blob: c128ba5e80392997656e020cf6b5bc6a51d33d28 [file] [log] [blame]
Brian Waters13d96012017-12-08 16:53:31 -06001/*
2* Copyright (c) 2017 Sprint
3*
4* Licensed under the Apache License, Version 2.0 (the "License");
5* you may not use this file except in compliance with the License.
6* You may obtain a copy of the License at
7*
8* http://www.apache.org/licenses/LICENSE-2.0
9*
10* Unless required by applicable law or agreed to in writing, software
11* distributed under the License is distributed on an "AS IS" BASIS,
12* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13* See the License for the specific language governing permissions and
14* limitations under the License.
15*/
16
17/****************
18 Generated By: fdtool enhancements to diafuzzer
19 License: same as freeDiameter
20****************/
21
22
23/*
24 * Dictionary definitions of objects specified in ts29343_avps (e10).
25 */
26#include <freeDiameter/extension.h>
27
28#define PROTO_VER "e10"
29#define GEN_DATE 1506697159.87
30
31const char *ts29343_avps_proto_ver = PROTO_VER;
32const double ts29343_avps_gen_date = GEN_DATE;
33
34/* The content of this file follows the same structure as dict_base_proto.c */
35
36#define CHECK_dict_new( _type, _data, _parent, _ref ) \
37{ \
38 int _ret = fd_dict_new( fd_g_config->cnf_dict, (_type), (_data), (_parent), (_ref) ); \
39 if ( _ret != 0 && _ret != EEXIST ) \
40 return _ret; \
41}
42
43#define CHECK_dict_search( _type, _criteria, _what, _result ) \
44 CHECK_FCT( fd_dict_search( fd_g_config->cnf_dict, (_type), (_criteria), (_what), (_result), ENOENT) );
45
46struct local_rules_definition {
47 struct dict_avp_request avp_vendor_plus_name;
48 enum rule_position position;
49 int min;
50 int max;
51};
52
53#define RULE_ORDER( _position ) ((((_position) == RULE_FIXED_HEAD) || ((_position) == RULE_FIXED_TAIL)) ? 1 : 0 )
54
55/* Attention! This version of the macro uses AVP_BY_NAME_AND_VENDOR, in contrast to most other copies! */
56#define PARSE_loc_rules( _rulearray, _parent) { \
57 int __ar; \
58 for (__ar=0; __ar < sizeof(_rulearray) / sizeof((_rulearray)[0]); __ar++) { \
59 struct dict_rule_data __data = { NULL, \
60 (_rulearray)[__ar].position, \
61 0, \
62 (_rulearray)[__ar].min, \
63 (_rulearray)[__ar].max}; \
64 __data.rule_order = RULE_ORDER(__data.rule_position); \
65 CHECK_FCT( fd_dict_search( \
66 fd_g_config->cnf_dict, \
67 DICT_AVP, \
68 AVP_BY_NAME_AND_VENDOR, \
69 &(_rulearray)[__ar].avp_vendor_plus_name, \
70 &__data.rule_avp, 0 ) ); \
71 if ( !__data.rule_avp ) { \
72 TRACE_DEBUG(INFO, "AVP Not found: '%s'", (_rulearray)[__ar].avp_vendor_plus_name.avp_name); \
73 return ENOENT; \
74 } \
75 { \
76 int _ret = fd_dict_new( fd_g_config->cnf_dict, DICT_RULE, &(__data), (_parent), NULL ); \
77 if ( _ret != 0 && _ret != EEXIST ) { \
78 TRACE_DEBUG(INFO, "Error on rule with AVP '%s'", \
79 (_rulearray)[__ar].avp_vendor_plus_name.avp_name); \
80 return EINVAL; \
81 } \
82 } \
83 } \
84}
85
86#define CHECK_vendor_new( _data ) { \
87 struct dict_object * vendor_found; \
