diff options
Diffstat (limited to 'src/libvlr')
-rw-r--r-- | src/libvlr/Makefile.am | 19 | ||||
-rw-r--r-- | src/libvlr/vlr.c | 1112 | ||||
-rw-r--r-- | src/libvlr/vlr_access_req_fsm.c | 795 | ||||
-rw-r--r-- | src/libvlr/vlr_access_req_fsm.h | 17 | ||||
-rw-r--r-- | src/libvlr/vlr_auth_fsm.c | 605 | ||||
-rw-r--r-- | src/libvlr/vlr_auth_fsm.h | 52 | ||||
-rw-r--r-- | src/libvlr/vlr_core.h | 21 | ||||
-rw-r--r-- | src/libvlr/vlr_lu_fsm.c | 1449 | ||||
-rw-r--r-- | src/libvlr/vlr_lu_fsm.h | 18 |
9 files changed, 0 insertions, 4088 deletions
diff --git a/src/libvlr/Makefile.am b/src/libvlr/Makefile.am deleted file mode 100644 index 17ad4111f..000000000 --- a/src/libvlr/Makefile.am +++ /dev/null @@ -1,19 +0,0 @@ -AM_CPPFLAGS = $(all_includes) -I$(top_srcdir)/include -I$(top_builddir) -AM_CFLAGS=-Wall $(LIBOSMOCORE_CFLAGS) $(LIBOSMOVTY_CFLAGS) \ - $(COVERAGE_CFLAGS) $(LIBCRYPTO_CFLAGS) - -noinst_HEADERS = \ - vlr_access_req_fsm.h \ - vlr_auth_fsm.h \ - vlr_core.h \ - vlr_lu_fsm.h \ - $(NULL) - -noinst_LIBRARIES = libvlr.a - -libvlr_a_SOURCES = \ - vlr.c \ - vlr_access_req_fsm.c \ - vlr_auth_fsm.c \ - vlr_lu_fsm.c \ - $(NULL) diff --git a/src/libvlr/vlr.c b/src/libvlr/vlr.c deleted file mode 100644 index d95d1b7ec..000000000 --- a/src/libvlr/vlr.c +++ /dev/null @@ -1,1112 +0,0 @@ -/* Osmocom Visitor Location Register (VLR) code base */ - -/* (C) 2016 by Harald Welte <laforge@gnumonks.org> - * - * All Rights Reserved - * - * This program is free software; you can redistribute it and/or modify - * it under the terms of the GNU Affero General Public License as published by - * the Free Software Foundation; either version 3 of the License, or - * (at your option) any later version. - * - * This program is distributed in the hope that it will be useful, - * but WITHOUT ANY WARRANTY; without even the implied warranty of - * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the - * GNU Affero General Public License for more details. - * - * You should have received a copy of the GNU Affero General Public License - * along with this program. If not, see <http://www.gnu.org/licenses/>. - * - */ - -#include <osmocom/core/linuxlist.h> -#include <osmocom/core/fsm.h> -#include <osmocom/core/utils.h> -#include <osmocom/gsm/protocol/gsm_04_08_gprs.h> -#include <osmocom/gsm/gsup.h> -#include <osmocom/gsm/apn.h> -#include <openbsc/gsm_subscriber.h> -#include <openbsc/gsup_client.h> -#include <openbsc/vlr.h> -#include <openbsc/gprs_sgsn.h> -#include <openbsc/gprs_utils.h> -#include <openbsc/debug.h> - -#include <openssl/rand.h> - -#include <netinet/in.h> -#include <arpa/inet.h> -#include <limits.h> - -#include "vlr_core.h" -#include "vlr_auth_fsm.h" -#include "vlr_lu_fsm.h" -#include "vlr_access_req_fsm.h" - -#define SGSN_SUBSCR_MAX_RETRIES 3 -#define SGSN_SUBSCR_RETRY_INTERVAL 10 - -/*********************************************************************** - * Convenience functions - ***********************************************************************/ - -const struct value_string vlr_ciph_names[] = { - OSMO_VALUE_STRING(VLR_CIPH_NONE), - OSMO_VALUE_STRING(VLR_CIPH_A5_1), - OSMO_VALUE_STRING(VLR_CIPH_A5_2), - OSMO_VALUE_STRING(VLR_CIPH_A5_3), - { 0, NULL } -}; - -uint32_t vlr_timer(struct vlr_instance *vlr, uint32_t timer) -{ - uint32_t tidx = 0xffffffff; - - switch (timer) { - case 3270: - tidx = VLR_T_3270; - break; - case 3260: - tidx = VLR_T_3260; - break; - case 3250: - tidx = VLR_T_3250; - break; - } - - OSMO_ASSERT(tidx < sizeof(vlr->cfg.timer)); - return vlr->cfg.timer[tidx]; -} - -struct vlr_subscr *_vlr_subscr_find_by_imsi(struct vlr_instance *vlr, - const char *imsi, - const char *file, int line) -{ - struct vlr_subscr *vsub; - - if (!imsi || !*imsi) - return NULL; - - llist_for_each_entry(vsub, &vlr->subscribers, list) { - if (vlr_subscr_matches_imsi(vsub, imsi)) - return _vlr_subscr_get(vsub, file, line); - } - return NULL; -} - -struct vlr_subscr *_vlr_subscr_find_by_tmsi(struct vlr_instance *vlr, - uint32_t tmsi, - const char *file, int line) -{ - struct vlr_subscr *vsub; - - if (tmsi == GSM_RESERVED_TMSI) - return NULL; - - llist_for_each_entry(vsub, &vlr->subscribers, list) { - if (vlr_subscr_matches_tmsi(vsub, tmsi)) - return _vlr_subscr_get(vsub, file, line); - } - return NULL; -} - -struct vlr_subscr *_vlr_subscr_find_by_msisdn(struct vlr_instance *vlr, - const char *msisdn, - const char *file, int line) -{ - struct vlr_subscr *vsub; - - if (!msisdn || !*msisdn) - return NULL; - - llist_for_each_entry(vsub, &vlr->subscribers, list) { - if (vlr_subscr_matches_msisdn(vsub, msisdn)) - return _vlr_subscr_get(vsub, file, line); - } - return NULL; -} - -/* Transmit GSUP message to HLR */ -static int vlr_tx_gsup_message(struct vlr_instance *vlr, - struct osmo_gsup_message *gsup_msg) -{ - struct msgb *msg = gsup_client_msgb_alloc(); - - osmo_gsup_encode(msg, gsup_msg); - - if (!vlr->gsup_client) { - LOGP(DVLR, LOGL_NOTICE, "GSUP link is down, cannot " - "send GSUP: %s\n", msgb_hexdump(msg)); - msgb_free(msg); - return -ENOTSUP; - } - - LOGP(DVLR, LOGL_DEBUG, "GSUP tx: %s\n", - osmo_hexdump_nospc(msg->data, msg->len)); - - return gsup_client_send(vlr->gsup_client, msg); -} - -/* Transmit GSUP message for subscriber to HLR, using IMSI from subscriber */ -static int vlr_subscr_tx_gsup_message(struct vlr_subscr *vsub, - struct osmo_gsup_message *gsup_msg) -{ - struct vlr_instance *vlr = vsub->vlr; - - if (strlen(gsup_msg->imsi) == 0) - osmo_strlcpy(gsup_msg->imsi, vsub->imsi, sizeof(gsup_msg->imsi)); - - return vlr_tx_gsup_message(vlr, gsup_msg); -} - -/* Transmit GSUP error in response to original message */ -static int vlr_tx_gsup_error_reply(struct vlr_instance *vlr, - struct osmo_gsup_message *gsup_orig, - enum gsm48_gmm_cause cause) -{ - struct osmo_gsup_message gsup_reply = {0}; - - osmo_strlcpy(gsup_reply.imsi, gsup_orig->imsi, sizeof(gsup_reply.imsi)); - gsup_reply.cause = cause; - gsup_reply.message_type = - OSMO_GSUP_TO_MSGT_ERROR(gsup_orig->message_type); - - return vlr_tx_gsup_message(vlr, &gsup_reply); -} - -struct vlr_subscr *_vlr_subscr_get(struct vlr_subscr *sub, const char *file, int line) -{ - if (!sub) - return NULL; - OSMO_ASSERT(sub->use_count < INT_MAX); - sub->use_count++; - LOGPSRC(DREF, LOGL_DEBUG, file, line, - "VLR subscr %s usage increases to: %d\n", - vlr_subscr_name(sub), sub->use_count); - return sub; -} - -struct vlr_subscr *_vlr_subscr_put(struct vlr_subscr *sub, const char *file, int line) -{ - if (!sub) - return NULL; - sub->use_count--; - LOGPSRC(DREF, sub->use_count >= 0? LOGL_DEBUG : LOGL_ERROR, - file, line, - "VLR subscr %s usage decreases to: %d\n", - vlr_subscr_name(sub), sub->use_count); - if (sub->use_count <= 0) - vlr_subscr_free(sub); - return NULL; -} - -/* Allocate a new subscriber and insert it into list */ -static struct vlr_subscr *_vlr_subscr_alloc(struct vlr_instance *vlr) -{ - struct vlr_subscr *vsub; - int i; - - vsub = talloc_zero(vlr, struct vlr_subscr); - vsub->vlr = vlr; - vsub->tmsi = GSM_RESERVED_TMSI; - vsub->tmsi_new = GSM_RESERVED_TMSI; - - for (i = 0; i < ARRAY_SIZE(vsub->auth_tuples); i++) - vsub->auth_tuples[i].key_seq = GSM_KEY_SEQ_INVAL; - - INIT_LLIST_HEAD(&vsub->cs.requests); - INIT_LLIST_HEAD(&vsub->ps.pdp_list); - - llist_add_tail(&vsub->list, &vlr->subscribers); - return vsub; -} - -struct vlr_subscr *vlr_subscr_alloc(struct vlr_instance *vlr) -{ - return vlr_subscr_get(_vlr_subscr_alloc(vlr)); -} - -/* Send a GSUP Purge MS request. - * TODO: this should be sent to the *previous* VLR when this VLR is "taking" - * this subscriber, not to the HLR? */ -int vlr_subscr_purge(struct vlr_subscr *vsub) -{ - struct osmo_gsup_message gsup_msg = {0}; - - gsup_msg.message_type = OSMO_GSUP_MSGT_PURGE_MS_REQUEST; - - /* provide HLR number in case we know it */ - gsup_msg.hlr_enc_len = vsub->hlr.len; - gsup_msg.hlr_enc = vsub->hlr.buf; - - return vlr_subscr_tx_gsup_message(vsub, &gsup_msg); -} - -void vlr_subscr_cancel(struct vlr_subscr *vsub, enum gsm48_gmm_cause cause) -{ - if (!vsub) - return; - - if (vsub->lu_fsm) { - if (vsub->lu_fsm->state == VLR_ULA_S_WAIT_HLR_UPD) - osmo_fsm_inst_dispatch(vsub->lu_fsm, - VLR_ULA_E_HLR_LU_RES, - (void*)&cause); - else - osmo_fsm_inst_term(vsub->lu_fsm, OSMO_FSM_TERM_ERROR, - 0); - } - - if (vsub->proc_arq_fsm) - osmo_fsm_inst_term(vsub->proc_arq_fsm, OSMO_FSM_TERM_ERROR, 0); -} - -/* Call vlr_subscr_cancel(), then completely drop the entry from the VLR */ -void vlr_subscr_free(struct vlr_subscr *vsub) -{ - llist_del(&vsub->list); - DEBUGP(DREF, "freeing VLR subscr %s\n", vlr_subscr_name(vsub)); - talloc_free(vsub); -} - -/* Generate a new TMSI and store in vsub->tmsi_new. - * Search all known subscribers to ensure that the TMSI is unique. */ -int vlr_subscr_alloc_tmsi(struct vlr_subscr *vsub) -{ - struct vlr_instance *vlr = vsub->vlr; - uint32_t tmsi; - int tried; - - for (tried = 0; tried < 100; tried++) { - if (RAND_bytes((uint8_t *) &tmsi, sizeof(tmsi)) != 1) { - LOGP(DVLR, LOGL_ERROR, "RAND_bytes failed\n"); - return -1; - } - /* throw the dice again, if the TSMI doesn't fit */ - if (tmsi == GSM_RESERVED_TMSI) - continue; - - /* Section 2.4 of 23.003: MSC has two MSB 00/01/10, SGSN 11 */ - if (vlr->cfg.is_ps) { - /* SGSN */ - tmsi |= 0xC000000; - } else { - /* MSC */ - if ((tmsi & 0xC0000000) == 0xC0000000) - tmsi &= ~0xC0000000; - } - - /* If this TMSI is already in use, try another one. */ - if (vlr_subscr_find_by_tmsi(vlr, tmsi)) - continue; - - vsub->tmsi_new = tmsi; - return 0; - } - - LOGP(DVLR, LOGL_ERROR, "subscr %s: unable to generate valid TMSI" - " after %d tries\n", vlr_subscr_name(vsub), tried); - return -1; -} - -/* Find subscriber by IMSI, or create new subscriber if not found. - * \param[in] vlr VLR instace. - * \param[in] imsi IMSI string. - * \param[out] created if non-NULL, returns whether a new entry was created. */ -struct vlr_subscr *_vlr_subscr_find_or_create_by_imsi(struct vlr_instance *vlr, - const char *imsi, - bool *created, - const char *file, - int line) -{ - struct vlr_subscr *vsub; - vsub = _vlr_subscr_find_by_imsi(vlr, imsi, file, line); - if (vsub) { - if (created) - *created = false; - return vsub; - } - - vsub = _vlr_subscr_get(_vlr_subscr_alloc(vlr), file, line); - if (!vsub) - return NULL; - vlr_subscr_set_imsi(vsub, imsi); - LOGP(DVLR, LOGL_INFO, "New subscr, IMSI: %s\n", vsub->imsi); - if (created) - *created = true; - return vsub; -} - -/* Find subscriber by TMSI, or create new subscriber if not found. - * \param[in] vlr VLR instace. - * \param[in] tmsi TMSI. - * \param[out] created if non-NULL, returns whether a new entry was created. */ -struct vlr_subscr *_vlr_subscr_find_or_create_by_tmsi(struct vlr_instance *vlr, - uint32_t tmsi, - bool *created, - const char *file, - int line) -{ - struct vlr_subscr *vsub; - vsub = _vlr_subscr_find_by_tmsi(vlr, tmsi, file, line); - if (vsub) { - if (created) - *created = false; - return vsub; - } - - vsub = _vlr_subscr_get(_vlr_subscr_alloc(vlr), file, line); - if (!vsub) - return NULL; - vsub->tmsi = tmsi; - LOGP(DVLR, LOGL_INFO, "New subscr, TMSI: 0x%08x\n", vsub->tmsi); - if (created) - *created = true; - return vsub; -} - -void vlr_subscr_set_imsi(struct vlr_subscr *vsub, const char *imsi) -{ - if (!vsub) - return; - osmo_strlcpy(vsub->imsi, imsi, sizeof(vsub->imsi)); - vsub->id = atoll(vsub->imsi); - DEBUGP(DVLR, "set IMSI on subscriber; IMSI=%s id=%llu\n", - vsub->imsi, vsub->id); -} - -void vlr_subscr_set_imei(struct vlr_subscr *vsub, const char *imei) -{ - if (!vsub) - return; - osmo_strlcpy(vsub->imei, imei, sizeof(vsub->imei)); - DEBUGP(DVLR, "set IMEI on subscriber; IMSI=%s IMEI=%s\n", - vsub->imsi, vsub->imei); -} - -void vlr_subscr_set_imeisv(struct vlr_subscr *vsub, const char *imeisv) -{ - if (!vsub) - return; - osmo_strlcpy(vsub->imeisv, imeisv, sizeof(vsub->imeisv)); - DEBUGP(DVLR, "set IMEISV on subscriber; IMSI=%s IMEISV=%s\n", - vsub->imsi, vsub->imeisv); -} - -/* Safely copy the given MSISDN string to vsub->msisdn */ -void vlr_subscr_set_msisdn(struct vlr_subscr *vsub, const char *msisdn) -{ - if (!vsub) - return; - osmo_strlcpy(vsub->msisdn, msisdn, sizeof(vsub->msisdn)); - DEBUGP(DVLR, "set MSISDN on subscriber; IMSI=%s MSISDN=%s\n", - vsub->imsi, vsub->msisdn); -} - -bool vlr_subscr_matches_imsi(struct vlr_subscr *vsub, const char *imsi) -{ - return vsub && imsi && vsub->imsi[0] && !strcmp(vsub->imsi, imsi); -} - -bool vlr_subscr_matches_tmsi(struct vlr_subscr *vsub, uint32_t tmsi) -{ - return vsub && tmsi != GSM_RESERVED_TMSI - && (vsub->tmsi == tmsi || vsub->tmsi_new == tmsi); -} - -bool vlr_subscr_matches_msisdn(struct vlr_subscr *vsub, const char *msisdn) -{ - return vsub && msisdn && vsub->msisdn[0] - && !strcmp(vsub->msisdn, msisdn); -} - -bool vlr_subscr_matches_imei(struct vlr_subscr *vsub, const char *imei) -{ - return vsub && imei && vsub->imei[0] - && !strcmp(vsub->imei, imei); -} - -/* Send updated subscriber information to HLR */ -int vlr_subscr_changed(struct vlr_subscr *vsub) -{ - /* FIXME */ - LOGP(DVLR, LOGL_ERROR, "Not implemented: %s\n", __func__); - return 0; -} - -/*********************************************************************** - * PDP context data - ***********************************************************************/ - -struct sgsn_subscriber_pdp_data * -vlr_subscr_pdp_data_alloc(struct vlr_subscr *vsub) -{ - struct sgsn_subscriber_pdp_data* pdata; - - pdata = talloc_zero(vsub, struct sgsn_subscriber_pdp_data); - - llist_add_tail(&pdata->list, &vsub->ps.pdp_list); - - return pdata; -} - -static int vlr_subscr_pdp_data_clear(struct vlr_subscr *vsub) -{ - struct sgsn_subscriber_pdp_data *pdp, *pdp2; - int count = 0; - - llist_for_each_entry_safe(pdp, pdp2, &vsub->ps.pdp_list, list) { - llist_del(&pdp->list); - talloc_free(pdp); - count += 1; - } - - return count; -} - -static struct sgsn_subscriber_pdp_data * -vlr_subscr_pdp_data_get_by_id(struct vlr_subscr *vsub, unsigned context_id) -{ - struct sgsn_subscriber_pdp_data *pdp; - - llist_for_each_entry(pdp, &vsub->ps.pdp_list, list) { - if (pdp->context_id == context_id) - return pdp; - } - - return NULL; -} - -/*********************************************************************** - * Actual Implementation - ***********************************************************************/ - -static int vlr_rx_gsup_unknown_imsi(struct vlr_instance *vlr, - struct osmo_gsup_message *gsup_msg) -{ - if (OSMO_GSUP_IS_MSGT_REQUEST(gsup_msg->message_type)) { - vlr_tx_gsup_error_reply(vlr, gsup_msg, - GMM_CAUSE_IMSI_UNKNOWN); - LOGP(DVLR, LOGL_NOTICE, - "Unknown IMSI %s, discarding GSUP request " - "of type 0x%02x\n", - gsup_msg->imsi, gsup_msg->message_type); - } else if (OSMO_GSUP_IS_MSGT_ERROR(gsup_msg->message_type)) { - LOGP(DVLR, LOGL_NOTICE, - "Unknown IMSI %s, discarding GSUP error " - "of type 0x%02x, cause '%s' (%d)\n", - gsup_msg->imsi, gsup_msg->message_type, - get_value_string(gsm48_gmm_cause_names, gsup_msg->cause), - gsup_msg->cause); - } else { - LOGP(DVLR, LOGL_NOTICE, - "Unknown IMSI %s, discarding GSUP response " - "of type 0x%02x\n", - gsup_msg->imsi, gsup_msg->message_type); - } - - return -GMM_CAUSE_IMSI_UNKNOWN; -} - -static int vlr_rx_gsup_purge_no_subscr(struct vlr_instance *vlr, - struct osmo_gsup_message *gsup_msg) -{ - if (OSMO_GSUP_IS_MSGT_ERROR(gsup_msg->message_type)) { - LOGGSUPP(LOGL_NOTICE, gsup_msg, - "Purge MS has failed with cause '%s' (%d)\n", - get_value_string(gsm48_gmm_cause_names, gsup_msg->cause), - gsup_msg->cause); - return -gsup_msg->cause; - } - LOGGSUPP(LOGL_INFO, gsup_msg, "Completing purge MS\n"); - return 0; -} - -/* VLR internal call to request UpdateLocation from HLR */ -int vlr_subscr_req_lu(struct vlr_subscr *vsub, bool is_ps) -{ - struct osmo_gsup_message gsup_msg = {0}; - int rc; - - gsup_msg.message_type = OSMO_GSUP_MSGT_UPDATE_LOCATION_REQUEST; - rc = vlr_subscr_tx_gsup_message(vsub, &gsup_msg); - - return rc; -} - -/* VLR internal call to request tuples from HLR */ -int vlr_subscr_req_sai(struct vlr_subscr *vsub, - const uint8_t *auts, const uint8_t *auts_rand) -{ - struct osmo_gsup_message gsup_msg = {0}; - - gsup_msg.message_type = OSMO_GSUP_MSGT_SEND_AUTH_INFO_REQUEST; - gsup_msg.auts = auts; - gsup_msg.rand = auts_rand; - - return vlr_subscr_tx_gsup_message(vsub, &gsup_msg); -} - -/* Tell HLR that authentication failure occurred */ -int vlr_subscr_tx_auth_fail_rep(struct vlr_subscr *vsub) -{ - struct osmo_gsup_message gsup_msg = {0}; - - gsup_msg.message_type = OSMO_GSUP_MSGT_AUTH_FAIL_REPORT; - osmo_strlcpy(gsup_msg.imsi, vsub->imsi, sizeof(gsup_msg.imsi)); - return vlr_tx_gsup_message(vsub->vlr, &gsup_msg); -} - -/* Update the subscriber with GSUP-received auth tuples */ -void vlr_subscr_update_tuples(struct vlr_subscr *vsub, - const struct osmo_gsup_message *gsup) -{ - unsigned int i; - unsigned int got_tuples; - - if (gsup->num_auth_vectors) { - memset(&vsub->auth_tuples, 0, sizeof(vsub->auth_tuples)); - for (i = 0; i < ARRAY_SIZE(vsub->auth_tuples); i++) - vsub->auth_tuples[i].key_seq = GSM_KEY_SEQ_INVAL; - } - - got_tuples = 0; - for (i = 0; i < gsup->num_auth_vectors; i++) { - size_t key_seq = i; - - if (key_seq >= ARRAY_SIZE(vsub->auth_tuples)) { - LOGVSUBP(LOGL_NOTICE, vsub, - "Skipping auth tuple wih invalid cksn %zu\n", - key_seq); - continue; - } - vsub->auth_tuples[i].vec = gsup->auth_vectors[i]; - vsub->auth_tuples[i].key_seq = key_seq; - got_tuples ++; - } - - LOGVSUBP(LOGL_DEBUG, vsub, "Received %u auth tuples\n", got_tuples); - - if (!got_tuples) { - /* FIXME what now? */ - // vlr_subscr_cancel(vsub, GMM_CAUSE_GSM_AUTH_UNACCEPT); ? - } - - /* New tuples means last_tuple becomes invalid */ - vsub->last_tuple = NULL; -} - -/* Handle SendAuthInfo Result/Error from HLR */ -static int vlr_subscr_handle_sai_res(struct vlr_subscr *vsub, - const struct osmo_gsup_message *gsup) -{ - struct osmo_fsm_inst *auth_fi = vsub->auth_fsm; - void *data = (void *) gsup; - - switch (gsup->message_type) { - case OSMO_GSUP_MSGT_SEND_AUTH_INFO_RESULT: - osmo_fsm_inst_dispatch(auth_fi, VLR_AUTH_E_HLR_SAI_ACK, data); - break; - case OSMO_GSUP_MSGT_SEND_AUTH_INFO_ERROR: - osmo_fsm_inst_dispatch(auth_fi, VLR_AUTH_E_HLR_SAI_NACK, data); - break; - default: - return -1; - } - - return 0; -} - -static int decode_bcd_number_safe(char *output, int output_len, - const uint8_t *bcd_lv, int input_len, - int h_len) -{ - uint8_t len; - OSMO_ASSERT(output_len >= 1); - *output = '\0'; - if (input_len < 1) - return -EIO; - len = bcd_lv[0]; - if (input_len < len) - return -EIO; - return gsm48_decode_bcd_number(output, output_len, bcd_lv, h_len); -} - -static void vlr_subscr_gsup_insert_data(struct vlr_subscr *vsub, - const struct osmo_gsup_message *gsup_msg) -{ - unsigned idx; - int rc; - - if (gsup_msg->msisdn_enc) { - decode_bcd_number_safe(vsub->msisdn, sizeof(vsub->msisdn), - gsup_msg->msisdn_enc, - gsup_msg->msisdn_enc_len, 0); - LOGP(DVLR, LOGL_DEBUG, "IMSI:%s has MSISDN:%s\n", - vsub->imsi, vsub->msisdn); - } - - if (gsup_msg->hlr_enc) { - if (gsup_msg->hlr_enc_len > sizeof(vsub->hlr.buf)) { - LOGP(DVLR, LOGL_ERROR, "HLR-Number too long (%zu)\n", - gsup_msg->hlr_enc_len); - vsub->hlr.len = 0; - } else { - memcpy(vsub->hlr.buf, gsup_msg->hlr_enc, - gsup_msg->hlr_enc_len); - vsub->hlr.len = gsup_msg->hlr_enc_len; - } - } - - if (gsup_msg->pdp_info_compl) { - rc = vlr_subscr_pdp_data_clear(vsub); - if (rc > 0) - LOGP(DVLR, LOGL_INFO, "Cleared existing PDP info\n"); - } - - for (idx = 0; idx < gsup_msg->num_pdp_infos; idx++) { - const struct osmo_gsup_pdp_info *pdp_info = &gsup_msg->pdp_infos[idx]; - size_t ctx_id = pdp_info->context_id; - struct sgsn_subscriber_pdp_data *pdp_data; - - if (pdp_info->apn_enc_len >= sizeof(pdp_data->apn_str)-1) { - LOGVSUBP(LOGL_ERROR, vsub, - "APN too long, context id = %zu, APN = %s\n", - ctx_id, osmo_hexdump(pdp_info->apn_enc, - pdp_info->apn_enc_len)); - continue; - } - - if (pdp_info->qos_enc_len > sizeof(pdp_data->qos_subscribed)) { - LOGVSUBP(LOGL_ERROR, vsub, - "QoS info too long (%zu)\n", - pdp_info->qos_enc_len); - continue; - } - - LOGVSUBP(LOGL_INFO, vsub, - "Will set PDP info, context id = %zu, APN = %s\n", - ctx_id, osmo_hexdump(pdp_info->apn_enc, pdp_info->apn_enc_len)); - - /* Set PDP info [ctx_id] */ - pdp_data = vlr_subscr_pdp_data_get_by_id(vsub, ctx_id); - if (!pdp_data) { - pdp_data = vlr_subscr_pdp_data_alloc(vsub); - pdp_data->context_id = ctx_id; - } - - OSMO_ASSERT(pdp_data != NULL); - pdp_data->pdp_type = pdp_info->pdp_type; - osmo_apn_to_str(pdp_data->apn_str, - pdp_info->apn_enc, pdp_info->apn_enc_len); - memcpy(pdp_data->qos_subscribed, pdp_info->qos_enc, pdp_info->qos_enc_len); - pdp_data->qos_subscribed_len = pdp_info->qos_enc_len; - } -} - - -/* Handle InsertSubscrData Result from HLR */ -static int vlr_subscr_handle_isd_req(struct vlr_subscr *vsub, - const struct osmo_gsup_message *gsup) -{ - struct osmo_gsup_message gsup_reply = {0}; - - vlr_subscr_gsup_insert_data(vsub, gsup); - vsub->vlr->ops.subscr_update(vsub); - - gsup_reply.message_type = OSMO_GSUP_MSGT_INSERT_DATA_RESULT; - return vlr_subscr_tx_gsup_message(vsub, &gsup_reply); -} - -/* Handle UpdateLocation Result from HLR */ -static int vlr_subscr_handle_lu_res(struct vlr_subscr *vsub, - const struct osmo_gsup_message *gsup) -{ - if (!vsub->lu_fsm) { - LOGVSUBP(LOGL_ERROR, vsub, "Rx GSUP LU Result " - "without LU in progress\n"); - return -ENODEV; - } - - /* contrary to MAP, we allow piggy-backing subscriber data onto the - * UPDATE LOCATION RESULT, and don't mandate the use of a separate - * nested INSERT SUBSCRIBER DATA transaction */ - vlr_subscr_gsup_insert_data(vsub, gsup); - - osmo_fsm_inst_dispatch(vsub->lu_fsm, VLR_ULA_E_HLR_LU_RES, NULL); - - return 0; -} - -/* Handle UpdateLocation Result from HLR */ -static int vlr_subscr_handle_lu_err(struct vlr_subscr *vsub, - const struct osmo_gsup_message *gsup) -{ - if (!vsub->lu_fsm) { - LOGVSUBP(LOGL_ERROR, vsub, "Rx GSUP LU Error " - "without LU in progress\n"); - return -ENODEV; - } - - LOGVSUBP(LOGL_DEBUG, vsub, "UpdateLocation failed; gmm_cause: %s\n", - get_value_string(gsm48_gmm_cause_names, gsup->cause)); - - osmo_fsm_inst_dispatch(vsub->lu_fsm, VLR_ULA_E_HLR_LU_RES, - (void *)&gsup->cause); - - return 0; -} - -/* Handle LOCATION CANCEL request from HLR */ -static int vlr_subscr_handle_cancel_req(struct vlr_subscr *vsub, - struct osmo_gsup_message *gsup_msg) -{ - struct osmo_gsup_message gsup_reply = {0}; - int is_update_procedure = !gsup_msg->cancel_type || - gsup_msg->cancel_type == OSMO_GSUP_CANCEL_TYPE_UPDATE; - - LOGVSUBP(LOGL_INFO, vsub, "Cancelling MS subscriber (%s)\n", - is_update_procedure ? - "update procedure" : "subscription withdraw"); - - gsup_reply.message_type = OSMO_GSUP_MSGT_LOCATION_CANCEL_RESULT; - vlr_subscr_tx_gsup_message(vsub, &gsup_reply); - - vlr_subscr_cancel(vsub, gsup_msg->cause); - - return 0; -} - -/* Incoming handler for GSUP from HLR. - * Keep this function non-static for direct invocation by unit tests. */ -int vlr_gsupc_read_cb(struct gsup_client *gsupc, struct msgb *msg) -{ - struct vlr_instance *vlr = (struct vlr_instance *) gsupc->data; - struct vlr_subscr *vsub; - struct osmo_gsup_message gsup; - int rc; - - DEBUGP(DVLR, "GSUP rx %u: %s\n", msgb_l2len(msg), - osmo_hexdump_nospc(msgb_l2(msg), msgb_l2len(msg))); - - rc = osmo_gsup_decode(msgb_l2(msg), msgb_l2len(msg), &gsup); - if (rc < 0) { - LOGP(DVLR, LOGL_ERROR, - "decoding GSUP message fails with error '%s' (%d)\n", - get_value_string(gsm48_gmm_cause_names, -rc), -rc); - return rc; - } - - if (!gsup.imsi[0]) { - LOGP(DVLR, LOGL_ERROR, "Missing IMSI in GSUP message\n"); - if (OSMO_GSUP_IS_MSGT_REQUEST(gsup.message_type)) - vlr_tx_gsup_error_reply(vlr, &gsup, - GMM_CAUSE_INV_MAND_INFO); - return -GMM_CAUSE_INV_MAND_INFO; - } - - vsub = vlr_subscr_find_by_imsi(vlr, gsup.imsi); - if (!vsub) { - switch (gsup.message_type) { - case OSMO_GSUP_MSGT_PURGE_MS_RESULT: - case OSMO_GSUP_MSGT_PURGE_MS_ERROR: - return vlr_rx_gsup_purge_no_subscr(vlr, &gsup); - default: - return vlr_rx_gsup_unknown_imsi(vlr, &gsup); - } - } - - switch (gsup.message_type) { - case OSMO_GSUP_MSGT_SEND_AUTH_INFO_RESULT: - case OSMO_GSUP_MSGT_SEND_AUTH_INFO_ERROR: - rc = vlr_subscr_handle_sai_res(vsub, &gsup); - break; - case OSMO_GSUP_MSGT_INSERT_DATA_REQUEST: - rc = vlr_subscr_handle_isd_req(vsub, &gsup); - break; - case OSMO_GSUP_MSGT_LOCATION_CANCEL_REQUEST: - rc = vlr_subscr_handle_cancel_req(vsub, &gsup); - break; - case OSMO_GSUP_MSGT_UPDATE_LOCATION_RESULT: - rc = vlr_subscr_handle_lu_res(vsub, &gsup); - break; - case OSMO_GSUP_MSGT_UPDATE_LOCATION_ERROR: - rc = vlr_subscr_handle_lu_err(vsub, &gsup); - break; - case OSMO_GSUP_MSGT_PURGE_MS_ERROR: - case OSMO_GSUP_MSGT_PURGE_MS_RESULT: - case OSMO_GSUP_MSGT_DELETE_DATA_REQUEST: - LOGVSUBP(LOGL_ERROR, vsub, - "Rx GSUP msg_type=%d not yet implemented\n", - gsup.message_type); - rc = -GMM_CAUSE_MSGT_NOTEXIST_NOTIMPL; - break; - default: - LOGVSUBP(LOGL_ERROR, vsub, - "Rx GSUP msg_type=%d not valid at VLR/SGSN side\n", - gsup.message_type); - rc = -GMM_CAUSE_MSGT_NOTEXIST_NOTIMPL; - break; - } - - vlr_subscr_put(vsub); - return rc; -} - -/* MSC->VLR: Subscriber has provided IDENTITY RESPONSE */ -int vlr_subscr_rx_id_resp(struct vlr_subscr *vsub, - const uint8_t *mi, size_t mi_len) -{ - char mi_string[GSM48_MI_SIZE]; - uint8_t mi_type = mi[0] & GSM_MI_TYPE_MASK; - - gsm48_mi_to_string(mi_string, sizeof(mi_string), mi, mi_len); - - /* update the vlr_subscr with the given identity */ - switch (mi_type) { - case GSM_MI_TYPE_IMSI: - if (vsub->imsi[0] - && !vlr_subscr_matches_imsi(vsub, mi_string)) { - LOGVSUBP(LOGL_ERROR, vsub, "IMSI in ID RESP differs:" - " %s\n", mi_string); - } else - vlr_subscr_set_imsi(vsub, mi_string); - break; - case GSM_MI_TYPE_IMEI: - vlr_subscr_set_imei(vsub, mi_string); - break; - case GSM_MI_TYPE_IMEISV: - vlr_subscr_set_imeisv(vsub, mi_string); - break; - } - - if (vsub->auth_fsm) { - switch (mi_type) { - case GSM_MI_TYPE_IMSI: - osmo_fsm_inst_dispatch(vsub->auth_fsm, - VLR_AUTH_E_MS_ID_IMSI, mi_string); - break; - } - } - - if (vsub->lu_fsm) { - uint32_t event = 0; - switch (mi_type) { - case GSM_MI_TYPE_IMSI: - event = VLR_ULA_E_ID_IMSI; - break; - case GSM_MI_TYPE_IMEI: - event = VLR_ULA_E_ID_IMEI; - break; - case GSM_MI_TYPE_IMEISV: - event = VLR_ULA_E_ID_IMEISV; - break; - default: - OSMO_ASSERT(0); - break; - } - osmo_fsm_inst_dispatch(vsub->lu_fsm, event, mi_string); - } else { - LOGVSUBP(LOGL_NOTICE, vsub, "gratuitous ID RESPONSE?!?\n"); - } - - return 0; -} - -/* MSC->VLR: Subscriber has provided IDENTITY RESPONSE */ -int vlr_subscr_rx_tmsi_reall_compl(struct vlr_subscr *vsub) -{ - if (vsub->lu_fsm) { - return osmo_fsm_inst_dispatch(vsub->lu_fsm, - VLR_ULA_E_NEW_TMSI_ACK, NULL); - } else if (vsub->proc_arq_fsm) { - return osmo_fsm_inst_dispatch(vsub->proc_arq_fsm, - PR_ARQ_E_TMSI_ACK, NULL); - } else { - LOGVSUBP(LOGL_NOTICE, vsub, - "gratuitous TMSI REALLOC COMPL"); - return -EINVAL; - } -} - -int vlr_subscr_rx_imsi_detach(struct vlr_subscr *vsub) -{ - /* paranoia: should any LU or PARQ FSMs still be running, stop them. */ - vlr_subscr_cancel(vsub, GMM_CAUSE_IMPL_DETACHED); - - vsub->imsi_detached_flag = true; - if (vsub->lu_complete) { - vsub->lu_complete = false; - /* balancing the get from vlr_lu_compl_fsm_success() */ - vlr_subscr_put(vsub); - } - return 0; -} - -/* Tear down any running FSMs due to MSC connection timeout. - * Visit all vsub->*_fsm pointers and give them a queue to send a final reject - * message before the entire connection is torn down. - * \param[in] vsub subscriber to tear down - */ -void vlr_subscr_conn_timeout(struct vlr_subscr *vsub) -{ - if (!vsub) - return; - - vlr_loc_update_conn_timeout(vsub->lu_fsm); - vlr_parq_conn_timeout(vsub->proc_arq_fsm); -} - -struct vlr_instance *vlr_alloc(void *ctx, const struct vlr_ops *ops) -{ - struct vlr_instance *vlr = talloc_zero(ctx, struct vlr_instance); - OSMO_ASSERT(vlr); - - /* Some of these are needed only on UTRAN, but in case the caller wants - * only GERAN, she should just provide dummy callbacks. */ - OSMO_ASSERT(ops->tx_auth_req); - OSMO_ASSERT(ops->tx_auth_rej); - OSMO_ASSERT(ops->tx_id_req); - OSMO_ASSERT(ops->tx_lu_acc); - OSMO_ASSERT(ops->tx_lu_rej); - OSMO_ASSERT(ops->tx_cm_serv_acc); - OSMO_ASSERT(ops->tx_cm_serv_rej); - OSMO_ASSERT(ops->set_ciph_mode); - OSMO_ASSERT(ops->tx_common_id); - OSMO_ASSERT(ops->subscr_update); - OSMO_ASSERT(ops->subscr_assoc); - - INIT_LLIST_HEAD(&vlr->subscribers); - INIT_LLIST_HEAD(&vlr->operations); - memcpy(&vlr->ops, ops, sizeof(vlr->ops)); - - /* osmo_auth_fsm.c */ - osmo_fsm_register(&vlr_auth_fsm); - /* osmo_lu_fsm.c */ - vlr_lu_fsm_init(); - /* vlr_access_request_fsm.c */ - vlr_parq_fsm_init(); - - return vlr; -} - -int vlr_start(const char *gsup_unit_name, struct vlr_instance *vlr, - const char *gsup_server_addr_str, uint16_t gsup_server_port) -{ - OSMO_ASSERT(vlr); - - vlr->gsup_client = gsup_client_create(gsup_unit_name, - gsup_server_addr_str, - gsup_server_port, - &vlr_gsupc_read_cb, NULL); - if (!vlr->gsup_client) - return -ENOMEM; - vlr->gsup_client->data = vlr; - - return 0; -} - -/* MSC->VLR: Subscribre has disconnected */ -int vlr_subscr_disconnected(struct vlr_subscr *vsub) -{ - /* This corresponds to a MAP-ABORT from MSC->VLR on a classic B - * interface */ - osmo_fsm_inst_term(vsub->lu_fsm, OSMO_FSM_TERM_REQUEST, NULL); - osmo_fsm_inst_term(vsub->auth_fsm, OSMO_FSM_TERM_REQUEST, NULL); - vsub->msc_conn_ref = NULL; - - return 0; -} - -/* MSC->VLR: Receive Authentication Failure from Subscriber */ -int vlr_subscr_rx_auth_fail(struct vlr_subscr *vsub, const uint8_t *auts) -{ - struct vlr_auth_resp_par par = {0}; - par.auts = auts; - - osmo_fsm_inst_dispatch(vsub->auth_fsm, VLR_AUTH_E_MS_AUTH_FAIL, &par); - return 0; -} - -/* MSC->VLR: Receive Authentication Response from MS - * \returns 1 in case of success, 0 in case of delay, -1 on auth error */ -int vlr_subscr_rx_auth_resp(struct vlr_subscr *vsub, bool is_r99, - bool is_utran, const uint8_t *res, uint8_t res_len) -{ - struct osmo_fsm_inst *auth_fi = vsub->auth_fsm; - struct vlr_auth_resp_par par; - - par.is_r99 = is_r99; - par.is_utran = is_utran; - par.res = res; - par.res_len = res_len; - osmo_fsm_inst_dispatch(auth_fi, VLR_AUTH_E_MS_AUTH_RESP, (void *) &par); - - return 0; -} - -/* MSC->VLR: Receive result of Ciphering Mode Command from MS */ -void vlr_subscr_rx_ciph_res(struct vlr_subscr *vsub, struct vlr_ciph_result *res) -{ - if (vsub->lu_fsm && vsub->lu_fsm->state == VLR_ULA_S_WAIT_CIPH) - osmo_fsm_inst_dispatch(vsub->lu_fsm, VLR_ULA_E_CIPH_RES, res); - if (vsub->proc_arq_fsm - && vsub->proc_arq_fsm->state == PR_ARQ_S_WAIT_CIPH) - osmo_fsm_inst_dispatch(vsub->proc_arq_fsm, PR_ARQ_E_CIPH_RES, - res); -} - -/* Internal evaluation of requested ciphering mode. - * Send set_ciph_mode() to MSC depending on the ciph_mode argument. - * \param[in] vlr VLR instance. - * \param[in] fi Calling FSM instance, for logging. - * \param[in] msc_conn_ref MSC conn to send to. - * \param[in] ciph_mode Ciphering config, to decide whether to do ciphering. - * \returns 0 if no ciphering is needed or message was sent successfully, - * or a negative value if ciph_mode is invalid or sending failed. - */ -int vlr_set_ciph_mode(struct vlr_instance *vlr, - struct osmo_fsm_inst *fi, - void *msc_conn_ref, - enum vlr_ciph ciph_mode, - bool retrieve_imeisv) -{ - switch (ciph_mode) { - case VLR_CIPH_NONE: - return 0; - - case VLR_CIPH_A5_1: - case VLR_CIPH_A5_3: - return vlr->ops.set_ciph_mode(msc_conn_ref, - ciph_mode, - retrieve_imeisv); - - case VLR_CIPH_A5_2: - /* TODO policy by user config? */ - LOGPFSML(fi, LOGL_ERROR, "A5/2 ciphering is not allowed\n"); - return -EINVAL; - - default: - LOGPFSML(fi, LOGL_ERROR, "unknown ciphering value: %d\n", - ciph_mode); - return -EINVAL; - } -} - -void log_set_filter_vlr_subscr(struct log_target *target, - struct vlr_subscr *vlr_subscr) -{ - struct vlr_subscr **fsub = (void*)&target->filter_data[LOG_FLT_VLR_SUBSCR]; - - /* free the old data */ - if (*fsub) { - vlr_subscr_put(*fsub); - *fsub = NULL; - } - - if (vlr_subscr) { - target->filter_map |= (1 << LOG_FLT_VLR_SUBSCR); - *fsub = vlr_subscr_get(vlr_subscr); - } else - target->filter_map &= ~(1 << LOG_FLT_VLR_SUBSCR); -} diff --git a/src/libvlr/vlr_access_req_fsm.c b/src/libvlr/vlr_access_req_fsm.c deleted file mode 100644 index f9ed0b57d..000000000 --- a/src/libvlr/vlr_access_req_fsm.c +++ /dev/null @@ -1,795 +0,0 @@ -/* Osmocom Visitor Location Register (VLR): Access Request FSMs */ - -/* (C) 2016 by Harald Welte <laforge@gnumonks.org> - * - * All Rights Reserved - * - * This program is free software; you can redistribute it and/or modify - * it under the terms of the GNU Affero General Public License as published by - * the Free Software Foundation; either version 3 of the License, or - * (at your option) any later version. - * - * This program is distributed in the hope that it will be useful, - * but WITHOUT ANY WARRANTY; without even the implied warranty of - * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the - * GNU Affero General Public License for more details. - * - * You should have received a copy of the GNU Affero General Public License - * along with this program. If not, see <http://www.gnu.org/licenses/>. - * - */ - -#include <osmocom/core/fsm.h> -#include <osmocom/gsm/gsup.h> -#include <openbsc/vlr.h> -#include <openbsc/debug.h> - -#include "vlr_core.h" -#include "vlr_auth_fsm.h" -#include "vlr_lu_fsm.h" -#include "vlr_access_req_fsm.h" - -#define S(x) (1 << (x)) - -/*********************************************************************** - * Process_Access_Request_VLR, TS 29.002 Chapter 25.4.2 - ***********************************************************************/ - -const struct value_string vlr_proc_arq_result_names[] = { - OSMO_VALUE_STRING(VLR_PR_ARQ_RES_NONE), - OSMO_VALUE_STRING(VLR_PR_ARQ_RES_SYSTEM_FAILURE), - OSMO_VALUE_STRING(VLR_PR_ARQ_RES_ILLEGAL_SUBSCR), - OSMO_VALUE_STRING(VLR_PR_ARQ_RES_UNIDENT_SUBSCR), - OSMO_VALUE_STRING(VLR_PR_ARQ_RES_ROAMING_NOTALLOWED), - OSMO_VALUE_STRING(VLR_PR_ARQ_RES_ILLEGAL_EQUIP), - OSMO_VALUE_STRING(VLR_PR_ARQ_RES_UNKNOWN_ERROR), - OSMO_VALUE_STRING(VLR_PR_ARQ_RES_TIMEOUT), - OSMO_VALUE_STRING(VLR_PR_ARQ_RES_PASSED), - { 0, NULL } -}; - -static const struct value_string proc_arq_vlr_event_names[] = { - OSMO_VALUE_STRING(PR_ARQ_E_START), - OSMO_VALUE_STRING(PR_ARQ_E_ID_IMSI), - OSMO_VALUE_STRING(PR_ARQ_E_AUTH_RES), - OSMO_VALUE_STRING(PR_ARQ_E_CIPH_RES), - OSMO_VALUE_STRING(PR_ARQ_E_UPD_LOC_RES), - OSMO_VALUE_STRING(PR_ARQ_E_TRACE_RES), - OSMO_VALUE_STRING(PR_ARQ_E_IMEI_RES), - OSMO_VALUE_STRING(PR_ARQ_E_PRES_RES), - OSMO_VALUE_STRING(PR_ARQ_E_TMSI_ACK), - { 0, NULL } -}; - -struct proc_arq_priv { - struct vlr_instance *vlr; - struct vlr_subscr *vsub; - void *msc_conn_ref; - struct osmo_fsm_inst *ul_child_fsm; - struct osmo_fsm_inst *sub_pres_vlr_fsm; - uint32_t parent_event_success; - uint32_t parent_event_failure; - void *parent_event_data; - - enum vlr_parq_type type; - enum vlr_proc_arq_result result; - bool by_tmsi; - char imsi[16]; - uint32_t tmsi; - struct osmo_location_area_id lai; - bool authentication_required; - enum vlr_ciph ciphering_required; - bool is_r99; - bool is_utran; - bool implicitly_accepted_parq_by_ciphering_cmd; -}; - -static void assoc_par_with_subscr(struct osmo_fsm_inst *fi, struct vlr_subscr *vsub) -{ - struct proc_arq_priv *par = fi->priv; - struct vlr_instance *vlr = par->vlr; - - vsub->msc_conn_ref = par->msc_conn_ref; - par->vsub = vsub; - /* Tell MSC to associate this subscriber with the given - * connection */ - vlr->ops.subscr_assoc(par->msc_conn_ref, par->vsub); -} - -#define proc_arq_fsm_done(fi, res) _proc_arq_fsm_done(fi, res, __FILE__, __LINE__) -static void _proc_arq_fsm_done(struct osmo_fsm_inst *fi, - enum vlr_proc_arq_result res, - const char *file, int line) -{ - struct proc_arq_priv *par = fi->priv; - LOGPFSMSRC(fi, file, line, "proc_arq_fsm_done(%s)\n", - vlr_proc_arq_result_name(res)); - par->result = res; - osmo_fsm_inst_state_chg(fi, PR_ARQ_S_DONE, 0, 0); -} - -static void proc_arq_vlr_dispatch_result(struct osmo_fsm_inst *fi, - uint32_t prev_state) -{ - struct proc_arq_priv *par = fi->priv; - bool success; - int rc; - LOGPFSM(fi, "Process Access Request result: %s\n", - vlr_proc_arq_result_name(par->result)); - - success = (par->result == VLR_PR_ARQ_RES_PASSED); - - /* It would be logical to first dispatch the success event to the - * parent FSM, but that could start actions that send messages to the - * MS. Rather send the CM Service Accept message first and then signal - * success. Since messages are handled synchronously, the success event - * will be processed before we handle new incoming data from the MS. */ - - if (par->type == VLR_PR_ARQ_T_CM_SERV_REQ) { - if (success - && !par->implicitly_accepted_parq_by_ciphering_cmd) { - rc = par->vlr->ops.tx_cm_serv_acc(par->msc_conn_ref); - if (rc) { - LOGPFSML(fi, LOGL_ERROR, - "Failed to send CM Service Accept\n"); - success = false; - } - } - if (!success) { - rc = par->vlr->ops.tx_cm_serv_rej(par->msc_conn_ref, - par->result); - if (rc) - LOGPFSML(fi, LOGL_ERROR, - "Failed to send CM Service Reject\n"); - } - } - - /* For VLR_PR_ARQ_T_PAGING_RESP, there is nothing to send. The conn_fsm - * will start handling pending paging transactions. */ - - if (!fi->proc.parent) { - LOGPFSML(fi, LOGL_ERROR, "No parent FSM"); - return; - } - osmo_fsm_inst_dispatch(fi->proc.parent, - success ? par->parent_event_success - : par->parent_event_failure, - par->parent_event_data); -} - -void proc_arq_vlr_cleanup(struct osmo_fsm_inst *fi, - enum osmo_fsm_term_cause cause) -{ - struct proc_arq_priv *par = fi->priv; - if (par->vsub && par->vsub->proc_arq_fsm == fi) - par->vsub->proc_arq_fsm = NULL; -} - -static void _proc_arq_vlr_post_imei(struct osmo_fsm_inst *fi) -{ - struct proc_arq_priv *par = fi->priv; - struct vlr_subscr *vsub = par->vsub; - - LOGPFSM(fi, "%s()\n", __func__); - - /* See 3GPP TS 29.002 Proc_Acc_Req_VLR3. */ - /* TODO: Identity := IMSI */ - if (0 /* TODO: TMSI reallocation at access: vlr->cfg.alloc_tmsi_arq */) { - vlr_subscr_alloc_tmsi(vsub); - /* TODO: forward TMSI to MS, wait for TMSI - * REALLOC COMPLETE */ - /* TODO: Freeze old TMSI */ - osmo_fsm_inst_state_chg(fi, PR_ARQ_S_WAIT_TMSI_ACK, 0, 0); - return; - } - - proc_arq_fsm_done(fi, VLR_PR_ARQ_RES_PASSED); -} - -static void _proc_arq_vlr_post_trace(struct osmo_fsm_inst *fi) -{ - struct proc_arq_priv *par = fi->priv; - struct vlr_subscr *vsub = par->vsub; - struct vlr_instance *vlr = vsub->vlr; - - LOGPFSM(fi, "%s()\n", __func__); - - /* Node 3 */ - /* See 3GPP TS 29.002 Proc_Acc_Req_VLR3. */ - if (0 /* IMEI check required */) { - /* Chck_IMEI_VLR */ - vlr->ops.tx_id_req(par->msc_conn_ref, GSM_MI_TYPE_IMEI); - osmo_fsm_inst_state_chg(fi, PR_ARQ_S_WAIT_CHECK_IMEI, - vlr_timer(vlr, 3270), 3270); - } else - _proc_arq_vlr_post_imei(fi); -} - -/* After Subscriber_Present_VLR */ -static void _proc_arq_vlr_post_pres(struct osmo_fsm_inst *fi) -{ - LOGPFSM(fi, "%s()\n", __func__); - /* See 3GPP TS 29.002 Proc_Acc_Req_VLR3. */ - if (0 /* TODO: tracing required */) { - /* TODO: Trace_Subscriber_Activity_VLR */ - osmo_fsm_inst_state_chg(fi, PR_ARQ_S_WAIT_TRACE_SUB, 0, 0); - } - _proc_arq_vlr_post_trace(fi); -} - -/* After Update_Location_Child_VLR */ -static void _proc_arq_vlr_node2_post_vlr(struct osmo_fsm_inst *fi) -{ - struct proc_arq_priv *par = fi->priv; - struct vlr_subscr *vsub = par->vsub; - - LOGPFSM(fi, "%s()\n", __func__); - - if (!vsub->sub_dataconf_by_hlr_ind) { - /* Set User Error: Unidentified Subscriber */ - proc_arq_fsm_done(fi, VLR_PR_ARQ_RES_UNIDENT_SUBSCR); - return; - } - /* We don't feature location area specific blocking (yet). */ - if (0 /* roaming not allowed in LA */) { - /* Set User Error: Roaming not allowed in this LA */ - proc_arq_fsm_done(fi, VLR_PR_ARQ_RES_ROAMING_NOTALLOWED); - return; - } - vsub->imsi_detached_flag = false; - if (vsub->ms_not_reachable_flag) { - /* Start Subscriber_Present_VLR */ - osmo_fsm_inst_state_chg(fi, PR_ARQ_S_WAIT_SUB_PRES, 0, 0); - par->sub_pres_vlr_fsm = sub_pres_vlr_fsm_start(fi, vsub, - PR_ARQ_E_PRES_RES); - return; - } - _proc_arq_vlr_post_pres(fi); -} - -static void _proc_arq_vlr_node2_post_ciph(struct osmo_fsm_inst *fi) -{ - struct proc_arq_priv *par = fi->priv; - struct vlr_subscr *vsub = par->vsub; - - LOGPFSM(fi, "%s()\n", __func__); - - if (par->is_utran) { - int rc; - rc = par->vlr->ops.tx_common_id(par->msc_conn_ref); - if (rc) - LOGPFSML(fi, LOGL_ERROR, - "Error while sending Common ID (%d)\n", rc); - } - - vsub->conf_by_radio_contact_ind = true; - if (vsub->loc_conf_in_hlr_ind == false) { - /* start Update_Location_Child_VLR. WE use - * Update_HLR_VLR instead, the differences appear - * insignificant for now. */ - par->ul_child_fsm = upd_hlr_vlr_proc_start(fi, vsub, - PR_ARQ_E_UPD_LOC_RES); - osmo_fsm_inst_state_chg(fi, PR_ARQ_S_WAIT_UPD_LOC_CHILD, 0, 0); - return; - } - _proc_arq_vlr_node2_post_vlr(fi); -} - -static bool is_ciph_required(struct proc_arq_priv *par) -{ - return par->ciphering_required != VLR_CIPH_NONE; -} - -static void _proc_arq_vlr_node2(struct osmo_fsm_inst *fi) -{ - struct proc_arq_priv *par = fi->priv; - struct vlr_subscr *vsub = par->vsub; - - LOGPFSM(fi, "%s()\n", __func__); - - if (!is_ciph_required(par)) { - _proc_arq_vlr_node2_post_ciph(fi); - return; - } - - if (vlr_set_ciph_mode(vsub->vlr, fi, par->msc_conn_ref, - par->ciphering_required, - vsub->vlr->cfg.retrieve_imeisv_ciphered)) { - LOGPFSML(fi, LOGL_ERROR, - "Failed to send Ciphering Mode Command\n"); - proc_arq_fsm_done(fi, VLR_PR_ARQ_RES_SYSTEM_FAILURE); - return; - } - - par->implicitly_accepted_parq_by_ciphering_cmd = true; - osmo_fsm_inst_state_chg(fi, PR_ARQ_S_WAIT_CIPH, 0, 0); -} - -static bool is_auth_required(struct proc_arq_priv *par) -{ - /* The cases where the authentication procedure should be used - * are defined in 3GPP TS 33.102 */ - /* For now we use a default value passed in to vlr_lu_fsm(). */ - return par->authentication_required - || (par->ciphering_required != VLR_CIPH_NONE); -} - -/* after the IMSI is known */ -static void proc_arq_vlr_fn_post_imsi(struct osmo_fsm_inst *fi) -{ - struct proc_arq_priv *par = fi->priv; - struct vlr_subscr *vsub = par->vsub; - - LOGPFSM(fi, "%s()\n", __func__); - - OSMO_ASSERT(vsub); - - /* TODO: Identity IMEI -> System Failure */ - if (is_auth_required(par)) { - osmo_fsm_inst_state_chg(fi, PR_ARQ_S_WAIT_AUTH, - 0, 0); - vsub->auth_fsm = auth_fsm_start(vsub, fi->log_level, fi, - PR_ARQ_E_AUTH_RES, - par->is_r99, - par->is_utran); - } else { - _proc_arq_vlr_node2(fi); - } -} - -static void proc_arq_vlr_fn_init(struct osmo_fsm_inst *fi, - uint32_t event, void *data) -{ - struct proc_arq_priv *par = fi->priv; - struct vlr_instance *vlr = par->vlr; - struct vlr_subscr *vsub = NULL; - - OSMO_ASSERT(event == PR_ARQ_E_START); - - /* Obtain_Identity_VLR */ - if (!par->by_tmsi) { - /* IMSI was included */ - vsub = vlr_subscr_find_by_imsi(par->vlr, par->imsi); - } else { - /* TMSI was included */ - vsub = vlr_subscr_find_by_tmsi(par->vlr, par->tmsi); - } - if (vsub) { - log_set_context(LOG_CTX_VLR_SUBSCR, vsub); - if (vsub->proc_arq_fsm && fi != vsub->proc_arq_fsm) { - LOGPFSML(fi, LOGL_ERROR, - "Another proc_arq_fsm is already" - " associated with subscr %s," - " terminating the other FSM.