2017-03-26 05:57:33 +00:00
|
|
|
#define TRACE_MODULE _emm_handler
|
|
|
|
|
|
|
|
#include "core_debug.h"
|
2017-04-10 02:29:46 +00:00
|
|
|
#include "core_lib.h"
|
2017-03-26 05:57:33 +00:00
|
|
|
|
|
|
|
#include "nas_message.h"
|
|
|
|
|
2017-04-04 01:49:19 +00:00
|
|
|
#include "mme_event.h"
|
2017-03-26 05:57:33 +00:00
|
|
|
|
2017-04-04 02:08:32 +00:00
|
|
|
#include "mme_kdf.h"
|
2017-03-26 05:57:33 +00:00
|
|
|
#include "nas_security.h"
|
|
|
|
#include "nas_conv.h"
|
2017-04-04 02:00:25 +00:00
|
|
|
#include "mme_s6a_handler.h"
|
2017-04-13 03:21:47 +00:00
|
|
|
#include "esm_build.h"
|
|
|
|
#include "emm_build.h"
|
|
|
|
#include "s1ap_build.h"
|
|
|
|
#include "s1ap_path.h"
|
2017-03-26 05:57:33 +00:00
|
|
|
|
2017-04-28 04:46:16 +00:00
|
|
|
#include "mme_s11_build.h"
|
|
|
|
#include "mme_s11_path.h"
|
|
|
|
|
2017-04-28 07:11:45 +00:00
|
|
|
void emm_handle_identity_request(mme_ue_t *mme_ue);
|
2017-04-19 05:01:39 +00:00
|
|
|
|
2017-04-08 02:38:09 +00:00
|
|
|
void emm_handle_esm_message_container(
|
2017-04-28 07:11:45 +00:00
|
|
|
mme_ue_t *mme_ue, nas_esm_message_container_t *esm_message_container)
|
2017-04-08 02:38:09 +00:00
|
|
|
{
|
2017-04-13 14:30:56 +00:00
|
|
|
pkbuf_t *esmbuf = NULL;
|
|
|
|
event_t e;
|
2017-04-08 02:38:09 +00:00
|
|
|
|
|
|
|
nas_esm_header_t *h = NULL;
|
2017-04-13 14:30:56 +00:00
|
|
|
c_uint8_t pti = NAS_PROCEDURE_TRANSACTION_IDENTITY_UNASSIGNED;
|
|
|
|
c_uint8_t ebi = NAS_EPS_BEARER_IDENTITY_UNASSIGNED;
|
2017-04-13 10:15:53 +00:00
|
|
|
mme_bearer_t *bearer = NULL;
|
2017-04-08 02:38:09 +00:00
|
|
|
|
2017-04-28 07:11:45 +00:00
|
|
|
d_assert(mme_ue, return, "Null param");
|
2017-04-08 02:38:09 +00:00
|
|
|
d_assert(esm_message_container, return, "Null param");
|
2017-04-09 05:26:19 +00:00
|
|
|
d_assert(esm_message_container->len, return, "Null param");
|
2017-04-08 02:38:09 +00:00
|
|
|
|
2017-04-09 05:26:19 +00:00
|
|
|
h = (nas_esm_header_t *)esm_message_container->data;
|
2017-04-08 02:38:09 +00:00
|
|
|
d_assert(h, return, "Null param");
|
|
|
|
|
|
|
|
pti = h->procedure_transaction_identity;
|
2017-04-13 14:30:56 +00:00
|
|
|
ebi = h->eps_bearer_identity;
|
|
|
|
if (pti == NAS_PROCEDURE_TRANSACTION_IDENTITY_UNASSIGNED && ebi)
|
2017-04-28 07:11:45 +00:00
|
|
|
bearer = mme_bearer_find_by_ue_ebi(mme_ue, ebi);
|
2017-04-13 14:30:56 +00:00
|
|
|
else if (ebi == NAS_EPS_BEARER_IDENTITY_UNASSIGNED && pti)
|
2017-04-28 07:11:45 +00:00
|
|
|
bearer = mme_bearer_find_by_ue_pti(mme_ue, pti);
|
2017-04-08 02:38:09 +00:00
|
|
|
|
2017-04-13 10:15:53 +00:00
|
|
|
if (!bearer)
|
2017-04-28 07:11:45 +00:00
|
|
|
bearer = mme_sess_add(mme_ue, pti);
|
2017-04-27 23:20:50 +00:00
|
|
|
d_assert(bearer, return, "No Bearer Context");
|
2017-04-13 14:30:56 +00:00
|
|
|
|
|
|
|
/* The Packet Buffer(pkbuf_t) for NAS message MUST make a HEADROOM.
