forked from acouzens/open5gs
cosmetic: mme: Fix trailing whitespace in several files
This commit is contained in:
parent
946a28ab6c
commit
715038b6d9
|
@ -21,37 +21,37 @@ libmme_sources = files('''
|
||||||
mme-context.h
|
mme-context.h
|
||||||
s1ap-build.h
|
s1ap-build.h
|
||||||
s1ap-handler.h
|
s1ap-handler.h
|
||||||
s1ap-path.h
|
s1ap-path.h
|
||||||
sgsap-build.h
|
sgsap-build.h
|
||||||
sgsap-handler.h
|
sgsap-handler.h
|
||||||
sgsap-conv.h
|
sgsap-conv.h
|
||||||
sgsap-path.h
|
sgsap-path.h
|
||||||
mme-fd-path.h
|
mme-fd-path.h
|
||||||
mme-s6a-handler.h
|
mme-s6a-handler.h
|
||||||
nas-security.h
|
nas-security.h
|
||||||
nas-path.h
|
nas-path.h
|
||||||
emm-handler.h
|
emm-handler.h
|
||||||
emm-build.h
|
emm-build.h
|
||||||
esm-handler.h
|
esm-handler.h
|
||||||
esm-build.h
|
esm-build.h
|
||||||
mme-gtp-path.h
|
mme-gtp-path.h
|
||||||
mme-s11-build.h
|
mme-s11-build.h
|
||||||
mme-s11-handler.h
|
mme-s11-handler.h
|
||||||
sbc-message.h
|
sbc-message.h
|
||||||
sbc-handler.h
|
sbc-handler.h
|
||||||
mme-sm.h
|
mme-sm.h
|
||||||
mme-path.h
|
mme-path.h
|
||||||
metrics.h
|
metrics.h
|
||||||
|
|
||||||
mme-init.c
|
mme-init.c
|
||||||
mme-event.c
|
mme-event.c
|
||||||
mme-timer.c
|
mme-timer.c
|
||||||
mme-context.c
|
mme-context.c
|
||||||
s1ap-sm.c
|
s1ap-sm.c
|
||||||
s1ap-build.c
|
s1ap-build.c
|
||||||
s1ap-handler.c
|
s1ap-handler.c
|
||||||
s1ap-sctp.c
|
s1ap-sctp.c
|
||||||
s1ap-path.c
|
s1ap-path.c
|
||||||
sgsap-sm.c
|
sgsap-sm.c
|
||||||
sgsap-build.c
|
sgsap-build.c
|
||||||
sgsap-handler.c
|
sgsap-handler.c
|
||||||
|
@ -59,7 +59,7 @@ libmme_sources = files('''
|
||||||
sgsap-sctp.c
|
sgsap-sctp.c
|
||||||
sgsap-path.c
|
sgsap-path.c
|
||||||
mme-fd-path.c
|
mme-fd-path.c
|
||||||
mme-s6a-handler.c
|
mme-s6a-handler.c
|
||||||
nas-security.c
|
nas-security.c
|
||||||
nas-path.c
|
nas-path.c
|
||||||
emm-sm.c
|
emm-sm.c
|
||||||
|
@ -72,8 +72,8 @@ libmme_sources = files('''
|
||||||
mme-s11-build.c
|
mme-s11-build.c
|
||||||
mme-s11-handler.c
|
mme-s11-handler.c
|
||||||
mme-sm.c
|
mme-sm.c
|
||||||
mme-path.c
|
mme-path.c
|
||||||
sbc-handler.c
|
sbc-handler.c
|
||||||
metrics.c
|
metrics.c
|
||||||
'''.split())
|
'''.split())
|
||||||
|
|
||||||
|
|
|
@ -55,9 +55,9 @@ const char *mme_event_get_name(mme_event_t *e)
|
||||||
return OGS_FSM_NAME_INIT_SIG;
|
return OGS_FSM_NAME_INIT_SIG;
|
||||||
|
|
||||||
switch (e->id) {
|
switch (e->id) {
|
||||||
case OGS_FSM_ENTRY_SIG:
|
case OGS_FSM_ENTRY_SIG:
|
||||||
return OGS_FSM_NAME_ENTRY_SIG;
|
return OGS_FSM_NAME_ENTRY_SIG;
|
||||||
case OGS_FSM_EXIT_SIG:
|
case OGS_FSM_EXIT_SIG:
|
||||||
return OGS_FSM_NAME_EXIT_SIG;
|
return OGS_FSM_NAME_EXIT_SIG;
|
||||||
|
|
||||||
case MME_EVENT_S1AP_MESSAGE:
|
case MME_EVENT_S1AP_MESSAGE:
|
||||||
|
