|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
#include "nas-security.h" |
|
|
|
|
|
#include "ngap-path.h" |
|
|
#include "nas-path.h" |
|
|
#include "sbi-path.h" |
|
|
|
|
|
#include "gmm-handler.h" |
|
|
|
|
|
#undef OGS_LOG_DOMAIN |
|
|
#define OGS_LOG_DOMAIN __gmm_log_domain |
|
|
|
|
|
static ogs_nas_5gmm_cause_t gmm_handle_nas_message_container( |
|
|
ran_ue_t *ran_ue, amf_ue_t *amf_ue, uint8_t message_type, |
|
|
ogs_nas_message_container_t *nas_message_container); |
|
|
|
|
|
static uint8_t gmm_cause_from_access_control(ogs_plmn_id_t *plmn_id); |
|
|
|
|
|
ogs_nas_5gmm_cause_t gmm_handle_registration_request(amf_ue_t *amf_ue, |
|
|
ogs_nas_security_header_type_t h, NGAP_ProcedureCode_t ngap_code, |
|
|
ogs_nas_5gs_registration_request_t *registration_request) |
|
|
{ |
|
|
int served_tai_index = 0; |
|
|
uint8_t gmm_cause; |
|
|
|
|
|
ran_ue_t *ran_ue = NULL; |
|
|
ogs_nas_5gs_registration_type_t *registration_type = NULL; |
|
|
ogs_nas_5gs_mobile_identity_t *mobile_identity = NULL; |
|
|
ogs_nas_5gs_mobile_identity_header_t *mobile_identity_header = NULL; |
|
|
ogs_nas_5gs_mobile_identity_suci_t *mobile_identity_suci = NULL; |
|
|
ogs_nas_5gs_mobile_identity_guti_t *mobile_identity_guti = NULL; |
|
|
ogs_nas_ue_security_capability_t *ue_security_capability = NULL; |
|
|
|
|
|
ogs_assert(amf_ue); |
|
|
ran_ue = ran_ue_find_by_id(amf_ue->ran_ue_id); |
|
|
ogs_assert(ran_ue); |
|
|
|
|
|
ogs_assert(registration_request); |
|
|
registration_type = ®istration_request->registration_type; |
|
|
ogs_assert(registration_type); |
|
|
mobile_identity = ®istration_request->mobile_identity; |
|
|
ogs_assert(mobile_identity); |
|
|
ue_security_capability = ®istration_request->ue_security_capability; |
|
|
ogs_assert(ue_security_capability); |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
#define OGS_REGISTRATION_CLEARTEXT_PRESENT \ |
|
|
(OGS_NAS_5GS_REGISTRATION_REQUEST_UE_SECURITY_CAPABILITY_PRESENT| \ |
|
|
OGS_NAS_5GS_REGISTRATION_REQUEST_UE_STATUS_PRESENT| \ |
|
|
OGS_NAS_5GS_REGISTRATION_REQUEST_EPS_NAS_MESSAGE_CONTAINER_PRESENT| \ |
|
|
OGS_NAS_5GS_REGISTRATION_REQUEST_NAS_MESSAGE_CONTAINER_PRESENT| \ |
|
|
OGS_NAS_5GS_REGISTRATION_REQUEST_ADDITIONAL_GUTI_PRESENT) |
|
|
|
|
|
if (ngap_code == NGAP_ProcedureCode_id_InitialUEMessage && |
|
|
registration_request->presencemask & |
|
|
~OGS_REGISTRATION_CLEARTEXT_PRESENT) { |
|
|
ogs_error("Non cleartext IEs is included [0x%llx]", |
|
|
(long long)registration_request->presencemask); |
|
|
return OGS_5GMM_CAUSE_SEMANTICALLY_INCORRECT_MESSAGE; |
|
|
} |
|
|
|
|
|
if (!h.integrity_protected && |
|
|
(registration_request->presencemask & |
|
|
OGS_NAS_5GS_REGISTRATION_REQUEST_NAS_MESSAGE_CONTAINER_PRESENT)) { |
|
|
ogs_error("NAS container present without Integrity-protected"); |
|
|
return OGS_5GMM_CAUSE_SEMANTICALLY_INCORRECT_MESSAGE; |
|
|
} |
|
|
|
|
|
if (!mobile_identity->length || !mobile_identity->buffer) { |
|
|
ogs_error("No Mobile Identity"); |
|
|
return OGS_5GMM_CAUSE_SEMANTICALLY_INCORRECT_MESSAGE; |
|
|
} |
|
|
|
|
|
if (mobile_identity->length < OGS_NAS_5GS_MOBILE_IDENTITY_SUCI_MIN_SIZE) { |
|
|
ogs_error("The length of Mobile Identity(%d) is less then the min(%d)", |
|
|
mobile_identity->length, OGS_NAS_5GS_MOBILE_IDENTITY_SUCI_MIN_SIZE); |
|
|
return OGS_5GMM_CAUSE_SEMANTICALLY_INCORRECT_MESSAGE; |
|
|
} |
|
|
|
|
|
mobile_identity_header = |
|
|
(ogs_nas_5gs_mobile_identity_header_t *)mobile_identity->buffer; |
|
|
|
|
|
memset(&amf_ue->old_guti, 0, sizeof(ogs_nas_5gs_guti_t)); |
|
|
|
|
|
switch (mobile_identity_header->type) { |
|
|
case OGS_NAS_5GS_MOBILE_IDENTITY_SUCI: |
|
|
mobile_identity_suci = |
|
|
(ogs_nas_5gs_mobile_identity_suci_t *)mobile_identity->buffer; |
|
|
if (mobile_identity_suci->h.supi_format != |
|
|
OGS_NAS_5GS_SUPI_FORMAT_IMSI) { |
|
|
ogs_error("Not implemented SUPI format [%d]", |
|
|
mobile_identity_suci->h.supi_format); |
|
|
return OGS_5GMM_CAUSE_SEMANTICALLY_INCORRECT_MESSAGE; |
|
|
} |
|
|
if (mobile_identity_suci->protection_scheme_id != |
|
|
OGS_PROTECTION_SCHEME_NULL && |
|
|
mobile_identity_suci->protection_scheme_id != |
|
|
OGS_PROTECTION_SCHEME_PROFILE_A && |
|
|
mobile_identity_suci->protection_scheme_id != |
|
|
OGS_PROTECTION_SCHEME_PROFILE_B) { |
|
|
ogs_error("Invalid ProtectionSchemeID(%d) in SUCI", |
|
|
mobile_identity_suci->protection_scheme_id); |
|
|
return OGS_5GMM_CAUSE_SEMANTICALLY_INCORRECT_MESSAGE; |
|
|
} |
|
|
ogs_nas_to_plmn_id(&amf_ue->home_plmn_id, |
|
|
&mobile_identity_suci->nas_plmn_id); |
|
|
|
|
|
gmm_cause = gmm_cause_from_access_control(&amf_ue->home_plmn_id); |
|
|
if (gmm_cause != OGS_5GMM_CAUSE_REQUEST_ACCEPTED) { |
|
|
ogs_error("Rejected by PLMN-ID access control"); |
|
|
return gmm_cause; |
|
|
} |
|
|
|
|
|
amf_ue_set_suci(amf_ue, mobile_identity); |
|
|
ogs_info("[%s] SUCI", amf_ue->suci); |
|
|
break; |
|
|
case OGS_NAS_5GS_MOBILE_IDENTITY_GUTI: |
|
|
mobile_identity_guti = |
|
|
(ogs_nas_5gs_mobile_identity_guti_t *)mobile_identity->buffer; |
|
|
if (!mobile_identity_guti) { |
|
|
ogs_error("No mobile identity"); |
|
|
return OGS_5GMM_CAUSE_SEMANTICALLY_INCORRECT_MESSAGE; |
|
|
} |
|
|
|
|
|
ogs_nas_5gs_mobile_identity_guti_to_nas_guti( |
|
|
mobile_identity_guti, &amf_ue->old_guti); |
|
|
|
|
|
ogs_info("[%s] 5G-S_GUTI[AMF_ID:0x%x,M_TMSI:0x%x]", |
|
|
AMF_UE_HAVE_SUCI(amf_ue) ? amf_ue->suci : "Unknown ID", |
|
|
ogs_amf_id_hexdump(&amf_ue->old_guti.amf_id), |
|
|
amf_ue->old_guti.m_tmsi); |
|
|
break; |
|
|
default: |
|
|
ogs_error("Unknown SUCI type [%d]", mobile_identity_header->type); |
|
|
break; |
|
|
} |
|
|
|
|
|
|
|
|
|
|
|
memcpy(&amf_ue->nas.registration, registration_type, |
|
|
sizeof(ogs_nas_5gs_registration_type_t)); |
|
|
amf_ue->nas.message_type = OGS_NAS_5GS_REGISTRATION_REQUEST; |
|
|
|
|
|
if (registration_type->value == OGS_NAS_5GS_REGISTRATION_TYPE_INITIAL) { |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
OGS_ASN_CLEAR_DATA(&amf_ue->ueRadioCapability); |
|
|
} |
|
|
|
|
|
amf_ue->nas.ue.tsc = registration_type->tsc; |
|
|
amf_ue->nas.ue.ksi = registration_type->ksi; |
|
|
ogs_debug(" OLD TSC[UE:%d,AMF:%d] KSI[UE:%d,AMF:%d]", |
|
|
amf_ue->nas.ue.tsc, amf_ue->nas.amf.tsc, |
|
|
amf_ue->nas.ue.ksi, amf_ue->nas.amf.ksi); |
|
|
if (amf_ue->nas.ue.ksi < OGS_NAS_KSI_NO_KEY_IS_AVAILABLE) { |
