open5gs/src/mme/mme-context.c

2826 lines
101 KiB
C
Raw Normal View History

#include <mongoc.h>
2017-11-29 00:51:34 +00:00
#include <yaml.h>
2017-02-06 06:30:12 +00:00
2019-05-31 07:33:09 +00:00
#include "ogs-sctp.h"
2019-06-11 09:28:25 +00:00
#include "asn1c/s1ap-message.h"
#include "gtp/gtp-xact.h"
#include "gtp/gtp-node.h"
#include "gtp/gtp-path.h"
#include "fd/fd-lib.h"
2017-03-26 06:34:34 +00:00
2019-04-27 14:54:30 +00:00
#include "app/context.h"
2019-06-11 13:10:47 +00:00
#include "nas-conv.h"
#include "mme-context.h"
#include "mme-event.h"
2019-06-01 09:52:38 +00:00
#include "s1ap-path.h"
2019-06-11 13:10:47 +00:00
#include "s1ap-handler.h"
#include "mme-sm.h"
2017-02-06 06:30:12 +00:00
2017-04-04 05:00:02 +00:00
#define MAX_CELL_PER_ENB 8
2017-03-05 04:03:11 +00:00
2017-04-06 11:10:00 +00:00
static mme_context_t self;
static fd_config_t g_fd_conf;
2017-02-06 06:30:12 +00:00
2019-04-27 14:54:30 +00:00
int __mme_log_domain;
int __emm_log_domain;
int __esm_log_domain;
static OGS_POOL(mme_sgw_pool, mme_sgw_t);
static OGS_POOL(mme_pgw_pool, mme_pgw_t);
2019-06-02 12:55:24 +00:00
static OGS_POOL(mme_vlr_pool, mme_vlr_t);
2019-04-27 14:54:30 +00:00
static OGS_POOL(mme_enb_pool, mme_enb_t);
static OGS_POOL(mme_ue_pool, mme_ue_t);
static OGS_POOL(enb_ue_pool, enb_ue_t);
static OGS_POOL(mme_sess_pool, mme_sess_t);
static OGS_POOL(mme_bearer_pool, mme_bearer_t);
2017-02-13 04:19:53 +00:00
2017-04-06 11:10:00 +00:00
static int context_initialized = 0;
2017-02-06 06:30:12 +00:00
2019-05-06 11:43:50 +00:00
void mme_context_init()
2017-02-06 06:30:12 +00:00
{
2019-04-27 14:54:30 +00:00
ogs_assert(context_initialized == 0);
2017-02-06 06:30:12 +00:00
/* Initial FreeDiameter Config */
memset(&g_fd_conf, 0, sizeof(fd_config_t));
2017-04-06 12:44:30 +00:00
/* Initialize MME context */
memset(&self, 0, sizeof(mme_context_t));
self.fd_config = &g_fd_conf;
2017-04-06 12:44:30 +00:00
2019-04-27 14:54:30 +00:00
ogs_log_install_domain(&__mme_log_domain, "mme", ogs_core()->log.level);
ogs_log_install_domain(&__emm_log_domain, "emm", ogs_core()->log.level);
ogs_log_install_domain(&__esm_log_domain, "esm", ogs_core()->log.level);
2017-12-01 12:47:15 +00:00
2019-04-27 14:54:30 +00:00
ogs_list_init(&self.s1ap_list);
ogs_list_init(&self.s1ap_list6);
ogs_list_init(&self.gtpc_list);
ogs_list_init(&self.gtpc_list6);
2017-12-01 12:47:15 +00:00
2017-12-02 05:17:32 +00:00
gtp_node_init();
2019-04-27 14:54:30 +00:00
ogs_list_init(&self.sgw_list);
ogs_list_init(&self.pgw_list);
2019-06-02 12:55:24 +00:00
ogs_list_init(&self.vlr_list);
2017-04-12 01:05:23 +00:00
ogs_pool_init(&mme_sgw_pool, context_self()->config.max.sgw);
ogs_pool_init(&mme_pgw_pool, context_self()->config.max.pgw);
ogs_pool_init(&mme_vlr_pool, context_self()->config.max.vlr);
ogs_pool_init(&mme_enb_pool, context_self()->config.max.enb);
ogs_pool_init(&mme_ue_pool, context_self()->pool.ue);
ogs_pool_init(&enb_ue_pool, context_self()->pool.ue);
ogs_pool_init(&mme_sess_pool, context_self()->pool.sess);
ogs_pool_init(&mme_bearer_pool, context_self()->pool.bearer);
ogs_pool_init(&self.m_tmsi, context_self()->pool.ue);
2017-02-13 04:19:53 +00:00
2019-04-27 14:54:30 +00:00
self.enb_sock_hash = ogs_hash_make();
self.enb_addr_hash = ogs_hash_make();
self.enb_id_hash = ogs_hash_make();
self.mme_ue_s1ap_id_hash = ogs_hash_make();
self.imsi_ue_hash = ogs_hash_make();
self.guti_ue_hash = ogs_hash_make();
2017-02-06 06:30:12 +00:00
2019-06-16 08:33:45 +00:00
/* Paging retry timer: 2 secs */
self.t3413_value = ogs_time_from_sec(2);
/* Client timer to connect to server: 3 secs */
2019-06-16 09:20:40 +00:00
self.t_conn_value = ogs_time_from_sec(3);
2017-08-07 22:58:13 +00:00
2017-04-06 11:10:00 +00:00
context_initialized = 1;
2017-02-06 06:30:12 +00:00
}
2017-03-27 04:22:42 +00:00
2019-05-06 11:43:50 +00:00
void mme_context_final()
2017-07-30 13:29:27 +00:00
{
2019-04-27 14:54:30 +00:00
ogs_assert(context_initialized == 1);
2017-07-30 13:29:27 +00:00
2017-12-02 06:49:03 +00:00
mme_enb_remove_all();
mme_ue_remove_all();
2017-07-30 13:29:27 +00:00
2019-05-31 12:05:35 +00:00
mme_sgw_remove_all();
mme_pgw_remove_all();
2019-06-02 12:55:24 +00:00
mme_vlr_remove_all();
2019-05-31 12:05:35 +00:00
2019-04-27 14:54:30 +00:00
ogs_assert(self.enb_sock_hash);
ogs_hash_destroy(self.enb_sock_hash);
ogs_assert(self.enb_addr_hash);
ogs_hash_destroy(self.enb_addr_hash);
ogs_assert(self.enb_id_hash);
ogs_hash_destroy(self.enb_id_hash);
ogs_assert(self.mme_ue_s1ap_id_hash);
ogs_hash_destroy(self.mme_ue_s1ap_id_hash);
ogs_assert(self.imsi_ue_hash);
ogs_hash_destroy(self.imsi_ue_hash);
ogs_assert(self.guti_ue_hash);
ogs_hash_destroy(self.guti_ue_hash);
ogs_pool_final(&self.m_tmsi);
ogs_pool_final(&mme_bearer_pool);
ogs_pool_final(&mme_sess_pool);
ogs_pool_final(&mme_ue_pool);
ogs_pool_final(&enb_ue_pool);
ogs_pool_final(&mme_enb_pool);
2017-07-30 13:29:27 +00:00
2019-04-27 14:54:30 +00:00
ogs_pool_final(&mme_sgw_pool);
ogs_pool_final(&mme_pgw_pool);
2019-06-02 12:55:24 +00:00
ogs_pool_final(&mme_vlr_pool);
2017-12-02 05:17:32 +00:00
gtp_node_final();
2017-07-30 13:29:27 +00:00
context_initialized = 0;
}
mme_context_t* mme_self()
{
return &self;
}
2019-04-27 14:54:30 +00:00
static int mme_context_prepare()
2017-07-14 11:04:11 +00:00
{
2017-02-06 10:12:10 +00:00
self.relative_capacity = 0xff;
2017-02-06 06:30:12 +00:00
2017-12-08 03:43:35 +00:00
self.s1ap_port = S1AP_SCTP_PORT;
self.gtpc_port = GTPV2_C_UDP_PORT;
2019-06-02 12:55:24 +00:00
self.sgsap_port = SGSAP_SCTP_PORT;
self.fd_config->cnf_port = DIAMETER_PORT;
self.fd_config->cnf_port_tls = DIAMETER_SECURE_PORT;
2017-07-14 11:04:11 +00:00
2019-04-27 14:54:30 +00:00
return OGS_OK;
2017-07-14 11:04:11 +00:00
}
2017-02-06 06:30:12 +00:00
2019-04-27 14:54:30 +00:00
static int mme_context_validation()
2017-07-14 11:04:11 +00:00
{
if (self.fd_conf_path == NULL &&
(self.fd_config->cnf_diamid == NULL ||
self.fd_config->cnf_diamrlm == NULL ||
self.fd_config->cnf_addr == NULL)) {
2019-04-27 14:54:30 +00:00
ogs_error("No mme.freeDiameter in '%s'", context_self()->config.path);
return OGS_ERROR;
2017-07-30 13:29:27 +00:00
}
2017-12-08 03:43:35 +00:00
2019-04-27 14:54:30 +00:00
if (ogs_list_first(&self.s1ap_list) == NULL &&
ogs_list_first(&self.s1ap_list6) == NULL) {
2019-04-27 14:54:30 +00:00
ogs_error("No mme.s1ap in '%s'", context_self()->config.path);
return OGS_RETRY;
2017-07-14 11:04:11 +00:00
}
2017-12-01 15:44:07 +00:00
2019-04-27 14:54:30 +00:00
if (ogs_list_first(&self.gtpc_list) == NULL &&
ogs_list_first(&self.gtpc_list6) == NULL) {
2019-04-27 14:54:30 +00:00
ogs_error("No mme.gtpc in '%s'", context_self()->config.path);
return OGS_RETRY;
2017-07-14 11:04:11 +00:00
}
if (ogs_list_first(&self.sgw_list) == NULL) {
2019-04-27 14:54:30 +00:00
ogs_error("No sgw.gtpc in '%s'", context_self()->config.path);
return OGS_ERROR;
2017-12-02 05:17:32 +00:00
}
2017-07-14 11:04:11 +00:00
if (ogs_list_first(&self.pgw_list) == NULL) {
2019-04-27 14:54:30 +00:00
ogs_error("No pgw.gtpc in '%s'", context_self()->config.path);
return OGS_ERROR;
2017-12-03 08:00:11 +00:00
}
if (self.max_num_of_served_gummei == 0) {
2019-04-27 14:54:30 +00:00
ogs_error("No mme.gummei in '%s'", context_self()->config.path);
return OGS_ERROR;
2017-07-14 15:00:08 +00:00
}
if (self.served_gummei[0].num_of_plmn_id == 0) {
2019-04-27 14:54:30 +00:00
ogs_error("No mme.gummei.plmn_id in '%s'", context_self()->config.path);
return OGS_ERROR;
2017-07-14 15:00:08 +00:00
}
if (self.served_gummei[0].num_of_mme_gid == 0) {
2019-04-27 14:54:30 +00:00
ogs_error("No mme.gummei.mme_gid in '%s'", context_self()->config.path);
return OGS_ERROR;
2017-07-14 15:00:08 +00:00
}
if (self.served_gummei[0].num_of_mme_code == 0) {
2019-04-27 14:54:30 +00:00
ogs_error("No mme.gummei.mme_code in '%s'", context_self()->config.path);
return OGS_ERROR;
2017-07-14 15:00:08 +00:00
}
if (self.num_of_served_tai == 0) {
2019-04-27 14:54:30 +00:00
ogs_error("No mme.tai in '%s'", context_self()->config.path);
return OGS_ERROR;
2017-07-14 15:27:22 +00:00
}
if (self.served_tai[0].list0.tai[0].num == 0 &&
self.served_tai[0].list2.num == 0) {
2019-04-27 14:54:30 +00:00
ogs_error("No mme.tai.plmn_id|tac in '%s'", context_self()->config.path);
return OGS_ERROR;
}
if (self.num_of_integrity_order == 0) {
2019-04-27 14:54:30 +00:00
ogs_error("No mme.security.integrity_order in '%s'",
2017-07-14 11:46:15 +00:00
context_self()->config.path);
2019-04-27 14:54:30 +00:00
return OGS_ERROR;
2017-07-14 11:46:15 +00:00
}
if (self.num_of_ciphering_order == 0) {
2019-04-27 14:54:30 +00:00
ogs_error("no mme.security.ciphering_order in '%s'",
2017-07-14 11:46:15 +00:00
context_self()->config.path);
2019-04-27 14:54:30 +00:00
return OGS_ERROR;
2017-07-14 11:46:15 +00:00
}
2017-02-06 06:30:12 +00:00
2019-04-27 14:54:30 +00:00
return OGS_OK;
2017-07-14 11:04:11 +00:00
}
2017-03-07 00:30:12 +00:00
2019-04-27 14:54:30 +00:00
int mme_context_parse_config()
2017-07-14 10:00:26 +00:00
{
2019-04-27 14:54:30 +00:00
int rv;
2017-07-14 10:00:26 +00:00
config_t *config = &context_self()->config;
2017-11-29 00:41:29 +00:00
yaml_document_t *document = NULL;
2019-04-27 14:54:30 +00:00
ogs_yaml_iter_t root_iter;
2017-07-14 10:00:26 +00:00
2019-04-27 14:54:30 +00:00
ogs_assert(config);
2017-11-29 00:41:29 +00:00
document = config->document;
2019-04-27 14:54:30 +00:00
ogs_assert(document);
2017-07-14 10:00:26 +00:00
2017-07-14 11:04:11 +00:00
rv = mme_context_prepare();
2019-04-27 14:54:30 +00:00
if (rv != OGS_OK) return rv;
2017-07-14 11:04:11 +00:00
2019-04-27 14:54:30 +00:00
ogs_yaml_iter_init(&root_iter, document);
2019-05-29 12:27:22 +00:00
while (ogs_yaml_iter_next(&root_iter)) {
2019-04-27 14:54:30 +00:00
const char *root_key = ogs_yaml_iter_key(&root_iter);
ogs_assert(root_key);
if (!strcmp(root_key, "mme")) {
2019-04-27 14:54:30 +00:00
ogs_yaml_iter_t mme_iter;
ogs_yaml_iter_recurse(&root_iter, &mme_iter);
2019-05-29 12:27:22 +00:00
while (ogs_yaml_iter_next(&mme_iter)) {
2019-04-27 14:54:30 +00:00
const char *mme_key = ogs_yaml_iter_key(&mme_iter);
ogs_assert(mme_key);
if (!strcmp(mme_key, "freeDiameter")) {
2018-01-05 14:03:41 +00:00
yaml_node_t *node =
yaml_document_get_node(document, mme_iter.pair->value);
2019-04-27 14:54:30 +00:00
ogs_assert(node);
if (node->type == YAML_SCALAR_NODE) {
2019-04-27 14:54:30 +00:00
self.fd_conf_path = ogs_yaml_iter_value(&mme_iter);
2019-06-02 02:09:01 +00:00
} else if (node->type == YAML_MAPPING_NODE) {
2019-04-27 14:54:30 +00:00
ogs_yaml_iter_t fd_iter;
ogs_yaml_iter_recurse(&mme_iter, &fd_iter);
2018-01-05 14:03:41 +00:00
2019-05-29 12:27:22 +00:00
while (ogs_yaml_iter_next(&fd_iter)) {
2019-04-27 14:54:30 +00:00
const char *fd_key = ogs_yaml_iter_key(&fd_iter);
ogs_assert(fd_key);
if (!strcmp(fd_key, "identity")) {
2018-01-05 14:03:41 +00:00
self.fd_config->cnf_diamid =
2019-04-27 14:54:30 +00:00
ogs_yaml_iter_value(&fd_iter);
2019-06-02 02:09:01 +00:00
} else if (!strcmp(fd_key, "realm")) {
2018-01-05 14:03:41 +00:00
self.fd_config->cnf_diamrlm =
2019-04-27 14:54:30 +00:00
ogs_yaml_iter_value(&fd_iter);
2019-06-02 02:09:01 +00:00
} else if (!strcmp(fd_key, "port")) {
2019-04-27 14:54:30 +00:00
const char *v = ogs_yaml_iter_value(&fd_iter);
2018-01-05 14:03:41 +00:00
if (v) self.fd_config->cnf_port = atoi(v);
2019-06-02 02:09:01 +00:00
} else if (!strcmp(fd_key, "sec_port")) {
2019-04-27 14:54:30 +00:00
const char *v = ogs_yaml_iter_value(&fd_iter);
2018-01-05 14:03:41 +00:00
if (v) self.fd_config->cnf_port_tls = atoi(v);
2019-06-02 02:09:01 +00:00
} else if (!strcmp(fd_key, "no_sctp")) {
2018-01-05 14:03:41 +00:00
self.fd_config->cnf_flags.no_sctp =
2019-04-27 14:54:30 +00:00
ogs_yaml_iter_bool(&fd_iter);
2019-06-02 02:09:01 +00:00
} else if (!strcmp(fd_key, "listen_on")) {
2018-01-05 14:03:41 +00:00
self.fd_config->cnf_addr =
2019-04-27 14:54:30 +00:00
ogs_yaml_iter_value(&fd_iter);
2019-06-02 12:55:24 +00:00
} else if (!strcmp(fd_key, "load_extension")) {
2019-04-27 14:54:30 +00:00
ogs_yaml_iter_t ext_array, ext_iter;
ogs_yaml_iter_recurse(&fd_iter, &ext_array);
do {
2018-01-05 14:03:41 +00:00
const char *module = NULL;
const char *conf = NULL;
2019-04-27 14:54:30 +00:00
if (ogs_yaml_iter_type(&ext_array) ==
YAML_MAPPING_NODE) {
2018-01-05 14:03:41 +00:00
memcpy(&ext_iter, &ext_array,
2019-04-27 14:54:30 +00:00
sizeof(ogs_yaml_iter_t));
2019-05-29 12:27:22 +00:00
} else if (ogs_yaml_iter_type(&ext_array) ==
YAML_SEQUENCE_NODE) {
2019-04-27 14:54:30 +00:00
if (!ogs_yaml_iter_next(&ext_array))
2018-01-05 14:03:41 +00:00
break;
2019-04-27 14:54:30 +00:00
ogs_yaml_iter_recurse(
2018-01-05 14:03:41 +00:00
&ext_array, &ext_iter);
2019-05-29 12:27:22 +00:00
} else if (ogs_yaml_iter_type(&ext_array) ==
YAML_SCALAR_NODE) {
2018-01-05 14:03:41 +00:00
break;
2019-06-02 02:09:01 +00:00
} else
2019-04-27 14:54:30 +00:00
ogs_assert_if_reached();
2019-05-29 12:27:22 +00:00
while (ogs_yaml_iter_next(&ext_iter)) {
2018-01-05 14:03:41 +00:00
const char *ext_key =
2019-04-27 14:54:30 +00:00
ogs_yaml_iter_key(&ext_iter);
ogs_assert(ext_key);
if (!strcmp(ext_key, "module")) {
module =
ogs_yaml_iter_value(&ext_iter);
2019-05-29 12:27:22 +00:00
} else if (!strcmp(ext_key, "conf")) {
conf =
ogs_yaml_iter_value(&ext_iter);
2019-05-29 12:27:22 +00:00
} else
ogs_warn("unknown key `%s`",
ext_key);
2018-01-05 14:03:41 +00:00
}
if (module) {
2018-01-05 14:03:41 +00:00
self.fd_config->
ext[self.fd_config->num_of_ext].
