|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
#include "ogs-s1ap.h" |
|
|
#include "ogs-crypt.h" |
|
|
#include "core/abts.h" |
|
|
|
|
|
static void test1_func(abts_case *tc, void *data) |
|
|
{ |
|
|
int rv; |
|
|
|
|
|
ogs_pkbuf_t *s1apbuf = NULL; |
|
|
|
|
|
S1AP_S1AP_PDU_t pdu; |
|
|
S1AP_InitiatingMessage_t *initiatingMessage = NULL; |
|
|
S1AP_InitialContextSetupRequest_t *InitialContextSetupRequest = NULL; |
|
|
|
|
|
S1AP_InitialContextSetupRequestIEs_t *ie = NULL; |
|
|
S1AP_MME_UE_S1AP_ID_t *MME_UE_S1AP_ID = NULL; |
|
|
S1AP_ENB_UE_S1AP_ID_t *ENB_UE_S1AP_ID = NULL; |
|
|
S1AP_UEAggregateMaximumBitrate_t *UEAggregateMaximumBitrate = NULL; |
|
|
S1AP_E_RABToBeSetupListCtxtSUReq_t *E_RABToBeSetupListCtxtSUReq = NULL; |
|
|
S1AP_UESecurityCapabilities_t *UESecurityCapabilities = NULL; |
|
|
S1AP_SecurityKey_t *SecurityKey = NULL; |
|
|
|
|
|
memset(&pdu, 0, sizeof (S1AP_S1AP_PDU_t)); |
|
|
pdu.present = S1AP_S1AP_PDU_PR_initiatingMessage; |
|
|
pdu.choice.initiatingMessage = |
|
|
CALLOC(1, sizeof(S1AP_InitiatingMessage_t)); |
|
|
|
|
|
initiatingMessage = pdu.choice.initiatingMessage; |
|
|
initiatingMessage->procedureCode = |
|
|
S1AP_ProcedureCode_id_InitialContextSetup; |
|
|
initiatingMessage->criticality = S1AP_Criticality_reject; |
|
|
initiatingMessage->value.present = |
|
|
S1AP_InitiatingMessage__value_PR_InitialContextSetupRequest; |
|
|
|
|
|
InitialContextSetupRequest = |
|
|
&initiatingMessage->value.choice.InitialContextSetupRequest; |
|
|
|
|
|
ie = CALLOC(1, sizeof(S1AP_InitialContextSetupRequestIEs_t)); |
|
|
ASN_SEQUENCE_ADD(&InitialContextSetupRequest->protocolIEs, ie); |
|
|
|
|
|
ie->id = S1AP_ProtocolIE_ID_id_MME_UE_S1AP_ID; |
|
|
ie->criticality = S1AP_Criticality_reject; |
|
|
ie->value.present = |
|
|
S1AP_InitialContextSetupRequestIEs__value_PR_MME_UE_S1AP_ID; |
|
|
|
|
|
MME_UE_S1AP_ID = &ie->value.choice.MME_UE_S1AP_ID; |
|
|
|
|
|
ie = CALLOC(1, sizeof(S1AP_InitialContextSetupRequestIEs_t)); |
|
|
ASN_SEQUENCE_ADD(&InitialContextSetupRequest->protocolIEs, ie); |
|
|
|
|
|
ie->id = S1AP_ProtocolIE_ID_id_eNB_UE_S1AP_ID; |
|
|
ie->criticality = S1AP_Criticality_reject; |
|
|
ie->value.present = |
|
|
S1AP_InitialContextSetupRequestIEs__value_PR_ENB_UE_S1AP_ID; |
|
|
|
|
|
ENB_UE_S1AP_ID = &ie->value.choice.ENB_UE_S1AP_ID; |
|
|
|
|
|
ie = CALLOC(1, sizeof(S1AP_InitialContextSetupRequestIEs_t)); |
|
|
ASN_SEQUENCE_ADD(&InitialContextSetupRequest->protocolIEs, ie); |
|
|
|
|
|
ie->id = S1AP_ProtocolIE_ID_id_uEaggregateMaximumBitrate; |
|
|
ie->criticality = S1AP_Criticality_reject; |
|
|
ie->value.present = |
|
|
S1AP_InitialContextSetupRequestIEs__value_PR_UEAggregateMaximumBitrate; |
|
|
|
|
|
UEAggregateMaximumBitrate = &ie->value.choice.UEAggregateMaximumBitrate; |
|
|
|
|
|
ie = CALLOC(1, sizeof(S1AP_InitialContextSetupRequestIEs_t)); |
|
|
ASN_SEQUENCE_ADD(&InitialContextSetupRequest->protocolIEs, ie); |
|
|
|
|
|
