/** * Digital Voice Modem - Host Software * GPLv2 Open Source. Use is subject to license terms. * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER. * * @package DVM / Host Software * */ // // Based on code from the MMDVMHost project. (https://github.com/g4klx/MMDVMHost) // Licensed under the GPLv2 License (https://opensource.org/licenses/GPL-2.0) // /* * Copyright (C) 2022-2023 by Bryan Biedenkapp N2PLL * * This program is free software; you can redistribute it and/or modify * it under the terms of the GNU General Public License as published by * the Free Software Foundation; either version 2 of the License, or * (at your option) any later version. * * This program is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU General Public License for more details. * * You should have received a copy of the GNU General Public License * along with this program; if not, write to the Free Software * Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. */ #include "Defines.h" #include "nxdn/NXDNDefines.h" #include "nxdn/channel/CAC.h" #include "nxdn/packet/Trunk.h" #include "nxdn/acl/AccessControl.h" #include "nxdn/lc/rcch/RCCHFactory.h" #include "nxdn/Sync.h" #include "nxdn/NXDNUtils.h" #include "edac/CRC.h" #include "remote/RemoteCommand.h" #include "HostMain.h" #include "Log.h" #include "Utils.h" using namespace nxdn; using namespace nxdn::lc; using namespace nxdn::packet; #include #include #include #include // --------------------------------------------------------------------------- // Macros // --------------------------------------------------------------------------- // Make sure control data is supported. #define IS_SUPPORT_CONTROL_CHECK(_PCKT_STR, _PCKT, _SRCID) \ if (!m_nxdn->m_control) { \ LogWarning(LOG_RF, "NXDN, " _PCKT_STR " denial, unsupported service, srcId = %u", _SRCID); \ writeRF_Message_Deny(0U, _SRCID, NXDN_CAUSE_SVC_UNAVAILABLE, _PCKT); \ m_nxdn->m_rfState = RS_RF_REJECTED; \ return false; \ } // Validate the source RID. #define VALID_SRCID(_PCKT_STR, _PCKT, _SRCID, _RSN) \ if (!acl::AccessControl::validateSrcId(_SRCID)) { \ LogWarning(LOG_RF, "NXDN, " _PCKT_STR " denial, RID rejection, srcId = %u", _SRCID); \ writeRF_Message_Deny(0U, _SRCID, _RSN, _PCKT); \ m_nxdn->m_rfState = RS_RF_REJECTED; \ return false; \ } // Validate the target RID. #define VALID_DSTID(_PCKT_STR, _PCKT, _DSTID, _RSN) \ if (!acl::AccessControl::validateSrcId(_DSTID)) { \ LogWarning(LOG_RF, "NXDN, " _PCKT_STR " denial, RID rejection, dstId = %u", _DSTID); \ writeRF_Message_Deny(0U, _SRCID, _RSN, _PCKT); \ m_nxdn->m_rfState = RS_RF_REJECTED; \ return false; \ } // Validate the talkgroup ID. #define VALID_TGID(_PCKT_STR, _PCKT, _DSTID, _SRCID, _RSN) \ if (!acl::AccessControl::validateTGId(_DSTID)) { \ LogWarning(LOG_RF, "NXDN, " _PCKT_STR " denial, TGID rejection, dstId = %u", _DSTID); \ writeRF_Message_Deny(0U, _SRCID, _RSN, _PCKT); \ m_nxdn->m_rfState = RS_RF_REJECTED; \ return false; \ } // Verify the source RID is registered. #define VERIFY_SRCID_REG(_PCKT_STR, _PCKT, _SRCID, _RSN) \ if (!m_nxdn->m_affiliations.isUnitReg(_SRCID) && m_verifyReg) { \ LogWarning(LOG_RF, "NXDN, " _PCKT_STR " denial, RID not registered, srcId = %u", _SRCID); \ writeRF_Message_Deny(0U, _SRCID, _RSN, _PCKT); \ m_nxdn->m_rfState = RS_RF_REJECTED; \ return false; \ } // Verify the source RID is affiliated. #define VERIFY_SRCID_AFF(_PCKT_STR, _PCKT, _SRCID, _DSTID, _RSN) \ if (!m_nxdn->m_affiliations.isGroupAff(_SRCID, _DSTID) && m_verifyAff) { \ LogWarning(LOG_RF, "NXDN, " _PCKT_STR " denial, RID not affiliated to TGID, srcId = %u, dstId = %u", _SRCID, _DSTID); \ writeRF_Message_Deny(0U, _SRCID, _RSN, _PCKT); \ m_nxdn->m_rfState = RS_RF_REJECTED; \ return false; \ } // --------------------------------------------------------------------------- // Constants // --------------------------------------------------------------------------- const uint32_t GRANT_TIMER_TIMEOUT = 15U; // --------------------------------------------------------------------------- // Public Class Members // --------------------------------------------------------------------------- /// /// Process a data frame from the RF interface. /// /// Functional channel type. /// Channel options. /// Buffer containing data frame. /// Length of data frame. /// bool Trunk::process(uint8_t fct, uint8_t option, uint8_t* data, uint32_t len) { assert(data != nullptr); channel::CAC cac; bool validCAC = cac.decode(data + 2U); if (m_nxdn->m_rfState == RS_RF_LISTENING && !validCAC) return false; if (validCAC) { uint8_t ran = cac.getRAN(); if (ran != m_nxdn->m_ran && ran != 0U) return false; } RPT_RF_STATE prevRfState = m_nxdn->m_rfState; if (m_nxdn->m_rfState != RS_RF_DATA) { m_nxdn->m_rfState = RS_RF_DATA; } m_nxdn->m_queue.clear(); // the layer3 data will only be correct if valid is true uint8_t buffer[NXDN_FRAME_LENGTH_BYTES]; cac.getData(buffer); std::unique_ptr rcch = rcch::RCCHFactory::createRCCH(buffer, NXDN_RCCH_CAC_LC_SHORT_LENGTH_BITS); if (rcch == nullptr) return false; uint16_t srcId = rcch->getSrcId(); uint16_t dstId = rcch->getDstId(); switch (rcch->getMessageType()) { case RTCH_MESSAGE_TYPE_VCALL: { // make sure control data is supported IS_SUPPORT_CONTROL_CHECK(NXDN_RTCH_MSG_TYPE_VCALL_REQ, RTCH_MESSAGE_TYPE_VCALL, srcId); // validate the source RID VALID_SRCID(NXDN_RTCH_MSG_TYPE_VCALL_REQ, RTCH_MESSAGE_TYPE_VCALL, srcId, NXDN_CAUSE_VD_REQ_UNIT_NOT_PERM); // validate the talkgroup ID VALID_TGID(NXDN_RTCH_MSG_TYPE_VCALL_REQ, RTCH_MESSAGE_TYPE_VCALL, dstId, srcId, NXDN_CAUSE_VD_TGT_UNIT_NOT_PERM); // verify the source RID is affiliated VERIFY_SRCID_AFF(NXDN_RTCH_MSG_TYPE_VCALL_REQ, RTCH_MESSAGE_TYPE_VCALL, srcId, dstId, NXDN_CAUSE_VD_REQ_UNIT_NOT_REG); if (m_verbose) { LogMessage(LOG_RF, "NXDN, " NXDN_RTCH_MSG_TYPE_VCALL_REQ ", srcId = %u, dstId = %u", srcId, dstId); } uint8_t serviceOptions = (rcch->getEmergency() ? 0x80U : 0x00U) + // Emergency Flag (rcch->getEncrypted() ? 