Commit 6f5c0332 authored by gauthier's avatar gauthier

For Sync only, still problem with NAS COUNT (TODO) and MAC-I (check on real PFT SIM)

git-svn-id: http://svn.eurecom.fr/openair4G/trunk@5311 818b1a75-f10b-46b9-bf7c-635c3b92a50f
parent 55d05b6f
...@@ -26,6 +26,9 @@ typedef struct mme_app_connection_establishment_cnf_s { ...@@ -26,6 +26,9 @@ typedef struct mme_app_connection_establishment_cnf_s {
pre_emp_capability_t bearer_qos_pre_emp_capability; pre_emp_capability_t bearer_qos_pre_emp_capability;
ambr_t ambr; ambr_t ambr;
/* Key eNB */
uint8_t keNB[32];
nas_conn_est_cnf_t nas_conn_est_cnf; nas_conn_est_cnf_t nas_conn_est_cnf;
} mme_app_connection_establishment_cnf_t; } mme_app_connection_establishment_cnf_t;
......
...@@ -170,7 +170,7 @@ typedef struct nas_pdn_connectivity_rsp_s { ...@@ -170,7 +170,7 @@ typedef struct nas_pdn_connectivity_rsp_s {
uint32_t mme_ue_s1ap_id; uint32_t mme_ue_s1ap_id;
/* Key eNB */ /* Key eNB */
uint8_t keNB[32]; //uint8_t keNB[32];
ambr_t ambr; ambr_t ambr;
ambr_t apn_ambr; ambr_t apn_ambr;
......
...@@ -289,6 +289,7 @@ mme_app_handle_conn_est_cnf( ...@@ -289,6 +289,7 @@ mme_app_handle_conn_est_cnf(
mme_app_connection_establishment_cnf_t *establishment_cnf_p = NULL; mme_app_connection_establishment_cnf_t *establishment_cnf_p = NULL;
bearer_context_t *current_bearer_p = NULL; bearer_context_t *current_bearer_p = NULL;
ebi_t bearer_id = 0; ebi_t bearer_id = 0;
uint8_t *keNB = NULL;
MME_APP_DEBUG("Received NAS_CONNECTION_ESTABLISHMENT_CNF from NAS\n"); MME_APP_DEBUG("Received NAS_CONNECTION_ESTABLISHMENT_CNF from NAS\n");
...@@ -332,6 +333,11 @@ mme_app_handle_conn_est_cnf( ...@@ -332,6 +333,11 @@ mme_app_handle_conn_est_cnf(
establishment_cnf_p->bearer_qos_pre_emp_capability = current_bearer_p->pre_emp_capability; establishment_cnf_p->bearer_qos_pre_emp_capability = current_bearer_p->pre_emp_capability;
establishment_cnf_p->ambr = ue_context_p->used_ambr; establishment_cnf_p->ambr = ue_context_p->used_ambr;
MME_APP_DEBUG("Derive keNB with UL NAS COUNT %x\n", nas_conn_est_cnf_pP->ul_nas_count);
derive_keNB(ue_context_p->vector_in_use->kasme, nas_conn_est_cnf_pP->ul_nas_count, &keNB); //156
memcpy(establishment_cnf_p->keNB, keNB, 32);
free(keNB);
itti_send_msg_to_task(TASK_S1AP, INSTANCE_DEFAULT, message_p); itti_send_msg_to_task(TASK_S1AP, INSTANCE_DEFAULT, message_p);
} }
...@@ -471,17 +477,18 @@ mme_app_handle_create_sess_resp( ...@@ -471,17 +477,18 @@ mme_app_handle_create_sess_resp(
mme_app_dump_ue_contexts(&mme_app_desc.mme_ue_contexts); mme_app_dump_ue_contexts(&mme_app_desc.mme_ue_contexts);
{ {
uint8_t *keNB = NULL; //uint8_t *keNB = NULL;
message_p = itti_alloc_new_message(TASK_MME_APP, NAS_PDN_CONNECTIVITY_RSP); message_p = itti_alloc_new_message(TASK_MME_APP, NAS_PDN_CONNECTIVITY_RSP);
memset((void*)&message_p->ittiMsg.nas_pdn_connectivity_rsp, memset((void*)&message_p->ittiMsg.nas_pdn_connectivity_rsp,
0, 0,
sizeof(nas_pdn_connectivity_rsp_t)); sizeof(nas_pdn_connectivity_rsp_t));
derive_keNB(ue_context_p->vector_in_use->kasme, 156, &keNB); // moved to NAS_CONNECTION_ESTABLISHMENT_CONF, keNB not handled in NAS MME
