blob: 697a4821ba6a119293456c6ff4cd02e1138aa1f3 [file] [log] [blame]
Harald Welte34b5a952019-05-27 11:54:11 +02001/* GPRS-NS Emulation in TTCN-3
2 * (C) 2018 Harald Welte <laforge@gnumonks.org>
3 * contributions by sysmocom - s.f.m.c. GmbH
4 * All rights reserved.
5 *
6 * Released under the terms of GNU General Public License, Version 2 or
7 * (at your option) any later version.
8 *
9 * SPDX-License-Identifier: GPL-2.0-or-later
10 */
11
Harald Welte6fff3642017-07-22 21:36:13 +020012module NS_Emulation {
13 import from NS_Types all;
14 import from BSSGP_Types all;
Harald Weltee0abc472018-02-05 09:13:31 +010015 import from Osmocom_Gb_Types all;
Harald Welte6fff3642017-07-22 21:36:13 +020016 import from NS_CodecPort all;
17 import from NS_CodecPort_CtrlFunct all;
Harald Welte6fff3642017-07-22 21:36:13 +020018 import from IPL4asp_Types all;
19
20 type record NsUnitdataRequest {
21 BssgpBvci bvci,
22 Nsei nsei,
Harald Welte6e594f22017-07-23 16:19:35 +020023 octetstring sdu optional,
Harald Weltee0abc472018-02-05 09:13:31 +010024 PDU_BSSGP bssgp optional
Harald Welte6e594f22017-07-23 16:19:35 +020025 }
26
27 template NsUnitdataRequest t_NsUdReq(template Nsei nsei, template BssgpBvci bvci, template octetstring sdu,
Harald Weltee0abc472018-02-05 09:13:31 +010028 template PDU_BSSGP bssgp) := {
Harald Welte6e594f22017-07-23 16:19:35 +020029 bvci := bvci,
30 nsei := nsei,
31 sdu := sdu,
32 bssgp := bssgp
Harald Welte6fff3642017-07-22 21:36:13 +020033 }
34
35 type record NsUnitdataIndication {
36 BssgpBvci bvci,
37 Nsei nsei,
Harald Welte6e594f22017-07-23 16:19:35 +020038 octetstring sdu optional,
Harald Weltee0abc472018-02-05 09:13:31 +010039 PDU_BSSGP bssgp optional
Harald Welte6e594f22017-07-23 16:19:35 +020040 }
41
42 template NsUnitdataIndication t_NsUdInd(Nsei nsei, BssgpBvci bvci, octetstring sdu) := {
43 bvci := bvci,
44 nsei := nsei,
45 sdu := sdu,
Harald Weltee0abc472018-02-05 09:13:31 +010046 bssgp := dec_PDU_BSSGP(sdu)
Harald Welte6e594f22017-07-23 16:19:35 +020047 }
48
49 type record NsStatusIndication {
50 Nsei nsei,
51 Nsvci nsvci,
52 NseState old_state,
53 NseState new_state
54 }
55
56 template NsStatusIndication t_NsStsInd(Nsei nsei, Nsvci nsvci, NseState old_state, NseState state) := {
57 nsei := nsei,
58 nsvci := nsvci,
59 old_state := old_state,
60 new_state := state
Harald Welte6fff3642017-07-22 21:36:13 +020061 }
62
63 type enumerated NseState {
Harald Welte6e594f22017-07-23 16:19:35 +020064 NSE_S_DEAD_BLOCKED,
65 NSE_S_WAIT_RESET,
66 NSE_S_ALIVE_BLOCKED,
67 NSE_S_ALIVE_UNBLOCKED
68 }
Harald Welte6fff3642017-07-22 21:36:13 +020069
70 /* port from our (internal) point of view */
71 type port NS_SP_PT message {
