open5gs/src/mme/mme_s6a_handler.c

552 lines
19 KiB
C
Raw Normal View History

2017-04-04 02:00:25 +00:00
#define TRACE_MODULE _mme_s6a_handler
2017-02-28 10:22:01 +00:00
#include "core_debug.h"
2017-03-06 01:30:55 +00:00
#include "core_pool.h"
2017-02-28 10:22:01 +00:00
2017-03-06 08:55:50 +00:00
#include "nas_message.h"
2017-03-04 15:50:22 +00:00
#include "s6a_lib.h"
2017-04-04 02:00:25 +00:00
#include "mme_event.h"
#include "mme_s6a_handler.h"
2017-03-06 01:00:30 +00:00
2017-04-04 05:00:02 +00:00
#define MAX_NUM_SESSION_STATE 32
2017-03-06 01:30:55 +00:00
2017-04-04 02:00:25 +00:00
static struct session_handler *mme_s6a_reg = NULL;
2017-02-28 10:22:01 +00:00
struct sess_state {
2017-04-06 11:10:00 +00:00
mme_ue_t *ue;
2017-02-28 11:31:06 +00:00
struct timespec ts; /* Time of sending the message */
2017-02-28 12:55:19 +00:00
};
2017-04-04 05:00:02 +00:00
pool_declare(sess_state_pool, struct sess_state, MAX_NUM_SESSION_STATE);
2017-03-06 01:30:55 +00:00
2017-04-09 13:01:54 +00:00
/* MME received Authentication Information Answer from HSS */
static void mme_s6a_aia_cb(void *data, struct msg **msg)
{
struct sess_state *mi = NULL;
struct timespec ts;
struct session *sess;
struct avp *avp;
struct avp *avpch1, *avpch2;
struct avp_hdr *hdr;
unsigned long dur;
int error = 0;
int new;
mme_ue_t *ue = NULL;
nas_message_t message;
pkbuf_t *sendbuf = NULL;
event_t e;
nas_authentication_request_t *authentication_request =
&message.emm.authentication_request;
CHECK_SYS_DO(clock_gettime(CLOCK_REALTIME, &ts), return);
/* Search the session, retrieve its data */
d_assert(fd_msg_sess_get(fd_g_config->cnf_dict, *msg, &sess, &new) == 0 &&
new == 0, return,);
d_assert(fd_sess_state_retrieve(mme_s6a_reg, sess, &mi) == 0 &&
mi && (void *)mi == data, fd_msg_free(*msg); *msg = NULL; return,);
ue = mi->ue;
d_assert(ue, error++; goto out,);
d_info("[S6A] Authentication-Information-Response : UE[%s] <-- HSS",
2017-04-09 15:27:19 +00:00
ue->imsi_bcd);
2017-04-09 13:01:54 +00:00
/* Value of Result Code */
d_assert(fd_msg_search_avp(*msg, s6a_result_code, &avp) == 0 && avp,
error++; goto out,);
d_assert(fd_msg_avp_hdr(avp, &hdr) == 0 && hdr, error++; goto out,);
if (hdr->avp_value->i32 != ER_DIAMETER_SUCCESS)
{
d_error("ERROR DIAMETER Result Code(%d)", hdr->avp_value->i32);
error++;
goto out;
}
memset(&message, 0, sizeof(message));
message.emm.h.protocol_discriminator = NAS_PROTOCOL_DISCRIMINATOR_EMM;
message.emm.h.message_type = NAS_AUTHENTICATION_REQUEST;
d_assert(fd_msg_search_avp(*msg, s6a_authentication_info, &avp) == 0 && avp,
error++; goto out,);
d_assert(fd_msg_avp_hdr(avp, &hdr) == 0 && hdr, error++; goto out,);
