open5gs/src/pgw/pgw_gx_handler.c

267 lines
8.8 KiB
C
Raw Normal View History

#define TRACE_MODULE _pgw_gx_handler
#include "core_debug.h"
2017-08-22 15:51:57 +00:00
#include "pgw_context.h"
2017-08-25 10:40:49 +00:00
#include "gx_message.h"
#include "pgw_gtp_path.h"
2017-08-25 10:40:49 +00:00
static c_int16_t pgw_pco_build(c_uint8_t *pco_buf, tlv_pco_t *tlv_pco);
void pgw_gx_handle_cca_initial_request(
gtp_xact_t *xact, pgw_sess_t *sess,
gx_cca_message_t *cca_message, gtp_create_session_request_t *req)
{
2017-08-25 10:40:49 +00:00
status_t rv;
pkbuf_t *pkbuf;
pgw_bearer_t *bearer = NULL;
gtp_message_t gtp_message;
gtp_create_session_response_t *rsp = NULL;
gtp_cause_t cause;
gtp_f_teid_t pgw_s5c_teid, pgw_s5u_teid;
c_uint8_t pco_buf[MAX_PCO_LEN];
c_int16_t pco_len;
d_assert(xact, return, "Null param");
d_assert(sess, return, "Null param");
d_assert(cca_message, return, "Null param");
d_assert(req, return, "Null param");
bearer = pgw_default_bearer_in_sess(sess);
d_assert(bearer, return, "Null param");
rsp = &gtp_message.create_session_response;
memset(&gtp_message, 0, sizeof(gtp_message_t));
/* Set Cause */
memset(&cause, 0, sizeof(cause));
cause.value = GTP_CAUSE_REQUEST_ACCEPTED;
rsp->cause.presence = 1;
rsp->cause.len = sizeof(cause);
rsp->cause.data = &cause;
/* Send Control Plane(UL) : PGW-S5C */
memset(&pgw_s5c_teid, 0, sizeof(gtp_f_teid_t));
pgw_s5c_teid.ipv4 = 1;
pgw_s5c_teid.interface_type = GTP_F_TEID_S5_S8_PGW_GTP_C;
pgw_s5c_teid.ipv4_addr = sess->pgw_s5c_addr;
pgw_s5c_teid.teid = htonl(sess->pgw_s5c_teid);
rsp->pgw_s5_s8__s2a_s2b_f_teid_for_pmip_based_interface_or_for_gtp_based_control_plane_interface.
presence = 1;
rsp->pgw_s5_s8__s2a_s2b_f_teid_for_pmip_based_interface_or_for_gtp_based_control_plane_interface.
data = &pgw_s5c_teid;
rsp->pgw_s5_s8__s2a_s2b_f_teid_for_pmip_based_interface_or_for_gtp_based_control_plane_interface.
