+		/* respond to NS-ALIVE with NS-ALIVE-ACK */
+		[] NSCP.receive(t_NS_ALIVE) {
+			NSCP.send(t_NS_ALIVE_ACK);
+		}
+
+		/* Respond to BLOCK for wrong NSVCI */
+		[] NSCP.receive(tr_NS_BLOCK(?, ?)) -> value rf {
+			log("Rx NS-BLOCK for unknown NSVCI");
+			/* FIXME */
+		}
+
+		/* Respond to RESET with correct NSEI/NSVCI */
+		[] NSCP.receive(tr_NS_RESET(?, config.nsvci, config.nsei)) -> value rf {
+			f_change_state(NSE_S_ALIVE_BLOCKED);
+			NSCP.send(ts_NS_RESET_ACK(config.nsvci, config.nsei));
+		}
+
+		/* Respond to RESET with wrong NSEI/NSVCI */
+		[] NSCP.receive(tr_NS_RESET(?, ?, ?)) -> value rf {
+			log("Rx NS-RESET for unknown NSEI/NSVCI");
+			/* FIXME */
+		}
+
+		[config.role_sgsn and config.handle_sns and ischosen(config.provider.ip)] as_sns_sgsn();
+
+		/* default case of handling unknown PDUs */
+		[] NSCP.receive(PDU_NS: ?) -> value rf {
+			log("Rx Unexpected NS PDU ", rf," in state ", g_state);
+			NSCP.send(ts_NS_STATUS(NS_CAUSE_PDU_NOT_COMPATIBLE_WITH_PROTOCOL_STATE, rf));
+		}
+	}
+
+	/* simple IP Sub-Network Service responder for the SGSN side. This is not a full implementation
+	 * of the protocol, merely sufficient to make the PCU/BSS side happy to proceed */
+	altstep as_sns_sgsn() runs on NS_CT {
+		var PDU_NS rf;
+		[] NSCP.receive(tr_SNS_SIZE(config.nsei)) -> value rf {
+			/* blindly acknowledge whatever the PCU sends */
+			NSCP.send(ts_SNS_SIZE_ACK(config.nsei, omit));
+		}
+		[] NSCP.receive(tr_SNS_SIZE(?)) {
+			setverdict(fail, "SNS-SIZE from unexpected NSEI");
+			self.stop;
+		}
+		[] NSCP.receive(tr_SNS_CONFIG(config.nsei, true,
+				    {tr_SNS_IPv4(config.provider.ip.remote_ip,
+						 config.provider.ip.remote_udp_port)})) -> value rf {
+			/* blindly acknowledge whatever the PCU sends */
+			NSCP.send(ts_SNS_CONFIG_ACK(config.nsei, omit));
+			/* send a SNS-CONFIG in response and expect a SNS-CONFIG-ACK */
+			var IP4_Elements v4 := { valueof(ts_SNS_IPv4(config.provider.ip.local_ip, config.provider.ip.local_udp_port)) };
+			NSCP.send(ts_SNS_CONFIG(config.nsei, true, v4));
+			alt {
+			[] NSCP.receive(tr_SNS_CONFIG_ACK(config.nsei, omit)) {
+				/* success */
+				}
+			[] NSCP.receive(tr_SNS_CONFIG_ACK(config.nsei, ?)) {
+				setverdict(fail, "Unexpected SNS-CONFIG-NACK");
+				self.stop;
+				}
+			}
+		}
+		[] NSCP.receive(tr_SNS_CONFIG(config.nsei, false, ?)) { /* ignore */}
+		[] NSCP.receive(tr_SNS_CONFIG(config.nsei, true, ?)) {
+			setverdict(fail, "Unexpected SNS-CONFIG content");
+			self.stop;
+		}
+		[] NSCP.receive(tr_SNS_CONFIG(?, ?, ?)) {
+			setverdict(fail, "SNS-CONFIG from unexpected NSEI");