\n", - vlr_subscr_name(vsub)); - proc_arq_fsm_done(vsub->proc_arq_fsm, - VLR_PR_ARQ_RES_SYSTEM_FAILURE); - } - vsub->proc_arq_fsm = fi; - assoc_par_with_subscr(fi, vsub); - proc_arq_vlr_fn_post_imsi(fi); - vlr_subscr_put(vsub); - return; - } - /* No VSUB could be resolved. What now? */ - - if (!par->by_tmsi) { - /* We couldn't find a subscriber even by IMSI, - * Set User Error: Unidentified Subscriber */ - proc_arq_fsm_done(fi, VLR_PR_ARQ_RES_UNIDENT_SUBSCR); - return; - } else { - /* TMSI was included, are we permitted to use it? */ - if (vlr->cfg.parq_retrieve_imsi) { - /* Obtain_IMSI_VLR */ - osmo_fsm_inst_state_chg(fi, PR_ARQ_S_WAIT_OBTAIN_IMSI, - vlr_timer(vlr, 3270), 3270); - return; - } else { - /* Set User Error: Unidentified Subscriber */ - proc_arq_fsm_done(fi, VLR_PR_ARQ_RES_UNIDENT_SUBSCR); - return; - } - } -} - -/* ID REQ(IMSI) has returned */ -static void proc_arq_vlr_fn_w_obt_imsi(struct osmo_fsm_inst *fi, - uint32_t event, void *data) -{ - struct proc_arq_priv *par = fi->priv; - struct vlr_instance *vlr = par->vlr; - struct vlr_subscr *vsub; - - OSMO_ASSERT(event == PR_ARQ_E_ID_IMSI); - - vsub = vlr_subscr_find_by_imsi(vlr, par->imsi); - if (!vsub) { - /* Set User Error: Unidentified Subscriber */ - proc_arq_fsm_done(fi, VLR_PR_ARQ_RES_UNIDENT_SUBSCR); - return; - } - assoc_par_with_subscr(fi, vsub); - proc_arq_vlr_fn_post_imsi(fi); - vlr_subscr_put(vsub); -} - -/* Authenticate_VLR has completed */ -static void proc_arq_vlr_fn_w_auth(struct osmo_fsm_inst *fi, - uint32_t event, void *data) -{ - enum vlr_auth_fsm_result res; - enum vlr_proc_arq_result ret; - - OSMO_ASSERT(event == PR_ARQ_E_AUTH_RES); - - res = data ? *(enum vlr_auth_fsm_result*)data : -1; - LOGPFSM(fi, "got %s\n", vlr_auth_fsm_result_name(res)); - - switch (res) { - case VLR_AUTH_RES_PASSED: - /* Node 2 */ - _proc_arq_vlr_node2(fi); - return; - case VLR_AUTH_RES_ABORTED: - /* Error */ - ret = VLR_PR_ARQ_RES_UNKNOWN_ERROR; - break; - case VLR_AUTH_RES_UNKNOWN_SUBSCR: - /* Set User Error: Unidentified Subscriber */ - ret = VLR_PR_ARQ_RES_UNIDENT_SUBSCR; - break; - case VLR_AUTH_RES_AUTH_FAILED: - /* Set User Error: Illegal Subscriber */ - ret = VLR_PR_ARQ_RES_ILLEGAL_SUBSCR; - break; - case VLR_AUTH_RES_PROC_ERR: - /* Set User Error: System failure */ - ret = VLR_PR_ARQ_RES_SYSTEM_FAILURE; - break; - default: - LOGPFSML(fi, LOGL_ERROR, "Unexpected vlr_auth_fsm_result value: %d (data=%p)\n", res, data); - ret = VLR_PR_ARQ_RES_UNKNOWN_ERROR; - break; - } - - /* send process_access_req response to caller, enter error state */ - proc_arq_fsm_done(fi, ret); -} - -static void proc_arq_vlr_fn_w_ciph(struct osmo_fsm_inst *fi, - uint32_t event, void *data) -{ - struct proc_arq_priv *par = fi->priv; - struct vlr_subscr *vsub = par->vsub; - struct vlr_ciph_result res = { .cause = VLR_CIPH_REJECT }; - - OSMO_ASSERT(event == PR_ARQ_E_CIPH_RES); - - if (!data) - LOGPFSML(fi, LOGL_ERROR, "invalid ciphering result: NULL\n"); - else - res = *(struct vlr_ciph_result*)data; - - switch (res.cause) { - case VLR_CIPH_COMPL: - break; - case VLR_CIPH_REJECT: - LOGPFSM(fi, "ciphering rejected\n"); - proc_arq_fsm_done(fi, VLR_PR_ARQ_RES_ILLEGAL_SUBSCR); - return; - default: - LOGPFSML(fi, LOGL_ERROR, "invalid ciphering result: %d\n", - res.cause); - proc_arq_fsm_done(fi, VLR_PR_ARQ_RES_ILLEGAL_SUBSCR); - return; - } - - - if (res.imeisv) { - LOGPFSM(fi, "got IMEISV: %s\n", res.imeisv); - vlr_subscr_set_imeisv(vsub, res.imeisv); - } - _proc_arq_vlr_node2_post_ciph(fi); -} - -/* Update_Location_Child_VLR has completed */ -static void proc_arq_vlr_fn_w_upd_loc(struct osmo_fsm_inst *fi, - uint32_t event, void *data) -{ - OSMO_ASSERT(event == PR_ARQ_E_UPD_LOC_RES); - - _proc_arq_vlr_node2_post_vlr(fi); -} - -/* Subscriber_Present_VLR has completed */ -static void proc_arq_vlr_fn_w_pres(struct osmo_fsm_inst *fi, - uint32_t event, void *data) -{ - OSMO_ASSERT(event == PR_ARQ_E_PRES_RES); - - _proc_arq_vlr_post_pres(fi); -} - -static void proc_arq_vlr_fn_w_trace(struct osmo_fsm_inst *fi, - uint32_t event, void *data) -{ - OSMO_ASSERT(event == PR_ARQ_E_TRACE_RES); - - _proc_arq_vlr_post_trace(fi); -} - -/* we have received the ID RESPONSE (IMEI) */ -static void proc_arq_vlr_fn_w_imei(struct osmo_fsm_inst *fi, - uint32_t event, void *data) -{ - OSMO_ASSERT(event == PR_ARQ_E_IMEI_RES); - - _proc_arq_vlr_post_imei(fi); -} - -/* MSC tells us that MS has acknowleded TMSI re-allocation */ -static void proc_arq_vlr_fn_w_tmsi(struct osmo_fsm_inst *fi, - uint32_t event, void *data) -{ - OSMO_ASSERT(event == PR_ARQ_E_TMSI_ACK); - - /* FIXME: check confirmation? unfreeze? */ - proc_arq_fsm_done(fi, VLR_PR_ARQ_RES_PASSED); -} - -static const struct osmo_fsm_state proc_arq_vlr_states[] = { - [PR_ARQ_S_INIT] = { - .name = OSMO_STRINGIFY(PR_ARQ_S_INIT), - .in_event_mask = S(PR_ARQ_E_START), - .out_state_mask = S(PR_ARQ_S_DONE) | - S(PR_ARQ_S_WAIT_OBTAIN_IMSI) | - S(PR_ARQ_S_WAIT_AUTH) | - S(PR_ARQ_S_WAIT_UPD_LOC_CHILD) | - S(PR_ARQ_S_WAIT_SUB_PRES) | - S(PR_ARQ_S_WAIT_TRACE_SUB) | - S(PR_ARQ_S_WAIT_CHECK_IMEI) | - S(PR_ARQ_S_WAIT_TMSI_ACK), - .action = proc_arq_vlr_fn_init, - }, - [PR_ARQ_S_WAIT_OBTAIN_IMSI] = { - .name = OSMO_STRINGIFY(PR_ARQ_S_WAIT_OBTAIN_IMSI), - .in_event_mask = S(PR_ARQ_E_ID_IMSI), - .out_state_mask = S(PR_ARQ_S_DONE) | - S(PR_ARQ_S_WAIT_AUTH) | - S(PR_ARQ_S_WAIT_UPD_LOC_CHILD) | - S(PR_ARQ_S_WAIT_SUB_PRES) | - S(PR_ARQ_S_WAIT_TRACE_SUB) | - S(PR_ARQ_S_WAIT_CHECK_IMEI) | - S(PR_ARQ_S_WAIT_TMSI_ACK), - .action = proc_arq_vlr_fn_w_obt_imsi, - }, - [PR_ARQ_S_WAIT_AUTH] = { - .name = OSMO_STRINGIFY(PR_ARQ_S_WAIT_AUTH), - .in_event_mask = S(PR_ARQ_E_AUTH_RES), - .out_state_mask = S(PR_ARQ_S_DONE) | - S(PR_ARQ_S_WAIT_CIPH) | - S(PR_ARQ_S_WAIT_UPD_LOC_CHILD) | - S(PR_ARQ_S_WAIT_SUB_PRES) | - S(PR_ARQ_S_WAIT_TRACE_SUB) | - S(PR_ARQ_S_WAIT_CHECK_IMEI) | - S(PR_ARQ_S_WAIT_TMSI_ACK), - .action = proc_arq_vlr_fn_w_auth, - }, - [PR_ARQ_S_WAIT_CIPH] = { - .name = OSMO_STRINGIFY(PR_ARQ_S_WAIT_CIPH), - .in_event_mask = S(PR_ARQ_E_CIPH_RES), - .out_state_mask = S(PR_ARQ_S_DONE) | - S(PR_ARQ_S_WAIT_UPD_LOC_CHILD) | - S(PR_ARQ_S_WAIT_SUB_PRES) | - S(PR_ARQ_S_WAIT_TRACE_SUB) | - S(PR_ARQ_S_WAIT_CHECK_IMEI) | - S(PR_ARQ_S_WAIT_TMSI_ACK), - .action = proc_arq_vlr_fn_w_ciph, - }, - [PR_ARQ_S_WAIT_UPD_LOC_CHILD] = { - .name = OSMO_STRINGIFY(PR_ARQ_S_WAIT_UPD_LOC_CHILD), - .in_event_mask = S(PR_ARQ_E_UPD_LOC_RES), - .out_state_mask = S(PR_ARQ_S_DONE) | - S(PR_ARQ_S_WAIT_SUB_PRES) | - S(PR_ARQ_S_WAIT_TRACE_SUB) | - S(PR_ARQ_S_WAIT_CHECK_IMEI) | - S(PR_ARQ_S_WAIT_TMSI_ACK), - .action = proc_arq_vlr_fn_w_upd_loc, - }, - [PR_ARQ_S_WAIT_SUB_PRES] = { - .name = OSMO_STRINGIFY(PR_ARQ_S_WAIT_SUB_PRES), - .in_event_mask = S(PR_ARQ_E_PRES_RES), - .out_state_mask = S(PR_ARQ_S_DONE) | - S(PR_ARQ_S_WAIT_TRACE_SUB) | - S(PR_ARQ_S_WAIT_CHECK_IMEI) | - S(PR_ARQ_S_WAIT_TMSI_ACK), - .action = proc_arq_vlr_fn_w_pres, - }, - [PR_ARQ_S_WAIT_TRACE_SUB] = { - .name = OSMO_STRINGIFY(PR_ARQ_S_WAIT_TRACE_SUB), - .in_event_mask = S(PR_ARQ_E_TRACE_RES), - .out_state_mask = S(PR_ARQ_S_DONE) | - S(PR_ARQ_S_WAIT_CHECK_IMEI) | - S(PR_ARQ_S_WAIT_TMSI_ACK), - .action = proc_arq_vlr_fn_w_trace, - }, - [PR_ARQ_S_WAIT_CHECK_IMEI] = { - .name = OSMO_STRINGIFY(PR_ARQ_S_WAIT_CHECK_IMEI), - .in_event_mask = S(PR_ARQ_E_IMEI_RES), - .out_state_mask = S(PR_ARQ_S_DONE) | - S(PR_ARQ_S_WAIT_TMSI_ACK), - .action = proc_arq_vlr_fn_w_imei, - }, - [PR_ARQ_S_WAIT_TMSI_ACK] = { - .name = OSMO_STRINGIFY(PR_ARQ_S_WAIT_TMSI_ACK), - .in_event_mask = S(PR_ARQ_E_TMSI_ACK), - .out_state_mask = S(PR_ARQ_S_DONE), - .action = proc_arq_vlr_fn_w_tmsi, - }, - [PR_ARQ_S_DONE] = { - .name = OSMO_STRINGIFY(PR_ARQ_S_DONE), - .onenter = proc_arq_vlr_dispatch_result, - }, -}; - -static struct osmo_fsm proc_arq_vlr_fsm = { - .name = "Process_Access_Request_VLR", - .states = proc_arq_vlr_states, - .num_states = ARRAY_SIZE(proc_arq_vlr_states), - .allstate_event_mask = 0, - .allstate_action = NULL, - .log_subsys = DVLR, - .event_names = proc_arq_vlr_event_names, - .cleanup = proc_arq_vlr_cleanup, -}; - -void -vlr_proc_acc_req(struct osmo_fsm_inst *parent, - uint32_t parent_event_success, - uint32_t parent_event_failure, - void *parent_event_data, - struct vlr_instance *vlr, void *msc_conn_ref, - enum vlr_parq_type type, const uint8_t *mi_lv, - const struct osmo_location_area_id *lai, - bool authentication_required, - enum vlr_ciph ciphering_required, - bool is_r99, bool is_utran) -{ - struct osmo_fsm_inst *fi; - struct proc_arq_priv *par; - char mi_string[GSM48_MI_SIZE]; - uint8_t mi_type; - - fi = osmo_fsm_inst_alloc_child(&proc_arq_vlr_fsm, parent, - parent_event_failure); - if (!fi) - return; - - par = talloc_zero(fi, struct proc_arq_priv); - fi->priv = par; - par->vlr = vlr; - par->msc_conn_ref = msc_conn_ref; - par->type = type; - par->lai = *lai; - par->parent_event_success = parent_event_success; - par->parent_event_failure = parent_event_failure; - par->parent_event_data = parent_event_data; - par->authentication_required = authentication_required; - par->ciphering_required = ciphering_required; - par->is_r99 = is_r99; - par->is_utran = is_utran; - - LOGPFSM(fi, "rev=%s net=%s%s%s\n", - is_r99 ? "R99" : "GSM", - is_utran ? "UTRAN" : "GERAN", - (authentication_required || ciphering_required)? - " Auth" : " (no Auth)", - (authentication_required || ciphering_required)? - (ciphering_required? "+Ciph" : " (no Ciph)") - : ""); - - if (is_utran && !authentication_required) - LOGPFSML(fi, LOGL_ERROR, - "Authentication off on UTRAN network. Good luck.\n"); - - gsm48_mi_to_string(mi_string, sizeof(mi_string), mi_lv+1, mi_lv[0]); - mi_type = mi_lv[1] & GSM_MI_TYPE_MASK; - switch (mi_type) { - case GSM_MI_TYPE_IMSI: - strncpy(par->imsi, mi_string, sizeof(par->imsi)-1); - par->imsi[sizeof(par->imsi)-1] = '\0'; - par->by_tmsi = false; - break; - case GSM_MI_TYPE_TMSI: - par->by_tmsi = true; - par->tmsi = osmo_load32be(mi_lv+2); - break; - case GSM_MI_TYPE_IMEI: - /* TODO: IMEI (emergency call) */ - default: - /* FIXME: directly send reject? */ - proc_arq_fsm_done(fi, VLR_PR_ARQ_RES_UNIDENT_SUBSCR); - return; - } - - osmo_fsm_inst_dispatch(fi, PR_ARQ_E_START, NULL); -} - -/* Gracefully terminate an FSM created by vlr_proc_acc_req() in case of - * external timeout (i.e. from MSC). */ -void vlr_parq_conn_timeout(struct osmo_fsm_inst *fi) -{ - if (!fi || fi->state == PR_ARQ_S_DONE) - return; - LOGPFSM(fi, "Connection timed out\n"); - proc_arq_fsm_done(fi, VLR_PR_ARQ_RES_TIMEOUT); -} - - -#if 0 -/*********************************************************************** - * Update_Location_Child_VLR, TS 29.002 Chapter 25.4.4 - ***********************************************************************/ - -enum upd_loc_child_vlr_state { - ULC_S_IDLE, - ULC_S_WAIT_HLR_RESP, - ULC_S_DONE, -}; - -enum upd_loc_child_vlr_event { - ULC_E_START, -}; - -static const struct value_string upd_loc_child_vlr_event_names[] = { - { ULC_E_START, "START" }, - { 0, NULL } -}; - -static void upd_loc_child_f_idle(struct osmo_fsm_inst *fi, uint32_t event, - void *data) -{ - OSMO_ASSERT(event == ULC_E_START); - - /* send update location */ -} - -static void upd_loc_child_f_w_hlr(struct osmo_fsm_inst *fi, uint32_t event, - void *data) -{ -} - -static const struct osmo_fsm_state upd_loc_child_vlr_states[] = { - [ULC_S_IDLE] = { - .in_event_mask = , - .out_state_mask = S(ULC_S_WAIT_HLR_RESP) | - S(ULC_S_DONE), - .name = "IDLE", - .action = upd_loc_child_f_idle, - }, - [ULC_S_WAIT_HLR_RESP] = { - .in_event_mask = , - .out_state_mask = S(ULC_S_DONE), - .name = "WAIT-HLR-RESP", - .action = upd_loc_child_f_w_hlr, - }, - [ULC_S_DONE] = { - .name = "DONE", - }, -}; - -static struct osmo_fsm upd_loc_child_vlr_fsm = { - .name = "Update_Location_Child_VLR", - .states = upd_loc_child_vlr_states, - .num_states = ARRAY_SIZE(upd_loc_child_vlr_states), - .log_subsys = DVLR, - .event_names = upd_loc_child_vlr_event_names, -}; -#endif - -void vlr_parq_fsm_init(void) -{ - //osmo_fsm_register(&upd_loc_child_vlr_fsm); - osmo_fsm_register(&proc_arq_vlr_fsm); -} diff --git a/src/libvlr/vlr_access_req_fsm.h b/src/libvlr/vlr_access_req_fsm.h deleted file mode 100644 index 8386da6f2..000000000 --- a/src/libvlr/vlr_access_req_fsm.h +++ /dev/null @@ -1,17 +0,0 @@ -#pragma once - -enum proc_arq_vlr_state { - PR_ARQ_S_INIT, - /* Waiting for Obtain_Identity_VLR (IMSI) result */ - PR_ARQ_S_WAIT_OBTAIN_IMSI, - /* Waiting for Authenticate_VLR result */ - PR_ARQ_S_WAIT_AUTH, - PR_ARQ_S_WAIT_CIPH, - PR_ARQ_S_WAIT_UPD_LOC_CHILD, - PR_ARQ_S_WAIT_SUB_PRES, - PR_ARQ_S_WAIT_TRACE_SUB, - PR_ARQ_S_WAIT_CHECK_IMEI, - PR_ARQ_S_WAIT_TMSI_ACK, - PR_ARQ_S_WAIT_CECK_CONF, - PR_ARQ_S_DONE, -}; diff --git a/src/libvlr/vlr_auth_fsm.c b/src/libvlr/vlr_auth_fsm.c deleted file mode 100644 index 0eb86e749..000000000 --- a/src/libvlr/vlr_auth_fsm.c +++ /dev/null @@ -1,605 +0,0 @@ -/* Osmocom Visitor Location Register (VLR) Autentication FSM */ - -/* (C) 2016 by Harald Welte <laforge@gnumonks.org> - * - * All Rights Reserved - * - * This program is free software; you can redistribute it and/or modify - * it under the terms of the GNU Affero General Public License as published by - * the Free Software Foundation; either version 3 of the License, or - * (at your option) any later version. - * - * This program is distributed in the hope that it will be useful, - * but WITHOUT ANY WARRANTY; without even the implied warranty of - * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the - * GNU Affero General Public License for more details. - * - * You should have received a copy of the GNU Affero General Public License - * along with this program. If not, see <http://www.gnu.org/licenses/>. - * - */ - - -#include <osmocom/core/fsm.h> -#include <osmocom/core/utils.h> -#include <osmocom/gsm/gsup.h> -#include <openbsc/vlr.h> -#include <openbsc/debug.h> - -#include "vlr_core.h" -#include "vlr_auth_fsm.h" - -#define S(x) (1 << (x)) - -static const struct value_string fsm_auth_event_names[] = { - OSMO_VALUE_STRING(VLR_AUTH_E_START), - OSMO_VALUE_STRING(VLR_AUTH_E_HLR_SAI_ACK), - OSMO_VALUE_STRING(VLR_AUTH_E_HLR_SAI_NACK), - OSMO_VALUE_STRING(VLR_AUTH_E_HLR_SAI_ABORT), - OSMO_VALUE_STRING(VLR_AUTH_E_MS_AUTH_RESP), - OSMO_VALUE_STRING(VLR_AUTH_E_MS_AUTH_FAIL), - OSMO_VALUE_STRING(VLR_AUTH_E_MS_ID_IMSI), - { 0, NULL } -}; - -const struct value_string vlr_auth_fsm_result_names[] = { - OSMO_VALUE_STRING(VLR_AUTH_RES_ABORTED), - OSMO_VALUE_STRING(VLR_AUTH_RES_UNKNOWN_SUBSCR), - OSMO_VALUE_STRING(VLR_AUTH_RES_PROC_ERR), - OSMO_VALUE_STRING(VLR_AUTH_RES_AUTH_FAILED), - OSMO_VALUE_STRING(VLR_AUTH_RES_PASSED), - {0, NULL} -}; - -/* private state of the auth_fsm_instance */ -struct auth_fsm_priv { - struct vlr_subscr *vsub; - bool by_imsi; - bool is_r99; - bool is_utran; - bool auth_requested; - - int auth_tuple_max_use_count; /* see vlr->cfg instead */ -}; - -/*********************************************************************** - * Utility functions - ***********************************************************************/ - -/* Always use either vlr_subscr_get_auth_tuple() or vlr_subscr_has_auth_tuple() - * instead, to ensure proper use count. - * Return an auth tuple with the lowest use_count among the auth tuples. If - * max_use_count >= 0, return NULL if all available auth tuples have a use - * count > max_use_count. If max_use_count is negative, return a currently - * least used auth tuple without enforcing a maximum use count. If there are - * no auth tuples, return NULL. - */ -static struct gsm_auth_tuple * -_vlr_subscr_next_auth_tuple(struct vlr_subscr *vsub, int max_use_count) -{ - unsigned int count; - unsigned int idx; - struct gsm_auth_tuple *at = NULL; - unsigned int key_seq = GSM_KEY_SEQ_INVAL; - - if (!vsub) - return NULL; - - if (vsub->last_tuple) - key_seq = vsub->last_tuple->key_seq; - - if (key_seq == GSM_KEY_SEQ_INVAL) - /* Start with 0 after increment modulo array size */ - idx = ARRAY_SIZE(vsub->auth_tuples) - 1; - else - idx = key_seq; - - for (count = ARRAY_SIZE(vsub->auth_tuples); count > 0; count--) { - idx = (idx + 1) % ARRAY_SIZE(vsub->auth_tuples); - - if (vsub->auth_tuples[idx].key_seq == GSM_KEY_SEQ_INVAL) - continue; - - if (!at || vsub->auth_tuples[idx].use_count < at->use_count) - at = &vsub->auth_tuples[idx]; - } - - if (!at || (max_use_count >= 0 && at->use_count > max_use_count)) - return NULL; - - return at; -} - -/* Return an auth tuple and increment its use count. */ -static struct gsm_auth_tuple * -vlr_subscr_get_auth_tuple(struct vlr_subscr *vsub, int max_use_count) -{ - struct gsm_auth_tuple *at = _vlr_subscr_next_auth_tuple(vsub, - max_use_count); - if (!at) - return NULL; - at->use_count++; - return at; -} - -/* Return whether an auth tuple with the given max_use_count is available. */ -static bool vlr_subscr_has_auth_tuple(struct vlr_subscr *vsub, - int max_use_count) -{ - return _vlr_subscr_next_auth_tuple(vsub, max_use_count) != NULL; -} - -static bool check_auth_resp(struct vlr_subscr *vsub, bool is_r99, - bool is_utran, const uint8_t *res, - uint8_t res_len) -{ - struct gsm_auth_tuple *at = vsub->last_tuple; - struct osmo_auth_vector *vec = &at->vec; - bool check_umts; - OSMO_ASSERT(at); - - LOGVSUBP(LOGL_DEBUG, vsub, "received res: %s\n", - osmo_hexdump(res, res_len)); - - /* RES must be present and at least 32bit */ - if (!res || res_len < sizeof(vec->sres)) { - LOGVSUBP(LOGL_NOTICE, vsub, "AUTH RES missing or too short " - "(%u)\n", res_len); - goto out_false; - } - - check_umts = false; - if (is_r99 && (vec->auth_types & OSMO_AUTH_TYPE_UMTS)) { - check_umts = true; - /* We have a R99 capable UE and have a UMTS AKA capable USIM. - * However, the ME may still choose to only perform GSM AKA, as - * long as the bearer is GERAN */ - if (res_len != vec->res_len) { - if (is_utran) { - LOGVSUBP(LOGL_NOTICE, vsub, - "AUTH via UTRAN but " - "res_len(%u) != vec->res_len(%u)\n", - res_len, vec->res_len); - goto out_false; - } - check_umts = false; - } - } - - if (check_umts) { - if (res_len != vec->res_len - || memcmp(res, vec->res, res_len)) { - LOGVSUBP(LOGL_INFO, vsub, "UMTS AUTH failure:" - " mismatching res (expected res=%s)\n", - osmo_hexdump(vec->res, vec->res_len)); - goto out_false; - } - - LOGVSUBP(LOGL_INFO, vsub, "AUTH established UMTS security" - " context\n"); - vsub->sec_ctx = VLR_SEC_CTX_UMTS; - return true; - } else { - if (res_len != sizeof(vec->sres) - || memcmp(res, vec->sres, sizeof(vec->sres))) { - LOGVSUBP(LOGL_INFO, vsub, "GSM AUTH failure:" - " mismatching sres (expected sres=%s)\n", - osmo_hexdump(vec->sres, sizeof(vec->sres))); - goto out_false; - } - - LOGVSUBP(LOGL_INFO, vsub, "AUTH established GSM security" - " context\n"); - vsub->sec_ctx = VLR_SEC_CTX_GSM; - return true; - } - -out_false: - vsub->sec_ctx = VLR_SEC_CTX_NONE; - return false; -} - -static void auth_fsm_onenter_failed(struct osmo_fsm_inst *fi, uint32_t prev_state) -{ - struct auth_fsm_priv *afp = fi->priv; - struct vlr_subscr *vsub = afp->vsub; - - /* If authentication hasn't even started, e.g. the HLR sent no auth - * info, then we also don't need to tell the HLR about an auth failure. - */ - if (afp->auth_requested) - vlr_subscr_tx_auth_fail_rep(vsub); -} - -static bool is_umts_auth(struct auth_fsm_priv *afp, - uint32_t auth_types) -{ - if (!afp->is_r99) - return false; - if (!(auth_types & OSMO_AUTH_TYPE_UMTS)) - return false; - return true; -} - -/* Terminate the Auth FSM Instance and notify parent */ -static void auth_fsm_term(struct osmo_fsm_inst *fi, enum vlr_auth_fsm_result res) -{ - struct auth_fsm_priv *afp = fi->priv; - struct vlr_subscr *vsub = afp->vsub; - - LOGPFSM(fi, "Authentication terminating with result %s\n", - vlr_auth_fsm_result_name(res)); - - /* Do one final state transition (mostly for logging purpose) */ - if (res == VLR_AUTH_RES_PASSED) - osmo_fsm_inst_state_chg(fi, VLR_SUB_AS_AUTHENTICATED, 0, 0); - else - osmo_fsm_inst_state_chg(fi, VLR_SUB_AS_AUTH_FAILED, 0, 0); - - /* return the result to the parent FSM */ - osmo_fsm_inst_term(fi, OSMO_FSM_TERM_REGULAR, &res); - vsub->auth_fsm = NULL; -} - -/* back-end function transmitting authentication. Caller ensures we have valid - * tuple */ -static int _vlr_subscr_authenticate(struct osmo_fsm_inst *fi) -{ - struct auth_fsm_priv *afp = fi->priv; - struct vlr_subscr *vsub = afp->vsub; - struct gsm_auth_tuple *at; - - /* Caller ensures we have vectors available */ - at = vlr_subscr_get_auth_tuple(vsub, afp->auth_tuple_max_use_count); - if (!at) { - LOGPFSML(fi, LOGL_ERROR, "A previous check ensured that an" - " auth tuple was available, but now there is in fact" - " none.\n"); - auth_fsm_term(fi, VLR_AUTH_RES_PROC_ERR); - return -1; - } - - LOGPFSM(fi, "got auth tuple: use_count=%d key_seq=%d\n", - at->use_count, at->key_seq); - - OSMO_ASSERT(at); - - /* Transmit auth req to subscriber */ - afp->auth_requested = true; - vsub->last_tuple = at; - vsub->vlr->ops.tx_auth_req(vsub->msc_conn_ref, at, - is_umts_auth(afp, at->vec.auth_types)); - return 0; -} - -/*********************************************************************** - * FSM State Action functions - ***********************************************************************/ - -/* Initial State of TS 23.018 AUT_VLR */ -static void auth_fsm_needs_auth(struct osmo_fsm_inst *fi, uint32_t event, void *data) -{ - struct auth_fsm_priv *afp = fi->priv; - struct vlr_subscr *vsub = afp->vsub; - - OSMO_ASSERT(event == VLR_AUTH_E_START); - - /* Start off with the default max_use_count, possibly change that if we - * need to re-use an old tuple. */ - afp->auth_tuple_max_use_count = vsub->vlr->cfg.auth_tuple_max_use_count; - - /* Check if we have vectors available */ - if (!vlr_subscr_has_auth_tuple(vsub, afp->auth_tuple_max_use_count)) { - /* Obtain_Authentication_Sets_VLR */ - vlr_subscr_req_sai(vsub, NULL, NULL); - osmo_fsm_inst_state_chg(fi, VLR_SUB_AS_NEEDS_AUTH_WAIT_AI, - GSM_29002_TIMER_M, 0); - } else { - /* go straight ahead with sending auth request */ - osmo_fsm_inst_state_chg(fi, VLR_SUB_AS_WAIT_RESP, - vlr_timer(vsub->vlr, 3260), 3260); - _vlr_subscr_authenticate(fi); - } -} - -/* Waiting for Authentication Info from HLR */ -static void auth_fsm_wait_ai(struct osmo_fsm_inst *fi, uint32_t event, - void *data) -{ - struct auth_fsm_priv *afp = fi->priv; - struct vlr_subscr *vsub = afp->vsub; - struct osmo_gsup_message *gsup = data; - - if (event == VLR_AUTH_E_HLR_SAI_NACK) - LOGPFSM(fi, "GSUP: rx Auth Info Error cause: %d: %s\n", - gsup->cause, - get_value_string(gsm48_gmm_cause_names, gsup->cause)); - - /* We are in what corresponds to the - * Wait_For_Authentication_Sets state of TS 23.018 OAS_VLR */ - if ((event == VLR_AUTH_E_HLR_SAI_ACK && !gsup->num_auth_vectors) - || (event == VLR_AUTH_E_HLR_SAI_NACK && - gsup->cause != GMM_CAUSE_IMSI_UNKNOWN) - || (event == VLR_AUTH_E_HLR_SAI_ABORT)) { - if (vsub->vlr->cfg.auth_reuse_old_sets_on_error - && vlr_subscr_has_auth_tuple(vsub, -1)) { - /* To re-use an old tuple, disable the max_use_count - * constraint. */ - afp->auth_tuple_max_use_count = -1; - goto pass; - } - /* result = procedure error */ - auth_fsm_term(fi, VLR_AUTH_RES_PROC_ERR); - return; - } - - switch (event) { - case VLR_AUTH_E_HLR_SAI_ACK: - vlr_subscr_update_tuples(vsub, gsup); - goto pass; - break; - case VLR_AUTH_E_HLR_SAI_NACK: - auth_fsm_term(fi, - gsup->cause == GMM_CAUSE_IMSI_UNKNOWN? - VLR_AUTH_RES_UNKNOWN_SUBSCR - : VLR_AUTH_RES_PROC_ERR); - break; - } - - return; -pass: - osmo_fsm_inst_state_chg(fi, VLR_SUB_AS_WAIT_RESP, - vlr_timer(vsub->vlr, 3260), 3260); - _vlr_subscr_authenticate(fi); -} - -/* Waiting for Authentication Response from MS */ -static void auth_fsm_wait_auth_resp(struct osmo_fsm_inst *fi, uint32_t event, - void *data) -{ - struct auth_fsm_priv *afp = fi->priv; - struct vlr_subscr *vsub = afp->vsub; - struct vlr_instance *vlr = vsub->vlr; - struct vlr_auth_resp_par *par = data; - int rc; - - switch (event) { - case VLR_AUTH_E_MS_AUTH_RESP: - rc = check_auth_resp(vsub, par->is_r99, par->is_utran, - par->res, par->res_len); - if (rc == false) { - if (!afp->by_imsi) { - vlr->ops.tx_id_req(vsub->msc_conn_ref, - GSM_MI_TYPE_IMSI); - osmo_fsm_inst_state_chg(fi, - VLR_SUB_AS_WAIT_ID_IMSI, - vlr_timer(vlr, 3270), 3270); - } else { - auth_fsm_term(fi, VLR_AUTH_RES_AUTH_FAILED); - } - } else { - auth_fsm_term(fi, VLR_AUTH_RES_PASSED); - } - break; - case VLR_AUTH_E_MS_AUTH_FAIL: - if (par->auts) { - /* First failure, start re-sync attempt */ - vlr_subscr_req_sai(vsub, par->auts, - vsub->last_tuple->vec.rand); - osmo_fsm_inst_state_chg(fi, - VLR_SUB_AS_NEEDS_AUTH_WAIT_SAI_RESYNC, - GSM_29002_TIMER_M, 0); - } else - auth_fsm_term(fi, VLR_AUTH_RES_AUTH_FAILED); - break; - } -} - -/* Waiting for Authentication Info from HLR (resync case) */ -static void auth_fsm_wait_ai_resync(struct osmo_fsm_inst *fi, - uint32_t event, void *data) -{ - struct auth_fsm_priv *afp = fi->priv; - struct vlr_subscr *vsub = afp->vsub; - struct osmo_gsup_message *gsup = data; - - /* We are in what corresponds to the - * Wait_For_Authentication_Sets state of TS 23.018 OAS_VLR */ - if ((event == VLR_AUTH_E_HLR_SAI_ACK && !gsup->num_auth_vectors) || - (event == VLR_AUTH_E_HLR_SAI_NACK && - gsup->cause != GMM_CAUSE_IMSI_UNKNOWN) || - (event == VLR_AUTH_E_HLR_SAI_ABORT)) { - /* result = procedure error */ - auth_fsm_term(fi, VLR_AUTH_RES_PROC_ERR); - } - switch (event) { - case VLR_AUTH_E_HLR_SAI_ACK: - vlr_subscr_update_tuples(vsub, gsup); - goto pass; - break; - case VLR_AUTH_E_HLR_SAI_NACK: - auth_fsm_term(fi, - gsup->cause == GMM_CAUSE_IMSI_UNKNOWN? - VLR_AUTH_RES_UNKNOWN_SUBSCR - : VLR_AUTH_RES_PROC_ERR); - break; - } - - return; -pass: - osmo_fsm_inst_state_chg(fi, VLR_SUB_AS_WAIT_RESP_RESYNC, - vlr_timer(vsub->vlr, 3260), 3260); - _vlr_subscr_authenticate(fi); -} - -/* Waiting for AUTH RESP from MS (re-sync case) */ -static void auth_fsm_wait_auth_resp_resync(struct osmo_fsm_inst *fi, - uint32_t event, void *data) -{ - struct auth_fsm_priv *afp = fi->priv; - struct vlr_subscr *vsub = afp->vsub; - struct vlr_auth_resp_par *par = data; - struct vlr_instance *vlr = vsub->vlr; - int rc; - - switch (event) { - case VLR_AUTH_E_MS_AUTH_RESP: - rc = check_auth_resp(vsub, par->is_r99, par->is_utran, - par->res, par->res_len); - if (rc == false) { - if (!afp->by_imsi) { - vlr->ops.tx_id_req(vsub->msc_conn_ref, - GSM_MI_TYPE_IMSI); - osmo_fsm_inst_state_chg(fi, - VLR_SUB_AS_WAIT_ID_IMSI, - vlr_timer(vlr, 3270), 3270); - } else { - /* Result = Aborted */ - auth_fsm_term(fi, VLR_AUTH_RES_ABORTED); - } - } else { - /* Result = Pass */ - auth_fsm_term(fi, VLR_AUTH_RES_PASSED); - } - break; - case VLR_AUTH_E_MS_AUTH_FAIL: - /* Second failure: Result = Fail */ - auth_fsm_term(fi, VLR_AUTH_RES_AUTH_FAILED); - break; - } -} - -/* AUT_VLR waiting for Obtain_IMSI_VLR result */ -static void auth_fsm_wait_imsi(struct osmo_fsm_inst *fi, uint32_t event, - void *data) -{ - struct auth_fsm_priv *afp = fi->priv; - struct vlr_subscr *vsub = afp->vsub; - const char *mi_string = data; - - switch (event) { - case VLR_AUTH_E_MS_ID_IMSI: - if (vsub->imsi[0] - && !vlr_subscr_matches_imsi(vsub, mi_string)) { - LOGVSUBP(LOGL_ERROR, vsub, "IMSI in ID RESP differs:" - " %s\n", mi_string); - } else { - strncpy(vsub->imsi, mi_string, sizeof(vsub->imsi)); - vsub->imsi[sizeof(vsub->imsi)-1] = '\0'; - } - /* retry with identity=IMSI */ - afp->by_imsi = true; - osmo_fsm_inst_state_chg(fi, VLR_SUB_AS_NEEDS_AUTH, 0, 0); - osmo_fsm_inst_dispatch(fi, VLR_AUTH_E_START, NULL); - break; - } -} - -static const struct osmo_fsm_state auth_fsm_states[] = { - [VLR_SUB_AS_NEEDS_AUTH] = { - .name = OSMO_STRINGIFY(VLR_SUB_AS_NEEDS_AUTH), - .in_event_mask = S(VLR_AUTH_E_START), - .out_state_mask = S(VLR_SUB_AS_NEEDS_AUTH_WAIT_AI) | - S(VLR_SUB_AS_WAIT_RESP), - .action = auth_fsm_needs_auth, - }, - [VLR_SUB_AS_NEEDS_AUTH_WAIT_AI] = { - .name = OSMO_STRINGIFY(VLR_SUB_AS_NEEDS_AUTH_WAIT_AI), - .in_event_mask = S(VLR_AUTH_E_HLR_SAI_ACK) | - S(VLR_AUTH_E_HLR_SAI_NACK), - .out_state_mask = S(VLR_SUB_AS_AUTH_FAILED) | - S(VLR_SUB_AS_WAIT_RESP), - .action = auth_fsm_wait_ai, - }, - [VLR_SUB_AS_WAIT_RESP] = { - .name = OSMO_STRINGIFY(VLR_SUB_AS_WAIT_RESP), - .in_event_mask = S(VLR_AUTH_E_MS_AUTH_RESP) | - S(VLR_AUTH_E_MS_AUTH_FAIL), - .out_state_mask = S(VLR_SUB_AS_WAIT_ID_IMSI) | - S(VLR_SUB_AS_AUTH_FAILED) | - S(VLR_SUB_AS_AUTHENTICATED) | - S(VLR_SUB_AS_NEEDS_AUTH_WAIT_SAI_RESYNC), - .action = auth_fsm_wait_auth_resp, - }, - [VLR_SUB_AS_NEEDS_AUTH_WAIT_SAI_RESYNC] = { - .name = OSMO_STRINGIFY(VLR_SUB_AS_NEEDS_AUTH_WAIT_SAI_RESYNC), - .in_event_mask = S(VLR_AUTH_E_HLR_SAI_ACK) | - S(VLR_AUTH_E_HLR_SAI_NACK), - .out_state_mask = S(VLR_SUB_AS_AUTH_FAILED) | - S(VLR_SUB_AS_WAIT_RESP_RESYNC), - .action = auth_fsm_wait_ai_resync, - }, - [VLR_SUB_AS_WAIT_RESP_RESYNC] = { - .name = OSMO_STRINGIFY(VLR_SUB_AS_WAIT_RESP_RESYNC), - .in_event_mask = S(VLR_AUTH_E_MS_AUTH_RESP) | - S(VLR_AUTH_E_MS_AUTH_FAIL), - .out_state_mask = S(VLR_SUB_AS_AUTH_FAILED) | - S(VLR_SUB_AS_AUTHENTICATED), - .action = auth_fsm_wait_auth_resp_resync, - }, - [VLR_SUB_AS_WAIT_ID_IMSI] = { - .name = OSMO_STRINGIFY(VLR_SUB_AS_WAIT_ID_IMSI), - .in_event_mask = S(VLR_AUTH_E_MS_ID_IMSI), - .out_state_mask = S(VLR_SUB_AS_NEEDS_AUTH), - .action = auth_fsm_wait_imsi, - }, - [VLR_SUB_AS_AUTHENTICATED] = { - .name = OSMO_STRINGIFY(VLR_SUB_AS_AUTHENTICATED), - .in_event_mask = 0, - .out_state_mask = 0, - }, - [VLR_SUB_AS_AUTH_FAILED] = { - .name = OSMO_STRINGIFY(VLR_SUB_AS_AUTH_FAILED), - .in_event_mask = 0, - .out_state_mask = 0, - .onenter = auth_fsm_onenter_failed, - }, -}; - -struct osmo_fsm vlr_auth_fsm = { - .name = "VLR_Authenticate", - .states = auth_fsm_states, - .num_states = ARRAY_SIZE(auth_fsm_states), - .allstate_event_mask = 0, - .allstate_action = NULL, - .log_subsys = DVLR, - .event_names = fsm_auth_event_names, -}; - -/*********************************************************************** - * User API (for SGSN/MSC code) - ***********************************************************************/ - -/* MSC->VLR: Start Procedure Authenticate_VLR (TS 23.012 Ch. 4.1.2.2) */ -struct osmo_fsm_inst *auth_fsm_start(struct vlr_subscr *vsub, - uint32_t log_level, - struct osmo_fsm_inst *parent, - uint32_t parent_term_event, - bool is_r99, - bool is_utran) -{ - struct osmo_fsm_inst *fi; - struct auth_fsm_priv *afp; - - fi = osmo_fsm_inst_alloc_child(&vlr_auth_fsm, parent, - parent_term_event); - - - afp = talloc_zero(fi, struct auth_fsm_priv); - if (!afp) { - osmo_fsm_inst_dispatch(parent, parent_term_event, 0); - return NULL; - } - - afp->vsub = vsub; - if (vsub->imsi[0]) - afp->by_imsi = true; - afp->is_r99 = is_r99; - afp->is_utran = is_utran; - fi->priv = afp; - vsub->auth_fsm = fi; - - osmo_fsm_inst_dispatch(fi, VLR_AUTH_E_START, NULL); - - return fi; -} diff --git a/src/libvlr/vlr_auth_fsm.h b/src/libvlr/vlr_auth_fsm.h deleted file