d_assert(fd_avp_search_avp(avp, s6a_e_utran_vector, &avpch1) == 0 && avp,
error++; goto out,);
d_assert(fd_msg_avp_hdr(avpch1, &hdr) == 0 && hdr, error++; goto out,);
d_assert(fd_avp_search_avp(avpch1, s6a_xres, &avpch2) == 0 && avp,
error++; goto out,);
d_assert(fd_msg_avp_hdr(avpch2, &hdr) == 0 && hdr, error++; goto out,);
memcpy(ue->xres, hdr->avp_value->os.data, hdr->avp_value->os.len);
ue->xres_len = hdr->avp_value->os.len;
d_assert(fd_avp_search_avp(avpch1, s6a_kasme, &avpch2) == 0 && avp,
error++; goto out,);
d_assert(fd_msg_avp_hdr(avpch2, &hdr) == 0 && hdr, error++; goto out,);
memcpy(ue->kasme, hdr->avp_value->os.data, hdr->avp_value->os.len);
d_assert(fd_avp_search_avp(avpch1, s6a_rand, &avpch2) == 0 && avp,
error++; goto out,);
d_assert(fd_msg_avp_hdr(avpch2, &hdr) == 0 && hdr, error++; goto out,);
memcpy(authentication_request->authentication_parameter_rand.rand,
hdr->avp_value->os.data, hdr->avp_value->os.len);
d_assert(fd_avp_search_avp(avpch1, s6a_autn, &avpch2) == 0 && avp,
error++; goto out,);
d_assert(fd_msg_avp_hdr(avpch2, &hdr) == 0 && hdr, error++; goto out,);
authentication_request->authentication_parameter_autn.length =
hdr->avp_value->os.len;
memcpy(authentication_request->authentication_parameter_autn.autn,
hdr->avp_value->os.data, hdr->avp_value->os.len);
d_assert(nas_plain_encode(&sendbuf, &message) == CORE_OK && sendbuf,
error++; goto out,);
event_set(&e, EVT_MSG_MME_EMM);
event_set_param1(&e, (c_uintptr_t)ue);
event_set_param2(&e, (c_uintptr_t)sendbuf);
if (mme_event_send(&e) != CORE_OK)
{
d_error("mme_event_send failed");
pkbuf_free(sendbuf);
error++;
}
out:
/* Free the message */
d_assert(pthread_mutex_lock(&s6a_config->stats_lock) == 0,,);
dur = ((ts.tv_sec - mi->ts.tv_sec) * 1000000) +
((ts.tv_nsec - mi->ts.tv_nsec) / 1000);
if (s6a_config->stats.nb_recv)
{
/* Ponderate in the avg */
s6a_config->stats.avg = (s6a_config->stats.avg *
s6a_config->stats.nb_recv + dur) / (s6a_config->stats.nb_recv + 1);
/* Min, max */
if (dur < s6a_config->stats.shortest)
s6a_config->stats.shortest = dur;
if (dur > s6a_config->stats.longest)
s6a_config->stats.longest = dur;
}
else
{
s6a_config->stats.shortest = dur;
s6a_config->stats.longest = dur;
s6a_config->stats.avg = dur;
}
if (error)
s6a_config->stats.nb_errs++;
else
s6a_config->stats.nb_recv++;
d_assert(pthread_mutex_unlock(&s6a_config->stats_lock) == 0,,);
/* Display how long it took */
if (ts.tv_nsec > mi->ts.tv_nsec)
d_trace(1, "in %d.%06ld sec\n",
(int)(ts.tv_sec - mi->ts.tv_sec),
(long)(ts.tv_nsec - mi->ts.tv_nsec) / 1000);
else
d_trace(1, "in %d.%06ld sec\n",
(int)(ts.tv_sec + 1 - mi->ts.tv_sec),
(long)(1000000000 + ts.tv_nsec - mi->ts.tv_nsec) / 1000);