module = module;
self.fd_config->
ext[self.fd_config->num_of_ext].
conf = conf;
self.fd_config->num_of_ext++;
}
2019-05-29 12:27:22 +00:00
} while (ogs_yaml_iter_type(&ext_array) ==
2018-01-05 14:03:41 +00:00
YAML_SEQUENCE_NODE);
2019-06-02 02:09:01 +00:00
} else if (!strcmp(fd_key, "connect")) {
2019-04-27 14:54:30 +00:00
ogs_yaml_iter_t conn_array, conn_iter;
ogs_yaml_iter_recurse(&fd_iter, &conn_array);
do {
2018-01-05 14:03:41 +00:00
const char *identity = NULL;
const char *addr = NULL;
2019-04-27 14:54:30 +00:00
uint16_t port = 0;
2019-04-27 14:54:30 +00:00
if (ogs_yaml_iter_type(&conn_array) ==
YAML_MAPPING_NODE) {
2018-01-05 14:03:41 +00:00
memcpy(&conn_iter, &conn_array,
2019-04-27 14:54:30 +00:00
sizeof(ogs_yaml_iter_t));
2019-05-29 12:27:22 +00:00
} else if (ogs_yaml_iter_type(
&conn_array) == YAML_SEQUENCE_NODE) {
2019-04-27 14:54:30 +00:00
if (!ogs_yaml_iter_next(&conn_array))
2018-01-05 14:03:41 +00:00
break;
2019-04-27 14:54:30 +00:00
ogs_yaml_iter_recurse(&conn_array, &conn_iter);
2019-05-29 12:27:22 +00:00
} else if (ogs_yaml_iter_type(
&conn_array) == YAML_SCALAR_NODE) {
2018-01-05 14:03:41 +00:00
break;
2019-05-29 12:27:22 +00:00
} else
2019-04-27 14:54:30 +00:00
ogs_assert_if_reached();
2019-05-29 12:27:22 +00:00
while (ogs_yaml_iter_next(&conn_iter)) {
2018-01-05 14:03:41 +00:00
const char *conn_key =
2019-04-27 14:54:30 +00:00
ogs_yaml_iter_key(&conn_iter);
ogs_assert(conn_key);
if (!strcmp(conn_key, "identity")) {
identity =
ogs_yaml_iter_value(&conn_iter);
2019-05-29 12:27:22 +00:00
} else if (!strcmp(conn_key, "addr")) {
addr =
ogs_yaml_iter_value(&conn_iter);
2019-05-29 12:27:22 +00:00
} else if (!strcmp(conn_key, "port")) {
2018-01-05 14:03:41 +00:00
const char *v =
2019-04-27 14:54:30 +00:00
ogs_yaml_iter_value(&conn_iter);
2018-01-05 14:03:41 +00:00
if (v) port = atoi(v);
2019-05-29 12:27:22 +00:00
} else
ogs_warn("unknown key `%s`",
conn_key);
2018-01-05 14:03:41 +00:00
}
if (identity && addr) {
2018-01-05 14:03:41 +00:00
self.fd_config->
conn[self.fd_config->num_of_conn].
identity = identity;
self.fd_config->
conn[self.fd_config->num_of_conn].
addr = addr;
self.fd_config->
conn[self.fd_config->num_of_conn].
port = port;
self.fd_config->num_of_conn++;
}
2019-05-29 12:27:22 +00:00
} while (ogs_yaml_iter_type(&conn_array) ==
2018-01-05 14:03:41 +00:00
YAML_SEQUENCE_NODE);
2019-06-02 02:09:01 +00:00
} else
2019-04-27 14:54:30 +00:00
ogs_warn("unknown key `%s`", fd_key);
}
}
2019-06-02 02:09:01 +00:00
} else if (!strcmp(mme_key, "relative_capacity")) {
2019-04-27 14:54:30 +00:00
const char *v = ogs_yaml_iter_value(&mme_iter);
2017-11-29 00:41:29 +00:00
if (v) self.relative_capacity = atoi(v);
2019-06-02 02:09:01 +00:00
} else if (!strcmp(mme_key, "s1ap")) {
2019-04-27 14:54:30 +00:00
ogs_yaml_iter_t s1ap_array, s1ap_iter;
ogs_yaml_iter_recurse(&mme_iter, &s1ap_array);
do {
2017-11-25 14:30:47 +00:00
int family = AF_UNSPEC;
2017-12-08 03:43:35 +00:00
int i, num = 0;
const char *hostname[MAX_NUM_OF_HOSTNAME];
2019-04-27 14:54:30 +00:00
uint16_t port = self.s1ap_port;
2017-12-09 14:07:19 +00:00
const char *dev = NULL;
2019-05-29 12:05:42 +00:00
ogs_sockaddr_t *addr = NULL;
2017-11-24 15:52:07 +00:00
if (ogs_yaml_iter_type(&s1ap_array) ==
YAML_MAPPING_NODE) {
2017-11-29 00:41:29 +00:00
memcpy(&s1ap_iter, &s1ap_array,
2019-04-27 14:54:30 +00:00
sizeof(ogs_yaml_iter_t));
2019-05-29 12:27:22 +00:00
} else if (ogs_yaml_iter_type(&s1ap_array) ==
YAML_SEQUENCE_NODE) {
2019-04-27 14:54:30 +00:00
if (!ogs_yaml_iter_next(&s1ap_array))
2017-11-29 00:41:29 +00:00
break;
2019-04-27 14:54:30 +00:00
ogs_yaml_iter_recurse(&s1ap_array, &s1ap_iter);
2019-05-29 12:27:22 +00:00
} else if (ogs_yaml_iter_type(&s1ap_array) ==
YAML_SCALAR_NODE) {
2017-12-01 12:47:15 +00:00
break;
2019-05-29 12:27:22 +00:00
} else
2019-04-27 14:54:30 +00:00
ogs_assert_if_reached();
2017-11-24 15:52:07 +00:00
2019-05-29 12:27:22 +00:00
while (ogs_yaml_iter_next(&s1ap_iter)) {
2017-11-24 15:52:07 +00:00
const char *s1ap_key =
2019-04-27 14:54:30 +00:00
ogs_yaml_iter_key(&s1ap_iter);
ogs_assert(s1ap_key);
if (!strcmp(s1ap_key, "family")) {
2019-04-27 14:54:30 +00:00
const char *v = ogs_yaml_iter_value(&s1ap_iter);
2017-11-29 00:41:29 +00:00
if (v) family = atoi(v);
if (family != AF_UNSPEC &&
family != AF_INET && family != AF_INET6) {
2019-04-27 14:54:30 +00:00
ogs_warn("Ignore family(%d) : AF_UNSPEC(%d), "
"AF_INET(%d), AF_INET6(%d) ",
family, AF_UNSPEC, AF_INET, AF_INET6);
2017-11-29 00:41:29 +00:00
family = AF_UNSPEC;
2017-11-24 15:52:07 +00:00
}
2019-05-29 12:27:22 +00:00
} else if (!strcmp(s1ap_key, "addr") ||
!strcmp(s1ap_key, "name")) {
2019-04-27 14:54:30 +00:00
ogs_yaml_iter_t hostname_iter;
ogs_yaml_iter_recurse(&s1ap_iter, &hostname_iter);
ogs_assert(ogs_yaml_iter_type(&hostname_iter) !=
YAML_MAPPING_NODE);
2017-12-08 03:43:35 +00:00
do {
2019-04-27 14:54:30 +00:00
if (ogs_yaml_iter_type(&hostname_iter) ==
YAML_SEQUENCE_NODE) {
2019-04-27 14:54:30 +00:00
if (!ogs_yaml_iter_next(&hostname_iter))
2017-12-08 03:43:35 +00:00
break;
}
2019-04-27 14:54:30 +00:00
ogs_assert(num <= MAX_NUM_OF_HOSTNAME);
2017-12-08 03:43:35 +00:00
hostname[num++] =
2019-04-27 14:54:30 +00:00
ogs_yaml_iter_value(&hostname_iter);
2019-05-29 12:27:22 +00:00
} while (
2019-04-27 14:54:30 +00:00
ogs_yaml_iter_type(&hostname_iter) ==
2017-12-08 03:43:35 +00:00
YAML_SEQUENCE_NODE);
2019-05-29 12:27:22 +00:00
} else if (!strcmp(s1ap_key, "port")) {
2019-04-27 14:54:30 +00:00
const char *v = ogs_yaml_iter_value(&s1ap_iter);
if (v) {
2017-12-08 03:43:35 +00:00
port = atoi(v);
self.s1ap_port = port;
}
2019-05-29 12:27:22 +00:00
} else if (!strcmp(s1ap_key, "dev")) {
2019-04-27 14:54:30 +00:00
dev = ogs_yaml_iter_value(&s1ap_iter);
2019-05-29 12:27:22 +00:00
} else
2019-04-27 14:54:30 +00:00
ogs_warn("unknown key `%s`", s1ap_key);
2017-11-24 15:52:07 +00:00
}
2019-05-29 12:05:42 +00:00
addr = NULL;
for (i = 0; i < num; i++) {
2019-05-29 12:05:42 +00:00
rv = ogs_addaddrinfo(&addr,
2017-12-09 14:07:19 +00:00
family, hostname[i], port, 0);
2019-04-27 14:54:30 +00:00
ogs_assert(rv == OGS_OK);
2017-12-08 03:43:35 +00:00
}
2019-05-29 12:05:42 +00:00
if (addr) {
2019-06-05 12:13:18 +00:00
if (context_self()->config.parameter.no_ipv4 == 0) {
ogs_sockaddr_t *dup = NULL;
rv = ogs_copyaddrinfo(&dup, addr);
ogs_assert(rv == OGS_OK);
2019-05-30 10:58:27 +00:00
ogs_socknode_add(
2019-06-05 12:13:18 +00:00
&self.s1ap_list, AF_INET, dup);
}
2017-12-09 14:07:19 +00:00
2019-06-05 12:13:18 +00:00
if (context_self()->config.parameter.no_ipv6 == 0) {
ogs_sockaddr_t *dup = NULL;
rv = ogs_copyaddrinfo(&dup, addr);
2019-04-27 14:54:30 +00:00
ogs_assert(rv == OGS_OK);
2019-06-05 12:13:18 +00:00
ogs_socknode_add(
&self.s1ap_list6, AF_INET6, dup);
}
2017-12-09 14:07:19 +00:00
2019-05-29 12:05:42 +00:00
ogs_freeaddrinfo(addr);
2017-12-08 03:43:35 +00:00
}
if (dev) {
2019-05-30 10:58:27 +00:00
rv = ogs_socknode_probe(
2019-04-27 14:54:30 +00:00
context_self()->config.parameter.no_ipv4 ?
2017-12-09 14:07:19 +00:00
NULL : &self.s1ap_list,
2019-04-27 14:54:30 +00:00
context_self()->config.parameter.no_ipv6 ?
2017-12-09 14:07:19 +00:00
NULL : &self.s1ap_list6,
dev, self.s1ap_port);
2019-04-27 14:54:30 +00:00
ogs_assert(rv == OGS_OK);
2017-12-08 03:43:35 +00:00
}
2019-05-29 12:27:22 +00:00
} while (ogs_yaml_iter_type(&s1ap_array) ==
YAML_SEQUENCE_NODE);
2017-12-08 03:43:35 +00:00
2019-04-27 14:54:30 +00:00
if (ogs_list_first(&self.s1ap_list) == NULL &&
ogs_list_first(&self.s1ap_list6) == NULL) {
2019-05-30 10:58:27 +00:00
rv = ogs_socknode_probe(
2019-04-27 14:54:30 +00:00
context_self()->config.parameter.no_ipv4 ?
2017-12-08 03:43:35 +00:00
NULL : &self.s1ap_list,
2019-04-27 14:54:30 +00:00
context_self()->config.parameter.no_ipv6 ?
2017-12-08 03:43:35 +00:00
NULL : &self.s1ap_list6,
2017-12-09 14:07:19 +00:00
NULL, self.s1ap_port);
2019-04-27 14:54:30 +00:00
ogs_assert(rv == OGS_OK);
2017-12-08 03:43:35 +00:00
}
2019-05-29 12:27:22 +00:00
} else if (!strcmp(mme_key, "gtpc")) {
2019-04-27 14:54:30 +00:00
ogs_yaml_iter_t gtpc_array, gtpc_iter;
2019-06-02 12:55:24 +00:00
ogs_yaml_iter_recurse(&mme_iter, &gtpc_array);
do {
2017-11-29 00:41:29 +00:00
int family = AF_UNSPEC;
2017-12-04 15:16:34 +00:00
int i, num = 0;
const char *hostname[MAX_NUM_OF_HOSTNAME];
2019-04-27 14:54:30 +00:00
uint16_t port = self.gtpc_port;
2017-12-09 14:07:19 +00:00
const char *dev = NULL;
2019-05-29 12:05:42 +00:00
ogs_sockaddr_t *addr = NULL;
2017-07-14 10:00:26 +00:00
if (ogs_yaml_iter_type(&gtpc_array) ==
YAML_MAPPING_NODE) {
2017-11-29 00:41:29 +00:00
memcpy(&gtpc_iter, &gtpc_array,
2019-04-27 14:54:30 +00:00
sizeof(ogs_yaml_iter_t));
2019-05-29 12:27:22 +00:00
} else if (ogs_yaml_iter_type(&gtpc_array) ==
YAML_SEQUENCE_NODE) {
2019-04-27 14:54:30 +00:00
if (!ogs_yaml_iter_next(&gtpc_array))
2017-11-29 00:41:29 +00:00
break;
2019-04-27 14:54:30 +00:00
ogs_yaml_iter_recurse(&gtpc_array, &gtpc_iter);
2019-05-29 12:27:22 +00:00
} else if (ogs_yaml_iter_type(&gtpc_array) ==
YAML_SCALAR_NODE) {
2017-12-01 12:47:15 +00:00
break;
2019-05-29 12:27:22 +00:00
} else
2019-04-27 14:54:30 +00:00
ogs_assert_if_reached();
2017-07-14 10:00:26 +00:00
2019-05-29 12:27:22 +00:00
while (ogs_yaml_iter_next(&gtpc_iter)) {
2017-11-29 00:41:29 +00:00
const char *gtpc_key =
2019-04-27 14:54:30 +00:00
ogs_yaml_iter_key(&gtpc_iter);
ogs_assert(gtpc_key);
if (!strcmp(gtpc_key, "family")) {
2019-04-27 14:54:30 +00:00
const char *v = ogs_yaml_iter_value(&gtpc_iter);
2017-11-29 00:41:29 +00:00
if (v) family = atoi(v);
if (family != AF_UNSPEC &&
family != AF_INET && family != AF_INET6) {
2019-04-27 14:54:30 +00:00
ogs_warn("Ignore family(%d) : AF_UNSPEC(%d), "
"AF_INET(%d), AF_INET6(%d) ",
family, AF_UNSPEC, AF_INET, AF_INET6);
2017-11-29 00:41:29 +00:00
family = AF_UNSPEC;
}
2019-05-29 12:27:22 +00:00
} else if (!strcmp(gtpc_key, "addr") ||
!strcmp(gtpc_key, "name")) {
2019-04-27 14:54:30 +00:00
ogs_yaml_iter_t hostname_iter;
2019-06-02 12:55:24 +00:00
ogs_yaml_iter_recurse(&gtpc_iter,
&hostname_iter);
2019-04-27 14:54:30 +00:00
ogs_assert(ogs_yaml_iter_type(&hostname_iter) !=
YAML_MAPPING_NODE);
2017-12-04 15:16:34 +00:00
do {
2019-04-27 14:54:30 +00:00
if (ogs_yaml_iter_type(&hostname_iter) ==
YAML_SEQUENCE_NODE) {
2019-04-27 14:54:30 +00:00
if (!ogs_yaml_iter_next(&hostname_iter))
2017-12-04 15:16:34 +00:00
break;
}
2019-04-27 14:54:30 +00:00
ogs_assert(num <= MAX_NUM_OF_HOSTNAME);
2017-12-04 15:16:34 +00:00
hostname[num++] =
2019-04-27 14:54:30 +00:00
ogs_yaml_iter_value(&hostname_iter);
2019-05-29 12:27:22 +00:00
} while (
2019-04-27 14:54:30 +00:00
ogs_yaml_iter_type(&hostname_iter) ==
2017-12-04 15:16:34 +00:00
YAML_SEQUENCE_NODE);
2019-05-29 12:27:22 +00:00
} else if (!strcmp(gtpc_key, "port")) {
2019-04-27 14:54:30 +00:00
const char *v = ogs_yaml_iter_value(&gtpc_iter);
if (v) {
2017-11-29 05:58:26 +00:00
port = atoi(v);
self.gtpc_port = port;
}
2019-05-29 12:27:22 +00:00
} else if (!strcmp(gtpc_key, "dev")) {
2019-04-27 14:54:30 +00:00
dev = ogs_yaml_iter_value(&gtpc_iter);
2019-05-29 12:27:22 +00:00
} else
2019-04-27 14:54:30 +00:00
ogs_warn("unknown key `%s`", gtpc_key);
2017-11-29 00:41:29 +00:00
}
2019-05-29 12:05:42 +00:00
addr = NULL;
for (i = 0; i < num; i++) {
2019-05-29 12:05:42 +00:00
rv = ogs_addaddrinfo(&addr,
2017-12-09 14:07:19 +00:00
family, hostname[i], port, 0);
2019-04-27 14:54:30 +00:00
ogs_assert(rv == OGS_OK);
2017-12-04 15:16:34 +00:00
}
2019-05-29 12:05:42 +00:00
if (addr) {
2019-06-05 12:13:18 +00:00
if (context_self()->config.parameter.no_ipv4 == 0) {
ogs_sockaddr_t *dup = NULL;
rv = ogs_copyaddrinfo(&dup, addr);
ogs_assert(rv == OGS_OK);
2019-05-30 10:58:27 +00:00
ogs_socknode_add(
2019-06-05 12:13:18 +00:00
&self.gtpc_list, AF_INET, dup);
}
2017-12-09 14:07:19 +00:00
2019-06-05 12:13:18 +00:00
if (context_self()->config.parameter.no_ipv6 == 0) {
ogs_sockaddr_t *dup = NULL;
rv = ogs_copyaddrinfo(&dup, addr);
ogs_assert(rv == OGS_OK);
2019-05-30 10:58:27 +00:00
ogs_socknode_add(
2019-06-05 12:13:18 +00:00
&self.gtpc_list6, AF_INET6, dup);
}
2017-12-09 14:07:19 +00:00
2019-05-29 12:05:42 +00:00
ogs_freeaddrinfo(addr);
2017-12-01 12:47:15 +00:00
}
2017-12-05 01:50:31 +00:00
if (dev) {
2019-05-30 10:58:27 +00:00
rv = ogs_socknode_probe(
2019-04-27 14:54:30 +00:00
context_self()->config.parameter.no_ipv4 ?