88 if (fd_dict_search(fd_g_config->cnf_dict,DICT_VENDOR,VENDOR_BY_ID,&_data.vendor_id,&vendor_found,ENOENT) == ENOENT) { \
89 CHECK_FCT(fd_dict_new(fd_g_config->cnf_dict, DICT_VENDOR, &_data, NULL, NULL)); \
90 } \
91}
92
93#define enumval_def_u32( _val_, _str_ ) \
94 { _str_, { .u32 = _val_ }}
95
96#define enumval_def_os( _len_, _val_, _str_ ) \
97 { _str_, { .os = { .data = (unsigned char *)_val_, .len = _len_ }}}
98
99
100static int dict_ts29343_avps_load_defs(char * conffile)
101{
102 TRACE_ENTRY("%p", conffile);
103 /* Application Section */
104 {
105 /* Create the vendors */ {
106 struct dict_vendor_data vendor_data = { 10415, "3GPP" };
107 CHECK_dict_new(DICT_VENDOR, &vendor_data, NULL, NULL)
108 }
109 }
110
111
112 /* AVP section */
113 {
114 struct dict_object * Address_type;
115 struct dict_object * UTF8String_type;
116 struct dict_object * DiameterIdentity_type;
117 struct dict_object * DiameterURI_type;
118 struct dict_object * Time_type;
119 struct dict_object * IPFilterRule_type;
120
121 CHECK_dict_search( DICT_TYPE, TYPE_BY_NAME, "Address", &Address_type);
122 CHECK_dict_search( DICT_TYPE, TYPE_BY_NAME, "UTF8String", &UTF8String_type);
123 CHECK_dict_search( DICT_TYPE, TYPE_BY_NAME, "DiameterIdentity", &DiameterIdentity_type);
124 CHECK_dict_search( DICT_TYPE, TYPE_BY_NAME, "DiameterURI", &DiameterURI_type);
125 CHECK_dict_search( DICT_TYPE, TYPE_BY_NAME, "Time", &Time_type);
126 CHECK_dict_search( DICT_TYPE, TYPE_BY_NAME, "IPFilterRule", &IPFilterRule_type);
127 /* Origin-App-Layer-User-Id */
128 {
129 struct dict_avp_data data = {
130 3600, /* Code */
131 10415, /* Vendor */
132 "Origin-App-Layer-User-Id", /* Name */
133 AVP_FLAG_VENDOR | AVP_FLAG_MANDATORY, /* Fixed flags */
134 AVP_FLAG_VENDOR | AVP_FLAG_MANDATORY, /* Fixed flag values */
135 AVP_TYPE_OCTETSTRING /* base type of data */
136 };
137 CHECK_dict_new( DICT_AVP, &data, UTF8String_type, NULL);
138 };
139 /* Target-App-Layer-User-Id */
140 {
141 struct dict_avp_data data = {
142 3601, /* Code */
143 10415, /* Vendor */
144 "Target-App-Layer-User-Id", /* Name */
145 AVP_FLAG_VENDOR | AVP_FLAG_MANDATORY, /* Fixed flags */
146 AVP_FLAG_VENDOR | AVP_FLAG_MANDATORY, /* Fixed flag values */
147 AVP_TYPE_OCTETSTRING /* base type of data */
148 };
149 CHECK_dict_new( DICT_AVP, &data, UTF8String_type, NULL);
150 };
151 /* ProSe-Function-ID */
152 {
153 struct dict_avp_data data = {
154 3602, /* Code */
155 10415, /* Vendor */
156 "ProSe-Function-ID", /* Name */
157 AVP_FLAG_VENDOR | AVP_FLAG_MANDATORY, /* Fixed flags */
158 AVP_FLAG_VENDOR | AVP_FLAG_MANDATORY, /* Fixed flag values */
159 AVP_TYPE_OCTETSTRING /* base type of data */
160 };
161 CHECK_dict_new( DICT_AVP, &data, NULL, NULL);
162 };
163 /* ProSe-Request-Type */
164 {
165 struct dict_avp_data data = {
166 3603, /* Code */
167 10415, /* Vendor */
168 "ProSe-Request-Type", /* Name */
169 AVP_FLAG_VENDOR | AVP_FLAG_MANDATORY, /* Fixed flags */
170 AVP_FLAG_VENDOR | AVP_FLAG_MANDATORY, /* Fixed flag values */
171 AVP_TYPE_UNSIGNED32 /* base type of data */
172 };
173 CHECK_dict_new( DICT_AVP, &data, NULL, NULL);