ie->id = S1AP_ProtocolIE_ID_id_E_RABToBeSetupListCtxtSUReq; |
|
|
ie->criticality = S1AP_Criticality_reject; |
|
|
ie->value.present = |
|
|
S1AP_InitialContextSetupRequestIEs__value_PR_E_RABToBeSetupListCtxtSUReq; |
|
|
|
|
|
E_RABToBeSetupListCtxtSUReq = &ie->value.choice.E_RABToBeSetupListCtxtSUReq; |
|
|
|
|
|
*MME_UE_S1AP_ID = 1; |
|
|
*ENB_UE_S1AP_ID = 1; |
|
|
|
|
|
asn_uint642INTEGER( |
|
|
&UEAggregateMaximumBitrate->uEaggregateMaximumBitRateUL, 1); |
|
|
asn_uint642INTEGER( |
|
|
&UEAggregateMaximumBitrate->uEaggregateMaximumBitRateDL, 1); |
|
|
|
|
|
{ |
|
|
S1AP_E_RABToBeSetupItemCtxtSUReqIEs_t *item = NULL; |
|
|
S1AP_E_RABToBeSetupItemCtxtSUReq_t *e_rab = NULL; |
|
|
S1AP_GBR_QosInformation_t *gbrQosInformation = NULL; |
|
|
S1AP_NAS_PDU_t *nasPdu = NULL; |
|
|
ogs_ip_t sgw_s1u_ip; |
|
|
uint32_t sgw_s1u_teid = 1; |
|
|
|
|
|
item = CALLOC( |
|
|
1, sizeof(S1AP_E_RABToBeSetupItemCtxtSUReqIEs_t)); |
|
|
ASN_SEQUENCE_ADD(&E_RABToBeSetupListCtxtSUReq->list, item); |
|
|
|
|
|
item->id = S1AP_ProtocolIE_ID_id_E_RABToBeSetupItemCtxtSUReq; |
|
|
item->criticality = S1AP_Criticality_reject; |
|
|
item->value.present = S1AP_E_RABToBeSetupItemCtxtSUReqIEs__value_PR_E_RABToBeSetupItemCtxtSUReq; |
|
|
|
|
|
e_rab = &item->value.choice.E_RABToBeSetupItemCtxtSUReq; |
|
|
|
|
|
e_rab->e_RAB_ID = 5; |
|
|
e_rab->e_RABlevelQoSParameters.qCI = 1; |
|
|
|
|
|
e_rab->e_RABlevelQoSParameters.allocationRetentionPriority. |
|
|
priorityLevel = 10; |
|
|
e_rab->e_RABlevelQoSParameters.allocationRetentionPriority. |
|
|
pre_emptionCapability = 1; |
|
|
e_rab->e_RABlevelQoSParameters.allocationRetentionPriority. |
|
|
pre_emptionVulnerability = 1; |
|
|
|
|
|
gbrQosInformation = |
|
|
CALLOC(1, sizeof(struct S1AP_GBR_QosInformation)); |
|
|
asn_uint642INTEGER(&gbrQosInformation->e_RAB_MaximumBitrateDL, 1); |
|
|
asn_uint642INTEGER(&gbrQosInformation->e_RAB_MaximumBitrateUL, 1); |
|
|
asn_uint642INTEGER(&gbrQosInformation->e_RAB_GuaranteedBitrateDL, 1); |
|
|
asn_uint642INTEGER(&gbrQosInformation->e_RAB_GuaranteedBitrateUL, 1); |
|
|
e_rab->e_RABlevelQoSParameters.gbrQosInformation = |
|
|
gbrQosInformation; |
|
|
|
|
|
memset(&sgw_s1u_ip, 0, sizeof(sgw_s1u_ip)); |
|
|
sgw_s1u_ip.ipv4 = 1; |
|
|
sgw_s1u_ip.ipv6 = 0; |
|
|
rv = ogs_asn_ip_to_BIT_STRING( |
|
|
&sgw_s1u_ip, &e_rab->transportLayerAddress); |
|
|
ogs_asn_uint32_to_OCTET_STRING(sgw_s1u_teid, &e_rab->gTP_TEID); |
|
|
} |
|
|
|
|
|
ie = CALLOC(1, sizeof(S1AP_InitialContextSetupRequestIEs_t)); |
|
|
ASN_SEQUENCE_ADD(&InitialContextSetupRequest->protocolIEs, ie); |
|
|
|
|
|
ie->id = S1AP_ProtocolIE_ID_id_UESecurityCapabilities; |
|
|
ie->criticality = S1AP_Criticality_reject; |
|
|
ie->value.present = |
|
|
S1AP_InitialContextSetupRequestIEs__value_PR_UESecurityCapabilities; |
|
|
|
|
|
UESecurityCapabilities = &ie->value.choice.UESecurityCapabilities; |
|
|
|
|
|
UESecurityCapabilities->encryptionAlgorithms.size = 2; |
|
|
UESecurityCapabilities->encryptionAlgorithms.buf = |