2017-12-09 14:07:19 +00:00
NULL : &self.gtpc_list,
2019-04-27 14:54:30 +00:00
context_self()->config.parameter.no_ipv6 ?
2017-12-09 14:07:19 +00:00
NULL : &self.gtpc_list6,
dev, self.gtpc_port);
2019-04-27 14:54:30 +00:00
ogs_assert(rv == OGS_OK);
2017-12-01 12:47:15 +00:00
}
2019-05-29 12:27:22 +00:00
} while (ogs_yaml_iter_type(&gtpc_array) ==
YAML_SEQUENCE_NODE);
2017-12-01 12:47:15 +00:00
2019-04-27 14:54:30 +00:00
if (ogs_list_first(&self.gtpc_list) == NULL &&
ogs_list_first(&self.gtpc_list6) == NULL) {
2019-05-30 10:58:27 +00:00
rv = ogs_socknode_probe(
2019-04-27 14:54:30 +00:00
context_self()->config.parameter.no_ipv4 ?
2017-12-04 15:16:34 +00:00
NULL : &self.gtpc_list,
2019-04-27 14:54:30 +00:00
context_self()->config.parameter.no_ipv6 ?
2017-12-04 15:16:34 +00:00
NULL : &self.gtpc_list6,
2017-12-09 14:07:19 +00:00
NULL, self.gtpc_port);
2019-04-27 14:54:30 +00:00
ogs_assert(rv == OGS_OK);
2017-12-01 12:47:15 +00:00
}
2019-06-02 02:09:01 +00:00
} else if (!strcmp(mme_key, "gummei")) {
2019-04-27 14:54:30 +00:00
ogs_yaml_iter_t gummei_array, gummei_iter;
ogs_yaml_iter_recurse(&mme_iter, &gummei_array);
do {
served_gummei_t *gummei = NULL;
2019-04-27 14:54:30 +00:00
ogs_assert(self.max_num_of_served_gummei <=
MAX_NUM_OF_SERVED_GUMMEI);
2017-11-29 00:41:29 +00:00
gummei = &self.served_gummei[
self.max_num_of_served_gummei];
2019-04-27 14:54:30 +00:00
ogs_assert(gummei);
2017-11-29 00:41:29 +00:00
2019-04-27 14:54:30 +00:00
if (ogs_yaml_iter_type(&gummei_array) ==
YAML_MAPPING_NODE) {
2017-11-29 00:41:29 +00:00
memcpy(&gummei_iter, &gummei_array,
2019-04-27 14:54:30 +00:00
sizeof(ogs_yaml_iter_t));
2019-05-29 12:27:22 +00:00
} else if (ogs_yaml_iter_type(&gummei_array) ==
YAML_SEQUENCE_NODE) {
2019-04-27 14:54:30 +00:00
if (!ogs_yaml_iter_next(&gummei_array))
2017-11-29 00:41:29 +00:00
break;
2019-04-27 14:54:30 +00:00
ogs_yaml_iter_recurse(&gummei_array,
2017-11-29 00:41:29 +00:00
&gummei_iter);
2019-05-29 12:27:22 +00:00
} else if (ogs_yaml_iter_type(&gummei_array) ==
YAML_SCALAR_NODE) {
2017-12-01 12:47:15 +00:00
break;
2019-05-29 12:27:22 +00:00
} else
2019-04-27 14:54:30 +00:00
ogs_assert_if_reached();
2017-11-29 00:41:29 +00:00
2019-05-29 12:27:22 +00:00
while (ogs_yaml_iter_next(&gummei_iter)) {
const char *gummei_key =
2019-04-27 14:54:30 +00:00
ogs_yaml_iter_key(&gummei_iter);
ogs_assert(gummei_key);
if (!strcmp(gummei_key, "plmn_id")) {
2019-04-27 14:54:30 +00:00
ogs_yaml_iter_t plmn_id_array, plmn_id_iter;
ogs_yaml_iter_recurse(&gummei_iter,
&plmn_id_array);
do {
2017-11-29 00:41:29 +00:00
plmn_id_t *plmn_id = NULL;
const char *mcc = NULL, *mnc = NULL;
2019-04-27 14:54:30 +00:00
ogs_assert(gummei->num_of_plmn_id <=
MAX_PLMN_ID);
2017-11-29 00:41:29 +00:00
plmn_id = &gummei->plmn_id[
gummei->num_of_plmn_id];
2019-04-27 14:54:30 +00:00
ogs_assert(plmn_id);
2017-11-29 00:41:29 +00:00
2019-04-27 14:54:30 +00:00
if (ogs_yaml_iter_type(&plmn_id_array) ==
YAML_MAPPING_NODE) {
2017-11-29 00:41:29 +00:00
memcpy(&plmn_id_iter, &plmn_id_array,
2019-04-27 14:54:30 +00:00
sizeof(ogs_yaml_iter_t));
2019-05-29 12:27:22 +00:00
} else if (ogs_yaml_iter_type(&plmn_id_array) ==
YAML_SEQUENCE_NODE) {
2019-04-27 14:54:30 +00:00
if (!ogs_yaml_iter_next(&plmn_id_array))
2017-11-29 00:41:29 +00:00
break;
2019-04-27 14:54:30 +00:00
ogs_yaml_iter_recurse(&plmn_id_array,
2017-11-29 00:41:29 +00:00
&plmn_id_iter);
2019-05-29 12:27:22 +00:00
} else if (ogs_yaml_iter_type(&plmn_id_array) ==
YAML_SCALAR_NODE) {
2017-12-01 12:47:15 +00:00
break;
2019-05-29 12:27:22 +00:00
} else
2019-04-27 14:54:30 +00:00
ogs_assert_if_reached();
2019-05-29 12:27:22 +00:00
while (ogs_yaml_iter_next(&plmn_id_iter)) {
2017-11-29 00:41:29 +00:00
const char *plmn_id_key =
2019-04-27 14:54:30 +00:00
ogs_yaml_iter_key(&plmn_id_iter);
ogs_assert(plmn_id_key);
2017-11-29 00:41:29 +00:00
if (!strcmp(plmn_id_key, "mcc"))
2017-07-14 15:00:08 +00:00
{
mcc = ogs_yaml_iter_value(
&plmn_id_iter);
2019-05-29 12:27:22 +00:00
} else if (!strcmp(
plmn_id_key, "mnc")) {
mnc = ogs_yaml_iter_value(
&plmn_id_iter);
2017-07-14 15:00:08 +00:00
}
}
2017-11-29 00:41:29 +00:00
if (mcc && mnc) {
2017-11-29 00:41:29 +00:00
plmn_id_build(plmn_id,
atoi(mcc), atoi(mnc), strlen(mnc));
2017-07-14 15:00:08 +00:00
gummei->num_of_plmn_id++;
}
2017-11-29 00:41:29 +00:00
2019-05-29 12:27:22 +00:00
} while (ogs_yaml_iter_type(&plmn_id_array) ==
2017-11-29 00:41:29 +00:00
YAML_SEQUENCE_NODE);
2019-06-02 12:55:24 +00:00
} else if (!strcmp(gummei_key, "mme_gid")) {
2019-04-27 14:54:30 +00:00
ogs_yaml_iter_t mme_gid_iter;
ogs_yaml_iter_recurse(&gummei_iter, &mme_gid_iter);
ogs_assert(ogs_yaml_iter_type(&mme_gid_iter) !=
YAML_MAPPING_NODE);
do {
2019-04-27 14:54:30 +00:00
uint16_t *mme_gid = NULL;
2017-11-29 00:41:29 +00:00
const char *v = NULL;
2019-04-27 14:54:30 +00:00
ogs_assert(gummei->num_of_mme_gid <=
GRP_PER_MME);
2017-11-29 00:41:29 +00:00
mme_gid = &gummei->mme_gid[
gummei->num_of_mme_gid];
2019-04-27 14:54:30 +00:00
ogs_assert(mme_gid);
2017-11-29 00:41:29 +00:00
2019-04-27 14:54:30 +00:00
if (ogs_yaml_iter_type(&mme_gid_iter) ==
YAML_SEQUENCE_NODE) {
2019-04-27 14:54:30 +00:00
if (!ogs_yaml_iter_next(&mme_gid_iter))
2017-11-29 00:41:29 +00:00
break;
}
2019-04-27 14:54:30 +00:00
v = ogs_yaml_iter_value(&mme_gid_iter);
if (v) {
2017-11-29 00:41:29 +00:00
*mme_gid = atoi(v);
gummei->num_of_mme_gid++;
}
2019-05-29 12:27:22 +00:00
} while (
2019-04-27 14:54:30 +00:00
ogs_yaml_iter_type(&mme_gid_iter) ==
2017-11-29 00:41:29 +00:00
YAML_SEQUENCE_NODE);
2019-06-02 02:09:01 +00:00
} else if (!strcmp(gummei_key, "mme_code")) {
2019-04-27 14:54:30 +00:00
ogs_yaml_iter_t mme_code_iter;
ogs_yaml_iter_recurse(&gummei_iter,
&mme_code_iter);
2019-04-27 14:54:30 +00:00
ogs_assert(ogs_yaml_iter_type(&mme_code_iter) !=
YAML_MAPPING_NODE);
do {
2019-04-27 14:54:30 +00:00
uint8_t *mme_code = NULL;
2017-11-29 00:41:29 +00:00
const char *v = NULL;
2019-04-27 14:54:30 +00:00
ogs_assert(gummei->num_of_mme_code <=
CODE_PER_MME);
2017-11-29 00:41:29 +00:00
mme_code = &gummei->mme_code[
gummei->num_of_mme_code];
2019-04-27 14:54:30 +00:00
ogs_assert(mme_code);
2017-11-29 00:41:29 +00:00
2019-04-27 14:54:30 +00:00
if (ogs_yaml_iter_type(&mme_code_iter) ==
YAML_SEQUENCE_NODE) {
2019-04-27 14:54:30 +00:00
if (!ogs_yaml_iter_next(&mme_code_iter))
2017-11-29 00:41:29 +00:00
break;
}
2019-04-27 14:54:30 +00:00
v = ogs_yaml_iter_value(&mme_code_iter);
if (v) {
2017-11-29 00:41:29 +00:00
*mme_code = atoi(v);
gummei->num_of_mme_code++;
}
2019-05-29 12:27:22 +00:00
} while (
2019-04-27 14:54:30 +00:00
ogs_yaml_iter_type(&mme_code_iter) ==
2017-11-29 00:41:29 +00:00
YAML_SEQUENCE_NODE);
2019-05-29 12:27:22 +00:00
} else
2019-04-27 14:54:30 +00:00
ogs_warn("unknown key `%s`", gummei_key);
2017-07-14 10:00:26 +00:00
}
2017-11-29 00:41:29 +00:00
if (gummei->num_of_plmn_id &&
gummei->num_of_mme_gid && gummei->num_of_mme_code) {
2017-11-29 00:41:29 +00:00
self.max_num_of_served_gummei++;
2019-05-29 12:27:22 +00:00
} else {
2019-04-27 14:54:30 +00:00
ogs_warn("Ignore gummei : "
2017-11-29 00:41:29 +00:00
"plmn_id(%d), mme_gid(%d), mme_code(%d)",
gummei->num_of_plmn_id,
gummei->num_of_mme_gid, gummei->num_of_mme_code);
gummei->num_of_plmn_id = 0;
gummei->num_of_mme_gid = 0;
gummei->num_of_mme_code = 0;
}
2019-05-29 12:27:22 +00:00
} while (ogs_yaml_iter_type(&gummei_array) ==
2017-11-29 00:41:29 +00:00
YAML_SEQUENCE_NODE);
2019-05-29 12:27:22 +00:00
} else if (!strcmp(mme_key, "tai")) {
int num_of_list0 = 0;
tai0_list_t *list0 = NULL;
tai2_list_t *list2 = NULL;
2019-04-27 14:54:30 +00:00
ogs_assert(self.num_of_served_tai <=
MAX_NUM_OF_SERVED_TAI);
list0 = &self.served_tai[self.num_of_served_tai].list0;
2019-04-27 14:54:30 +00:00
ogs_assert(list0);
list2 = &self.served_tai[self.num_of_served_tai].list2;
2019-04-27 14:54:30 +00:00
ogs_assert(list2);
2019-04-27 14:54:30 +00:00
ogs_yaml_iter_t tai_array, tai_iter;
ogs_yaml_iter_recurse(&mme_iter, &tai_array);
do {
const char *mcc = NULL, *mnc = NULL;
2019-04-27 14:54:30 +00:00
uint16_t tac[MAX_NUM_OF_TAI];
int num_of_tac = 0;
if (ogs_yaml_iter_type(&tai_array) ==
YAML_MAPPING_NODE) {
memcpy(&tai_iter, &tai_array,
sizeof(ogs_yaml_iter_t));
2019-05-29 12:27:22 +00:00
} else if (ogs_yaml_iter_type(&tai_array) ==
YAML_SEQUENCE_NODE) {
2019-04-27 14:54:30 +00:00
if (!ogs_yaml_iter_next(&tai_array))
2017-11-29 00:41:29 +00:00
break;
2019-04-27 14:54:30 +00:00
ogs_yaml_iter_recurse(&tai_array,
2017-11-29 00:41:29 +00:00
&tai_iter);
2019-05-29 12:27:22 +00:00
} else if (ogs_yaml_iter_type(&tai_array) ==
YAML_SCALAR_NODE) {
2017-12-01 12:47:15 +00:00
break;
2019-05-29 12:27:22 +00:00
} else
2019-04-27 14:54:30 +00:00
ogs_assert_if_reached();
2019-05-29 12:27:22 +00:00
while (ogs_yaml_iter_next(&tai_iter)) {
2019-04-27 14:54:30 +00:00
const char *tai_key = ogs_yaml_iter_key(&tai_iter);
ogs_assert(tai_key);
if (!strcmp(tai_key, "plmn_id")) {
2019-04-27 14:54:30 +00:00
ogs_yaml_iter_t plmn_id_iter;
2017-11-29 00:41:29 +00:00
2019-04-27 14:54:30 +00:00
ogs_yaml_iter_recurse(&tai_iter, &plmn_id_iter);
2019-05-29 12:27:22 +00:00
while (ogs_yaml_iter_next(&plmn_id_iter)) {
const char *plmn_id_key =
2019-04-27 14:54:30 +00:00
ogs_yaml_iter_key(&plmn_id_iter);
ogs_assert(plmn_id_key);
if (!strcmp(plmn_id_key, "mcc")) {
mcc = ogs_yaml_iter_value(
&plmn_id_iter);
2019-06-02 02:09:01 +00:00
} else if (!strcmp(plmn_id_key, "mnc")) {
mnc = ogs_yaml_iter_value(
&plmn_id_iter);
2017-07-14 15:27:22 +00:00
}
}
2019-05-29 12:27:22 +00:00
} else if (!strcmp(tai_key, "tac")) {
2019-04-27 14:54:30 +00:00
ogs_yaml_iter_t tac_iter;
ogs_yaml_iter_recurse(&tai_iter, &tac_iter);
ogs_assert(ogs_yaml_iter_type(&tac_iter) !=
YAML_MAPPING_NODE);
do {
const char *v = NULL;
2019-04-27 14:54:30 +00:00
ogs_assert(num_of_tac <=
MAX_NUM_OF_TAI);
if (ogs_yaml_iter_type(&tac_iter) ==
YAML_SEQUENCE_NODE) {
2019-04-27 14:54:30 +00:00
if (!ogs_yaml_iter_next(&tac_iter))
break;
}
2019-04-27 14:54:30 +00:00
v = ogs_yaml_iter_value(&tac_iter);
if (v) {
tac[num_of_tac] = atoi(v);
num_of_tac++;
}
2019-05-29 12:27:22 +00:00
} while (
2019-04-27 14:54:30 +00:00
ogs_yaml_iter_type(&tac_iter) ==
YAML_SEQUENCE_NODE);
2019-05-29 12:27:22 +00:00
} else
2019-04-27 14:54:30 +00:00
ogs_warn("unknown key `%s`", tai_key);
2017-07-14 10:00:26 +00:00
}
2017-11-29 00:41:29 +00:00
if (mcc && mnc && num_of_tac) {
if (num_of_tac == 1) {
plmn_id_build(
&list2->tai[list2->num].plmn_id,
atoi(mcc), atoi(mnc), strlen(mnc));
list2->tai[list2->num].tac = tac[0];
list2->num++;
if (list2->num > 1)
list2->type = TAI2_TYPE;
else
list2->type = TAI1_TYPE;
2019-05-29 12:27:22 +00:00
} else if (num_of_tac > 1) {
int i;
plmn_id_build(
&list0->tai[num_of_list0].plmn_id,
atoi(mcc), atoi(mnc), strlen(mnc));
for (i = 0; i < num_of_tac; i++) {
list0->tai[num_of_list0].tac[i] = tac[i];
}
list0->tai[num_of_list0].num = num_of_tac;
list0->tai[num_of_list0].type = TAI0_TYPE;
num_of_list0++;
}
2019-05-29 12:27:22 +00:00
} else {
2019-04-27 14:54:30 +00:00
ogs_warn("Ignore tai : mcc(%p), mnc(%p), "
"num_of_tac(%d)", mcc, mnc, num_of_tac);
2017-11-29 00:41:29 +00:00
}
2019-05-29 12:27:22 +00:00
} while (ogs_yaml_iter_type(&tai_array) ==
2017-11-29 00:41:29 +00:00
YAML_SEQUENCE_NODE);
if (list2->num || num_of_list0) {
self.num_of_served_tai++;
}
2019-05-29 12:27:22 +00:00
} else if (!strcmp(mme_key, "security")) {
2019-04-27 14:54:30 +00:00
ogs_yaml_iter_t security_iter;
ogs_yaml_iter_recurse(&mme_iter, &security_iter);
2019-05-29 12:27:22 +00:00
while (ogs_yaml_iter_next(&security_iter)) {
const char *security_key =
2019-04-27 14:54:30 +00:00
ogs_yaml_iter_key(&security_iter);
ogs_assert(security_key);
if (!strcmp(security_key, "integrity_order")) {
2019-04-27 14:54:30 +00:00
ogs_yaml_iter_t integrity_order_iter;
ogs_yaml_iter_recurse(&security_iter,
2017-11-29 00:41:29 +00:00
&integrity_order_iter);
2019-04-27 14:54:30 +00:00
ogs_assert(ogs_yaml_iter_type(&integrity_order_iter) !=
YAML_MAPPING_NODE);
2017-07-14 10:00:26 +00:00
do {
2017-11-29 00:41:29 +00:00
const char *v = NULL;
2017-07-14 10:00:26 +00:00
2019-04-27 14:54:30 +00:00
if (ogs_yaml_iter_type(&integrity_order_iter) ==
YAML_SEQUENCE_NODE) {
2019-04-27 14:54:30 +00:00
if (!ogs_yaml_iter_next(&integrity_order_iter))