|
|
|
|
* When calculating AES_CMAC, we need to use the headroom of the packet. */
|
|
|
|
esmbuf = pkbuf_alloc(NAS_HEADROOM, esm_message_container->len);
|
|
|
|
d_assert(esmbuf, return, "Null param");
|
|
|
|
memcpy(esmbuf->payload,
|
|
|
|
esm_message_container->data, esm_message_container->len);
|
2017-04-08 02:38:09 +00:00
|
|
|
|
2017-04-13 14:30:56 +00:00
|
|
|
event_set(&e, MME_EVT_ESM_BEARER_MSG);
|
|
|
|
event_set_param1(&e, (c_uintptr_t)bearer->index);
|
|
|
|
event_set_param2(&e, (c_uintptr_t)esmbuf);
|
|
|
|
mme_event_send(&e);
|
2017-04-08 02:38:09 +00:00
|
|
|
}
|
|
|
|
|
2017-03-26 05:57:33 +00:00
|
|
|
void emm_handle_attach_request(
|
2017-04-28 07:11:45 +00:00
|
|
|
mme_ue_t *mme_ue, nas_attach_request_t *attach_request)
|
2017-03-26 05:57:33 +00:00
|
|
|
{
|
|
|
|
nas_eps_mobile_identity_t *eps_mobile_identity =
|
2017-04-08 02:38:09 +00:00
|
|
|
&attach_request->eps_mobile_identity;
|
|
|
|
|
|
|
|
emm_handle_esm_message_container(
|
2017-04-28 07:11:45 +00:00
|
|
|
mme_ue, &attach_request->esm_message_container);
|
2017-03-26 05:57:33 +00:00
|
|
|
|
2017-04-19 05:01:39 +00:00
|
|
|
/* Store UE specific information */
|
2017-04-28 07:11:45 +00:00
|
|
|
memcpy(&mme_ue->visited_plmn_id, &mme_self()->plmn_id, PLMN_ID_LEN);
|
2017-04-19 05:01:39 +00:00
|
|
|
if (attach_request->presencemask &
|
|
|
|
NAS_ATTACH_REQUEST_LAST_VISITED_REGISTERED_TAI_PRESENT)
|
|
|
|
{
|
|
|
|
nas_tracking_area_identity_t *last_visited_registered_tai =
|
|
|
|
&attach_request->last_visited_registered_tai;
|
|
|
|
|
2017-04-28 07:11:45 +00:00
|
|
|
memcpy(&mme_ue->visited_plmn_id,
|
2017-04-19 05:01:39 +00:00
|
|
|
&last_visited_registered_tai->plmn_id,
|
|
|
|
PLMN_ID_LEN);
|
|
|
|
}
|
|
|
|
|
2017-04-28 07:11:45 +00:00
|
|
|
memcpy(&mme_ue->ue_network_capability,
|
2017-04-19 05:01:39 +00:00
|
|
|
&attach_request->ue_network_capability,
|
|
|
|
sizeof(attach_request->ue_network_capability));
|
2017-04-28 07:11:45 +00:00
|
|
|
memcpy(&mme_ue->ms_network_capability,
|
2017-04-19 05:01:39 +00:00
|
|
|
&attach_request->ms_network_capability,
|
|
|
|
sizeof(attach_request->ms_network_capability));
|
|
|
|
|
2017-04-13 04:54:39 +00:00
|
|
|
switch(eps_mobile_identity->imsi.type)
|
2017-03-26 05:57:33 +00:00
|
|
|
{
|
|
|
|
case NAS_EPS_MOBILE_IDENTITY_IMSI:
|
|
|
|
{
|
2017-04-09 15:27:19 +00:00
|
|
|
nas_imsi_to_bcd(
|
|
|
|
&eps_mobile_identity->imsi, eps_mobile_identity->length,
|
2017-04-28 07:11:45 +00:00
|
|
|
mme_ue->imsi_bcd);
|
|
|
|
core_bcd_to_buffer(mme_ue->imsi_bcd, mme_ue->imsi,
|
|
|
|
&mme_ue->imsi_len);
|
|
|
|
d_assert(mme_ue->imsi_len, return,
|
|
|
|
"Can't get IMSI(len:%d\n", mme_ue->imsi_len);
|
2017-03-26 05:57:33 +00:00
|
|
|
|
2017-04-19 05:01:39 +00:00
|
|
|
d_info("[NAS] Attach request : UE_IMSI[%s] --> EMM",
|
2017-04-28 07:11:45 +00:00
|
|
|
mme_ue->imsi_bcd);
|
2017-04-13 13:30:56 +00:00
|
|
|
|
2017-04-28 07:11:45 +00:00
|
|
|
mme_s6a_send_air(mme_ue);
|
2017-03-26 05:57:33 +00:00
|
|
|
break;
|
|
|
|
}
|
2017-04-19 05:01:39 +00:00
|
|
|
case NAS_EPS_MOBILE_IDENTITY_GUTI:
|
|
|
|
{
|
|
|
|
nas_eps_mobile_identity_guti_t *guti = NULL;
|
|
|
|
guti = &eps_mobile_identity->guti;
|
|
|
|
|
|
|
|
d_info("[NAS] Attach request : UE_GUTI[G:%d,C:%d,M_TMSI:0x%x] --> EMM",
|
|
|
|
guti->mme_gid,
|
|
|
|
guti->mme_code,
|
|
|
|
guti->m_tmsi);
|
|
|
|
|
|
|
|
/* FIXME :Check if GUTI was assigend from us */
|
|
|
|
|
|
|
|
/* FIXME :If not, forward the message to other MME */
|
|
|
|
|
|
|
|
/* FIXME : Find UE based on GUTI.
|
|
|
|
* The record with GUTI,IMSI should be
|
|
|
|
* stored in permanent DB
|
|
|
|
*/
|
|
|
|
|
|
|
|
|
|
|
|
/* If not found,
|
|
|
|
Initiate NAS Identity procedure to get UE IMSI */
|
2017-04-28 07:11:45 +00:00
|
|
|
emm_handle_identity_request(mme_ue);
|
2017-04-19 05:01:39 +00:00
|
|
|
break;
|
|
|
|
}
|
2017-03-26 05:57:33 +00:00
|
|
|
default:
|
|
|
|
{
|
|
|
|
d_warn("Not implemented(type:%d)",
|
2017-04-13 04:54:39 +00:00
|
|
|
eps_mobile_identity->imsi.type);
|
2017-03-26 05:57:33 +00:00
|
|
|
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-04-28 04:43:42 +00:00
|
|
|
void emm_handle_identity_request(mme_ue_t *mme_ue)
|
2017-04-19 05:01:39 +00:00