|
|
amf_ue->nas.amf.tsc = amf_ue->nas.ue.tsc; |
|
|
amf_ue->nas.amf.ksi = amf_ue->nas.ue.ksi; |
|
|
} |
|
|
ogs_debug(" NEW TSC[UE:%d,AMF:%d] KSI[UE:%d,AMF:%d]", |
|
|
amf_ue->nas.ue.tsc, amf_ue->nas.amf.tsc, |
|
|
amf_ue->nas.ue.ksi, amf_ue->nas.amf.ksi); |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
AMF_UE_CLEAR_PAGING_INFO(amf_ue); |
|
|
AMF_UE_CLEAR_N2_TRANSFER(amf_ue, pdu_session_resource_setup_request); |
|
|
AMF_UE_CLEAR_5GSM_MESSAGE(amf_ue); |
|
|
CLEAR_AMF_UE_ALL_TIMERS(amf_ue); |
|
|
|
|
|
if (SECURITY_CONTEXT_IS_VALID(amf_ue)) { |
|
|
ogs_kdf_kgnb_and_kn3iwf( |
|
|
amf_ue->kamf, amf_ue->ul_count.i32, |
|
|
amf_ue->nas.access_type, amf_ue->kgnb); |
|
|
ogs_kdf_nh_gnb(amf_ue->kamf, amf_ue->kgnb, amf_ue->nh); |
|
|
amf_ue->nhcc = 1; |
|
|
} |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
amf_ue_new_guti(amf_ue); |
|
|
|
|
|
ogs_debug(" OLD TAI[PLMN_ID:%06x,TAC:%d]", |
|
|
ogs_plmn_id_hexdump(&amf_ue->nr_tai.plmn_id), amf_ue->nr_tai.tac.v); |
|
|
ogs_debug(" OLD NR_CGI[PLMN_ID:%06x,CELL_ID:0x%llx]", |
|
|
ogs_plmn_id_hexdump(&amf_ue->nr_cgi.plmn_id), |
|
|
(long long)amf_ue->nr_cgi.cell_id); |
|
|
ogs_debug(" TAI[PLMN_ID:%06x,TAC:%d]", |
|
|
ogs_plmn_id_hexdump(&ran_ue->saved.nr_tai.plmn_id), |
|
|
ran_ue->saved.nr_tai.tac.v); |
|
|
ogs_debug(" NR_CGI[PLMN_ID:%06x,CELL_ID:0x%llx]", |
|
|
ogs_plmn_id_hexdump(&ran_ue->saved.nr_cgi.plmn_id), |
|
|
(long long)ran_ue->saved.nr_cgi.cell_id); |
|
|
|
|
|
|
|
|
amf_ue->gnb_ostream_id = ran_ue->gnb_ostream_id; |
|
|
memcpy(&amf_ue->nr_tai, &ran_ue->saved.nr_tai, sizeof(ogs_5gs_tai_t)); |
|
|
memcpy(&amf_ue->nr_cgi, &ran_ue->saved.nr_cgi, sizeof(ogs_nr_cgi_t)); |
|
|
amf_ue->ue_location_timestamp = ogs_time_now(); |
|
|
|
|
|
|
|
|
served_tai_index = amf_find_served_tai(&amf_ue->nr_tai); |
|
|
if (served_tai_index < 0) { |
|
|
ogs_error("Cannot find Served TAI[PLMN_ID:%06x,TAC:%d]", |
|
|
ogs_plmn_id_hexdump(&amf_ue->nr_tai.plmn_id), amf_ue->nr_tai.tac.v); |
|
|
return OGS_5GMM_CAUSE_TRACKING_AREA_NOT_ALLOWED; |
|
|
} |
|
|
ogs_debug(" SERVED_TAI_INDEX[%d]", served_tai_index); |
|
|
|
|
|
if (registration_request->presencemask & |
|
|
OGS_NAS_5GS_REGISTRATION_REQUEST_UE_SECURITY_CAPABILITY_PRESENT) { |
|
|
memcpy(&amf_ue->ue_security_capability, |
|
|
®istration_request->ue_security_capability, |
|
|
registration_request->ue_security_capability.length + |
|
|
sizeof(registration_request->ue_security_capability.length)); |
|
|
} |
|
|
|
|
|
if (amf_selected_int_algorithm(amf_ue) == |
|
|
OGS_NAS_SECURITY_ALGORITHMS_NIA0) { |
|
|
ogs_error("[UE:0x%x:0x%x], NEA0 can be used in Encrypt[0x%x], " |
|
|
"but Integrity[0x%x] cannot be bypassed with NIA0", |
|
|
ue_security_capability->nr_ea, ue_security_capability->nr_ia, |
|
|
amf_selected_enc_algorithm(amf_ue), |
|
|
amf_selected_int_algorithm(amf_ue)); |
|
|
return OGS_5GMM_CAUSE_UE_SECURITY_CAPABILITIES_MISMATCH; |
|
|
} |
|
|
|
|
|
if (amf_ue_is_rat_restricted(amf_ue)) { |
|
|
ogs_error("Registration rejected due to RAT restrictions"); |
|
|
return OGS_5GMM_CAUSE_5GS_SERVICES_NOT_ALLOWED; |
|
|
} |
|
|
|
|
|
return OGS_5GMM_CAUSE_REQUEST_ACCEPTED; |
|
|
} |
|
|
|
|
|
ogs_nas_5gmm_cause_t gmm_handle_registration_update( |
|
|
ran_ue_t *ran_ue, amf_ue_t *amf_ue, |
|
|
ogs_nas_5gs_registration_request_t *registration_request) |
|
|
{ |
|
|
amf_sess_t *sess = NULL; |
|
|
uint16_t psimask; |
|
|
int i = 0, served_tai_index = 0; |
|
|
|
|
|
ogs_nas_5gs_tracking_area_identity_t *last_visited_registered_tai = NULL; |
|
|
ogs_nas_uplink_data_status_t *uplink_data_status = NULL; |
|
|
ogs_nas_pdu_session_status_t *pdu_session_status = NULL; |
|
|
ogs_nas_5gs_update_type_t *update_type = NULL; |
|
|
|
|
|
ogs_assert(amf_ue); |
|
|
ogs_assert(ran_ue); |
|
|
ogs_assert(registration_request); |
|
|
|
|
|
last_visited_registered_tai = |
|
|
®istration_request->last_visited_registered_tai; |
|
|
ogs_assert(last_visited_registered_tai); |
|
|
uplink_data_status = ®istration_request->uplink_data_status; |
|
|
ogs_assert(uplink_data_status); |
|
|
pdu_session_status = ®istration_request->pdu_session_status; |
|
|
ogs_assert(pdu_session_status); |
|
|
update_type = ®istration_request->update_type; |
|
|
ogs_assert(update_type); |
|
|
|
|
|
served_tai_index = amf_find_served_tai(&amf_ue->nr_tai); |
|
|
if (served_tai_index < 0) { |
|
|
ogs_error("Cannot find Served TAI[PLMN_ID:%06x,TAC:%d]", |
|
|
ogs_plmn_id_hexdump(&amf_ue->nr_tai.plmn_id), amf_ue->nr_tai.tac.v); |
|
|
return OGS_5GMM_CAUSE_TRACKING_AREA_NOT_ALLOWED; |
|
|
} |
|
|
ogs_debug(" SERVED_TAI_INDEX[%d]", served_tai_index); |
|
|
|
|
|
if (registration_request->presencemask & |
|
|
OGS_NAS_5GS_REGISTRATION_REQUEST_NAS_MESSAGE_CONTAINER_PRESENT) { |
|
|
|
|
|
return gmm_handle_nas_message_container( |
|
|
ran_ue, amf_ue, OGS_NAS_5GS_REGISTRATION_REQUEST, |
|
|
®istration_request->nas_message_container); |
|
|
} |
|
|
|
|
|
if (registration_request->presencemask & |
|
|
OGS_NAS_5GS_REGISTRATION_REQUEST_5GMM_CAPABILITY_PRESENT) { |
|
|
ogs_nas_5gmm_capability_t *gmm_capability = |
|
|
®istration_request->gmm_capability; |
|
|
|
|
|
amf_ue->gmm_capability.lte_positioning_protocol_capability |
|
|
= gmm_capability->lte_positioning_protocol_capability; |
|
|
amf_ue->gmm_capability.ho_attach = gmm_capability->ho_attach; |
|
|
amf_ue->gmm_capability.s1_mode = gmm_capability->s1_mode; |
|
|
|
|
|
ogs_debug(" 5GMM Capability:[LPP:%d, HO_ATTACH:%d, S1_MODE:%d]", |
|
|
amf_ue->gmm_capability.lte_positioning_protocol_capability, |
|
|
amf_ue->gmm_capability.ho_attach, |
|
|
amf_ue->gmm_capability.s1_mode); |
|
|
} |
|
|
|
|
|
if (registration_request->presencemask & |
|
|
OGS_NAS_5GS_REGISTRATION_REQUEST_S1_UE_NETWORK_CAPABILITY_PRESENT) { |
|
|
memcpy(&amf_ue->ue_network_capability, |
|
|
®istration_request->s1_ue_network_capability, |
|
|
registration_request->s1_ue_network_capability.length + |
|
|
sizeof(registration_request->s1_ue_network_capability.length)); |
|
|
} |
|
|
|
|
|
if (registration_request->presencemask & |
|
|
OGS_NAS_5GS_REGISTRATION_REQUEST_REQUESTED_NSSAI_PRESENT) { |
|
|
|
|
|
amf_ue->requested_nssai.num_of_s_nssai = |
|
|
ogs_nas_parse_nssai( |
|
|
amf_ue->requested_nssai.s_nssai, |
|
|
®istration_request->requested_nssai); |
|
|
|
|
|
for (i = 0; i < amf_ue->requested_nssai.num_of_s_nssai; i++) { |