|
|
CALLOC(UESecurityCapabilities->encryptionAlgorithms.size, |
|
|
sizeof(uint8_t)); |
|
|
UESecurityCapabilities->encryptionAlgorithms.bits_unused = 0; |
|
|
|
|
|
UESecurityCapabilities->integrityProtectionAlgorithms.size = 2; |
|
|
UESecurityCapabilities->integrityProtectionAlgorithms.buf = |
|
|
CALLOC(UESecurityCapabilities-> |
|
|
integrityProtectionAlgorithms.size, sizeof(uint8_t)); |
|
|
UESecurityCapabilities->integrityProtectionAlgorithms.bits_unused = 0; |
|
|
|
|
|
ie = CALLOC(1, sizeof(S1AP_InitialContextSetupRequestIEs_t)); |
|
|
ASN_SEQUENCE_ADD(&InitialContextSetupRequest->protocolIEs, ie); |
|
|
|
|
|
ie->id = S1AP_ProtocolIE_ID_id_SecurityKey; |
|
|
ie->criticality = S1AP_Criticality_reject; |
|
|
ie->value.present = |
|
|
S1AP_InitialContextSetupRequestIEs__value_PR_SecurityKey; |
|
|
|
|
|
SecurityKey = &ie->value.choice.SecurityKey; |
|
|
|
|
|
SecurityKey->size = OGS_SHA256_DIGEST_SIZE; |
|
|
SecurityKey->buf = |
|
|
CALLOC(SecurityKey->size, sizeof(uint8_t)); |
|
|
SecurityKey->bits_unused = 0; |
|
|
|
|
|
|
|
|
{ |
|
|
S1AP_CSFallbackIndicator_t *CSFallbackIndicator = NULL; |
|
|
S1AP_LAI_t *LAI = NULL; |
|
|
ogs_plmn_id_t plmn_id; |
|
|
uint16_t lac = 1; |
|
|
|
|
|
ie = CALLOC(1, sizeof(S1AP_InitialContextSetupRequestIEs_t)); |
|
|
ASN_SEQUENCE_ADD(&InitialContextSetupRequest->protocolIEs, ie); |
|
|
|
|
|
ie->id = S1AP_ProtocolIE_ID_id_CSFallbackIndicator; |
|
|
ie->criticality = S1AP_Criticality_reject; |
|
|
ie->value.present = |
|
|
S1AP_InitialContextSetupRequestIEs__value_PR_CSFallbackIndicator; |
|
|
|
|
|
CSFallbackIndicator = &ie->value.choice.CSFallbackIndicator; |
|
|
ogs_assert(CSFallbackIndicator); |
|
|
|
|
|
*CSFallbackIndicator = S1AP_CSFallbackIndicator_cs_fallback_required; |
|
|
|
|
|
ie = CALLOC(1, sizeof(S1AP_InitialContextSetupRequestIEs_t)); |
|
|
ASN_SEQUENCE_ADD(&InitialContextSetupRequest->protocolIEs, ie); |
|
|
|
|
|
ie->id = S1AP_ProtocolIE_ID_id_RegisteredLAI; |
|
|
ie->criticality = S1AP_Criticality_ignore; |
|
|
ie->value.present = |
|
|
S1AP_InitialContextSetupRequestIEs__value_PR_LAI; |
|
|
|
|
|
LAI = &ie->value.choice.LAI; |
|
|
ogs_assert(LAI); |
|
|
|
|
|
ogs_s1ap_buffer_to_OCTET_STRING(&plmn_id, sizeof(ogs_plmn_id_t), |
|
|
&LAI->pLMNidentity); |
|
|
ogs_asn_uint16_to_OCTET_STRING(lac, &LAI->lAC); |
|
|
|
|
|
} |
|
|
|
|
|
{ |
|
|
char buf[1024]; |
|
|
int size = 540; |
|
|
|
|
|
S1AP_UERadioCapability_t *UERadioCapability = NULL; |
|
|
|
|
|
ie = CALLOC(1, sizeof(S1AP_InitialContextSetupRequestIEs_t)); |
|
|
ASN_SEQUENCE_ADD(&InitialContextSetupRequest->protocolIEs, ie); |
|
|
|
|
|
ie->id = S1AP_ProtocolIE_ID_id_UERadioCapability; |
|
|
ie->criticality = S1AP_Criticality_ignore; |
|
|
ie->value.present = |
|
|
S1AP_InitialContextSetupRequestIEs__value_PR_UERadioCapability; |
|
|
|
|
|
UERadioCapability = &ie->value.choice.UERadioCapability; |
|
|
|
|
|
ogs_s1ap_buffer_to_OCTET_STRING(buf, size, UERadioCapability); |