|
|
|
{
|
|
|
|
status_t rv;
|
|
|
|
mme_enb_t *enb = NULL;
|
2017-04-28 07:11:45 +00:00
|
|
|
enb_ue_t *enb_ue = NULL;
|
2017-04-19 05:01:39 +00:00
|
|
|
pkbuf_t *emmbuf = NULL, *s1apbuf = NULL;
|
|
|
|
|
|
|
|
nas_message_t message;
|
|
|
|
nas_identity_request_t *identity_request =
|
|
|
|
&message.emm.identity_request;
|
|
|
|
|
2017-04-28 04:43:42 +00:00
|
|
|
d_assert(mme_ue, return, "Null param");
|
2017-04-28 07:11:45 +00:00
|
|
|
enb_ue = mme_ue->enb_ue;
|
|
|
|
d_assert(enb_ue, return, "Null param");
|
|
|
|
enb = enb_ue->enb;
|
2017-04-28 04:46:16 +00:00
|
|
|
d_assert(enb, return, "Null param");
|
2017-04-19 05:01:39 +00:00
|
|
|
|
|
|
|
memset(&message, 0, sizeof(message));
|
|
|
|
message.emm.h.protocol_discriminator = NAS_PROTOCOL_DISCRIMINATOR_EMM;
|
|
|
|
message.emm.h.message_type = NAS_IDENTITY_REQUEST;
|
|
|
|
|
|
|
|
/* Request IMSI */
|
|
|
|
identity_request->identity_type.type = NAS_IDENTITY_TYPE_2_IMSI;
|
|
|
|
|
|
|
|
d_assert(nas_plain_encode(&emmbuf, &message) == CORE_OK && emmbuf,,);
|
|
|
|
|
2017-04-28 07:11:45 +00:00
|
|
|
rv = s1ap_build_downlink_nas_transport(&s1apbuf, enb_ue, emmbuf);
|
2017-04-19 05:01:39 +00:00
|
|
|
d_assert(rv == CORE_OK && s1apbuf,
|
|
|
|
pkbuf_free(emmbuf); return, "s1ap build error");
|
|
|
|
|
|
|
|
d_assert(s1ap_send_to_enb(enb, s1apbuf) == CORE_OK,, "s1ap send error");
|
|
|
|
}
|
|
|
|
|
|
|
|
void emm_handle_identity_response(
|
2017-04-28 07:11:45 +00:00
|
|
|
mme_ue_t *mme_ue, nas_identity_response_t *identity_response)
|
2017-04-19 05:01:39 +00:00
|
|
|
{
|
|
|
|
nas_mobile_identity_t *mobile_identity = NULL;
|
|
|
|
|
2017-04-28 07:11:45 +00:00
|
|
|
d_assert(mme_ue, return, "Null param");
|
2017-04-19 05:01:39 +00:00
|
|
|
d_assert(identity_response, return, "Null param");
|
|
|
|
|
|
|
|
mobile_identity = &identity_response->mobile_identity;
|
|
|
|
|
|
|
|
if (mobile_identity->imsi.type == NAS_IDENTITY_TYPE_2_IMSI)
|
|
|
|
{
|
|
|
|
nas_imsi_to_bcd(
|
|
|
|
&mobile_identity->imsi, mobile_identity->length,
|
2017-04-28 07:11:45 +00:00
|
|
|
mme_ue->imsi_bcd);
|
|
|
|
core_bcd_to_buffer(mme_ue->imsi_bcd, mme_ue->imsi, &mme_ue->imsi_len);
|
2017-04-19 05:01:39 +00:00
|
|
|
|
2017-04-28 07:11:45 +00:00
|
|
|
d_assert(mme_ue->imsi_len, return,
|
|
|
|
"Can't get IMSI(len:%d\n", mme_ue->imsi_len);
|
2017-04-19 05:01:39 +00:00
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
2017-04-28 07:11:45 +00:00
|
|
|
d_warn("Not supported Identity type(%d)", mobile_identity->imsi.type);
|
2017-04-19 05:01:39 +00:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Send Authentication Information Request to HSS */
|
2017-04-28 07:11:45 +00:00
|
|
|
mme_s6a_send_air(mme_ue);
|
2017-04-19 05:01:39 +00:00
|
|
|
|
|
|
|
}
|
|
|
|
|
2017-04-28 04:43:42 +00:00
|
|
|
void emm_handle_authentication_request(mme_ue_t *mme_ue)
|
2017-04-11 02:54:00 +00:00
|
|
|
{
|
2017-04-13 10:58:58 +00:00
|
|
|
status_t rv;
|
|
|
|
mme_enb_t *enb = NULL;
|
2017-04-28 07:11:45 +00:00
|
|
|
enb_ue_t *enb_ue = NULL;
|
2017-04-13 10:58:58 +00:00
|
|
|
pkbuf_t *emmbuf = NULL, *s1apbuf = NULL;
|
|
|
|
|
2017-04-11 02:54:00 +00:00
|
|
|
nas_message_t message;
|
|
|
|
nas_authentication_request_t *authentication_request =
|
|
|
|
&message.emm.authentication_request;
|
|
|
|
|
2017-04-28 04:43:42 +00:00
|
|
|
d_assert(mme_ue, return, "Null param");
|
2017-04-28 07:11:45 +00:00
|
|
|
enb_ue = mme_ue->enb_ue;
|
|
|
|
d_assert(enb_ue, return, "Null param");
|
|
|
|
enb = enb_ue->enb;
|
2017-04-28 04:46:16 +00:00
|
|
|
d_assert(enb, return, "Null param");
|
2017-04-11 02:54:00 +00:00
|
|
|
|
|
|
|
memset(&message, 0, sizeof(message));
|
|
|
|
message.emm.h.protocol_discriminator = NAS_PROTOCOL_DISCRIMINATOR_EMM;
|
|
|
|
message.emm.h.message_type = NAS_AUTHENTICATION_REQUEST;
|
|
|
|
|
|
|
|
memcpy(authentication_request->authentication_parameter_rand.rand,
|
2017-04-28 04:43:42 +00:00
|
|
|
mme_ue->rand, RAND_LEN);
|
2017-04-11 02:54:00 +00:00
|
|
|
memcpy(authentication_request->authentication_parameter_autn.autn,
|
2017-04-28 04:43:42 +00:00
|
|
|
mme_ue->autn, AUTN_LEN);
|
2017-04-11 02:54:00 +00:00
|
|
|
authentication_request->authentication_parameter_autn.length =
|
|