@ -97,7 +97,7 @@ const char *mme_event_get_name(mme_event_t *e)
|
||||||
case MME_EVENT_SGSAP_LO_CONNREFUSED:
|
case MME_EVENT_SGSAP_LO_CONNREFUSED:
|
||||||
return "MME_EVENT_SGSAP_LO_CONNREFUSED";
|
return "MME_EVENT_SGSAP_LO_CONNREFUSED";
|
||||||
|
|
||||||
default:
|
default:
|
||||||
break;
|
break;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
@ -462,7 +462,7 @@ void mme_state_operational(ogs_fsm_t *s, mme_event_t *e)
|
||||||
break;
|
break;
|
||||||
case OGS_DIAM_S6A_CMD_CODE_INSERT_SUBSCRIBER_DATA:
|
case OGS_DIAM_S6A_CMD_CODE_INSERT_SUBSCRIBER_DATA:
|
||||||
mme_s6a_handle_idr(mme_ue, s6a_message);
|
mme_s6a_handle_idr(mme_ue, s6a_message);
|
||||||
break;
|
break;
|
||||||
default:
|
default:
|
||||||
ogs_error("Invalid Type[%d]", s6a_message->cmd_code);
|
ogs_error("Invalid Type[%d]", s6a_message->cmd_code);
|
||||||
break;
|
break;
|
||||||
|
|
|
@ -142,13 +142,13 @@ ogs_pkbuf_t *s1ap_build_setup_failure(
|
||||||
S1AP_TimeToWait_t *TimeToWait = NULL;
|
S1AP_TimeToWait_t *TimeToWait = NULL;
|
||||||
|
|
||||||
ogs_debug("S1SetupFailure");
|
ogs_debug("S1SetupFailure");
|
||||||
|
|
||||||
ogs_debug(" Group[%d] Cause[%d] TimeToWait[%ld]",
|
ogs_debug(" Group[%d] Cause[%d] TimeToWait[%ld]",
|
||||||
group, (int)cause, time_to_wait);
|
group, (int)cause, time_to_wait);
|
||||||
|
|
||||||
memset(&pdu, 0, sizeof (S1AP_S1AP_PDU_t));
|
memset(&pdu, 0, sizeof (S1AP_S1AP_PDU_t));
|
||||||
pdu.present = S1AP_S1AP_PDU_PR_unsuccessfulOutcome;
|
pdu.present = S1AP_S1AP_PDU_PR_unsuccessfulOutcome;
|
||||||
pdu.choice.unsuccessfulOutcome =
|
pdu.choice.unsuccessfulOutcome =
|
||||||
CALLOC(1, sizeof(S1AP_UnsuccessfulOutcome_t));
|
CALLOC(1, sizeof(S1AP_UnsuccessfulOutcome_t));
|
||||||
|
|
||||||
unsuccessfulOutcome = pdu.choice.unsuccessfulOutcome;
|
unsuccessfulOutcome = pdu.choice.unsuccessfulOutcome;
|
||||||
|
@ -240,7 +240,7 @@ ogs_pkbuf_t *s1ap_build_downlink_nas_transport(
|
||||||
|
|
||||||
ie = CALLOC(1, sizeof(S1AP_DownlinkNASTransport_IEs_t));
|
ie = CALLOC(1, sizeof(S1AP_DownlinkNASTransport_IEs_t));
|
||||||
ASN_SEQUENCE_ADD(&DownlinkNASTransport->protocolIEs, ie);
|
ASN_SEQUENCE_ADD(&DownlinkNASTransport->protocolIEs, ie);
|
||||||
|
|
||||||
ie->id = S1AP_ProtocolIE_ID_id_NAS_PDU;
|
ie->id = S1AP_ProtocolIE_ID_id_NAS_PDU;
|
||||||
ie->criticality = S1AP_Criticality_reject;
|
ie->criticality = S1AP_Criticality_reject;
|
||||||
ie->value.present = S1AP_DownlinkNASTransport_IEs__value_PR_NAS_PDU;
|
ie->value.present = S1AP_DownlinkNASTransport_IEs__value_PR_NAS_PDU;
|
||||||
|
@ -355,10 +355,10 @@ ogs_pkbuf_t *s1ap_build_initial_context_setup_request(
|
||||||
(long long)mme_ue->ambr.downlink, (long long)mme_ue->ambr.uplink);
|
(long long)mme_ue->ambr.downlink, (long long)mme_ue->ambr.uplink);
|
||||||
|
|
||||||
asn_uint642INTEGER(
|