|
|
if (amf_find_s_nssai( |
|
|
&amf_ue->nr_tai.plmn_id, |
|
|
(ogs_s_nssai_t *)&amf_ue->requested_nssai.s_nssai[i])) |
|
|
break; |
|
|
} |
|
|
|
|
|
if (i == amf_ue->requested_nssai.num_of_s_nssai) { |
|
|
ogs_error("Cannot find Requested NSSAI [%d]", |
|
|
amf_ue->requested_nssai.num_of_s_nssai); |
|
|
for (i = 0; i < amf_ue->requested_nssai.num_of_s_nssai; i++) { |
|
|
ogs_error(" PLMN_ID[MCC:%d MNC:%d]", |
|
|
ogs_plmn_id_mcc(&amf_ue->nr_tai.plmn_id), |
|
|
ogs_plmn_id_mnc(&amf_ue->nr_tai.plmn_id)); |
|
|
ogs_error(" S_NSSAI[SST:%d SD:0x%x]", |
|
|
amf_ue->requested_nssai.s_nssai[i].sst, |
|
|
amf_ue->requested_nssai.s_nssai[i].sd.v); |
|
|
} |
|
|
return OGS_5GMM_CAUSE_NO_NETWORK_SLICES_AVAILABLE; |
|
|
} |
|
|
} |
|
|
|
|
|
if (registration_request->presencemask & |
|
|
OGS_NAS_5GS_REGISTRATION_REQUEST_LAST_VISITED_REGISTERED_TAI_PRESENT) { |
|
|
|
|
|
ogs_nas_to_plmn_id(&amf_ue->last_visited_plmn_id, |
|
|
&last_visited_registered_tai->nas_plmn_id); |
|
|
} |
|
|
|
|
|
if (registration_request->presencemask & |
|
|
OGS_NAS_5GS_REGISTRATION_REQUEST_UE_USAGE_SETTING_PRESENT) { |
|
|
memcpy(&amf_ue->ue_usage_setting, |
|
|
®istration_request->ue_usage_setting, |
|
|
registration_request->ue_usage_setting.length + |
|
|
sizeof(registration_request->ue_usage_setting.length)); |
|
|
} |
|
|
|
|
|
if ((registration_request->presencemask & |
|
|
OGS_NAS_5GS_REGISTRATION_REQUEST_ALLOWED_PDU_SESSION_STATUS_PRESENT) |
|
|
== 0) { |
|
|
amf_ue->nas.present.allowed_pdu_session_status = 0; |
|
|
} else { |
|
|
amf_ue->nas.present.allowed_pdu_session_status = 1; |
|
|
ogs_error("Not implemented for Allowed PDU Session Status IE"); |
|
|
} |
|
|
|
|
|
if ((registration_request->presencemask & |
|
|
OGS_NAS_5GS_REGISTRATION_REQUEST_PDU_SESSION_STATUS_PRESENT) == 0) { |
|
|
amf_ue->nas.present.pdu_session_status = 0; |
|
|
} else { |
|
|
amf_ue->nas.present.pdu_session_status = 1; |
|
|
|
|
|
psimask = 0; |
|
|
psimask |= pdu_session_status->psi << 8; |
|
|
psimask |= pdu_session_status->psi >> 8; |
|
|
|
|
|
ogs_list_for_each(&amf_ue->sess_list, sess) { |
|
|
if ((psimask & (1 << sess->psi)) == 0) { |
|
|
if (SESSION_CONTEXT_IN_SMF(sess)) |
|
|
amf_sbi_send_release_session( |
|
|
ran_ue, sess, AMF_RELEASE_SM_CONTEXT_REGISTRATION_ACCEPT); |
|
|
} |
|
|
} |
|
|
} |
|
|
|
|
|
if ((registration_request->presencemask & |
|
|
OGS_NAS_5GS_REGISTRATION_REQUEST_UPLINK_DATA_STATUS_PRESENT) == 0) { |
|
|
amf_ue->nas.present.uplink_data_status = 0; |
|
|
} else { |
|
|
amf_ue->nas.present.uplink_data_status = 1; |
|
|
|
|
|
psimask = 0; |
|
|
psimask |= uplink_data_status->psi << 8; |
|
|
psimask |= uplink_data_status->psi >> 8; |
|
|
|
|
|
ogs_list_for_each(&amf_ue->sess_list, sess) { |
|
|
if (psimask & (1 << sess->psi)) { |
|
|
if (SESSION_CONTEXT_IN_SMF(sess)) |
|
|
amf_sbi_send_activating_session( |
|
|
ran_ue, sess, |
|
|
AMF_UPDATE_SM_CONTEXT_REGISTRATION_REQUEST); |
|
|
} |
|
|
} |
|
|
} |
|
|
|
|
|
if (registration_request->presencemask & |
|
|
OGS_NAS_5GS_REGISTRATION_REQUEST_5GS_UPDATE_TYPE_PRESENT) { |
|
|
if (update_type->ng_ran_radio_capability_update_needed == 1) { |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
OGS_ASN_CLEAR_DATA(&amf_ue->ueRadioCapability); |
|
|
} |
|
|
} |
|
|
|
|
|
return OGS_5GMM_CAUSE_REQUEST_ACCEPTED; |
|
|
} |
|
|
|
|
|
bool gmm_registration_request_from_old_amf(amf_ue_t *amf_ue, |
|
|
ogs_nas_5gs_registration_request_t *registration_request) |
|
|
{ |
|
|
ogs_nas_5gs_mobile_identity_t *mobile_identity = NULL; |
|
|
ogs_nas_5gs_mobile_identity_header_t *mobile_identity_header = NULL; |
|
|
|
|
|
int i; |
|
|
ogs_plmn_id_t plmn_id; |
|
|
|
|
|
ogs_assert(amf_ue); |
|
|
ogs_assert(registration_request); |
|
|
mobile_identity = ®istration_request->mobile_identity; |
|
|
mobile_identity_header = |
|
|
(ogs_nas_5gs_mobile_identity_header_t *)mobile_identity->buffer; |
|
|
|
|
|
if (mobile_identity_header->type != OGS_NAS_5GS_MOBILE_IDENTITY_GUTI) { |
|
|
return false; |
|
|
} |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
if ((amf_ue->old_guti.amf_id.region == 0 && |
|
|
amf_ue->old_guti.amf_id.set2 == 0) && |
|
|
(amf_ue->old_guti.nas_plmn_id.mcc1 == 0 && |
|
|
amf_ue->old_guti.nas_plmn_id.mcc2 == 0 && |
|
|
amf_ue->old_guti.nas_plmn_id.mcc3 == 0) && |
|
|
(amf_ue->old_guti.nas_plmn_id.mnc1 == 0 && |
|
|
amf_ue->old_guti.nas_plmn_id.mnc2 == 0 && |
|
|
amf_ue->old_guti.nas_plmn_id.mnc3 == 0)) { |
|
|
return false; |
|
|
} |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
ogs_nas_to_plmn_id(&plmn_id, &amf_ue->old_guti.nas_plmn_id); |
|
|
|
|
|
ogs_info("[%s] 5G-S_GUTI[PLMN_ID:0x%x,AMF_ID:0x%x,M_TMSI:0x%x]", |
|
|
AMF_UE_HAVE_SUCI(amf_ue) ? amf_ue->suci : "Unknown ID", |
|
|
ogs_plmn_id_hexdump(&plmn_id), |
|
|
ogs_amf_id_hexdump(&amf_ue->old_guti.amf_id), |
|
|
amf_ue->old_guti.m_tmsi); |
|
|
|
|
|
for (i = 0; i < amf_self()->num_of_served_guami; i++) { |
|
|
if (memcmp(&amf_self()->served_guami[i].plmn_id, |
|
|
&plmn_id, OGS_PLMN_ID_LEN) == 0 && |
|
|
memcmp(&amf_self()->served_guami[i].amf_id, |
|
|
&amf_ue->old_guti.amf_id, sizeof(ogs_amf_id_t)) == 0) { |
|
|
return false; |
|
|
} |
|
|
} |
|
|
|
|
|
ogs_info("Serving AMF Changed [NumberOfServedGuami:%d]", |
|
|
amf_self()->num_of_served_guami); |
|
|
for (i = 0; i < amf_self()->num_of_served_guami; i++) { |
|
|
ogs_info("Served Guami[PLMN_ID:0x%x,AMF_ID:0x%x]", |
|
|
ogs_plmn_id_hexdump(&amf_self()->served_guami[i].plmn_id), |
|
|
ogs_amf_id_hexdump(&amf_self()->served_guami[i].amf_id)); |
|
|
} |
|
|
|
|
|
return true; |
|
|
} |
|
|
|
|
|
ogs_nas_5gmm_cause_t gmm_handle_service_request(amf_ue_t *amf_ue, |
|
|
ogs_nas_security_header_type_t h, NGAP_ProcedureCode_t ngap_code, |
|
|
ogs_nas_5gs_service_request_t *service_request) |
|
|
{ |
|
|
int served_tai_index = 0; |
|
|
|
|
|
ran_ue_t *ran_ue = NULL; |
|
|
ogs_nas_key_set_identifier_t *ngksi = NULL; |
|
|
|
|
|
ogs_assert(amf_ue); |
|
|
ran_ue = ran_ue_find_by_id(amf_ue->ran_ue_id); |
|
|
ogs_assert(ran_ue); |
|
|
|
|
|
ngksi = &service_request->ngksi; |
|
|
ogs_assert(ngksi); |
|
|
|
|
|
if (ngksi->type == OGS_NAS_SERVICE_TYPE_MOBILE_TERMINATED_SERVICES) |
|
|
amf_metrics_inst_global_inc(AMF_METR_GLOB_CTR_MM_PAGING_5G_SUCC); |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
#define OGS_SERVICE_CLEARTEXT_PRESENT \ |
