forked from acouzens/open5gs
305 lines
8.9 KiB
C
305 lines
8.9 KiB
C
/*
|
|
* Copyright (C) 2019 by Sukchan Lee <acetcom@gmail.com>
|
|
*
|
|
* This file is part of Open5GS.
|
|
*
|
|
* This program is free software: you can redistribute it and/or modify
|
|
* it under the terms of the GNU Affero General Public License as published by
|
|
* the Free Software Foundation, either version 3 of the License, or
|
|
* (at your option) any later version.
|
|
*
|
|
* This program is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU General Public License
|
|
* along with this program. If not, see <https://www.gnu.org/licenses/>.
|
|
*/
|
|
|
|
#include "ogs-s1ap.h"
|
|
#include "core/abts.h"
|
|
|
|
static void s1ap_message_test1(abts_case *tc, void *data)
|
|
{
|
|
/* S1SetupRequest */
|
|
const char *payload =
|
|
"0011002d000004003b00090000f11040"
|
|
"54f64010003c400903004a4c542d3632"
|
|
"3100400007000c0e4000f11000894001"
|
|
"00";
|
|
|
|
ogs_s1ap_message_t message;
|
|
ogs_pkbuf_t *pkbuf;
|
|
int result;
|
|
char hexbuf[OGS_MAX_SDU_LEN];
|
|
|
|
pkbuf = ogs_pkbuf_alloc(NULL, OGS_MAX_SDU_LEN);
|
|
ogs_assert(pkbuf);
|
|
ogs_pkbuf_put_data(pkbuf,
|
|
OGS_HEX(payload, strlen(payload), hexbuf), 49);
|
|
|
|
result = ogs_s1ap_decode(&message, pkbuf);
|
|
ABTS_INT_EQUAL(tc, 0, result);
|
|
ogs_s1ap_free(&message);
|
|
|
|
ogs_pkbuf_free(pkbuf);
|
|
}
|
|
|
|
static void s1ap_message_test2(abts_case *tc, void *data)
|
|
{
|
|
/* InitialUE(Attach Request) */
|
|
const char *payload =
|
|
"000c406f000006000800020001001a00"
|
|
"3c3b17df675aa8050741020bf600f110"
|
|
"000201030003e605f070000010000502"
|
|
"15d011d15200f11030395c0a003103e5"
|
|
"e0349011035758a65d0100e0c1004300"
|
|
"060000f1103039006440080000f1108c"
|
|
"3378200086400130004b00070000f110"
|
|
"000201";
|
|
|
|
ogs_s1ap_message_t message;
|
|
ogs_pkbuf_t *pkbuf;
|
|
int result;
|
|
char hexbuf[OGS_MAX_SDU_LEN];
|
|
|
|
pkbuf = ogs_pkbuf_alloc(NULL, OGS_MAX_SDU_LEN);
|
|
ogs_assert(pkbuf);
|
|
ogs_pkbuf_put_data(pkbuf,
|
|
OGS_HEX(payload, strlen(payload), hexbuf), 115);
|
|
|
|
result = ogs_s1ap_decode(&message, pkbuf);
|
|
ABTS_INT_EQUAL(tc, 0, result);
|
|
ogs_s1ap_free(&message);
|
|
|
|
ogs_pkbuf_free(pkbuf);
|
|
}
|
|
|
|
static void s1ap_message_test3(abts_case *tc, void *data)
|
|
{
|
|
/* initial context setup response */
|
|
const char *payload =
|
|
"2009002500000300004005c0020000bf"
|
|
"0008400200010033400f000032400a0a"
|
|
"1f0a0123c601000908";
|
|
|
|
ogs_s1ap_message_t message;
|
|
ogs_pkbuf_t *pkbuf;
|
|
int result;
|
|
char hexbuf[OGS_MAX_SDU_LEN];
|
|
|
|
pkbuf = ogs_pkbuf_alloc(NULL, OGS_MAX_SDU_LEN);
|
|
ogs_assert(pkbuf);
|
|
ogs_pkbuf_put_data(pkbuf,
|
|
OGS_HEX(payload, strlen(payload), hexbuf), 41);
|
|
|
|
result = ogs_s1ap_decode(&message, pkbuf);
|
|
ABTS_INT_EQUAL(tc, 0, result);
|
|
ogs_s1ap_free(&message);
|
|
|
|
ogs_pkbuf_free(pkbuf);
|
|
}
|
|
|
|
#if 0
|
|
static void s1ap_message_test4(abts_case *tc, void *data)
|
|
{
|
|
ogs_s1ap_message_t message;
|
|
int rv;
|
|
ogs_pkbuf_t *pkbuf;
|
|
int result;