mode 100644 index 226435f83..000000000 --- a/src/libvlr/vlr_auth_fsm.h +++ /dev/null @@ -1,52 +0,0 @@ -#pragma once - -#include <osmocom/core/utils.h> - -/* Parameters to VLR_AUTH_E_MS_AUTH_RESP */ -struct vlr_auth_resp_par { - bool is_r99; - bool is_utran; - const uint8_t *res; - unsigned int res_len; - const uint8_t *auts; -}; - -/* Result communicated back to parent FMS */ -enum vlr_auth_fsm_result { - VLR_AUTH_RES_ABORTED, - VLR_AUTH_RES_UNKNOWN_SUBSCR, - VLR_AUTH_RES_PROC_ERR, - VLR_AUTH_RES_AUTH_FAILED, - VLR_AUTH_RES_PASSED, -}; - -extern const struct value_string vlr_auth_fsm_result_names[]; -static inline const char *vlr_auth_fsm_result_name(enum vlr_auth_fsm_result val) -{ - return get_value_string(vlr_auth_fsm_result_names, val); -} - -enum vlr_fsm_auth_event { - VLR_AUTH_E_START, - /* TS 23.018 OAS_VLR1(2): SendAuthInfo ACK from HLR */ - VLR_AUTH_E_HLR_SAI_ACK, - /* TS 23.018 OAS_VLR1(2): SendAuthInfo NACK from HLR */ - VLR_AUTH_E_HLR_SAI_NACK, - /* FIXME: merge with NACK? */ - VLR_AUTH_E_HLR_SAI_ABORT, - /* Authentication Response from MS */ - VLR_AUTH_E_MS_AUTH_RESP, - /* Authentication Failure from MS */ - VLR_AUTH_E_MS_AUTH_FAIL, - /* Identity Response (IMSI) from MS */ - VLR_AUTH_E_MS_ID_IMSI, -}; - -struct osmo_fsm vlr_auth_fsm; - -struct osmo_fsm_inst *auth_fsm_start(struct vlr_subscr *vsub, - uint32_t log_level, - struct osmo_fsm_inst *parent, - uint32_t parent_term_event, - bool is_r99, - bool is_utran); diff --git a/src/libvlr/vlr_core.h b/src/libvlr/vlr_core.h deleted file mode 100644 index 0e63c7e69..000000000 --- a/src/libvlr/vlr_core.h +++ /dev/null @@ -1,21 +0,0 @@ -#pragma once - -#include <openbsc/vlr.h> - -#define LOGGSUPP(level, gsup, fmt, args...) \ - LOGP(DVLR, level, "GSUP(%s) " fmt, \ - (gsup)->imsi, \ - ## args) - -#define LOGVSUBP(level, vsub, fmt, args...) \ - LOGP(DVLR, level, "SUBSCR(%s) " fmt, \ - vlr_subscr_name(vsub), ## args) - - -const char *vlr_subscr_name(struct vlr_subscr *vsub); -int vlr_subscr_req_lu(struct vlr_subscr *vsub, bool is_ps); -int vlr_subscr_req_sai(struct vlr_subscr *vsub, const uint8_t *auts, - const uint8_t *auts_rand); -struct vlr_subscr *vlr_subscr_alloc(struct vlr_instance *vlr); -void vlr_subscr_update_tuples(struct vlr_subscr *vsub, - const struct osmo_gsup_message *gsup); diff --git a/src/libvlr/vlr_lu_fsm.c b/src/libvlr/vlr_lu_fsm.c deleted file mode 100644 index 94bea560f..000000000 --- a/src/libvlr/vlr_lu_fsm.c +++ /dev/null @@ -1,1449 +0,0 @@ -/* Osmocom Visitor Location Register (VLR): Location Update FSMs */ - -/* (C) 2016 by Harald Welte <laforge@gnumonks.org> - * - * All Rights Reserved - * - * This program is free software; you can redistribute it and/or modify - * it under the terms of the GNU Affero General Public License as published by - * the Free Software Foundation; either version 3 of the License, or - * (at your option) any later version. - * - * This program is distributed in the hope that it will be useful, - * but WITHOUT ANY WARRANTY; without even the implied warranty of - * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the - * GNU Affero General Public License for more details. - * - * You should have received a copy of the GNU Affero General Public License - * along with this program. If not, see <http://www.gnu.org/licenses/>. - * - */ - -#include <osmocom/core/fsm.h> -#include <osmocom/gsm/gsup.h> -#include <openbsc/vlr.h> -#include <openbsc/debug.h> - -#include "vlr_core.h" -#include "vlr_auth_fsm.h" -#include "vlr_lu_fsm.h" - -#define S(x) (1 << (x)) - -#define LU_TIMEOUT_LONG 30 - -enum vlr_fsm_result { - VLR_FSM_RESULT_NONE, - VLR_FSM_RESULT_SUCCESS, - VLR_FSM_RESULT_FAILURE, -}; - - -/*********************************************************************** - * Update_HLR_VLR, TS 23.012 Chapter 4.1.2.4 - ***********************************************************************/ - -enum upd_hlr_vlr_state { - UPD_HLR_VLR_S_INIT, - UPD_HLR_VLR_S_WAIT_FOR_DATA, - UPD_HLR_VLR_S_DONE, -}; - -enum upd_hlr_vlr_evt { - UPD_HLR_VLR_E_START, - UPD_HLR_VLR_E_INS_SUB_DATA, - UPD_HLR_VLR_E_ACT_TRACE_MODE, - UPD_HLR_VLR_E_FW_CHECK_SS_IND, - UPD_HLR_VLR_E_UPD_LOC_ACK, - UPD_HLR_VLR_E_UPD_LOC_NACK, -}; - -static const struct value_string upd_hlr_vlr_event_names[] = { - OSMO_VALUE_STRING(UPD_HLR_VLR_E_START), - OSMO_VALUE_STRING(UPD_HLR_VLR_E_INS_SUB_DATA), - OSMO_VALUE_STRING(UPD_HLR_VLR_E_ACT_TRACE_MODE), - OSMO_VALUE_STRING(UPD_HLR_VLR_E_FW_CHECK_SS_IND), - OSMO_VALUE_STRING(UPD_HLR_VLR_E_UPD_LOC_ACK), - OSMO_VALUE_STRING(UPD_HLR_VLR_E_UPD_LOC_NACK), - { 0, NULL } -}; - -static void upd_hlr_vlr_fsm_init(struct osmo_fsm_inst *fi, uint32_t event, - void *data) -{ - struct vlr_subscr *vsub = fi->priv; - - OSMO_ASSERT(event == UPD_HLR_VLR_E_START); - - /* Send UpdateLocation to HLR */ - vlr_subscr_req_lu(vsub, vsub->vlr->cfg.is_ps); - osmo_fsm_inst_state_chg(fi, UPD_HLR_VLR_S_WAIT_FOR_DATA, - LU_TIMEOUT_LONG, 0); -} - -static void upd_hlr_vlr_fsm_wait_data(struct osmo_fsm_inst *fi, uint32_t event, - void *data) -{ - struct vlr_subscr *vsub = fi->priv; - - switch (event) { - case UPD_HLR_VLR_E_INS_SUB_DATA: - /* FIXME: Insert_Subscr_Data_VLR */ - break; - case UPD_HLR_VLR_E_ACT_TRACE_MODE: - /* TODO: Activate_Tracing_VLR */ - break; - case UPD_HLR_VLR_E_FW_CHECK_SS_IND: - /* TODO: Forward Check SS Ind to MSC */ - break; - case UPD_HLR_VLR_E_UPD_LOC_ACK: - /* Inside Update_HLR_VLR after UpdateLocationAck */ - vsub->sub_dataconf_by_hlr_ind = true; - vsub->loc_conf_in_hlr_ind = true; - osmo_fsm_inst_state_chg(fi, UPD_HLR_VLR_S_DONE, 0, 0); - osmo_fsm_inst_term(fi, OSMO_FSM_TERM_REGULAR, NULL); - break; - case UPD_HLR_VLR_E_UPD_LOC_NACK: - /* Inside Update_HLR_VLR after UpdateLocationNack */ - /* TODO: Check_User_Error_In_Serving_Network_Entity */ - vsub->sub_dataconf_by_hlr_ind = false; - vsub->loc_conf_in_hlr_ind = false; - osmo_fsm_inst_state_chg(fi, UPD_HLR_VLR_S_DONE, 0, 0); - /* Data is a pointer to a gsm48_gmm_cause which we - * simply pass through */ - osmo_fsm_inst_term(fi, OSMO_FSM_TERM_REGULAR, data); - break; - } -} - -static const struct osmo_fsm_state upd_hlr_vlr_states[] = { - [UPD_HLR_VLR_S_INIT] = { - .in_event_mask = S(UPD_HLR_VLR_E_START), - .out_state_mask = S(UPD_HLR_VLR_S_WAIT_FOR_DATA), - .name = OSMO_STRINGIFY(UPD_HLR_VLR_S_INIT), - .action = upd_hlr_vlr_fsm_init, - }, - [UPD_HLR_VLR_S_WAIT_FOR_DATA] = { - .in_event_mask = S(UPD_HLR_VLR_E_INS_SUB_DATA) | - S(UPD_HLR_VLR_E_ACT_TRACE_MODE) | - S(UPD_HLR_VLR_E_FW_CHECK_SS_IND) | - S(UPD_HLR_VLR_E_UPD_LOC_ACK) | - S(UPD_HLR_VLR_E_UPD_LOC_NACK), - .out_state_mask = S(UPD_HLR_VLR_S_DONE), - .name = OSMO_STRINGIFY(UPD_HLR_VLR_S_WAIT_FOR_DATA), - .action = upd_hlr_vlr_fsm_wait_data, - }, - [UPD_HLR_VLR_S_DONE] = { - .name = OSMO_STRINGIFY(UPD_HLR_VLR_S_DONE), - }, -}; - -static struct osmo_fsm upd_hlr_vlr_fsm = { - .name = "upd_hlr_vlr_fsm", - .states = upd_hlr_vlr_states, - .num_states = ARRAY_SIZE(upd_hlr_vlr_states), - .allstate_event_mask = 0, - .allstate_action = NULL, - .log_subsys = DVLR, - .event_names = upd_hlr_vlr_event_names, -}; - -struct osmo_fsm_inst * -upd_hlr_vlr_proc_start(struct osmo_fsm_inst *parent, - struct vlr_subscr *vsub, - uint32_t parent_event) -{ - struct osmo_fsm_inst *fi; - - fi = osmo_fsm_inst_alloc_child(&upd_hlr_vlr_fsm, parent, - parent_event); - if (!fi) - return NULL; - - fi->priv = vsub; - osmo_fsm_inst_dispatch(fi, UPD_HLR_VLR_E_START, NULL); - - return fi; -} - - -/*********************************************************************** - * Subscriber_Present_VLR, TS 29.002 Chapter 25.10.1 - ***********************************************************************/ - -enum sub_pres_vlr_state { - SUB_PRES_VLR_S_INIT, - SUB_PRES_VLR_S_WAIT_FOR_HLR, - SUB_PRES_VLR_S_DONE, -}; - -enum sub_pres_vlr_event { - SUB_PRES_VLR_E_START, - SUB_PRES_VLR_E_READY_SM_CNF, - SUB_PRES_VLR_E_READY_SM_ERR, -}; - -static const struct value_string sub_pres_vlr_event_names[] = { - OSMO_VALUE_STRING(SUB_PRES_VLR_E_START), - OSMO_VALUE_STRING(SUB_PRES_VLR_E_READY_SM_CNF), - OSMO_VALUE_STRING(SUB_PRES_VLR_E_READY_SM_ERR), - { 0, NULL } -}; - -static void sub_pres_vlr_fsm_init(struct osmo_fsm_inst *fi, uint32_t event, - void *data) -{ - struct vlr_subscr *vsub = fi->priv; - OSMO_ASSERT(event == SUB_PRES_VLR_E_START); - - if (!vsub->ms_not_reachable_flag) { - osmo_fsm_inst_state_chg(fi, SUB_PRES_VLR_S_DONE, 0, 0); - osmo_fsm_inst_term(fi, OSMO_FSM_TERM_REGULAR, NULL); - return; - } - /* FIXME: Send READY_FOR_SM via GSUP */ - osmo_fsm_inst_state_chg(fi, SUB_PRES_VLR_S_WAIT_FOR_HLR, - LU_TIMEOUT_LONG, 0); -} - -static void sub_pres_vlr_fsm_wait_hlr(struct osmo_fsm_inst *fi, uint32_t event, - void *data) -{ - struct vlr_subscr *vsub = fi->priv; - - switch (event) { - case SUB_PRES_VLR_E_READY_SM_CNF: - vsub->ms_not_reachable_flag = false; - break; - case SUB_PRES_VLR_E_READY_SM_ERR: - break; - } - osmo_fsm_inst_state_chg(fi, SUB_PRES_VLR_S_DONE, 0, 0); - osmo_fsm_inst_term(fi, OSMO_FSM_TERM_REGULAR, NULL); -} - -static const struct osmo_fsm_state sub_pres_vlr_states[] = { - [SUB_PRES_VLR_S_INIT] = { - .in_event_mask = S(SUB_PRES_VLR_E_START), - .out_state_mask = S(SUB_PRES_VLR_S_WAIT_FOR_HLR) | - S(SUB_PRES_VLR_S_DONE), - .name = OSMO_STRINGIFY(SUB_PRES_VLR_S_INIT), - .action = sub_pres_vlr_fsm_init, - }, - [SUB_PRES_VLR_S_WAIT_FOR_HLR] = { - .in_event_mask = S(SUB_PRES_VLR_E_READY_SM_CNF) | - S(SUB_PRES_VLR_E_READY_SM_ERR), - .out_state_mask = S(SUB_PRES_VLR_S_DONE), - .name = OSMO_STRINGIFY(SUB_PRES_VLR_S_WAIT_FOR_HLR), - .action = sub_pres_vlr_fsm_wait_hlr, - }, - [SUB_PRES_VLR_S_DONE] = { - .name = OSMO_STRINGIFY(SUB_PRES_VLR_S_DONE), - }, -}; - -static struct osmo_fsm sub_pres_vlr_fsm = { - .name = "sub_pres_vlr_fsm", - .states = sub_pres_vlr_states, - .num_states = ARRAY_SIZE(sub_pres_vlr_states), - .allstate_event_mask = 0, - .allstate_action = NULL, - .log_subsys = DVLR, - .event_names = sub_pres_vlr_event_names, -}; - -struct osmo_fsm_inst *sub_pres_vlr_fsm_start(struct osmo_fsm_inst *parent, - struct vlr_subscr *vsub, - uint32_t term_event) -{ - struct osmo_fsm_inst *fi; - - fi = osmo_fsm_inst_alloc_child(&sub_pres_vlr_fsm, parent, - term_event); - if (!fi) - return NULL; - - fi->priv = vsub; - osmo_fsm_inst_dispatch(fi, SUB_PRES_VLR_E_START, NULL); - - return fi; -} - -/*********************************************************************** - * Location_Update_Completion_VLR, TS 23.012 Chapter 4.1.2.3 - ***********************************************************************/ - -enum lu_compl_vlr_state { - LU_COMPL_VLR_S_INIT, - LU_COMPL_VLR_S_WAIT_SUB_PRES, - LU_COMPL_VLR_S_WAIT_IMEI, - LU_COMPL_VLR_S_WAIT_IMEI_TMSI, - LU_COMPL_VLR_S_WAIT_TMSI_CNF, - LU_COMPL_VLR_S_DONE, -}; - -enum lu_compl_vlr_event { - LU_COMPL_VLR_E_START, - LU_COMPL_VLR_E_SUB_PRES_COMPL, - LU_COMPL_VLR_E_IMEI_CHECK_ACK, - LU_COMPL_VLR_E_IMEI_CHECK_NACK, - LU_COMPL_VLR_E_NEW_TMSI_ACK, -}; - -static const struct value_string lu_compl_vlr_event_names[] = { - OSMO_VALUE_STRING(LU_COMPL_VLR_E_START), - OSMO_VALUE_STRING(LU_COMPL_VLR_E_SUB_PRES_COMPL), - OSMO_VALUE_STRING(LU_COMPL_VLR_E_IMEI_CHECK_ACK), - OSMO_VALUE_STRING(LU_COMPL_VLR_E_IMEI_CHECK_NACK), - OSMO_VALUE_STRING(LU_COMPL_VLR_E_NEW_TMSI_ACK), - { 0, NULL } -}; - -struct lu_compl_vlr_priv { - struct vlr_subscr *vsub; - void *msc_conn_ref; - struct osmo_fsm_inst *sub_pres_vlr_fsm; - uint32_t parent_event_success; - uint32_t parent_event_failure; - void *parent_event_data; - enum vlr_fsm_result result; - uint8_t cause; - bool assign_tmsi; -}; - -static void _vlr_lu_compl_fsm_done(struct osmo_fsm_inst *fi, - enum vlr_fsm_result result, - uint8_t cause) -{ - struct lu_compl_vlr_priv *lcvp = fi->priv; - lcvp->result = result; - lcvp->cause = cause; - osmo_fsm_inst_state_chg(fi, LU_COMPL_VLR_S_DONE, 0, 0); -} - -static void vlr_lu_compl_fsm_success(struct osmo_fsm_inst *fi) -{ - struct lu_compl_vlr_priv *lcvp = fi->priv; - struct vlr_subscr *vsub = lcvp->vsub; - if (!vsub->lu_complete) { - vsub->lu_complete = true; - /* Balanced by vlr_subscr_rx_imsi_detach() */ - vlr_subscr_get(vsub); - } - _vlr_lu_compl_fsm_done(fi, VLR_FSM_RESULT_SUCCESS, 0); -} - -static void vlr_lu_compl_fsm_failure(struct osmo_fsm_inst *fi, uint8_t cause) -{ - struct lu_compl_vlr_priv *lcvp = fi->priv; - lcvp->vsub->vlr->ops.tx_lu_rej(lcvp->msc_conn_ref, cause); - _vlr_lu_compl_fsm_done(fi, VLR_FSM_RESULT_FAILURE, cause); -} - -static void vlr_lu_compl_fsm_dispatch_result(struct osmo_fsm_inst *fi, - uint32_t prev_state) -{ - struct lu_compl_vlr_priv *lcvp = fi->priv; - if (!fi->proc.parent) { - LOGPFSML(fi, LOGL_ERROR, "No parent FSM\n"); - return; - } - osmo_fsm_inst_dispatch(fi->proc.parent, - (lcvp->result == VLR_FSM_RESULT_SUCCESS) - ? lcvp->parent_event_success - : lcvp->parent_event_failure, - &lcvp->cause); -} - -static void lu_compl_vlr_init(struct osmo_fsm_inst *fi, uint32_t event, - void *data) -{ - struct lu_compl_vlr_priv *lcvp = fi->priv; - struct vlr_subscr *vsub = lcvp->vsub; - struct vlr_instance *vlr; - OSMO_ASSERT(vsub); - vlr = vsub->vlr; - OSMO_ASSERT(vlr); - - OSMO_ASSERT(event == LU_COMPL_VLR_E_START); - - /* TODO: National Roaming restrictions? */ - /* TODO: Roaming restriction due to unsupported feature in subscriber - * data? */ - /* TODO: Regional subscription restriction? */ - /* TODO: Administrative restriction of subscribres' access feature? */ - /* TODO: AccessRestrictuionData parameter available? */ - /* TODO: AccessRestrictionData permits RAT? */ - /* Node 1 */ - /* TODO: Autonomous CSG supported in VPLMN and allowed by HPLMN? */ - /* TODO: Hybrid Cel / CSG Cell */ - /* Node 2 */ - vsub->la_allowed = true; - vsub->imsi_detached_flag = false; - /* Start Subscriber_Present_VLR Procedure */ - osmo_fsm_inst_state_chg(fi, LU_COMPL_VLR_S_WAIT_SUB_PRES, - LU_TIMEOUT_LONG, 0); - - lcvp->sub_pres_vlr_fsm = sub_pres_vlr_fsm_start(fi, vsub, - LU_COMPL_VLR_E_SUB_PRES_COMPL); - -} - -static void lu_compl_vlr_new_tmsi(struct osmo_fsm_inst *fi) -{ - struct lu_compl_vlr_priv *lcvp = fi->priv; - struct vlr_subscr *vsub = lcvp->vsub; - struct vlr_instance *vlr = vsub->vlr; - - LOGPFSM(fi, "%s()\n", __func__); - - if (vlr_subscr_alloc_tmsi(vsub)) { - vlr_lu_compl_fsm_failure(fi, - GSM48_REJECT_SRV_OPT_TMP_OUT_OF_ORDER); - return; - } - - osmo_fsm_inst_state_chg(fi, LU_COMPL_VLR_S_WAIT_TMSI_CNF, - vlr_timer(vlr, 3250), 3250); - - vlr->ops.tx_lu_acc(lcvp->msc_conn_ref, vsub->tmsi_new); -} - -/* After completion of Subscriber_Present_VLR */ -static void lu_compl_vlr_wait_subscr_pres(struct osmo_fsm_inst *fi, - uint32_t event, - void *data) -{ - struct lu_compl_vlr_priv *lcvp = fi->priv; - struct vlr_subscr *vsub = lcvp->vsub; - struct vlr_instance *vlr = vsub->vlr; - - OSMO_ASSERT(event == LU_COMPL_VLR_E_SUB_PRES_COMPL); - - lcvp->sub_pres_vlr_fsm = NULL; - - /* TODO: Trace_Subscriber_Activity_VLR */ - - if (vlr->cfg.check_imei_rqd) { - /* Check IMEI VLR */ - osmo_fsm_inst_state_chg(fi, - lcvp->assign_tmsi ? - LU_COMPL_VLR_S_WAIT_IMEI_TMSI - : LU_COMPL_VLR_S_WAIT_IMEI, - vlr_timer(vlr, 3270), 3270); - vlr->ops.tx_id_req(lcvp->msc_conn_ref, GSM_MI_TYPE_IMEI); - return; - } - - /* Do we need to allocate a TMSI? */ - if (lcvp->assign_tmsi) { - lu_compl_vlr_new_tmsi(fi); - return; - } - - /* Location Updating Accept */ - vlr->ops.tx_lu_acc(lcvp->msc_conn_ref, GSM_RESERVED_TMSI); - vlr_lu_compl_fsm_success(fi); -} - -/* Waiting for completion of CHECK_IMEI_VLR */ -static void lu_compl_vlr_wait_imei(struct osmo_fsm_inst *fi, uint32_t event, - void *data) -{ - struct lu_compl_vlr_priv *lcvp = fi->priv; - struct vlr_subscr *vsub = lcvp->vsub; - struct vlr_instance *vlr = vsub->vlr; - - switch (event) { - case LU_COMPL_VLR_E_IMEI_CHECK_ACK: - if (!vsub->imei[0]) { - /* Abort: Do nothing */ - vlr_lu_compl_fsm_failure(fi, - GSM48_REJECT_PROTOCOL_ERROR); - return; - } - /* Pass */ - break; - - case LU_COMPL_VLR_E_IMEI_CHECK_NACK: - vlr_lu_compl_fsm_failure(fi, GSM48_REJECT_ILLEGAL_ME); - /* FIXME: IMEI Check Fail to VLR Application (Detach IMSI VLR) */ - return; - } - - /* IMEI is available. Allocate TMSI if needed. */ - if (lcvp->assign_tmsi) { - if (fi->state != LU_COMPL_VLR_S_WAIT_IMEI_TMSI) - LOGPFSML(fi, LOGL_ERROR, - "TMSI required, expected to be in state" - " LU_COMPL_VLR_S_WAIT_IMEI_TMSI," - " am in %s instead\n", - osmo_fsm_state_name(fi->fsm, fi->state)); - /* Logged an error, continue anyway. */ - - lu_compl_vlr_new_tmsi(fi); - - /* Wait for TMSI ack */ - return; - } - - /* No TMSI needed, accept now. */ - vlr->ops.tx_lu_acc(lcvp->msc_conn_ref, GSM_RESERVED_TMSI); - vlr_lu_compl_fsm_success(fi); -} - -/* Waiting for TMSI confirmation */ -static void lu_compl_vlr_wait_tmsi(struct osmo_fsm_inst *fi, uint32_t event, - void *data) -{ - struct lu_compl_vlr_priv *lcvp = fi->priv; - struct vlr_subscr *vsub = lcvp->vsub; - - OSMO_ASSERT(event == LU_COMPL_VLR_E_NEW_TMSI_ACK); - - if (!vsub || vsub->tmsi_new == GSM_RESERVED_TMSI) { - LOGPFSML(fi, LOGL_ERROR, "TMSI Realloc Compl implies that" - " the subscriber has a new TMSI allocated, but" - " the new TMSI is unset.