|
|
(OGS_NAS_5GS_SERVICE_REQUEST_NAS_MESSAGE_CONTAINER_PRESENT) |
|
|
|
|
|
if (ngap_code == NGAP_ProcedureCode_id_InitialUEMessage && |
|
|
service_request->presencemask & ~OGS_SERVICE_CLEARTEXT_PRESENT) { |
|
|
ogs_error("Non cleartext IEs is included [0x%llx]", |
|
|
(long long)service_request->presencemask); |
|
|
return OGS_5GMM_CAUSE_SEMANTICALLY_INCORRECT_MESSAGE; |
|
|
} |
|
|
|
|
|
if (!h.integrity_protected && |
|
|
(service_request->presencemask & |
|
|
OGS_NAS_5GS_SERVICE_REQUEST_NAS_MESSAGE_CONTAINER_PRESENT)) { |
|
|
ogs_error("NAS container present without Integrity-protected"); |
|
|
return OGS_5GMM_CAUSE_SEMANTICALLY_INCORRECT_MESSAGE; |
|
|
} |
|
|
|
|
|
amf_ue->nas.message_type = OGS_NAS_5GS_SERVICE_REQUEST; |
|
|
|
|
|
amf_ue->nas.ue.tsc = ngksi->tsc; |
|
|
amf_ue->nas.ue.ksi = ngksi->value; |
|
|
ogs_debug(" OLD TSC[UE:%d,AMF:%d] KSI[UE:%d,AMF:%d]", |
|
|
amf_ue->nas.ue.tsc, amf_ue->nas.amf.tsc, |
|
|
amf_ue->nas.ue.ksi, amf_ue->nas.amf.ksi); |
|
|
if (amf_ue->nas.ue.ksi < OGS_NAS_KSI_NO_KEY_IS_AVAILABLE) { |
|
|
amf_ue->nas.amf.tsc = amf_ue->nas.ue.tsc; |
|
|
amf_ue->nas.amf.ksi = amf_ue->nas.ue.ksi; |
|
|
} |
|
|
ogs_debug(" NEW TSC[UE:%d,AMF:%d] KSI[UE:%d,AMF:%d]", |
|
|
amf_ue->nas.ue.tsc, amf_ue->nas.amf.tsc, |
|
|
amf_ue->nas.ue.ksi, amf_ue->nas.amf.ksi); |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
CLEAR_AMF_UE_ALL_TIMERS(amf_ue); |
|
|
|
|
|
if (SECURITY_CONTEXT_IS_VALID(amf_ue)) { |
|
|
ogs_kdf_kgnb_and_kn3iwf( |
|
|
amf_ue->kamf, amf_ue->ul_count.i32, |
|
|
amf_ue->nas.access_type, amf_ue->kgnb); |
|
|
ogs_kdf_nh_gnb(amf_ue->kamf, amf_ue->kgnb, amf_ue->nh); |
|
|
amf_ue->nhcc = 1; |
|
|
} |
|
|
|
|
|
ogs_debug(" OLD TAI[PLMN_ID:%06x,TAC:%d]", |
|
|
ogs_plmn_id_hexdump(&amf_ue->nr_tai.plmn_id), amf_ue->nr_tai.tac.v); |
|
|
ogs_debug(" OLD NR_CGI[PLMN_ID:%06x,CELL_ID:0x%llx]", |
|
|
ogs_plmn_id_hexdump(&amf_ue->nr_cgi.plmn_id), |
|
|
(long long)amf_ue->nr_cgi.cell_id); |
|
|
ogs_debug(" TAI[PLMN_ID:%06x,TAC:%d]", |
|
|
ogs_plmn_id_hexdump(&ran_ue->saved.nr_tai.plmn_id), |
|
|
ran_ue->saved.nr_tai.tac.v); |
|
|
ogs_debug(" NR_CGI[PLMN_ID:%06x,CELL_ID:0x%llx]", |
|
|
ogs_plmn_id_hexdump(&ran_ue->saved.nr_cgi.plmn_id), |
|
|
(long long)ran_ue->saved.nr_cgi.cell_id); |
|
|
|
|
|
|
|
|
amf_ue->gnb_ostream_id = ran_ue->gnb_ostream_id; |
|
|
memcpy(&amf_ue->nr_tai, &ran_ue->saved.nr_tai, sizeof(ogs_5gs_tai_t)); |
|
|
memcpy(&amf_ue->nr_cgi, &ran_ue->saved.nr_cgi, sizeof(ogs_nr_cgi_t)); |
|
|
amf_ue->ue_location_timestamp = ogs_time_now(); |
|
|
|
|
|
|
|
|
served_tai_index = amf_find_served_tai(&amf_ue->nr_tai); |
|
|
if (served_tai_index < 0) { |
|
|
ogs_error("Cannot find Served TAI[PLMN_ID:%06x,TAC:%d]", |
|
|
ogs_plmn_id_hexdump(&amf_ue->nr_tai.plmn_id), amf_ue->nr_tai.tac.v); |
|
|
return OGS_5GMM_CAUSE_TRACKING_AREA_NOT_ALLOWED; |
|
|
} |
|
|
ogs_debug(" SERVED_TAI_INDEX[%d]", served_tai_index); |
|
|
|
|
|
ogs_info("[%s] 5G-S_GUTI[AMF_ID:0x%x,M_TMSI:0x%x]", |
|
|
AMF_UE_HAVE_SUCI(amf_ue) ? amf_ue->suci : "Unknown ID", |
|
|
ogs_amf_id_hexdump(&amf_ue->current.guti.amf_id), |
|
|
amf_ue->current.guti.m_tmsi); |
|
|
|
|
|
return OGS_5GMM_CAUSE_REQUEST_ACCEPTED; |
|
|
} |
|
|
|
|
|
ogs_nas_5gmm_cause_t gmm_handle_service_update( |
|
|
ran_ue_t *ran_ue, amf_ue_t *amf_ue, |
|
|
ogs_nas_5gs_service_request_t *service_request) |
|
|
{ |
|
|
amf_sess_t *sess = NULL; |
|
|
uint16_t psimask = 0; |
|
|
int xact_count = 0, r; |
|
|
|
|
|
ogs_nas_uplink_data_status_t *uplink_data_status = NULL; |
|
|
ogs_nas_pdu_session_status_t *pdu_session_status = NULL; |
|
|
ogs_nas_allowed_pdu_session_status_t *allowed_pdu_session_status = NULL; |
|
|
|
|
|
ogs_assert(amf_ue); |
|
|
ogs_assert(ran_ue); |
|
|
ogs_assert(service_request); |
|
|
|
|
|
uplink_data_status = &service_request->uplink_data_status; |
|
|
ogs_assert(uplink_data_status); |
|
|
pdu_session_status = &service_request->pdu_session_status; |
|
|
ogs_assert(pdu_session_status); |
|
|
allowed_pdu_session_status = &service_request->allowed_pdu_session_status; |
|
|
ogs_assert(allowed_pdu_session_status); |
|
|
|
|
|
if (service_request->presencemask & |
|
|
OGS_NAS_5GS_SERVICE_REQUEST_NAS_MESSAGE_CONTAINER_PRESENT) { |
|
|
|
|
|
return gmm_handle_nas_message_container( |
|
|
ran_ue, amf_ue, OGS_NAS_5GS_SERVICE_REQUEST, |
|
|
&service_request->nas_message_container); |
|
|
} |
|
|
|
|
|
xact_count = amf_sess_xact_count(amf_ue); |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
if ((service_request->presencemask & |
|
|
OGS_NAS_5GS_SERVICE_REQUEST_PDU_SESSION_STATUS_PRESENT) == 0) { |
|
|
amf_ue->nas.present.pdu_session_status = 0; |
|
|
} else { |
|
|
amf_ue->nas.present.pdu_session_status = 1; |
|
|
|
|
|
psimask = 0; |
|
|
psimask |= pdu_session_status->psi << 8; |
|
|
psimask |= pdu_session_status->psi >> 8; |
|
|
|
|
|
ogs_list_for_each(&amf_ue->sess_list, sess) { |
|
|
if ((psimask & (1 << sess->psi)) == 0) { |
|
|
if (SESSION_CONTEXT_IN_SMF(sess)) |
|
|
amf_sbi_send_release_session( |
|
|
ran_ue, sess, AMF_RELEASE_SM_CONTEXT_SERVICE_ACCEPT); |
|
|
} |
|
|
} |
|
|
} |
|
|
|
|
|
if ((service_request->presencemask & |
|
|
OGS_NAS_5GS_SERVICE_REQUEST_ALLOWED_PDU_SESSION_STATUS_PRESENT) == 0) { |
|
|
amf_ue->nas.present.allowed_pdu_session_status = 0; |
|
|
} else { |
|
|
amf_ue->nas.present.allowed_pdu_session_status = 1; |
|
|
ogs_error("Not implemented for Allowed PDU Session Status IE"); |
|
|
} |
|
|
|
|
|
if ((service_request->presencemask & |
|
|
OGS_NAS_5GS_SERVICE_REQUEST_UPLINK_DATA_STATUS_PRESENT) == 0) { |
|
|
amf_ue->nas.present.uplink_data_status = 0; |
|
|
} else { |
|
|
amf_ue->nas.present.uplink_data_status = 1; |
|
|
|
|
|
psimask = 0; |
|
|
psimask |= uplink_data_status->psi << 8; |
|
|
psimask |= uplink_data_status->psi >> 8; |
|
|
|
|
|
ogs_list_for_each(&amf_ue->sess_list, sess) { |
|
|
if (psimask & (1 << sess->psi)) { |
|
|
if (SESSION_CONTEXT_IN_SMF(sess)) |
|
|
amf_sbi_send_activating_session( |
|
|
ran_ue, sess, |
|
|
AMF_UPDATE_SM_CONTEXT_SERVICE_REQUEST); |
|
|
} |
|
|
} |
|
|
} |
|
|
|
|
|
if (amf_sess_xact_count(amf_ue) == xact_count) { |
|
|
r = nas_5gs_send_service_accept(amf_ue); |
|
|
ogs_expect(r == OGS_OK); |
|
|
ogs_assert(r != OGS_ERROR); |
|
|
} |
|
|
|
|
|
return OGS_5GMM_CAUSE_REQUEST_ACCEPTED; |
|
|
} |
|
|
|
|
|