|
|
} |
|
|
|
|
|
s1apbuf = ogs_s1ap_encode(&pdu); |
|
|
ogs_pkbuf_free(s1apbuf); |
|
|
|
|
|
ABTS_INT_EQUAL(tc, OGS_OK, rv); |
|
|
} |
|
|
|
|
|
static int test_build_mme_configuration_transfer( |
|
|
S1AP_SONConfigurationTransfer_t *son_configuration_transfer) |
|
|
{ |
|
|
int rv; |
|
|
ogs_pkbuf_t *s1apbuf; |
|
|
|
|
|
S1AP_S1AP_PDU_t pdu; |
|
|
S1AP_InitiatingMessage_t *initiatingMessage = NULL; |
|
|
S1AP_MMEConfigurationTransfer_t *MMEConfigurationTransfer = NULL; |
|
|
|
|
|
S1AP_MMEConfigurationTransferIEs_t *ie = NULL; |
|
|
S1AP_SONConfigurationTransfer_t *SONConfigurationTransfer = NULL; |
|
|
|
|
|
ogs_assert(son_configuration_transfer); |
|
|
|
|
|
memset(&pdu, 0, sizeof (S1AP_S1AP_PDU_t)); |
|
|
pdu.present = S1AP_S1AP_PDU_PR_initiatingMessage; |
|
|
pdu.choice.initiatingMessage = |
|
|
CALLOC(1, sizeof(S1AP_InitiatingMessage_t)); |
|
|
|
|
|
initiatingMessage = pdu.choice.initiatingMessage; |
|
|
initiatingMessage->procedureCode = |
|
|
S1AP_ProcedureCode_id_MMEConfigurationTransfer; |
|
|
initiatingMessage->criticality = S1AP_Criticality_ignore; |
|
|
initiatingMessage->value.present = |
|
|
S1AP_InitiatingMessage__value_PR_MMEConfigurationTransfer; |
|
|
|
|
|
MMEConfigurationTransfer = |
|
|
&initiatingMessage->value.choice.MMEConfigurationTransfer; |
|
|
|
|
|
ie = CALLOC(1, sizeof(S1AP_MMEConfigurationTransferIEs_t)); |
|
|
ASN_SEQUENCE_ADD(&MMEConfigurationTransfer->protocolIEs, ie); |
|
|
|
|
|
ie->id = S1AP_ProtocolIE_ID_id_SONConfigurationTransferMCT; |
|
|
ie->criticality = S1AP_Criticality_ignore; |
|
|
ie->value.present = |
|
|
S1AP_MMEConfigurationTransferIEs__value_PR_SONConfigurationTransfer; |
|
|
|
|
|
SONConfigurationTransfer = &ie->value.choice.SONConfigurationTransfer; |
|
|
|
|
|
rv = ogs_asn_copy_ie(&asn_DEF_S1AP_SONConfigurationTransfer, |
|
|
son_configuration_transfer, SONConfigurationTransfer); |
|
|
ogs_assert(rv == OGS_OK); |
|
|
|
|
|
s1apbuf = ogs_s1ap_encode(&pdu); |
|
|
ogs_pkbuf_free(s1apbuf); |
|
|
|
|
|
return OGS_OK; |
|
|
} |
|
|
|
|
|
static void test_parse_enb_configuration_transfer( |
|
|
ogs_s1ap_message_t *message) |
|
|
{ |
|
|
int rv; |
|
|
char buf[OGS_ADDRSTRLEN]; |
|
|
int i; |
|
|
|
|
|
S1AP_InitiatingMessage_t *initiatingMessage = NULL; |
|
|
S1AP_ENBConfigurationTransfer_t *ENBConfigurationTransfer = NULL; |
|
|
|
|
|
S1AP_ENBConfigurationTransferIEs_t *ie = NULL; |
|
|
S1AP_SONConfigurationTransfer_t *SONConfigurationTransfer = NULL; |
|
|
|
|
|
ogs_assert(message); |
|
|
initiatingMessage = message->choice.initiatingMessage; |
|
|
ogs_assert(initiatingMessage); |
|
|
ENBConfigurationTransfer = |
|
|
&initiatingMessage->value.choice.ENBConfigurationTransfer; |
|
|
ogs_assert(ENBConfigurationTransfer); |
|
|
|
|
|
for (i = 0; i < ENBConfigurationTransfer->protocolIEs.list.count; i++) { |
|
|
ie = ENBConfigurationTransfer->protocolIEs.list.array[i]; |
|
|
switch (ie->id) { |
|
|
case S1AP_ProtocolIE_ID_id_SONConfigurationTransferECT: |