d_assert(fd_msg_free(*msg) == 0,,);
*msg = NULL;
pool_free_node(&sess_state_pool, mi);
}
2017-02-28 10:22:01 +00:00
2017-04-09 13:01:54 +00:00
/* MME Sends Authentication Information Request to HSS */
2017-04-09 11:51:26 +00:00
int mme_s6a_send_air(mme_ue_t *ue)
2017-02-28 12:55:19 +00:00
{
struct msg *req = NULL;
struct avp *avp;
2017-02-28 15:00:28 +00:00
struct avp *avpch;
2017-02-28 12:55:19 +00:00
union avp_value val;
struct sess_state *mi = NULL, *svg;
struct session *sess = NULL;
2017-03-06 00:00:37 +00:00
d_assert(ue, return -1, "Null Param");
2017-02-28 12:55:19 +00:00
/* Create the random value to store with the session */
2017-03-06 01:30:55 +00:00
pool_alloc_node(&sess_state_pool, &mi);
2017-02-28 12:55:19 +00:00
d_assert(mi, return -1, "malloc failed: %s", strerror(errno));
2017-03-06 01:30:55 +00:00
mi->ue = ue;
2017-02-28 12:55:19 +00:00
/* Create the request */
2017-03-06 01:00:30 +00:00
d_assert(fd_msg_new(s6a_cmd_air, MSGFL_ALLOC_ETEID, &req) == 0,
2017-03-06 01:30:55 +00:00
pool_free_node(&sess_state_pool, mi); return -1,);
2017-02-28 12:55:19 +00:00
/* Create a new session */
#define S6A_APP_SID_OPT "app_s6a"
d_assert(fd_msg_new_session(req, (os0_t)S6A_APP_SID_OPT,
CONSTSTRLEN(S6A_APP_SID_OPT)) == 0, goto out,);
d_assert(fd_msg_sess_get(fd_g_config->cnf_dict, req, &sess, NULL) == 0,
goto out, );
2017-02-28 15:00:28 +00:00
2017-04-09 13:01:54 +00:00
/* Set the Auth-Session-State AVP */
2017-02-28 15:00:28 +00:00
d_assert(fd_msg_avp_new(s6a_auth_session_state, 0, &avp) == 0, goto out,);
val.i32 = 1;
d_assert(fd_msg_avp_setvalue(avp, &val) == 0, goto out,);
d_assert(fd_msg_avp_add(req, MSG_BRW_LAST_CHILD, avp) == 0, goto out,);
/* Set Origin-Host & Origin-Realm */
d_assert(fd_msg_add_origin(req, 0) == 0, goto out, );
2017-02-28 12:55:19 +00:00
/* Set the Destination-Realm AVP */
d_assert(fd_msg_avp_new(s6a_destination_realm, 0, &avp) == 0, goto out,);
val.os.data = (unsigned char *)(fd_g_config->cnf_diamrlm);
val.os.len = strlen(fd_g_config->cnf_diamrlm);
d_assert(fd_msg_avp_setvalue(avp, &val) == 0, goto out, );
d_assert(fd_msg_avp_add(req, MSG_BRW_LAST_CHILD, avp) == 0, goto out, );
2017-04-09 13:01:54 +00:00
/* Set the User-Name AVP */
2017-02-28 12:55:19 +00:00
d_assert(fd_msg_avp_new(s6a_user_name, 0, &avp) == 0, goto out,);
2017-04-10 02:29:46 +00:00
val.os.data = (c_uint8_t *)ue->imsi_bcd;
val.os.len = strlen(ue->imsi_bcd);
2017-02-28 12:55:19 +00:00
d_assert(fd_msg_avp_setvalue(avp, &val) == 0, goto out, );
d_assert(fd_msg_avp_add(req, MSG_BRW_LAST_CHILD, avp) == 0, goto out,);
2017-02-28 15:00:28 +00:00
/* Add the Authentication-Info */