int gmm_handle_deregistration_request(amf_ue_t *amf_ue, |
|
|
ogs_nas_5gs_deregistration_request_from_ue_t *deregistration_request) |
|
|
{ |
|
|
int r, state, xact_count = 0; |
|
|
ran_ue_t *ran_ue = NULL; |
|
|
ogs_nas_de_registration_type_t *de_registration_type = NULL; |
|
|
|
|
|
ogs_assert(amf_ue); |
|
|
ran_ue = ran_ue_find_by_id(amf_ue->ran_ue_id); |
|
|
ogs_assert(ran_ue); |
|
|
ogs_assert(deregistration_request); |
|
|
|
|
|
de_registration_type = &deregistration_request->de_registration_type; |
|
|
|
|
|
|
|
|
memcpy(&amf_ue->nas.de_registration, |
|
|
de_registration_type, sizeof(ogs_nas_de_registration_type_t)); |
|
|
amf_ue->nas.message_type = OGS_NAS_5GS_DEREGISTRATION_REQUEST_FROM_UE; |
|
|
|
|
|
amf_ue->nas.ue.tsc = de_registration_type->tsc; |
|
|
amf_ue->nas.ue.ksi = de_registration_type->ksi; |
|
|
ogs_debug(" OLD TSC[UE:%d,AMF:%d] KSI[UE:%d,AMF:%d]", |
|
|
amf_ue->nas.ue.tsc, amf_ue->nas.amf.tsc, |
|
|
amf_ue->nas.ue.ksi, amf_ue->nas.amf.ksi); |
|
|
if (amf_ue->nas.ue.ksi < OGS_NAS_KSI_NO_KEY_IS_AVAILABLE) { |
|
|
amf_ue->nas.amf.tsc = amf_ue->nas.ue.tsc; |
|
|
amf_ue->nas.amf.ksi = amf_ue->nas.ue.ksi; |
|
|
} |
|
|
ogs_debug(" NEW TSC[UE:%d,AMF:%d] KSI[UE:%d,AMF:%d]", |
|
|
amf_ue->nas.ue.tsc, amf_ue->nas.amf.tsc, |
|
|
amf_ue->nas.ue.ksi, amf_ue->nas.amf.ksi); |
|
|
|
|
|
if (deregistration_request->de_registration_type.switch_off) |
|
|
ogs_debug(" Switch-Off"); |
|
|
|
|
|
ogs_info("[%s] SUCI", amf_ue->suci); |
|
|
|
|
|
xact_count = amf_sess_xact_count(amf_ue); |
|
|
|
|
|
state = AMF_UE_INITIATED_DE_REGISTERED; |
|
|
amf_sbi_send_release_all_sessions(ran_ue, amf_ue, state); |
|
|
|
|
|
if (!AMF_SESSION_RELEASE_PENDING(amf_ue) && |
|
|
amf_sess_xact_count(amf_ue) == xact_count) { |
|
|
if (UDM_SDM_SUBSCRIBED(amf_ue)) { |
|
|
r = amf_ue_sbi_discover_and_send( |
|
|
OGS_SBI_SERVICE_TYPE_NUDM_SDM, NULL, |
|
|
amf_nudm_sdm_build_subscription_delete, |
|
|
amf_ue, state, NULL); |
|
|
ogs_expect(r == OGS_OK); |
|
|
ogs_assert(r != OGS_ERROR); |
|
|
} else if (PCF_AM_POLICY_ASSOCIATED(amf_ue)) { |
|
|
r = amf_ue_sbi_discover_and_send( |
|
|
OGS_SBI_SERVICE_TYPE_NPCF_AM_POLICY_CONTROL, |
|
|
NULL, |
|
|
amf_npcf_am_policy_control_build_delete, |
|
|
amf_ue, state, NULL); |
|
|
ogs_expect(r == OGS_OK); |
|
|
ogs_assert(r != OGS_ERROR); |
|
|
} else { |
|
|
r = nas_5gs_send_de_registration_accept(amf_ue); |
|
|
ogs_expect(r == OGS_OK); |
|
|
ogs_assert(r != OGS_ERROR); |
|
|
} |
|
|
} |
|
|
|
|
|
return OGS_OK; |
|
|
} |
|
|
|
|
|
int gmm_handle_authentication_response(amf_ue_t *amf_ue, |
|
|
ogs_nas_5gs_authentication_response_t *authentication_response) |
|
|
{ |
|
|
ogs_nas_authentication_response_parameter_t |
|
|
*authentication_response_parameter = NULL; |
|
|
uint8_t hxres_star[OGS_MAX_RES_LEN]; |
|
|
int r; |
|
|
|
|
|
ogs_assert(amf_ue); |
|
|
ogs_assert(authentication_response); |
|
|
|
|
|
authentication_response_parameter = &authentication_response-> |
|
|
authentication_response_parameter; |
|
|
|
|
|
ogs_debug("[%s] Authentication response", amf_ue->suci); |
|
|
|
|
|
CLEAR_AMF_UE_TIMER(amf_ue->t3560); |
|
|
|
|
|
if (authentication_response_parameter->length != OGS_MAX_RES_LEN) { |
|
|
ogs_error("[%s] Invalid length [%d]", |
|
|
amf_ue->suci, authentication_response_parameter->length); |
|
|
return OGS_ERROR; |
|
|
} |
|
|
|
|
|
ogs_kdf_hxres_star( |
|
|
amf_ue->rand, authentication_response_parameter->res, hxres_star); |
|
|
|
|
|
if (memcmp(hxres_star, amf_ue->hxres_star, OGS_MAX_RES_LEN) != 0) { |
|
|
ogs_error("[%s] MAC failure", amf_ue->suci); |
|
|
ogs_log_hexdump(OGS_LOG_ERROR, |
|
|
authentication_response_parameter->res, |
|
|
authentication_response_parameter->length); |
|
|
ogs_log_hexdump(OGS_LOG_ERROR, hxres_star, OGS_MAX_RES_LEN); |
|
|
ogs_log_hexdump(OGS_LOG_ERROR, |
|
|
amf_ue->hxres_star, OGS_MAX_RES_LEN); |
|
|
return OGS_ERROR; |
|
|
} |
|
|
|
|
|
memcpy(amf_ue->xres_star, authentication_response_parameter->res, |
|
|
authentication_response_parameter->length); |
|
|
|
|
|
r = amf_ue_sbi_discover_and_send( |
|
|
OGS_SBI_SERVICE_TYPE_NAUSF_AUTH, NULL, |
|
|
amf_nausf_auth_build_authenticate_confirmation, amf_ue, 0, NULL); |
|
|
ogs_expect(r == OGS_OK); |
|
|
ogs_assert(r != OGS_ERROR); |
|
|
|
|
|
return OGS_OK; |
|
|
} |
|
|
|
|
|
ogs_nas_5gmm_cause_t gmm_handle_identity_response(amf_ue_t *amf_ue, |
|
|
ogs_nas_5gs_identity_response_t *identity_response) |
|
|
{ |
|
|
ran_ue_t *ran_ue = NULL; |
|
|
uint8_t gmm_cause; |
|
|
|
|
|
ogs_nas_5gs_mobile_identity_t *mobile_identity = NULL; |
|
|
ogs_nas_5gs_mobile_identity_suci_t *mobile_identity_suci = NULL; |
|
|
ogs_nas_5gs_mobile_identity_header_t *mobile_identity_header = NULL; |
|
|
|
|
|
ogs_assert(identity_response); |
|
|
|
|
|
ogs_assert(amf_ue); |
|
|
ran_ue = ran_ue_find_by_id(amf_ue->ran_ue_id); |
|
|
ogs_assert(ran_ue); |
|
|
ogs_assert(identity_response); |
|
|
|
|
|
mobile_identity = &identity_response->mobile_identity; |
|
|
|
|
|
if (!mobile_identity->length || !mobile_identity->buffer) { |
|
|
ogs_error("No Mobile Identity"); |
|
|
return OGS_5GMM_CAUSE_SEMANTICALLY_INCORRECT_MESSAGE; |
|
|
} |
|
|
|
|
|
if (mobile_identity->length < OGS_NAS_5GS_MOBILE_IDENTITY_SUCI_MIN_SIZE) { |
|
|
ogs_error("The length of Mobile Identity(%d) is less then the min(%d)", |
|
|
mobile_identity->length, OGS_NAS_5GS_MOBILE_IDENTITY_SUCI_MIN_SIZE); |
|
|
return OGS_5GMM_CAUSE_SEMANTICALLY_INCORRECT_MESSAGE; |
|
|
} |
|
|
|
|
|
mobile_identity_header = |
|
|
(ogs_nas_5gs_mobile_identity_header_t *)mobile_identity->buffer; |
|
|
|
|
|
if (mobile_identity_header->type == OGS_NAS_5GS_MOBILE_IDENTITY_SUCI) { |
|
|
mobile_identity_suci = |
|
|
(ogs_nas_5gs_mobile_identity_suci_t *)mobile_identity->buffer; |
|
|
if (mobile_identity_suci->h.supi_format != |
|
|
OGS_NAS_5GS_SUPI_FORMAT_IMSI) { |
|
|
ogs_error("Not implemented SUPI format [%d]", |
|
|
mobile_identity_suci->h.supi_format); |
|
|
return OGS_ERROR; |
|
|
} |
|
|
if (mobile_identity_suci->protection_scheme_id != |
|
|
OGS_PROTECTION_SCHEME_NULL && |
|
|
mobile_identity_suci->protection_scheme_id != |
|
|
OGS_PROTECTION_SCHEME_PROFILE_A && |
|
|
mobile_identity_suci->protection_scheme_id != |
|
|
OGS_PROTECTION_SCHEME_PROFILE_B) { |
|
|
ogs_error("Invalid ProtectionSchemeID(%d) in SUCI", |
|
|
mobile_identity_suci->protection_scheme_id); |