|
|
AUTN_LEN;
|
|
|
|
|
2017-04-13 10:58:58 +00:00
|
|
|
d_assert(nas_plain_encode(&emmbuf, &message) == CORE_OK && emmbuf,,);
|
2017-04-11 02:54:00 +00:00
|
|
|
|
2017-04-28 07:11:45 +00:00
|
|
|
rv = s1ap_build_downlink_nas_transport(&s1apbuf, enb_ue, emmbuf);
|
2017-04-13 10:58:58 +00:00
|
|
|
d_assert(rv == CORE_OK && s1apbuf,
|
|
|
|
pkbuf_free(emmbuf); return, "s1ap build error");
|
|
|
|
|
|
|
|
d_assert(s1ap_send_to_enb(enb, s1apbuf) == CORE_OK,, "s1ap send error");
|
2017-04-11 02:54:00 +00:00
|
|
|
}
|
|
|
|
|
2017-04-28 07:11:45 +00:00
|
|
|
void emm_handle_authentication_response(mme_ue_t *mme_ue,
|
|
|
|
nas_authentication_response_t *authentication_response)
|
2017-03-26 05:57:33 +00:00
|
|
|
{
|
2017-04-13 10:58:58 +00:00
|
|
|
status_t rv;
|
|
|
|
mme_enb_t *enb = NULL;
|
2017-04-28 04:43:42 +00:00
|
|
|
enb_ue_t *enb_ue = NULL;
|
2017-04-13 10:58:58 +00:00
|
|
|
pkbuf_t *emmbuf = NULL, *s1apbuf = NULL;
|
|
|
|
|
2017-03-26 05:57:33 +00:00
|
|
|
nas_authentication_response_parameter_t *authentication_response_parameter =
|
|
|
|
&authentication_response->authentication_response_parameter;
|
|
|
|
|
|
|
|
nas_message_t message;
|
|
|
|
nas_security_mode_command_t *security_mode_command =
|
2017-04-07 13:23:38 +00:00
|
|
|
&message.emm.security_mode_command;
|
2017-03-26 05:57:33 +00:00
|
|
|
nas_security_algorithms_t *selected_nas_security_algorithms =
|
|
|
|
&security_mode_command->selected_nas_security_algorithms;
|
|
|
|
nas_key_set_identifier_t *nas_key_set_identifier =
|
|
|
|
&security_mode_command->nas_key_set_identifier;
|
|
|
|
nas_ue_security_capability_t *replayed_ue_security_capabilities =
|
|
|
|
&security_mode_command->replayed_ue_security_capabilities;
|
|
|
|
|
2017-04-28 07:11:45 +00:00
|
|
|
d_assert(mme_ue, return, "Null param");
|
|
|
|
enb_ue = mme_ue->enb_ue;
|
2017-04-28 04:43:42 +00:00
|
|
|
d_assert(enb_ue, return, "Null param");
|
|
|
|
enb = enb_ue->enb;
|
|
|
|
d_assert(enb, return, "Null param");
|
2017-03-26 05:57:33 +00:00
|
|
|
|
2017-04-28 07:11:45 +00:00
|
|
|
if (authentication_response_parameter->length != mme_ue->xres_len ||
|
2017-03-26 05:57:33 +00:00
|
|
|
memcmp(authentication_response_parameter->res,
|
2017-04-28 07:11:45 +00:00
|
|
|
mme_ue->xres, mme_ue->xres_len) != 0)
|
2017-03-26 05:57:33 +00:00
|
|
|
{
|
|
|
|
d_error("authentication failed");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2017-04-09 15:27:19 +00:00
|
|
|
d_info("[NAS] Authentication response : UE[%s] --> EMM",
|
2017-04-28 07:11:45 +00:00
|
|
|
mme_ue->imsi_bcd);
|
2017-03-26 05:57:33 +00:00
|
|
|
|
|
|
|
memset(&message, 0, sizeof(message));
|
2017-04-07 13:23:38 +00:00
|
|
|
message.h.security_header_type =
|
|
|
|
NAS_SECURITY_HEADER_INTEGRITY_PROTECTED_AND_NEW_SECURITY_CONTEXT;
|
2017-03-26 05:57:33 +00:00
|
|
|
message.h.protocol_discriminator = NAS_PROTOCOL_DISCRIMINATOR_EMM;
|
2017-04-07 13:23:38 +00:00
|
|
|
|
|
|
|
message.emm.h.protocol_discriminator = NAS_PROTOCOL_DISCRIMINATOR_EMM;
|
|
|
|
message.emm.h.message_type = NAS_SECURITY_MODE_COMMAND;
|
2017-03-26 05:57:33 +00:00
|
|
|
|
|
|
|
selected_nas_security_algorithms->type_of_ciphering_algorithm =
|
|
|
|
mme_self()->selected_enc_algorithm;
|
|
|
|
selected_nas_security_algorithms->type_of_integrity_protection_algorithm =
|
|
|
|
mme_self()->selected_int_algorithm;
|
|
|
|
|
|
|
|
nas_key_set_identifier->tsc = 0;
|
|
|
|
nas_key_set_identifier->nas_key_set_identifier = 0;
|
|
|
|
|
|
|
|
replayed_ue_security_capabilities->length =
|
|
|
|
sizeof(replayed_ue_security_capabilities->eea) +
|
|
|
|
sizeof(replayed_ue_security_capabilities->eia) +
|
|
|
|
sizeof(replayed_ue_security_capabilities->uea) +
|
|
|
|
sizeof(replayed_ue_security_capabilities->uia) +
|
|
|
|
sizeof(replayed_ue_security_capabilities->gea);
|
2017-04-28 07:11:45 +00:00
|
|
|
replayed_ue_security_capabilities->eea = mme_ue->ue_network_capability.eea;
|
|
|
|
replayed_ue_security_capabilities->eia = mme_ue->ue_network_capability.eia;
|
|
|
|
replayed_ue_security_capabilities->uea = mme_ue->ue_network_capability.uea;
|
|
|
|
replayed_ue_security_capabilities->uia = mme_ue->ue_network_capability.uia;
|
2017-03-26 05:57:33 +00:00
|
|