\n"); - vlr_lu_compl_fsm_failure(fi, GSM48_REJECT_NETWORK_FAILURE); - return; - } - - vsub->tmsi = vsub->tmsi_new; - vsub->tmsi_new = GSM_RESERVED_TMSI; - - vlr_lu_compl_fsm_success(fi); -} - -static const struct osmo_fsm_state lu_compl_vlr_states[] = { - [LU_COMPL_VLR_S_INIT] = { - .in_event_mask = S(LU_COMPL_VLR_E_START), - .out_state_mask = S(LU_COMPL_VLR_S_DONE) | - S(LU_COMPL_VLR_S_WAIT_SUB_PRES) | - S(LU_COMPL_VLR_S_WAIT_IMEI), - .name = OSMO_STRINGIFY(LU_COMPL_VLR_S_INIT), - .action = lu_compl_vlr_init, - }, - [LU_COMPL_VLR_S_WAIT_SUB_PRES] = { - .in_event_mask = S(LU_COMPL_VLR_E_SUB_PRES_COMPL), - .out_state_mask = S(LU_COMPL_VLR_S_WAIT_IMEI) | - S(LU_COMPL_VLR_S_WAIT_IMEI_TMSI) | - S(LU_COMPL_VLR_S_WAIT_TMSI_CNF) | - S(LU_COMPL_VLR_S_DONE), - .name = OSMO_STRINGIFY(LU_COMPL_VLR_S_WAIT_SUB_PRES), - .action = lu_compl_vlr_wait_subscr_pres, - }, - [LU_COMPL_VLR_S_WAIT_IMEI] = { - .in_event_mask = S(LU_COMPL_VLR_E_IMEI_CHECK_ACK) | - S(LU_COMPL_VLR_E_IMEI_CHECK_NACK), - .out_state_mask = S(LU_COMPL_VLR_S_DONE), - .name = OSMO_STRINGIFY(LU_COMPL_VLR_S_WAIT_IMEI), - .action = lu_compl_vlr_wait_imei, - }, - [LU_COMPL_VLR_S_WAIT_IMEI_TMSI] = { - .in_event_mask = S(LU_COMPL_VLR_E_IMEI_CHECK_ACK) | - S(LU_COMPL_VLR_E_IMEI_CHECK_NACK), - .out_state_mask = S(LU_COMPL_VLR_S_DONE) | - S(LU_COMPL_VLR_S_WAIT_TMSI_CNF), - .name = OSMO_STRINGIFY(LU_COMPL_VLR_S_WAIT_IMEI_TMSI), - .action = lu_compl_vlr_wait_imei, - }, - [LU_COMPL_VLR_S_WAIT_TMSI_CNF] = { - .in_event_mask = S(LU_COMPL_VLR_E_NEW_TMSI_ACK), - .out_state_mask = S(LU_COMPL_VLR_S_DONE), - .name = OSMO_STRINGIFY(LU_COMPL_VLR_S_WAIT_TMSI_CNF), - .action = lu_compl_vlr_wait_tmsi, - }, - [LU_COMPL_VLR_S_DONE] = { - .name = OSMO_STRINGIFY(LU_COMPL_VLR_S_DONE), - .onenter = vlr_lu_compl_fsm_dispatch_result, - }, -}; - -static struct osmo_fsm lu_compl_vlr_fsm = { - .name = "lu_compl_vlr_fsm", - .states = lu_compl_vlr_states, - .num_states = ARRAY_SIZE(lu_compl_vlr_states), - .allstate_event_mask = 0, - .allstate_action = NULL, - .log_subsys = DVLR, - .event_names = lu_compl_vlr_event_names, -}; - -struct osmo_fsm_inst * -lu_compl_vlr_proc_alloc(struct osmo_fsm_inst *parent, - struct vlr_subscr *vsub, - void *msc_conn_ref, - uint32_t parent_event_success, - uint32_t parent_event_failure, - bool assign_tmsi) -{ - struct osmo_fsm_inst *fi; - struct lu_compl_vlr_priv *lcvp; - - fi = osmo_fsm_inst_alloc_child(&lu_compl_vlr_fsm, parent, - parent_event_failure); - if (!fi) - return NULL; - - lcvp = talloc_zero(fi, struct lu_compl_vlr_priv); - lcvp->vsub = vsub; - lcvp->msc_conn_ref = msc_conn_ref; - lcvp->parent_event_success = parent_event_success; - lcvp->parent_event_failure = parent_event_failure; - lcvp->assign_tmsi = assign_tmsi; - fi->priv = lcvp; - - return fi; -} - - -/*********************************************************************** - * Update_Location_Area_VLR, TS 23.012 Chapter 4.1.2.1 - ***********************************************************************/ - -static const struct value_string fsm_lu_event_names[] = { - OSMO_VALUE_STRING(VLR_ULA_E_UPDATE_LA), - OSMO_VALUE_STRING(VLR_ULA_E_SEND_ID_ACK), - OSMO_VALUE_STRING(VLR_ULA_E_SEND_ID_NACK), - OSMO_VALUE_STRING(VLR_ULA_E_AUTH_RES), - OSMO_VALUE_STRING(VLR_ULA_E_CIPH_RES), - OSMO_VALUE_STRING(VLR_ULA_E_ID_IMSI), - OSMO_VALUE_STRING(VLR_ULA_E_ID_IMEI), - OSMO_VALUE_STRING(VLR_ULA_E_ID_IMEISV), - OSMO_VALUE_STRING(VLR_ULA_E_HLR_LU_RES), - OSMO_VALUE_STRING(VLR_ULA_E_UPD_HLR_COMPL), - OSMO_VALUE_STRING(VLR_ULA_E_LU_COMPL_SUCCESS), - OSMO_VALUE_STRING(VLR_ULA_E_LU_COMPL_FAILURE), - OSMO_VALUE_STRING(VLR_ULA_E_NEW_TMSI_ACK), - { 0, NULL } -}; - -struct lu_fsm_priv { - struct vlr_instance *vlr; - struct vlr_subscr *vsub; - void *msc_conn_ref; - struct osmo_fsm_inst *upd_hlr_vlr_fsm; - struct osmo_fsm_inst *lu_compl_vlr_fsm; - uint32_t parent_event_success; - uint32_t parent_event_failure; - void *parent_event_data; - enum vlr_fsm_result result; - uint8_t rej_cause; - - enum vlr_lu_type type; - bool lu_by_tmsi; - char imsi[16]; - uint32_t tmsi; - struct osmo_location_area_id old_lai; - struct osmo_location_area_id new_lai; - bool authentication_required; - enum vlr_ciph ciphering_required; - bool is_r99; - bool is_utran; - bool assign_tmsi; -}; - - -/* Determine if given location area is served by this VLR */ -static bool lai_in_this_vlr(struct vlr_instance *vlr, - const struct osmo_location_area_id *lai) -{ - /* TODO: VLR needs to keep a locally configued list of LAIs */ - return true; -} - -/* Determine if authentication is required */ -static bool is_auth_required(struct lu_fsm_priv *lfp) -{ - /* The cases where the authentication procedure should be used - * are defined in 3GPP TS 33.102 */ - /* For now we use a default value passed in to vlr_lu_fsm(). */ - return lfp->authentication_required - || (lfp->ciphering_required != VLR_CIPH_NONE); -} - -/* Determine if ciphering is required */ -static bool is_ciph_required(struct lu_fsm_priv *lfp) -{ - return lfp->ciphering_required != VLR_CIPH_NONE; -} - -/* Determine if a HLR Update is required */ -static bool hlr_update_needed(struct vlr_subscr *vsub) -{ - /* TODO: properly decide this, rather than always assuming we - * need to update the HLR. */ - return true; -} - -static void lu_fsm_dispatch_result(struct osmo_fsm_inst *fi, - uint32_t prev_state) -{ - struct lu_fsm_priv *lfp = fi->priv; - if (!fi->proc.parent) { - LOGPFSML(fi, LOGL_ERROR, "No parent FSM\n"); - return; - } - osmo_fsm_inst_dispatch(fi->proc.parent, - (lfp->result == VLR_FSM_RESULT_SUCCESS) - ? lfp->parent_event_success - : lfp->parent_event_failure, - lfp->parent_event_data); -} - -static void _lu_fsm_done(struct osmo_fsm_inst *fi, - enum vlr_fsm_result result) -{ - struct lu_fsm_priv *lfp = fi->priv; - lfp->result = result; - osmo_fsm_inst_state_chg(fi, VLR_ULA_S_DONE, 0, 0); -} - -static void lu_fsm_success(struct osmo_fsm_inst *fi) -{ - _lu_fsm_done(fi, VLR_FSM_RESULT_SUCCESS); -} - -static void lu_fsm_failure(struct osmo_fsm_inst *fi, uint8_t rej_cause) -{ - struct lu_fsm_priv *lfp = fi->priv; - if (rej_cause) - lfp->vlr->ops.tx_lu_rej(lfp->msc_conn_ref, rej_cause); - _lu_fsm_done(fi, VLR_FSM_RESULT_FAILURE); -} - -static void vlr_loc_upd_start_lu_compl_fsm(struct osmo_fsm_inst *fi) -{ - struct lu_fsm_priv *lfp = fi->priv; - lfp->lu_compl_vlr_fsm = - lu_compl_vlr_proc_alloc(fi, lfp->vsub, lfp->msc_conn_ref, - VLR_ULA_E_LU_COMPL_SUCCESS, - VLR_ULA_E_LU_COMPL_FAILURE, - lfp->assign_tmsi); - - osmo_fsm_inst_dispatch(lfp->lu_compl_vlr_fsm, LU_COMPL_VLR_E_START, NULL); -} - -static void lu_fsm_discard_lu_compl_fsm(struct osmo_fsm_inst *fi) -{ - struct lu_fsm_priv *lfp = fi->priv; - if (!lfp->lu_compl_vlr_fsm) - return; - osmo_fsm_inst_term(lfp->lu_compl_vlr_fsm, OSMO_FSM_TERM_PARENT, NULL); -} - -/* 4.1.2.1 Node 4 */ -static void vlr_loc_upd_node_4(struct osmo_fsm_inst *fi) -{ - struct lu_fsm_priv *lfp = fi->priv; - struct vlr_subscr *vsub = lfp->vsub; - bool hlr_unknown = false; - - LOGPFSM(fi, "%s()\n", __func__); - - if (hlr_unknown) { - /* FIXME: Delete subscriber record */ - /* LU REJ: Roaming not allowed */ - lu_fsm_failure(fi, GSM48_REJECT_ROAMING_NOT_ALLOWED); - } else { - /* Update_HLR_VLR */ - osmo_fsm_inst_state_chg(fi, VLR_ULA_S_WAIT_HLR_UPD, - LU_TIMEOUT_LONG, 0); - lfp->upd_hlr_vlr_fsm = - upd_hlr_vlr_proc_start(fi, vsub, VLR_ULA_E_UPD_HLR_COMPL); - } -} - -/* 4.1.2.1 Node B */ -static void vlr_loc_upd_node_b(struct osmo_fsm_inst *fi) -{ - LOGPFSM(fi, "%s()\n", __func__); - - /* OsmoHLR does not support PgA, neither stores the IMEISV, so we have no need to update the HLR - * with either. TODO: depend on actual HLR configuration. See 3GPP TS 23.012 Release 14, process - * Update_Location_Area_VLR (ULA_VLR2). */ - if (0) { /* IMEISV or PgA to send */ - vlr_loc_upd_node_4(fi); - } else { - /* Location_Update_Completion */ - osmo_fsm_inst_state_chg(fi, VLR_ULA_S_WAIT_LU_COMPL, - LU_TIMEOUT_LONG, 0); - vlr_loc_upd_start_lu_compl_fsm(fi); - } -} - -/* Non-standard: after Ciphering Mode Complete (or no ciph required) */ -static void vlr_loc_upd_post_ciph(struct osmo_fsm_inst *fi) -{ - struct lu_fsm_priv *lfp = fi->priv; - struct vlr_subscr *vsub = lfp->vsub; - - LOGPFSM(fi, "%s()\n", __func__); - - OSMO_ASSERT(vsub); - - if (lfp->is_utran) { - int rc; - rc = lfp->vlr->ops.tx_common_id(lfp->msc_conn_ref); - if (rc) - LOGPFSML(fi, LOGL_ERROR, - "Error while sending Common ID (%d)\n", rc); - } - - vsub->conf_by_radio_contact_ind = true; - /* Update LAI */ - vsub->cgi.lai = lfp->new_lai; - vsub->dormant_ind = false; - vsub->cancel_loc_rx = false; - if (hlr_update_needed(vsub)) { - vlr_loc_upd_node_4(fi); - } else { - /* TODO: ADD Support */ - /* TODO: Node A: PgA Support */ - vlr_loc_upd_node_b(fi); - } -} - -/* 4.1.2.1 after Authentication successful (or no auth rqd) */ -static void vlr_loc_upd_post_auth(struct osmo_fsm_inst *fi) -{ - struct lu_fsm_priv *lfp = fi->priv; - struct vlr_subscr *vsub = lfp->vsub; - - LOGPFSM(fi, "%s()\n", __func__); - - OSMO_ASSERT(vsub); - - if (!is_ciph_required(lfp)) { - vlr_loc_upd_post_ciph(fi); - return; - } - - if (vlr_set_ciph_mode(vsub->vlr, fi, lfp->msc_conn_ref, - lfp->ciphering_required, - vsub->vlr->cfg.retrieve_imeisv_ciphered)) { - LOGPFSML(fi, LOGL_ERROR, - "Failed to send Ciphering Mode Command\n"); - vlr_lu_compl_fsm_failure(fi, GSM48_REJECT_NETWORK_FAILURE); - return; - } - - osmo_fsm_inst_state_chg(fi, VLR_ULA_S_WAIT_CIPH, LU_TIMEOUT_LONG, 0); -} - -static void vlr_loc_upd_node1(struct osmo_fsm_inst *fi) -{ - struct lu_fsm_priv *lfp = fi->priv; - struct vlr_subscr *vsub = lfp->vsub; - - LOGPFSM(fi, "%s()\n", __func__); - - OSMO_ASSERT(vsub); - - if (is_auth_required(lfp)) { - /* Authenticate_VLR */ - osmo_fsm_inst_state_chg(fi, VLR_ULA_S_WAIT_AUTH, - LU_TIMEOUT_LONG, 0); - vsub->auth_fsm = auth_fsm_start(lfp->vsub, fi->log_level, - fi, VLR_ULA_E_AUTH_RES, - lfp->is_r99, - lfp->is_utran); - } else { - /* no need for authentication */ - vlr_loc_upd_post_auth(fi); - } -} - -static void vlr_loc_upd_want_imsi(struct osmo_fsm_inst *fi) -{ - struct lu_fsm_priv *lfp = fi->priv; - struct vlr_instance *vlr = lfp->vlr; - - LOGPFSM(fi, "%s()\n", __func__); - - OSMO_ASSERT(lfp->vsub); - - /* Obtain_IMSI_VLR */ - osmo_fsm_inst_state_chg(fi, VLR_ULA_S_WAIT_IMSI, - vlr_timer(vlr, 3270), 3270); - vlr->ops.tx_id_req(lfp->msc_conn_ref, GSM_MI_TYPE_IMSI); - /* will continue at vlr_loc_upd_node1() once IMSI arrives */ -} - -static int assoc_lfp_with_sub(struct osmo_fsm_inst *fi, struct vlr_subscr *vsub) -{ - struct lu_fsm_priv *lfp = fi->priv; - struct vlr_instance *vlr = lfp->vlr; - - if (vsub->lu_fsm) { - LOGPFSML(fi, LOGL_ERROR, - "A Location Updating process is already pending for" - " this subscriber. Aborting.