asn_uint642INTEGER(
|
||||||
&UEAggregateMaximumBitrate->uEaggregateMaximumBitRateUL,
|
&UEAggregateMaximumBitrate->uEaggregateMaximumBitRateUL,
|
||||||
mme_ue->ambr.uplink);
|
mme_ue->ambr.uplink);
|
||||||
asn_uint642INTEGER(
|
asn_uint642INTEGER(
|
||||||
&UEAggregateMaximumBitrate->uEaggregateMaximumBitRateDL,
|
&UEAggregateMaximumBitrate->uEaggregateMaximumBitRateDL,
|
||||||
mme_ue->ambr.downlink);
|
mme_ue->ambr.downlink);
|
||||||
|
|
||||||
ogs_list_for_each(&mme_ue->sess_list, sess) {
|
ogs_list_for_each(&mme_ue->sess_list, sess) {
|
||||||
|
@ -447,7 +447,7 @@ ogs_pkbuf_t *s1ap_build_initial_context_setup_request(
|
||||||
(long long)bearer->qos.gbr.downlink,
|
(long long)bearer->qos.gbr.downlink,
|
||||||
(long long)bearer->qos.gbr.uplink);
|
(long long)bearer->qos.gbr.uplink);
|
||||||
|
|
||||||
gbrQosInformation =
|
gbrQosInformation =
|
||||||
CALLOC(1, sizeof(struct S1AP_GBR_QosInformation));
|
CALLOC(1, sizeof(struct S1AP_GBR_QosInformation));
|
||||||
asn_uint642INTEGER(&gbrQosInformation->e_RAB_MaximumBitrateDL,
|
asn_uint642INTEGER(&gbrQosInformation->e_RAB_MaximumBitrateDL,
|
||||||
bearer->qos.mbr.downlink);
|
bearer->qos.mbr.downlink);
|
||||||
|
@ -541,7 +541,7 @@ ogs_pkbuf_t *s1ap_build_initial_context_setup_request(
|
||||||
SecurityKey = &ie->value.choice.SecurityKey;
|
SecurityKey = &ie->value.choice.SecurityKey;
|
||||||
|
|
||||||
SecurityKey->size = OGS_SHA256_DIGEST_SIZE;
|
SecurityKey->size = OGS_SHA256_DIGEST_SIZE;
|
||||||
SecurityKey->buf =
|
SecurityKey->buf =
|
||||||
CALLOC(SecurityKey->size, sizeof(uint8_t));
|
CALLOC(SecurityKey->size, sizeof(uint8_t));
|
||||||
SecurityKey->bits_unused = 0;
|
SecurityKey->bits_unused = 0;
|
||||||
memcpy(SecurityKey->buf, mme_ue->kenb, SecurityKey->size);
|
memcpy(SecurityKey->buf, mme_ue->kenb, SecurityKey->size);
|
||||||
|
@ -791,11 +791,11 @@ ogs_pkbuf_t *s1ap_build_ue_context_modification_request(mme_ue_t *mme_ue)
|
||||||
UESecurityCapabilities = &ie->value.choice.UESecurityCapabilities;
|
UESecurityCapabilities = &ie->value.choice.UESecurityCapabilities;
|
||||||
|
|
||||||
UESecurityCapabilities->encryptionAlgorithms.size = 2;
|
UESecurityCapabilities->encryptionAlgorithms.size = 2;
|
||||||
UESecurityCapabilities->encryptionAlgorithms.buf =
|
UESecurityCapabilities->encryptionAlgorithms.buf =
|
||||||
CALLOC(UESecurityCapabilities->encryptionAlgorithms.size,
|
CALLOC(UESecurityCapabilities->encryptionAlgorithms.size,
|
||||||
sizeof(uint8_t));
|
sizeof(uint8_t));
|
||||||
UESecurityCapabilities->encryptionAlgorithms.bits_unused = 0;
|
UESecurityCapabilities->encryptionAlgorithms.bits_unused = 0;
|
||||||
UESecurityCapabilities->encryptionAlgorithms.buf[0] =
|
UESecurityCapabilities->encryptionAlgorithms.buf[0] =
|
||||||
(mme_ue->ue_network_capability.eea << 1);