|
|
return OGS_5GMM_CAUSE_SEMANTICALLY_INCORRECT_MESSAGE; |
|
|
} |
|
|
ogs_nas_to_plmn_id(&amf_ue->home_plmn_id, |
|
|
&mobile_identity_suci->nas_plmn_id); |
|
|
|
|
|
gmm_cause = gmm_cause_from_access_control(&amf_ue->home_plmn_id); |
|
|
if (gmm_cause != OGS_5GMM_CAUSE_REQUEST_ACCEPTED) { |
|
|
ogs_error("Rejected by PLMN-ID access control"); |
|
|
return gmm_cause; |
|
|
} |
|
|
|
|
|
amf_ue_set_suci(amf_ue, mobile_identity); |
|
|
ogs_info("[%s] SUCI", amf_ue->suci); |
|
|
} else { |
|
|
ogs_error("Not supported Identity type[%d]", |
|
|
mobile_identity_header->type); |
|
|
} |
|
|
|
|
|
return OGS_5GMM_CAUSE_REQUEST_ACCEPTED; |
|
|
} |
|
|
|
|
|
ogs_nas_5gmm_cause_t gmm_handle_security_mode_complete(amf_ue_t *amf_ue, |
|
|
ogs_nas_5gs_security_mode_complete_t *security_mode_complete) |
|
|
{ |
|
|
ran_ue_t *ran_ue = NULL; |
|
|
ogs_nas_5gs_mobile_identity_t *imeisv = NULL; |
|
|
ogs_nas_mobile_identity_imeisv_t *mobile_identity_imeisv = NULL; |
|
|
|
|
|
ogs_assert(amf_ue); |
|
|
ran_ue = ran_ue_find_by_id(amf_ue->ran_ue_id); |
|
|
ogs_assert(ran_ue); |
|
|
ogs_assert(security_mode_complete); |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
if ((security_mode_complete->presencemask & |
|
|
OGS_NAS_5GS_SECURITY_MODE_COMPLETE_NAS_MESSAGE_CONTAINER_PRESENT) |
|
|
== 0) { |
|
|
ogs_error("No NAS Message Container in Security mode complete message"); |
|
|
return OGS_5GMM_CAUSE_MESSAGE_NOT_COMPATIBLE_WITH_THE_PROTOCOL_STATE; |
|
|
} |
|
|
|
|
|
if (security_mode_complete->presencemask & |
|
|
OGS_NAS_5GS_SECURITY_MODE_COMPLETE_IMEISV_PRESENT) { |
|
|
|
|
|
imeisv = &security_mode_complete->imeisv; |
|
|
ogs_assert(imeisv); |
|
|
mobile_identity_imeisv = |
|
|
(ogs_nas_mobile_identity_imeisv_t *)imeisv->buffer; |
|
|
ogs_assert(mobile_identity_imeisv); |
|
|
|
|
|
switch (mobile_identity_imeisv->type) { |
|
|
case OGS_NAS_5GS_MOBILE_IDENTITY_IMEISV: |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
if (imeisv->length == sizeof(ogs_nas_mobile_identity_imeisv_t)) { |
|
|
memcpy(&amf_ue->nas_mobile_identity_imeisv, |
|
|
mobile_identity_imeisv, imeisv->length); |
|
|
ogs_nas_imeisv_to_bcd(mobile_identity_imeisv, imeisv->length, |
|
|
amf_ue->imeisv_bcd); |
|
|
ogs_nas_imeisv_bcd_to_buffer(amf_ue->imeisv_bcd, |
|
|
amf_ue->masked_imeisv, &amf_ue->masked_imeisv_len); |
|
|
amf_ue->masked_imeisv[5] = 0xff; |
|
|
amf_ue->masked_imeisv[6] = 0xff; |
|
|
if (amf_ue->pei) |
|
|
ogs_free(amf_ue->pei); |
|
|
amf_ue->pei = ogs_msprintf("imeisv-%s", amf_ue->imeisv_bcd); |
|
|
ogs_assert(amf_ue->pei); |
|
|
} else { |
|
|
ogs_error("[%s] Unknown IMEISV Length [%d]", |
|
|
amf_ue->supi, imeisv->length); |
|
|
ogs_log_hexdump(OGS_LOG_ERROR, imeisv->buffer, imeisv->length); |
|
|
} |
|
|
break; |
|
|
default: |
|
|
ogs_warn("[%s] Invalid IMEISV Type [%d]", |
|
|
amf_ue->supi, mobile_identity_imeisv->type); |
|
|
break; |
|
|
|
|
|
} |
|
|
} |
|
|
|
|
|
if (security_mode_complete->presencemask & |
|
|
OGS_NAS_5GS_SECURITY_MODE_COMPLETE_NAS_MESSAGE_CONTAINER_PRESENT) { |
|
|
|
|
|
return gmm_handle_nas_message_container( |
|
|
ran_ue, amf_ue, OGS_NAS_5GS_SECURITY_MODE_COMPLETE, |
|
|
&security_mode_complete->nas_message_container); |
|
|
} |
|
|
|
|
|
return OGS_5GMM_CAUSE_REQUEST_ACCEPTED; |
|
|
} |
|
|
|
|
|
int gmm_handle_ul_nas_transport(ran_ue_t *ran_ue, amf_ue_t *amf_ue, |
|
|
ogs_nas_5gs_ul_nas_transport_t *ul_nas_transport) |
|
|
{ |
|
|
int r; |
|
|
ogs_slice_data_t *selected_slice = NULL; |
|
|
amf_sess_t *sess = NULL; |
|
|
amf_nsmf_pdusession_sm_context_param_t param; |
|
|
|
|
|
ogs_nas_payload_container_type_t *payload_container_type = NULL; |
|
|
ogs_nas_payload_container_t *payload_container = NULL; |
|
|
ogs_nas_pdu_session_identity_2_t *pdu_session_id = NULL; |
|
|
ogs_nas_s_nssai_t *nas_s_nssai = NULL; |
|
|
ogs_nas_dnn_t *dnn = NULL; |
|
|
ogs_nas_5gsm_header_t *gsm_header = NULL; |
|
|
|
|
|
ogs_assert(amf_ue); |
|
|
ogs_assert(ran_ue); |
|
|
ogs_assert(ul_nas_transport); |
|
|
|
|
|
payload_container_type = &ul_nas_transport->payload_container_type; |
|
|
ogs_assert(payload_container_type); |
|
|
payload_container = &ul_nas_transport->payload_container; |
|
|
ogs_assert(payload_container); |
|
|
|
|
|
if (!payload_container_type->value) { |
|
|
ogs_error("[%s] No Payload container type", amf_ue->supi); |
|
|
r = nas_5gs_send_gmm_status( |
|
|
amf_ue, OGS_5GMM_CAUSE_INVALID_MANDATORY_INFORMATION); |
|
|
ogs_expect(r == OGS_OK); |
|
|
ogs_assert(r != OGS_ERROR); |
|
|
return OGS_ERROR; |
|
|
} |
|
|
|
|
|
if (!payload_container->length) { |
|
|
ogs_error("[%s] No Payload container length", amf_ue->supi); |
|
|
r = nas_5gs_send_gmm_status( |
|
|
amf_ue, OGS_5GMM_CAUSE_INVALID_MANDATORY_INFORMATION); |
|
|
ogs_expect(r == OGS_OK); |
|
|
ogs_assert(r != OGS_ERROR); |
|
|
return OGS_ERROR; |
|
|
} |
|
|
|
|
|
if (!payload_container->buffer) { |
|
|
ogs_error("[%s] No Payload container buffer", amf_ue->supi); |
|
|
r = nas_5gs_send_gmm_status( |
|
|
amf_ue, OGS_5GMM_CAUSE_INVALID_MANDATORY_INFORMATION); |
|
|
ogs_expect(r == OGS_OK); |
|
|
ogs_assert(r != OGS_ERROR); |
|
|
return OGS_ERROR; |
|
|
} |
|
|
|
|
|
if ((ul_nas_transport->presencemask & |
|
|
OGS_NAS_5GS_UL_NAS_TRANSPORT_PDU_SESSION_ID_PRESENT) == 0) { |
|
|
ogs_error("[%s] No PDU session ID", amf_ue->supi); |
|
|
r = nas_5gs_send_gmm_status( |
|
|
amf_ue, OGS_5GMM_CAUSE_INVALID_MANDATORY_INFORMATION); |
|
|
ogs_expect(r == OGS_OK); |
|
|
ogs_assert(r != OGS_ERROR); |
|
|
return OGS_ERROR; |
|
|
} |
|
|
|
|
|
pdu_session_id = &ul_nas_transport->pdu_session_id; |
|
|
if (*pdu_session_id == OGS_NAS_PDU_SESSION_IDENTITY_UNASSIGNED) { |
|
|
ogs_error("[%s] PDU session identity is unassigned", |
|
|
amf_ue->supi); |
|
|
r = nas_5gs_send_gmm_status( |
|
|
amf_ue, OGS_5GMM_CAUSE_INVALID_MANDATORY_INFORMATION); |
|
|
ogs_expect(r == OGS_OK); |
|
|
ogs_assert(r != OGS_ERROR); |
|
|
return OGS_ERROR; |
|
|
} |
|
|
|
|
|
switch (payload_container_type->value) { |
|
|
case OGS_NAS_PAYLOAD_CONTAINER_N1_SM_INFORMATION: |
|
|
gsm_header = (ogs_nas_5gsm_header_t *)payload_container->buffer; |
|
|
ogs_assert(gsm_header); |
|
|
|
|
|
if (gsm_header->message_type == |
|
|
OGS_NAS_5GS_PDU_SESSION_ESTABLISHMENT_REQUEST) { |
|
|
sess = amf_sess_find_by_psi(amf_ue, *pdu_session_id); |
|
|
