open5gs/src/mme/ue_emm_sm.c

307 lines
9.3 KiB
C
Raw Normal View History

2017-03-05 07:49:57 +00:00
#define TRACE_MODULE _ue_emm_sm
#include "core_debug.h"
2017-03-24 12:10:13 +00:00
#include "3gpp_conv.h"
2017-03-06 08:55:50 +00:00
#include "s1ap_message.h"
2017-03-05 09:09:34 +00:00
#include "nas_message.h"
2017-03-05 07:49:57 +00:00
#include "sm.h"
#include "context.h"
#include "event.h"
2017-03-07 00:30:12 +00:00
#include "kdf.h"
2017-03-08 10:10:01 +00:00
#include "nas_security.h"
2017-03-06 23:56:22 +00:00
#include "s1ap_path.h"
#include "s1ap_conv.h"
2017-03-06 08:55:50 +00:00
#include "nas_conv.h"
#include "s6a_sm.h"
2017-03-07 05:47:17 +00:00
static void ue_emm_handle_attach_request(
ue_ctx_t *ue, nas_attach_request_t *attach_request);
2017-03-06 12:45:41 +00:00
static void ue_emm_handle_authentication_response(
2017-03-07 05:47:17 +00:00
ue_ctx_t *ue, nas_authentication_response_t *authentication_response);
static void ue_emm_send_to_enb(ue_ctx_t *ue, pkbuf_t *pkbuf);
2017-03-06 00:00:37 +00:00
2017-03-05 07:49:57 +00:00
void ue_emm_state_initial(ue_emm_sm_t *s, event_t *e)
{
d_assert(s, return, "Null param");
2017-03-24 09:47:05 +00:00
mme_sm_trace(1, e);
2017-03-05 07:49:57 +00:00
FSM_TRAN(s, &ue_emm_state_operational);
}
void ue_emm_state_final(ue_emm_sm_t *s, event_t *e)
{
d_assert(s, return, "Null param");
2017-03-24 09:47:05 +00:00
mme_sm_trace(1, e);
2017-03-05 07:49:57 +00:00
}
void ue_emm_state_operational(ue_emm_sm_t *s, event_t *e)
{
d_assert(s, return, "Null param");
d_assert(e, return, "Null param");
ue_ctx_t *ue = s->ctx;
d_assert(ue, return, "Null param");
2017-03-24 09:47:05 +00:00
mme_sm_trace(1, e);
2017-03-05 07:49:57 +00:00
switch (event_get(e))
{
case FSM_ENTRY_SIG:
{
break;
}
case FSM_EXIT_SIG:
{
break;
}
2017-03-05 08:36:16 +00:00
case EVT_MSG_UE_EMM:
2017-03-05 07:49:57 +00:00
{
2017-03-05 09:09:34 +00:00
nas_message_t message;
status_t rv;
2017-03-05 08:36:16 +00:00
pkbuf_t *recvbuf = (pkbuf_t *)event_get_param2(e);
d_assert(recvbuf, break, "Null param");
2017-03-08 13:39:28 +00:00
rv = nas_security_decode(&message, ue, recvbuf);
2017-03-05 09:09:34 +00:00
if (rv != CORE_OK)
{
d_error("Can't parse NAS_PDU");
break;
}
switch(message.h.message_type)
{
case NAS_ATTACH_REQUEST:
{
2017-03-07 05:47:17 +00:00
ue_emm_handle_attach_request(
ue, &message.attach_request);
2017-03-06 08:55:50 +00:00
break;
}
case NAS_AUTHENTICATION_REQUEST:
{
2017-03-07 07:19:18 +00:00
pkbuf_t *pkbuf = pkbuf_copy(recvbuf);
ue_emm_send_to_enb(ue, pkbuf);
2017-03-07 05:47:17 +00:00
2017-03-07 06:44:21 +00:00
d_assert(ue->imsi, return,);
d_info("[NAS] Authentication request : UE[%s] <-- EMM",
2017-03-07 05:47:17 +00:00
ue->imsi);
2017-03-05 09:09:34 +00:00
break;
}
2017-03-06 12:45:41 +00:00
case NAS_AUTHENTICATION_RESPONSE:
{
2017-03-07 05:47:17 +00:00
ue_emm_handle_authentication_response(
ue, &message.authentication_response);
2017-03-07 05:47:17 +00:00
break;
}
case NAS_SECURITY_MODE_COMPLETE:
{
2017-03-07 06:44:21 +00:00
d_assert(ue->imsi, return,);
d_info("[NAS] Security mode complete : UE[%s] --> EMM",
ue->imsi);
2017-03-06 12:45:41 +00:00
break;
}
2017-03-05 09:09:34 +00:00
default:
{
d_warn("Not implemented(type:%d)", message.h.message_type);
break;