72 in NsUnitdataRequest;
73 out NsUnitdataIndication,
Harald Welte6e594f22017-07-23 16:19:35 +020074 NsStatusIndication,
Harald Welte6fff3642017-07-22 21:36:13 +020075 ASP_Event;
76 } with { extension "internal" };
77
78 /* port from the user point of view */
79 type port NS_PT message {
80 in ASP_Event,
Harald Welte6e594f22017-07-23 16:19:35 +020081 NsStatusIndication,
Harald Welte6fff3642017-07-22 21:36:13 +020082 NsUnitdataIndication;
83 out NsUnitdataRequest;
84 } with { extension "internal" };
85
Alexander Couzens2c12b242018-07-31 00:30:11 +020086 function NSStart(NSConfiguration init_config) runs on NS_CT {
87 config := init_config;
Harald Welte6fff3642017-07-22 21:36:13 +020088 f_init();
89 f_ScanEvents();
90 }
91
92 private function f_init() runs on NS_CT {
Harald Welte6e594f22017-07-23 16:19:35 +020093 var Result res;
94 /* Connect the UDP socket */
Alexander Couzens2c12b242018-07-31 00:30:11 +020095 res := f_IPL4_connect(NSCP, config.remote_ip, config.remote_udp_port, config.local_ip, config.local_udp_port, 0, { udp := {}});
Harald Welte9220f632018-05-23 20:27:02 +020096 if (not ispresent(res.connId)) {
Max39e6cae2018-11-06 19:00:50 +010097 setverdict(fail, "Could not connect NS UDP socket from " &
98 config.local_ip & ":" & int2str(config.local_udp_port) &
99 " to " & config.remote_ip & ":" & int2str(config.remote_udp_port));
Daniel Willmanne4ff5372018-07-05 17:35:03 +0200100 mtc.stop;
Harald Welte9220f632018-05-23 20:27:02 +0200101 }
Harald Welte6e594f22017-07-23 16:19:35 +0200102 g_conn_id := res.connId;
103 f_change_state(NSE_S_DEAD_BLOCKED);
104 /* Send the first NS-ALIVE to test the connection */
Harald Weltee81d84e2018-07-05 03:17:00 +0200105 if (not config.role_sgsn) {
106 f_sendReset();
107 }
Harald Welte6fff3642017-07-22 21:36:13 +0200108 }
109
110 type component NS_CT {
111 /* UDP port towards the bottom (IUT) */
112 port NS_CODEC_PT NSCP;
113 /* NS-User SAP towards the user */
114 port NS_SP_PT NS_SP;
115
Alexander Couzens2c12b242018-07-31 00:30:11 +0200116 var NSConfiguration config;
117
Harald Welte6e594f22017-07-23 16:19:35 +0200118 var NseState g_state := NSE_S_DEAD_BLOCKED;
119 var ConnectionId g_conn_id := -1;
120
121 timer Tns_alive := 3.0;
122 timer Tns_test := 10.0;
123 timer Tns_block := 10.0;
Harald Welte6fff3642017-07-22 21:36:13 +0200124 }
125
Alexander Couzens2c12b242018-07-31 00:30:11 +0200126 type record NSConfiguration {
127 PortNumber local_udp_port,
128 charstring local_ip,
129 PortNumber remote_udp_port,
130 charstring remote_ip,
131 Nsvci nsvci,
Harald Welte5e514fa2018-07-05 00:01:45 +0200132 Nsvci nsei,
133 boolean role_sgsn,
134 boolean handle_sns
Alexander Couzens2c12b242018-07-31 00:30:11 +0200135 }
