2017-03-26 05:57:33 +00:00
|
|
|
#define TRACE_MODULE _emm_handler
|
|
|
|
|
|
|
|
#include "core_debug.h"
|
|
|
|
|
|
|
|
#include "nas_message.h"
|
|
|
|
|
2017-04-04 01:49:19 +00:00
|
|
|
#include "mme_event.h"
|
2017-03-26 05:57:33 +00:00
|
|
|
|
2017-04-04 02:08:32 +00:00
|
|
|
#include "mme_kdf.h"
|
2017-03-26 05:57:33 +00:00
|
|
|
#include "nas_security.h"
|
|
|
|
#include "nas_conv.h"
|
2017-04-04 02:00:25 +00:00
|
|
|
#include "mme_s6a_handler.h"
|
2017-03-26 05:57:33 +00:00
|
|
|
|
2017-04-08 02:38:09 +00:00
|
|
|
void emm_handle_esm_message_container(
|
|
|
|
mme_ue_t *ue, nas_esm_message_container_t *esm_message_container)
|
|
|
|
{
|
|
|
|
|
|
|
|
nas_esm_header_t *h = NULL;
|
|
|
|
c_uint8_t pti = 0;
|
|
|
|
mme_esm_t *esm = NULL;
|
|
|
|
|
|
|
|
d_assert(ue, return, "Null param");
|
|
|
|
d_assert(esm_message_container, return, "Null param");
|
|
|
|
d_assert(esm_message_container->length, return, "Null param");
|
|
|
|
|
|
|
|
h = (nas_esm_header_t *)esm_message_container->buffer;
|
|
|
|
d_assert(h, return, "Null param");
|
|
|
|
|
|
|
|
pti = h->procedure_transaction_identity;
|
|
|
|
if (pti == NAS_PROCEDURE_TRANSACTION_IDENTITY_UNASSIGNED)
|
|
|
|
{
|
|
|
|
d_error("Procedure Trasaction is NOT triggered by UE");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
esm = mme_esm_find_by_pti(ue, pti);
|
|
|
|
if (!esm)
|
|
|
|
{
|
|
|
|
esm = mme_esm_add(ue, pti);
|
|
|
|
d_assert(esm, return, "Null param");
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
d_warn("Duplicated: MME-UE-S1AP-ID[%d] sends "
|
|
|
|
"PDN Connectivity Message[PTI(%d)]",
|
|
|
|
ue->mme_ue_s1ap_id, esm->pti);
|
|
|
|
}
|
|
|
|
|
|
|
|
mme_event_emm_to_esm(esm, esm_message_container);
|
|
|
|
}
|
|
|
|
|
2017-03-26 05:57:33 +00:00
|
|
|
void emm_handle_attach_request(
|
2017-04-06 11:10:00 +00:00
|
|
|
mme_ue_t *ue, nas_attach_request_t *attach_request)
|
2017-03-26 05:57:33 +00:00
|
|
|
{
|
|
|
|
nas_eps_mobile_identity_t *eps_mobile_identity =
|
2017-04-08 02:38:09 +00:00
|
|
|
&attach_request->eps_mobile_identity;
|
|
|
|
|
|
|
|
emm_handle_esm_message_container(
|
|
|
|
ue, &attach_request->esm_message_container);
|
2017-03-26 05:57:33 +00:00
|
|
|
|
|
|
|
switch(eps_mobile_identity->imsi.type_of_identity)
|
|
|
|
{
|
|
|
|
case NAS_EPS_MOBILE_IDENTITY_IMSI:
|
|
|
|
{
|
|
|
|
plmn_id_t *plmn_id = &mme_self()->plmn_id;
|
|
|
|
|
|
|
|
if (attach_request->presencemask &
|
|
|
|
NAS_ATTACH_REQUEST_LAST_VISITED_REGISTERED_TAI_PRESENT)
|
|
|
|
{
|
|
|
|
nas_tracking_area_identity_t *last_visited_registered_tai =
|
|
|
|
&attach_request->last_visited_registered_tai;
|
|
|
|
|
|
|
|
plmn_id = &last_visited_registered_tai->plmn_id;
|
|
|
|
}
|
|
|
|
nas_imsi_bcd_to_buffer(