d_assert(fd_msg_avp_new(s6a_req_eutran_auth_info, 0, &avp) == 0, goto out,);
d_assert(fd_msg_avp_new(s6a_number_of_requested_vectors, 0,
&avpch) == 0, goto out,);
2017-03-05 14:43:46 +00:00
val.u32 = 1;
2017-02-28 15:00:28 +00:00
d_assert(fd_msg_avp_setvalue (avpch, &val) == 0, goto out,);
d_assert(fd_msg_avp_add (avp, MSG_BRW_LAST_CHILD, avpch) == 0, goto out,);
d_assert(fd_msg_avp_new(s6a_immediate_response_preferred, 0,
&avpch) == 0, goto out,);
2017-03-05 14:43:46 +00:00
val.u32 = 1;
2017-02-28 15:00:28 +00:00
d_assert(fd_msg_avp_setvalue(avpch, &val) == 0, goto out,);
d_assert(fd_msg_avp_add(avp, MSG_BRW_LAST_CHILD, avpch) == 0, goto out,);
2017-02-28 12:55:19 +00:00
d_assert(fd_msg_avp_add(req, MSG_BRW_LAST_CHILD, avp) == 0, goto out,);
2017-04-09 13:01:54 +00:00
/* Set the Visited-PLMN-Id AVP */
2017-03-03 10:07:18 +00:00
d_assert(fd_msg_avp_new(s6a_visited_plmn_id, 0, &avp) == 0, goto out,);
2017-04-09 11:51:26 +00:00
val.os.data = (c_uint8_t *)&ue->visited_plmn_id;
2017-03-03 10:07:18 +00:00
val.os.len = PLMN_ID_LEN;
d_assert(fd_msg_avp_setvalue(avp, &val) == 0, goto out,);
d_assert(fd_msg_avp_add(req, MSG_BRW_LAST_CHILD, avp) == 0, goto out,);
2017-02-28 12:55:19 +00:00
d_assert(clock_gettime(CLOCK_REALTIME, &mi->ts) == 0, goto out,);
/* Keep a pointer to the session data for debug purpose,
* in real life we would not need it */
svg = mi;
/* Store this value in the session */
2017-04-04 02:00:25 +00:00
d_assert(fd_sess_state_store(mme_s6a_reg, sess, &mi) == 0, goto out,);
2017-02-28 12:55:19 +00:00
/* Send the request */
2017-04-04 02:00:25 +00:00
d_assert(fd_msg_send(&req, mme_s6a_aia_cb, svg) == 0, goto out,);
2017-02-28 12:55:19 +00:00
/* Increment the counter */
d_assert(pthread_mutex_lock(&s6a_config->stats_lock) == 0,,);
s6a_config->stats.nb_sent++;
d_assert(pthread_mutex_unlock(&s6a_config->stats_lock) == 0,, );
2017-03-07 06:44:21 +00:00
d_info("[S6A] Authentication-Information-Request : UE[%s] --> HSS",
2017-04-09 15:27:19 +00:00
ue->imsi_bcd);
2017-03-07 06:44:21 +00:00
2017-02-28 12:55:19 +00:00
return 0;
out:
d_assert(fd_msg_free(req) == 0,,);
2017-03-06 01:30:55 +00:00
pool_free_node(&sess_state_pool, mi);
2017-02-28 12:55:19 +00:00
return -1;
}
2017-04-09 13:01:54 +00:00
/* MME received Update Location Answer from HSS */
static void mme_s6a_ula_cb(void *data, struct msg **msg)
2017-02-28 10:22:01 +00:00
{
2017-02-28 11:31:06 +00:00
struct sess_state *mi = NULL;
struct timespec ts;
struct session *sess;
struct avp *avp;
2017-04-09 13:01:54 +00:00
#if 0
2017-03-06 08:55:50 +00:00
struct avp *avpch1, *avpch2;
2017-04-09 13:01:54 +00:00
#endif
2017-02-28 11:31:06 +00:00
struct avp_hdr *hdr;
unsigned long dur;