+			self.stop;
+		}
+	}
+
+	private function f_ScanEvents() runs on NS_CT {
+		var NsUnitdataRequest ud_req;
+		var PDU_NS rf;
+		var default d;
+
+		d := activate(as_allstate());
+
+		while (true) {
+		if (g_state == NSE_S_DEAD_BLOCKED) {
+			alt {
+				[false] any timer.timeout {}
+			}
+		} else if (g_state == NSE_S_WAIT_RESET) {
+			alt {
+				[] NSCP.receive(tr_NS_RESET_ACK(config.nsvci, config.nsei)) -> value rf {
+					f_change_state(NSE_S_ALIVE_BLOCKED);
+					f_sendAlive();
+					f_sendUnblock();
+				}
+			}
+		} else if (g_state == NSE_S_ALIVE_BLOCKED) {
+			alt {
+				/* bogus block, just respond with ACK */
+				[] NSCP.receive(tr_NS_BLOCK(?, config.nsvci)) -> value rf {
+					NSCP.send(ts_NS_BLOCK_ACK(config.nsvci));
+				}
+				/* Respond to UNBLOCK with UNBLOCK-ACK + change state */
+				[] NSCP.receive(t_NS_UNBLOCK) -> value rf {
+					NSCP.send(t_NS_UNBLOCK_ACK);
+					Tns_block.stop;
+					f_change_state(NSE_S_ALIVE_UNBLOCKED);
+				}
+				[] NSCP.receive(t_NS_UNBLOCK_ACK) -> value rf {
+					Tns_block.stop;
+					f_change_state(NSE_S_ALIVE_UNBLOCKED);
+				}
+				[] Tns_block.timeout {
+					/* repeat unblock transmission */
+					f_sendUnblock();
+				}
+			}
+		} else if (g_state == NSE_S_ALIVE_UNBLOCKED) {
+			alt {
+				/* bogus unblock, just respond with ACK */
+				[] NSCP.receive(t_NS_UNBLOCK) -> value rf {
+					NSCP.send(t_NS_UNBLOCK_ACK);
+				}
+				/* Respond to BLOCK with BLOCK-ACK + change state */
+				[] NSCP.receive(tr_NS_BLOCK(?, config.nsvci)) -> value rf {
+					NSCP.send(ts_NS_BLOCK_ACK(config.nsvci));
+					Tns_block.stop;
+					f_change_state(NSE_S_ALIVE_BLOCKED);
+				}
+				[] NSCP.receive(tr_NS_BLOCK_ACK(config.nsvci)) -> value rf {
+					Tns_block.stop;
+				}
+				/* NS-UNITDATA PDU from network to NS-UNITDATA.ind to user */
+				[] NSCP.receive(tr_NS_UNITDATA(?, ?, ?)) -> value rf {
+					NS_SP.send(t_NsUdInd(config.nsei,
+							     oct2int(rf.pDU_NS_Unitdata.bVCI),
+							     rf.pDU_NS_Unitdata.nS_SDU));
+				}
+				/* NS-UNITDATA.req from user to NS-UNITDATA PDU on network */
+				[] NS_SP.receive(t_NsUdReq(config.nsei, ?, ?, omit)) -> value ud_req {
+					/* using raw octetstring PDU */
+					NSCP.send(ts_NS_UNITDATA(t_SduCtrlB, ud_req.bvci, ud_req.sdu));
+				}
+				[] NS_SP.receive(t_NsUdReq(config.nsei, ?, omit, ?)) -> value ud_req {
+					/* using decoded BSSGP PDU that we need to encode first */
+					var octetstring enc := enc_PDU_BSSGP(ud_req.bssgp);
+					NSCP.send(ts_NS_UNITDATA(t_SduCtrlB, ud_req.bvci, enc));
+				}
+			}
+		}
+
+		} /* while */
+		//deactivate(d);
+	}
+}