}
}
2017-03-05 08:36:16 +00:00
pkbuf_free(recvbuf);
2017-03-05 07:49:57 +00:00
break;
}
default:
{
2017-03-24 09:47:05 +00:00
d_error("Unknown event %s", mme_event_get_name(e));
2017-03-05 07:49:57 +00:00
break;
}
}
}
void ue_emm_state_exception(ue_emm_sm_t *s, event_t *e)
{
d_assert(s, return, "Null param");
d_assert(e, return, "Null param");
2017-03-24 09:47:05 +00:00
mme_sm_trace(1, e);
2017-03-05 07:49:57 +00:00
switch (event_get(e))
{
case FSM_ENTRY_SIG:
{
break;
}
case FSM_EXIT_SIG:
{
break;
}
default:
{
2017-03-24 09:47:05 +00:00
d_error("Unknown event %s", mme_event_get_name(e));
2017-03-05 07:49:57 +00:00
break;
}
}
}
2017-03-06 00:00:37 +00:00
2017-03-07 05:47:17 +00:00
static void ue_emm_handle_attach_request(
ue_ctx_t *ue, nas_attach_request_t *attach_request)
2017-03-06 00:00:37 +00:00
{
nas_eps_mobile_identity_t *eps_mobile_identity =
&attach_request->eps_mobile_identity;
switch(eps_mobile_identity->imsi.type_of_identity)
{
case NAS_EPS_MOBILE_IDENTITY_IMSI:
{
2017-03-24 14:01:44 +00:00
plmn_id_t *plmn_id = &mme_self()->plmn_id;
2017-03-06 00:00:37 +00:00
if (attach_request->presencemask &
NAS_ATTACH_REQUEST_LAST_VISITED_REGISTERED_TAI_PRESENT)
{
nas_tracking_area_identity_t *last_visited_registered_tai =
&attach_request->last_visited_registered_tai;
2017-03-24 13:52:55 +00:00
plmn_id = &last_visited_registered_tai->plmn_id;
2017-03-06 00:00:37 +00:00
}
nas_imsi_bcd_to_buffer(
&eps_mobile_identity->imsi, eps_mobile_identity->length,
ue->imsi, &ue->imsi_len);
2017-03-07 05:47:17 +00:00
memcpy(&ue->ue_network_capability,
&attach_request->ue_network_capability,
sizeof(attach_request->ue_network_capability));
memcpy(&ue->ms_network_capability,
&attach_request->ms_network_capability,
sizeof(attach_request->ms_network_capability));
2017-03-07 06:44:21 +00:00
d_assert(ue->imsi, return,);
d_info("[NAS] Attach request : UE[%s] --> EMM", ue->imsi);
2017-03-06 00:00:37 +00:00
s6a_send_auth_info_req(ue, plmn_id);
break;
}
default:
{
d_warn("Not implemented(type:%d)",
eps_mobile_identity->imsi.type_of_identity);
2017-03-07 05:47:17 +00:00
return;
2017-03-06 00:00:37 +00:00
}
}
2017-03-07 05:47:17 +00:00
}
static void ue_emm_handle_authentication_response(
ue_ctx_t *ue, nas_authentication_response_t *authentication_response)
{
nas_authentication_response_parameter_t *authentication_response_parameter =
&authentication_response->authentication_response_parameter;
nas_message_t message;
pkbuf_t *sendbuf = NULL;
nas_security_mode_command_t *security_mode_command =
&message.security_mode_command;
2017-03-07 05:47:17 +00:00
nas_security_algorithms_t *selected_nas_security_algorithms =
&security_mode_command->selected_nas_security_algorithms;
nas_key_set_identifier_t *nas_key_set_identifier =
&security_mode_command->nas_key_set_identifier;
nas_ue_security_capability_t *replayed_ue_security_capabilities =
&security_mode_command->replayed_ue_security_capabilities;
d_assert(ue, return, "Null param");
if (authentication_response_parameter->length != ue->xres_len ||
memcmp(authentication_response_parameter->res,
ue->xres, ue->xres_len) != 0)
{
d_error("authentication failed");
return;
}
2017-03-07 06:44:21 +00:00
d_assert(ue->imsi, return, );