memcpy(NAS_PDN_CONNECTIVITY_RSP(message_p).keNB, keNB, 32); //derive_keNB(ue_context_p->vector_in_use->kasme, 156, &keNB);
//memcpy(NAS_PDN_CONNECTIVITY_RSP(message_p).keNB, keNB, 32);
free(keNB); //free(keNB);
NAS_PDN_CONNECTIVITY_RSP(message_p).pti = ue_context_p->pending_pdn_connectivity_req_pti; // NAS internal ref NAS_PDN_CONNECTIVITY_RSP(message_p).pti = ue_context_p->pending_pdn_connectivity_req_pti; // NAS internal ref
NAS_PDN_CONNECTIVITY_RSP(message_p).ue_id = ue_context_p->pending_pdn_connectivity_req_ue_id; // NAS internal ref NAS_PDN_CONNECTIVITY_RSP(message_p).ue_id = ue_context_p->pending_pdn_connectivity_req_ue_id; // NAS internal ref
......
...@@ -17,7 +17,7 @@ SRCDIR = $(PROJDIR)/src ...@@ -17,7 +17,7 @@ SRCDIR = $(PROJDIR)/src
INCDIR = $(SRCDIR)/include INCDIR = $(SRCDIR)/include
UTILDIR = $(SRCDIR)/util UTILDIR = $(SRCDIR)/util
APIDIR = $(SRCDIR)/api APIDIR = $(SRCDIR)/api
USERAPIDIR = $(APIDIR)/user USERAPIDIR = $(APIDIR)/user
NETAPIDIR = $(APIDIR)/network NETAPIDIR = $(APIDIR)/network
USIMAPIDIR = $(APIDIR)/usim USIMAPIDIR = $(APIDIR)/usim
MMEAPIDIR = $(APIDIR)/mme MMEAPIDIR = $(APIDIR)/mme
......
...@@ -23,6 +23,9 @@ Description Defines the layer 3 messages supported by the NAS sublayer ...@@ -23,6 +23,9 @@ Description Defines the layer 3 messages supported by the NAS sublayer
#include "commonDef.h" #include "commonDef.h"
#include "emm_msg.h" #include "emm_msg.h"
#if defined(EPC_BUILD)
#include "emmData.h"
#endif
#include "esm_msg.h" #include "esm_msg.h"
/****************************************************************************/ /****************************************************************************/
...@@ -78,14 +81,29 @@ typedef union { ...@@ -78,14 +81,29 @@ typedef union {
/****************** E X P O R T E D F U N C T I O N S ******************/ /****************** E X P O R T E D F U N C T I O N S ******************/
/****************************************************************************/ /****************************************************************************/
int nas_message_encrypt(const char *inbuf, char *outbuf, int nas_message_encrypt(
const nas_message_security_header_t *header, int length); const char *inbuf,
char *outbuf,
int nas_message_decrypt(const char *inbuf, char *outbuf, const nas_message_security_header_t *header,
nas_message_security_header_t *header, int length); int length,
void *security);
int nas_message_decode(const char * const buffer, nas_message_t *msg, int length);
int nas_message_decrypt(const char *inbuf,
int nas_message_encode(char *buffer, const nas_message_t * const msg, int length); char *outbuf,
nas_message_security_header_t *header,
int length,
void *security);
int nas_message_decode(
const char * const buffer,
nas_message_t *msg,
int length,
void *security);
int nas_message_encode(
char *buffer,
const nas_message_t * const msg,
int length,
void *security);
#endif /* __NAS_MESSAGE_H__*/ #endif /* __NAS_MESSAGE_H__*/