if (!sess) { |
|
|
sess = amf_sess_add(amf_ue, *pdu_session_id); |
|
|
ogs_assert(sess); |
|
|
} else { |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
sess->pdu_session_resource_release_response_received = false; |
|
|
sess->pdu_session_release_complete_received = false; |
|
|
|
|
|
} |
|
|
} else { |
|
|
sess = amf_sess_find_by_psi(amf_ue, *pdu_session_id); |
|
|
if (!sess) { |
|
|
ogs_error("[%s] No Session Context [%d]", |
|
|
amf_ue->supi, gsm_header->message_type); |
|
|
r = nas_5gs_send_gmm_status(amf_ue, |
|
|
OGS_5GMM_CAUSE_INSUFFICIENT_USER_PLANE_RESOURCES_FOR_THE_PDU_SESSION); |
|
|
ogs_expect(r == OGS_OK); |
|
|
ogs_assert(r != OGS_ERROR); |
|
|
return OGS_ERROR; |
|
|
} |
|
|
} |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
sess->old_gsm_type = sess->current_gsm_type; |
|
|
sess->current_gsm_type = gsm_header->message_type; |
|
|
|
|
|
if (sess->payload_container) |
|
|
ogs_pkbuf_free(sess->payload_container); |
|
|
|
|
|
sess->payload_container_type = payload_container_type->value; |
|
|
sess->payload_container = |
|
|
ogs_pkbuf_alloc(NULL, payload_container->length); |
|
|
ogs_assert(sess->payload_container); |
|
|
ogs_pkbuf_put_data(sess->payload_container, |
|
|
payload_container->buffer, payload_container->length); |
|
|
|
|
|
if (gsm_header->message_type == |
|
|
OGS_NAS_5GS_PDU_SESSION_ESTABLISHMENT_REQUEST) { |
|
|
|
|
|
int i, j, k; |
|
|
|
|
|
nas_s_nssai = &ul_nas_transport->s_nssai; |
|
|
ogs_assert(nas_s_nssai); |
|
|
dnn = &ul_nas_transport->dnn; |
|
|
ogs_assert(dnn); |
|
|
|
|
|
|
|
|
for (i = 0; i < amf_ue->num_of_slice; i++) { |
|
|
if (i >= OGS_MAX_NUM_OF_SLICE) { |
|
|
ogs_warn("Ignore max slice count overflow [%d>=%d]", |
|
|
amf_ue->num_of_slice, OGS_MAX_NUM_OF_SLICE); |
|
|
break; |
|
|
} |
|
|
if (ul_nas_transport->presencemask & |
|
|
OGS_NAS_5GS_UL_NAS_TRANSPORT_S_NSSAI_PRESENT) { |
|
|
ogs_nas_s_nssai_ie_t ie; |
|
|
if (ogs_nas_parse_s_nssai(&ie, nas_s_nssai) != 0) { |
|
|
if (ie.sst == amf_ue->slice[i].s_nssai.sst && |
|
|
ie.sd.v == amf_ue->slice[i].s_nssai.sd.v) { |
|
|
|
|
|
|
|
|
|
|
|
} else { |
|
|
continue; |
|
|
} |
|
|
} |
|
|
} |
|
|
for (j = 0; j < amf_ue->allowed_nssai.num_of_s_nssai; j++) { |
|
|
if (j >= OGS_MAX_NUM_OF_SLICE) { |
|
|
ogs_warn("Ignore max slice count overflow [%d>=%d]", |
|
|
amf_ue->allowed_nssai.num_of_s_nssai, |
|
|
OGS_MAX_NUM_OF_SLICE); |
|
|
break; |
|
|
} |
|
|
if (amf_ue->slice[i].s_nssai.sst == |
|
|
amf_ue->allowed_nssai.s_nssai[j].sst && |
|
|
amf_ue->slice[i].s_nssai.sd.v == |
|
|
amf_ue->allowed_nssai.s_nssai[j].sd.v) { |
|
|
|
|
|
if (ul_nas_transport->presencemask & |
|
|
OGS_NAS_5GS_UL_NAS_TRANSPORT_DNN_PRESENT) { |
|
|
|
|
|
for (k = 0; |
|
|
k < amf_ue->slice[i].num_of_session; k++) { |
|
|
if (k >= OGS_MAX_NUM_OF_SESS) { |
|
|
ogs_warn("Ignore max session " |
|
|
"count overflow [%d>=%d]", |
|
|
amf_ue->slice[i].num_of_session, |
|
|
OGS_MAX_NUM_OF_SESS); |
|
|
break; |
|
|
} |
|
|
if (!ogs_strcasecmp(dnn->value, |
|
|
amf_ue->slice[i].session[k].name)) { |
|
|
|
|
|
selected_slice = amf_ue->slice + i; |
|
|
ogs_assert(selected_slice); |
|
|
|
|
|
if (sess->dnn) |
|
|
ogs_free(sess->dnn); |
|
|
sess->dnn = ogs_strdup(dnn->value); |
|
|
ogs_assert(sess->dnn); |
|
|
|
|
|
} else { |
|
|
continue; |
|
|
} |
|
|
} |
|
|
|
|
|
} else { |
|
|
|
|
|
selected_slice = amf_ue->slice + i; |
|
|
ogs_assert(selected_slice); |
|
|
|
|
|
if (selected_slice->num_of_session) { |
|
|
if (sess->dnn) |
|
|
ogs_free(sess->dnn); |
|
|
sess->dnn = ogs_strdup( |
|
|
selected_slice->session[0].name); |
|
|
ogs_assert(sess->dnn); |
|
|
} |
|
|
} |
|
|
} |
|
|
} |
|
|
} |
|
|
|
|
|
if (!selected_slice || !sess->dnn) { |
|
|
ogs_warn("[%s] DNN Not Supported OR " |
|
|
"Not Subscribed in the Slice", amf_ue->supi); |
|
|
r = nas_5gs_send_gmm_status(amf_ue, |
|
|
OGS_5GMM_CAUSE_DNN_NOT_SUPPORTED_OR_NOT_SUBSCRIBED_IN_THE_SLICE); |
|
|
ogs_expect(r == OGS_OK); |
|
|
ogs_assert(r != OGS_ERROR); |
|
|
return OGS_ERROR; |
|
|
} |
|
|
|
|
|
|
|
|
sess->s_nssai.sst = selected_slice->s_nssai.sst; |
|
|
sess->s_nssai.sd.v = selected_slice->s_nssai.sd.v; |
|
|
|
|
|
ogs_info("UE SUPI[%s] DNN[%s] S_NSSAI[SST:%d SD:0x%x] " |
|
|
"smContextRef[%s] smContextResourceURI[%s]", |
|
|
amf_ue->supi, sess->dnn, sess->s_nssai.sst, sess->s_nssai.sd.v, |
|
|
sess->sm_context.ref ? sess->sm_context.ref : "NULL", |
|
|
sess->sm_context.resource_uri ? |
|
|
sess->sm_context.resource_uri : "NULL"); |
|
|
|
|
|
if (!SESSION_CONTEXT_IN_SMF(sess)) { |
|
|
ogs_sbi_nf_instance_t *nf_instance = NULL; |
|
|
ogs_sbi_service_type_e service_type = |
|
|
OGS_SBI_SERVICE_TYPE_NSMF_PDUSESSION; |
|
|
|
|
|
ogs_sbi_discovery_option_t *discovery_option = NULL; |
|
|
|
|
|
discovery_option = ogs_sbi_discovery_option_new(); |
|
|
ogs_assert(discovery_option); |
|
|
|
|
|
ogs_sbi_discovery_option_add_snssais( |
|
|
discovery_option, &sess->s_nssai); |
|
|
ogs_sbi_discovery_option_set_dnn(discovery_option, sess->dnn); |
|
|
ogs_sbi_discovery_option_set_tai( |
|
|
discovery_option, &amf_ue->nr_tai); |
|
|
|
|
|
nf_instance = OGS_SBI_GET_NF_INSTANCE( |
|
|
sess->sbi.service_type_array[service_type]); |
|
|
if (!nf_instance) { |
|
|
OpenAPI_nf_type_e requester_nf_type = |
|
|
NF_INSTANCE_TYPE(ogs_sbi_self()->nf_instance); |
|
|
ogs_assert(requester_nf_type); |
|
|
|
|
|
amf_sbi_select_nf( |
|
|
&sess->sbi, |
|
|
OGS_SBI_SERVICE_TYPE_NSMF_PDUSESSION, |
|
|
requester_nf_type, |
|
|
discovery_option); |
|
|
nf_instance = OGS_SBI_GET_NF_INSTANCE( |
|
|
sess->sbi.service_type_array[service_type]); |
|
|
|
|
|
if (!nf_instance) |
|
|
ogs_info("No SMF Instance"); |
|
|
else |
|
|
ogs_info("SMF Instance [%s]", nf_instance->id); |
|
|
} else |
|
|
ogs_info("SMF Instance [%s]", nf_instance->id); |
|
|
|
|
|
if (nf_instance) { |
|
|
r = amf_sess_sbi_discover_and_send( |
|
|
OGS_SBI_SERVICE_TYPE_NSMF_PDUSESSION, |
|
|
discovery_option, |
|
|
amf_nsmf_pdusession_build_create_sm_context, |
|
|
ran_ue, sess, AMF_CREATE_SM_CONTEXT_NO_STATE, NULL); |
|
|
ogs_expect(r == OGS_OK); |
|
|
ogs_assert(r != OGS_ERROR); |
|
|
} else { |
|
|
r = amf_sess_sbi_discover_and_send( |
|
|
OGS_SBI_SERVICE_TYPE_NNSSF_NSSELECTION, |
|
|
discovery_option, |
|
|
amf_nnssf_nsselection_build_get, |
|
|
ran_ue, sess, 0, NULL); |
|
|
ogs_expect(r == OGS_OK); |
|
|
ogs_assert(r != OGS_ERROR); |
