Skip to content
Projects
Groups
Snippets
Help
Loading...
Help
Support
Keyboard shortcuts
?
Submit feedback
Contribute to GitLab
Sign in / Register
Toggle navigation
O
OpenXG-RAN
Project overview
Project overview
Details
Activity
Releases
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Issues
0
Issues
0
List
Boards
Labels
Milestones
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Analytics
Analytics
CI / CD
Repository
Value Stream
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
lizhongxiao
OpenXG-RAN
Commits
676b55a2
Commit
676b55a2
authored
Apr 24, 2023
by
Swetank Srivastava
Committed by
Vijay C
May 23, 2023
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
Working 8.2.1.6 on Rebased Branch
parent
9e1f2bc5
Changes
1
Show whitespace changes
Inline
Side-by-side
Showing
1 changed file
with
3 additions
and
13 deletions
+3
-13
openair2/RRC/LTE/rrc_eNB.c
openair2/RRC/LTE/rrc_eNB.c
+3
-13
No files found.
openair2/RRC/LTE/rrc_eNB.c
View file @
676b55a2
...
@@ -7125,9 +7125,6 @@ void rrc_eNB_as_security_configuration_req(
...
@@ -7125,9 +7125,6 @@ void rrc_eNB_as_security_configuration_req(
for (int i = 0; i < MAX_RBS; i++)
for (int i = 0; i < MAX_RBS; i++)
{
{
uint8_t *kRRCenc = NULL;
uint8_t *kRRCint = NULL;
uint8_t *kUPenc = NULL;
if (i < 3)
if (i < 3)
{
{
rbid_ = i;
rbid_ = i;
...
@@ -7174,22 +7171,15 @@ void rrc_eNB_as_security_configuration_req(
...
@@ -7174,22 +7171,15 @@ void rrc_eNB_as_security_configuration_req(
* Each RB entry will be freed invidually when the pdcp_remove_ue is invoked
* Each RB entry will be freed invidually when the pdcp_remove_ue is invoked
* during the UE release process.
* during the UE release process.
*/
*/
kRRCint = CALLOC(1,32);
kUPenc = CALLOC(1,16);
kRRCenc = CALLOC(1,16);
if (ASSecConfReq->Integrity.kRRCint) memcpy(kRRCint,ASSecConfReq->Integrity.kRRCint, 32);
if (ASSecConfReq->Ciphering.kUPenc) memcpy(kUPenc,ASSecConfReq->Ciphering.kUPenc, 16);
if (ASSecConfReq->Ciphering.kRRCenc) memcpy(kRRCenc,ASSecConfReq->Ciphering.kRRCenc, 16);
pdcp_config_set_security(
pdcp_config_set_security(
ctxt_pP,
ctxt_pP,
pdcp_p,
pdcp_p,
rbid_,
rbid_,
rbid_+2,
rbid_+2,
(ciphering_algorithm ) |(integrity_algorithm << 4),
(ciphering_algorithm ) |(integrity_algorithm << 4),
kRRCenc,
ASSecConfReq->Ciphering.
kRRCenc,
kRRCint,
ASSecConfReq->Integrity.
kRRCint,
kUPenc);
ASSecConfReq->Ciphering.
kUPenc);
rb_idx++;
rb_idx++;
LOG_I(RRC,"Updated PDCP for rb_id %d integrityProtAlgorithm=%d cipheringAlgorithm=%d \n",
LOG_I(RRC,"Updated PDCP for rb_id %d integrityProtAlgorithm=%d cipheringAlgorithm=%d \n",
rb_idx, integrity_algorithm, ciphering_algorithm);
rb_idx, integrity_algorithm, ciphering_algorithm);
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment