blob: a0b24c9c7654a9b91488bb7fc0b73468213f85b3 [file] [log] [blame]
Harald Welte34b5a952019-05-27 11:54:11 +02001/* GPRS-NS Emulation in TTCN-3
Harald Welte013d65a2020-09-13 14:41:31 +02002 * (C) 2018-2020 Harald Welte <laforge@gnumonks.org>
Harald Welte34b5a952019-05-27 11:54:11 +02003 * contributions by sysmocom - s.f.m.c. GmbH
4 * All rights reserved.
5 *
6 * Released under the terms of GNU General Public License, Version 2 or
7 * (at your option) any later version.
8 *
9 * SPDX-License-Identifier: GPL-2.0-or-later
10 */
11
Harald Welte6fff3642017-07-22 21:36:13 +020012module NS_Emulation {
13 import from NS_Types all;
14 import from BSSGP_Types all;
Harald Weltee0abc472018-02-05 09:13:31 +010015 import from Osmocom_Gb_Types all;
Harald Welte013d65a2020-09-13 14:41:31 +020016 import from NS_Provider_IPL4 all;
Alexander Couzense0f7c542020-09-13 17:25:18 +020017 import from Osmocom_Types all;
Harald Welte6fff3642017-07-22 21:36:13 +020018 import from IPL4asp_Types all;
19
20 type record NsUnitdataRequest {
21 BssgpBvci bvci,
22 Nsei nsei,
Harald Welte6e594f22017-07-23 16:19:35 +020023 octetstring sdu optional,
Harald Weltee0abc472018-02-05 09:13:31 +010024 PDU_BSSGP bssgp optional
Harald Welte6e594f22017-07-23 16:19:35 +020025 }
26
27 template NsUnitdataRequest t_NsUdReq(template Nsei nsei, template BssgpBvci bvci, template octetstring sdu,
Harald Weltee0abc472018-02-05 09:13:31 +010028 template PDU_BSSGP bssgp) := {
Harald Welte6e594f22017-07-23 16:19:35 +020029 bvci := bvci,
30 nsei := nsei,
31 sdu := sdu,
32 bssgp := bssgp
Harald Welte6fff3642017-07-22 21:36:13 +020033 }
34
35 type record NsUnitdataIndication {
36 BssgpBvci bvci,
37 Nsei nsei,
Harald Welte6e594f22017-07-23 16:19:35 +020038 octetstring sdu optional,
Harald Weltee0abc472018-02-05 09:13:31 +010039 PDU_BSSGP bssgp optional
Harald Welte6e594f22017-07-23 16:19:35 +020040 }
41
42 template NsUnitdataIndication t_NsUdInd(Nsei nsei, BssgpBvci bvci, octetstring sdu) := {
43 bvci := bvci,
44 nsei := nsei,
45 sdu := sdu,
Harald Weltee0abc472018-02-05 09:13:31 +010046 bssgp := dec_PDU_BSSGP(sdu)
Harald Welte6e594f22017-07-23 16:19:35 +020047 }
48
49 type record NsStatusIndication {
50 Nsei nsei,
51 Nsvci nsvci,
52 NseState old_state,
53 NseState new_state
54 }
55
56 template NsStatusIndication t_NsStsInd(Nsei nsei, Nsvci nsvci, NseState old_state, NseState state) := {
57 nsei := nsei,
58 nsvci := nsvci,
59 old_state := old_state,
60 new_state := state
Harald Welte6fff3642017-07-22 21:36:13 +020061 }
62
63 type enumerated NseState {
Harald Welte6e594f22017-07-23 16:19:35 +020064 NSE_S_DEAD_BLOCKED,
65 NSE_S_WAIT_RESET,
66 NSE_S_ALIVE_BLOCKED,
67 NSE_S_ALIVE_UNBLOCKED
68 }
Harald Welte6fff3642017-07-22 21:36:13 +020069
70 /* port from our (internal) point of view */
71 type port NS_SP_PT message {
72 in NsUnitdataRequest;
73 out NsUnitdataIndication,
Harald Welte013d65a2020-09-13 14:41:31 +020074 NsStatusIndication;
Harald Welte6fff3642017-07-22 21:36:13 +020075 } with { extension "internal" };
76
77 /* port from the user point of view */
78 type port NS_PT message {
79 in ASP_Event,
Harald Welte6e594f22017-07-23 16:19:35 +020080 NsStatusIndication,
Harald Welte6fff3642017-07-22 21:36:13 +020081 NsUnitdataIndication;
82 out NsUnitdataRequest;
83 } with { extension "internal" };
84
Alexander Couzens2c12b242018-07-31 00:30:11 +020085 function NSStart(NSConfiguration init_config) runs on NS_CT {
86 config := init_config;
Harald Welte6fff3642017-07-22 21:36:13 +020087 f_init();
88 f_ScanEvents();
89 }
90
91 private function f_init() runs on NS_CT {
Harald Welte6e594f22017-07-23 16:19:35 +020092 var Result res;
Harald Welte013d65a2020-09-13 14:41:31 +020093
Harald Welte6e594f22017-07-23 16:19:35 +020094 /* Connect the UDP socket */
Harald Welte013d65a2020-09-13 14:41:31 +020095 vc_NSP_IP := NS_Provider_IPL4_CT.create;
96 connect(self:NSCP, vc_NSP_IP:NSE);
97 vc_NSP_IP.start(NS_Provider_IPL4.main(config));
98
Harald Welte6e594f22017-07-23 16:19:35 +020099 f_change_state(NSE_S_DEAD_BLOCKED);
100 /* Send the first NS-ALIVE to test the connection */
Harald Weltee81d84e2018-07-05 03:17:00 +0200101 if (not config.role_sgsn) {
102 f_sendReset();
103 }
Harald Welte6fff3642017-07-22 21:36:13 +0200104 }
105
Harald Welte013d65a2020-09-13 14:41:31 +0200106 type component NS_Provider_CT {
107 /* upper port, facing to NS_Emulation:NSCP */
108 port NS_PROVIDER_PT NSE;
109 /* lower layer ports (UDP/IP, Frame Relay) are added in derived components */
110 };
111
112 /* port between NS_Provider and NS_CT */
113 type port NS_PROVIDER_PT message {
114 inout PDU_NS;
115 } with { extension "internal" };
116
Harald Welte6fff3642017-07-22 21:36:13 +0200117 type component NS_CT {
118 /* UDP port towards the bottom (IUT) */
Harald Welte013d65a2020-09-13 14:41:31 +0200119 port NS_PROVIDER_PT NSCP;
120 var NS_Provider_IPL4_CT vc_NSP_IP;
121
Harald Welte6fff3642017-07-22 21:36:13 +0200122 /* NS-User SAP towards the user */
123 port NS_SP_PT NS_SP;
124
Alexander Couzens2c12b242018-07-31 00:30:11 +0200125 var NSConfiguration config;
126
Harald Welte6e594f22017-07-23 16:19:35 +0200127 var NseState g_state := NSE_S_DEAD_BLOCKED;
Harald Welte6e594f22017-07-23 16:19:35 +0200128
129 timer Tns_alive := 3.0;
130 timer Tns_test := 10.0;
131 timer Tns_block := 10.0;
Harald Welte6fff3642017-07-22 21:36:13 +0200132 }
133
Harald Welte5e8573e2020-09-13 15:32:56 +0200134 type record NSConfigurationIP {
Alexander Couzense0f7c542020-09-13 17:25:18 +0200135 AddressFamily address_family,
Alexander Couzens2c12b242018-07-31 00:30:11 +0200136 PortNumber local_udp_port,
137 charstring local_ip,
138 PortNumber remote_udp_port,
Harald Welte5e8573e2020-09-13 15:32:56 +0200139 charstring remote_ip
140 };
141 type union NSConfigurationP {
142 NSConfigurationIP ip
143 };
144 type record NSConfiguration {
145 NSConfigurationP provider,
Alexander Couzens2c12b242018-07-31 00:30:11 +0200146 Nsvci nsvci,
Harald Welte5e514fa2018-07-05 00:01:45 +0200147 Nsvci nsei,
148 boolean role_sgsn,
149 boolean handle_sns
Alexander Couzens2c12b242018-07-31 00:30:11 +0200150 }
Harald Welte6fff3642017-07-22 21:36:13 +0200151
Harald Welte6e594f22017-07-23 16:19:35 +0200152 private function f_change_state(NseState new_state) runs on NS_CT {
153 var NseState old_state := g_state;
154 g_state := new_state;
155 log("NS State Transition: ", old_state, " -> ", new_state);
Alexander Couzens2c12b242018-07-31 00:30:11 +0200156 NS_SP.send(t_NsStsInd(config.nsei, config.nsvci, old_state, new_state));
Harald Welte6fff3642017-07-22 21:36:13 +0200157 }
158
Harald Welte6e594f22017-07-23 16:19:35 +0200159 private function f_sendReset() runs on NS_CT {
Harald Welte013d65a2020-09-13 14:41:31 +0200160 NSCP.send(ts_NS_RESET(NS_CAUSE_OM_INTERVENTION, config.nsvci, config.nsei));
Harald Welte6e594f22017-07-23 16:19:35 +0200161 g_state := NSE_S_WAIT_RESET;
Harald Welte6fff3642017-07-22 21:36:13 +0200162 }
163
Harald Welte6e594f22017-07-23 16:19:35 +0200164 private function f_sendAlive() runs on NS_CT {
Harald Welte013d65a2020-09-13 14:41:31 +0200165 NSCP.send(t_NS_ALIVE);
Harald Welte6e594f22017-07-23 16:19:35 +0200166 Tns_alive.start;
167 }
168
169 private function f_sendUnblock() runs on NS_CT {
Harald Welte013d65a2020-09-13 14:41:31 +0200170 NSCP.send(t_NS_UNBLOCK);
Harald Welte6e594f22017-07-23 16:19:35 +0200171 Tns_block.start;
172 }
173
174 private function f_sendBlock(NsCause cause) runs on NS_CT {
Harald Welte013d65a2020-09-13 14:41:31 +0200175 NSCP.send(ts_NS_BLOCK(cause, config.nsvci));
Harald Welte6e594f22017-07-23 16:19:35 +0200176 Tns_block.start;
177 }
178
179 altstep as_allstate() runs on NS_CT {
Harald Welte013d65a2020-09-13 14:41:31 +0200180 var PDU_NS rf;
Harald Welte6e594f22017-07-23 16:19:35 +0200181 var ASP_Event evt;
182
183 /* transition to DEAD if t_alive times out */
Harald Welte9a7c5122020-09-14 11:35:57 +0200184 [] Tns_alive.timeout {
185 log("Tns-alive expired: changing to DEAD_BLOCKED + starting Tns-test");
Harald Welte6e594f22017-07-23 16:19:35 +0200186 f_change_state(NSE_S_DEAD_BLOCKED);
187 Tns_test.start;
Harald Welte6fff3642017-07-22 21:36:13 +0200188 }
Harald Welte6fff3642017-07-22 21:36:13 +0200189
Harald Welte9a7c5122020-09-14 11:35:57 +0200190 [] Tns_test.timeout {
Harald Welte6e594f22017-07-23 16:19:35 +0200191 log("Tns-test expired: sending NS-ALIVE");
192 f_sendAlive();
Harald Welte6fff3642017-07-22 21:36:13 +0200193 }
Harald Welte6fff3642017-07-22 21:36:13 +0200194
Harald Welte6e594f22017-07-23 16:19:35 +0200195 /* Stop t_alive when receiving ALIVE-ACK */
Harald Welte9a7c5122020-09-14 11:35:57 +0200196 [Tns_alive.running] NSCP.receive(t_NS_ALIVE_ACK) {
Harald Welte6e594f22017-07-23 16:19:35 +0200197 log("NS-ALIVE-ACK received: stopping Tns-alive; starting Tns-test");
198 Tns_alive.stop;
199 Tns_test.start;
200 }
Harald Welte6fff3642017-07-22 21:36:13 +0200201