len = GTP_F_TEID_IPV4_LEN;
d_assert(sess->ip_pool, return, "No IP Pool");
sess->pdn.paa.pdn_type = GTP_PDN_TYPE_IPV4;
sess->pdn.paa.ipv4_addr = sess->ip_pool->ue_addr;
rsp->pdn_address_allocation.presence = 1;
rsp->pdn_address_allocation.data = &sess->pdn.paa;
rsp->pdn_address_allocation.len = PAA_IPV4_LEN;
rsp->apn_restriction.presence = 1;
rsp->apn_restriction.u8 = GTP_APN_NO_RESTRICTION;
/* TODO : APN-AMBR
* if PCRF changes APN-AMBR, this should be included. */
if (req->protocol_configuration_options.presence == 1)
{
pco_len = pgw_pco_build(pco_buf, &req->protocol_configuration_options);
d_assert(pco_len > 0, return, "pco build failed");
rsp->protocol_configuration_options.presence = 1;
rsp->protocol_configuration_options.data = pco_buf;
rsp->protocol_configuration_options.len = pco_len;
}
rsp->bearer_contexts_created.presence = 1;
rsp->bearer_contexts_created.eps_bearer_id.presence = 1;
rsp->bearer_contexts_created.eps_bearer_id.u8 = bearer->ebi;
2017-08-25 10:40:49 +00:00
/* TODO : Bearer QoS
* if PCRF changes Bearer QoS, this should be included. */
/* Send Data Plane(UL) : PGW-S5U */
memset(&pgw_s5u_teid, 0, sizeof(gtp_f_teid_t));
pgw_s5u_teid.ipv4 = 1;
pgw_s5u_teid.interface_type = GTP_F_TEID_S5_S8_PGW_GTP_U;
pgw_s5u_teid.ipv4_addr = bearer->pgw_s5u_addr;
pgw_s5u_teid.teid = htonl(bearer->pgw_s5u_teid);
rsp->bearer_contexts_created.s5_s8_u_sgw_f_teid.presence = 1;
rsp->bearer_contexts_created.s5_s8_u_sgw_f_teid.data = &pgw_s5u_teid;
rsp->bearer_contexts_created.s5_s8_u_sgw_f_teid.len =
GTP_F_TEID_IPV4_LEN;
2017-08-31 03:06:11 +00:00
gtp_message.h.type = GTP_CREATE_SESSION_RESPONSE_TYPE;
2017-09-01 04:51:31 +00:00
gtp_message.h.teid = sess->sgw_s5c_teid;
2017-08-31 03:06:11 +00:00
rv = gtp_build_msg(&pkbuf, &gtp_message);
2017-08-25 10:40:49 +00:00
d_assert(rv == CORE_OK, return, "gtp build failed");
2017-09-01 04:51:31 +00:00
rv = gtp_xact_update_tx(xact, &gtp_message.h, pkbuf);
2017-09-01 00:36:55 +00:00
d_assert(rv == CORE_OK, return, "gtp_xact_update_tx error");
rv = gtp_xact_commit(xact);
d_assert(rv == CORE_OK, return, "xact_commit error");
}
2017-08-25 10:40:49 +00:00
void pgw_gx_handle_cca_termination_request(
gtp_xact_t *xact, pgw_sess_t *sess,
gx_cca_message_t *cca_message, gtp_delete_session_request_t *req)
{
status_t rv;
pkbuf_t *pkbuf;
gtp_message_t gtp_message;
gtp_delete_session_response_t *rsp = NULL;
c_uint32_t sgw_s5c_teid;
gtp_cause_t cause;
c_uint8_t pco_buf[MAX_PCO_LEN];
c_int16_t pco_len;
d_assert(xact, return, "Null param");
d_assert(sess, return, "Null param");
d_assert(cca_message, return, "Null param");
d_assert(req, return, "Null param");
/* prepare cause */
memset(&cause, 0, sizeof(cause));
cause.value = GTP_CAUSE_REQUEST_ACCEPTED;
/* backup sgw_s5c_teid in session context */
sgw_s5c_teid = sess->sgw_s5c_teid;
/* Remove a pgw session */
pgw_sess_remove(sess);
rsp = &gtp_message.delete_session_response;
memset(&gtp_message, 0, sizeof(gtp_message_t));
/* Cause */
rsp->cause.presence = 1;
rsp->cause.len = sizeof(cause);
rsp->cause.data = &cause;
/* Recovery */