|
|
|
|
mme_self()->max_num_of_served_gummei = 1;
|
|
mme_self()->served_gummei[0].num_of_plmn_id = 1;
|
|
mme_self()->served_gummei[0].num_of_mme_gid = 1;
|
|
mme_self()->served_gummei[0].num_of_mme_code = 1;
|
|
|
|
pkbuf = s1ap_build_setup_rsp();
|
|
|
|
ABTS_PTR_NOTNULL(tc, pkbuf);
|
|
ABTS_PTR_NOTNULL(tc, pkbuf->data);
|
|
ABTS_INT_EQUAL(tc, 27, pkbuf->len);
|
|
|
|
result = ogs_s1ap_decode(&message, pkbuf);
|
|
ABTS_INT_EQUAL(tc, 0, result);
|
|
|
|
ogs_s1ap_free(&message);
|
|
ogs_pkbuf_free(pkbuf);
|
|
}
|
|
|
|
static void s1ap_message_test5(abts_case *tc, void *data)
|
|
{
|
|
ogs_s1ap_message_t message;
|
|
int rv;
|
|
ogs_pkbuf_t *pkbuf;
|
|
int result;
|
|
|
|
pkbuf = test_s1ap_build_s1_setup_request(
|
|
S1AP_ENB_ID_PR_macroENB_ID, 0x54f64, 12345, 1, 1, 2);
|
|
|
|
ABTS_INT_EQUAL(tc, OGS_OK, rv);
|
|
ABTS_PTR_NOTNULL(tc, pkbuf);
|
|
ABTS_PTR_NOTNULL(tc, pkbuf->data);
|
|
ABTS_INT_EQUAL(tc, 35, pkbuf->len);
|
|
|
|
result = ogs_s1ap_decode(&message, pkbuf);
|
|
ABTS_INT_EQUAL(tc, 0, result);
|
|
|
|
ogs_s1ap_free(&message);
|
|
ogs_pkbuf_free(pkbuf);
|
|
}
|
|
|
|
static void s1ap_message_test6(abts_case *tc, void *data)
|
|
{
|
|
int rv;
|
|
ogs_pkbuf_t *s1apbuf = NULL;
|
|
ogs_pkbuf_t *emmbuf = NULL;
|
|
enb_ue_t enb_ue;
|
|
int i;
|
|
char buffer[1024];
|
|
const char *_result =
|
|
"000b4080 8c000003 00000002 00010008 00020001 001a0079 78efefef efefefef"
|
|
"efefefef efefefef efefefef efefefef efefefef efefefef efefefef efefefef"
|
|
"efefefef efefefef efefefef efefefef efefefef efefefef efefefef efefefef"
|
|
"efefefef efefefef efefefef efefefef efefefef efefefef efefefef efefefef"
|
|
"efefefef efefefef efefefef efefefef ef";
|
|
|
|
enb_ue.mme_ue_s1ap_id = 1;
|
|
enb_ue.enb_ue_s1ap_id = 1;
|
|
|
|
emmbuf = ogs_pkbuf_alloc(NULL, 120);
|
|
ABTS_PTR_NOTNULL(tc, emmbuf);
|
|
ogs_pkbuf_put(emmbuf, 120);
|
|
for (i = 0; i < emmbuf->len; i++)
|
|
((char *)emmbuf->data)[i] = 0xef;
|
|
|
|
s1apbuf = s1ap_build_downlink_nas_transport(&enb_ue, emmbuf);
|
|
ABTS_TRUE(tc, memcmp(OGS_HEX(_result, strlen(_result), buffer),
|
|
s1apbuf->data, s1apbuf->len) == 0);
|
|
ogs_pkbuf_free(s1apbuf);
|
|
}
|
|
#endif
|
|
|
|
static void s1ap_message_test7(abts_case *tc, void *data)
|
|
{
|
|
/* InitialUE(Service Request) */
|
|
const char *payload =
|
|
"000c402d000005000800020071001a00 0504c706b410004300060013f1890001"
|
|
"006440080013f189400bb75000864001 40006440080013f189400bb750004340"
|
|
"060013f18900014300060013f1890001 006440080013f189400db09000864001"
|
|
"30000000000000000000000000000000 00000000000000000000000000000000";
|
|
|
|
ogs_s1ap_message_t message;
|
|
ogs_pkbuf_t *pkbuf;
|
|
int result;
|
|
char hexbuf[OGS_MAX_SDU_LEN];
|
|
|
|
pkbuf = ogs_pkbuf_alloc(NULL, OGS_MAX_SDU_LEN);
|
|
ogs_assert(pkbuf);
|
|
ogs_pkbuf_put_data(pkbuf,
|
|
OGS_HEX(payload, strlen(payload), hexbuf), 128);
|
|
|
|
result = ogs_s1ap_decode(&message, pkbuf);
|
|
ABTS_INT_EQUAL(tc, 0, result);
|
|
ogs_s1ap_free(&message);
|
|
|
|
ogs_pkbuf_free(pkbuf);
|
|
}
|
|
|
|
static void s1ap_message_test8(abts_case *tc, void *data)