|
replayed_ue_security_capabilities->gea =
|
2017-04-28 07:11:45 +00:00
|
|
|
(mme_ue->ms_network_capability.gea1 << 6) |
|
|
|
|
mme_ue->ms_network_capability.extended_gea;
|
2017-03-26 05:57:33 +00:00
|
|
|
|
|
|
|
mme_kdf_nas(MME_KDF_NAS_INT_ALG, mme_self()->selected_int_algorithm,
|
2017-04-28 07:11:45 +00:00
|
|
|
mme_ue->kasme, mme_ue->knas_int);
|
2017-03-26 05:57:33 +00:00
|
|
|
mme_kdf_nas(MME_KDF_NAS_ENC_ALG, mme_self()->selected_enc_algorithm,
|
2017-04-28 07:11:45 +00:00
|
|
|
mme_ue->kasme, mme_ue->knas_enc);
|
|
|
|
mme_kdf_enb(mme_ue->kasme, mme_ue->ul_count.i32, mme_ue->kenb);
|
2017-03-26 05:57:33 +00:00
|
|
|
|
2017-04-13 13:30:56 +00:00
|
|
|
d_info("[NAS] Security mode command : UE[%s] <-- EMM",
|
2017-04-28 07:11:45 +00:00
|
|
|
mme_ue->imsi_bcd);
|
2017-04-13 13:30:56 +00:00
|
|
|
|
2017-04-28 07:11:45 +00:00
|
|
|
rv = nas_security_encode(&emmbuf, mme_ue, &message);
|
2017-04-13 10:58:58 +00:00
|
|
|
d_assert(rv == CORE_OK && emmbuf, return, "emm build error");
|
|
|
|
|
2017-04-28 04:43:42 +00:00
|
|
|
rv = s1ap_build_downlink_nas_transport(&s1apbuf, enb_ue, emmbuf);
|
2017-04-13 10:58:58 +00:00
|
|
|
d_assert(rv == CORE_OK && s1apbuf,
|
|
|
|
pkbuf_free(emmbuf); return, "s1ap build error");
|
|
|
|
|
|
|
|
d_assert(s1ap_send_to_enb(enb, s1apbuf) == CORE_OK,, "s1ap send error");
|
2017-03-26 05:57:33 +00:00
|
|
|
}
|
2017-04-13 02:08:42 +00:00
|
|
|
|
2017-04-14 01:04:41 +00:00
|
|
|
void emm_handle_create_session_response(mme_bearer_t *bearer)
|
2017-04-13 02:08:42 +00:00
|
|
|
{
|
2017-04-13 10:58:58 +00:00
|
|
|
status_t rv;
|
2017-04-28 07:11:45 +00:00
|
|
|
mme_ue_t *mme_ue = NULL;
|
2017-04-28 04:43:42 +00:00
|
|
|
enb_ue_t *enb_ue = NULL;
|
2017-04-13 03:21:47 +00:00
|
|
|
mme_enb_t *enb = NULL;
|
2017-04-13 10:58:58 +00:00
|
|
|
pkbuf_t *esmbuf = NULL, *emmbuf = NULL, *s1apbuf = NULL;
|
2017-04-13 03:21:47 +00:00
|
|
|
|
2017-04-13 10:15:53 +00:00
|
|
|
d_assert(bearer, return, "Null param");
|
2017-04-28 07:11:45 +00:00
|
|
|
mme_ue = bearer->mme_ue;
|
|
|
|
d_assert(mme_ue, return, "Null param");
|
|
|
|
enb_ue = mme_ue->enb_ue;
|
2017-04-28 04:43:42 +00:00
|
|
|
d_assert(enb_ue, return, "Null param");
|
|
|
|
enb = enb_ue->enb;
|
|
|
|
d_assert(enb, return, "Null param");
|
2017-04-13 03:21:47 +00:00
|
|
|
|
2017-04-13 10:58:58 +00:00
|
|
|
rv = esm_build_activate_default_bearer_context(&esmbuf, bearer);
|
|
|
|
d_assert(rv == CORE_OK && esmbuf,
|
|
|
|
return, "bearer build error");
|
2017-04-13 03:21:47 +00:00
|
|
|
|
2017-04-13 13:30:56 +00:00
|
|
|
d_info("[NAS] Activate default bearer context request : EMM <-- ESM[%d]",
|
|
|
|
bearer->ebi);
|
|
|
|
|
2017-04-28 07:11:45 +00:00
|
|
|
rv = emm_build_attach_accept(&emmbuf, mme_ue, esmbuf);
|
2017-04-13 10:58:58 +00:00
|
|
|
d_assert(rv == CORE_OK && emmbuf,
|
|
|
|
pkbuf_free(esmbuf); return, "emm build error");
|
2017-04-13 03:21:47 +00:00
|
|
|
|
2017-04-28 07:11:45 +00:00
|
|
|
d_info("[NAS] Attach accept : UE[%s] <-- EMM", mme_ue->imsi_bcd);
|
2017-04-13 13:30:56 +00:00
|
|
|
|
2017-04-13 10:15:53 +00:00
|
|
|
rv = s1ap_build_initial_context_setup_request(&s1apbuf, bearer, emmbuf);
|
2017-04-13 10:58:58 +00:00
|
|
|
d_assert(rv == CORE_OK && s1apbuf,
|
|
|
|
pkbuf_free(emmbuf); return, "s1ap build error");
|
2017-04-13 03:21:47 +00:00
|
|
|
|
2017-04-13 10:58:58 +00:00
|
|
|
d_assert(s1ap_send_to_enb(enb, s1apbuf) == CORE_OK,, "s1ap send error");
|
2017-04-13 02:08:42 +00:00
|
|
|
}
|
|
|
|
|
2017-04-13 14:30:56 +00:00
|
|
|
void emm_handle_attach_complete(
|
2017-04-28 07:11:45 +00:00
|
|
|
mme_ue_t *mme_ue, nas_attach_complete_t *attach_complete)
|
2017-04-13 14:30:56 +00:00
|
|
|
{
|
2017-04-13 15:17:56 +00:00
|
|
|
status_t rv;
|
|
|
|
mme_enb_t *enb = NULL;
|
2017-04-28 04:43:42 +00:00
|
|
|
enb_ue_t *enb_ue = NULL;
|
2017-04-13 15:17:56 +00:00
|
|
|
pkbuf_t *emmbuf = NULL, *s1apbuf = NULL;
|
|
|
|
|
|
|
|
nas_message_t message;
|
|
|
|
nas_emm_information_t *emm_information = &message.emm.emm_information;
|
|
|
|
nas_time_zone_and_time_t *universal_time_and_local_time_zone =
|
|
|
|
&emm_information->universal_time_and_local_time_zone;
|
|
|
|
nas_daylight_saving_time_t *network_daylight_saving_time =