int error = 0;
2017-02-28 12:55:19 +00:00
int new;
2017-03-06 08:55:50 +00:00
2017-04-06 11:10:00 +00:00
mme_ue_t *ue = NULL;
2017-03-06 08:55:50 +00:00
nas_message_t message;
2017-04-09 13:01:54 +00:00
#if 0
2017-03-06 08:55:50 +00:00
pkbuf_t *sendbuf = NULL;
event_t e;
nas_authentication_request_t *authentication_request =
2017-04-07 13:23:38 +00:00
&message.emm.authentication_request;
2017-04-09 13:01:54 +00:00
#endif
2017-02-28 11:31:06 +00:00
CHECK_SYS_DO(clock_gettime(CLOCK_REALTIME, &ts), return);
2017-02-28 10:22:01 +00:00
2017-02-28 11:31:06 +00:00
/* Search the session, retrieve its data */
2017-02-28 12:55:19 +00:00
d_assert(fd_msg_sess_get(fd_g_config->cnf_dict, *msg, &sess, &new) == 0 &&
new == 0, return,);
2017-04-04 02:00:25 +00:00
d_assert(fd_sess_state_retrieve(mme_s6a_reg, sess, &mi) == 0 &&
2017-03-06 01:30:55 +00:00
mi && (void *)mi == data, fd_msg_free(*msg); *msg = NULL; return,);
ue = mi->ue;
d_assert(ue, error++; goto out,);
2017-03-07 06:44:21 +00:00
d_info("[S6A] Authentication-Information-Response : UE[%s] <-- HSS",
2017-04-09 15:27:19 +00:00
ue->imsi_bcd);
2017-02-28 11:31:06 +00:00
/* Value of Result Code */
2017-03-06 01:30:55 +00:00
d_assert(fd_msg_search_avp(*msg, s6a_result_code, &avp) == 0 && avp,
error++; goto out,);
d_assert(fd_msg_avp_hdr(avp, &hdr) == 0 && hdr, error++; goto out,);
if (hdr->avp_value->i32 != ER_DIAMETER_SUCCESS)
2017-02-28 11:31:06 +00:00
{
2017-03-06 01:30:55 +00:00
d_error("ERROR DIAMETER Result Code(%d)", hdr->avp_value->i32);
2017-02-28 11:31:06 +00:00
error++;
2017-03-06 01:30:55 +00:00
goto out;
2017-02-28 11:31:06 +00:00
}
2017-03-06 08:55:50 +00:00
memset(&message, 0, sizeof(message));
2017-04-07 13:23:38 +00:00
message.emm.h.protocol_discriminator = NAS_PROTOCOL_DISCRIMINATOR_EMM;
message.emm.h.message_type = NAS_AUTHENTICATION_REQUEST;
2017-03-06 08:55:50 +00:00
2017-04-09 13:01:54 +00:00
#if 0
2017-03-06 08:55:50 +00:00
d_assert(fd_msg_search_avp(*msg, s6a_authentication_info, &avp) == 0 && avp,
2017-03-06 01:30:55 +00:00
error++; goto out,);
d_assert(fd_msg_avp_hdr(avp, &hdr) == 0 && hdr, error++; goto out,);
2017-03-06 08:55:50 +00:00
d_assert(fd_avp_search_avp(avp, s6a_e_utran_vector, &avpch1) == 0 && avp,
2017-03-06 01:30:55 +00:00
error++; goto out,);
2017-03-06 08:55:50 +00:00
d_assert(fd_msg_avp_hdr(avpch1, &hdr) == 0 && hdr, error++; goto out,);
d_assert(fd_avp_search_avp(avpch1, s6a_xres, &avpch2) == 0 && avp,
error++; goto out,);
d_assert(fd_msg_avp_hdr(avpch2, &hdr) == 0 && hdr, error++; goto out,);
memcpy(ue->xres, hdr->avp_value->os.data, hdr->avp_value->os.len);
ue->xres_len = hdr->avp_value->os.len;