...@@ -45,6 +45,8 @@ Description Defines the attach related EMM procedure executed by the ...@@ -45,6 +45,8 @@ Description Defines the attach related EMM procedure executed by the
#include "esm_sap.h" #include "esm_sap.h"
#include "emm_cause.h" #include "emm_cause.h"
#include "NasSecurityAlgorithms.h"
#ifdef NAS_MME #ifdef NAS_MME
#include "mme_api.h" #include "mme_api.h"
# if defined(EPC_BUILD) # if defined(EPC_BUILD)
...@@ -1133,6 +1135,17 @@ int emm_proc_attach_request(unsigned int ueid, emm_proc_attach_type_t type, ...@@ -1133,6 +1135,17 @@ int emm_proc_attach_request(unsigned int ueid, emm_proc_attach_type_t type,
#if defined(EPC_BUILD) #if defined(EPC_BUILD)
emm_data_context_add(&_emm_data, *(emm_ctx)); emm_data_context_add(&_emm_data, *(emm_ctx));
#endif #endif
#warning "TRICK TO SET TAC, BUT LOOK AT SPEC"
if (tai){
LOG_TRACE(WARNING,
"EMM-PROC - Set tac %u in context %u ",
tai->tac);
(*emm_ctx)->tac = tai->tac;
} else {
LOG_TRACE(WARNING,
"EMM-PROC - Could not set tac in context, cause tai is NULL ");
}
} }
/* Update the EMM context with the current attach procedure parameters */ /* Update the EMM context with the current attach procedure parameters */
...@@ -2040,6 +2053,8 @@ static int _emm_attach_security(void *args) ...@@ -2040,6 +2053,8 @@ static int _emm_attach_security(void *args)
if (emm_ctx->security) { if (emm_ctx->security) {
memset(emm_ctx->security, 0, sizeof(emm_security_context_t)); memset(emm_ctx->security, 0, sizeof(emm_security_context_t));
emm_ctx->security->type = EMM_KSI_NOT_AVAILABLE; emm_ctx->security->type = EMM_KSI_NOT_AVAILABLE;
emm_ctx->security->selected_algorithms.encryption = NAS_SECURITY_ALGORITHMS_EEA0;
emm_ctx->security->selected_algorithms.integrity = NAS_SECURITY_ALGORITHMS_EIA0;
} else { } else {
LOG_TRACE(WARNING, "EMM-PROC - Failed to create security context"); LOG_TRACE(WARNING, "EMM-PROC - Failed to create security context");
emm_ctx->emm_cause = EMM_CAUSE_ILLEGAL_UE; emm_ctx->emm_cause = EMM_CAUSE_ILLEGAL_UE;
...@@ -2309,62 +2324,63 @@ static int _emm_attach_have_changed(const emm_data_context_t *ctx, ...@@ -2309,62 +2324,63 @@ static int _emm_attach_have_changed(const emm_data_context_t *ctx,
GUTI_t *guti, imsi_t *imsi, imei_t *imei, GUTI_t *guti, imsi_t *imsi, imei_t *imei,
int eea, int eia) int eea, int eia)
{ {
LOG_FUNC_IN;
/* Emergency bearer services indicator */ /* Emergency bearer services indicator */
if ( (type == EMM_ATTACH_TYPE_EMERGENCY) != ctx->is_emergency) { if ( (type == EMM_ATTACH_TYPE_EMERGENCY) != ctx->is_emergency) {
return (TRUE); LOG_FUNC_RETURN (TRUE);
} }
/* Security key set identifier */ /* Security key set identifier */
if (ksi != ctx->ksi) { if (ksi != ctx->ksi) {
return (TRUE); LOG_FUNC_RETURN (TRUE);
} }
/* Supported EPS encryption algorithms */ /* Supported EPS encryption algorithms */
if (eea != ctx->eea) { if (eea != ctx->eea) {
return (TRUE); LOG_FUNC_RETURN (TRUE);
} }
/* Supported EPS integrity algorithms */ /* Supported EPS integrity algorithms */
if (eia != ctx->eia) { if (eia != ctx->eia) {
return (TRUE); LOG_FUNC_RETURN (TRUE);
} }
/* The GUTI if provided by the UE */ /* The GUTI if provided by the UE */
if ( (guti) && (ctx->guti == NULL) ) { if ( (guti) && (ctx->guti == NULL) ) {
return (TRUE); LOG_FUNC_RETURN (TRUE);
} }
if ( (guti == NULL) && (ctx->guti) ) { if ( (guti == NULL) && (ctx->guti) ) {
return (TRUE); LOG_FUNC_RETURN (TRUE);
} }
if ( (guti) && (ctx->guti) ) { if ( (guti) && (ctx->guti) ) {
if (guti->m_tmsi != ctx->guti->m_tmsi) { if (guti->m_tmsi != ctx->guti->m_tmsi) {
return (TRUE); LOG_FUNC_RETURN (TRUE);
} }
if ( memcmp(&guti->gummei, &ctx->guti->gummei, sizeof(gummei_t)) != 0 ) { if ( memcmp(&guti->gummei, &ctx->guti->gummei, sizeof(gummei_t)) != 0 ) {
return (TRUE); LOG_FUNC_RETURN (TRUE);
} }
} }
/* The IMSI if provided by the UE */ /* The IMSI if provided by the UE */
if ( (imsi) && (ctx->imsi == NULL) ) { if ( (imsi) && (ctx->imsi == NULL) ) {
return (TRUE); LOG_FUNC_RETURN (TRUE);
} }
if ( (imsi == NULL) && (ctx->imsi) ) { if ( (imsi == NULL) && (ctx->imsi) ) {
return (TRUE); LOG_FUNC_RETURN (TRUE);
} }
if ( (imsi) && (ctx->imsi) ) { if ( (imsi) && (ctx->imsi) ) {
if ( memcmp(imsi, ctx->imsi, sizeof(imsi_t)) != 0 ) { if ( memcmp(imsi, ctx->imsi, sizeof(imsi_t)) != 0 ) {
return (TRUE); LOG_FUNC_RETURN (TRUE);
} }
} }
/* The IMEI if provided by the UE */ /* The IMEI if provided by the UE */
if ( (imei) && (ctx->imei == NULL) ) { if ( (imei) && (ctx->imei == NULL) ) {
return (TRUE); LOG_FUNC_RETURN (TRUE);
} }
if ( (imei == NULL) && (ctx->imei) ) { if ( (imei == NULL) && (ctx->imei) ) {
return (TRUE); LOG_FUNC_RETURN (TRUE);
} }
if ( (imei) && (ctx->imei) ) { if ( (imei) && (ctx->imei) ) {
if ( memcmp(imei, ctx->imei, sizeof(imei_t)) != 0 ) { if ( memcmp(imei, ctx->imei, sizeof(imei_t)) != 0 ) {
return (TRUE); LOG_FUNC_RETURN (TRUE);
} }
} }
return (FALSE); LOG_FUNC_RETURN (FALSE);
} }
/**************************************************************************** /****************************************************************************
...@@ -2396,6 +2412,7 @@ static int _emm_attach_update(emm_data_context_t *ctx, unsigned int ueid, ...@@ -2396,6 +2412,7 @@ static int _emm_attach_update(emm_data_context_t *ctx, unsigned int ueid,
GUTI_t *guti, imsi_t *imsi, imei_t *imei, GUTI_t *guti, imsi_t *imsi, imei_t *imei,
int eea, int eia, const OctetString *esm_msg) int eea, int eia, const OctetString *esm_msg)
{ {
LOG_FUNC_IN;
/* UE identifier */ /* UE identifier */
ctx->ueid = ueid; ctx->ueid = ueid;
/* Emergency bearer services indicator */ /* Emergency bearer services indicator */
...@@ -2414,7 +2431,7 @@ static int _emm_attach_update(emm_data_context_t *ctx, unsigned int ueid, ...@@ -2414,7 +2431,7 @@ static int _emm_attach_update(emm_data_context_t *ctx, unsigned int ueid,
if (ctx->guti != NULL) { if (ctx->guti != NULL) {
memcpy(ctx->guti, guti, sizeof(GUTI_t)); memcpy(ctx->guti, guti, sizeof(GUTI_t));
} else { } else {
return (RETURNerror); LOG_FUNC_RETURN (RETURNerror);
} }
} else { } else {
if (ctx->guti == NULL) { if (ctx->guti == NULL) {
...@@ -2422,6 +2439,7 @@ static int _emm_attach_update(emm_data_context_t *ctx, unsigned int ueid, ...@@ -2422,6 +2439,7 @@ static int _emm_attach_update(emm_data_context_t *ctx, unsigned int ueid,
} }
if (ctx->guti != NULL) { if (ctx->guti != NULL) {
/* TODO: FIXME */ /* TODO: FIXME */
LOG_TRACE(WARNING, "EMM-PROC - Assign hardcoded PLMN 208.92 and tac 0001 to emm_data_context");
ctx->guti->gummei.plmn.MCCdigit1 = 2; ctx->guti->gummei.plmn.MCCdigit1 = 2;
ctx->guti->gummei.plmn.MCCdigit2 = 0; ctx->guti->gummei.plmn.MCCdigit2 = 0;
ctx->guti->gummei.plmn.MCCdigit3 = 8; ctx->guti->gummei.plmn.MCCdigit3 = 8;
...@@ -2433,8 +2451,10 @@ static int _emm_attach_update(emm_data_context_t *ctx, unsigned int ueid, ...@@ -2433,8 +2451,10 @@ static int _emm_attach_update(emm_data_context_t *ctx, unsigned int ueid,
ctx->guti->gummei.MMEgid = 0; ctx->guti->gummei.MMEgid = 0;
ctx->guti->m_tmsi = (uint32_t) ctx; ctx->guti->m_tmsi = (uint32_t) ctx;
ctx->tac = 1;
} else { } else {
return (RETURNerror); LOG_FUNC_RETURN (RETURNerror);
} }
} }
/* The IMSI if provided by the UE */ /* The IMSI if provided by the UE */
...@@ -2445,7 +2465,7 @@ static int _emm_attach_update(emm_data_context_t *ctx, unsigned int ueid, ...@@ -2445,7 +2465,7 @@ static int _emm_attach_update(emm_data_context_t *ctx, unsigned int ueid,
if (ctx->imsi != NULL) { if (ctx->imsi != NULL) {
memcpy(ctx->imsi, imsi, sizeof(imsi_t)); memcpy(ctx->imsi, imsi, sizeof(imsi_t));
} else { } else {
return (RETURNerror); LOG_FUNC_RETURN (RETURNerror);
} }
} }
/* The IMEI if provided by the UE */ /* The IMEI if provided by the UE */
...@@ -2456,7 +2476,7 @@ static int _emm_attach_update(emm_data_context_t *ctx, unsigned int ueid, ...@@ -2456,7 +2476,7 @@ static int _emm_attach_update(emm_data_context_t *ctx, unsigned int ueid,
if (ctx->imei != NULL) { if (ctx->imei != NULL) {
memcpy(ctx->imei, imei, sizeof(imei_t)); memcpy(ctx->imei, imei, sizeof(imei_t));
} else { } else {
return (RETURNerror); LOG_FUNC_RETURN (RETURNerror);
} }
} }
/* The ESM message contained within the attach request */ /* The ESM message contained within the attach request */
...@@ -2468,14 +2488,14 @@ static int _emm_attach_update(emm_data_context_t *ctx, unsigned int ueid, ...@@ -2468,14 +2488,14 @@ static int _emm_attach_update(emm_data_context_t *ctx, unsigned int ueid,
strncpy((char *)ctx->esm_msg.value, strncpy((char *)ctx->esm_msg.value,
(char *)esm_msg->value, esm_msg->length); (char *)esm_msg->value, esm_msg->length);
} else { } else {
return (RETURNerror); LOG_FUNC_RETURN (RETURNerror);
} }
} }
ctx->esm_msg.length = esm_msg->length; ctx->esm_msg.length = esm_msg->length;
/* Attachment indicator */ /* Attachment indicator */
ctx->is_attached = FALSE; ctx->is_attached = FALSE;
return (RETURNok); LOG_FUNC_RETURN (RETURNok);
} }
#endif // NAS_MME #endif // NAS_MME
...@@ -670,6 +670,8 @@ int emm_proc_authentication_complete(unsigned int ueid, int emm_cause, ...@@ -670,6 +670,8 @@ int emm_proc_authentication_complete(unsigned int ueid, int emm_cause,
/* RES does not match the XRES parameter */ /* RES does not match the XRES parameter */
LOG_TRACE(WARNING, "EMM-PROC - Failed to authentify the UE"); LOG_TRACE(WARNING, "EMM-PROC - Failed to authentify the UE");
emm_cause = EMM_CAUSE_ILLEGAL_UE; emm_cause = EMM_CAUSE_ILLEGAL_UE;
} else {
LOG_TRACE(DEBUG, "EMM-PROC - Success to authentify the UE RESP XRES == XRES UE CONTEXT");
} }
} }
...@@ -1151,10 +1153,10 @@ static int _authentication_kasme(const OctetString *autn, ...@@ -1151,10 +1153,10 @@ static int _authentication_kasme(const OctetString *autn,
/* Compute the KDF input parameter /* Compute the KDF input parameter
* S = FC(0x10) || SNid || 0x00 0x03 || SQN ⊕ AK || 0x00 0x06 * S = FC(0x10) || SNid || 0x00 0x03 || SQN ⊕ AK || 0x00 0x06
*/ */
UInt8_t input[kasme->length]; UInt8_t input[kasme->length];
UInt16_t length; UInt16_t length;
int offset = 0; int offset = 0;
int size_of_length = sizeof(length); int size_of_length = sizeof(length);
input[offset] = 0x10; input[offset] = 0x10;
offset += 1; offset += 1;
length = AUTH_SNID_SIZE; length = AUTH_SNID_SIZE;
......
...@@ -30,6 +30,7 @@ Description Defines EMM procedures executed by the Non-Access Stratum ...@@ -30,6 +30,7 @@ Description Defines EMM procedures executed by the Non-Access Stratum
#include "emm_sap.h" #include "emm_sap.h"
#include "esm_sap.h" #include "esm_sap.h"
#include "nas_log.h"
#include <string.h> // memset #include <string.h> // memset
...@@ -457,6 +458,14 @@ void emm_as_set_security_data(emm_as_security_data_t *data, const void *args, ...@@ -457,6 +458,14 @@ void emm_as_set_security_data(emm_as_security_data_t *data, const void *args,
* into use, UE and MME shall cipher and integrity protect all * into use, UE and MME shall cipher and integrity protect all
* NAS signalling messages with the selected NAS ciphering and * NAS signalling messages with the selected NAS ciphering and
* NAS integrity algorithms */ * NAS integrity algorithms */
LOG_TRACE(WARNING,
"EPS security context exists is new %u KSI %u SQN %u count %u knas_int %s",
is_new,
context->eksi,
context->ul_count.seq_num,
*(UInt32_t *)(&context->ul_count),
context->knas_int.value
);
data->is_new = is_new; data->is_new = is_new;
data->ksi = context->eksi; data->ksi = context->eksi;
data->sqn = context->ul_count.seq_num; data->sqn = context->ul_count.seq_num;
...@@ -473,9 +482,14 @@ void emm_as_set_security_data(emm_as_security_data_t *data, const void *args, ...@@ -473,9 +482,14 @@ void emm_as_set_security_data(emm_as_security_data_t *data, const void *args,
/* 3GPP TS 24.301, section 5.4.3.2 /* 3GPP TS 24.301, section 5.4.3.2
* The MME shall send the SECURITY MODE COMMAND message integrity * The MME shall send the SECURITY MODE COMMAND message integrity
* protected and unciphered */ * protected and unciphered */
LOG_TRACE(WARNING,
"EPS security context exists knas_enc %s",
context->knas_enc.value
);
data->k_enc = &context->knas_enc; data->k_enc = &context->knas_enc;
} }
} else { } else {
LOG_TRACE(WARNING, "EMM_AS_NO_KEY_AVAILABLE");
/* No valid EPS security context exists */ /* No valid EPS security context exists */
data->ksi = EMM_AS_NO_KEY_AVAILABLE; data->ksi = EMM_AS_NO_KEY_AVAILABLE;
} }
......