|
|
} |
|
|
|
|
|
} else { |
|
|
|
|
|
memset(¶m, 0, sizeof(param)); |
|
|
param.release = 1; |
|
|
param.cause = OpenAPI_cause_REL_DUE_TO_DUPLICATE_SESSION_ID; |
|
|
|
|
|
r = amf_sess_sbi_discover_and_send( |
|
|
OGS_SBI_SERVICE_TYPE_NSMF_PDUSESSION, NULL, |
|
|
amf_nsmf_pdusession_build_update_sm_context, |
|
|
ran_ue, sess, |
|
|
AMF_UPDATE_SM_CONTEXT_DUPLICATED_PDU_SESSION_ID, |
|
|
¶m); |
|
|
ogs_expect(r == OGS_OK); |
|
|
ogs_assert(r != OGS_ERROR); |
|
|
} |
|
|
|
|
|
} else { |
|
|
|
|
|
if (!SESSION_CONTEXT_IN_SMF(sess)) { |
|
|
ogs_error("[%s:%d] Session Context is not in SMF [%d]", |
|
|
amf_ue->supi, sess->psi, gsm_header->message_type); |
|
|
r = nas_5gs_send_back_gsm_message(ran_ue, sess, |
|
|
OGS_5GMM_CAUSE_DNN_NOT_SUPPORTED_OR_NOT_SUBSCRIBED_IN_THE_SLICE, 0); |
|
|
ogs_expect(r == OGS_OK); |
|
|
ogs_assert(r != OGS_ERROR); |
|
|
return OGS_ERROR; |
|
|
} |
|
|
|
|
|
memset(¶m, 0, sizeof(param)); |
|
|
param.n1smbuf = sess->payload_container; |
|
|
|
|
|
if (gsm_header->message_type == |
|
|
OGS_NAS_5GS_PDU_SESSION_RELEASE_COMPLETE) { |
|
|
param.ue_location = true; |
|
|
param.ue_timezone = true; |
|
|
|
|
|
r = amf_sess_sbi_discover_and_send( |
|
|
OGS_SBI_SERVICE_TYPE_NSMF_PDUSESSION, NULL, |
|
|
amf_nsmf_pdusession_build_update_sm_context, |
|
|
ran_ue, sess, |
|
|
AMF_UPDATE_SM_CONTEXT_N1_RELEASED, ¶m); |
|
|
ogs_expect(r == OGS_OK); |
|
|
ogs_assert(r != OGS_ERROR); |
|
|
} else { |
|
|
|
|
|
r = amf_sess_sbi_discover_and_send( |
|
|
OGS_SBI_SERVICE_TYPE_NSMF_PDUSESSION, NULL, |
|
|
amf_nsmf_pdusession_build_update_sm_context, |
|
|
ran_ue, sess, AMF_UPDATE_SM_CONTEXT_MODIFIED, ¶m); |
|
|
ogs_expect(r == OGS_OK); |
|
|
ogs_assert(r != OGS_ERROR); |
|
|
} |
|
|
|
|
|
switch (gsm_header->message_type) { |
|
|
case OGS_NAS_5GS_PDU_SESSION_MODIFICATION_COMPLETE: |
|
|
case OGS_NAS_5GS_PDU_SESSION_MODIFICATION_COMMAND_REJECT: |
|
|
if (PAGING_ONGOING(amf_ue) == true) { |
|
|
|
|
|
gmm_configuration_update_command_param_t param; |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
amf_ue_new_guti(amf_ue); |
|
|
|
|
|
memset(¶m, 0, sizeof(param)); |
|
|
param.acknowledgement_requested = 1; |
|
|
param.guti = 1; |
|
|
r = nas_5gs_send_configuration_update_command( |
|
|
amf_ue, ¶m); |
|
|
ogs_expect(r == OGS_OK); |
|
|
ogs_assert(r != OGS_ERROR); |
|
|
|
|
|
AMF_UE_CLEAR_PAGING_INFO(amf_ue); |
|
|
} |
|
|
break; |
|
|
case OGS_NAS_5GS_PDU_SESSION_RELEASE_COMPLETE: |
|
|
sess->pdu_session_release_complete_received = true; |
|
|
if (sess->pdu_session_resource_release_response_received == |
|
|
true) |
|
|
CLEAR_SESSION_CONTEXT(sess); |
|
|
break; |
|
|
default: |
|
|
break; |
|
|
} |
|
|
} |
|
|
break; |
|
|
|
|
|
default: |
|
|
ogs_error("[%s] Unknown Payload container type [%d]", |
|
|
amf_ue->supi, payload_container_type->value); |
|
|
r = nas_5gs_send_gmm_status(amf_ue, |
|
|
OGS_5GMM_CAUSE_MESSAGE_TYPE_NON_EXISTENT_OR_NOT_IMPLEMENTED); |
|
|
ogs_expect(r == OGS_OK); |
|
|
ogs_assert(r != OGS_ERROR); |
|
|
return OGS_ERROR; |
|
|
} |
|
|
|
|
|
return OGS_OK; |
|
|
} |
|
|
|
|
|
static ogs_nas_5gmm_cause_t gmm_handle_nas_message_container( |
|
|
ran_ue_t *ran_ue, amf_ue_t *amf_ue, uint8_t message_type, |
|
|
ogs_nas_message_container_t *nas_message_container) |
|
|
{ |
|
|
int gmm_cause; |
|
|
|
|
|
ogs_pkbuf_t *nasbuf = NULL; |
|
|
ogs_nas_5gs_message_t nas_message; |
|
|
|
|
|
ogs_assert(amf_ue); |
|
|
ogs_assert(ran_ue); |
|
|
ogs_assert(nas_message_container); |
|
|
|
|
|
if (!nas_message_container->buffer || !nas_message_container->length) { |
|
|
ogs_error("No NAS message container [%p:%d]", |
|
|
nas_message_container->buffer,nas_message_container->length); |
|
|
return OGS_5GMM_CAUSE_MESSAGE_NOT_COMPATIBLE_WITH_THE_PROTOCOL_STATE; |
|
|
} |
|
|
|
|
|
nasbuf = ogs_pkbuf_alloc(NULL, nas_message_container->length); |
|
|
ogs_assert(nasbuf); |
|
|
ogs_pkbuf_put_data(nasbuf, |
|
|
nas_message_container->buffer, nas_message_container->length); |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
switch (message_type) { |
|
|
case OGS_NAS_5GS_REGISTRATION_REQUEST: |
|
|
case OGS_NAS_5GS_SERVICE_REQUEST: |
|
|
switch (amf_ue->selected_enc_algorithm) { |
|
|
case OGS_NAS_SECURITY_ALGORITHMS_128_NEA1: |
|
|
case OGS_NAS_SECURITY_ALGORITHMS_128_NEA2: |
|
|
case OGS_NAS_SECURITY_ALGORITHMS_128_NEA3: |
|
|
ogs_nas_encrypt(amf_ue->selected_enc_algorithm, |
|
|
amf_ue->knas_enc, amf_ue->ul_count.i32, |
|
|
amf_ue->nas.access_type, |
|
|
OGS_NAS_SECURITY_UPLINK_DIRECTION, nasbuf); |
|
|
default: |
|
|
break; |
|
|
} |
|
|
default: |
|
|
break; |
|
|
} |
|
|
|
|
|
if (ogs_nas_5gmm_decode(&nas_message, nasbuf) != OGS_OK) { |
|
|
ogs_error("ogs_nas_5gmm_decode() failed"); |
|
|
ogs_pkbuf_free(nasbuf); |
|
|
return OGS_5GMM_CAUSE_SEMANTICALLY_INCORRECT_MESSAGE; |
|
|
} |
|
|
|
|
|
gmm_cause = OGS_5GMM_CAUSE_SEMANTICALLY_INCORRECT_MESSAGE; |
|
|
|
|
|
switch (nas_message.gmm.h.message_type) { |
|
|
case OGS_NAS_5GS_REGISTRATION_REQUEST: |
|
|
ogs_debug("Registration request in NAS message container"); |
|
|
gmm_cause = gmm_handle_registration_update( |
|
|
ran_ue, amf_ue, &nas_message.gmm.registration_request); |
|
|
break; |
|
|
case OGS_NAS_5GS_SERVICE_REQUEST: |
|
|
ogs_debug("Service request in NAS message container"); |
|
|
gmm_cause = gmm_handle_service_update( |
|
|
ran_ue, amf_ue, &nas_message.gmm.service_request); |
|
|
break; |
|
|
default: |
|
|
ogs_error("Unknown message [%d]", nas_message.gmm.h.message_type); |
|
|
} |
|
|
|
|
|
ogs_pkbuf_free(nasbuf); |
|
|
return gmm_cause; |
|
|
} |
|
|
|
|
|
static uint8_t gmm_cause_from_access_control(ogs_plmn_id_t *plmn_id) |
|
|
{ |
|
|
int i; |
|
|
|
|
|
ogs_assert(plmn_id); |
|
|
|
|
|
|
|
|
if (amf_self()->num_of_access_control == 0) |
|
|
return OGS_5GMM_CAUSE_REQUEST_ACCEPTED; |
|
|
|
|
|
for (i = 0; i < amf_self()->num_of_access_control; i++) { |
|
|
if (memcmp(&amf_self()->access_control[i].plmn_id, |
|
|
plmn_id, OGS_PLMN_ID_LEN) == 0) { |
|
|
if (amf_self()->access_control[i].reject_cause) |
|
|
return amf_self()->access_control[i].reject_cause; |
|
|
else |
|
|
return OGS_5GMM_CAUSE_REQUEST_ACCEPTED; |
|
|
} |
|
|
} |
|
|
|
|
|
if (amf_self()->default_reject_cause) |
|
|
return amf_self()->default_reject_cause; |
|
|
|
|
|
return OGS_5GMM_CAUSE_PLMN_NOT_ALLOWED; |
|
|
} |
|
|
|