d_assert(fd_avp_search_avp(avpch1, s6a_kasme, &avpch2) == 0 && avp,
error++; goto out,);
d_assert(fd_msg_avp_hdr(avpch2, &hdr) == 0 && hdr, error++; goto out,);
memcpy(ue->kasme, hdr->avp_value->os.data, hdr->avp_value->os.len);
d_assert(fd_avp_search_avp(avpch1, s6a_rand, &avpch2) == 0 && avp,
error++; goto out,);
d_assert(fd_msg_avp_hdr(avpch2, &hdr) == 0 && hdr, error++; goto out,);
memcpy(authentication_request->authentication_parameter_rand.rand,
hdr->avp_value->os.data, hdr->avp_value->os.len);
d_assert(fd_avp_search_avp(avpch1, s6a_autn, &avpch2) == 0 && avp,
error++; goto out,);
d_assert(fd_msg_avp_hdr(avpch2, &hdr) == 0 && hdr, error++; goto out,);
authentication_request->authentication_parameter_autn.length =
hdr->avp_value->os.len;
memcpy(authentication_request->authentication_parameter_autn.autn,
hdr->avp_value->os.data, hdr->avp_value->os.len);
2017-03-08 13:39:28 +00:00
d_assert(nas_plain_encode(&sendbuf, &message) == CORE_OK && sendbuf,
2017-03-06 08:55:50 +00:00
error++; goto out,);
2017-04-08 01:39:35 +00:00
event_set(&e, EVT_MSG_MME_EMM);
2017-03-06 08:55:50 +00:00
event_set_param1(&e, (c_uintptr_t)ue);
event_set_param2(&e, (c_uintptr_t)sendbuf);
2017-03-27 01:22:30 +00:00
if (mme_event_send(&e) != CORE_OK)
{
d_error("mme_event_send failed");
pkbuf_free(sendbuf);
error++;
}
2017-04-09 13:01:54 +00:00
#endif
2017-03-06 01:30:55 +00:00
out:
/* Free the message */
2017-02-28 12:55:19 +00:00
d_assert(pthread_mutex_lock(&s6a_config->stats_lock) == 0,,);
2017-02-28 11:31:06 +00:00
dur = ((ts.tv_sec - mi->ts.tv_sec) * 1000000) +
2017-02-28 10:22:01 +00:00
((ts.tv_nsec - mi->ts.tv_nsec) / 1000);
2017-02-28 11:31:06 +00:00
if (s6a_config->stats.nb_recv)
{
/* Ponderate in the avg */
s6a_config->stats.avg = (s6a_config->stats.avg *
2017-02-28 10:40:44 +00:00
s6a_config->stats.nb_recv + dur) / (s6a_config->stats.nb_recv + 1);
2017-02-28 11:31:06 +00:00
/* Min, max */
if (dur < s6a_config->stats.shortest)
s6a_config->stats.shortest = dur;
if (dur > s6a_config->stats.longest)
s6a_config->stats.longest = dur;
}
else
{
s6a_config->stats.shortest = dur;
s6a_config->stats.longest = dur;
s6a_config->stats.avg = dur;
}
if (error)
s6a_config->stats.nb_errs++;
else
s6a_config->stats.nb_recv++;
2017-02-28 12:55:19 +00:00
d_assert(pthread_mutex_unlock(&s6a_config->stats_lock) == 0,,);
2017-02-28 11:31:06 +00:00
/* Display how long it took */
if (ts.tv_nsec > mi->ts.tv_nsec)
2017-03-07 06:44:21 +00:00
d_trace(1, "in %d.%06ld sec\n",
2017-02-28 11:31:06 +00:00
(int)(ts.tv_sec - mi->ts.tv_sec),
(long)(ts.tv_nsec - mi->ts.tv_nsec) / 1000);
else
2017-03-07 06:44:21 +00:00
d_trace(1, "in %d.%06ld sec\n",
2017-02-28 11:31:06 +00:00