|
|
SONConfigurationTransfer = |
|
|
&ie->value.choice.SONConfigurationTransfer; |
|
|
break; |
|
|
default: |
|
|
break; |
|
|
} |
|
|
} |
|
|
|
|
|
if (SONConfigurationTransfer) { |
|
|
test_build_mme_configuration_transfer(SONConfigurationTransfer); |
|
|
} |
|
|
} |
|
|
|
|
|
static void test2_func(abts_case *tc, void *data) |
|
|
{ |
|
|
const char *payload = |
|
|
"0028" |
|
|
"4022000001008140 1b0009f124000000 1009f12458ac0009 f1240000002009f1" |
|
|
"2458ac00"; |
|
|
|
|
|
ogs_s1ap_message_t message; |
|
|
ogs_pkbuf_t *enb_pkbuf; |
|
|
int result; |
|
|
char hexbuf[OGS_HUGE_LEN]; |
|
|
|
|
|
enb_pkbuf = ogs_pkbuf_alloc(NULL, OGS_MAX_SDU_LEN); |
|
|
ogs_assert(enb_pkbuf); |
|
|
ogs_pkbuf_put_data(enb_pkbuf, |
|
|
ogs_hex_from_string(payload, hexbuf, sizeof(hexbuf)), 38); |
|
|
|
|
|
result = ogs_s1ap_decode(&message, enb_pkbuf); |
|
|
ABTS_INT_EQUAL(tc, 0, result); |
|
|
|
|
|
test_parse_enb_configuration_transfer(&message); |
|
|
ogs_s1ap_free(&message); |
|
|
|
|
|
ogs_pkbuf_free(enb_pkbuf); |
|
|
} |
|
|
|
|
|
static void test3_func(abts_case *tc, void *data) |
|
|
{ |
|
|
const char *payload = |
|
|
"0028" |
|
|
"4028000001008140 210009f124000000 2009f12458ac0009 f1240000001009f1" |
|
|
"2458ac500f80c0a8 683b"; |
|
|
|
|
|
S1AP_SONConfigurationTransfer_t SONConfigurationTransfer; |
|
|
ogs_s1ap_message_t message; |
|
|
ogs_pkbuf_t *enb_pkbuf; |
|
|
int result; |
|
|
char hexbuf[OGS_HUGE_LEN]; |
|
|
|
|
|
enb_pkbuf = ogs_pkbuf_alloc(NULL, OGS_MAX_SDU_LEN); |
|
|
ogs_assert(enb_pkbuf); |
|
|
ogs_pkbuf_put_data(enb_pkbuf, |
|
|
ogs_hex_from_string(payload, hexbuf, sizeof(hexbuf)), 44); |
|
|
|
|
|
result = ogs_s1ap_decode(&message, enb_pkbuf); |
|
|
ABTS_INT_EQUAL(tc, 0, result); |
|
|
|
|
|
test_parse_enb_configuration_transfer(&message); |
|
|
ogs_s1ap_free(&message); |
|
|
|
|
|
ogs_pkbuf_free(enb_pkbuf); |
|
|
} |
|
|
|
|
|
static void test4_func(abts_case *tc, void *data) |
|
|
{ |
|
|
const char *payload = |
|
|
"000d" |
|
|
"4037000005000000 0200640008000200 01001a000e0d277a 6f1f5b0107430003" |
|
|
"5200c20064400800 32f5400020001000 4340060032f54000 01"; |
|
|
|
|
|
ogs_s1ap_message_t message; |
|
|
ogs_pkbuf_t *enb_pkbuf; |
|
|
int result; |
|
|
char hexbuf[OGS_HUGE_LEN]; |
|
|
|
|
|
enb_pkbuf = ogs_pkbuf_alloc(NULL, OGS_MAX_SDU_LEN); |
|
|
ogs_assert(enb_pkbuf); |
|
|
ogs_pkbuf_put_data(enb_pkbuf, |
|
|
ogs_hex_from_string(payload, hexbuf, sizeof(hexbuf)), 59); |
|
|
|
|
|
result = ogs_s1ap_decode(&message, enb_pkbuf); |
|
|
ABTS_INT_EQUAL(tc, 0, result); |
|
|
|
|
|
ogs_s1ap_free(&message); |
|
|
ogs_pkbuf_free(enb_pkbuf); |
|
|
} |
|
|
|
|
|
static void test5_func(abts_case *tc, void *data) |
|
|
{ |
|
|
const char *payload = |
|
|
"000d404400000600 0000020001000800 020001001a000e0d 2728e58e6d010743" |
|
|
"00035200c2006440 080009f107000200 10004340060009f1 0700010120400900" |
|
|
"09f1070012345020"; |
|
|
|
|
|
ogs_s1ap_message_t message; |