|
|
|
|
&eps_mobile_identity->imsi, eps_mobile_identity->length,
|
|
|
|
ue->imsi, &ue->imsi_len);
|
|
|
|
|
|
|
|
memcpy(&ue->ue_network_capability,
|
|
|
|
&attach_request->ue_network_capability,
|
|
|
|
sizeof(attach_request->ue_network_capability));
|
|
|
|
memcpy(&ue->ms_network_capability,
|
|
|
|
&attach_request->ms_network_capability,
|
|
|
|
sizeof(attach_request->ms_network_capability));
|
|
|
|
|
|
|
|
d_assert(ue->imsi, return,);
|
|
|
|
d_info("[NAS] Attach request : UE[%s] --> EMM", ue->imsi);
|
|
|
|
|
2017-04-04 02:00:25 +00:00
|
|
|
mme_s6a_send_auth_info_req(ue, plmn_id);
|
2017-03-26 05:57:33 +00:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
default:
|
|
|
|
{
|
|
|
|
d_warn("Not implemented(type:%d)",
|
|
|
|
eps_mobile_identity->imsi.type_of_identity);
|
|
|
|
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
void emm_handle_authentication_response(
|
2017-04-06 11:10:00 +00:00
|
|
|
mme_ue_t *ue, nas_authentication_response_t *authentication_response)
|
2017-03-26 05:57:33 +00:00
|
|
|
{
|
|
|
|
nas_authentication_response_parameter_t *authentication_response_parameter =
|
|
|
|
&authentication_response->authentication_response_parameter;
|
|
|
|
|
|
|
|
nas_message_t message;
|
|
|
|
pkbuf_t *sendbuf = NULL;
|
|
|
|
nas_security_mode_command_t *security_mode_command =
|
2017-04-07 13:23:38 +00:00
|
|
|
&message.emm.security_mode_command;
|
2017-03-26 05:57:33 +00:00
|
|
|
nas_security_algorithms_t *selected_nas_security_algorithms =
|
|
|
|
&security_mode_command->selected_nas_security_algorithms;
|
|
|
|
nas_key_set_identifier_t *nas_key_set_identifier =
|
|
|
|
&security_mode_command->nas_key_set_identifier;
|
|
|
|
nas_ue_security_capability_t *replayed_ue_security_capabilities =
|
|
|
|
&security_mode_command->replayed_ue_security_capabilities;
|
|
|
|
|
|
|
|
d_assert(ue, return, "Null param");
|
|
|
|
|
|
|
|
if (authentication_response_parameter->length != ue->xres_len ||
|
|
|
|
memcmp(authentication_response_parameter->res,
|
|
|
|
ue->xres, ue->xres_len) != 0)
|
|
|
|
{
|
|
|
|
d_error("authentication failed");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
d_assert(ue->imsi, return, );
|
|
|
|
d_info("[NAS] Authentication response : UE[%s] --> EMM", ue->imsi);
|
|
|
|
|
|
|
|
memset(&message, 0, sizeof(message));
|
2017-04-07 13:23:38 +00:00
|
|
|
message.h.security_header_type =
|
|
|
|
NAS_SECURITY_HEADER_INTEGRITY_PROTECTED_AND_NEW_SECURITY_CONTEXT;
|
2017-03-26 05:57:33 +00:00
|
|
|
message.h.protocol_discriminator = NAS_PROTOCOL_DISCRIMINATOR_EMM;
|
2017-04-07 13:23:38 +00:00
|
|
|
|
|
|
|
message.emm.h.protocol_discriminator = NAS_PROTOCOL_DISCRIMINATOR_EMM;
|
|
|
|