Harald Welte6fff3642017-07-22 21:36:13 +0200136
Harald Welte6e594f22017-07-23 16:19:35 +0200137 private function f_change_state(NseState new_state) runs on NS_CT {
138 var NseState old_state := g_state;
139 g_state := new_state;
140 log("NS State Transition: ", old_state, " -> ", new_state);
Alexander Couzens2c12b242018-07-31 00:30:11 +0200141 NS_SP.send(t_NsStsInd(config.nsei, config.nsvci, old_state, new_state));
Harald Welte6fff3642017-07-22 21:36:13 +0200142 }
143
Harald Welte6e594f22017-07-23 16:19:35 +0200144 private function f_sendReset() runs on NS_CT {
Harald Welte387ab372018-06-30 10:27:06 +0200145 NSCP.send(t_NS_Send(g_conn_id, ts_NS_RESET(NS_CAUSE_OM_INTERVENTION, config.nsvci, config.nsei)));
Harald Welte6e594f22017-07-23 16:19:35 +0200146 g_state := NSE_S_WAIT_RESET;
Harald Welte6fff3642017-07-22 21:36:13 +0200147 }
148
Harald Welte6e594f22017-07-23 16:19:35 +0200149 private function f_sendAlive() runs on NS_CT {
150 NSCP.send(t_NS_Send(g_conn_id, t_NS_ALIVE));
151 Tns_alive.start;
152 }
153
154 private function f_sendUnblock() runs on NS_CT {
155 NSCP.send(t_NS_Send(g_conn_id, t_NS_UNBLOCK));
156 Tns_block.start;
157 }
158
159 private function f_sendBlock(NsCause cause) runs on NS_CT {
Harald Welte387ab372018-06-30 10:27:06 +0200160 NSCP.send(t_NS_Send(g_conn_id, ts_NS_BLOCK(cause, config.nsvci)));
Harald Welte6e594f22017-07-23 16:19:35 +0200161 Tns_block.start;
162 }
163
164 altstep as_allstate() runs on NS_CT {
165 var NS_RecvFrom rf;
166 var ASP_Event evt;
167
168 /* transition to DEAD if t_alive times out */
Harald Weltec27f6842018-03-02 21:40:03 +0100169 [Tns_alive.running] Tns_alive.timeout {
Harald Welte6e594f22017-07-23 16:19:35 +0200170 log("Tns-alive expired: changing to DEAD_BLOCKED + starting Tns-test");
171 f_change_state(NSE_S_DEAD_BLOCKED);
172 Tns_test.start;
Harald Welte6fff3642017-07-22 21:36:13 +0200173 }
Harald Welte6fff3642017-07-22 21:36:13 +0200174
Harald Weltec27f6842018-03-02 21:40:03 +0100175 [Tns_test.running] Tns_test.timeout {
Harald Welte6e594f22017-07-23 16:19:35 +0200176 log("Tns-test expired: sending NS-ALIVE");
177 f_sendAlive();
Harald Welte6fff3642017-07-22 21:36:13 +0200178 }
Harald Welte6fff3642017-07-22 21:36:13 +0200179
Harald Welte6e594f22017-07-23 16:19:35 +0200180 /* Stop t_alive when receiving ALIVE-ACK */
181 [] NSCP.receive(t_NS_RecvFrom(t_NS_ALIVE_ACK)) {
182 log("NS-ALIVE-ACK received: stopping Tns-alive; starting Tns-test");
183 Tns_alive.stop;
184 Tns_test.start;
185 }
Harald Welte6fff3642017-07-22 21:36:13 +0200186
Harald Welte6e594f22017-07-23 16:19:35 +0200187 /* respond to NS-ALIVE with NS-ALIVE-ACK */