|
|
ogs_pkbuf_t *enb_pkbuf; |
|
|
int result; |
|
|
char hexbuf[OGS_HUGE_LEN]; |
|
|
|
|
|
enb_pkbuf = ogs_pkbuf_alloc(NULL, OGS_MAX_SDU_LEN); |
|
|
ogs_assert(enb_pkbuf); |
|
|
ogs_pkbuf_put_data(enb_pkbuf, |
|
|
ogs_hex_from_string(payload, hexbuf, sizeof(hexbuf)), 72); |
|
|
|
|
|
result = ogs_s1ap_decode(&message, enb_pkbuf); |
|
|
ABTS_INT_EQUAL(tc, 0, result); |
|
|
|
|
|
ogs_s1ap_free(&message); |
|
|
ogs_pkbuf_free(enb_pkbuf); |
|
|
} |
|
|
|
|
|
static ogs_pkbuf_t *test_build_uplink_nas_transport( |
|
|
uint32_t mme_ue_s1ap_id, uint32_t enb_ue_s1ap_id, ogs_pkbuf_t *emmbuf) |
|
|
{ |
|
|
ogs_pkbuf_t *s1apbuf = NULL; |
|
|
|
|
|
S1AP_S1AP_PDU_t pdu; |
|
|
S1AP_InitiatingMessage_t *initiatingMessage = NULL; |
|
|
S1AP_UplinkNASTransport_t *UplinkNASTransport = NULL; |
|
|
|
|
|
S1AP_UplinkNASTransport_IEs_t *ie = NULL; |
|
|
S1AP_MME_UE_S1AP_ID_t *MME_UE_S1AP_ID = NULL; |
|
|
S1AP_ENB_UE_S1AP_ID_t *ENB_UE_S1AP_ID = NULL; |
|
|
S1AP_NAS_PDU_t *NAS_PDU = NULL; |
|
|
S1AP_EUTRAN_CGI_t *EUTRAN_CGI = NULL; |
|
|
S1AP_TAI_t *TAI = NULL; |
|
|
S1AP_PSCellInformation_t *PSCellInformation = NULL; |
|
|
S1AP_NR_CGI_t *nCGI = NULL; |
|
|
|
|
|
ogs_plmn_id_t plmn_id; |
|
|
uint32_t e_cell_id; |
|
|
uint64_t nr_cell_id; |
|
|
uint16_t tac; |
|
|
|
|
|
ogs_assert(emmbuf); |
|
|
|
|
|
memset(&pdu, 0, sizeof (S1AP_S1AP_PDU_t)); |
|
|
pdu.present = S1AP_S1AP_PDU_PR_initiatingMessage; |
|
|
pdu.choice.initiatingMessage = |
|
|
CALLOC(1, sizeof(S1AP_InitiatingMessage_t)); |
|
|
|
|
|
initiatingMessage = pdu.choice.initiatingMessage; |
|
|
initiatingMessage->procedureCode = |
|
|
S1AP_ProcedureCode_id_uplinkNASTransport; |
|
|
initiatingMessage->criticality = S1AP_Criticality_ignore; |
|
|
initiatingMessage->value.present = |
|
|
S1AP_InitiatingMessage__value_PR_UplinkNASTransport; |
|
|
|
|
|
UplinkNASTransport = &initiatingMessage->value.choice.UplinkNASTransport; |
|
|
|
|
|
ie = CALLOC(1, sizeof(S1AP_UplinkNASTransport_IEs_t)); |
|
|
ASN_SEQUENCE_ADD(&UplinkNASTransport->protocolIEs, ie); |
|
|
|
|
|
ie->id = S1AP_ProtocolIE_ID_id_MME_UE_S1AP_ID; |
|
|
ie->criticality = S1AP_Criticality_reject; |
|
|
ie->value.present = |
|
|
S1AP_UplinkNASTransport_IEs__value_PR_MME_UE_S1AP_ID; |
|
|
|
|
|
MME_UE_S1AP_ID = &ie->value.choice.MME_UE_S1AP_ID; |
|
|
|
|
|
ie = CALLOC(1, sizeof(S1AP_UplinkNASTransport_IEs_t)); |
|
|
ASN_SEQUENCE_ADD(&UplinkNASTransport->protocolIEs, ie); |
|
|
|
|
|
ie->id = S1AP_ProtocolIE_ID_id_eNB_UE_S1AP_ID; |
|
|
ie->criticality = S1AP_Criticality_reject; |
|
|
ie->value.present = |
|
|
S1AP_UplinkNASTransport_IEs__value_PR_ENB_UE_S1AP_ID; |
|
|
|
|
|
ENB_UE_S1AP_ID = &ie->value.choice.ENB_UE_S1AP_ID; |
|
|
|
|
|
ie = CALLOC(1, sizeof(S1AP_UplinkNASTransport_IEs_t)); |
|
|
ASN_SEQUENCE_ADD(&UplinkNASTransport->protocolIEs, ie); |
|
|
|
|
|
ie->id = S1AP_ProtocolIE_ID_id_NAS_PDU; |
|
|
ie->criticality = S1AP_Criticality_reject; |
|
|
ie->value.present = S1AP_UplinkNASTransport_IEs__value_PR_NAS_PDU; |