174 };
175 /* PDUID */
176 {
177 struct dict_avp_data data = {
178 3604, /* Code */
179 10415, /* Vendor */
180 "PDUID", /* Name */
181 AVP_FLAG_VENDOR | AVP_FLAG_MANDATORY, /* Fixed flags */
182 AVP_FLAG_VENDOR, /* Fixed flag values */
183 AVP_TYPE_OCTETSTRING /* base type of data */
184 };
185 CHECK_dict_new( DICT_AVP, &data, NULL, NULL);
186 };
187 /* Application-Data */
188 {
189 struct dict_avp_data data = {
190 3605, /* Code */
191 10415, /* Vendor */
192 "Application-Data", /* Name */
193 AVP_FLAG_VENDOR | AVP_FLAG_MANDATORY, /* Fixed flags */
194 AVP_FLAG_VENDOR, /* Fixed flag values */
195 AVP_TYPE_OCTETSTRING /* base type of data */
196 };
197 CHECK_dict_new( DICT_AVP, &data, UTF8String_type, NULL);
198 };
199 /* Allowed-Suffixes-Number */
200 {
201 struct dict_avp_data data = {
202 3606, /* Code */
203 10415, /* Vendor */
204 "Allowed-Suffixes-Number", /* Name */
205 AVP_FLAG_VENDOR | AVP_FLAG_MANDATORY, /* Fixed flags */
206 AVP_FLAG_VENDOR, /* Fixed flag values */
207 AVP_TYPE_UNSIGNED32 /* base type of data */
208 };
209 CHECK_dict_new( DICT_AVP, &data, NULL, NULL);
210 };
211 /* Suffix-Code */
212 {
213 struct dict_avp_data data = {
214 3609, /* Code */
215 10415, /* Vendor */
216 "Suffix-Code", /* Name */
217 AVP_FLAG_VENDOR | AVP_FLAG_MANDATORY, /* Fixed flags */
218 AVP_FLAG_VENDOR, /* Fixed flag values */
219 AVP_TYPE_OCTETSTRING /* base type of data */
220 };
221 CHECK_dict_new( DICT_AVP, &data, NULL, NULL);
222 };
223 /* Suffix-Mask */
224 {
225 struct dict_avp_data data = {
226 3610, /* Code */
227 10415, /* Vendor */
228 "Suffix-Mask", /* Name */
229 AVP_FLAG_VENDOR | AVP_FLAG_MANDATORY, /* Fixed flags */
230 AVP_FLAG_VENDOR, /* Fixed flag values */
231 AVP_TYPE_OCTETSTRING /* base type of data */
232 };
233 CHECK_dict_new( DICT_AVP, &data, NULL, NULL);
234 };
235 /* Metadata-Indicator */
236 {
237 struct dict_avp_data data = {
238 3612, /* Code */
239 10415, /* Vendor */
240 "Metadata-Indicator", /* Name */
241 AVP_FLAG_VENDOR | AVP_FLAG_MANDATORY, /* Fixed flags */
242 AVP_FLAG_VENDOR, /* Fixed flag values */
243 AVP_TYPE_UNSIGNED32 /* base type of data */
244 };
245 CHECK_dict_new( DICT_AVP, &data, NULL, NULL);
246 };
247 /* ProSe-Code-Suffix-Mask */
248 {
249 /* Grouped */
250 struct dict_object * avp;
251 struct dict_avp_data data = {
252 3608, /* Code */
253 10415, /* Vendor */
254 "ProSe-Code-Suffix-Mask", /* Name */
255 AVP_FLAG_VENDOR | AVP_FLAG_MANDATORY, /* Fixed flags */
256 AVP_FLAG_VENDOR, /* Fixed flag values */
257 AVP_TYPE_GROUPED /* base type of data */
258 };
259 CHECK_dict_new( DICT_AVP, &data , NULL, &avp);
260 }
261 /* Banned-User-Target */
262 {
263 /* Grouped */
264 struct dict_object * avp;
265 struct dict_avp_data data = {
266 3611, /* Code */
267 10415, /* Vendor */
268 "Banned-User-Target", /* Name */
269 AVP_FLAG_VENDOR | AVP_FLAG_MANDATORY, /* Fixed flags */
270 AVP_FLAG_VENDOR, /* Fixed flag values */
271 AVP_TYPE_GROUPED /* base type of data */
272 };
273 CHECK_dict_new( DICT_AVP, &data , NULL, &avp);
274 }
275 /* Monitor-Target */