188 [] NSCP.receive(t_NS_RecvFrom(t_NS_ALIVE)) {
189 NSCP.send(t_NS_Send(g_conn_id, t_NS_ALIVE_ACK));
190 }
191
192 /* Respond to BLOCK for wrong NSVCI */
Harald Welte387ab372018-06-30 10:27:06 +0200193 [] NSCP.receive(t_NS_RecvFrom(tr_NS_BLOCK(?, ?))) -> value rf {
Harald Welte6e594f22017-07-23 16:19:35 +0200194 log("Rx NS-BLOCK for unknown NSVCI");
195 /* FIXME */
196 }
197
198 /* Respond to RESET with correct NSEI/NSVCI */
Harald Welte387ab372018-06-30 10:27:06 +0200199 [] NSCP.receive(t_NS_RecvFrom(tr_NS_RESET(?, config.nsvci, config.nsei))) -> value rf {
Harald Welte6e594f22017-07-23 16:19:35 +0200200 f_change_state(NSE_S_ALIVE_BLOCKED);
Harald Welte387ab372018-06-30 10:27:06 +0200201 NSCP.send(t_NS_Send(g_conn_id, ts_NS_RESET_ACK(config.nsvci, config.nsei)));
Harald Welte6e594f22017-07-23 16:19:35 +0200202 }
203
204 /* Respond to RESET with wrong NSEI/NSVCI */
Harald Welte387ab372018-06-30 10:27:06 +0200205 [] NSCP.receive(t_NS_RecvFrom(tr_NS_RESET(?, ?, ?))) -> value rf {
Harald Welte6e594f22017-07-23 16:19:35 +0200206 log("Rx NS-RESET for unknown NSEI/NSVCI");
207 /* FIXME */
208 }
209
Harald Welte5e514fa2018-07-05 00:01:45 +0200210 [config.role_sgsn and config.handle_sns] as_sns_sgsn();
211
Harald Welte6e594f22017-07-23 16:19:35 +0200212 /* default case of handling unknown PDUs */
213 [] NSCP.receive(t_NS_RecvFrom(?)) -> value rf {
214 log("Rx Unexpected NS PDU ", rf.msg," in state ", g_state);
Harald Weltee0abc472018-02-05 09:13:31 +0100215 NSCP.send(t_NS_Send(g_conn_id, ts_NS_STATUS(NS_CAUSE_PDU_NOT_COMPATIBLE_WITH_PROTOCOL_STATE, rf.msg)));
Harald Welte6e594f22017-07-23 16:19:35 +0200216 }
217 /* Forwarding of ASP_Evet to user */
218 [] NSCP.receive(ASP_Event:?) -> value evt { NS_SP.send(evt); }
Harald Welte6fff3642017-07-22 21:36:13 +0200219 }
220
Harald Welte5e514fa2018-07-05 00:01:45 +0200221 /* simple IP Sub-Network Service responder for the SGSN side. This is not a full implementation
222 * of the protocol, merely sufficient to make the PCU/BSS side happy to proceed */
223 altstep as_sns_sgsn() runs on NS_CT {
224 var NS_RecvFrom rf;
225 [] NSCP.receive(t_NS_RecvFrom(tr_SNS_SIZE(config.nsei))) -> value rf {
226 /* blindly acknowledge whatever the PCU sends */
227 NSCP.send(t_NS_Send(g_conn_id, ts_SNS_SIZE_ACK(config.nsei, omit)));
228 }
229 [] NSCP.receive(t_NS_RecvFrom(tr_SNS_SIZE(?))) {
230 setverdict(fail, "SNS-SIZE from unexpected NSEI");
231 self.stop;
232 }
233 [] NSCP.receive(t_NS_RecvFrom(tr_SNS_CONFIG(config.nsei, true,
234 {tr_SNS_IPv4(config.remote_ip, config.remote_udp_port)}))) -> value rf {
235 /* blindly acknowledge whatever the PCU sends */
236 NSCP.send(t_NS_Send(g_conn_id, ts_SNS_CONFIG_ACK(config.nsei, omit)));