2017-11-29 00:41:29 +00:00
break;
}
2019-04-27 14:54:30 +00:00
v = ogs_yaml_iter_value(&integrity_order_iter);
if (v) {
2017-11-29 00:41:29 +00:00
int integrity_index =
self.num_of_integrity_order;
if (strcmp(v, "EIA0") == 0) {
self.integrity_order[integrity_index] =
2017-07-14 11:46:15 +00:00
NAS_SECURITY_ALGORITHMS_EIA0;
self.num_of_integrity_order++;
2019-05-29 12:27:22 +00:00
} else if (strcmp(v, "EIA1") == 0) {
self.integrity_order[integrity_index] =
2017-07-14 11:46:15 +00:00
NAS_SECURITY_ALGORITHMS_128_EIA1;
self.num_of_integrity_order++;
2019-05-29 12:27:22 +00:00
} else if (strcmp(v, "EIA2") == 0) {
self.integrity_order[integrity_index] =
2017-07-14 11:46:15 +00:00
NAS_SECURITY_ALGORITHMS_128_EIA2;
self.num_of_integrity_order++;
2019-05-29 12:27:22 +00:00
} else if (strcmp(v, "EIA3") == 0) {
self.integrity_order[integrity_index] =
2017-07-14 11:46:15 +00:00
NAS_SECURITY_ALGORITHMS_128_EIA3;
self.num_of_integrity_order++;
}
}
2019-05-29 12:27:22 +00:00
} while (
2019-04-27 14:54:30 +00:00
ogs_yaml_iter_type(&integrity_order_iter) ==
2017-11-29 00:41:29 +00:00
YAML_SEQUENCE_NODE);
2019-05-29 12:27:22 +00:00
} else if (!strcmp(security_key, "ciphering_order")) {
2019-04-27 14:54:30 +00:00
ogs_yaml_iter_t ciphering_order_iter;
ogs_yaml_iter_recurse(&security_iter,
2017-11-29 00:41:29 +00:00
&ciphering_order_iter);
2019-04-27 14:54:30 +00:00
ogs_assert(ogs_yaml_iter_type(&ciphering_order_iter) !=
YAML_MAPPING_NODE);
2017-07-14 10:00:26 +00:00
do {
2017-11-29 00:41:29 +00:00
const char *v = NULL;
2017-07-14 10:00:26 +00:00
2019-04-27 14:54:30 +00:00
if (ogs_yaml_iter_type(&ciphering_order_iter) ==
YAML_SEQUENCE_NODE) {
2019-04-27 14:54:30 +00:00
if (!ogs_yaml_iter_next(&ciphering_order_iter))
2017-11-29 00:41:29 +00:00
break;
}
2019-04-27 14:54:30 +00:00
v = ogs_yaml_iter_value(&ciphering_order_iter);
if (v) {
2017-11-29 00:41:29 +00:00
int ciphering_index =
self.num_of_ciphering_order;
if (strcmp(v, "EEA0") == 0) {
self.ciphering_order[ciphering_index] =
2017-07-14 11:46:15 +00:00
NAS_SECURITY_ALGORITHMS_EEA0;
self.num_of_ciphering_order++;
2019-05-29 12:27:22 +00:00
} else if (strcmp(v, "EEA1") == 0) {
self.ciphering_order[ciphering_index] =
2017-07-14 11:46:15 +00:00
NAS_SECURITY_ALGORITHMS_128_EEA1;
self.num_of_ciphering_order++;
2019-05-29 12:27:22 +00:00
} else if (strcmp(v, "EEA2") == 0) {
self.ciphering_order[ciphering_index] =
2017-07-14 11:46:15 +00:00
NAS_SECURITY_ALGORITHMS_128_EEA2;
self.num_of_ciphering_order++;
2019-05-29 12:27:22 +00:00
} else if (strcmp(v, "EEA3") == 0) {
self.ciphering_order[ciphering_index] =
2017-07-14 11:46:15 +00:00
NAS_SECURITY_ALGORITHMS_128_EEA3;
self.num_of_ciphering_order++;
}
}
2019-05-29 12:27:22 +00:00
} while (
2019-04-27 14:54:30 +00:00
ogs_yaml_iter_type(&ciphering_order_iter) ==
2017-11-29 00:41:29 +00:00
YAML_SEQUENCE_NODE);
2017-07-14 10:00:26 +00:00
}
}
2019-06-02 12:55:24 +00:00
} else if (!strcmp(mme_key, "network_name")) {
2019-04-27 14:54:30 +00:00
ogs_yaml_iter_t network_name_iter;
ogs_yaml_iter_recurse(&mme_iter, &network_name_iter);
2019-05-29 12:27:22 +00:00
while (ogs_yaml_iter_next(&network_name_iter)) {
const char *network_name_key =
2019-04-27 14:54:30 +00:00
ogs_yaml_iter_key(&network_name_iter);
ogs_assert(network_name_key);
if (!strcmp(network_name_key, "full")) {
nas_network_name_t *network_full_name =
&self.full_name;
const char *c_network_name =
2019-04-27 14:54:30 +00:00
ogs_yaml_iter_value(&network_name_iter);
uint8_t size = strlen(c_network_name);
uint8_t i;
for (i = 0;i<size;i++) {
/* Workaround to convert the ASCII to USC-2 */
network_full_name->name[i*2] = 0;
network_full_name->name[(i*2)+1] =
c_network_name[i];
}
network_full_name->length = size*2+1;
network_full_name->coding_scheme = 1;
2019-05-29 12:27:22 +00:00
} else if (!strcmp(network_name_key, "short")) {
nas_network_name_t *network_short_name =
&self.short_name;
const char *c_network_name =
2019-04-27 14:54:30 +00:00
ogs_yaml_iter_value(&network_name_iter);
uint8_t size = strlen(c_network_name);
uint8_t i;
for (i = 0;i<size;i++) {
/* Workaround to convert the ASCII to USC-2 */
network_short_name->name[i*2] = 0;
network_short_name->name[(i*2)+1] =
c_network_name[i];
}
network_short_name->length = size*2+1;
network_short_name->coding_scheme = 1;
}
}
2019-06-02 12:55:24 +00:00
} else if (!strcmp(mme_key, "sgsap")) {
ogs_yaml_iter_t sgsap_array, sgsap_iter;
ogs_yaml_iter_recurse(&mme_iter, &sgsap_array);
do {
mme_vlr_t *vlr = NULL;
2019-06-05 13:23:45 +00:00
plmn_id_t plmn_id;
const char *mcc = NULL, *mnc = NULL;
const char *tac = NULL, *lac = NULL;
2019-06-02 12:55:24 +00:00
ogs_sockaddr_t *addr = NULL;
int family = AF_UNSPEC;
int i, num = 0;
const char *hostname[MAX_NUM_OF_HOSTNAME];
uint16_t port = self.sgsap_port;
if (ogs_yaml_iter_type(&sgsap_array) ==
YAML_MAPPING_NODE) {
memcpy(&sgsap_iter, &sgsap_array,
sizeof(ogs_yaml_iter_t));
} else if (ogs_yaml_iter_type(&sgsap_array) ==
YAML_SEQUENCE_NODE) {
if (!ogs_yaml_iter_next(&sgsap_array))
break;
ogs_yaml_iter_recurse(&sgsap_array, &sgsap_iter);
} else if (ogs_yaml_iter_type(&sgsap_array) ==
YAML_SCALAR_NODE) {
break;
} else
ogs_assert_if_reached();
while (ogs_yaml_iter_next(&sgsap_iter)) {
const char *sgsap_key =
ogs_yaml_iter_key(&sgsap_iter);
ogs_assert(sgsap_key);
if (!strcmp(sgsap_key, "family")) {
const char *v =
ogs_yaml_iter_value(&sgsap_iter);
if (v) family = atoi(v);
if (family != AF_UNSPEC &&
family != AF_INET && family != AF_INET6) {
ogs_warn("Ignore family(%d) : AF_UNSPEC(%d), "
"AF_INET(%d), AF_INET6(%d) ",
family, AF_UNSPEC, AF_INET, AF_INET6);
family = AF_UNSPEC;
}
} else if (!strcmp(sgsap_key, "addr") ||
!strcmp(sgsap_key, "name")) {
ogs_yaml_iter_t hostname_iter;
ogs_yaml_iter_recurse(&sgsap_iter,
&hostname_iter);
ogs_assert(ogs_yaml_iter_type(&hostname_iter) !=
YAML_MAPPING_NODE);
do {
if (ogs_yaml_iter_type(&hostname_iter) ==
YAML_SEQUENCE_NODE) {
if (!ogs_yaml_iter_next(&hostname_iter))
break;
}
ogs_assert(num <= MAX_NUM_OF_HOSTNAME);
hostname[num++] =
ogs_yaml_iter_value(&hostname_iter);
} while (
ogs_yaml_iter_type(&hostname_iter) ==
YAML_SEQUENCE_NODE);
} else if (!strcmp(sgsap_key, "port")) {
2019-06-05 13:23:45 +00:00
const char *v =
ogs_yaml_iter_value(&sgsap_iter);
2019-06-02 12:55:24 +00:00
if (v) {
port = atoi(v);
self.sgsap_port = port;
}
2019-06-05 13:23:45 +00:00
} else if (!strcmp(sgsap_key, "plmn_id")) {
ogs_yaml_iter_t plmn_id_iter;
ogs_yaml_iter_recurse(&sgsap_iter,
&plmn_id_iter);
while (ogs_yaml_iter_next(&plmn_id_iter)) {
const char *plmn_id_key =
ogs_yaml_iter_key(&plmn_id_iter);
ogs_assert(plmn_id_key);
if (!strcmp(plmn_id_key, "mcc")) {
mcc =
ogs_yaml_iter_value(&plmn_id_iter);
} else if (!strcmp(plmn_id_key, "mnc")) {
mnc =
ogs_yaml_iter_value(&plmn_id_iter);
2019-06-02 12:55:24 +00:00
} else
2019-06-05 13:23:45 +00:00
ogs_warn("unknown key `%s`",
plmn_id_key);
2019-06-02 12:55:24 +00:00
}
2019-06-05 13:23:45 +00:00
} else if (!strcmp(sgsap_key, "tac")) {
tac = ogs_yaml_iter_value(&sgsap_iter);
} else if (!strcmp(sgsap_key, "lac")) {
lac = ogs_yaml_iter_value(&sgsap_iter);
2019-06-02 12:55:24 +00:00
} else
ogs_warn("unknown key `%s`", sgsap_key);
}
2019-06-05 13:23:45 +00:00
if (!mcc || !mnc || !tac || !lac) {
2019-06-02 12:55:24 +00:00
ogs_error("sgsap.tai configuration failed"
2019-06-05 13:23:45 +00:00
" - (mcc:%p, mnc:%p, tac:%p, lac:%p)",
mcc, mnc, tac, lac);
2019-06-02 12:55:24 +00:00
return OGS_ERROR;
}
addr = NULL;
for (i = 0; i < num; i++) {
rv = ogs_addaddrinfo(&addr,
family, hostname[i], port, 0);
ogs_assert(rv == OGS_OK);
}
2019-06-05 13:23:45 +00:00
ogs_filter_ip_version(&addr,
context_self()->config.parameter.no_ipv4,
context_self()->config.parameter.no_ipv6,
context_self()->config.parameter.prefer_ipv4);
2019-06-02 12:55:24 +00:00
2019-06-05 13:23:45 +00:00
vlr = mme_vlr_add(addr);
ogs_assert(vlr);
2019-06-02 12:55:24 +00:00
2019-06-05 13:23:45 +00:00
plmn_id_build(&plmn_id,
atoi(mcc), atoi(mnc), strlen(mnc));
2019-06-16 06:40:26 +00:00
nas_from_plmn_id(&vlr->tai.plmn_id, &plmn_id);
vlr->tai.tac = atoi(tac);
nas_from_plmn_id(&vlr->lai.plmn_id, &plmn_id);
vlr->lai.lac = atoi(lac);
2019-06-02 12:55:24 +00:00
} while (ogs_yaml_iter_type(&sgsap_array) ==
YAML_SEQUENCE_NODE);
2019-05-29 12:27:22 +00:00
} else
2019-04-27 14:54:30 +00:00
ogs_warn("unknown key `%s`", mme_key);
2017-07-14 10:00:26 +00:00
}
2019-05-29 12:27:22 +00:00
} else if (!strcmp(root_key, "sgw")) {
2019-06-02 12:55:24 +00:00
ogs_yaml_iter_t sgw_iter;
ogs_yaml_iter_recurse(&root_iter, &sgw_iter);
while (ogs_yaml_iter_next(&sgw_iter)) {
const char *mme_key = ogs_yaml_iter_key(&sgw_iter);
2019-04-27 14:54:30 +00:00
ogs_assert(mme_key);
if (!strcmp(mme_key, "gtpc")) {
2019-04-27 14:54:30 +00:00
ogs_yaml_iter_t gtpc_array, gtpc_iter;
2019-06-02 12:55:24 +00:00
ogs_yaml_iter_recurse(&sgw_iter, &gtpc_array);
do {
mme_sgw_t *sgw = NULL;
2019-06-02 12:55:24 +00:00
ogs_sockaddr_t *addr = NULL;
2017-11-29 00:41:29 +00:00
int family = AF_UNSPEC;
2017-12-05 01:50:31 +00:00
int i, num = 0;
const char *hostname[MAX_NUM_OF_HOSTNAME];
2019-04-27 14:54:30 +00:00
uint16_t port = self.gtpc_port;
uint16_t tac[MAX_NUM_OF_TAI] = {0,};
uint8_t num_of_tac = 0;
if (ogs_yaml_iter_type(&gtpc_array) ==
YAML_MAPPING_NODE) {
2017-11-29 00:41:29 +00:00
memcpy(&gtpc_iter, &gtpc_array,
2019-04-27 14:54:30 +00:00
sizeof(ogs_yaml_iter_t));
2019-05-29 12:27:22 +00:00
} else if (ogs_yaml_iter_type(&gtpc_array) ==
YAML_SEQUENCE_NODE) {
2019-04-27 14:54:30 +00:00
if (!ogs_yaml_iter_next(&gtpc_array))
2017-11-29 00:41:29 +00:00
break;
2019-04-27 14:54:30 +00:00
ogs_yaml_iter_recurse(&gtpc_array, &gtpc_iter);
2019-05-29 12:27:22 +00:00
} else if (ogs_yaml_iter_type(&gtpc_array) ==
YAML_SCALAR_NODE) {
2017-12-01 12:47:15 +00:00
break;
2019-05-29 12:27:22 +00:00
} else
2019-04-27 14:54:30 +00:00
ogs_assert_if_reached();
2017-07-14 10:00:26 +00:00
2019-05-29 12:27:22 +00:00
while (ogs_yaml_iter_next(&gtpc_iter)) {
2017-11-29 00:41:29 +00:00
const char *gtpc_key =
2019-04-27 14:54:30 +00:00
ogs_yaml_iter_key(&gtpc_iter);
ogs_assert(gtpc_key);
2019-05-29 12:27:22 +00:00
if (!strcmp(gtpc_key, "family")) {
2019-04-27 14:54:30 +00:00
const char *v = ogs_yaml_iter_value(&gtpc_iter);
2017-11-29 00:41:29 +00:00
if (v) family = atoi(v);
if (family != AF_UNSPEC &&
family != AF_INET && family != AF_INET6) {
2019-04-27 14:54:30 +00:00
ogs_warn("Ignore family(%d) : AF_UNSPEC(%d), "
"AF_INET(%d), AF_INET6(%d) ",
family, AF_UNSPEC, AF_INET, AF_INET6);
2017-11-29 00:41:29 +00:00
family = AF_UNSPEC;
}
2019-05-29 12:27:22 +00:00
} else if (!strcmp(gtpc_key, "addr") ||
!strcmp(gtpc_key, "name")) {
2019-04-27 14:54:30 +00:00
ogs_yaml_iter_t hostname_iter;
ogs_yaml_iter_recurse(&gtpc_iter,
&hostname_iter);
2019-04-27 14:54:30 +00:00
ogs_assert(ogs_yaml_iter_type(&hostname_iter) !=
YAML_MAPPING_NODE);
2017-12-05 01:50:31 +00:00
do {
2019-04-27 14:54:30 +00:00
if (ogs_yaml_iter_type(&hostname_iter) ==
YAML_SEQUENCE_NODE) {
2019-04-27 14:54:30 +00:00
if (!ogs_yaml_iter_next(&hostname_iter))
2017-12-05 01:50:31 +00:00
break;
}
2019-04-27 14:54:30 +00:00
ogs_assert(num <= MAX_NUM_OF_HOSTNAME);
2017-12-05 01:50:31 +00:00
hostname[num++] =
2019-04-27 14:54:30 +00:00
ogs_yaml_iter_value(&hostname_iter);
2019-05-29 12:27:22 +00:00
} while (
2019-04-27 14:54:30 +00:00
ogs_yaml_iter_type(&hostname_iter) ==
2017-12-05 01:50:31 +00:00
YAML_SEQUENCE_NODE);
2019-05-29 12:27:22 +00:00
} else if (!strcmp(gtpc_key, "port")) {
2019-04-27 14:54:30 +00:00
const char *v = ogs_yaml_iter_value(&gtpc_iter);
2017-11-29 00:41:29 +00:00
if (v) port = atoi(v);
2019-05-29 12:27:22 +00:00
} else if (!strcmp(gtpc_key, "tac")) {
2019-04-27 14:54:30 +00:00
ogs_yaml_iter_t tac_iter;
ogs_yaml_iter_recurse(&gtpc_iter, &tac_iter);
ogs_assert(ogs_yaml_iter_type(&tac_iter) !=
YAML_MAPPING_NODE);
2018-09-23 05:29:19 +00:00
do {
2018-09-23 05:29:19 +00:00
const char *v = NULL;
2019-04-27 14:54:30 +00:00
ogs_assert(num_of_tac <=
MAX_NUM_OF_TAI);
if (ogs_yaml_iter_type(&tac_iter) ==
YAML_SEQUENCE_NODE) {
2019-04-27 14:54:30 +00:00
if (!ogs_yaml_iter_next(&tac_iter))
2018-09-23 05:29:19 +00:00
break;
}
2019-04-27 14:54:30 +00:00
v = ogs_yaml_iter_value(&tac_iter);
if (v) {