|
(mme_ue->ue_network_capability.eea << 1);
|
||||||
|
|
||||||
UESecurityCapabilities->integrityProtectionAlgorithms.size = 2;
|
UESecurityCapabilities->integrityProtectionAlgorithms.size = 2;
|
||||||
|
@ -817,7 +817,7 @@ ogs_pkbuf_t *s1ap_build_ue_context_modification_request(mme_ue_t *mme_ue)
|
||||||
SecurityKey = &ie->value.choice.SecurityKey;
|
SecurityKey = &ie->value.choice.SecurityKey;
|
||||||
|
|
||||||
SecurityKey->size = OGS_SHA256_DIGEST_SIZE;
|
SecurityKey->size = OGS_SHA256_DIGEST_SIZE;
|
||||||
SecurityKey->buf =
|
SecurityKey->buf =
|
||||||
CALLOC(SecurityKey->size, sizeof(uint8_t));
|
CALLOC(SecurityKey->size, sizeof(uint8_t));
|
||||||
SecurityKey->bits_unused = 0;
|
SecurityKey->bits_unused = 0;
|
||||||
memcpy(SecurityKey->buf, mme_ue->kenb, SecurityKey->size);
|
memcpy(SecurityKey->buf, mme_ue->kenb, SecurityKey->size);
|
||||||
|
@ -883,11 +883,11 @@ ogs_pkbuf_t *s1ap_build_ue_context_release_command(
|
||||||
UE_S1AP_IDs->choice.mME_UE_S1AP_ID = enb_ue->mme_ue_s1ap_id;
|
UE_S1AP_IDs->choice.mME_UE_S1AP_ID = enb_ue->mme_ue_s1ap_id;
|
||||||
} else {
|
} else {
|
||||||
UE_S1AP_IDs->present = S1AP_UE_S1AP_IDs_PR_uE_S1AP_ID_pair;
|
UE_S1AP_IDs->present = S1AP_UE_S1AP_IDs_PR_uE_S1AP_ID_pair;
|
||||||
UE_S1AP_IDs->choice.uE_S1AP_ID_pair =
|
UE_S1AP_IDs->choice.uE_S1AP_ID_pair =
|
||||||
CALLOC(1, sizeof(S1AP_UE_S1AP_ID_pair_t));
|
CALLOC(1, sizeof(S1AP_UE_S1AP_ID_pair_t));
|
||||||
UE_S1AP_IDs->choice.uE_S1AP_ID_pair->mME_UE_S1AP_ID =
|
UE_S1AP_IDs->choice.uE_S1AP_ID_pair->mME_UE_S1AP_ID =
|
||||||
enb_ue->mme_ue_s1ap_id;
|
enb_ue->mme_ue_s1ap_id;
|
||||||
UE_S1AP_IDs->choice.uE_S1AP_ID_pair->eNB_UE_S1AP_ID =
|
UE_S1AP_IDs->choice.uE_S1AP_ID_pair->eNB_UE_S1AP_ID =
|
||||||
enb_ue->enb_ue_s1ap_id;
|
enb_ue->enb_ue_s1ap_id;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -1138,7 +1138,7 @@ ogs_pkbuf_t *s1ap_build_e_rab_modify_request(
|
||||||
ogs_assert(bearer->qos.gbr.downlink);
|
ogs_assert(bearer->qos.gbr.downlink);
|
||||||
ogs_assert(bearer->qos.gbr.uplink);
|
ogs_assert(bearer->qos.gbr.uplink);
|
||||||
|
|
||||||
gbrQosInformation =
|
gbrQosInformation =
|
||||||
CALLOC(1, sizeof(S1AP_GBR_QosInformation_t));
|
CALLOC(1, sizeof(S1AP_GBR_QosInformation_t));
|
||||||
asn_uint642INTEGER(&gbrQosInformation->e_RAB_MaximumBitrateDL,
|
asn_uint642INTEGER(&gbrQosInformation->e_RAB_MaximumBitrateDL,
|
||||||
bearer->qos.mbr.downlink);
|
bearer->qos.mbr.downlink);
|
||||||
|
@ -1161,7 +1161,7 @@ ogs_pkbuf_t *s1ap_build_e_rab_modify_request(
|
||||||
}
|
}
|
||||||
|
|
||||||
ogs_pkbuf_t *s1ap_build_e_rab_release_command(
|
ogs_pkbuf_t *s1ap_build_e_rab_release_command(
|
||||||
mme_bearer_t *bearer, ogs_pkbuf_t *esmbuf,
|
mme_bearer_t *bearer, ogs_pkbuf_t *esmbuf,
|
||||||
S1AP_Cause_PR group, long cause)
|