Harald Welte6e594f22017-07-23 16:19:35 +0200202 /* respond to NS-ALIVE with NS-ALIVE-ACK */
Harald Welte013d65a2020-09-13 14:41:31 +0200203 [] NSCP.receive(t_NS_ALIVE) {
204 NSCP.send(t_NS_ALIVE_ACK);
Harald Welte6e594f22017-07-23 16:19:35 +0200205 }
206
207 /* Respond to BLOCK for wrong NSVCI */
Harald Welte013d65a2020-09-13 14:41:31 +0200208 [] NSCP.receive(tr_NS_BLOCK(?, ?)) -> value rf {
Harald Welte6e594f22017-07-23 16:19:35 +0200209 log("Rx NS-BLOCK for unknown NSVCI");
210 /* FIXME */
211 }
212
213 /* Respond to RESET with correct NSEI/NSVCI */
Harald Welte013d65a2020-09-13 14:41:31 +0200214 [] NSCP.receive(tr_NS_RESET(?, config.nsvci, config.nsei)) -> value rf {
Harald Welte6e594f22017-07-23 16:19:35 +0200215 f_change_state(NSE_S_ALIVE_BLOCKED);
Harald Welte013d65a2020-09-13 14:41:31 +0200216 NSCP.send(ts_NS_RESET_ACK(config.nsvci, config.nsei));
Harald Welte6e594f22017-07-23 16:19:35 +0200217 }
218
219 /* Respond to RESET with wrong NSEI/NSVCI */
Harald Welte013d65a2020-09-13 14:41:31 +0200220 [] NSCP.receive(tr_NS_RESET(?, ?, ?)) -> value rf {
Harald Welte6e594f22017-07-23 16:19:35 +0200221 log("Rx NS-RESET for unknown NSEI/NSVCI");
222 /* FIXME */
223 }
224
Harald Welte5e8573e2020-09-13 15:32:56 +0200225 [config.role_sgsn and config.handle_sns and ischosen(config.provider.ip)] as_sns_sgsn();
Harald Welte5e514fa2018-07-05 00:01:45 +0200226
Harald Welte6e594f22017-07-23 16:19:35 +0200227 /* default case of handling unknown PDUs */
Harald Welte013d65a2020-09-13 14:41:31 +0200228 [] NSCP.receive(PDU_NS: ?) -> value rf {
229 log("Rx Unexpected NS PDU ", rf," in state ", g_state);
230 NSCP.send(ts_NS_STATUS(NS_CAUSE_PDU_NOT_COMPATIBLE_WITH_PROTOCOL_STATE, rf));
Harald Welte6e594f22017-07-23 16:19:35 +0200231 }
Harald Welte6fff3642017-07-22 21:36:13 +0200232 }
233
Harald Welte5e514fa2018-07-05 00:01:45 +0200234 /* simple IP Sub-Network Service responder for the SGSN side. This is not a full implementation
235 * of the protocol, merely sufficient to make the PCU/BSS side happy to proceed */
236 altstep as_sns_sgsn() runs on NS_CT {
Harald Welte013d65a2020-09-13 14:41:31 +0200237 var PDU_NS rf;
238 [] NSCP.receive(tr_SNS_SIZE(config.nsei)) -> value rf {
Harald Welte5e514fa2018-07-05 00:01:45 +0200239 /* blindly acknowledge whatever the PCU sends */
Harald Welte013d65a2020-09-13 14:41:31 +0200240 NSCP.send(ts_SNS_SIZE_ACK(config.nsei, omit));
Harald Welte5e514fa2018-07-05 00:01:45 +0200241 }
Harald Welte013d65a2020-09-13 14:41:31 +0200242 [] NSCP.receive(tr_SNS_SIZE(?)) {
Harald Welte5e514fa2018-07-05 00:01:45 +0200243 setverdict(fail, "SNS-SIZE from unexpected NSEI");
244 self.stop;
245 }
Harald Welte013d65a2020-09-13 14:41:31 +0200246 [] NSCP.receive(tr_SNS_CONFIG(config.nsei, true,
Harald Welte5e8573e2020-09-13 15:32:56 +0200247 {tr_SNS_IPv4(config.provider.ip.remote_ip,
248 config.provider.ip.remote_udp_port)})) -> value rf {
Harald Welte5e514fa2018-07-05 00:01:45 +0200249 /* blindly acknowledge whatever the PCU sends */
Harald Welte013d65a2020-09-13 14:41:31 +0200250 NSCP.send(ts_SNS_CONFIG_ACK(config.nsei, omit));
Harald Welte5e514fa2018-07-05 00:01:45 +0200251 /* send a SNS-CONFIG in response and expect a SNS-CONFIG-ACK */
Harald Welte5e8573e2020-09-13 15:32:56 +0200252 var IP4_Elements v4 := { valueof(ts_SNS_IPv4(config.provider.ip.local_ip, config.provider.ip.local_udp_port)) };
Harald Welte013d65a2020-09-13 14:41:31 +0200253 NSCP.send(ts_SNS_CONFIG(config.nsei, true, v4));
Harald Welte5e514fa2018-07-05 00:01:45 +0200254 alt {
Harald Welte013d65a2020-09-13 14:41:31 +0200255 [] NSCP.receive(tr_SNS_CONFIG_ACK(config.nsei, omit)) {
Harald Welte5e514fa2018-07-05 00:01:45 +0200256 /* success */
257 }
Harald Welte013d65a2020-09-13 14:41:31 +0200258 [] NSCP.receive(tr_SNS_CONFIG_ACK(config.nsei, ?)) {
Harald Welte5e514fa2018-07-05 00:01:45 +0200259 setverdict(fail, "Unexpected SNS-CONFIG-NACK");
260 self.stop;
261 }
262 }
263 }
Harald Welte013d65a2020-09-13 14:41:31 +0200264 [] NSCP.receive(tr_SNS_CONFIG(config.nsei, false, ?)) { /* ignore */}
265 [] NSCP.receive(tr_SNS_CONFIG(config.nsei, true, ?)) {
Harald Welte5e514fa2018-07-05 00:01:45 +0200266 setverdict(fail, "Unexpected SNS-CONFIG content");
267 self.stop;
268 }
Harald Welte013d65a2020-09-13 14:41:31 +0200269 [] NSCP.receive(tr_SNS_CONFIG(?, ?, ?)) {
Harald Welte5e514fa2018-07-05 00:01:45 +0200270 setverdict(fail, "SNS-CONFIG from unexpected NSEI");
271 self.stop;
272 }
273 }
274
Harald Welte6fff3642017-07-22 21:36:13 +0200275 private function f_ScanEvents() runs on NS_CT {
276 var NsUnitdataRequest ud_req;
Harald Welte013d65a2020-09-13 14:41:31 +0200277 var PDU_NS rf;
Harald Welte6e594f22017-07-23 16:19:35 +0200278 var default d;
279
280 d := activate(as_allstate());
Harald Welte6fff3642017-07-22 21:36:13 +0200281
282 while (true) {
Harald Welte6e594f22017-07-23 16:19:35 +0200283 if (g_state == NSE_S_DEAD_BLOCKED) {
Harald Welte6fff3642017-07-22 21:36:13 +0200284 alt {
Harald Welte6e594f22017-07-23 16:19:35 +0200285 [false] any timer.timeout {}
Harald Welte6fff3642017-07-22 21:36:13 +0200286 }
Harald Welte6e594f22017-07-23 16:19:35 +0200287 } else if (g_state == NSE_S_WAIT_RESET) {
Harald Welte6fff3642017-07-22 21:36:13 +0200288 alt {
Harald Welte013d65a2020-09-13 14:41:31 +0200289 [] NSCP.receive(tr_NS_RESET_ACK(config.nsvci, config.nsei)) -> value rf {
Harald Welte6e594f22017-07-23 16:19:35 +0200290 f_change_state(NSE_S_ALIVE_BLOCKED);
291 f_sendAlive();
292 f_sendUnblock();
Harald Welte6fff3642017-07-22 21:36:13 +0200293 }
Harald Welte6fff3642017-07-22 21:36:13 +0200294 }
Harald Welte6e594f22017-07-23 16:19:35 +0200295 } else if (g_state == NSE_S_ALIVE_BLOCKED) {
Harald Welte6fff3642017-07-22 21:36:13 +0200296 alt {
Harald Welte6e594f22017-07-23 16:19:35 +0200297 /* bogus block, just respond with ACK */
Harald Welte013d65a2020-09-13 14:41:31 +0200298 [] NSCP.receive(tr_NS_BLOCK(?, config.nsvci)) -> value rf {
299 NSCP.send(ts_NS_BLOCK_ACK(config.nsvci));