...@@ -46,6 +46,7 @@ Description Defines the security mode control EMM procedure executed by the ...@@ -46,6 +46,7 @@ Description Defines the security mode control EMM procedure executed by the
#if defined(ENABLE_ITTI) #if defined(ENABLE_ITTI)
# include "assertions.h" # include "assertions.h"
#endif #endif
#include "secu_defs.h"
/****************************************************************************/ /****************************************************************************/
/**************** E X T E R N A L D E F I N I T I O N S ****************/ /**************** E X T E R N A L D E F I N I T I O N S ****************/
...@@ -98,20 +99,26 @@ static void *_security_t3460_handler(void *); ...@@ -98,20 +99,26 @@ static void *_security_t3460_handler(void *);
* retransmission timer counter is exceed * retransmission timer counter is exceed
*/ */
static int _security_abort(void *); static int _security_abort(void *);
static int _security_select_algorithms(
const int ue_eiaP,
const int ue_eeaP,
int * const mme_eiaP,
int * const mme_eeaP);
/* /*
* Internal data used for security mode control procedure * Internal data used for security mode control procedure
*/ */
typedef struct { typedef struct {
unsigned int ueid; /* UE identifier */ unsigned int ueid; /* UE identifier */
#define SECURITY_COUNTER_MAX 5 #define SECURITY_COUNTER_MAX 5
unsigned int retransmission_count; /* Retransmission counter */ unsigned int retransmission_count; /* Retransmission counter */
int ksi; /* NAS key set identifier */ int ksi; /* NAS key set identifier */
int eea; /* Replayed EPS encryption algorithms */ int eea; /* Replayed EPS encryption algorithms */
int eia; /* Replayed EPS integrity algorithms */ int eia; /* Replayed EPS integrity algorithms */
int selected_eea; /* Replayed EPS encryption algorithms */
int selected_eia; /* Replayed EPS integrity algorithms */
int notify_failure; /* Indicates whether the security mode control int notify_failure; /* Indicates whether the security mode control
* procedure failure shall be notified to the * procedure failure shall be notified to the
* ongoing EMM procedure */ * ongoing EMM procedure */
} security_data_t; } security_data_t;
static int _security_request(security_data_t *data, int is_new); static int _security_request(security_data_t *data, int is_new);
...@@ -332,6 +339,8 @@ int emm_proc_security_mode_command(int native_ksi, int ksi, ...@@ -332,6 +339,8 @@ int emm_proc_security_mode_command(int native_ksi, int ksi,
* -------------------------------------------------------------------------- * --------------------------------------------------------------------------
*/ */
#ifdef NAS_MME #ifdef NAS_MME
/**************************************************************************** /****************************************************************************
** ** ** **
** Name: emm_proc_security_mode_control() ** ** Name: emm_proc_security_mode_control() **
...@@ -372,14 +381,16 @@ int emm_proc_security_mode_control(unsigned int ueid, int ksi, int eea, int eia, ...@@ -372,14 +381,16 @@ int emm_proc_security_mode_control(unsigned int ueid, int ksi, int eea, int eia,
{