\n"); - /* Also get rid of the other pending LU attempt? */ - /*lu_fsm_failure(vsub->lu_fsm, GSM48_REJECT_CONGESTION);*/ - lu_fsm_failure(fi, GSM48_REJECT_CONGESTION); - return -EINVAL; - } - vsub->lu_fsm = fi; - vsub->msc_conn_ref = lfp->msc_conn_ref; - /* FIXME: send new LAC to HLR? */ - vsub->lac = lfp->new_lai.lac; - lfp->vsub = vsub; - /* Tell MSC to associate this subscriber with the given - * connection */ - vlr->ops.subscr_assoc(lfp->msc_conn_ref, lfp->vsub); - return 0; -} - -static const char *lai_name(struct osmo_location_area_id *lai) -{ - static char buf[64]; - snprintf(buf, sizeof(buf),"MCC:%u, MNC:%u, LAC:%u", - lai->plmn.mcc, lai->plmn.mnc, lai->lac); - return buf; -} - -static int _lu_fsm_associate_vsub(struct osmo_fsm_inst *fi) -{ - struct lu_fsm_priv *lfp = fi->priv; - struct vlr_instance *vlr = lfp->vlr; - struct vlr_subscr *vsub = NULL; - - if (!lfp->imsi[0]) { - /* TMSI was used */ - lfp->lu_by_tmsi = true; - /* TMSI clash: if a different subscriber already has this TMSI, - * we will find that other subscriber in the VLR. So the IMSIs - * would mismatch, but we don't know about it. Theoretically, - * an authentication process would thwart any attempt to use - * someone else's TMSI. - * TODO: Otherwise we can ask for the IMSI and verify that it - * matches the IMSI on record. */ - vsub = vlr_subscr_find_or_create_by_tmsi(vlr, lfp->tmsi, NULL); - - if (!vsub) { - LOGPFSML(fi, LOGL_ERROR, "VLR subscriber allocation failed\n"); - lu_fsm_failure(fi, GSM48_REJECT_SRV_OPT_TMP_OUT_OF_ORDER); - return -1; - } - - vsub->sub_dataconf_by_hlr_ind = false; - if (assoc_lfp_with_sub(fi, vsub)) { - vlr_subscr_put(vsub); - return -1; /* error, fsm failure invoked in assoc_lfp_with_sub() */ - } - vlr_subscr_put(vsub); - } else { - /* IMSI was used */ - vsub = vlr_subscr_find_or_create_by_imsi(vlr, lfp->imsi, NULL); - - if (!vsub) { - LOGPFSML(fi, LOGL_ERROR, "VLR subscriber allocation failed\n"); - lu_fsm_failure(fi, GSM48_REJECT_SRV_OPT_TMP_OUT_OF_ORDER); - vlr_subscr_put(vsub); - return -1; - } - - vsub->sub_dataconf_by_hlr_ind = false; - if (assoc_lfp_with_sub(fi, vsub)) { - vlr_subscr_put(vsub); - return -1; /* error, fsm failure invoked in assoc_lfp_with_sub() */ - } - vlr_subscr_put(vsub); - } - return 0; -} - -/* 4.1.2.1: Subscriber (via MSC/SGSN) requests location update */ -static void _start_lu_main(struct osmo_fsm_inst *fi) -{ - struct lu_fsm_priv *lfp = fi->priv; - struct vlr_instance *vlr = lfp->vlr; - - /* TODO: PUESBINE related handling */ - - /* Is previous LAI in this VLR? */ - if (!lai_in_this_vlr(vlr, &lfp->old_lai)) { -#if 0 - /* FIXME: check previous VLR, (3) */ - osmo_fsm_inst_state_chg(fi, VLR_ULA_S_WAIT_PVLR, - LU_TIMEOUT_LONG, 0); - return; -#endif - LOGPFSML(fi, LOGL_NOTICE, "LAI change from %s," - " but checking previous VLR not implemented\n", - lai_name(&lfp->old_lai)); - } - - /* If this is a TMSI based LU, we may not have the IMSI. Make sure that - * we know the IMSI, either on record, or request it. */ - if (!lfp->vsub->imsi[0]) - vlr_loc_upd_want_imsi(fi); - else - vlr_loc_upd_node1(fi); -} - -static void lu_fsm_idle(struct osmo_fsm_inst *fi, uint32_t event, - void *data) -{ - struct lu_fsm_priv *lfp = fi->priv; - struct vlr_instance *vlr = lfp->vlr; - - OSMO_ASSERT(event == VLR_ULA_E_UPDATE_LA); - - if (_lu_fsm_associate_vsub(fi)) - return; /* error. FSM already terminated. */ - - OSMO_ASSERT(lfp->vsub); - - /* See 3GPP TS 23.012, procedure Retrieve_IMEISV_If_Required */ - if ((!vlr->cfg.retrieve_imeisv_early) - || (lfp->type == VLR_LU_TYPE_PERIODIC && lfp->vsub->imeisv[0])) { - /* R_IMEISV_IR1 passed */ - _start_lu_main(fi); - } else { - vlr->ops.tx_id_req(lfp->msc_conn_ref, GSM_MI_TYPE_IMEISV); - osmo_fsm_inst_state_chg(fi, VLR_ULA_S_WAIT_IMEISV, - vlr_timer(vlr, 3270), 3270); - } -} - -static void lu_fsm_wait_imeisv(struct osmo_fsm_inst *fi, uint32_t event, - void *data) -{ - switch (event) { - case VLR_ULA_E_ID_IMEISV: - /* IMEISV was copied in vlr_subscr_rx_id_resp(), and that's - * where we received this event from. */ - _start_lu_main(fi); - break; - default: - LOGPFSML(fi, LOGL_ERROR, "event without effect: %s\n", - osmo_fsm_event_name(fi->fsm, event)); - break; - } -} - -/* Wait for response from Send_Identification to PVLR */ -static void lu_fsm_wait_pvlr(struct osmo_fsm_inst *fi, uint32_t event, - void *data) -{ - switch (event) { - case VLR_ULA_E_SEND_ID_ACK: - vlr_loc_upd_node1(fi); - break; - case VLR_ULA_E_SEND_ID_NACK: - vlr_loc_upd_want_imsi(fi); - break; - default: - LOGPFSML(fi, LOGL_ERROR, "event without effect: %s\n", - osmo_fsm_event_name(fi->fsm, event)); - break; - } -} - -/* Wait for result of Authenticate_VLR procedure */ -static void lu_fsm_wait_auth(struct osmo_fsm_inst *fi, uint32_t event, - void *data) -{ - struct lu_fsm_priv *lfp = fi->priv; - enum vlr_auth_fsm_result *res = data; - uint8_t rej_cause = 0; - - OSMO_ASSERT(event == VLR_ULA_E_AUTH_RES); - - lfp->upd_hlr_vlr_fsm = NULL; - - if (res) { - switch (*res) { - case VLR_AUTH_RES_PASSED: - /* Result == Pass */ - vlr_loc_upd_post_auth(fi); - return; - case VLR_AUTH_RES_ABORTED: - /* go to Idle with no response */ - rej_cause = 0; - break; - case VLR_AUTH_RES_UNKNOWN_SUBSCR: - /* FIXME: delete subscribe record */ - rej_cause = GSM48_REJECT_IMSI_UNKNOWN_IN_HLR; - break; - case VLR_AUTH_RES_AUTH_FAILED: - /* cause = illegal subscriber */ - rej_cause = GSM48_REJECT_ILLEGAL_MS; - break; - case VLR_AUTH_RES_PROC_ERR: - /* cause = system failure */ - rej_cause = GSM48_REJECT_NETWORK_FAILURE; - break; - default: - LOGPFSML(fi, LOGL_ERROR, "event without effect: %s\n", - osmo_fsm_event_name(fi->fsm, event)); - break; - } - } else - rej_cause = GSM48_REJECT_NETWORK_FAILURE; - - lu_fsm_failure(fi, rej_cause); -} - -static void lu_fsm_wait_ciph(struct osmo_fsm_inst *fi, uint32_t event, - void *data) -{ - struct lu_fsm_priv *lfp = fi->priv; - struct vlr_subscr *vsub = lfp->vsub; - struct vlr_ciph_result res = { .cause = VLR_CIPH_REJECT }; - - OSMO_ASSERT(event == VLR_ULA_E_CIPH_RES); - - if (!data) - LOGPFSML(fi, LOGL_ERROR, "invalid ciphering result: NULL\n"); - else - res = *(struct vlr_ciph_result*)data; - - switch (res.cause) { - case VLR_CIPH_COMPL: - break; - case VLR_CIPH_REJECT: - LOGPFSM(fi, "ciphering rejected\n"); - lu_fsm_failure(fi, GSM48_REJECT_INVALID_MANDANTORY_INF); - return; - default: - LOGPFSML(fi, LOGL_ERROR, "invalid ciphering result: %d\n", - res.cause); - lu_fsm_failure(fi, GSM48_REJECT_INVALID_MANDANTORY_INF); - return; - } - - if (res.imeisv) { - LOGPFSM(fi, "got IMEISV: %s\n", res.imeisv); - vlr_subscr_set_imeisv(vsub, res.imeisv); - } - vlr_loc_upd_post_ciph(fi); -} - -static void lu_fsm_wait_imsi(struct osmo_fsm_inst *fi, uint32_t event, - void *data) -{ - struct lu_fsm_priv *lfp = fi->priv; - struct vlr_subscr *vsub = lfp->vsub; - char *mi_string = data; - - switch (event) { - case VLR_ULA_E_ID_IMSI: - vlr_subscr_set_imsi(vsub, mi_string); - vlr_loc_upd_node1(fi); - break; - default: - LOGPFSML(fi, LOGL_ERROR, "event without effect: %s\n", - osmo_fsm_event_name(fi->fsm, event)); - break; - } -} - -/* At the end of Update_HLR_VLR */ -static void lu_fsm_wait_hlr_ul_res(struct osmo_fsm_inst *fi, uint32_t event, - void *data) -{ - struct lu_fsm_priv *lfp = fi->priv; - - switch (event) { - case VLR_ULA_E_HLR_LU_RES: - /* pass-through this event to Update_HLR_VLR */ - if (data == NULL) - osmo_fsm_inst_dispatch(lfp->upd_hlr_vlr_fsm, UPD_HLR_VLR_E_UPD_LOC_ACK, NULL); - else - osmo_fsm_inst_dispatch(lfp->upd_hlr_vlr_fsm, UPD_HLR_VLR_E_UPD_LOC_NACK, data); - break; - case VLR_ULA_E_UPD_HLR_COMPL: - if (data == NULL) { - /* successful case */ - osmo_fsm_inst_state_chg(fi, VLR_ULA_S_WAIT_LU_COMPL, - LU_TIMEOUT_LONG, 0); - vlr_loc_upd_start_lu_compl_fsm(fi); - /* continue in MSC ?!? */ - } else { - /* unsuccessful case */ - enum gsm48_gmm_cause cause = - *(enum gsm48_gmm_cause *)data; - /* Ignoring standalone mode for now. */ - if (0 /* procedure_error && vlr->cfg.standalone_mode */) { - osmo_fsm_inst_state_chg(fi, - VLR_ULA_S_WAIT_LU_COMPL_STANDALONE, - LU_TIMEOUT_LONG, 0); - vlr_loc_upd_start_lu_compl_fsm(fi); - } else { - lu_fsm_failure(fi, cause); - } - } - break; - default: - LOGPFSML(fi, LOGL_ERROR, "event without effect: %s\n", - osmo_fsm_event_name(fi->fsm, event)); - break; - } -} - -/* Wait for end of Location_Update_Completion_VLR */ -static void lu_fsm_wait_lu_compl(struct osmo_fsm_inst *fi, uint32_t event, - void *data) -{ - struct lu_fsm_priv *lfp = fi->priv; - uint8_t cause; - - switch (event) { - case VLR_ULA_E_NEW_TMSI_ACK: - osmo_fsm_inst_dispatch(lfp->lu_compl_vlr_fsm, - LU_COMPL_VLR_E_NEW_TMSI_ACK, NULL); - break; - case VLR_ULA_E_ID_IMEI: - osmo_fsm_inst_dispatch(lfp->lu_compl_vlr_fsm, - LU_COMPL_VLR_E_IMEI_CHECK_ACK, NULL); - break; - case VLR_ULA_E_LU_COMPL_SUCCESS: - lu_fsm_discard_lu_compl_fsm(fi); - - /* Update Register */ - /* TODO: Set_Notification_Type 23.078 */ - /* TODO: Notify_gsmSCF 23.078 */ - /* TODO: Authenticated Radio Contact Established -> ARC */ - lu_fsm_success(fi); - break; - case VLR_ULA_E_LU_COMPL_FAILURE: - cause = GSM48_REJECT_NETWORK_FAILURE; - if (data) - cause = *(uint8_t*)data; - lu_fsm_discard_lu_compl_fsm(fi); - lu_fsm_failure(fi, cause); - break; - default: - LOGPFSML(fi, LOGL_ERROR, "event without effect: %s\n", - osmo_fsm_event_name(fi->fsm, event)); - break; - } -} - -/* Wait for end of Location_Update_Completion_VLR (standalone case) */ -static void lu_fsm_wait_lu_compl_standalone(struct osmo_fsm_inst *fi, - uint32_t event, void *data) -{ - struct lu_fsm_priv *lfp = fi->priv; - struct vlr_subscr *vsub = lfp->vsub; - uint8_t cause; - - switch (event) { - case VLR_ULA_E_NEW_TMSI_ACK: - osmo_fsm_inst_dispatch(lfp->lu_compl_vlr_fsm, - LU_COMPL_VLR_E_NEW_TMSI_ACK, NULL); - break; - case VLR_ULA_E_LU_COMPL_SUCCESS: - lu_fsm_discard_lu_compl_fsm(fi); - vsub->sub_dataconf_by_hlr_ind = false; - lu_fsm_success(fi); - break; - case VLR_ULA_E_LU_COMPL_FAILURE: - vsub->sub_dataconf_by_hlr_ind = false; - cause = GSM48_REJECT_NETWORK_FAILURE; - if (data) - cause = *(uint8_t*)data; - lu_fsm_discard_lu_compl_fsm(fi); - lu_fsm_failure(fi, cause); - break; - default: - LOGPFSML(fi, LOGL_ERROR, "event without effect: %s\n", - osmo_fsm_event_name(fi->fsm, event)); - break; - } -} - -static const struct osmo_fsm_state vlr_lu_fsm_states[] = { - [VLR_ULA_S_IDLE] = { - .in_event_mask = S(VLR_ULA_E_UPDATE_LA), - .out_state_mask = S(VLR_ULA_S_WAIT_IMEISV) | - S(VLR_ULA_S_WAIT_PVLR) | - S(VLR_ULA_S_WAIT_IMSI) | - S(VLR_ULA_S_WAIT_AUTH) | - S(VLR_ULA_S_WAIT_HLR_UPD) | - S(VLR_ULA_S_DONE), - .name = OSMO_STRINGIFY(VLR_ULA_S_IDLE), - .action = lu_fsm_idle, - }, - [VLR_ULA_S_WAIT_IMEISV] = { - .in_event_mask = S(VLR_ULA_E_ID_IMEISV), - .out_state_mask = S(VLR_ULA_S_WAIT_PVLR) | - S(VLR_ULA_S_WAIT_IMSI) | - S(VLR_ULA_S_WAIT_AUTH) | - S(VLR_ULA_S_WAIT_HLR_UPD) | - S(VLR_ULA_S_DONE), - .name = OSMO_STRINGIFY(VLR_ULA_S_WAIT_IMEISV), - .action = lu_fsm_wait_imeisv, - }, - [VLR_ULA_S_WAIT_PVLR] = { - .in_event_mask = S(VLR_ULA_E_SEND_ID_ACK) | - S(VLR_ULA_E_SEND_ID_NACK), - .out_state_mask = S(VLR_ULA_S_WAIT_IMSI) | - S(VLR_ULA_S_WAIT_AUTH) | - S(VLR_ULA_S_DONE), - .name = OSMO_STRINGIFY(VLR_ULA_S_WAIT_PVLR), - .action = lu_fsm_wait_pvlr, - }, - [VLR_ULA_S_WAIT_AUTH] = { - .in_event_mask = S(VLR_ULA_E_AUTH_RES), - .out_state_mask = S(VLR_ULA_S_WAIT_CIPH) | - S(VLR_ULA_S_WAIT_LU_COMPL) | - S(VLR_ULA_S_WAIT_HLR_UPD) | - S(VLR_ULA_S_DONE), - .name = OSMO_STRINGIFY(VLR_ULA_S_WAIT_AUTH), - .action = lu_fsm_wait_auth, - }, - [VLR_ULA_S_WAIT_CIPH] = { - .name = OSMO_STRINGIFY(VLR_ULA_S_WAIT_CIPH), - .in_event_mask = S(VLR_ULA_E_CIPH_RES), - .out_state_mask = S(VLR_ULA_S_WAIT_LU_COMPL) | - S(VLR_ULA_S_WAIT_HLR_UPD) | - S(VLR_ULA_S_DONE), - .action = lu_fsm_wait_ciph, - }, - [VLR_ULA_S_WAIT_IMSI] = { - .in_event_mask = S(VLR_ULA_E_ID_IMSI), - .out_state_mask = S(VLR_ULA_S_WAIT_AUTH) | - S(VLR_ULA_S_WAIT_HLR_UPD) | - S(VLR_ULA_S_DONE), - .name = OSMO_STRINGIFY(VLR_ULA_S_WAIT_IMSI), - .action = lu_fsm_wait_imsi, - }, - [VLR_ULA_S_WAIT_HLR_UPD] = { - .in_event_mask = S(VLR_ULA_E_HLR_LU_RES) | - S(VLR_ULA_E_UPD_HLR_COMPL), - .out_state_mask = S(VLR_ULA_S_WAIT_LU_COMPL) | - S(VLR_ULA_S_WAIT_LU_COMPL_STANDALONE) | - S(VLR_ULA_S_DONE), - .name = OSMO_STRINGIFY(VLR_ULA_S_WAIT_HLR_UPD), - .action = lu_fsm_wait_hlr_ul_res, - }, - [VLR_ULA_S_WAIT_LU_COMPL] = { - .in_event_mask = S(VLR_ULA_E_LU_COMPL_SUCCESS) | - S(VLR_ULA_E_LU_COMPL_FAILURE) | - S(VLR_ULA_E_NEW_TMSI_ACK) | - S(VLR_ULA_E_ID_IMEI) | - S(VLR_ULA_E_ID_IMEISV), - .out_state_mask = S(VLR_ULA_S_DONE), - .name = OSMO_STRINGIFY(VLR_ULA_S_WAIT_LU_COMPL), - .action = lu_fsm_wait_lu_compl, - }, - [VLR_ULA_S_WAIT_LU_COMPL_STANDALONE] = { - .in_event_mask = S(VLR_ULA_E_LU_COMPL_SUCCESS) | - S(VLR_ULA_E_LU_COMPL_FAILURE) | - S(VLR_ULA_E_NEW_TMSI_ACK), - .out_state_mask = S(VLR_ULA_S_DONE), - .name = OSMO_STRINGIFY(VLR_ULA_S_WAIT_LU_COMPL_STANDALONE), - .action = lu_fsm_wait_lu_compl_standalone, - }, - [VLR_ULA_S_DONE] = { - .name = OSMO_STRINGIFY(VLR_ULA_S_DONE), - .onenter = lu_fsm_dispatch_result, - }, -}; - -static void fsm_lu_cleanup(struct osmo_fsm_inst *fi, enum osmo_fsm_term_cause cause) -{ - struct lu_fsm_priv *lfp = fi->priv; - struct vlr_subscr *vsub = lfp->vsub; - - LOGPFSM(fi, "fsm_lu_cleanup called with cause %s\n", - osmo_fsm_term_cause_name(cause)); - if (vsub && vsub->lu_fsm == fi) - vsub->lu_fsm = NULL; -} - -static struct osmo_fsm vlr_lu_fsm = { - .name = "vlr_lu_fsm", - .states = vlr_lu_fsm_states, - .num_states = ARRAY_SIZE(vlr_lu_fsm_states), - .allstate_event_mask = 0, - .allstate_action = NULL, - .log_subsys = DVLR, - .event_names = fsm_lu_event_names, - .cleanup = fsm_lu_cleanup, -}; - -struct osmo_fsm_inst * -vlr_loc_update(struct osmo_fsm_inst *parent, - uint32_t parent_event_success, - uint32_t parent_event_failure, - void *parent_event_data, - struct vlr_instance *vlr, void *msc_conn_ref, - enum vlr_lu_type type, uint32_t tmsi, const char *imsi, - const struct osmo_location_area_id *old_lai, - const struct osmo_location_area_id *new_lai, - bool authentication_required, - enum vlr_ciph ciphering_required, - bool is_r99, bool is_utran, - bool assign_tmsi) -{ - struct osmo_fsm_inst *fi; - struct lu_fsm_priv *lfp; - - fi = osmo_fsm_inst_alloc_child(&vlr_lu_fsm, parent, parent_event_failure); - if (!fi) - return NULL; - - lfp = talloc_zero(fi, struct lu_fsm_priv); - lfp->vlr = vlr; - lfp->msc_conn_ref = msc_conn_ref; - lfp->tmsi = tmsi; - lfp->type = type; - lfp->old_lai = *old_lai; - lfp->new_lai = *new_lai; - lfp->lu_by_tmsi = true; - lfp->parent_event_success = parent_event_success; - lfp->parent_event_failure = parent_event_failure; - lfp->parent_event_data = parent_event_data; - lfp->authentication_required = authentication_required; - lfp->ciphering_required = ciphering_required; - lfp->is_r99 = is_r99; - lfp->is_utran = is_utran; - lfp->assign_tmsi = assign_tmsi; - if (imsi) { - strncpy(lfp->imsi, imsi, sizeof(lfp->imsi)-1); - lfp->imsi[sizeof(lfp->imsi)-1] = '\0'; - lfp->lu_by_tmsi = false; - } - fi->priv = lfp; - - LOGPFSM(fi, "rev=%s net=%s%s%s\n", - is_r99 ? "R99" : "GSM", - is_utran ? "UTRAN" : "GERAN", - (authentication_required || ciphering_required)? - " Auth" : " (no Auth)", - (authentication_required || ciphering_required)? - (ciphering_required? "+Ciph" : " (no Ciph)") - : ""); - - if (is_utran && !authentication_required) - LOGPFSML(fi, LOGL_ERROR, - "Authentication off on UTRAN network. Good luck.\n"); - - osmo_fsm_inst_dispatch(fi, VLR_ULA_E_UPDATE_LA, NULL); - - return fi; -} - -/* Gracefully terminate an FSM created by vlr_loc_update() in case of external - * timeout (i.e. from MSC). */ -void vlr_loc_update_conn_timeout(struct osmo_fsm_inst *fi) -{ - if (!fi || fi->state == VLR_ULA_S_DONE) - return; - LOGPFSM(fi, "Connection timed out\n"); - lu_fsm_failure(fi, GSM48_REJECT_CONGESTION); -} - -void vlr_lu_fsm_init(void) -{ - osmo_fsm_register(&vlr_lu_fsm); - osmo_fsm_register(&upd_hlr_vlr_fsm); - osmo_fsm_register(&sub_pres_vlr_fsm); - osmo_fsm_register(&lu_compl_vlr_fsm); -} diff --git a/src/libvlr/vlr_lu_fsm.h b/src/libvlr/vlr_lu_fsm.h deleted file mode 100644 index 5cf13c77e..000000000 --- a/src/libvlr/vlr_lu_fsm.h +++ /dev/null @@ -1,18 +0,0 @@ -#pragma once - -#include <osmocom/core/fsm.h> - -enum vlr_lu_state { - VLR_ULA_S_IDLE, - VLR_ULA_S_WAIT_IMEISV, - VLR_ULA_S_WAIT_PVLR, /* Waiting for ID from PVLR */ - VLR_ULA_S_WAIT_AUTH, /* Waiting for Authentication */ - VLR_ULA_S_WAIT_CIPH, /* Waiting for Ciphering Complete */ - VLR_ULA_S_WAIT_IMSI, /* Waiting for IMSI from MS */ - VLR_ULA_S_WAIT_HLR_UPD, /* Waiting for end of HLR update */ - VLR_ULA_S_WAIT_LU_COMPL,/* Waiting for LU complete */ - VLR_ULA_S_WAIT_LU_COMPL_STANDALONE, /* Standalone VLR */ - VLR_ULA_S_DONE -}; - -void vlr_lu_fsm_init(void); |