2018-09-23 05:29:19 +00:00
tac[num_of_tac] = atoi(v);
num_of_tac++;
}
2019-05-29 12:27:22 +00:00
} while (
2019-04-27 14:54:30 +00:00
ogs_yaml_iter_type(&tac_iter) ==
2018-09-23 05:29:19 +00:00
YAML_SEQUENCE_NODE);
2019-05-29 12:27:22 +00:00
} else
2019-04-27 14:54:30 +00:00
ogs_warn("unknown key `%s`", gtpc_key);
2017-07-14 10:00:26 +00:00
}
2019-06-02 12:55:24 +00:00
addr = NULL;
for (i = 0; i < num; i++) {
2019-06-02 12:55:24 +00:00
rv = ogs_addaddrinfo(&addr,
2017-12-09 14:07:19 +00:00
family, hostname[i], port, 0);
2019-04-27 14:54:30 +00:00
ogs_assert(rv == OGS_OK);
2017-12-05 01:50:31 +00:00
}
2017-12-02 05:17:32 +00:00
2019-06-05 12:21:19 +00:00
ogs_filter_ip_version(&addr,
2019-04-27 14:54:30 +00:00
context_self()->config.parameter.no_ipv4,
context_self()->config.parameter.no_ipv6,
context_self()->config.parameter.prefer_ipv4);
2019-06-05 12:21:19 +00:00
sgw = mme_sgw_add(addr);
ogs_assert(sgw);
2019-06-05 12:13:18 +00:00
2018-09-23 05:29:19 +00:00
sgw->num_of_tac = num_of_tac;
if (num_of_tac != 0)
memcpy(sgw->tac, tac, sizeof(sgw->tac));
2019-05-29 12:27:22 +00:00
} while (ogs_yaml_iter_type(&gtpc_array) ==
YAML_SEQUENCE_NODE);
} else if(!strcmp(mme_key, "selection_mode")) {
2018-09-23 05:29:19 +00:00
const char *selection_mode =
2019-06-02 12:55:24 +00:00
ogs_yaml_iter_value(&sgw_iter);
2018-09-23 05:29:19 +00:00
if (!strcmp(selection_mode, "rr"))
self.sgw_selection = SGW_SELECT_RR;
else if (!strcmp(selection_mode, "tac"))
self.sgw_selection = SGW_SELECT_TAC;
else
2019-04-27 14:54:30 +00:00
ogs_warn("unknown sgw_selection mode `%s`",
2018-09-23 05:29:19 +00:00
selection_mode);
}
2017-08-28 12:47:32 +00:00
}
2019-05-29 12:27:22 +00:00
} else if (!strcmp(root_key, "pgw")) {
2019-06-02 12:55:24 +00:00
ogs_yaml_iter_t pgw_iter;
ogs_yaml_iter_recurse(&root_iter, &pgw_iter);
while (ogs_yaml_iter_next(&pgw_iter)) {
const char *mme_key = ogs_yaml_iter_key(&pgw_iter);
2019-04-27 14:54:30 +00:00
ogs_assert(mme_key);
if (!strcmp(mme_key, "gtpc")) {
2019-04-27 14:54:30 +00:00
ogs_yaml_iter_t gtpc_array, gtpc_iter;
2019-06-02 12:55:24 +00:00
ogs_yaml_iter_recurse(&pgw_iter, &gtpc_array);
do {
mme_pgw_t *pgw = NULL;
2019-06-02 12:55:24 +00:00
ogs_sockaddr_t *addr = NULL;
2017-11-29 00:41:29 +00:00
int family = AF_UNSPEC;
2017-12-05 01:50:31 +00:00
int i, num = 0;
const char *hostname[MAX_NUM_OF_HOSTNAME];
const char *apn = NULL;
2019-04-27 14:54:30 +00:00
uint16_t port = self.gtpc_port;
2017-08-28 12:47:32 +00:00
if (ogs_yaml_iter_type(&gtpc_array) ==
YAML_MAPPING_NODE) {
2017-11-29 00:41:29 +00:00
memcpy(&gtpc_iter, &gtpc_array,
2019-04-27 14:54:30 +00:00
sizeof(ogs_yaml_iter_t));
2019-05-29 12:27:22 +00:00
} else if (ogs_yaml_iter_type(&gtpc_array) ==
YAML_SEQUENCE_NODE) {
2019-04-27 14:54:30 +00:00
if (!ogs_yaml_iter_next(&gtpc_array))
2017-11-29 00:41:29 +00:00
break;
2019-04-27 14:54:30 +00:00
ogs_yaml_iter_recurse(&gtpc_array, &gtpc_iter);
2019-05-29 12:27:22 +00:00
} else if (ogs_yaml_iter_type(&gtpc_array) ==
YAML_SCALAR_NODE) {
2017-12-01 12:47:15 +00:00
break;
2019-05-29 12:27:22 +00:00
} else
2019-04-27 14:54:30 +00:00
ogs_assert_if_reached();
2017-07-14 10:00:26 +00:00
2019-05-29 12:27:22 +00:00
while (ogs_yaml_iter_next(&gtpc_iter)) {
2017-11-29 00:41:29 +00:00
const char *gtpc_key =
2019-04-27 14:54:30 +00:00
ogs_yaml_iter_key(&gtpc_iter);
ogs_assert(gtpc_key);
if (!strcmp(gtpc_key, "family")) {
2019-04-27 14:54:30 +00:00
const char *v = ogs_yaml_iter_value(&gtpc_iter);
2017-11-29 00:41:29 +00:00
if (v) family = atoi(v);
if (family != AF_UNSPEC &&
family != AF_INET && family != AF_INET6) {
2019-04-27 14:54:30 +00:00
ogs_warn("Ignore family(%d) : AF_UNSPEC(%d), "
"AF_INET(%d), AF_INET6(%d) ",
family, AF_UNSPEC, AF_INET, AF_INET6);
2017-11-29 00:41:29 +00:00
family = AF_UNSPEC;
}
2019-05-29 12:27:22 +00:00
} else if (!strcmp(gtpc_key, "addr") ||
!strcmp(gtpc_key, "name")) {
2019-04-27 14:54:30 +00:00
ogs_yaml_iter_t hostname_iter;
ogs_yaml_iter_recurse(&gtpc_iter, &hostname_iter);
ogs_assert(ogs_yaml_iter_type(&hostname_iter) !=
YAML_MAPPING_NODE);
2017-12-05 01:50:31 +00:00
do {
2019-04-27 14:54:30 +00:00
if (ogs_yaml_iter_type(&hostname_iter) ==
YAML_SEQUENCE_NODE) {
2019-04-27 14:54:30 +00:00
if (!ogs_yaml_iter_next(&hostname_iter))
2017-12-05 01:50:31 +00:00
break;
}
2019-04-27 14:54:30 +00:00
ogs_assert(num <= MAX_NUM_OF_HOSTNAME);
2017-12-05 01:50:31 +00:00
hostname[num++] =
2019-04-27 14:54:30 +00:00
ogs_yaml_iter_value(&hostname_iter);
2019-05-29 12:27:22 +00:00
} while (
2019-04-27 14:54:30 +00:00
ogs_yaml_iter_type(&hostname_iter) ==
2017-12-05 01:50:31 +00:00
YAML_SEQUENCE_NODE);
2019-05-29 12:27:22 +00:00
} else if (!strcmp(gtpc_key, "port")) {
2019-04-27 14:54:30 +00:00
const char *v = ogs_yaml_iter_value(&gtpc_iter);
2017-12-03 08:00:11 +00:00
if (v) port = atoi(v);
2019-05-29 12:27:22 +00:00
} else if (!strcmp(gtpc_key, "apn")) {
apn = ogs_yaml_iter_value(&gtpc_iter);
2019-05-29 12:27:22 +00:00
} else
2019-04-27 14:54:30 +00:00
ogs_warn("unknown key `%s`", gtpc_key);
2017-11-27 11:23:16 +00:00
}
2019-06-02 12:55:24 +00:00
addr = NULL;
for (i = 0; i < num; i++) {
2019-06-02 12:55:24 +00:00
rv = ogs_addaddrinfo(&addr,
2017-12-09 14:07:19 +00:00
family, hostname[i], port, 0);
2019-04-27 14:54:30 +00:00
ogs_assert(rv == OGS_OK);
2017-12-05 01:50:31 +00:00
}
2017-12-03 08:00:11 +00:00
2019-06-05 12:21:19 +00:00
ogs_filter_ip_version(&addr,
2019-04-27 14:54:30 +00:00
context_self()->config.parameter.no_ipv4,
context_self()->config.parameter.no_ipv6,
context_self()->config.parameter.prefer_ipv4);
2019-06-05 12:21:19 +00:00
pgw = mme_pgw_add(addr);
ogs_assert(pgw);
2017-12-05 01:50:31 +00:00
2019-06-05 12:13:18 +00:00
pgw->apn = apn;
2017-12-05 01:50:31 +00:00
2019-05-29 12:27:22 +00:00
} while (ogs_yaml_iter_type(&gtpc_array) ==
YAML_SEQUENCE_NODE);
2017-11-27 11:23:16 +00:00
}
}
}
}
2017-07-14 11:04:11 +00:00
rv = mme_context_validation();
2019-04-27 14:54:30 +00:00
if (rv != OGS_OK) return rv;
2017-07-31 14:12:13 +00:00
2019-04-27 14:54:30 +00:00
return OGS_OK;
2017-07-31 13:35:25 +00:00
}
2019-06-05 12:13:18 +00:00
mme_sgw_t *mme_sgw_add(ogs_sockaddr_t *addr)
{
mme_sgw_t *sgw = NULL;
2019-06-05 12:13:18 +00:00
ogs_assert(addr);
2019-04-27 14:54:30 +00:00
ogs_pool_alloc(&mme_sgw_pool, &sgw);
ogs_assert(sgw);
2018-09-23 05:29:19 +00:00
memset(sgw, 0, sizeof *sgw);
2019-06-05 12:13:18 +00:00
sgw->node = gtp_node_new(addr);
ogs_assert(sgw->node);
2019-04-27 14:54:30 +00:00
ogs_list_add(&self.sgw_list, sgw);
return sgw;
}
2019-05-30 10:58:27 +00:00
void mme_sgw_remove(mme_sgw_t *sgw)
{
2019-04-27 14:54:30 +00:00
ogs_assert(sgw);
2019-04-27 14:54:30 +00:00
ogs_list_remove(&self.sgw_list, sgw);
2019-06-05 12:13:18 +00:00
gtp_node_free(sgw->node);
2019-04-27 14:54:30 +00:00
ogs_pool_free(&mme_sgw_pool, sgw);
}
2019-04-27 14:54:30 +00:00
void mme_sgw_remove_all()
{
mme_sgw_t *sgw = NULL, *next_sgw = NULL;
2019-04-27 14:54:30 +00:00
ogs_list_for_each_safe(&self.sgw_list, next_sgw, sgw)
mme_sgw_remove(sgw);
}
2019-06-05 12:13:18 +00:00
mme_pgw_t *mme_pgw_add(ogs_sockaddr_t *addr)
{
mme_pgw_t *pgw = NULL;
2019-06-05 12:13:18 +00:00
ogs_assert(addr);
2019-04-27 14:54:30 +00:00
ogs_pool_alloc(&mme_pgw_pool, &pgw);
ogs_assert(pgw);
2019-06-05 12:13:18 +00:00
pgw->node = gtp_node_new(addr);
ogs_assert(pgw->node);
2019-04-27 14:54:30 +00:00
ogs_list_add(&self.pgw_list, pgw);
return pgw;
}
2019-05-30 10:58:27 +00:00
void mme_pgw_remove(mme_pgw_t *pgw)
{
2019-04-27 14:54:30 +00:00
ogs_assert(pgw);
2019-04-27 14:54:30 +00:00
ogs_list_remove(&self.pgw_list, pgw);
2019-06-05 12:13:18 +00:00
gtp_node_free(pgw->node);
2019-04-27 14:54:30 +00:00
ogs_pool_free(&mme_pgw_pool, pgw);
}
2019-04-27 14:54:30 +00:00
void mme_pgw_remove_all()
{
mme_pgw_t *pgw = NULL, *next_pgw = NULL;
2019-04-27 14:54:30 +00:00
ogs_list_for_each_safe(&self.pgw_list, next_pgw, pgw)
mme_pgw_remove(pgw);
}
ogs_sockaddr_t *mme_pgw_addr_find_by_apn(
ogs_list_t *list, int family, char *apn)
{
mme_pgw_t *pgw = NULL;
ogs_assert(list);
ogs_list_for_each(list, pgw) {
2019-06-05 12:13:18 +00:00
ogs_assert(pgw->node);
ogs_sockaddr_t *addr = pgw->node->addr;
2019-05-29 12:27:22 +00:00
while (addr) {
2019-05-30 04:50:53 +00:00
if (addr->ogs_sa_family == family &&
(!apn || (pgw->apn && !strcmp(apn, pgw->apn)))) {
return addr;
}
addr = addr->next;
}
}
return NULL;
}
2019-06-05 13:07:37 +00:00
mme_vlr_t *mme_vlr_add(ogs_sockaddr_t *addr)
2019-06-02 12:55:24 +00:00
{
mme_vlr_t *vlr = NULL;
2019-06-05 12:13:18 +00:00
ogs_assert(addr);
2019-06-02 12:55:24 +00:00
ogs_pool_alloc(&mme_vlr_pool, &vlr);
ogs_assert(vlr);
memset(vlr, 0, sizeof *vlr);
2019-06-05 13:23:45 +00:00
vlr->node = ogs_socknode_new(addr);
ogs_assert(vlr->node);
2019-06-02 12:55:24 +00:00
ogs_list_add(&self.vlr_list, vlr);
return vlr;
}
void mme_vlr_remove(mme_vlr_t *vlr)
{
ogs_assert(vlr);
ogs_list_remove(&self.vlr_list, vlr);
2019-06-05 13:23:45 +00:00
ogs_socknode_free(vlr->node);
2019-06-16 08:33:45 +00:00
2019-06-02 12:55:24 +00:00
ogs_pool_free(&mme_vlr_pool, vlr);
}
void mme_vlr_remove_all()
{
mme_vlr_t *vlr = NULL, *next_vlr = NULL;
ogs_list_for_each_safe(&self.vlr_list, next_vlr, vlr)
mme_vlr_remove(vlr);
}
2019-06-16 06:40:26 +00:00
mme_vlr_t *mme_vlr_find_by_tai(nas_tai_t *tai)
{
mme_vlr_t *vlr = NULL;
ogs_assert(tai);
ogs_list_for_each(&self.vlr_list, vlr) {
if (memcmp(&vlr->tai, tai, sizeof *tai) == 0)
return vlr;
}
return NULL;
}
mme_vlr_t *mme_vlr_find_by_lai(nas_lai_t *lai)
{
mme_vlr_t *vlr = NULL;
ogs_assert(lai);
ogs_list_for_each(&self.vlr_list, vlr) {
if (memcmp(&vlr->lai, lai, sizeof *lai) == 0)
return vlr;
}
return NULL;
}
2019-04-27 14:54:30 +00:00
mme_enb_t *mme_enb_add(ogs_sock_t *sock, ogs_sockaddr_t *addr)
2017-02-13 04:19:53 +00:00
{
2017-04-06 11:10:00 +00:00
mme_enb_t *enb = NULL;
2019-04-27 14:54:30 +00:00
mme_event_t e;
2017-02-13 04:19:53 +00:00
2019-04-27 14:54:30 +00:00
ogs_assert(sock);
ogs_assert(addr);
2017-11-24 02:49:37 +00:00
2019-04-27 14:54:30 +00:00
ogs_pool_alloc(&mme_enb_pool, &enb);
ogs_assert(enb);
2017-04-11 00:19:33 +00:00
enb->sock = sock;
2017-11-24 02:49:37 +00:00
enb->addr = addr;
2017-11-24 10:03:48 +00:00
enb->sock_type = mme_enb_sock_type(enb->sock);
2017-11-24 02:49:37 +00:00
2019-06-16 07:47:20 +00:00
enb->max_num_of_ostreams = DEFAULT_SCTP_MAX_NUM_OF_OSTREAMS;
2019-05-31 07:33:09 +00:00
if (context_self()->config.sockopt.sctp.max_num_of_ostreams) {
2019-06-16 07:47:20 +00:00
enb->max_num_of_ostreams =
2019-05-31 07:33:09 +00:00
context_self()->config.sockopt.sctp.max_num_of_ostreams;
2019-06-16 07:47:20 +00:00
ogs_info("[ENB] max_num_of_ostreams : %d", enb->max_num_of_ostreams);
2019-05-31 07:33:09 +00:00
}
2019-04-27 14:54:30 +00:00
ogs_list_init(&enb->enb_ue_list);
2019-06-01 09:57:29 +00:00
if (enb->sock_type == SOCK_STREAM) {
/* FIXME : The sock hash is needed? */
ogs_hash_set(self.enb_sock_hash, enb->sock, sizeof(ogs_sock_t), enb);
2019-06-01 09:57:29 +00:00
enb->poll = ogs_pollset_add(mme_self()->pollset,
OGS_POLLIN, sock->fd, s1ap_recv_handler, sock);
ogs_assert(enb->poll);
}
2019-04-27 14:54:30 +00:00
ogs_hash_set(self.enb_addr_hash, enb->addr, sizeof(ogs_sockaddr_t), enb);
2017-04-08 01:45:48 +00:00
2019-04-27 14:54:30 +00:00
e.enb = enb;
ogs_fsm_create(&enb->sm, s1ap_state_initial, s1ap_state_final);
ogs_fsm_init(&enb->sm, &e);
2017-02-13 04:19:53 +00:00
return enb;
}
2019-04-27 14:54:30 +00:00
int mme_enb_remove(mme_enb_t *enb)
2017-02-13 04:19:53 +00:00
{
2019-04-27 14:54:30 +00:00
mme_event_t e;
2017-09-03 15:06:39 +00:00
2019-04-27 14:54:30 +00:00
ogs_assert(enb);
ogs_assert(enb->sock);
2019-04-27 14:54:30 +00:00
e.enb = enb;
ogs_fsm_fini(&enb->sm, &e);
ogs_fsm_delete(&enb->sm);
2019-04-27 14:54:30 +00:00
ogs_hash_set(self.enb_addr_hash, enb->addr, sizeof(ogs_sockaddr_t), NULL);
ogs_hash_set(self.enb_id_hash, &enb->enb_id, sizeof(enb->enb_id), NULL);
2017-02-13 04:19:53 +00:00
enb_ue_remove_in_enb(enb);
2017-04-08 02:38:09 +00:00
2019-06-01 09:57:29 +00:00
if (enb->sock_type == SOCK_STREAM) {
/* FIXME : The sock hash is needed? */
ogs_hash_set(self.enb_sock_hash, enb->sock, sizeof(ogs_sock_t), NULL);
2017-04-08 01:18:48 +00:00
2019-06-01 09:57:29 +00:00
ogs_pollset_remove(enb->poll);
2019-06-01 09:06:47 +00:00