S1AP_Cause_PR group, long cause)
|
||||||
{
|
{
|
||||||
S1AP_S1AP_PDU_t pdu;
|
S1AP_S1AP_PDU_t pdu;
|
||||||
|
@ -1461,7 +1461,7 @@ ogs_pkbuf_t *s1ap_build_paging(
|
||||||
|
|
||||||
/* Set UE Identity Index value : IMSI mod 4096 */
|
/* Set UE Identity Index value : IMSI mod 4096 */
|
||||||
UEIdentityIndexValue->size = 2;
|
UEIdentityIndexValue->size = 2;
|
||||||
UEIdentityIndexValue->buf =
|
UEIdentityIndexValue->buf =
|
||||||
CALLOC(UEIdentityIndexValue->size, sizeof(uint8_t));
|
CALLOC(UEIdentityIndexValue->size, sizeof(uint8_t));
|
||||||
|
|
||||||
/* Conver string to value */
|
/* Conver string to value */
|
||||||
|
@ -1671,7 +1671,7 @@ ogs_pkbuf_t *s1ap_build_path_switch_ack(
|
||||||
|
|
||||||
SecurityContext->nextHopChainingCount = mme_ue->nhcc;
|
SecurityContext->nextHopChainingCount = mme_ue->nhcc;
|
||||||
SecurityContext->nextHopParameter.size = OGS_SHA256_DIGEST_SIZE;
|
SecurityContext->nextHopParameter.size = OGS_SHA256_DIGEST_SIZE;
|
||||||
SecurityContext->nextHopParameter.buf =
|
SecurityContext->nextHopParameter.buf =
|
||||||
CALLOC(SecurityContext->nextHopParameter.size,
|
CALLOC(SecurityContext->nextHopParameter.size,
|
||||||
sizeof(uint8_t));
|
sizeof(uint8_t));
|
||||||
SecurityContext->nextHopParameter.bits_unused = 0;
|
SecurityContext->nextHopParameter.bits_unused = 0;
|
||||||
|
@ -1698,7 +1698,7 @@ ogs_pkbuf_t *s1ap_build_path_switch_failure(
|
||||||
|
|
||||||
memset(&pdu, 0, sizeof (S1AP_S1AP_PDU_t));
|
memset(&pdu, 0, sizeof (S1AP_S1AP_PDU_t));
|
||||||
pdu.present = S1AP_S1AP_PDU_PR_unsuccessfulOutcome;
|
pdu.present = S1AP_S1AP_PDU_PR_unsuccessfulOutcome;
|
||||||
pdu.choice.unsuccessfulOutcome =
|
pdu.choice.unsuccessfulOutcome =
|
||||||
CALLOC(1, sizeof(S1AP_UnsuccessfulOutcome_t));
|
CALLOC(1, sizeof(S1AP_UnsuccessfulOutcome_t));
|
||||||
|
|
||||||
unsuccessfulOutcome = pdu.choice.unsuccessfulOutcome;
|
unsuccessfulOutcome = pdu.choice.unsuccessfulOutcome;
|
||||||
|
@ -1940,7 +1940,7 @@ ogs_pkbuf_t *s1ap_build_handover_preparation_failure(
|
||||||
|
|
||||||
memset(&pdu, 0, sizeof (S1AP_S1AP_PDU_t));
|
memset(&pdu, 0, sizeof (S1AP_S1AP_PDU_t));
|
||||||
pdu.present = S1AP_S1AP_PDU_PR_unsuccessfulOutcome;
|
pdu.present = S1AP_S1AP_PDU_PR_unsuccessfulOutcome;
|
||||||
pdu.choice.unsuccessfulOutcome =
|
pdu.choice.unsuccessfulOutcome =
|
||||||
CALLOC(1, sizeof(S1AP_UnsuccessfulOutcome_t));
|
CALLOC(1, sizeof(S1AP_UnsuccessfulOutcome_t));
|
||||||
|
|
||||||
unsuccessfulOutcome = pdu.choice.unsuccessfulOutcome;
|
unsuccessfulOutcome = pdu.choice.unsuccessfulOutcome;
|
||||||
|
@ -2128,10 +2128,10 @@ ogs_pkbuf_t *s1ap_build_handover_request(
|
||||||
Cause->choice.radioNetwork = cause->choice.radioNetwork;
|
Cause->choice.radioNetwork = cause->choice.radioNetwork;
|
||||||
|
|
||||||
asn_uint642INTEGER(