0x40U : 0x00U) + // Encrypted Flag (rcch->getPriority() & 0x07U); // Priority if (m_nxdn->m_authoritative) { writeRF_Message_Grant(srcId, dstId, serviceOptions, true); } else { m_network->writeGrantReq(modem::DVM_STATE::STATE_NXDN, srcId, dstId, 0U, false); } } break; case RCCH_MESSAGE_TYPE_REG: { // make sure control data is supported IS_SUPPORT_CONTROL_CHECK(NXDN_RCCH_MSG_TYPE_REG_REQ, RCCH_MESSAGE_TYPE_REG, srcId); if (m_verbose) { LogMessage(LOG_RF, "NXDN, " NXDN_RCCH_MSG_TYPE_REG_REQ ", srcId = %u, locId = %u", srcId, rcch->getLocId()); } writeRF_Message_U_Reg_Rsp(srcId, rcch->getLocId()); } break; case RCCH_MESSAGE_TYPE_GRP_REG: { // make sure control data is supported IS_SUPPORT_CONTROL_CHECK(NXDN_RCCH_MSG_TYPE_GRP_REG_REQ, RCCH_MESSAGE_TYPE_GRP_REG, srcId); if (m_verbose) { LogMessage(LOG_RF, "NXDN, " NXDN_RCCH_MSG_TYPE_GRP_REG_REQ ", srcId = %u, dstId = %u, locId = %u", srcId, dstId, rcch->getLocId()); } writeRF_Message_Grp_Reg_Rsp(srcId, dstId, rcch->getLocId()); } break; default: LogError(LOG_RF, "NXDN, unhandled message type, messageType = $%02X", rcch->getMessageType()); break; } m_nxdn->m_rfState = prevRfState; return true; } /// /// Process a data frame from the RF interface. /// /// Functional channel type. /// Channel options. /// /// Buffer containing data frame. /// Length of data frame. /// bool Trunk::processNetwork(uint8_t fct, uint8_t option, lc::RTCH& netLC, uint8_t* data, uint32_t len) { assert(data != nullptr); if (m_nxdn->m_netState == RS_NET_IDLE) { m_nxdn->m_queue.clear(); } return true; } /// /// Updates the processor by the passed number of milliseconds. /// /// void Trunk::clock(uint32_t ms) { if (m_nxdn->m_control) { // clock all the grant timers m_nxdn->m_affiliations.clock(ms); } } // --------------------------------------------------------------------------- // Protected Class Members // --------------------------------------------------------------------------- /// /// Initializes a new instance of the Trunk class. /// /// Instance of the Control class. /// Instance of the BaseNetwork class. /// Flag indicating whether NXDN debug is enabled. /// Flag indicating whether NXDN verbose logging is enabled. Trunk::Trunk(Control* nxdn, network::BaseNetwork* network, bool debug, bool verbose) : m_nxdn(nxdn), m_network(network), m_bcchCnt(1U), m_rcchGroupingCnt(1U), m_ccchPagingCnt(2U), m_ccchMultiCnt(2U), m_rcchIterateCnt(2U), m_verifyAff(false), m_verifyReg(false), m_lastRejectId(0U), m_verbose(verbose), m_debug(debug) { /* stub */ } /// /// Finalizes a instance of the Trunk class. /// Trunk::~Trunk() { /* stub */ } /// /// Write data processed from RF to the network. /// /// /// void Trunk::writeNetwork(const uint8_t *data, uint32_t len) { assert(data != nullptr); if (m_network == nullptr) return; if (m_nxdn->m_rfTimeout.isRunning() && m_nxdn->m_rfTimeout.hasExpired()) return; m_network->writeNXDN(m_nxdn->m_rfLC, data, len); } /// /// Helper to write control channel packet data. /// /// /// /// void Trunk::writeRF_ControlData(uint8_t frameCnt, uint8_t n, bool adjSS) { uint8_t i = 0U, seqCnt = 0U; if (!m_nxdn->m_control) return; // don't add any frames if the queue is full uint8_t len = NXDN_FRAME_LENGTH_BYTES + 2U; uint32_t space = m_nxdn->m_queue.freeSpace(); if (space < (len + 1U)) { return; } do { if (m_debug) { LogDebug(LOG_NXDN, "writeRF_ControlData, frameCnt = %u, seq = %u", frameCnt, n); } switch (n) { case 0: writeRF_CC_Message_Site_Info(); break; default: writeRF_CC_Message_Service_Info(); break; } if (seqCnt > 0U) n++; i++; } while (i <= seqCnt); } /// /// Helper to write a single-block RCCH packet. /// /// /// /// void Trunk::writeRF_Message(RCCH* rcch, bool noNetwork, bool clearBeforeWrite) { if (!m_nxdn->m_control) return; uint8_t data[NXDN_FRAME_LENGTH_BYTES + 2U]; ::memset(data + 2U, 0x00U, NXDN_FRAME_LENGTH_BYTES); Sync::addNXDNSync(data + 2U); // generate the LICH channel::LICH lich; lich.setRFCT(NXDN_LICH_RFCT_RCCH); lich.setFCT(NXDN_LICH_CAC_OUTBOUND); lich.setOption(NXDN_LICH_DATA_COMMON); lich.setOutbound(true); lich.encode(data + 2U); uint8_t buffer[NXDN_RCCH_LC_LENGTH_BYTES]; ::memset(buffer, 0x00U, NXDN_RCCH_LC_LENGTH_BYTES); rcch->encode(buffer, NXDN_RCCH_LC_LENGTH_BITS); // generate the CAC channel::CAC cac; cac.setRAN(m_nxdn->m_ran); cac.setStructure(NXDN_SR_RCCH_SINGLE); cac.setData(buffer); cac.encode(data + 2U); data[0U] = modem::TAG_DATA; data[1U] = 0x00U; NXDNUtils::scrambler(data + 2U); addPostBits(data + 2U); if (!noNetwork) writeNetwork(data, NXDN_FRAME_LENGTH_BYTES + 2U); if (clearBeforeWrite) { m_nxdn->m_modem->clearNXDNData(); m_nxdn->m_queue.clear(); } if (m_nxdn->m_duplex) { m_nxdn->addFrame(data, NXDN_FRAME_LENGTH_BYTES + 2U); } } /// /// Helper to write a grant packet. /// /// /// /// /// /// /// /// /// /// bool Trunk::writeRF_Message_Grant(uint32_t srcId, uint32_t dstId, uint8_t serviceOptions, bool grp, bool skip, uint32_t chNo, bool net, bool skipNetCheck) { bool emergency = ((serviceOptions & 0xFFU) & 0x80U) == 0x80U; // Emergency Flag bool encryption = ((serviceOptions & 0xFFU) & 0x40U) == 0x40U; // Encryption Flag uint8_t priority = ((serviceOptions & 0xFFU) & 0x07U); // Priority // are we skipping checking? if (!skip) { if (m_nxdn->m_rfState != RS_RF_LISTENING && m_nxdn->m_rfState != RS_RF_DATA) { if (!net) { LogWarning(LOG_RF, "NXDN, " NXDN_RTCH_MSG_TYPE_VCALL_REQ " denied, traffic in progress, dstId = %u", dstId); writeRF_Message_Deny(0U, srcId, NXDN_CAUSE_VD_QUE_GRP_BUSY, RTCH_MESSAGE_TYPE_VCALL); ::ActivityLog("NXDN", true, "group grant request from %u to TG %u denied", srcId, dstId); m_nxdn->m_rfState = RS_RF_REJECTED; } return false; } if (m_nxdn->m_netState != RS_NET_IDLE && dstId == m_nxdn->m_netLastDstId) { if (!net) { LogWarning(LOG_RF, "NXDN, " NXDN_RTCH_MSG_TYPE_VCALL_REQ " denied, traffic in progress, dstId = %u", dstId); writeRF_Message_Deny(0U, srcId, NXDN_CAUSE_VD_QUE_GRP_BUSY, RTCH_MESSAGE_TYPE_VCALL); ::ActivityLog("NXDN", true, "group grant request from %u to TG %u denied", srcId, dstId); m_nxdn->m_rfState = RS_RF_REJECTED; } return false; } // don't transmit grants if the destination ID's don't match and the network TG hang timer is running if (m_nxdn->m_rfLastDstId != 0U) { if (m_nxdn->m_rfLastDstId != dstId && (m_nxdn->m_rfTGHang.isRunning() && !m_nxdn->m_rfTGHang.hasExpired())) { if (!net) { writeRF_Message_Deny(0U, srcId, NXDN_CAUSE_VD_QUE_GRP_BUSY, RTCH_MESSAGE_TYPE_VCALL); m_nxdn->m_rfState = RS_RF_REJECTED; } return false; } } if (!m_nxdn->m_affiliations.isGranted(dstId)) { if (!m_nxdn->m_affiliations.isRFChAvailable()) { if (grp) { if (!net) { LogWarning(LOG_RF, "NXDN, " NXDN_RTCH_MSG_TYPE_VCALL_REQ " queued, no channels available, dstId = %u", dstId); writeRF_Message_Deny(0U, srcId, NXDN_CAUSE_VD_QUE_CHN_RESOURCE_NOT_AVAIL, RTCH_MESSAGE_TYPE_VCALL); ::ActivityLog("NXDN", true, "group grant request from %u to TG %u queued", srcId, dstId); m_nxdn->m_rfState = RS_RF_REJECTED; } return false; } else { if (!net) { LogWarning(LOG_RF, "NXDN, " NXDN_RTCH_MSG_TYPE_VCALL_REQ " queued, no channels available, dstId = %u", dstId); writeRF_Message_Deny(0U, srcId, NXDN_CAUSE_VD_QUE_CHN_RESOURCE_NOT_AVAIL, RTCH_MESSAGE_TYPE_VCALL); ::ActivityLog("P25", true, "unit-to-unit grant request from %u to %u queued", srcId, dstId); m_nxdn->m_rfState = RS_RF_REJECTED; } return false; } } else { if (m_nxdn->m_affiliations.grantCh(dstId, GRANT_TIMER_TIMEOUT)) { chNo = m_nxdn->m_affiliations.getGrantedCh(dstId); } } } else { chNo = m_nxdn->m_affiliations.getGrantedCh(dstId); } } if (grp) { if (!net) { ::ActivityLog("NXDN", true, "group grant request from %u to TG %u", srcId, dstId); } } else { if (!net) { ::ActivityLog("NXDN", true, "unit-to-unit grant request from %u to %u", srcId, dstId); } } // callback RCON to permit-tg on the specified voice channel if (m_nxdn->m_authoritative && m_nxdn->m_controlPermitTG) { ::lookups::VoiceChData voiceChData = m_nxdn->m_affiliations.getRFChData(chNo); if (voiceChData.isValidCh() && !voiceChData.address().empty() && voiceChData.port() > 0 && chNo != m_nxdn->m_siteData.channelNo()) { std::stringstream ss; ss << "permit-tg " << modem::DVM_STATE::STATE_NXDN << " " << dstId; RemoteCommand::send(voiceChData.address(), voiceChData.port(), voiceChData.password(), ss.str(), m_nxdn->m_debug); } } std::unique_ptr rcch = new_unique(rcch::MESSAGE_TYPE_VCALL_CONN); rcch->setMessageType(RTCH_MESSAGE_TYPE_VCALL); rcch->setGrpVchNo(chNo); rcch->setGroup(grp); rcch->setSrcId(srcId); rcch->setDstId(dstId); rcch->setEmergency(emergency); rcch->setEncrypted(encryption); rcch->setPriority(priority); if (m_verbose) { LogMessage((net) ? LOG_NET : LOG_RF, "NXDN, " NXDN_RTCH_MSG_TYPE_VCALL_RESP ", emerg = %u, encrypt = %u, prio = %u, chNo = %u, srcId = %u, dstId = %u", rcch->getEmergency(), rcch->getEncrypted(), rcch->getPriority(), rcch->getGrpVchNo(), rcch->getSrcId(), rcch->getDstId()); } // transmit group grant writeRF_Message(rcch.get(), false, true); return true; } /// /// Helper to write a deny packet. /// /// /// /// /// void Trunk::writeRF_Message_Deny(uint32_t srcId, uint32_t dstId, uint8_t reason, uint8_t service) { std::unique_ptr rcch = nullptr; switch (service) { case RTCH_MESSAGE_TYPE_VCALL: rcch = new_unique(rcch::MESSAGE_TYPE_VCALL_CONN); rcch->setMessageType(RTCH_MESSAGE_TYPE_VCALL); default: return; } rcch->setCauseResponse(reason); rcch->setSrcId(srcId); rcch->setDstId(dstId); if (m_verbose) { LogMessage(LOG_RF, "NXDN, MSG_DENIAL (Message Denial), reason = $%02X, service = $%02X, srcId = %u, dstId = %u", service, srcId, dstId); } writeRF_Message(rcch.get(), false); } /// /// Helper to write a group registration response packet. /// /// /// /// bool Trunk::writeRF_Message_Grp_Reg_Rsp(uint32_t