2020-11-26 01:25:22 -08:00
|
|
|
/**
|
2019-07-01 10:49:19 -07:00
|
|
|
*
|
2020-11-26 01:25:22 -08:00
|
|
|
* \section COPYRIGHT
|
2019-07-01 10:49:19 -07:00
|
|
|
*
|
2021-03-19 03:45:56 -07:00
|
|
|
* Copyright 2013-2021 Software Radio Systems Limited
|
2019-07-01 10:49:19 -07:00
|
|
|
*
|
2020-11-26 01:25:22 -08:00
|
|
|
* By using this file, you agree to the terms and conditions set
|
|
|
|
* forth in the LICENSE file which can be found at the top level of
|
|
|
|
* the distribution.
|
2019-07-01 10:49:19 -07:00
|
|
|
*
|
|
|
|
*/
|
|
|
|
|
2021-03-19 03:45:56 -07:00
|
|
|
#ifndef SRSRAN_PDCP_ENTITY_BASE_H
|
|
|
|
#define SRSRAN_PDCP_ENTITY_BASE_H
|
2019-07-01 10:49:19 -07:00
|
|
|
|
2021-03-19 03:45:56 -07:00
|
|
|
#include "srsran/adt/accumulators.h"
|
|
|
|
#include "srsran/common/buffer_pool.h"
|
|
|
|
#include "srsran/common/common.h"
|
|
|
|
#include "srsran/common/interfaces_common.h"
|
|
|
|
#include "srsran/common/security.h"
|
|
|
|
#include "srsran/common/task_scheduler.h"
|
|
|
|
#include "srsran/common/threads.h"
|
|
|
|
#include "srsran/common/timers.h"
|
|
|
|
#include "srsran/interfaces/pdcp_interface_types.h"
|
|
|
|
#include "srsran/upper/byte_buffer_queue.h"
|
|
|
|
#include "srsran/upper/pdcp_metrics.h"
|
2019-07-01 10:49:19 -07:00
|
|
|
|
2021-03-19 03:45:56 -07:00
|
|
|
namespace srsran {
|
2019-07-01 10:49:19 -07:00
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Structs and Defines common to both LTE and NR
|
|
|
|
* Ref: 3GPP TS 36.323 v10.1.0 and TS 38.323 v15.2.0
|
|
|
|
***************************************************************************/
|
|
|
|
|
|
|
|
#define PDCP_PDU_TYPE_PDCP_STATUS_REPORT 0x0
|
|
|
|
#define PDCP_PDU_TYPE_INTERSPERSED_ROHC_FEEDBACK_PACKET 0x1
|
|
|
|
|
2019-07-25 04:22:42 -07:00
|
|
|
// Maximum supported PDCP SDU size is 9000 bytes.
|
|
|
|
// See TS 38.323 v15.2.0, section 4.3.1
|
2019-07-24 09:20:03 -07:00
|
|
|
#define PDCP_MAX_SDU_SIZE 9000
|
|
|
|
|
2019-07-01 10:49:19 -07:00
|
|
|
typedef enum {
|
|
|
|
PDCP_D_C_CONTROL_PDU = 0,
|
|
|
|
PDCP_D_C_DATA_PDU,
|
|
|
|
PDCP_D_C_N_ITEMS,
|
|
|
|
} pdcp_d_c_t;
|
|
|
|
static const char pdcp_d_c_text[PDCP_D_C_N_ITEMS][20] = {"Control PDU", "Data PDU"};
|
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* PDCP Entity interface
|
|
|
|
* Common interface for LTE and NR PDCP entities
|
|
|
|
***************************************************************************/
|
|
|
|
class pdcp_entity_base
|
|
|
|
{
|
|
|
|
public:
|
2021-02-10 02:47:56 -08:00
|
|
|
pdcp_entity_base(task_sched_handle task_sched_, srslog::basic_logger& logger);
|
2020-05-20 12:16:06 -07:00
|
|
|
pdcp_entity_base(pdcp_entity_base&&) = default;
|
2019-07-01 10:49:19 -07:00
|
|
|
virtual ~pdcp_entity_base();
|
2021-04-08 03:09:25 -07:00
|
|
|
virtual bool configure(const pdcp_config_t& cnfg_) = 0;
|
2019-07-01 10:49:19 -07:00
|
|
|
virtual void reset() = 0;
|
|
|
|
virtual void reestablish() = 0;
|
|
|
|
|
|
|
|
bool is_active() { return active; }
|
2019-07-08 09:53:37 -07:00
|
|
|
bool is_srb() { return cfg.rb_type == PDCP_RB_IS_SRB; }
|
|
|
|
bool is_drb() { return cfg.rb_type == PDCP_RB_IS_DRB; }
|
2019-07-01 10:49:19 -07:00
|
|
|
|
|
|
|
// RRC interface
|
2021-03-19 03:45:56 -07:00
|
|
|
void enable_integrity(srsran_direction_t direction = DIRECTION_TXRX)
|
2020-03-01 05:51:51 -08:00
|
|
|
{
|
|
|
|