Harald Welte6e594f22017-07-23 16:19:35 +0200300 }
301 /* Respond to UNBLOCK with UNBLOCK-ACK + change state */
Harald Welte013d65a2020-09-13 14:41:31 +0200302 [] NSCP.receive(t_NS_UNBLOCK) -> value rf {
303 NSCP.send(t_NS_UNBLOCK_ACK);
Harald Welte6e594f22017-07-23 16:19:35 +0200304 Tns_block.stop;
305 f_change_state(NSE_S_ALIVE_UNBLOCKED);
306 }
Harald Welte013d65a2020-09-13 14:41:31 +0200307 [] NSCP.receive(t_NS_UNBLOCK_ACK) -> value rf {
Harald Welte6e594f22017-07-23 16:19:35 +0200308 Tns_block.stop;
309 f_change_state(NSE_S_ALIVE_UNBLOCKED);
310 }
311 [] Tns_block.timeout {
312 /* repeat unblock transmission */
313 f_sendUnblock();
314 }
315 }
316 } else if (g_state == NSE_S_ALIVE_UNBLOCKED) {
317 alt {
318 /* bogus unblock, just respond with ACK */
Harald Welte013d65a2020-09-13 14:41:31 +0200319 [] NSCP.receive(t_NS_UNBLOCK) -> value rf {
320 NSCP.send(t_NS_UNBLOCK_ACK);
Harald Welte6e594f22017-07-23 16:19:35 +0200321 }
322 /* Respond to BLOCK with BLOCK-ACK + change state */
Harald Welte013d65a2020-09-13 14:41:31 +0200323 [] NSCP.receive(tr_NS_BLOCK(?, config.nsvci)) -> value rf {
324 NSCP.send(ts_NS_BLOCK_ACK(config.nsvci));
Harald Welte6e594f22017-07-23 16:19:35 +0200325 Tns_block.stop;
326 f_change_state(NSE_S_ALIVE_BLOCKED);
327 }
Harald Welte013d65a2020-09-13 14:41:31 +0200328 [] NSCP.receive(tr_NS_BLOCK_ACK(config.nsvci)) -> value rf {
Harald Welte6e594f22017-07-23 16:19:35 +0200329 Tns_block.stop;
330 }
331 /* NS-UNITDATA PDU from network to NS-UNITDATA.ind to user */
Harald Welte013d65a2020-09-13 14:41:31 +0200332 [] NSCP.receive(tr_NS_UNITDATA(?, ?, ?)) -> value rf {
Alexander Couzens2c12b242018-07-31 00:30:11 +0200333 NS_SP.send(t_NsUdInd(config.nsei,
Harald Welte013d65a2020-09-13 14:41:31 +0200334 oct2int(rf.pDU_NS_Unitdata.bVCI),
335 rf.pDU_NS_Unitdata.nS_SDU));
Harald Welte6e594f22017-07-23 16:19:35 +0200336 }
337 /* NS-UNITDATA.req from user to NS-UNITDATA PDU on network */
Alexander Couzens2c12b242018-07-31 00:30:11 +0200338 [] NS_SP.receive(t_NsUdReq(config.nsei, ?, ?, omit)) -> value ud_req {
Harald Welte6e594f22017-07-23 16:19:35 +0200339 /* using raw octetstring PDU */
Harald Welte013d65a2020-09-13 14:41:31 +0200340 NSCP.send(ts_NS_UNITDATA(t_SduCtrlB, ud_req.bvci, ud_req.sdu));
Harald Welte6e594f22017-07-23 16:19:35 +0200341 }
Alexander Couzens2c12b242018-07-31 00:30:11 +0200342 [] NS_SP.receive(t_NsUdReq(config.nsei, ?, omit, ?)) -> value ud_req {
Harald Welte6e594f22017-07-23 16:19:35 +0200343 /* using decoded BSSGP PDU that we need to encode first */
Harald Weltee0abc472018-02-05 09:13:31 +0100344 var octetstring enc := enc_PDU_BSSGP(ud_req.bssgp);
Harald Welte013d65a2020-09-13 14:41:31 +0200345 NSCP.send(ts_NS_UNITDATA(t_SduCtrlB, ud_req.bvci, enc));
Harald Welte6e594f22017-07-23 16:19:35 +0200346 }
Harald Welte6fff3642017-07-22 21:36:13 +0200347 }
348 }
349
Harald Welte6e594f22017-07-23 16:19:35 +0200350 } /* while */
351 //deactivate(d);
Harald Welte6fff3642017-07-22 21:36:13 +0200352 }
353}