|
|
|
|
|
NAS_PDU = &ie->value.choice.NAS_PDU; |
|
|
|
|
|
NAS_PDU->size = emmbuf->len; |
|
|
NAS_PDU->buf = CALLOC(NAS_PDU->size, sizeof(uint8_t)); |
|
|
memcpy(NAS_PDU->buf, emmbuf->data, NAS_PDU->size); |
|
|
ogs_pkbuf_free(emmbuf); |
|
|
|
|
|
*MME_UE_S1AP_ID = mme_ue_s1ap_id; |
|
|
*ENB_UE_S1AP_ID = enb_ue_s1ap_id; |
|
|
|
|
|
ie = CALLOC(1, sizeof(S1AP_UplinkNASTransport_IEs_t)); |
|
|
ASN_SEQUENCE_ADD(&UplinkNASTransport->protocolIEs, ie); |
|
|
|
|
|
ie->id = S1AP_ProtocolIE_ID_id_EUTRAN_CGI; |
|
|
ie->criticality = S1AP_Criticality_ignore; |
|
|
ie->value.present = S1AP_UplinkNASTransport_IEs__value_PR_EUTRAN_CGI; |
|
|
|
|
|
EUTRAN_CGI = &ie->value.choice.EUTRAN_CGI; |
|
|
|
|
|
ogs_plmn_id_build(&plmn_id, 999, 70, 2); |
|
|
|
|
|
ogs_s1ap_buffer_to_OCTET_STRING( |
|
|
&plmn_id, OGS_PLMN_ID_LEN, &EUTRAN_CGI->pLMNidentity); |
|
|
EUTRAN_CGI->cell_ID.size = 4; |
|
|
EUTRAN_CGI->cell_ID.buf = CALLOC( |
|
|
EUTRAN_CGI->cell_ID.size, sizeof(uint8_t)); |
|
|
ogs_assert(EUTRAN_CGI->cell_ID.buf); |
|
|
|
|
|
e_cell_id = 0x20010; |
|
|
|
|
|
EUTRAN_CGI->cell_ID.buf[0] = (e_cell_id >> 24); |
|
|
EUTRAN_CGI->cell_ID.buf[1] = (e_cell_id >> 16); |
|
|
EUTRAN_CGI->cell_ID.buf[2] = (e_cell_id >> 8); |
|
|
EUTRAN_CGI->cell_ID.buf[3] = (e_cell_id); |
|
|
EUTRAN_CGI->cell_ID.bits_unused = 4; |
|
|
|
|
|
ie = CALLOC(1, sizeof(S1AP_UplinkNASTransport_IEs_t)); |
|
|
ASN_SEQUENCE_ADD(&UplinkNASTransport->protocolIEs, ie); |
|
|
|
|
|
ie->id = S1AP_ProtocolIE_ID_id_TAI; |
|
|
ie->criticality = S1AP_Criticality_ignore; |
|
|
ie->value.present = S1AP_UplinkNASTransport_IEs__value_PR_TAI; |
|
|
|
|
|
TAI = &ie->value.choice.TAI; |
|
|
|
|
|
tac = 1; |
|
|
ogs_asn_uint16_to_OCTET_STRING(tac, &TAI->tAC); |
|
|
ogs_s1ap_buffer_to_OCTET_STRING( |
|
|
&plmn_id, OGS_PLMN_ID_LEN, &TAI->pLMNidentity); |
|
|
|
|
|
ie = CALLOC(1, sizeof(S1AP_UplinkNASTransport_IEs_t)); |
|
|
ASN_SEQUENCE_ADD(&UplinkNASTransport->protocolIEs, ie); |
|
|
|
|
|
ie->id = S1AP_ProtocolIE_ID_id_PSCellInformation; |
|
|
ie->criticality = S1AP_Criticality_ignore; |
|
|
ie->value.present = S1AP_UplinkNASTransport_IEs__value_PR_PSCellInformation; |
|
|
|
|
|
PSCellInformation = &ie->value.choice.PSCellInformation; |
|
|
nCGI = &PSCellInformation->nCGI; |
|
|
|
|
|
ogs_s1ap_buffer_to_OCTET_STRING( |
|
|
&plmn_id, OGS_PLMN_ID_LEN, &nCGI->pLMNIdentity); |
|
|
|
|
|
nr_cell_id = 0x0012345020; |
|
|
nCGI->nRCellIdentity.size = 5; |
|
|
nCGI->nRCellIdentity.buf = CALLOC( |
|
|
nCGI->nRCellIdentity.size, sizeof(uint8_t)); |
|
|
ogs_assert(nCGI->nRCellIdentity.buf); |
|
|
nCGI->nRCellIdentity.buf[0] = (nr_cell_id >> 32); |
|
|
nCGI->nRCellIdentity.buf[1] = (nr_cell_id >> 24); |
|
|
nCGI->nRCellIdentity.buf[2] = (nr_cell_id >> 16); |
|
|
nCGI->nRCellIdentity.buf[3] = (nr_cell_id >> 8); |
|
|
nCGI->nRCellIdentity.buf[4] = (nr_cell_id); |
|
|
nCGI->nRCellIdentity.bits_unused = 4; |
|
|
|
|
|
return ogs_s1ap_encode(&pdu); |