276 {
277 /* Grouped */
278 struct dict_object * avp;
279 struct dict_avp_data data = {
280 3607, /* Code */
281 10415, /* Vendor */
282 "Monitor-Target", /* Name */
283 AVP_FLAG_VENDOR | AVP_FLAG_MANDATORY, /* Fixed flags */
284 AVP_FLAG_VENDOR, /* Fixed flag values */
285 AVP_TYPE_GROUPED /* base type of data */
286 };
287 CHECK_dict_new( DICT_AVP, &data , NULL, &avp);
288 }
289
290
291 }
292
293 /* Commands section */
294 {
295
296 }
297
298 return 0;
299}
300
301static int dict_ts29343_avps_load_rules(char * conffile)
302{
303 /* Grouped AVP section */
304 {
305 /* ProSe-Code-Suffix-Mask */
306 {
307 /* Grouped */
308 struct dict_object * avp;
309 struct dict_avp_request avp_vendor_plus_name = { .avp_vendor = 10415, .avp_name = "ProSe-Code-Suffix-Mask"};
310 CHECK_dict_search(DICT_AVP, AVP_BY_NAME_AND_VENDOR, &avp_vendor_plus_name, &avp)
311 struct local_rules_definition rules[] =
312 {
313 { { .avp_vendor = 10415, .avp_name = "Suffix-Code"}, RULE_REQUIRED, -1, -1 },
314 { { .avp_vendor = 10415, .avp_name = "Suffix-Mask"}, RULE_REQUIRED, 1, -1 }
315 };
316 PARSE_loc_rules( rules, avp );
317 }
318 /* Banned-User-Target */
319 {
320 /* Grouped */
321 struct dict_object * avp;
322 struct dict_avp_request avp_vendor_plus_name = { .avp_vendor = 10415, .avp_name = "Banned-User-Target"};
323 CHECK_dict_search(DICT_AVP, AVP_BY_NAME_AND_VENDOR, &avp_vendor_plus_name, &avp)
324 struct local_rules_definition rules[] =
325 {
326 { { .avp_vendor = 10415, .avp_name = "Target-RPAUID"}, RULE_REQUIRED, -1, -1 },
327 { { .avp_vendor = 10415, .avp_name = "Target-PDUID"}, RULE_REQUIRED, -1, -1 }
328 };
329 PARSE_loc_rules( rules, avp );
330 }
331 /* Monitor-Target */
332 {
333 /* Grouped */
334 struct dict_object * avp;
335 struct dict_avp_request avp_vendor_plus_name = { .avp_vendor = 10415, .avp_name = "Monitor-Target"};
336 CHECK_dict_search(DICT_AVP, AVP_BY_NAME_AND_VENDOR, &avp_vendor_plus_name, &avp)
337 struct local_rules_definition rules[] =
338 {
339 { { .avp_vendor = 10415, .avp_name = "Target-RPAUID"}, RULE_REQUIRED, -1, -1 },
340 { { .avp_vendor = 10415, .avp_name = "PDUID"}, RULE_REQUIRED, -1, -1 },
341 { { .avp_vendor = 10415, .avp_name = "Metadata-Indicator"}, RULE_OPTIONAL, -1, -1 },
342 { { .avp_vendor = 10415, .avp_name = "ProSe-Code-Suffix-Mask"}, RULE_OPTIONAL, -1, -1 }
343 };
344 PARSE_loc_rules( rules, avp );
345 }
346
347 }
348
349 /* Commands section */
350 {
351
352 }
353
354 LOG_D( "Extension 'Dictionary definitions for ts29343_avps (e10)' initialized");
355 return 0;
356}
357
358int dict_entry(char * conffile)
359{
360 dict_ts29343_avps_load_defs(conffile);
361 return dict_ts29343_avps_load_rules(conffile);
362}
363
364const char* dict_ts29343_avps_proto_ver(char * conffile) {
365 return ts29343_avps_proto_ver;
366}
367
368const double dict_ts29343_avps_gen_ts(char * conffile) {
369 return ts29343_avps_gen_date;
370}
371
372EXTENSION_ENTRY2("dict_ts29343_avps", dict_ts29343_avps_load_defs, dict_ts29343_avps_load_rules, "dict_ts29345_avps", "dict_draftload_avps");
373
374
375