// if either DL or UL is already enabled, both are enabled
|
|
|
|
if (integrity_direction == DIRECTION_TX && direction == DIRECTION_RX) {
|
|
|
|
integrity_direction = DIRECTION_TXRX;
|
|
|
|
} else if (integrity_direction == DIRECTION_RX && direction == DIRECTION_TX) {
|
|
|
|
integrity_direction = DIRECTION_TXRX;
|
|
|
|
} else {
|
|
|
|
integrity_direction = direction;
|
|
|
|
}
|
2021-03-19 03:45:56 -07:00
|
|
|
logger.debug("LCID=%d, integrity=%s", lcid, srsran_direction_text[integrity_direction]);
|
2020-03-01 05:51:51 -08:00
|
|
|
}
|
|
|
|
|
2021-03-19 03:45:56 -07:00
|
|
|
void enable_encryption(srsran_direction_t direction = DIRECTION_TXRX)
|
2020-03-01 05:51:51 -08:00
|
|
|
{
|
|
|
|
// if either DL or UL is already enabled, both are enabled
|
|
|
|
if (encryption_direction == DIRECTION_TX && direction == DIRECTION_RX) {
|
|
|
|
encryption_direction = DIRECTION_TXRX;
|
|
|
|
} else if (encryption_direction == DIRECTION_RX && direction == DIRECTION_TX) {
|
|
|
|
encryption_direction = DIRECTION_TXRX;
|
|
|
|
} else {
|
|
|
|
encryption_direction = direction;
|
|
|
|
}
|
2021-03-19 03:45:56 -07:00
|
|
|
logger.debug("LCID=%d encryption=%s", lcid, srsran_direction_text[integrity_direction]);
|
2020-04-08 11:53:46 -07:00
|
|
|
}
|
|
|
|
|
2021-03-19 03:45:56 -07:00
|
|
|
void enable_security_timed(srsran_direction_t direction, uint32_t sn)
|
2020-04-08 11:53:46 -07:00
|
|
|
{
|
|
|
|
switch (direction) {
|
|
|
|
case DIRECTION_TX:
|
|
|
|
enable_security_tx_sn = sn;
|
|
|
|
break;
|
|
|
|
case DIRECTION_RX:
|
|
|
|
enable_security_rx_sn = sn;
|
|
|
|
break;
|
|
|
|
default:
|
2021-03-19 03:45:56 -07:00
|
|
|
logger.error("Timed security activation for direction %s not supported.", srsran_direction_text[direction]);
|
2020-04-08 11:53:46 -07:00
|
|
|
break;
|
|
|
|
}
|
2020-03-01 05:51:51 -08:00
|
|
|
}
|
2019-07-01 10:49:19 -07:00
|
|
|
|
2020-02-20 07:08:04 -08:00
|
|
|
void config_security(as_security_config_t sec_cfg_);
|
2019-07-01 10:49:19 -07:00
|
|
|
|
|
|
|
// GW/SDAP/RRC interface
|
2021-02-11 10:01:14 -08:00
|
|
|
virtual void write_sdu(unique_byte_buffer_t sdu, int sn = -1) = 0;
|
2019-07-01 10:49:19 -07:00
|
|
|
|
|
|
|
// RLC interface
|
2021-03-10 11:41:05 -08:00
|
|
|
virtual void write_pdu(unique_byte_buffer_t pdu) = 0;
|
|
|
|
virtual void notify_delivery(const pdcp_sn_vector_t& pdcp_sns) = 0;
|
|
|
|
virtual void notify_failure(const pdcp_sn_vector_t& pdcp_sns) = 0;
|
2020-06-16 04:08:34 -07:00
|
|
|
|
2021-03-11 04:17:33 -08:00
|
|
|
virtual void get_bearer_state(pdcp_lte_state_t* state) = 0;
|
|
|
|
virtual void set_bearer_state(const pdcp_lte_state_t& state, bool set_fmc) = 0;
|
2019-07-01 10:49:19 -07:00
|
|
|
|
2021-03-19 03:45:56 -07:00
|
|
|
virtual std::map<uint32_t, srsran::unique_byte_buffer_t> get_buffered_pdus() = 0;
|
2021-01-28 09:22:19 -08:00
|
|
|
|
2021-02-12 10:05:48 -08:00
|
|
|
virtual void send_status_report() = 0;
|
|
|
|
|
2019-07-03 07:35:46 -07:00
|
|
|
// COUNT, HFN and SN helpers
|
|
|
|
uint32_t HFN(uint32_t count);
|
|
|
|
uint32_t SN(uint32_t count);
|
|
|
|
uint32_t COUNT(uint32_t hfn, uint32_t sn);
|
2019-07-23 07:49:34 -07:00
|
|
|
|
2021-02-15 06:50:46 -08:00
|
|
|
// Metrics helpers
|
|
|
|
virtual pdcp_bearer_metrics_t get_metrics() = 0;
|
|
|
|
virtual void reset_metrics() = 0;
|
|
|
|
|
2019-07-01 10:49:19 -07:00
|
|
|
protected:
|
2021-02-10 02:47:56 -08:00
|
|
|