237 /* send a SNS-CONFIG in response and expect a SNS-CONFIG-ACK */
238 var IP4_Elements v4 := { valueof(ts_SNS_IPv4(config.local_ip, config.local_udp_port)) };
239 NSCP.send(t_NS_Send(g_conn_id, ts_SNS_CONFIG(config.nsei, true, v4)));
240 alt {
241 [] NSCP.receive(t_NS_RecvFrom(tr_SNS_CONFIG_ACK(config.nsei, omit))) {
242 /* success */
243 }
244 [] NSCP.receive(t_NS_RecvFrom(tr_SNS_CONFIG_ACK(config.nsei, ?))) {
245 setverdict(fail, "Unexpected SNS-CONFIG-NACK");
246 self.stop;
247 }
248 }
249 }
250 [] NSCP.receive(t_NS_RecvFrom(tr_SNS_CONFIG(config.nsei, false, ?))) { /* ignore */}
251 [] NSCP.receive(t_NS_RecvFrom(tr_SNS_CONFIG(config.nsei, true, ?))) {
252 setverdict(fail, "Unexpected SNS-CONFIG content");
253 self.stop;
254 }
255 [] NSCP.receive(t_NS_RecvFrom(tr_SNS_CONFIG(?, ?, ?))) {
256 setverdict(fail, "SNS-CONFIG from unexpected NSEI");
257 self.stop;
258 }
259 }
260
Harald Welte6fff3642017-07-22 21:36:13 +0200261 private function f_ScanEvents() runs on NS_CT {
262 var NsUnitdataRequest ud_req;
263 var NS_RecvFrom rf;
Harald Welte6e594f22017-07-23 16:19:35 +0200264 var default d;
265
266 d := activate(as_allstate());
Harald Welte6fff3642017-07-22 21:36:13 +0200267
268 while (true) {
Harald Welte6e594f22017-07-23 16:19:35 +0200269 if (g_state == NSE_S_DEAD_BLOCKED) {
Harald Welte6fff3642017-07-22 21:36:13 +0200270 alt {
Harald Welte6e594f22017-07-23 16:19:35 +0200271 [false] any timer.timeout {}
Harald Welte6fff3642017-07-22 21:36:13 +0200272 }
Harald Welte6e594f22017-07-23 16:19:35 +0200273 } else if (g_state == NSE_S_WAIT_RESET) {
Harald Welte6fff3642017-07-22 21:36:13 +0200274 alt {
Harald Welte387ab372018-06-30 10:27:06 +0200275 [] NSCP.receive(t_NS_RecvFrom(tr_NS_RESET_ACK(config.nsvci, config.nsei))) -> value rf {
Harald Welte6e594f22017-07-23 16:19:35 +0200276 f_change_state(NSE_S_ALIVE_BLOCKED);
277 f_sendAlive();
278 f_sendUnblock();
Harald Welte6fff3642017-07-22 21:36:13 +0200279 }
Harald Welte6fff3642017-07-22 21:36:13 +0200280 }
Harald Welte6e594f22017-07-23 16:19:35 +0200281 } else if (g_state == NSE_S_ALIVE_BLOCKED) {
Harald Welte6fff3642017-07-22 21:36:13 +0200282 alt {
Harald Welte6e594f22017-07-23 16:19:35 +0200283 /* bogus block, just respond with ACK */
Harald Welte387ab372018-06-30 10:27:06 +0200284 [] NSCP.receive(t_NS_RecvFrom(tr_NS_BLOCK(?, config.nsvci))) -> value rf {
285 NSCP.send(t_NS_Send(g_conn_id, ts_NS_BLOCK_ACK(config.nsvci)));
Harald Welte6e594f22017-07-23 16:19:35 +0200286 }
287 /* Respond to UNBLOCK with UNBLOCK-ACK + change state */
288 [] NSCP.receive(t_NS_RecvFrom(t_NS_UNBLOCK)) -> value rf {
289 NSCP.send(t_NS_Send(g_conn_id, t_NS_UNBLOCK_ACK));
290 Tns_block.stop;