srcId, uint32_t dstId, uint32_t locId) { bool ret = false; std::unique_ptr rcch = new_unique(rcch::MESSAGE_TYPE_GRP_REG); rcch->setCauseResponse(NXDN_CAUSE_MM_REG_ACCEPTED); // validate the location ID if (locId != m_nxdn->m_siteData.locId()) { LogWarning(LOG_RF, "NXDN, " NXDN_RCCH_MSG_TYPE_GRP_REG_REQ " denial, LOCID rejection, locId = $%04X", locId); ::ActivityLog("NXDN", true, "group affiliation request from %u denied", srcId); rcch->setCauseResponse(NXDN_CAUSE_MM_REG_FAILED); } // validate the source RID if (!acl::AccessControl::validateSrcId(srcId)) { LogWarning(LOG_RF, "NXDN, " NXDN_RCCH_MSG_TYPE_GRP_REG_REQ " denial, RID rejection, srcId = %u", srcId); ::ActivityLog("NXDN", true, "group affiliation request from %u to %s %u denied", srcId, "TG ", dstId); rcch->setCauseResponse(NXDN_CAUSE_MM_REG_FAILED); } // validate the source RID is registered if (!m_nxdn->m_affiliations.isUnitReg(srcId) && m_verifyReg) { LogWarning(LOG_RF, "NXDN, " NXDN_RCCH_MSG_TYPE_GRP_REG_REQ " denial, RID not registered, srcId = %u", srcId); ::ActivityLog("NXDN", true, "group affiliation request from %u to %s %u denied", srcId, "TG ", dstId); rcch->setCauseResponse(NXDN_CAUSE_MM_REG_REFUSED); } // validate the talkgroup ID if (dstId == 0U) { LogWarning(LOG_RF, "NXDN, " NXDN_RCCH_MSG_TYPE_GRP_REG_REQ ", TGID 0, dstId = %u", dstId); } else { if (!acl::AccessControl::validateTGId(dstId)) { LogWarning(LOG_RF, "NXDN, " NXDN_RCCH_MSG_TYPE_GRP_REG_REQ " denial, TGID rejection, dstId = %u", dstId); ::ActivityLog("NXDN", true, "group affiliation request from %u to %s %u denied", srcId, "TG ", dstId); rcch->setCauseResponse(NXDN_CAUSE_MM_LOC_ACPT_GRP_REFUSE); } } if (rcch->getCauseResponse() == NXDN_CAUSE_MM_REG_ACCEPTED) { if (m_verbose) { LogMessage(LOG_RF, "NXDN, " NXDN_RCCH_MSG_TYPE_GRP_REG_REQ ", srcId = %u, dstId = %u", srcId, dstId); } ::ActivityLog("NXDN", true, "group affiliation request from %u to %s %u", srcId, "TG ", dstId); ret = true; // update dynamic affiliation table m_nxdn->m_affiliations.groupAff(srcId, dstId); } writeRF_Message(rcch.get(), false); return ret; } /// /// Helper to write a unit registration response packet. /// /// void Trunk::writeRF_Message_U_Reg_Rsp(uint32_t srcId, uint32_t locId) { std::unique_ptr rcch = new_unique(rcch::MESSAGE_TYPE_REG); rcch->setCauseResponse(NXDN_CAUSE_MM_REG_ACCEPTED); // validate the location ID if (locId != m_nxdn->m_siteData.locId()) { LogWarning(LOG_RF, "NXDN, " NXDN_RCCH_MSG_TYPE_REG_REQ " denial, LOCID rejection, locId = $%04X", locId); ::ActivityLog("NXDN", true, "unit registration request from %u denied", srcId); rcch->setCauseResponse(NXDN_CAUSE_MM_REG_FAILED); } // validate the source RID if (!acl::AccessControl::validateSrcId(srcId)) { LogWarning(LOG_RF, "NXDN, " NXDN_RCCH_MSG_TYPE_REG_REQ " denial, RID rejection, srcId = %u", srcId); ::ActivityLog("NXDN", true, "unit registration request from %u denied", srcId); rcch->setCauseResponse(NXDN_CAUSE_MM_REG_FAILED); } if (rcch->getCauseResponse() == NXDN_CAUSE_MM_REG_ACCEPTED) { if (m_verbose) { LogMessage(LOG_RF, "NXDN, " NXDN_RCCH_MSG_TYPE_REG_REQ ", srcId = %u, locId = %u", srcId, locId); } ::ActivityLog("NXDN", true, "unit registration request from %u", srcId); // update dynamic unit registration table if (!m_nxdn->m_affiliations.isUnitReg(srcId)) { m_nxdn->m_affiliations.unitReg(srcId); } } rcch->setSrcId(srcId); rcch->setDstId(srcId); writeRF_Message(rcch.get(), true); } /// /// Helper to write a CC SITE_INFO broadcast packet on the RF interface. /// void Trunk::writeRF_CC_Message_Site_Info() { if (m_debug) { LogMessage(LOG_RF, "NXDN, SITE_INFO (Site Information)"); } uint8_t data[NXDN_FRAME_LENGTH_BYTES + 2U]; ::memset(data + 2U, 0x00U, NXDN_FRAME_LENGTH_BYTES); Sync::addNXDNSync(data + 2U); // generate the LICH channel::LICH lich; lich.setRFCT(NXDN_LICH_RFCT_RCCH); lich.setFCT(NXDN_LICH_CAC_OUTBOUND); lich.setOption(NXDN_LICH_DATA_NORMAL); lich.setOutbound(true); lich.encode(data + 2U); uint8_t buffer[NXDN_RCCH_LC_LENGTH_BYTES]; ::memset(buffer, 0x00U, NXDN_RCCH_LC_LENGTH_BYTES); std::unique_ptr rcch = new_unique(rcch::MESSAGE_TYPE_SITE_INFO); rcch->setBcchCnt(m_bcchCnt); rcch->setRcchGroupingCnt(m_rcchGroupingCnt); rcch->setCcchPagingCnt(m_ccchPagingCnt); rcch->setCcchMultiCnt(m_ccchMultiCnt); rcch->setRcchIterateCount(m_rcchIterateCnt); rcch->encode(buffer, NXDN_RCCH_LC_LENGTH_BITS); // generate the CAC channel::CAC cac; cac.setRAN(m_nxdn->m_ran); cac.setStructure(NXDN_SR_RCCH_HEAD_SINGLE); cac.setData(buffer); cac.encode(data + 2U); data[0U] = modem::TAG_DATA; data[1U] = 0x00U; NXDNUtils::scrambler(data + 2U); addPostBits(data + 2U); if (m_nxdn->m_duplex) { m_nxdn->addFrame(data, NXDN_FRAME_LENGTH_BYTES + 2U); } } /// /// Helper to write a CC SRV_INFO broadcast packet on the RF interface. /// void Trunk::writeRF_CC_Message_Service_Info() { if (m_debug) { LogMessage(LOG_RF, "NXDN, SRV_INFO (Service Information)"); } uint8_t data[NXDN_FRAME_LENGTH_BYTES + 2U]; ::memset(data + 2U, 0x00U, NXDN_FRAME_LENGTH_BYTES); Sync::addNXDNSync(data + 2U); // generate the LICH channel::LICH lich; lich.setRFCT(NXDN_LICH_RFCT_RCCH); lich.setFCT(NXDN_LICH_CAC_OUTBOUND); lich.setOption(NXDN_LICH_DATA_NORMAL); lich.setOutbound(true); lich.encode(data + 2U); uint8_t buffer[NXDN_RCCH_LC_LENGTH_BYTES]; ::memset(buffer, 0x00U, NXDN_RCCH_LC_LENGTH_BYTES); std::unique_ptr rcch = new_unique(rcch::MESSAGE_TYPE_SRV_INFO); rcch->encode(buffer, NXDN_RCCH_LC_LENGTH_BITS / 2U); //rcch->encode(buffer, NXDN_RCCH_LC_LENGTH_BITS / 2U, NXDN_RCCH_LC_LENGTH_BITS / 2U); // generate the CAC channel::CAC cac; cac.setRAN(m_nxdn->m_ran); cac.setStructure(NXDN_SR_RCCH_SINGLE); cac.setData(buffer); cac.encode(data + 2U); data[0U] = modem::TAG_DATA; data[1U] = 0x00U; NXDNUtils::scrambler(data + 2U); addPostBits(data + 2U); if (m_nxdn->m_duplex) { m_nxdn->addFrame(data, NXDN_FRAME_LENGTH_BYTES + 2U); } } /// /// Helper to add the post field bits on NXDN frame data. /// /// void Trunk::addPostBits(uint8_t* data) { assert(data != nullptr); // post field for (uint32_t i = 0U; i < NXDN_CAC_E_POST_FIELD_BITS; i++) { uint32_t n = i + NXDN_FSW_LENGTH_BITS + NXDN_LICH_LENGTH_BITS + NXDN_CAC_FEC_LENGTH_BITS + NXDN_CAC_E_POST_FIELD_BITS; bool b = READ_BIT(NXDN_PREAMBLE, i); WRITE_BIT(data, n, b); } }