/* PCO */
if (req->protocol_configuration_options.presence == 1)
{
pco_len = pgw_pco_build(pco_buf, &req->protocol_configuration_options);
d_assert(pco_len > 0, return, "pco build failed");
rsp->protocol_configuration_options.presence = 1;
rsp->protocol_configuration_options.data = pco_buf;
rsp->protocol_configuration_options.len = pco_len;
}
/* Private Extension */
/* build */
2017-08-31 03:06:11 +00:00
gtp_message.h.type = GTP_DELETE_SESSION_RESPONSE_TYPE;
2017-09-01 04:51:31 +00:00
gtp_message.h.teid = sgw_s5c_teid;
2017-08-31 03:06:11 +00:00
rv = gtp_build_msg(&pkbuf, &gtp_message);
2017-08-25 10:40:49 +00:00
d_assert(rv == CORE_OK, return, "gtp build failed");
/* send */
2017-09-01 04:51:31 +00:00
rv = gtp_xact_update_tx(xact, &gtp_message.h, pkbuf);
2017-09-01 00:36:55 +00:00
d_assert(rv == CORE_OK, return, "gtp_xact_update_tx error");
rv = gtp_xact_commit(xact);
d_assert(rv == CORE_OK, return, "xact_commit error");
2017-08-25 10:40:49 +00:00
}
static c_int16_t pgw_pco_build(c_uint8_t *pco_buf, tlv_pco_t *tlv_pco)
{
pco_t ue, pgw;
pco_ipcp_t pco_ipcp;
c_int8_t size = 0;
int i = 0;
d_assert(pco_buf, return -1, "Null param");
d_assert(tlv_pco, return -1, "Null param");
size = pco_parse(&ue, tlv_pco->data, tlv_pco->len);
d_assert(size, return -1, "pco parse failed");
memset(&pgw, 0, sizeof(pco_t));
pgw.ext = ue.ext;
pgw.configuration_protocol = ue.configuration_protocol;
for(i = 0; i < ue.num_of_id; i++)
{
c_uint8_t *data = ue.ids[i].data;
switch(ue.ids[i].id)
{
case PCO_ID_CHALLENGE_HANDSHAKE_AUTHENTICATION_PROTOCOL:
{
if (data[0] == 2) /* Code : Response */
{
pgw.ids[pgw.num_of_id].id = ue.ids[i].id;
pgw.ids[pgw.num_of_id].len = 4;
pgw.ids[pgw.num_of_id].data =
(c_uint8_t *)"\x03\x00\x00\x04"; /* Code : Success */
pgw.num_of_id++;
}
break;
}
case PCO_ID_INTERNET_PROTOCOL_CONTROL_PROTOCOL:
{
if (data[0] == 1) /* Code : Configuration Request */
{
c_uint16_t len = 16;
memset(&pco_ipcp, 0, sizeof(pco_ipcp_t));
pco_ipcp.code = 2; /* Code : Configuration Ack */
pco_ipcp.len = htons(len);
/* Primary DNS Server IP Address */
pco_ipcp.options[0].type = 129;
pco_ipcp.options[0].len = 6;
pco_ipcp.options[0].addr = pgw_self()->primary_dns_addr;
/* Secondary DNS Server IP Address */
pco_ipcp.options[1].type = 131;
pco_ipcp.options[1].len = 6;
pco_ipcp.options[1].addr = pgw_self()->secondary_dns_addr;
pgw.ids[pgw.num_of_id].id = ue.ids[i].id;
pgw.ids[pgw.num_of_id].len = len;
pgw.ids[pgw.num_of_id].data = (c_uint8_t *)&pco_ipcp;
pgw.num_of_id++;
}
break;
}
case PCO_ID_DNS_SERVER_IPV4_ADDRESS_REQUEST:
{
pgw.ids[pgw.num_of_id].id = ue.ids[i].id;
pgw.ids[pgw.num_of_id].len = 4;
pgw.ids[pgw.num_of_id].data = &pgw_self()->primary_dns_addr;
pgw.num_of_id++;
pgw.ids[pgw.num_of_id].id = ue.ids[i].id;
pgw.ids[pgw.num_of_id].len = 4;
pgw.ids[pgw.num_of_id].data = &pgw_self()->secondary_dns_addr;
pgw.num_of_id++;
break;
}
case PCO_ID_IP_ADDRESS_ALLOCATION_VIA_NAS_SIGNALLING:
break;
default:
d_warn("Unknown PCO ID:(0x%x)", ue.ids[i].id);
}
}
size = pco_build(pco_buf, MAX_PCO_LEN, &pgw);
return size;
}