291 f_change_state(NSE_S_ALIVE_UNBLOCKED);
292 }
293 [] NSCP.receive(t_NS_RecvFrom(t_NS_UNBLOCK_ACK)) -> value rf {
294 Tns_block.stop;
295 f_change_state(NSE_S_ALIVE_UNBLOCKED);
296 }
297 [] Tns_block.timeout {
298 /* repeat unblock transmission */
299 f_sendUnblock();
300 }
301 }
302 } else if (g_state == NSE_S_ALIVE_UNBLOCKED) {
303 alt {
304 /* bogus unblock, just respond with ACK */
305 [] NSCP.receive(t_NS_RecvFrom(t_NS_UNBLOCK)) -> value rf {
306 NSCP.send(t_NS_Send(g_conn_id, t_NS_UNBLOCK_ACK));
307 }
308 /* Respond to BLOCK with BLOCK-ACK + change state */
Harald Welte387ab372018-06-30 10:27:06 +0200309 [] NSCP.receive(t_NS_RecvFrom(tr_NS_BLOCK(?, config.nsvci))) -> value rf {
310 NSCP.send(t_NS_Send(g_conn_id, ts_NS_BLOCK_ACK(config.nsvci)));
Harald Welte6e594f22017-07-23 16:19:35 +0200311 Tns_block.stop;
312 f_change_state(NSE_S_ALIVE_BLOCKED);
313 }
Harald Welte387ab372018-06-30 10:27:06 +0200314 [] NSCP.receive(t_NS_RecvFrom(tr_NS_BLOCK_ACK(config.nsvci))) -> value rf {
Harald Welte6e594f22017-07-23 16:19:35 +0200315 Tns_block.stop;
316 }
317 /* NS-UNITDATA PDU from network to NS-UNITDATA.ind to user */
Harald Welte387ab372018-06-30 10:27:06 +0200318 [] NSCP.receive(t_NS_RecvFrom(tr_NS_UNITDATA(?, ?, ?))) -> value rf {
Alexander Couzens2c12b242018-07-31 00:30:11 +0200319 NS_SP.send(t_NsUdInd(config.nsei,
Harald Weltee0abc472018-02-05 09:13:31 +0100320 oct2int(rf.msg.pDU_NS_Unitdata.bVCI),
321 rf.msg.pDU_NS_Unitdata.nS_SDU));
Harald Welte6e594f22017-07-23 16:19:35 +0200322 }
323 /* NS-UNITDATA.req from user to NS-UNITDATA PDU on network */
Alexander Couzens2c12b242018-07-31 00:30:11 +0200324 [] NS_SP.receive(t_NsUdReq(config.nsei, ?, ?, omit)) -> value ud_req {
Harald Welte6e594f22017-07-23 16:19:35 +0200325 /* using raw octetstring PDU */
Harald Welte387ab372018-06-30 10:27:06 +0200326 NSCP.send(t_NS_Send(g_conn_id, ts_NS_UNITDATA(t_SduCtrlB, ud_req.bvci, ud_req.sdu)));
Harald Welte6e594f22017-07-23 16:19:35 +0200327 }
Alexander Couzens2c12b242018-07-31 00:30:11 +0200328 [] NS_SP.receive(t_NsUdReq(config.nsei, ?, omit, ?)) -> value ud_req {
Harald Welte6e594f22017-07-23 16:19:35 +0200329 /* using decoded BSSGP PDU that we need to encode first */
Harald Weltee0abc472018-02-05 09:13:31 +0100330 var octetstring enc := enc_PDU_BSSGP(ud_req.bssgp);
Harald Welte387ab372018-06-30 10:27:06 +0200331 NSCP.send(t_NS_Send(g_conn_id, ts_NS_UNITDATA(t_SduCtrlB, ud_req.bvci, enc)));
Harald Welte6e594f22017-07-23 16:19:35 +0200332 }
Harald Welte6fff3642017-07-22 21:36:13 +0200333 }
334 }
335
Harald Welte6e594f22017-07-23 16:19:35 +0200336 } /* while */
337 //deactivate(d);
Harald Welte6fff3642017-07-22 21:36:13 +0200338 }
339}