srslog::basic_logger& logger;
|
2021-03-19 03:45:56 -07:00
|
|
|
srsran::task_sched_handle task_sched;
|
2019-07-01 10:49:19 -07:00
|
|
|
|
2020-03-25 07:57:29 -07:00
|
|
|
bool active = false;
|
|
|
|
uint32_t lcid = 0;
|
2021-03-19 03:45:56 -07:00
|
|
|
srsran_direction_t integrity_direction = DIRECTION_NONE;
|
|
|
|
srsran_direction_t encryption_direction = DIRECTION_NONE;
|
2019-07-01 10:49:19 -07:00
|
|
|
|
2020-04-08 11:53:46 -07:00
|
|
|
int32_t enable_security_tx_sn = -1; // TX SN at which security will be enabled
|
|
|
|
int32_t enable_security_rx_sn = -1; // RX SN at which security will be enabled
|
|
|
|
|
2019-10-03 08:58:15 -07:00
|
|
|
pdcp_config_t cfg = {1,
|
|
|
|
PDCP_RB_IS_DRB,
|
|
|
|
SECURITY_DIRECTION_DOWNLINK,
|
|
|
|
SECURITY_DIRECTION_UPLINK,
|
|
|
|
PDCP_SN_LEN_12,
|
2019-11-26 06:01:16 -08:00
|
|
|
pdcp_t_reordering_t::ms500,
|
2021-02-12 06:18:16 -08:00
|
|
|
pdcp_discard_timer_t::infinity,
|
2021-04-13 06:56:51 -07:00
|
|
|
false,
|
|
|
|
srsran_rat_t::lte};
|
2019-07-03 07:35:46 -07:00
|
|
|
|
2021-03-19 03:45:56 -07:00
|
|
|
srsran::as_security_config_t sec_cfg = {};
|
2019-07-01 10:49:19 -07:00
|
|
|
|
2020-02-14 09:18:01 -08:00
|
|
|
// Security functions
|
2019-07-04 06:44:02 -07:00
|
|
|
void integrity_generate(uint8_t* msg, uint32_t msg_len, uint32_t count, uint8_t* mac);
|
|
|
|
bool integrity_verify(uint8_t* msg, uint32_t msg_len, uint32_t count, uint8_t* mac);
|
|
|
|
void cipher_encrypt(uint8_t* msg, uint32_t msg_len, uint32_t count, uint8_t* ct);
|
|
|
|
void cipher_decrypt(uint8_t* ct, uint32_t ct_len, uint32_t count, uint8_t* msg);
|
2020-02-14 09:18:01 -08:00
|
|
|
|
|
|
|
// Common packing functions
|
2021-02-12 04:00:48 -08:00
|
|
|
bool is_control_pdu(const unique_byte_buffer_t& pdu);
|
|
|
|
pdcp_pdu_type_t get_control_pdu_type(const unique_byte_buffer_t& pdu);
|
|
|
|
uint32_t read_data_header(const unique_byte_buffer_t& pdu);
|
|
|
|
void discard_data_header(const unique_byte_buffer_t& pdu);
|
2021-03-19 03:45:56 -07:00
|
|
|
void write_data_header(const srsran::unique_byte_buffer_t& sdu, uint32_t count);
|
2021-02-12 04:00:48 -08:00
|
|
|
void extract_mac(const unique_byte_buffer_t& pdu, uint8_t* mac);
|
|
|
|
void append_mac(const unique_byte_buffer_t& sdu, uint8_t* mac);
|
2021-02-15 06:50:46 -08:00
|
|
|
|
|
|
|
// Metrics helpers
|
2021-02-15 09:41:54 -08:00
|
|
|
pdcp_bearer_metrics_t metrics = {};
|
2021-03-19 03:45:56 -07:00
|
|
|
srsran::rolling_average<double> tx_pdu_ack_latency_ms;
|
2019-07-01 10:49:19 -07:00
|
|
|
};
|
2019-07-03 07:35:46 -07:00
|
|
|
|
|
|
|
inline uint32_t pdcp_entity_base::HFN(uint32_t count)
|
|
|
|
{
|
2019-07-08 09:53:37 -07:00
|
|
|
return (count >> cfg.sn_len);
|
2019-07-03 07:35:46 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
inline uint32_t pdcp_entity_base::SN(uint32_t count)
|
|
|
|
{
|
2019-07-23 07:49:34 -07:00
|
|
|
return count & (0xFFFFFFFF >> (32 - cfg.sn_len));
|
2019-07-03 07:35:46 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
inline uint32_t pdcp_entity_base::COUNT(uint32_t hfn, uint32_t sn)
|
|
|
|
{
|
2019-07-08 09:53:37 -07:00
|
|
|
return (hfn << cfg.sn_len) | sn;
|
2019-07-03 07:35:46 -07:00
|
|
|
}
|
2019-10-29 08:31:27 -07:00
|
|
|
|
2021-03-19 03:45:56 -07:00
|
|
|
} // namespace srsran
|
2019-10-29 08:31:27 -07:00
|
|
|
|
2021-03-19 03:45:56 -07:00
|
|
|
#endif // SRSRAN_PDCP_ENTITY_BASE_H
|