|
asn_uint642INTEGER(
|
||||||
&UEAggregateMaximumBitrate->uEaggregateMaximumBitRateUL,
|
&UEAggregateMaximumBitrate->uEaggregateMaximumBitRateUL,
|
||||||
mme_ue->ambr.uplink);
|
mme_ue->ambr.uplink);
|
||||||
asn_uint642INTEGER(
|
asn_uint642INTEGER(
|
||||||
&UEAggregateMaximumBitrate->uEaggregateMaximumBitRateDL,
|
&UEAggregateMaximumBitrate->uEaggregateMaximumBitRateDL,
|
||||||
mme_ue->ambr.downlink);
|
mme_ue->ambr.downlink);
|
||||||
|
|
||||||
ogs_list_for_each(&mme_ue->sess_list, sess) {
|
ogs_list_for_each(&mme_ue->sess_list, sess) {
|
||||||
|
@ -2170,7 +2170,7 @@ ogs_pkbuf_t *s1ap_build_handover_request(
|
||||||
ogs_assert(bearer->qos.gbr.downlink);
|
ogs_assert(bearer->qos.gbr.downlink);
|
||||||
ogs_assert(bearer->qos.gbr.uplink);
|
ogs_assert(bearer->qos.gbr.uplink);
|
||||||
|
|
||||||
gbrQosInformation =
|
gbrQosInformation =
|
||||||
CALLOC(1, sizeof(struct S1AP_GBR_QosInformation));
|
CALLOC(1, sizeof(struct S1AP_GBR_QosInformation));
|
||||||
asn_uint642INTEGER(&gbrQosInformation->e_RAB_MaximumBitrateDL,
|
asn_uint642INTEGER(&gbrQosInformation->e_RAB_MaximumBitrateDL,
|
||||||
bearer->qos.mbr.downlink);
|
bearer->qos.mbr.downlink);
|
||||||
|
@ -2199,11 +2199,11 @@ ogs_pkbuf_t *s1ap_build_handover_request(
|
||||||
Source_ToTarget_TransparentContainer);
|
Source_ToTarget_TransparentContainer);
|
||||||
|
|
||||||
UESecurityCapabilities->encryptionAlgorithms.size = 2;
|
UESecurityCapabilities->encryptionAlgorithms.size = 2;
|
||||||
UESecurityCapabilities->encryptionAlgorithms.buf =
|
UESecurityCapabilities->encryptionAlgorithms.buf =
|
||||||
CALLOC(UESecurityCapabilities->encryptionAlgorithms.size,
|
CALLOC(UESecurityCapabilities->encryptionAlgorithms.size,
|
||||||
sizeof(uint8_t));
|
sizeof(uint8_t));
|
||||||
UESecurityCapabilities->encryptionAlgorithms.bits_unused = 0;
|
UESecurityCapabilities->encryptionAlgorithms.bits_unused = 0;
|
||||||
UESecurityCapabilities->encryptionAlgorithms.buf[0] =
|
UESecurityCapabilities->encryptionAlgorithms.buf[0] =
|
||||||
(mme_ue->ue_network_capability.eea << 1);
|
(mme_ue->ue_network_capability.eea << 1);
|
||||||
|
|
||||||
UESecurityCapabilities->integrityProtectionAlgorithms.size = 2;
|
UESecurityCapabilities->integrityProtectionAlgorithms.size = 2;
|
||||||
|
@ -2216,7 +2216,7 @@ ogs_pkbuf_t *s1ap_build_handover_request(
|
||||||
|
|
||||||
SecurityContext->nextHopChainingCount = mme_ue->nhcc;
|
SecurityContext->nextHopChainingCount = mme_ue->nhcc;
|
||||||
SecurityContext->nextHopParameter.size = OGS_SHA256_DIGEST_SIZE;
|
SecurityContext->nextHopParameter.size = OGS_SHA256_DIGEST_SIZE;
|
||||||
SecurityContext->nextHopParameter.buf =
|
SecurityContext->nextHopParameter.buf =
|
||||||
CALLOC(SecurityContext->nextHopParameter.size,
|
CALLOC(SecurityContext->nextHopParameter.size,