(int)(ts.tv_sec + 1 - mi->ts.tv_sec),
(long)(1000000000 + ts.tv_nsec - mi->ts.tv_nsec) / 1000);
2017-02-28 12:55:19 +00:00
d_assert(fd_msg_free(*msg) == 0,,);
2017-02-28 11:31:06 +00:00
*msg = NULL;
2017-03-06 01:30:55 +00:00
pool_free_node(&sess_state_pool, mi);
2017-02-28 10:22:01 +00:00
}
2017-04-09 13:01:54 +00:00
/* MME Sends Update Location Request to HSS */
int mme_s6a_send_ulr(mme_ue_t *ue)
{
struct msg *req = NULL;
struct avp *avp;
union avp_value val;
struct sess_state *mi = NULL, *svg;
struct session *sess = NULL;
d_assert(ue, return -1, "Null Param");
/* Create the random value to store with the session */
pool_alloc_node(&sess_state_pool, &mi);
d_assert(mi, return -1, "malloc failed: %s", strerror(errno));
mi->ue = ue;
/* Create the request */
d_assert(fd_msg_new(s6a_cmd_ulr, MSGFL_ALLOC_ETEID, &req) == 0,
pool_free_node(&sess_state_pool, mi); return -1,);
/* Create a new session */
#define S6A_APP_SID_OPT "app_s6a"
d_assert(fd_msg_new_session(req, (os0_t)S6A_APP_SID_OPT,
CONSTSTRLEN(S6A_APP_SID_OPT)) == 0, goto out,);
d_assert(fd_msg_sess_get(fd_g_config->cnf_dict, req, &sess, NULL) == 0,
goto out, );
/* Set the Auth-Session-State AVP */
d_assert(fd_msg_avp_new(s6a_auth_session_state, 0, &avp) == 0, goto out,);
val.i32 = 1;
d_assert(fd_msg_avp_setvalue(avp, &val) == 0, goto out,);
d_assert(fd_msg_avp_add(req, MSG_BRW_LAST_CHILD, avp) == 0, goto out,);
/* Set Origin-Host & Origin-Realm */
d_assert(fd_msg_add_origin(req, 0) == 0, goto out, );
/* Set the Destination-Realm AVP */
d_assert(fd_msg_avp_new(s6a_destination_realm, 0, &avp) == 0, goto out,);
val.os.data = (unsigned char *)(fd_g_config->cnf_diamrlm);
val.os.len = strlen(fd_g_config->cnf_diamrlm);
d_assert(fd_msg_avp_setvalue(avp, &val) == 0, goto out, );
d_assert(fd_msg_avp_add(req, MSG_BRW_LAST_CHILD, avp) == 0, goto out, );
/* Set the User-Name AVP */
d_assert(fd_msg_avp_new(s6a_user_name, 0, &avp) == 0, goto out,);
2017-04-10 02:29:46 +00:00
val.os.data = (c_uint8_t *)ue->imsi_bcd;
val.os.len = strlen(ue->imsi_bcd);
2017-04-09 13:01:54 +00:00
d_assert(fd_msg_avp_setvalue(avp, &val) == 0, goto out, );
d_assert(fd_msg_avp_add(req, MSG_BRW_LAST_CHILD, avp) == 0, goto out,);
/* Set the RAT-Type */
d_assert(fd_msg_avp_new(s6a_rat_type, 0, &avp) == 0, goto out,);
#define S6A_RAT_TYPE_WLAN 0
#define S6A_RAT_TYPE_VIRTUAL 1
#define S6A_RAT_TYPE_UTRAN 1000
#define S6A_RAT_TYPE_GERAN 1001
#define S6A_RAT_TYPE_GAN 1002
#define S6A_RAT_TYPE_HSPA_EVOLUTION 1003
#define S6A_RAT_TYPE_EUTRAN 1004
#define S6A_RAT_TYPE_EUTRAN_NB_IOT 1005
#define S6A_RAT_TYPE_CDMA2000_1X 2000
#define S6A_RAT_TYPE_HRPD 2001
#define S6A_RAT_TYPE_UMB 2002
#define S6A_RAT_TYPE_EHRPD 2003