|
|
|
|
&emm_information->network_daylight_saving_time;
|
|
|
|
|
2017-04-14 12:18:32 +00:00
|
|
|
time_exp_t time_exp;
|
|
|
|
time_exp_lt(&time_exp, time_now());
|
|
|
|
|
2017-04-28 07:11:45 +00:00
|
|
|
d_assert(mme_ue, return, "Null param");
|
|
|
|
enb_ue = mme_ue->enb_ue;
|
2017-04-28 04:43:42 +00:00
|
|
|
d_assert(enb_ue, return, "Null param");
|
|
|
|
enb = enb_ue->enb;
|
2017-04-13 15:17:56 +00:00
|
|
|
d_assert(enb, return, "Null param");
|
2017-04-13 14:30:56 +00:00
|
|
|
|
|
|
|
emm_handle_esm_message_container(
|
2017-04-28 07:11:45 +00:00
|
|
|
mme_ue, &attach_complete->esm_message_container);
|
2017-04-13 15:17:56 +00:00
|
|
|
|
|
|
|
memset(&message, 0, sizeof(message));
|
|
|
|
message.h.security_header_type =
|
|
|
|
NAS_SECURITY_HEADER_INTEGRITY_PROTECTED_AND_CIPHERED;
|
|
|
|
message.h.protocol_discriminator = NAS_PROTOCOL_DISCRIMINATOR_EMM;
|
|
|
|
|
|
|
|
message.emm.h.protocol_discriminator = NAS_PROTOCOL_DISCRIMINATOR_EMM;
|
|
|
|
message.emm.h.message_type = NAS_EMM_INFORMATION;
|
|
|
|
|
|
|
|
emm_information->presencemask |=
|
|
|
|
NAS_EMM_INFORMATION_UNIVERSAL_TIME_AND_LOCAL_TIME_ZONE_PRESENT;
|
2017-04-14 12:18:32 +00:00
|
|
|
universal_time_and_local_time_zone->year =
|
|
|
|
NAS_TIME_TO_BCD(time_exp.tm_year % 100);
|
|
|
|
universal_time_and_local_time_zone->mon = NAS_TIME_TO_BCD(time_exp.tm_mon);
|
|
|
|
universal_time_and_local_time_zone->mday =
|
|
|
|
NAS_TIME_TO_BCD(time_exp.tm_mday);
|
|
|
|
universal_time_and_local_time_zone->hour =
|
|
|
|
NAS_TIME_TO_BCD(time_exp.tm_hour);
|
|
|
|
universal_time_and_local_time_zone->min = NAS_TIME_TO_BCD(time_exp.tm_min);
|
|
|
|
universal_time_and_local_time_zone->sec = NAS_TIME_TO_BCD(time_exp.tm_sec);
|
|
|
|
if (time_exp.tm_gmtoff > 0)
|
|
|
|
universal_time_and_local_time_zone->sign = 0;
|
|
|
|
else
|
|
|
|
universal_time_and_local_time_zone->sign = 1;
|
|
|
|
/* quarters of an hour */
|
|
|
|
universal_time_and_local_time_zone->gmtoff =
|
|
|
|
NAS_TIME_TO_BCD(time_exp.tm_gmtoff / 900);
|
|
|
|
|
2017-04-13 15:17:56 +00:00
|
|
|
emm_information->presencemask |=
|
|
|
|
NAS_EMM_INFORMATION_NETWORK_DAYLIGHT_SAVING_TIME_PRESENT;
|
|
|
|
network_daylight_saving_time->length = 1;
|
|
|
|
|
|
|
|
d_info("[NAS] EMM information : UE[%s] <-- EMM",
|
2017-04-28 07:11:45 +00:00
|
|
|
mme_ue->imsi_bcd);
|
2017-04-13 15:17:56 +00:00
|
|
|
|
2017-04-28 07:11:45 +00:00
|
|
|
rv = nas_security_encode(&emmbuf, mme_ue, &message);
|
2017-04-13 15:17:56 +00:00
|
|
|
d_assert(rv == CORE_OK && emmbuf, return, "emm build error");
|
|
|
|
|
2017-04-28 04:43:42 +00:00
|
|
|
rv = s1ap_build_downlink_nas_transport(&s1apbuf, enb_ue, emmbuf);
|
2017-04-13 15:17:56 +00:00
|
|
|
d_assert(rv == CORE_OK && s1apbuf,
|
|
|
|
pkbuf_free(emmbuf); return, "s1ap build error");
|
|
|
|
|
|
|
|
d_assert(s1ap_send_to_enb(enb, s1apbuf) == CORE_OK,, "s1ap send error");
|
2017-04-13 14:30:56 +00:00
|
|
|
}
|
2017-04-14 11:20:00 +00:00
|
|
|
|
2017-04-28 07:11:45 +00:00
|
|
|
void emm_handle_emm_status(mme_ue_t *mme_ue, nas_emm_status_t *emm_status)
|
2017-04-14 11:20:00 +00:00
|
|
|
{
|
2017-04-28 07:11:45 +00:00
|
|
|
d_assert(mme_ue, return, "Null param");
|
2017-04-14 11:20:00 +00:00
|
|
|
|
|
|
|
d_warn("[NAS] EMM status(%d) : UE[%s] --> EMM",
|
2017-04-28 07:11:45 +00:00
|
|
|
emm_status->emm_cause, mme_ue->imsi_bcd);
|
2017-04-14 11:20:00 +00:00
|
|
|
}
|
2017-04-26 08:57:50 +00:00
|
|
|
|
|
|
|
void emm_handle_detach_request(
|
2017-04-28 07:11:45 +00:00
|
|
|
mme_ue_t *mme_ue, nas_detach_request_from_ue_t *detach_request)
|
2017-04-26 08:57:50 +00:00
|
|
|
{
|
|
|
|
status_t rv;
|
|
|
|
mme_enb_t *enb = NULL;
|
2017-04-28 04:43:42 +00:00
|
|
|
enb_ue_t *enb_ue = NULL;
|
2017-04-28 04:46:16 +00:00
|
|
|
pkbuf_t *emmbuf = NULL, *s11buf = NULL, *s1apbuf = NULL;
|
|
|
|
mme_sess_t *sess;
|
2017-04-26 08:57:50 +00:00
|
|
|
|
|
|
|
nas_message_t message;
|
|
|
|
nas_detach_type_t *detach_type = &detach_request->detach_type;
|
|
|
|
|
|
|
|
/* FIXME: nas_key_set_identifier is ignored
|
|
|
|
* detach_type->tsc
|
|
|
|
* detach_type->nas_key_set_identifier
|
|
|
|
*/
|
|
|
|
|
2017-04-28 07:11:45 +00:00
|
|
|
d_assert(mme_ue, return, "Null param");
|
|
|