|
||||||
sizeof(uint8_t));
|
sizeof(uint8_t));
|
||||||
SecurityContext->nextHopParameter.bits_unused = 0;
|
SecurityContext->nextHopParameter.bits_unused = 0;
|
||||||
|
@ -2327,7 +2327,7 @@ ogs_pkbuf_t *s1ap_build_mme_status_transfer(
|
||||||
target_ue = enb_ue_cycle(target_ue);
|
target_ue = enb_ue_cycle(target_ue);
|
||||||
ogs_assert(target_ue);
|
ogs_assert(target_ue);
|
||||||
ogs_assert(enb_statustransfer_transparentContainer);
|
ogs_assert(enb_statustransfer_transparentContainer);
|
||||||
|
|
||||||
ogs_debug("MMEStatusTransfer");
|
ogs_debug("MMEStatusTransfer");
|
||||||
|
|
||||||
memset(&pdu, 0, sizeof (S1AP_S1AP_PDU_t));
|
memset(&pdu, 0, sizeof (S1AP_S1AP_PDU_t));
|
||||||
|
@ -2433,7 +2433,7 @@ ogs_pkbuf_t *s1ap_build_write_replace_warning_request(sbc_pws_data_t *sbc_pws)
|
||||||
MessageIdentifier = &ie->value.choice.MessageIdentifier;
|
MessageIdentifier = &ie->value.choice.MessageIdentifier;
|
||||||
|
|
||||||
MessageIdentifier->size = (16 / 8);
|
MessageIdentifier->size = (16 / 8);
|
||||||
MessageIdentifier->buf =
|
MessageIdentifier->buf =
|
||||||
CALLOC(MessageIdentifier->size, sizeof(uint8_t));
|
CALLOC(MessageIdentifier->size, sizeof(uint8_t));
|
||||||
MessageIdentifier->bits_unused = 0;
|
MessageIdentifier->bits_unused = 0;
|
||||||
MessageIdentifier->buf[0] = (sbc_pws->message_id >> 8) & 0xFF;
|
MessageIdentifier->buf[0] = (sbc_pws->message_id >> 8) & 0xFF;
|
||||||
|
@ -2450,7 +2450,7 @@ ogs_pkbuf_t *s1ap_build_write_replace_warning_request(sbc_pws_data_t *sbc_pws)
|
||||||
SerialNumber = &ie->value.choice.SerialNumber;
|
SerialNumber = &ie->value.choice.SerialNumber;
|
||||||
|
|
||||||
SerialNumber->size = (16 / 8);
|
SerialNumber->size = (16 / 8);
|
||||||
SerialNumber->buf =
|
SerialNumber->buf =
|
||||||
CALLOC(SerialNumber->size, sizeof(uint8_t));
|
CALLOC(SerialNumber->size, sizeof(uint8_t));
|
||||||
SerialNumber->bits_unused = 0;
|
SerialNumber->bits_unused = 0;
|
||||||
SerialNumber->buf[0] = (sbc_pws->serial_number >> 8) & 0xFF;
|
SerialNumber->buf[0] = (sbc_pws->serial_number >> 8) & 0xFF;
|
||||||
|
@ -2499,7 +2499,7 @@ ogs_pkbuf_t *s1ap_build_write_replace_warning_request(sbc_pws_data_t *sbc_pws)
|
||||||
DataCodingScheme = &ie->value.choice.DataCodingScheme;
|
DataCodingScheme = &ie->value.choice.DataCodingScheme;
|
||||||
|
|
||||||
DataCodingScheme->size = (8 / 8);
|
DataCodingScheme->size = (8 / 8);
|
||||||
DataCodingScheme->buf =
|
DataCodingScheme->buf =
|
||||||
CALLOC(DataCodingScheme->size, sizeof(uint8_t));
|
CALLOC(DataCodingScheme->size, sizeof(uint8_t));
|
||||||
DataCodingScheme->bits_unused = 0;
|
DataCodingScheme->bits_unused = 0;
|
||||||
DataCodingScheme->buf[0] = sbc_pws->data_coding_scheme & 0xFF;
|
DataCodingScheme->buf[0] = sbc_pws->data_coding_scheme & 0xFF;
|