|
|
{
|
|
/* ENBDirectInformationTransferRAN-INFORMATION-REQUEST */
|
|
const char *payload =
|
|
"0025004a000001007900432036715489 0164f0000100010002548f0264f00000"
|
|
"010064f000400000002057974b81054c 84000000204f81005581014d860064f0"
|
|
"00000280094064f0000100010002";
|
|
|
|
ogs_s1ap_message_t message;
|
|
ogs_pkbuf_t *pkbuf;
|
|
int result;
|
|
char hexbuf[OGS_MAX_SDU_LEN];
|
|
|
|
pkbuf = ogs_pkbuf_alloc(NULL, OGS_MAX_SDU_LEN);
|
|
ogs_assert(pkbuf);
|
|
ogs_pkbuf_put_data(pkbuf,
|
|
OGS_HEX(payload, strlen(payload), hexbuf), 78);
|
|
|
|
result = ogs_s1ap_decode(&message, pkbuf);
|
|
ABTS_INT_EQUAL(tc, 0, result);
|
|
ogs_s1ap_free(&message);
|
|
|
|
ogs_pkbuf_free(pkbuf);
|
|
}
|
|
|
|
static void s1ap_message_test9(abts_case *tc, void *data)
|
|
{
|
|
/* ENBDirectInformationTransferRAN-INFORMATION-REQUEST */
|
|
const char *payload =
|
|
"0025004a000001007900432036715489 0164f0000100010001548f0264f00000"
|
|
"010064f000400000002057974b81054c 840000001f4f81005581014d860064f0"
|
|
"00000180094064f0000100010001";
|
|
|
|
ogs_s1ap_message_t message;
|
|
ogs_pkbuf_t *pkbuf;
|
|
int result;
|
|
char hexbuf[OGS_MAX_SDU_LEN];
|
|
|
|
pkbuf = ogs_pkbuf_alloc(NULL, OGS_MAX_SDU_LEN);
|
|
ogs_assert(pkbuf);
|
|
ogs_pkbuf_put_data(pkbuf,
|
|
OGS_HEX(payload, strlen(payload), hexbuf), 78);
|
|
|
|
result = ogs_s1ap_decode(&message, pkbuf);
|
|
ABTS_INT_EQUAL(tc, 0, result);
|
|
ogs_s1ap_free(&message);
|
|
|
|
ogs_pkbuf_free(pkbuf);
|
|
}
|
|
|
|
static void s1ap_message_test10(abts_case *tc, void *data)
|
|
{
|
|
/* ENBDirectInformationTransferRAN-INFORMATION-REQUEST */
|
|
const char *payload =
|
|
"0025004a000001007900432038715489 0064f000170001002d548f0254f42100"
|
|
"010054f421400000002057994b81014c 84000000014f81045581014d8864f000"
|
|
"170001002d0064f000170001002d";
|
|
|
|
ogs_s1ap_message_t message;
|
|
ogs_pkbuf_t *pkbuf;
|
|
int result;
|
|
char hexbuf[OGS_MAX_SDU_LEN];
|
|
|
|
pkbuf = ogs_pkbuf_alloc(NULL, OGS_MAX_SDU_LEN);
|
|
ogs_assert(pkbuf);
|
|
ogs_pkbuf_put_data(pkbuf,
|
|
OGS_HEX(payload, strlen(payload), hexbuf), 78);
|
|
|
|
result = ogs_s1ap_decode(&message, pkbuf);
|
|
ABTS_INT_EQUAL(tc, 0, result);
|
|
ogs_s1ap_free(&message);
|
|
|
|
ogs_pkbuf_free(pkbuf);
|
|
}
|
|
|
|
abts_suite *test_s1ap_message(abts_suite *suite)
|
|
{
|
|
suite = ADD_SUITE(suite)
|
|
|
|
ogs_log_install_domain(&__ogs_s1ap_domain, "s1ap", OGS_LOG_ERROR);
|
|
|
|
abts_run_test(suite, s1ap_message_test1, NULL);
|
|
abts_run_test(suite, s1ap_message_test2, NULL);
|
|
abts_run_test(suite, s1ap_message_test3, NULL);
|
|
#if 0 /* Will remove it in order not to use mme-context.h */
|
|
abts_run_test(suite, s1ap_message_test4, NULL);
|
|
abts_run_test(suite, s1ap_message_test5, NULL);
|
|
abts_run_test(suite, s1ap_message_test6, NULL);
|
|
#endif
|
|
abts_run_test(suite, s1ap_message_test7, NULL);
|
|
abts_run_test(suite, s1ap_message_test8, NULL);
|
|
abts_run_test(suite, s1ap_message_test9, NULL);
|
|
abts_run_test(suite, s1ap_message_test10, NULL);
|
|
|
|
return suite;
|
|
}
|