|
enb_ue = mme_ue->enb_ue;
|
2017-04-28 04:43:42 +00:00
|
|
|
d_assert(enb_ue, return, "Null param");
|
|
|
|
enb = enb_ue->enb;
|
2017-04-26 08:57:50 +00:00
|
|
|
d_assert(enb, return, "Null param");
|
|
|
|
|
2017-04-28 04:46:16 +00:00
|
|
|
/* Encode ue->s1ap.cause for later use */
|
2017-04-28 05:56:47 +00:00
|
|
|
enb_ue->s1ap.cause.present = S1ap_Cause_PR_nas;
|
|
|
|
enb_ue->s1ap.cause.choice.nas = S1ap_CauseNas_detach;
|
2017-04-28 04:46:16 +00:00
|
|
|
|
2017-04-26 08:57:50 +00:00
|
|
|
switch (detach_type->detach_type)
|
|
|
|
{
|
2017-04-27 03:38:03 +00:00
|
|
|
/* 0 0 1 : EPS detach */
|
|
|
|
case NAS_DETACH_TYPE_FROM_UE_EPS_DETACH:
|
2017-04-28 04:46:16 +00:00
|
|
|
d_info("[NAS] (EPS) Detach request : UE_IMSI[%s] --> EMM",
|
2017-04-28 07:11:45 +00:00
|
|
|
mme_ue->imsi_bcd);
|
2017-04-26 08:57:50 +00:00
|
|
|
break;
|
2017-04-27 03:38:03 +00:00
|
|
|
/* 0 1 0 : IMSI detach */
|
|
|
|
case NAS_DETACH_TYPE_FROM_UE_IMSI_DETACH:
|
2017-04-28 04:46:16 +00:00
|
|
|
d_info("[NAS] (IMSI) Detach request : UE_IMSI[%s] --> EMM",
|
2017-04-28 07:11:45 +00:00
|
|
|
mme_ue->imsi_bcd);
|
2017-04-26 08:57:50 +00:00
|
|
|
break;
|
|
|
|
case 6: /* 1 1 0 : reserved */
|
|
|
|
case 7: /* 1 1 1 : reserved */
|
2017-04-28 04:46:16 +00:00
|
|
|
d_info("[NAS] (Unknown) Detach request : UE_IMSI[%s] --> EMM",
|
2017-04-28 07:11:45 +00:00
|
|
|
mme_ue->imsi_bcd);
|
2017-04-26 08:57:50 +00:00
|
|
|
break;
|
2017-04-27 03:38:03 +00:00
|
|
|
/* 0 1 1 : combined EPS/IMSI detach */
|
|
|
|
case NAS_DETACH_TYPE_FROM_UE_COMBINED_EPS_IMSI_DETACH:
|
2017-04-26 08:57:50 +00:00
|
|
|
default: /* all other values */
|
2017-04-28 04:46:16 +00:00
|
|
|
d_info("[NAS] (EPS+IMSI) Detach request : UE_IMSI[%s] --> EMM",
|
2017-04-28 07:11:45 +00:00
|
|
|
mme_ue->imsi_bcd);
|
2017-04-26 08:57:50 +00:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2017-04-28 07:11:45 +00:00
|
|
|
sess = mme_sess_first(mme_ue);
|
2017-04-28 04:46:16 +00:00
|
|
|
while (sess != NULL)
|
|
|
|
{
|
2017-04-28 05:08:43 +00:00
|
|
|
mme_bearer_t *bearer = mme_default_bearer_in_sess(sess);
|
2017-04-28 04:46:16 +00:00
|
|
|
|
|
|
|
if (bearer != NULL)
|
|
|
|
{
|
|
|
|
rv = mme_s11_build_delete_session_request(&s11buf, sess);
|
|
|
|
d_assert(rv == CORE_OK, return, "S11 build error");
|
|
|
|
|
|
|
|
rv = mme_s11_send_to_sgw(bearer->sgw,
|
2017-04-28 05:08:43 +00:00
|
|
|
GTP_DELETE_SESSION_REQUEST_TYPE, sess->sgw_s11_teid,
|
|
|
|
s11buf);
|
2017-04-28 04:46:16 +00:00
|
|
|
if (rv != CORE_OK)
|
|
|
|
{
|
|
|
|
d_error("S11 send error rv %d", rv);
|
|
|
|
pkbuf_free(s11buf);
|
|
|
|
/* continue to send */
|
|
|
|
}
|
|
|
|
}
|
|
|
|
sess = mme_sess_next(sess);
|
|
|
|
}
|
2017-04-26 08:57:50 +00:00
|
|
|
|
|
|
|
if ((detach_type->switch_off & 0x1) == 0)
|
|
|
|
{
|
|
|
|
/* reply with detach accept */
|
|
|
|
memset(&message, 0, sizeof(message));
|
|
|
|
message.h.security_header_type =
|
|
|
|
NAS_SECURITY_HEADER_INTEGRITY_PROTECTED_AND_CIPHERED;
|
|
|
|
message.h.protocol_discriminator = NAS_PROTOCOL_DISCRIMINATOR_EMM;
|
|
|
|
|
|
|
|
message.emm.h.protocol_discriminator = NAS_PROTOCOL_DISCRIMINATOR_EMM;
|
|
|
|
message.emm.h.message_type = NAS_DETACH_ACCEPT;
|
|
|
|
|
|
|
|
d_info("[NAS] Detach accept : UE[%s] <-- EMM",
|
2017-04-28 07:11:45 +00:00
|
|
|
mme_ue->imsi_bcd);
|
2017-04-26 08:57:50 +00:00
|
|
|
|
2017-04-28 07:11:45 +00:00
|
|
|
rv = nas_security_encode(&emmbuf, mme_ue, &message);
|
2017-04-26 08:57:50 +00:00
|
|
|
d_assert(rv == CORE_OK && emmbuf, return, "emm build error");
|
|
|
|
|
2017-04-28 04:43:42 +00:00
|
|
|
rv = s1ap_build_downlink_nas_transport(&s1apbuf, enb_ue, emmbuf);
|
2017-04-26 08:57:50 +00:00
|
|
|
d_assert(rv == CORE_OK && s1apbuf,
|
|
|
|
pkbuf_free(emmbuf); return, "s1ap build error");
|
|
|
|
|
|
|
|
d_assert(s1ap_send_to_enb(enb, s1apbuf) == CORE_OK,, "s1ap send error");
|
|
|
|
}
|
|
|
|
|
2017-04-28 04:46:16 +00:00
|
|
|
/* TODO: initiate s1 ue context release with a timeout value */
|
|
|
|
}
|
|
|
|
|
|
|
|
void emm_handle_delete_session_response(mme_bearer_t *bearer)
|
|
|
|
{
|
|
|
|
status_t rv;
|
2017-04-28 07:11:45 +00:00
|
|
|
mme_ue_t *mme_ue = NULL;
|
2017-04-28 04:46:16 +00:00
|
|
|