|
|
} |
|
|
|
|
|
static void test6_func(abts_case *tc, void *data) |
|
|
{ |
|
|
const char *nas_payload = "2728 e58e6d0107430003 5200c2"; |
|
|
|
|
|
ogs_s1ap_message_t message; |
|
|
int result; |
|
|
|
|
|
ogs_pkbuf_t *s1apbuf = NULL; |
|
|
ogs_pkbuf_t *emmbuf = NULL; |
|
|
char hexbuf[OGS_HUGE_LEN]; |
|
|
|
|
|
emmbuf = ogs_pkbuf_alloc(NULL, OGS_MAX_SDU_LEN); |
|
|
ogs_assert(emmbuf); |
|
|
ogs_pkbuf_put_data(emmbuf, |
|
|
ogs_hex_from_string(nas_payload, hexbuf, sizeof(hexbuf)), 13); |
|
|
|
|
|
s1apbuf = test_build_uplink_nas_transport(1, 1, emmbuf); |
|
|
ABTS_PTR_NOTNULL(tc, s1apbuf); |
|
|
|
|
|
result = ogs_s1ap_decode(&message, s1apbuf); |
|
|
ABTS_INT_EQUAL(tc, 0, result); |
|
|
|
|
|
ogs_s1ap_free(&message); |
|
|
ogs_pkbuf_free(s1apbuf); |
|
|
} |
|
|
|
|
|
static void test7_func(abts_case *tc, void *data) |
|
|
{ |
|
|
const char *payload = |
|
|
"0026406300000a00 7a400f2004d222a6 4500bf48f328170b b75b007a40020000" |
|
|
"007a40020000007a 4004f5023d4d007a 50020000007a4003 00015a007a400b20" |
|
|
"00008fc5f89e4556 4a667a0b400c2001 cc00acc4e7380083 bd93007a40030001" |
|
|
"83007a40020000"; |
|
|
|
|
|
ogs_s1ap_message_t message; |
|
|
ogs_pkbuf_t *enb_pkbuf; |
|
|
int result; |
|
|
char hexbuf[OGS_HUGE_LEN]; |
|
|
|
|
|
enb_pkbuf = ogs_pkbuf_alloc(NULL, OGS_MAX_SDU_LEN); |
|
|
ogs_assert(enb_pkbuf); |
|
|
ogs_pkbuf_put_data(enb_pkbuf, |
|
|
ogs_hex_from_string(payload, hexbuf, sizeof(hexbuf)), 103); |
|
|
|
|
|
result = ogs_s1ap_decode(&message, enb_pkbuf); |
|
|
ABTS_INT_EQUAL(tc, -1, result); |
|
|
|
|
|
ogs_s1ap_free(&message); |
|
|
ogs_pkbuf_free(enb_pkbuf); |
|
|
} |
|
|
|
|
|
static void test8_func(abts_case *tc, void *data) |
|
|
{ |
|
|
const char *payload = |
|
|
"0025405a00000a00 79400b2000001f64 1125bd6050210079 4002000000794006" |
|
|
"0004680e99090079 4002000000794002 00000079400f2004 248c28ab0035cd56" |
|
|
"ea3daf3f75007940 02000000794003ff 01f60079400200ea 007940020000"; |
|
|
|
|
|
ogs_s1ap_message_t message; |
|
|
ogs_pkbuf_t *enb_pkbuf; |
|
|
int result; |
|
|
char hexbuf[OGS_HUGE_LEN]; |
|
|
|
|
|
enb_pkbuf = ogs_pkbuf_alloc(NULL, OGS_MAX_SDU_LEN); |
|
|
ogs_assert(enb_pkbuf); |
|
|
ogs_pkbuf_put_data(enb_pkbuf, |
|
|
ogs_hex_from_string(payload, hexbuf, sizeof(hexbuf)), 94); |
|
|
|
|
|
result = ogs_s1ap_decode(&message, enb_pkbuf); |
|
|
ABTS_INT_EQUAL(tc, -1, result); |
|
|
|
|
|
ogs_s1ap_free(&message); |
|
|
ogs_pkbuf_free(enb_pkbuf); |
|
|
} |
|
|
|
|
|
abts_suite *test_crash(abts_suite *suite) |
|
|
{ |
|
|
suite = ADD_SUITE(suite) |
|
|
|
|
|
abts_run_test(suite, test1_func, NULL); |
|
|
abts_run_test(suite, test2_func, NULL); |
|
|
abts_run_test(suite, test3_func, NULL); |
|
|
abts_run_test(suite, test4_func, NULL); |
|
|
abts_run_test(suite, test5_func, NULL); |
|
|
abts_run_test(suite, test6_func, NULL); |
|
|
abts_run_test(suite, test7_func, NULL); |
|
|
abts_run_test(suite, test8_func, NULL); |
|
|
|
|
|
return suite; |
|
|
} |
|
|
|