||||||
|
@ -2515,7 +2515,7 @@ ogs_pkbuf_t *s1ap_build_write_replace_warning_request(sbc_pws_data_t *sbc_pws)
|
||||||
WarningMessageContents = &ie->value.choice.WarningMessageContents;
|
WarningMessageContents = &ie->value.choice.WarningMessageContents;
|
||||||
|
|
||||||
WarningMessageContents->size = sbc_pws->message_length;;
|
WarningMessageContents->size = sbc_pws->message_length;;
|
||||||
WarningMessageContents->buf =
|
WarningMessageContents->buf =
|
||||||
CALLOC(WarningMessageContents->size, sizeof(uint8_t));
|
CALLOC(WarningMessageContents->size, sizeof(uint8_t));
|
||||||
memcpy(WarningMessageContents->buf,
|
memcpy(WarningMessageContents->buf,
|
||||||
sbc_pws->message_contents, WarningMessageContents->size);
|
sbc_pws->message_contents, WarningMessageContents->size);
|
||||||
|
@ -2567,7 +2567,7 @@ ogs_pkbuf_t *s1ap_build_kill_request(sbc_pws_data_t *sbc_pws)
|
||||||
MessageIdentifier = &ie->value.choice.MessageIdentifier;
|
MessageIdentifier = &ie->value.choice.MessageIdentifier;
|
||||||
|
|
||||||
MessageIdentifier->size = (16 / 8);
|
MessageIdentifier->size = (16 / 8);
|
||||||
MessageIdentifier->buf =
|
MessageIdentifier->buf =
|
||||||
CALLOC(MessageIdentifier->size, sizeof(uint8_t));
|
CALLOC(MessageIdentifier->size, sizeof(uint8_t));
|
||||||
MessageIdentifier->bits_unused = 0;
|
MessageIdentifier->bits_unused = 0;
|
||||||
MessageIdentifier->buf[0] = (sbc_pws->message_id >> 8) & 0xFF;
|
MessageIdentifier->buf[0] = (sbc_pws->message_id >> 8) & 0xFF;
|
||||||
|
@ -2583,7 +2583,7 @@ ogs_pkbuf_t *s1ap_build_kill_request(sbc_pws_data_t *sbc_pws)
|
||||||
SerialNumber = &ie->value.choice.SerialNumber;
|
SerialNumber = &ie->value.choice.SerialNumber;
|
||||||
|
|
||||||
SerialNumber->size = (16 / 8);
|
SerialNumber->size = (16 / 8);
|
||||||
SerialNumber->buf =
|
SerialNumber->buf =
|
||||||
CALLOC(SerialNumber->size, sizeof(uint8_t));
|
CALLOC(SerialNumber->size, sizeof(uint8_t));
|
||||||
SerialNumber->bits_unused = 0;
|
SerialNumber->bits_unused = 0;
|
||||||
SerialNumber->buf[0] = (sbc_pws->serial_number >> 8) & 0xFF;
|
SerialNumber->buf[0] = (sbc_pws->serial_number >> 8) & 0xFF;
|
||||||
|
@ -2592,7 +2592,7 @@ ogs_pkbuf_t *s1ap_build_kill_request(sbc_pws_data_t *sbc_pws)
|
||||||
/* TODO: optional Warning Area List */
|
/* TODO: optional Warning Area List */
|
||||||
|
|
||||||
ogs_debug(" Message[%02x,%02x] Serial[%02x,%02x]",
|
ogs_debug(" Message[%02x,%02x] Serial[%02x,%02x]",
|
||||||
MessageIdentifier->buf[0], MessageIdentifier->buf[1],
|
MessageIdentifier->buf[0], MessageIdentifier->buf[1],
|
||||||
SerialNumber->buf[0], SerialNumber->buf[1]);
|
SerialNumber->buf[0], SerialNumber->buf[1]);
|
||||||
|
|
||||||
return ogs_s1ap_encode(&pdu);
|
return ogs_s1ap_encode(&pdu);
|
||||||
|
|
Loading…
Reference in New Issue