mme_enb_t *enb = NULL;
|
|
|
|
pkbuf_t *s1apbuf = NULL;
|
|
|
|
mme_sess_t *sess;
|
|
|
|
int b_wait = 0;
|
2017-04-28 05:56:47 +00:00
|
|
|
enb_ue_t *enb_ue = NULL;
|
2017-04-28 04:46:16 +00:00
|
|
|
|
|
|
|
d_assert(bearer, return, "Null param");
|
2017-04-28 07:11:45 +00:00
|
|
|
mme_ue = bearer->mme_ue;
|
|
|
|
d_assert(mme_ue, return, "Null param");
|
|
|
|
enb_ue = mme_ue->enb_ue;
|
2017-04-28 05:56:47 +00:00
|
|
|
d_assert(enb_ue, return, "Null param");
|
|
|
|
enb = enb_ue->enb;
|
2017-04-28 04:46:16 +00:00
|
|
|
d_assert(enb, return, "Null param");
|
|
|
|
|
2017-04-28 07:11:45 +00:00
|
|
|
sess = mme_sess_find_by_ebi(mme_ue, bearer->ebi);
|
2017-04-28 04:46:16 +00:00
|
|
|
mme_sess_remove(sess);
|
|
|
|
|
|
|
|
/* sess and bearer are not valid from here */
|
|
|
|
|
2017-04-28 07:11:45 +00:00
|
|
|
sess = mme_sess_first(mme_ue);
|
2017-04-28 04:46:16 +00:00
|
|
|
while (sess != NULL)
|
|
|
|
{
|
2017-04-28 05:08:43 +00:00
|
|
|
mme_bearer_t *temp_bearer = mme_default_bearer_in_sess(sess);
|
2017-04-28 04:46:16 +00:00
|
|
|
|
|
|
|
if (temp_bearer != NULL)
|
|
|
|
{
|
|
|
|
b_wait = 1;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
sess = mme_sess_next(sess);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!b_wait)
|
|
|
|
{
|
2017-04-28 07:11:45 +00:00
|
|
|
d_info("[NAS] Detach done : UE[%s] <-- EMM", mme_ue->imsi_bcd);
|
2017-04-28 04:46:16 +00:00
|
|
|
|
2017-04-28 07:11:45 +00:00
|
|
|
rv = s1ap_build_ue_context_release_commmand(&
|
|
|
|
s1apbuf, enb_ue, enb_ue->s1ap.cause);
|
2017-04-28 04:46:16 +00:00
|
|
|
d_assert(rv == CORE_OK && s1apbuf, return, "s1ap build error");
|
|
|
|
|
|
|
|
d_assert(s1ap_send_to_enb(enb, s1apbuf) == CORE_OK,, "s1ap send error");
|
|
|
|
|
|
|
|
/* TODO: launch a timer */
|
|
|
|
}
|
2017-04-26 08:57:50 +00:00
|
|
|
}
|
2017-04-28 04:43:42 +00:00
|
|
|
|
|
|
|
mme_ue_t *emm_find_ue_by_message(enb_ue_t *enb_ue, nas_message_t *message)
|
|
|
|
{
|
|
|
|
mme_ue_t *mme_ue = NULL;
|
|
|
|
|
|
|
|
switch(message->emm.h.message_type)
|
|
|
|
{
|
|
|
|
case NAS_ATTACH_REQUEST:
|
|
|
|
{
|
|
|
|
nas_attach_request_t *attach_request =
|
|
|
|
&message->emm.attach_request;
|
|
|
|
|
|
|
|
nas_eps_mobile_identity_t *eps_mobile_identity =
|
|
|
|
&attach_request->eps_mobile_identity;
|
|
|
|
|
|
|
|
switch(eps_mobile_identity->imsi.type)
|
|
|
|
{
|
|
|
|
case NAS_EPS_MOBILE_IDENTITY_IMSI:
|
|
|
|
{
|
|
|
|
c_uint8_t imsi[MAX_IMSI_LEN];
|
|
|
|
int imsi_len = 0;
|
|
|
|
c_int8_t imsi_bcd[MAX_IMSI_BCD_LEN+1];
|
|
|
|
|
|
|
|
nas_imsi_to_bcd(
|
|
|
|
&eps_mobile_identity->imsi, eps_mobile_identity->length,
|
|
|
|
imsi_bcd);
|
|
|
|
core_bcd_to_buffer(imsi_bcd, imsi, &imsi_len);
|
|
|
|
|
|
|
|
d_trace(3,"Search mme_ue by UE_IMSI[%s]\n", imsi_bcd);
|
|
|
|
|
|
|
|
/* Find mme_ue_context by IMSI */
|
|
|
|
mme_ue = mme_ue_find_by_imsi(imsi, imsi_len);
|
|
|
|
|
|
|
|
/* If not found , create one */
|
|
|
|
if (!mme_ue)
|
|
|
|
{
|
|
|
|
mme_ue = mme_ue_add(enb_ue);
|
|
|
|
}
|
|
|
|
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
case NAS_EPS_MOBILE_IDENTITY_GUTI:
|
|
|
|
{
|
|
|
|
nas_eps_mobile_identity_guti_t *nas_guti = NULL;
|
|
|
|
nas_guti = &eps_mobile_identity->guti;
|
|
|
|
guti_t guti;
|
|
|
|
|
|
|
|
guti.plmn_id = nas_guti->plmn_id;
|
|
|
|
guti.mme_gid = nas_guti->mme_gid;
|
|
|
|
guti.mme_code = nas_guti->mme_code;
|
|
|
|
guti.m_tmsi = nas_guti->m_tmsi;
|
|
|
|
|
|
|
|
d_trace(3,"Search mme_ue by GUTI[G:%d,C:%d,M_TMSI:0x%x]\n",
|
|
|
|
guti.mme_gid,
|
|
|
|
guti.mme_code,
|
|
|
|
guti.m_tmsi);
|
|
|
|
|
|
|
|
mme_ue = mme_ue_find_by_guti(&guti);
|
|
|
|
if (!mme_ue)
|
|
|
|
{
|
|
|
|
mme_ue = mme_ue_add(enb_ue);
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
default:
|
|
|
|
{
|
|
|
|
printf("Uknown message imsi type =%d\n",
|
|
|
|
eps_mobile_identity->imsi.type);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
case NAS_DETACH_REQUEST:
|
|
|
|
{
|
|
|
|
/* TODO */
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
case NAS_TRACKING_AREA_UPDATE_REQUEST:
|
|
|
|
{
|
|
|
|
/* TODO */
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
default:
|
|
|
|
{
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return mme_ue;
|
|
|
|
}
|