ogs_sctp_destroy(enb->sock);
2019-06-01 09:57:29 +00:00
}
2017-02-13 04:19:53 +00:00
2019-04-27 14:54:30 +00:00
ogs_free(enb->addr);
ogs_pool_free(&mme_enb_pool, enb);
return OGS_OK;
2017-02-13 04:19:53 +00:00
}
2019-04-27 14:54:30 +00:00
int mme_enb_remove_all()
2017-02-13 04:19:53 +00:00
{
2019-04-27 14:54:30 +00:00
ogs_hash_index_t *hi = NULL;
mme_enb_t *enb = NULL;
2017-02-13 04:19:53 +00:00
2019-05-29 12:27:22 +00:00
for (hi = mme_enb_first(); hi; hi = mme_enb_next(hi)) {
enb = mme_enb_this(hi);
2017-04-06 11:10:00 +00:00
mme_enb_remove(enb);
2017-02-13 04:19:53 +00:00
}
2019-04-27 14:54:30 +00:00
return OGS_OK;
2017-02-13 04:19:53 +00:00
}
2019-04-27 14:54:30 +00:00
mme_enb_t* mme_enb_find_by_sock(ogs_sock_t *sock)
2017-04-11 00:19:33 +00:00
{
2019-04-27 14:54:30 +00:00
ogs_assert(sock);
return (mme_enb_t *)ogs_hash_get(self.enb_sock_hash, sock, sizeof(ogs_sock_t));
2017-11-24 02:49:37 +00:00
return NULL;
}
2019-04-27 14:54:30 +00:00
mme_enb_t* mme_enb_find_by_addr(ogs_sockaddr_t *addr)
2017-11-24 02:49:37 +00:00
{
2019-04-27 14:54:30 +00:00
ogs_assert(addr);
return (mme_enb_t *)ogs_hash_get(self.enb_addr_hash,
addr, sizeof(ogs_sockaddr_t));
2017-02-13 04:19:53 +00:00
return NULL;
2017-02-13 04:19:53 +00:00
}
2019-04-27 14:54:30 +00:00
mme_enb_t* mme_enb_find_by_enb_id(uint32_t enb_id)
2017-02-13 04:19:53 +00:00
{
2019-04-27 14:54:30 +00:00
return (mme_enb_t *)ogs_hash_get(self.enb_id_hash, &enb_id, sizeof(enb_id));
}
2017-02-13 04:19:53 +00:00
2019-04-27 14:54:30 +00:00
int mme_enb_set_enb_id(mme_enb_t *enb, uint32_t enb_id)
{
2019-04-27 14:54:30 +00:00
ogs_assert(enb);
2017-02-13 04:19:53 +00:00
enb->enb_id = enb_id;
2019-04-27 14:54:30 +00:00
ogs_hash_set(self.enb_id_hash, &enb->enb_id, sizeof(enb->enb_id), enb);
2019-04-27 14:54:30 +00:00
return OGS_OK;
}
2019-04-27 14:54:30 +00:00
ogs_hash_index_t* mme_enb_first()
{
2019-04-27 14:54:30 +00:00
ogs_assert(self.enb_sock_hash);
return ogs_hash_first(self.enb_sock_hash);
2017-02-13 04:19:53 +00:00
}
2019-04-27 14:54:30 +00:00
ogs_hash_index_t* mme_enb_next(ogs_hash_index_t *hi)
2017-02-13 04:19:53 +00:00
{
2019-04-27 14:54:30 +00:00
return ogs_hash_next(hi);
2017-02-13 04:19:53 +00:00
}
2019-04-27 14:54:30 +00:00
mme_enb_t *mme_enb_this(ogs_hash_index_t *hi)
2017-02-13 04:19:53 +00:00
{
2019-04-27 14:54:30 +00:00
ogs_assert(hi);
return ogs_hash_this_val(hi);
2017-02-13 04:19:53 +00:00
}
2017-03-05 04:03:11 +00:00
2019-04-27 14:54:30 +00:00
int mme_enb_sock_type(ogs_sock_t *sock)
2017-11-24 02:49:37 +00:00
{
2019-04-27 14:54:30 +00:00
ogs_socknode_t *snode = NULL;
2017-11-24 15:52:07 +00:00
2019-04-27 14:54:30 +00:00
ogs_assert(sock);
2017-11-24 15:52:07 +00:00
2019-04-27 14:54:30 +00:00
ogs_list_for_each(&mme_self()->s1ap_list, snode)
2017-12-08 03:43:35 +00:00
if (snode->sock == sock) return SOCK_SEQPACKET;
2019-04-27 14:54:30 +00:00
ogs_list_for_each(&mme_self()->s1ap_list6, snode)
2017-12-08 03:43:35 +00:00
if (snode->sock == sock) return SOCK_SEQPACKET;
2017-11-24 15:52:07 +00:00
return SOCK_STREAM;
2017-11-24 02:49:37 +00:00
}
/** enb_ue_context handling function */
enb_ue_t* enb_ue_add(mme_enb_t *enb)
2017-03-05 04:03:11 +00:00
{
enb_ue_t *enb_ue = NULL;
2017-03-05 04:03:11 +00:00
2019-04-27 14:54:30 +00:00
ogs_assert(self.mme_ue_s1ap_id_hash);
ogs_assert(enb);
2017-03-05 04:03:11 +00:00
2019-04-27 14:54:30 +00:00
ogs_pool_alloc(&enb_ue_pool, &enb_ue);
ogs_assert(enb_ue);
2017-03-05 04:03:11 +00:00
enb_ue->enb_ue_s1ap_id = INVALID_UE_S1AP_ID;
enb_ue->mme_ue_s1ap_id = NEXT_ID(self.mme_ue_s1ap_id, 1, 0xffffffff);
2017-11-09 05:56:03 +00:00
enb_ue->enb = enb;
2019-04-27 14:54:30 +00:00
ogs_hash_set(self.mme_ue_s1ap_id_hash, &enb_ue->mme_ue_s1ap_id,
sizeof(enb_ue->mme_ue_s1ap_id), enb_ue);
2019-04-27 14:54:30 +00:00
ogs_list_add(&enb->enb_ue_list, enb_ue);
return enb_ue;
2017-03-05 04:03:11 +00:00
}
unsigned int enb_ue_count()
{
2019-04-27 14:54:30 +00:00
ogs_assert(self.mme_ue_s1ap_id_hash);
return ogs_hash_count(self.mme_ue_s1ap_id_hash);
}
2019-04-27 14:54:30 +00:00
int enb_ue_remove(enb_ue_t *enb_ue)
2017-03-05 04:03:11 +00:00
{
2019-04-27 14:54:30 +00:00
int rv;
2018-01-29 10:10:54 +00:00
2019-04-27 14:54:30 +00:00
ogs_assert(self.mme_ue_s1ap_id_hash);
ogs_assert(enb_ue);
ogs_assert(enb_ue->enb);
2017-03-05 04:03:11 +00:00
2018-01-29 10:10:54 +00:00
/* De-associate S1 with NAS/EMM */
rv = enb_ue_deassociate(enb_ue);
2019-04-27 14:54:30 +00:00
ogs_assert(rv == OGS_OK);
2019-04-27 14:54:30 +00:00
ogs_list_remove(&enb_ue->enb->enb_ue_list, enb_ue);
ogs_hash_set(self.mme_ue_s1ap_id_hash, &enb_ue->mme_ue_s1ap_id,
sizeof(enb_ue->mme_ue_s1ap_id), NULL);
2017-04-06 12:44:30 +00:00
2019-04-27 14:54:30 +00:00
ogs_pool_free(&enb_ue_pool, enb_ue);
2019-04-27 14:54:30 +00:00
return OGS_OK;
}
2019-04-27 14:54:30 +00:00
int enb_ue_remove_in_enb(mme_enb_t *enb)
{
enb_ue_t *enb_ue = NULL, *next_enb_ue = NULL;
enb_ue = enb_ue_first_in_enb(enb);
2019-05-29 12:27:22 +00:00
while (enb_ue) {
next_enb_ue = enb_ue_next_in_enb(enb_ue);
enb_ue_remove(enb_ue);
enb_ue = next_enb_ue;
}
2019-04-27 14:54:30 +00:00
return OGS_OK;
}
2019-04-27 14:54:30 +00:00
int enb_ue_switch_to_enb(enb_ue_t *enb_ue, mme_enb_t *new_enb)
{
2019-04-27 14:54:30 +00:00
ogs_assert(enb_ue);
ogs_assert(enb_ue->enb);
ogs_assert(new_enb);
/* Remove from the old enb */
2019-04-27 14:54:30 +00:00
ogs_list_remove(&enb_ue->enb->enb_ue_list, enb_ue);
/* Add to the new enb */
2019-04-27 14:54:30 +00:00
ogs_list_add(&new_enb->enb_ue_list, enb_ue);
/* Switch to enb */
enb_ue->enb = new_enb;
2019-04-27 14:54:30 +00:00
return OGS_OK;
}
enb_ue_t* enb_ue_find_by_enb_ue_s1ap_id(
2019-04-27 14:54:30 +00:00
mme_enb_t *enb, uint32_t enb_ue_s1ap_id)
{
enb_ue_t *enb_ue = NULL;
enb_ue = enb_ue_first_in_enb(enb);
2019-05-29 12:27:22 +00:00
while (enb_ue) {
if (enb_ue_s1ap_id == enb_ue->enb_ue_s1ap_id)
break;
enb_ue = enb_ue_next_in_enb(enb_ue);
}
return enb_ue;
}
2019-04-27 14:54:30 +00:00
enb_ue_t* enb_ue_find_by_mme_ue_s1ap_id(uint32_t mme_ue_s1ap_id)
{
2019-04-27 14:54:30 +00:00
ogs_assert(self.mme_ue_s1ap_id_hash);
return ogs_hash_get(self.mme_ue_s1ap_id_hash,
&mme_ue_s1ap_id, sizeof(mme_ue_s1ap_id));
}
enb_ue_t* enb_ue_first_in_enb(mme_enb_t *enb)
{
2019-04-27 14:54:30 +00:00
return ogs_list_first(&enb->enb_ue_list);
}
enb_ue_t* enb_ue_next_in_enb(enb_ue_t *enb_ue)
{
2019-04-27 14:54:30 +00:00
return ogs_list_next(enb_ue);
}
2019-04-27 14:54:30 +00:00
static int mme_ue_new_guti(mme_ue_t *mme_ue)
{
served_gummei_t *served_gummei = NULL;
2019-04-27 14:54:30 +00:00
ogs_assert(mme_ue);
ogs_assert(mme_self()->max_num_of_served_gummei > 0);
served_gummei = &mme_self()->served_gummei[0];
2019-04-27 14:54:30 +00:00
ogs_assert(served_gummei->num_of_plmn_id > 0);
ogs_assert(served_gummei->num_of_mme_gid > 0);
ogs_assert(served_gummei->num_of_mme_code > 0);
2019-05-29 12:27:22 +00:00
if (mme_ue->m_tmsi) {
/* MME has a VALID GUIT
* As such, we need to remove previous GUTI in hash table */
2019-05-26 06:27:09 +00:00
ogs_hash_set(self.guti_ue_hash,
&mme_ue->guti, sizeof(nas_guti_t), NULL);
2019-04-27 14:54:30 +00:00
ogs_assert(mme_m_tmsi_free(mme_ue->m_tmsi) == OGS_OK);
}
2019-05-26 06:27:09 +00:00
memset(&mme_ue->guti, 0, sizeof(nas_guti_t));
/* Use the first configured plmn_id and mme group id */
2019-05-26 06:27:09 +00:00
nas_from_plmn_id(&mme_ue->guti.plmn_id, &served_gummei->plmn_id[0]);
mme_ue->guti.mme_gid = served_gummei->mme_gid[0];
mme_ue->guti.mme_code = served_gummei->mme_code[0];
mme_ue->m_tmsi = mme_m_tmsi_alloc();
2019-04-27 14:54:30 +00:00
ogs_assert(mme_ue->m_tmsi);
mme_ue->guti.m_tmsi = *(mme_ue->m_tmsi);
2019-05-26 06:27:09 +00:00
ogs_hash_set(self.guti_ue_hash, &mme_ue->guti, sizeof(nas_guti_t), mme_ue);
2019-04-27 14:54:30 +00:00
return OGS_OK;
}
mme_ue_t* mme_ue_add(enb_ue_t *enb_ue)
{
mme_enb_t *enb = NULL;
mme_ue_t *mme_ue = NULL;
2019-04-27 14:54:30 +00:00
mme_event_t e;
2019-04-27 14:54:30 +00:00
ogs_assert(enb_ue);
enb = enb_ue->enb;
2019-04-27 14:54:30 +00:00
ogs_assert(enb);
2019-04-27 14:54:30 +00:00
ogs_pool_alloc(&mme_ue_pool, &mme_ue);
ogs_assert(mme_ue);
2019-04-27 14:54:30 +00:00
ogs_list_init(&mme_ue->sess_list);
2019-04-27 14:54:30 +00:00
mme_ue->mme_s11_teid = ogs_pool_index(&mme_ue_pool, mme_ue);
ogs_assert(mme_ue->mme_s11_teid > 0 &&
mme_ue->mme_s11_teid <= context_self()->pool.ue);
2017-12-06 08:58:38 +00:00
2018-05-10 02:18:43 +00:00
/*
* SCTP output stream identification
2019-04-27 14:54:30 +00:00
* Default context_self()->config.parameter.sctp_streams : 30
2018-05-10 02:18:43 +00:00
* 0 : Non UE signalling
* 1-29 : UE specific association
*/
2019-06-16 07:47:20 +00:00
mme_ue->enb_ostream_id =
NEXT_ID(self.enb_ostream_id, 1, enb->max_num_of_ostreams-1);
2018-05-10 02:18:43 +00:00
/* Create New GUTI */
mme_ue_new_guti(mme_ue);
2019-05-29 12:27:22 +00:00
if (mme_self()->sgw_selection == SGW_SELECT_RR) {
2018-09-23 05:29:19 +00:00
/* Setup SGW with round-robin manner */
if (mme_self()->sgw == NULL)
2019-04-27 14:54:30 +00:00
mme_self()->sgw = ogs_list_first(&mme_self()->sgw_list);
2018-09-23 05:29:19 +00:00
2019-04-27 14:54:30 +00:00
ogs_assert(mme_self()->sgw);
2019-06-05 12:13:18 +00:00
SETUP_GTP_NODE(mme_ue, mme_self()->sgw->node);
2018-09-23 05:29:19 +00:00
2019-04-27 14:54:30 +00:00
mme_self()->sgw = ogs_list_next(mme_self()->sgw);
2019-05-29 12:27:22 +00:00
} else if (mme_self()->sgw_selection == SGW_SELECT_TAC) {
2018-09-23 05:29:19 +00:00
/* Select SGW by eNB TAC */
int i, found = 0;
2019-04-27 14:54:30 +00:00
mme_self()->sgw = ogs_list_first(&mme_self()->sgw_list);
2019-05-29 12:27:22 +00:00
while (mme_self()->sgw && !found) {
2018-09-23 05:29:19 +00:00
for (i = 0; i < mme_self()->sgw->num_of_tac && !found; i++)
2019-06-02 12:55:24 +00:00
found = mme_self()->sgw->tac[i] == enb_ue->saved.tai.tac ? 1: 0;
2017-12-06 08:58:38 +00:00
2018-09-23 05:29:19 +00:00
if (!found)
2019-04-27 14:54:30 +00:00
mme_self()->sgw = ogs_list_next(mme_self()->sgw);
2018-09-23 05:29:19 +00:00
}
2017-12-06 08:58:38 +00:00
2019-04-27 14:54:30 +00:00
ogs_assert(mme_self()->sgw);
2019-06-05 12:13:18 +00:00
SETUP_GTP_NODE(mme_ue, mme_self()->sgw->node);
2019-05-29 12:27:22 +00:00
} else
2019-04-27 14:54:30 +00:00
ogs_assert_if_reached();
2018-09-23 05:29:19 +00:00
2019-06-16 07:47:20 +00:00
/* Clear VLR */
mme_ue->vlr = NULL;
mme_ue->vlr_ostream_id = 0;
#if 0 /* FIXME */
if (mme_ue->vlr) {
mme_ue->vlr_ostream_id =
NEXT_ID(self.vlr_ostream_id, 1, mme_ue->vlr->max_num_of_ostreams-1);
} else {
mme_ue->vlr_ostream_id = 0;
}
#endif
2017-12-06 08:58:38 +00:00
2018-01-29 10:10:54 +00:00
/* Create paging retry timer */
2019-04-27 14:54:30 +00:00
mme_ue->t3413 = ogs_timer_add(self.timer_mgr, s1ap_t3413_timeout, mme_ue);
ogs_assert(mme_ue->t3413);
2017-08-07 22:58:13 +00:00
2019-04-27 14:54:30 +00:00
e.mme_ue = mme_ue;
ogs_fsm_create(&mme_ue->sm, emm_state_initial, emm_state_final);
ogs_fsm_init(&mme_ue->sm, &e);
return mme_ue;
}
2019-04-27 14:54:30 +00:00
int mme_ue_remove(mme_ue_t *mme_ue)
{
2019-04-27 14:54:30 +00:00
int rv;
mme_event_t e;
2017-09-03 15:06:39 +00:00
2019-04-27 14:54:30 +00:00
ogs_assert(mme_ue);
2017-03-05 04:03:11 +00:00
2019-04-27 14:54:30 +00:00
e.mme_ue = mme_ue;
ogs_fsm_fini(&mme_ue->sm, &e);
ogs_fsm_delete(&mme_ue->sm);
/* Clear hash table */
2019-05-29 12:27:22 +00:00
if (mme_ue->m_tmsi) {
2019-05-26 06:27:09 +00:00
ogs_hash_set(self.guti_ue_hash,
&mme_ue->guti, sizeof(nas_guti_t), NULL);
2019-04-27 14:54:30 +00:00
ogs_assert(mme_m_tmsi_free(mme_ue->m_tmsi) == OGS_OK);
}
if (mme_ue->imsi_len != 0)
2019-04-27 14:54:30 +00:00
ogs_hash_set(self.imsi_ue_hash, mme_ue->imsi, mme_ue->imsi_len, NULL);
2017-08-07 22:58:13 +00:00
2017-09-08 07:46:37 +00:00
/* Clear the saved PDN Connectivity Request */
NAS_CLEAR_DATA(&mme_ue->pdn_connectivity_request);
/* Clear Paging info : stop t3413, last_paing_msg */
2017-09-08 07:46:37 +00:00
CLEAR_PAGING_INFO(mme_ue);
/* Free UeRadioCapability */
S1AP_CLEAR_DATA(&mme_ue->ueRadioCapability);
2017-09-13 02:57:17 +00:00
/* Clear Transparent Container */
S1AP_CLEAR_DATA(&mme_ue->container);
/* Delete All Timers */
2019-04-27 14:54:30 +00:00
ogs_timer_delete(mme_ue->t3413);
2018-01-29 10:10:54 +00:00
rv = mme_ue_deassociate(mme_ue);
2019-04-27 14:54:30 +00:00