val.u32 = S6A_RAT_TYPE_EUTRAN;
d_assert(fd_msg_avp_setvalue(avp, &val) == 0, goto out,);
d_assert(fd_msg_avp_add(req, MSG_BRW_LAST_CHILD, avp) == 0, goto out,);
/* Set the ULR-Flags */
d_assert(fd_msg_avp_new(s6a_ulr_flags, 0, &avp) == 0, goto out,);
val.u32 = S6A_ULR_S6A_S6D_INDICATOR;
d_assert(fd_msg_avp_setvalue(avp, &val) == 0, goto out,);
d_assert(fd_msg_avp_add(req, MSG_BRW_LAST_CHILD, avp) == 0, goto out,);
/* Set the Visited-PLMN-Id */
d_assert(fd_msg_avp_new(s6a_visited_plmn_id, 0, &avp) == 0, goto out,);
val.os.data = (c_uint8_t *)&ue->visited_plmn_id;
val.os.len = PLMN_ID_LEN;
d_assert(fd_msg_avp_setvalue(avp, &val) == 0, goto out,);
d_assert(fd_msg_avp_add(req, MSG_BRW_LAST_CHILD, avp) == 0, goto out,);
/* Set the UE-SRVCC Capability */
d_assert(fd_msg_avp_new(s6a_ue_srvcc_cap, 0, &avp) == 0, goto out,);
val.u32 = S6A_UE_SRVCC_NOT_SUPPORTED;
d_assert(fd_msg_avp_setvalue(avp, &val) == 0, goto out,);
d_assert(fd_msg_avp_add(req, MSG_BRW_LAST_CHILD, avp) == 0, goto out,);
d_assert(clock_gettime(CLOCK_REALTIME, &mi->ts) == 0, goto out,);
/* Keep a pointer to the session data for debug purpose,
* in real life we would not need it */
svg = mi;
/* Store this value in the session */
d_assert(fd_sess_state_store(mme_s6a_reg, sess, &mi) == 0, goto out,);
/* Send the request */
d_assert(fd_msg_send(&req, mme_s6a_ula_cb, svg) == 0, goto out,);
/* Increment the counter */
d_assert(pthread_mutex_lock(&s6a_config->stats_lock) == 0,,);
s6a_config->stats.nb_sent++;
d_assert(pthread_mutex_unlock(&s6a_config->stats_lock) == 0,, );
d_info("[S6A] Update-Location-Request : UE[%s] --> HSS",
2017-04-09 15:27:19 +00:00
ue->imsi_bcd);
2017-04-09 13:01:54 +00:00
return 0;
out:
d_assert(fd_msg_free(req) == 0,,);
pool_free_node(&sess_state_pool, mi);
return -1;
}
2017-04-04 02:00:25 +00:00
status_t mme_s6a_init(void)
2017-03-06 01:00:30 +00:00
{
status_t rv;
rv = s6a_init(MODE_MME);
if (rv != CORE_OK) return rv;
2017-04-04 05:00:02 +00:00
pool_init(&sess_state_pool, MAX_NUM_SESSION_STATE);
2017-03-06 01:30:55 +00:00
2017-04-04 02:00:25 +00:00
d_assert(fd_sess_handler_create(&mme_s6a_reg,
2017-03-06 01:00:30 +00:00
(void *)free, NULL, NULL) == 0, return -1,);
return CORE_OK;
}
2017-04-04 02:00:25 +00:00
void mme_s6a_final(void)
2017-03-06 01:00:30 +00:00
{
2017-04-04 02:00:25 +00:00
d_assert(fd_sess_handler_destroy(&mme_s6a_reg, NULL) == 0,,);
2017-03-06 01:00:30 +00:00
2017-03-06 01:30:55 +00:00
d_print("%d not freed in sess_state_pool[%d] of S6A-SM\n",
pool_size(&sess_state_pool) - pool_avail(&sess_state_pool),
pool_size(&sess_state_pool));
pool_final(&sess_state_pool);
2017-03-06 01:00:30 +00:00
s6a_final();
}