message.emm.h.message_type = NAS_SECURITY_MODE_COMMAND;
|
2017-03-26 05:57:33 +00:00
|
|
|
|
|
|
|
selected_nas_security_algorithms->type_of_ciphering_algorithm =
|
|
|
|
mme_self()->selected_enc_algorithm;
|
|
|
|
selected_nas_security_algorithms->type_of_integrity_protection_algorithm =
|
|
|
|
mme_self()->selected_int_algorithm;
|
|
|
|
|
|
|
|
nas_key_set_identifier->tsc = 0;
|
|
|
|
nas_key_set_identifier->nas_key_set_identifier = 0;
|
|
|
|
|
|
|
|
replayed_ue_security_capabilities->length =
|
|
|
|
sizeof(replayed_ue_security_capabilities->eea) +
|
|
|
|
sizeof(replayed_ue_security_capabilities->eia) +
|
|
|
|
sizeof(replayed_ue_security_capabilities->uea) +
|
|
|
|
sizeof(replayed_ue_security_capabilities->uia) +
|
|
|
|
sizeof(replayed_ue_security_capabilities->gea);
|
|
|
|
replayed_ue_security_capabilities->eea = ue->ue_network_capability.eea;
|
|
|
|
replayed_ue_security_capabilities->eia = ue->ue_network_capability.eia;
|
|
|
|
replayed_ue_security_capabilities->uea = ue->ue_network_capability.uea;
|
|
|
|
replayed_ue_security_capabilities->uia = ue->ue_network_capability.uia;
|
|
|
|
replayed_ue_security_capabilities->gea =
|
|
|
|
(ue->ms_network_capability.gea1 << 6) |
|
|
|
|
ue->ms_network_capability.extended_gea;
|
|
|
|
|
|
|
|
mme_kdf_nas(MME_KDF_NAS_INT_ALG, mme_self()->selected_int_algorithm,
|
|
|
|
ue->kasme, ue->knas_int);
|
|
|
|
mme_kdf_nas(MME_KDF_NAS_ENC_ALG, mme_self()->selected_enc_algorithm,
|
|
|
|
ue->kasme, ue->knas_enc);
|
|
|
|
|
|
|
|
d_assert(nas_security_encode(&sendbuf, ue, &message) == CORE_OK &&
|
|
|
|
sendbuf,,);
|
2017-03-26 06:34:34 +00:00
|
|
|
mme_event_nas_to_s1ap(ue, sendbuf);
|
2017-03-26 05:57:33 +00:00
|
|
|
|
|
|
|
d_assert(ue->imsi, return,);
|
|
|
|
d_info("[NAS] Security mode command : UE[%s] <-- EMM", ue->imsi);
|
|
|
|
}
|
|
|
|
|
2017-04-07 10:23:26 +00:00
|
|
|
void emm_handle_security_mode_complete(mme_ue_t *ue)
|
|
|
|
{
|
|
|
|
nas_message_t message;
|
|
|
|
pkbuf_t *sendbuf = NULL;
|
|
|
|
|
|
|
|
memset(&message, 0, sizeof(message));
|
|
|
|
message.h.security_header_type =
|
|
|
|
NAS_SECURITY_HEADER_INTEGRITY_PROTECTED_AND_CIPHERED;
|
2017-04-07 13:23:38 +00:00
|
|
|
message.h.protocol_discriminator = NAS_PROTOCOL_DISCRIMINATOR_EMM;
|
|
|
|
|
|
|
|
message.esm.h.protocol_discriminator = NAS_PROTOCOL_DISCRIMINATOR_ESM;
|
|
|
|
message.esm.h.procedure_transaction_identity = 33;
|
|
|
|
message.esm.h.message_type = NAS_ESM_INFORMATION_REQUEST;
|
|
|
|
|
2017-04-07 10:23:26 +00:00
|
|
|
d_assert(nas_security_encode(&sendbuf, ue, &message) == CORE_OK &&
|
|
|
|
sendbuf,,);
|
|
|
|
|
2017-04-07 10:45:43 +00:00
|
|
|
pkbuf_free(sendbuf);
|
2017-04-07 10:23:26 +00:00
|
|
|
d_assert(ue, return, "Null param");
|
|
|
|
}
|