ogs_assert(rv == OGS_OK);
2018-01-29 10:10:54 +00:00
mme_sess_remove_all(mme_ue);
mme_pdn_remove_all(mme_ue);
2019-04-27 14:54:30 +00:00
ogs_pool_free(&mme_ue_pool, mme_ue);
2017-03-05 04:03:11 +00:00
2019-04-27 14:54:30 +00:00
return OGS_OK;
2017-03-05 04:03:11 +00:00
}
2019-04-27 14:54:30 +00:00
int mme_ue_remove_all()
2017-04-06 12:44:30 +00:00
{
2019-04-27 14:54:30 +00:00
ogs_hash_index_t *hi = NULL;
mme_ue_t *mme_ue = NULL;
2017-04-06 12:44:30 +00:00
2019-05-29 12:27:22 +00:00
for (hi = mme_ue_first(); hi; hi = mme_ue_next(hi)) {
mme_ue = mme_ue_this(hi);
mme_ue_remove(mme_ue);
2017-04-06 12:44:30 +00:00
}
2019-04-27 14:54:30 +00:00
return OGS_OK;
2017-04-10 14:59:59 +00:00
}
2019-04-27 14:54:30 +00:00
mme_ue_t* mme_ue_find_by_imsi_bcd(char *imsi_bcd)
{
2019-04-27 14:54:30 +00:00
uint8_t imsi[MAX_IMSI_LEN];
int imsi_len = 0;
2019-04-27 14:54:30 +00:00
ogs_assert(imsi_bcd);
2019-04-27 14:54:30 +00:00
ogs_bcd_to_buffer(imsi_bcd, imsi, &imsi_len);
return mme_ue_find_by_imsi(imsi, imsi_len);
}
2019-04-27 14:54:30 +00:00
mme_ue_t* mme_ue_find_by_imsi(uint8_t *imsi, int imsi_len)
{
2019-04-27 14:54:30 +00:00
ogs_assert(imsi && imsi_len);
2019-04-27 14:54:30 +00:00
return (mme_ue_t *)ogs_hash_get(self.imsi_ue_hash, imsi, imsi_len);
}
2019-05-26 06:27:09 +00:00
mme_ue_t* mme_ue_find_by_guti(nas_guti_t *guti)
{
2019-04-27 14:54:30 +00:00
ogs_assert(guti);
2019-05-26 06:27:09 +00:00
return (mme_ue_t *)ogs_hash_get(
self.guti_ue_hash, guti, sizeof(nas_guti_t));
}
2019-04-27 14:54:30 +00:00
mme_ue_t* mme_ue_find_by_teid(uint32_t teid)
2017-09-01 12:35:45 +00:00
{
2019-04-27 14:54:30 +00:00
return ogs_pool_find(&mme_ue_pool, teid);
2017-09-01 12:35:45 +00:00
}
2019-04-27 14:54:30 +00:00
ogs_hash_index_t *mme_ue_first()
2017-04-06 12:44:30 +00:00
{
2019-04-27 14:54:30 +00:00
ogs_assert(self.imsi_ue_hash);
return ogs_hash_first(self.imsi_ue_hash);
2017-04-06 12:44:30 +00:00
}
2019-04-27 14:54:30 +00:00
ogs_hash_index_t *mme_ue_next(ogs_hash_index_t *hi)
2017-04-06 12:44:30 +00:00
{
2019-04-27 14:54:30 +00:00
return ogs_hash_next(hi);
2017-04-06 12:44:30 +00:00
}
2019-04-27 14:54:30 +00:00
mme_ue_t *mme_ue_this(ogs_hash_index_t *hi)
2017-04-06 12:44:30 +00:00
{
2019-04-27 14:54:30 +00:00
ogs_assert(hi);
return ogs_hash_this_val(hi);
2017-04-06 12:44:30 +00:00
}
2017-07-28 05:06:40 +00:00
mme_ue_t* mme_ue_find_by_message(nas_message_t *message)
{
mme_ue_t *mme_ue = NULL;
2019-05-29 12:27:22 +00:00
switch (message->emm.h.message_type) {
case NAS_ATTACH_REQUEST:
2017-07-28 05:06:40 +00:00
{
2019-05-29 12:27:22 +00:00
nas_attach_request_t *attach_request =
&message->emm.attach_request;
2017-07-28 05:06:40 +00:00
2019-05-29 12:27:22 +00:00
nas_eps_mobile_identity_t *eps_mobile_identity =
&attach_request->eps_mobile_identity;
2017-07-28 05:06:40 +00:00
2019-05-29 12:27:22 +00:00
switch(eps_mobile_identity->imsi.type) {
case NAS_EPS_MOBILE_IDENTITY_IMSI:
{
char imsi_bcd[MAX_IMSI_BCD_LEN+1];
2017-07-28 05:06:40 +00:00
2019-05-29 12:27:22 +00:00
nas_imsi_to_bcd(
&eps_mobile_identity->imsi, eps_mobile_identity->length,
imsi_bcd);
2017-07-28 05:06:40 +00:00
2019-05-29 12:27:22 +00:00
mme_ue = mme_ue_find_by_imsi_bcd(imsi_bcd);
if (mme_ue) {
ogs_trace("known UE by IMSI[%s]", imsi_bcd);
} else {
ogs_trace("Unknown UE by IMSI[%s]", imsi_bcd);
2017-07-28 05:06:40 +00:00
}
break;
}
2019-05-29 12:27:22 +00:00
case NAS_EPS_MOBILE_IDENTITY_GUTI:
2017-07-28 05:06:40 +00:00
{
2019-05-29 12:27:22 +00:00
nas_eps_mobile_identity_guti_t *nas_guti = NULL;
nas_guti = &eps_mobile_identity->guti;
nas_guti_t guti;
guti.plmn_id = nas_guti->plmn_id;
guti.mme_gid = nas_guti->mme_gid;
guti.mme_code = nas_guti->mme_code;
guti.m_tmsi = nas_guti->m_tmsi;
mme_ue = mme_ue_find_by_guti(&guti);
if (mme_ue) {
ogs_trace("Known UE by GUTI[G:%d,C:%d,M_TMSI:0x%x]",
guti.mme_gid,
guti.mme_code,
guti.m_tmsi);
} else {
ogs_warn("Unknown UE by GUTI[G:%d,C:%d,M_TMSI:0x%x]",
guti.mme_gid,
guti.mme_code,
guti.m_tmsi);
}
2017-07-28 05:06:40 +00:00
break;
}
2019-05-29 12:27:22 +00:00
default:
ogs_error("Uknown message imsi type =%d",
eps_mobile_identity->imsi.type);
break;
}
break;
}
case NAS_DETACH_REQUEST:
{
/* TODO */
break;
}
case NAS_TRACKING_AREA_UPDATE_REQUEST:
{
nas_tracking_area_update_request_t *tau_request =
&message->emm.tracking_area_update_request;
nas_eps_mobile_identity_t *eps_mobile_identity =
&tau_request->old_guti;
switch(eps_mobile_identity->imsi.type) {
case NAS_EPS_MOBILE_IDENTITY_GUTI:
2017-07-28 05:06:40 +00:00
{
2019-05-29 12:27:22 +00:00
nas_eps_mobile_identity_guti_t *nas_guti = NULL;
nas_guti = &eps_mobile_identity->guti;
nas_guti_t guti;
guti.plmn_id = nas_guti->plmn_id;
guti.mme_gid = nas_guti->mme_gid;
guti.mme_code = nas_guti->mme_code;
guti.m_tmsi = nas_guti->m_tmsi;
mme_ue = mme_ue_find_by_guti(&guti);
if (mme_ue) {
ogs_trace("Known UE by GUTI[G:%d,C:%d,M_TMSI:0x%x]",
guti.mme_gid,
guti.mme_code,
guti.m_tmsi);
} else {
ogs_warn("Unknown UE by GUTI[G:%d,C:%d,M_TMSI:0x%x]",
guti.mme_gid,
guti.mme_code,
guti.m_tmsi);
2017-08-23 23:53:44 +00:00
}
2017-07-28 05:06:40 +00:00
break;
}
default:
2019-05-29 12:27:22 +00:00
ogs_error("Uknown message imsi type =%d",
eps_mobile_identity->imsi.type);
2017-07-28 05:06:40 +00:00
break;
}
2019-05-29 12:27:22 +00:00
break;
}
default:
break;
2017-07-28 05:06:40 +00:00
}
return mme_ue;
}
2019-04-27 14:54:30 +00:00
int mme_ue_set_imsi(mme_ue_t *mme_ue, char *imsi_bcd)
{
2019-04-27 14:54:30 +00:00
ogs_assert(mme_ue && imsi_bcd);
2019-04-27 14:54:30 +00:00
ogs_cpystrn(mme_ue->imsi_bcd, imsi_bcd, MAX_IMSI_BCD_LEN+1);
ogs_bcd_to_buffer(mme_ue->imsi_bcd, mme_ue->imsi, &mme_ue->imsi_len);
2019-04-27 14:54:30 +00:00
ogs_hash_set(self.imsi_ue_hash, mme_ue->imsi, mme_ue->imsi_len, mme_ue);
mme_ue->guti_present = 1;
2019-04-27 14:54:30 +00:00
return OGS_OK;
}
int mme_ue_have_indirect_tunnel(mme_ue_t *mme_ue)
{
mme_sess_t *sess = NULL;
sess = mme_sess_first(mme_ue);
2019-05-29 12:27:22 +00:00
while (sess) {
mme_bearer_t *bearer = mme_bearer_first(sess);
2019-05-29 12:27:22 +00:00
while (bearer) {
if (MME_HAVE_ENB_DL_INDIRECT_TUNNEL(bearer) ||
MME_HAVE_ENB_UL_INDIRECT_TUNNEL(bearer) ||
MME_HAVE_SGW_DL_INDIRECT_TUNNEL(bearer) ||
2019-05-29 12:27:22 +00:00
MME_HAVE_SGW_UL_INDIRECT_TUNNEL(bearer)) {
return 1;
}
bearer = mme_bearer_next(bearer);
}
sess = mme_sess_next(sess);
}
return 0;
}
2019-04-27 14:54:30 +00:00
int mme_ue_clear_indirect_tunnel(mme_ue_t *mme_ue)
{
mme_sess_t *sess = NULL;
2019-04-27 14:54:30 +00:00
ogs_assert(mme_ue);
sess = mme_sess_first(mme_ue);
2019-05-29 12:27:22 +00:00
while (sess) {
mme_bearer_t *bearer = mme_bearer_first(sess);
2019-05-29 12:27:22 +00:00
while (bearer) {
CLEAR_INDIRECT_TUNNEL(bearer);
bearer = mme_bearer_next(bearer);
}
sess = mme_sess_next(sess);
}
2019-04-27 14:54:30 +00:00
return OGS_OK;
}
2019-04-27 14:54:30 +00:00
int mme_ue_associate_enb_ue(mme_ue_t *mme_ue, enb_ue_t *enb_ue)
{
2019-04-27 14:54:30 +00:00
ogs_assert(mme_ue);
ogs_assert(enb_ue);
mme_ue->enb_ue = enb_ue;
enb_ue->mme_ue = mme_ue;
2019-04-27 14:54:30 +00:00
return OGS_OK;
}
2019-04-27 14:54:30 +00:00
int enb_ue_deassociate(enb_ue_t *enb_ue)
2017-09-12 14:07:55 +00:00
{
2019-04-27 14:54:30 +00:00
ogs_assert(enb_ue);
enb_ue->mme_ue = NULL;
2018-01-29 10:10:54 +00:00
2019-04-27 14:54:30 +00:00
return OGS_OK;
2018-01-29 10:10:54 +00:00
}
2017-09-12 14:07:55 +00:00
2019-04-27 14:54:30 +00:00
int mme_ue_deassociate(mme_ue_t *mme_ue)
2018-01-29 10:10:54 +00:00
{
2019-04-27 14:54:30 +00:00
ogs_assert(mme_ue);
2018-01-29 10:10:54 +00:00
mme_ue->enb_ue = NULL;
2019-04-27 14:54:30 +00:00
return OGS_OK;
2017-09-12 14:07:55 +00:00
}
2019-04-27 14:54:30 +00:00
int source_ue_associate_target_ue(
enb_ue_t *source_ue, enb_ue_t *target_ue)
{
mme_ue_t *mme_ue = NULL;
2019-04-27 14:54:30 +00:00
ogs_assert(source_ue);
ogs_assert(target_ue);
mme_ue = source_ue->mme_ue;
2019-04-27 14:54:30 +00:00
ogs_assert(mme_ue);
target_ue->mme_ue = mme_ue;
target_ue->source_ue = source_ue;
source_ue->target_ue = target_ue;
2019-04-27 14:54:30 +00:00
return OGS_OK;
}
2019-04-27 14:54:30 +00:00
int source_ue_deassociate_target_ue(enb_ue_t *enb_ue)
2017-09-15 03:54:26 +00:00
{
enb_ue_t *source_ue = NULL;
enb_ue_t *target_ue = NULL;
2019-04-27 14:54:30 +00:00
ogs_assert(enb_ue);
2017-09-15 03:54:26 +00:00
2019-05-29 12:27:22 +00:00
if (enb_ue->target_ue) {
source_ue = enb_ue;
target_ue = enb_ue->target_ue;
2019-04-27 14:54:30 +00:00
ogs_assert(source_ue->target_ue);
ogs_assert(target_ue->source_ue);
source_ue->target_ue = NULL;
target_ue->source_ue = NULL;
2019-05-29 12:27:22 +00:00
} else if (enb_ue->source_ue) {
target_ue = enb_ue;
source_ue = enb_ue->source_ue;
2019-04-27 14:54:30 +00:00
ogs_assert(source_ue->target_ue);
ogs_assert(target_ue->source_ue);
source_ue->target_ue = NULL;
2017-09-15 03:54:26 +00:00
target_ue->source_ue = NULL;
}
2017-09-15 03:54:26 +00:00
2019-04-27 14:54:30 +00:00
return OGS_OK;
2017-09-15 03:54:26 +00:00
}
2019-04-27 14:54:30 +00:00
mme_sess_t *mme_sess_add(mme_ue_t *mme_ue, uint8_t pti)
2017-04-08 01:18:48 +00:00
{
2017-04-27 14:06:10 +00:00
mme_sess_t *sess = NULL;
2017-04-13 10:15:53 +00:00
mme_bearer_t *bearer = NULL;
2017-04-08 01:18:48 +00:00
2019-04-27 14:54:30 +00:00
ogs_assert(mme_ue);
ogs_assert(pti != NAS_PROCEDURE_TRANSACTION_IDENTITY_UNASSIGNED);
2019-04-27 14:54:30 +00:00
ogs_pool_alloc(&mme_sess_pool, &sess);
ogs_assert(sess);
2017-04-27 14:06:10 +00:00
2019-04-27 14:54:30 +00:00
ogs_list_init(&sess->bearer_list);
2017-04-27 14:06:10 +00:00
sess->mme_ue = mme_ue;
2017-09-07 12:28:12 +00:00
sess->pti = pti;
2017-04-27 14:06:10 +00:00
bearer = mme_bearer_add(sess);
2019-04-27 14:54:30 +00:00
ogs_assert(bearer);
2019-04-27 14:54:30 +00:00
ogs_list_add(&mme_ue->sess_list, sess);
2017-11-09 05:56:03 +00:00
return sess;
2017-04-27 14:06:10 +00:00
}
2019-04-27 14:54:30 +00:00
int mme_sess_remove(mme_sess_t *sess)
2017-04-27 14:06:10 +00:00
{
2019-04-27 14:54:30 +00:00
ogs_assert(sess);
ogs_assert(sess->mme_ue);
2017-11-09 05:56:03 +00:00
2019-04-27 14:54:30 +00:00
ogs_list_remove(&sess->mme_ue->sess_list, sess);
2017-04-27 14:06:10 +00:00
mme_bearer_remove_all(sess);
NAS_CLEAR_DATA(&sess->ue_pco);
TLV_CLEAR_DATA(&sess->pgw_pco);
2019-04-27 14:54:30 +00:00
ogs_pool_free(&mme_sess_pool, sess);
2017-04-27 14:06:10 +00:00
2019-04-27 14:54:30 +00:00
return OGS_OK;
2017-04-27 14:06:10 +00:00
}
2019-04-27 14:54:30 +00:00
int mme_sess_remove_all(mme_ue_t *mme_ue)
2017-04-27 14:06:10 +00:00
{
mme_sess_t *sess = NULL, *next_sess = NULL;
sess = mme_sess_first(mme_ue);
2019-05-29 12:27:22 +00:00
while (sess) {
2017-04-27 14:06:10 +00:00
next_sess = mme_sess_next(sess);
mme_sess_remove(sess);
sess = next_sess;
}
2019-04-27 14:54:30 +00:00
return OGS_OK;
2017-04-27 14:06:10 +00:00
}
2019-04-27 14:54:30 +00:00
mme_sess_t* mme_sess_find_by_pti(mme_ue_t *mme_ue, uint8_t pti)
2017-04-27 14:06:10 +00:00
{
2017-09-07 12:28:12 +00:00
mme_sess_t *sess = NULL;
2017-04-27 14:06:10 +00:00
2017-09-07 12:28:12 +00:00
sess = mme_sess_first(mme_ue);
2019-05-29 12:27:22 +00:00
while(sess) {
2017-09-07 12:28:12 +00:00
if (pti == sess->pti)
return sess;
sess = mme_sess_next(sess);
}
return NULL;
}
2019-04-27 14:54:30 +00:00
mme_sess_t* mme_sess_find_by_ebi(mme_ue_t *mme_ue, uint8_t ebi)
{
mme_bearer_t *bearer = NULL;
2017-04-27 14:06:10 +00:00
bearer = mme_bearer_find_by_ue_ebi(mme_ue, ebi);
if (bearer)
return bearer->sess;
2017-04-27 14:06:10 +00:00
return NULL;
}
2019-04-27 14:54:30 +00:00
mme_sess_t* mme_sess_find_by_apn(mme_ue_t *mme_ue, char *apn)
{
mme_sess_t *sess = NULL;
sess = mme_sess_first(mme_ue);
2019-05-29 12:27:22 +00:00
while (sess) {
if (sess->pdn && strcmp(sess->pdn->apn, apn) == 0)
return sess;
sess = mme_sess_next(sess);
}
return NULL;
}
mme_sess_t* mme_sess_first(mme_ue_t *mme_ue)
2017-04-27 23:28:04 +00:00
{
2019-04-27 14:54:30 +00:00
return ogs_list_first(&mme_ue->sess_list);
2017-04-27 23:28:04 +00:00
}
mme_sess_t* mme_sess_next(mme_sess_t *sess)
{
2019-04-27 14:54:30 +00:00
return ogs_list_next(sess);
2017-04-27 23:28:04 +00:00
}
2018-01-30 12:57:19 +00:00
unsigned int mme_sess_count(mme_ue_t *mme_ue)
{
unsigned int count = 0;
mme_sess_t *sess = NULL;
sess = mme_sess_first(mme_ue);
2019-05-29 12:27:22 +00:00