d_info("[NAS] Authentication response : UE[%s] --> EMM", ue->imsi);
2017-03-07 05:47:17 +00:00
memset(&message, 0, sizeof(message));
message.h.protocol_discriminator = NAS_PROTOCOL_DISCRIMINATOR_EMM;
message.h.message_type = NAS_SECURITY_MODE_COMMAND;
selected_nas_security_algorithms->type_of_ciphering_algorithm =
mme_self()->selected_enc_algorithm;
selected_nas_security_algorithms->type_of_integrity_protection_algorithm =
mme_self()->selected_int_algorithm;
nas_key_set_identifier->tsc = 0;
nas_key_set_identifier->nas_key_set_identifier = 0;
replayed_ue_security_capabilities->length =
sizeof(replayed_ue_security_capabilities->eea) +
sizeof(replayed_ue_security_capabilities->eia) +
sizeof(replayed_ue_security_capabilities->uea) +
sizeof(replayed_ue_security_capabilities->uia) +
sizeof(replayed_ue_security_capabilities->gea);
replayed_ue_security_capabilities->eea = ue->ue_network_capability.eea;
replayed_ue_security_capabilities->eia = ue->ue_network_capability.eia;
replayed_ue_security_capabilities->uea = ue->ue_network_capability.uea;
replayed_ue_security_capabilities->uia = ue->ue_network_capability.uia;
replayed_ue_security_capabilities->gea =
(ue->ms_network_capability.gea1 << 6) |
ue->ms_network_capability.extended_gea;
mme_kdf_nas(MME_KDF_NAS_INT_ALG, mme_self()->selected_int_algorithm,
ue->kasme, ue->knas_int);
mme_kdf_nas(MME_KDF_NAS_ENC_ALG, mme_self()->selected_enc_algorithm,
ue->kasme, ue->knas_enc);
2017-03-08 10:10:01 +00:00
message.h.security_header_type =
NAS_SECURITY_HEADER_INTEGRITY_PROTECTED_AND_NEW_SECURITY_CONTEXT;
d_assert(nas_security_encode(&sendbuf, ue, &message) == CORE_OK &&
sendbuf,,);
ue_emm_send_to_enb(ue, sendbuf);
2017-03-07 05:47:17 +00:00
2017-03-07 06:44:21 +00:00
d_assert(ue->imsi, return,);
d_info("[NAS] Security mode command : UE[%s] <-- EMM", ue->imsi);
2017-03-06 00:00:37 +00:00
}
2017-03-06 08:55:50 +00:00
static void ue_emm_send_to_enb(ue_ctx_t *ue, pkbuf_t *pkbuf)
2017-03-06 08:55:50 +00:00
{
2017-03-07 06:44:21 +00:00
char buf[INET_ADDRSTRLEN];
2017-03-06 08:55:50 +00:00
int encoded;
s1ap_message_t message;
S1ap_DownlinkNASTransport_IEs_t *ies =
&message.s1ap_DownlinkNASTransport_IEs;
S1ap_NAS_PDU_t *nasPdu = &ies->nas_pdu;
pkbuf_t *sendbuf = NULL;
memset(&message, 0, sizeof(s1ap_message_t));
ies->mme_ue_s1ap_id = ue->mme_ue_s1ap_id;
ies->eNB_UE_S1AP_ID = ue->enb_ue_s1ap_id;
2017-03-07 05:47:17 +00:00
nasPdu->size = pkbuf->len;
2017-03-06 08:55:50 +00:00
nasPdu->buf = core_calloc(nasPdu->size, sizeof(c_uint8_t));
2017-03-07 05:47:17 +00:00
memcpy(nasPdu->buf, pkbuf->payload, nasPdu->size);
2017-03-06 08:55:50 +00:00
message.procedureCode = S1ap_ProcedureCode_id_downlinkNASTransport;
message.direction = S1AP_PDU_PR_initiatingMessage;
encoded = s1ap_encode_pdu(&sendbuf, &message);
s1ap_free_pdu(&message);
2017-03-07 07:19:18 +00:00
d_assert(sendbuf && encoded >= 0,,);
d_assert(s1ap_send_to_enb(ue->enb, sendbuf) == CORE_OK,,);
pkbuf_free(pkbuf);
2017-03-07 06:44:21 +00:00
2017-03-07 07:19:18 +00:00
d_assert(ue->enb,,);
2017-03-07 06:44:21 +00:00
d_info("[S1AP] downlinkNASTransport : "
"UE[eNB-UE-S1AP-ID(%d)] <-- eNB[%s:%d]",
ue->enb_ue_s1ap_id,
INET_NTOP(&ue->enb->s1ap_sock->remote.sin_addr.s_addr, buf),
ue->enb->enb_id);
2017-03-06 12:45:41 +00:00
}