while (sess) {
2018-01-30 12:57:19 +00:00
sess = mme_sess_next(sess);
count++;
}
return count;
}
mme_bearer_t* mme_bearer_add(mme_sess_t *sess)
2017-04-08 01:18:48 +00:00
{
2019-04-27 14:54:30 +00:00
mme_event_t e;
2017-04-13 10:15:53 +00:00
mme_bearer_t *bearer = NULL;
mme_ue_t *mme_ue = NULL;
2017-04-08 01:18:48 +00:00
2019-04-27 14:54:30 +00:00
ogs_assert(sess);
mme_ue = sess->mme_ue;
2019-04-27 14:54:30 +00:00
ogs_assert(mme_ue);
2017-04-08 01:18:48 +00:00
2019-04-27 14:54:30 +00:00
ogs_pool_alloc(&mme_bearer_pool, &bearer);
ogs_assert(bearer);
2017-04-08 01:18:48 +00:00
bearer->ebi = NEXT_ID(mme_ue->ebi, MIN_EPS_BEARER_ID, MAX_EPS_BEARER_ID);
bearer->mme_ue = mme_ue;
2017-04-27 14:06:10 +00:00
bearer->sess = sess;
2019-04-27 14:54:30 +00:00
ogs_list_add(&sess->bearer_list, bearer);
2017-11-09 05:56:03 +00:00
2019-04-27 14:54:30 +00:00
e.bearer = bearer;
ogs_fsm_create(&bearer->sm, esm_state_initial, esm_state_final);
ogs_fsm_init(&bearer->sm, &e);
2017-04-13 10:15:53 +00:00
return bearer;
2017-04-08 01:18:48 +00:00
}
2019-04-27 14:54:30 +00:00
int mme_bearer_remove(mme_bearer_t *bearer)
2017-04-08 01:18:48 +00:00
{
2019-04-27 14:54:30 +00:00
mme_event_t e;
2019-04-27 14:54:30 +00:00
ogs_assert(bearer);
ogs_assert(bearer->sess);
2019-04-27 14:54:30 +00:00
e.bearer = bearer;
ogs_fsm_fini(&bearer->sm, &e);
ogs_fsm_delete(&bearer->sm);
2017-09-06 06:38:24 +00:00
2019-04-27 14:54:30 +00:00
ogs_list_remove(&bearer->sess->bearer_list, bearer);
2017-11-09 05:56:03 +00:00
TLV_CLEAR_DATA(&bearer->tft);
2017-04-08 01:18:48 +00:00
2019-04-27 14:54:30 +00:00
ogs_pool_free(&mme_bearer_pool, bearer);
2017-04-08 01:18:48 +00:00
2019-04-27 14:54:30 +00:00
return OGS_OK;
2017-04-08 01:18:48 +00:00
}
2019-04-27 14:54:30 +00:00
int mme_bearer_remove_all(mme_sess_t *sess)
2017-04-08 01:18:48 +00:00
{
2017-04-13 10:15:53 +00:00
mme_bearer_t *bearer = NULL, *next_bearer = NULL;
2017-04-08 01:18:48 +00:00
2019-04-27 14:54:30 +00:00
ogs_assert(sess);
2017-04-08 01:18:48 +00:00
2017-04-27 14:06:10 +00:00
bearer = mme_bearer_first(sess);
2019-05-29 12:27:22 +00:00
while (bearer) {
2017-04-13 10:15:53 +00:00
next_bearer = mme_bearer_next(bearer);
2017-04-08 01:18:48 +00:00
2017-04-13 10:15:53 +00:00
mme_bearer_remove(bearer);
2017-04-08 01:18:48 +00:00
2017-04-13 10:15:53 +00:00
bearer = next_bearer;
2017-04-08 01:18:48 +00:00
}
2019-04-27 14:54:30 +00:00
return OGS_OK;
2017-04-10 14:59:59 +00:00
}
2019-04-27 14:54:30 +00:00
mme_bearer_t* mme_bearer_find_by_sess_ebi(mme_sess_t *sess, uint8_t ebi)
{
mme_bearer_t *bearer = NULL;
bearer = mme_bearer_first(sess);
2019-05-29 12:27:22 +00:00
while (bearer) {
if (ebi == bearer->ebi)
return bearer;
bearer = mme_bearer_next(bearer);
}
return NULL;
}
2019-04-27 14:54:30 +00:00
mme_bearer_t* mme_bearer_find_by_ue_ebi(mme_ue_t *mme_ue, uint8_t ebi)
{
mme_sess_t *sess = NULL;
mme_bearer_t *bearer = NULL;
sess = mme_sess_first(mme_ue);
2019-05-29 12:27:22 +00:00
while (sess) {
bearer = mme_bearer_find_by_sess_ebi(sess, ebi);
2019-05-29 12:27:22 +00:00
if (bearer) {
return bearer;
}
sess = mme_sess_next(sess);
}
return NULL;
}
mme_bearer_t* mme_bearer_find_or_add_by_message(
mme_ue_t *mme_ue, nas_message_t *message)
{
2019-04-27 14:54:30 +00:00
uint8_t pti = NAS_PROCEDURE_TRANSACTION_IDENTITY_UNASSIGNED;
uint8_t ebi = NAS_EPS_BEARER_IDENTITY_UNASSIGNED;
mme_bearer_t *bearer = NULL;
mme_sess_t *sess = NULL;
2019-04-27 14:54:30 +00:00
ogs_assert(mme_ue);
ogs_assert(message);
pti = message->esm.h.procedure_transaction_identity;
ebi = message->esm.h.eps_bearer_identity;
2019-04-27 14:54:30 +00:00
ogs_trace("mme_bearer_find_or_add_by_message() [PTI:%d, EBI:%d]",
2018-01-13 12:19:43 +00:00
pti, ebi);
2019-05-29 12:27:22 +00:00
if (ebi != NAS_EPS_BEARER_IDENTITY_UNASSIGNED) {
bearer = mme_bearer_find_by_ue_ebi(mme_ue, ebi);
2019-04-27 14:54:30 +00:00
ogs_assert(bearer);
return bearer;
}
2019-04-27 14:54:30 +00:00
ogs_assert(pti != NAS_PROCEDURE_TRANSACTION_IDENTITY_UNASSIGNED);
if (message->esm.h.message_type == NAS_PDN_CONNECTIVITY_REQUEST)
{
nas_pdn_connectivity_request_t *pdn_connectivity_request =
&message->esm.pdn_connectivity_request;
if (pdn_connectivity_request->presencemask &
NAS_PDN_CONNECTIVITY_REQUEST_ACCESS_POINT_NAME_PRESENT)
sess = mme_sess_find_by_apn(mme_ue,
pdn_connectivity_request->access_point_name.apn);
else
sess = mme_sess_first(mme_ue);
if (!sess)
sess = mme_sess_add(mme_ue, pti);
else
sess->pti = pti;
2019-04-27 14:54:30 +00:00
ogs_assert(sess);
2019-05-29 12:27:22 +00:00
} else if (message->esm.h.message_type == NAS_PDN_DISCONNECT_REQUEST) {
2018-01-13 12:19:43 +00:00
nas_pdn_disconnect_request_t *pdn_disconnect_request =
&message->esm.pdn_disconnect_request;
nas_linked_eps_bearer_identity_t *linked_eps_bearer_identity =
&pdn_disconnect_request->linked_eps_bearer_identity;
bearer = mme_bearer_find_by_ue_ebi(mme_ue,
linked_eps_bearer_identity->eps_bearer_identity);
2019-04-27 14:54:30 +00:00
ogs_assert(bearer);
2018-01-13 12:19:43 +00:00
sess = bearer->sess;
2019-04-27 14:54:30 +00:00
ogs_assert(sess);
2018-01-13 12:19:43 +00:00
sess->pti = pti;
return bearer;
2019-05-29 12:27:22 +00:00
} else {
sess = mme_sess_find_by_pti(mme_ue, pti);
2019-04-27 14:54:30 +00:00
ogs_assert(sess);
}
bearer = mme_default_bearer_in_sess(sess);
2019-04-27 14:54:30 +00:00
ogs_assert(bearer);
return bearer;
}
2017-04-27 23:28:04 +00:00
mme_bearer_t* mme_default_bearer_in_sess(mme_sess_t *sess)
2017-04-08 01:18:48 +00:00
{
2017-04-27 23:28:04 +00:00
return mme_bearer_first(sess);
}
2017-09-04 15:04:05 +00:00
mme_bearer_t* mme_linked_bearer(mme_bearer_t *bearer)
{
mme_sess_t *sess = NULL;
2019-04-27 14:54:30 +00:00
ogs_assert(bearer);
2017-09-04 15:04:05 +00:00
sess = bearer->sess;
2019-04-27 14:54:30 +00:00
ogs_assert(sess);
2017-09-04 15:04:05 +00:00
return mme_default_bearer_in_sess(sess);
}
2017-04-27 14:06:10 +00:00
mme_bearer_t* mme_bearer_first(mme_sess_t *sess)
2017-04-08 01:18:48 +00:00
{
2019-04-27 14:54:30 +00:00
ogs_assert(sess);
2017-04-08 01:18:48 +00:00
2019-04-27 14:54:30 +00:00
return ogs_list_first(&sess->bearer_list);
2017-04-08 01:18:48 +00:00
}
2017-04-13 10:15:53 +00:00
mme_bearer_t* mme_bearer_next(mme_bearer_t *bearer)
2017-04-08 01:18:48 +00:00
{
2019-04-27 14:54:30 +00:00
return ogs_list_next(bearer);
2017-04-08 01:18:48 +00:00
}
2017-04-12 04:45:57 +00:00
2018-02-03 09:29:32 +00:00
int mme_bearer_is_inactive(mme_ue_t *mme_ue)
{
mme_sess_t *sess = NULL;
2019-04-27 14:54:30 +00:00
ogs_assert(mme_ue);
2018-02-03 09:29:32 +00:00
sess = mme_sess_first(mme_ue);
2019-05-29 12:27:22 +00:00
while (sess) {
2018-02-03 09:29:32 +00:00
mme_bearer_t *bearer = mme_bearer_first(sess);
2019-05-29 12:27:22 +00:00
while (bearer) {
if (MME_HAVE_ENB_S1U_PATH(bearer)) {
2018-02-03 09:29:32 +00:00
return 0;
}
bearer = mme_bearer_next(bearer);
}
sess = mme_sess_next(sess);
}
return 1;
}
2019-04-27 14:54:30 +00:00
int mme_bearer_set_inactive(mme_ue_t *mme_ue)
2018-02-03 09:29:32 +00:00
{
mme_sess_t *sess = NULL;
2019-04-27 14:54:30 +00:00
ogs_assert(mme_ue);
2018-02-03 09:29:32 +00:00
sess = mme_sess_first(mme_ue);
2019-05-29 12:27:22 +00:00
while (sess) {
2018-02-03 09:29:32 +00:00
mme_bearer_t *bearer = mme_bearer_first(sess);
2019-05-29 12:27:22 +00:00
while (bearer) {
2018-02-03 09:29:32 +00:00
CLEAR_ENB_S1U_PATH(bearer);
bearer = mme_bearer_next(bearer);
}
sess = mme_sess_next(sess);
}
2019-04-27 14:54:30 +00:00
return OGS_OK;
2018-02-03 09:29:32 +00:00
}
2019-04-27 14:54:30 +00:00
int mme_pdn_remove_all(mme_ue_t *mme_ue)
2017-04-12 04:45:57 +00:00
{
s6a_subscription_data_t *subscription_data = NULL;
2019-04-27 14:54:30 +00:00
ogs_assert(mme_ue);
subscription_data = &mme_ue->subscription_data;
2019-04-27 14:54:30 +00:00
ogs_assert(subscription_data);
subscription_data->num_of_pdn = 0;
2017-04-12 04:45:57 +00:00
2019-04-27 14:54:30 +00:00
return OGS_OK;
2017-04-12 04:45:57 +00:00
}
2019-04-27 14:54:30 +00:00
pdn_t* mme_pdn_find_by_apn(mme_ue_t *mme_ue, char *apn)
2017-04-12 04:45:57 +00:00
{
s6a_subscription_data_t *subscription_data = NULL;
2017-04-12 04:45:57 +00:00
pdn_t *pdn = NULL;
2017-08-11 10:34:27 +00:00
int i = 0;
2017-04-12 04:45:57 +00:00
2019-04-27 14:54:30 +00:00
ogs_assert(mme_ue);
subscription_data = &mme_ue->subscription_data;
2019-04-27 14:54:30 +00:00
ogs_assert(subscription_data);
2017-04-12 04:45:57 +00:00
2019-05-29 12:27:22 +00:00
for (i = 0; i < subscription_data->num_of_pdn; i++) {
pdn = &subscription_data->pdn[i];
2017-04-12 04:45:57 +00:00
if (strcmp(pdn->apn, apn) == 0)
2017-08-19 07:49:44 +00:00
return pdn;
2017-04-12 04:45:57 +00:00
}
2017-08-19 07:49:44 +00:00
return NULL;
2017-04-12 04:45:57 +00:00
}
2017-12-19 08:05:54 +00:00
pdn_t* mme_default_pdn(mme_ue_t *mme_ue)
{
s6a_subscription_data_t *subscription_data = NULL;
pdn_t *pdn = NULL;
int i = 0;
2019-04-27 14:54:30 +00:00
ogs_assert(mme_ue);
2017-12-19 08:05:54 +00:00
subscription_data = &mme_ue->subscription_data;
2019-04-27 14:54:30 +00:00
ogs_assert(subscription_data);
2017-12-19 08:05:54 +00:00
2019-05-29 12:27:22 +00:00
for (i = 0; i < subscription_data->num_of_pdn; i++) {
2017-12-19 08:05:54 +00:00
pdn = &subscription_data->pdn[i];
if (pdn->context_identifier == subscription_data->context_identifier)
return pdn;
}
return NULL;
}
int mme_find_served_tai(tai_t *tai)
{
int i = 0, j = 0, k = 0;
2019-04-27 14:54:30 +00:00
ogs_assert(tai);
2019-05-29 12:27:22 +00:00
for (i = 0; i < self.num_of_served_tai; i++) {
tai0_list_t *list0 = &self.served_tai[i].list0;
2019-04-27 14:54:30 +00:00
ogs_assert(list0);
tai2_list_t *list2 = &self.served_tai[i].list2;
2019-04-27 14:54:30 +00:00
ogs_assert(list2);
2019-05-29 12:27:22 +00:00
for (j = 0; list0->tai[j].num; j++) {
2019-04-27 14:54:30 +00:00
ogs_assert(list0->tai[j].type == TAI0_TYPE);
ogs_assert(list0->tai[j].num < MAX_NUM_OF_TAI);
2019-05-29 12:27:22 +00:00
for (k = 0; k < list0->tai[j].num; k++) {
if (memcmp(&list0->tai[j].plmn_id,
&tai->plmn_id, PLMN_ID_LEN) == 0 &&
2019-05-29 12:27:22 +00:00
list0->tai[j].tac[k] == tai->tac) {
return i;
}
}
}
2019-05-29 12:27:22 +00:00
if (list2->num) {
2019-04-27 14:54:30 +00:00
ogs_assert(list2->type == TAI1_TYPE || list2->type == TAI2_TYPE);
ogs_assert(list2->num < MAX_NUM_OF_TAI);
2019-05-29 12:27:22 +00:00
for (j = 0; j < list2->num; j++) {
if (memcmp(&list2->tai[j].plmn_id,
&tai->plmn_id, PLMN_ID_LEN) == 0 &&
2019-05-29 12:27:22 +00:00
list2->tai[j].tac == tai->tac) {
return i;
}
}
}
}
return -1;
}
2018-01-21 06:44:30 +00:00
2019-04-27 14:54:30 +00:00
int mme_m_tmsi_pool_generate()
2018-01-21 06:44:30 +00:00
{
int i, j;
2018-01-21 13:36:49 +00:00
int index = 0;
2018-01-21 06:44:30 +00:00
2019-04-27 14:54:30 +00:00
ogs_trace("M-TMSI Pool try to generate...");
for (i = 0; index < context_self()->pool.ue; i++) {
2018-01-21 06:44:30 +00:00
mme_m_tmsi_t *m_tmsi = NULL;
int conflict = 0;
2018-01-21 06:44:30 +00:00
2019-04-27 14:54:30 +00:00
m_tmsi = &self.m_tmsi.array[index];
ogs_assert(m_tmsi);
*m_tmsi = ogs_random32();
2018-01-25 21:52:30 +00:00
/* for mapped-GUTI */
*m_tmsi |= 0xc0000000;
*m_tmsi &= 0xff00ffff;
2019-05-29 12:27:22 +00:00
for (j = 0; j < index; j++) {
if (*m_tmsi == self.m_tmsi.array[j]) {
conflict = 1;
2019-04-27 14:54:30 +00:00
ogs_trace("[M-TMSI CONFLICT] %d:0x%x == %d:0x%x",
index, *m_tmsi, j, self.m_tmsi.array[j]);
break;
}
}
2019-05-29 12:27:22 +00:00
if (conflict == 1) {
2019-04-27 14:54:30 +00:00
continue;
}
2018-01-25 21:52:30 +00:00
2018-01-21 13:36:49 +00:00
index++;
2018-01-21 06:44:30 +00:00
}
2018-01-21 13:36:49 +00:00
self.m_tmsi.size = index;
2019-04-27 14:54:30 +00:00
ogs_trace("M-TMSI Pool generate...done");
2018-01-21 06:44:30 +00:00
2019-04-27 14:54:30 +00:00
return OGS_OK;
2018-01-21 06:44:30 +00:00
}
mme_m_tmsi_t *mme_m_tmsi_alloc()
{
mme_m_tmsi_t *m_tmsi = NULL;
2019-04-27 14:54:30 +00:00
ogs_pool_alloc(&self.m_tmsi, &m_tmsi);
ogs_assert(m_tmsi);
2018-01-21 06:44:30 +00:00
return m_tmsi;
}
2019-04-27 14:54:30 +00:00
int mme_m_tmsi_free(mme_m_tmsi_t *m_tmsi)
2018-01-21 06:44:30 +00:00
{
2019-04-27 14:54:30 +00:00
ogs_assert(m_tmsi);
ogs_pool_free(&self.m_tmsi, m_tmsi);
2018-01-21 06:44:30 +00:00
2019-04-27 14:54:30 +00:00
return OGS_OK;
2018-01-21 06:44:30 +00:00
}