Skip to content
Projects
Groups
Snippets
Help
Loading...
Help
Support
Keyboard shortcuts
?
Submit feedback
Contribute to GitLab
Sign in / Register
Toggle navigation
O
OpenXG-RAN
Project overview
Project overview
Details
Activity
Releases
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Issues
0
Issues
0
List
Boards
Labels
Milestones
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Analytics
Analytics
CI / CD
Repository
Value Stream
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
lizhongxiao
OpenXG-RAN
Commits
d72d1bda
Commit
d72d1bda
authored
May 09, 2023
by
Vaibhav Shrivastava
Committed by
Vijay C
May 23, 2023
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
Fatal fix for 10.5.1 TC
parent
e9cb9e4e
Changes
1
Hide whitespace changes
Inline
Side-by-side
Showing
1 changed file
with
14 additions
and
3 deletions
+14
-3
openair2/RRC/LTE/rrc_eNB.c
openair2/RRC/LTE/rrc_eNB.c
+14
-3
No files found.
openair2/RRC/LTE/rrc_eNB.c
View file @
d72d1bda
...
@@ -7159,6 +7159,10 @@ void rrc_eNB_as_security_configuration_req(
...
@@ -7159,6 +7159,10 @@ void rrc_eNB_as_security_configuration_req(
for (int i = 0; i < MAX_RBS; i++)
for (int i = 0; i < MAX_RBS; i++)
{
{
uint8_t *kRRCenc = NULL;
uint8_t *kRRCint = NULL;
uint8_t *kUPenc = NULL;
if (i < 3)
if (i < 3)
{
{
rbid_ = i;
rbid_ = i;
...
@@ -7205,15 +7209,22 @@ void rrc_eNB_as_security_configuration_req(
...
@@ -7205,15 +7209,22 @@ void rrc_eNB_as_security_configuration_req(
* Each RB entry will be freed invidually when the pdcp_remove_ue is invoked
* Each RB entry will be freed invidually when the pdcp_remove_ue is invoked
* during the UE release process.
* during the UE release process.
*/
*/
kRRCint = CALLOC(1,32);
kUPenc = CALLOC(1,16);
kRRCenc = CALLOC(1,16);
memcpy(kRRCint,ASSecConfReq->Integrity.kRRCint, 32);
memcpy(kUPenc,ASSecConfReq->Ciphering.kUPenc, 16);
memcpy(kRRCenc,ASSecConfReq->Ciphering.kRRCenc, 16);
pdcp_config_set_security(
pdcp_config_set_security(
ctxt_pP,
ctxt_pP,
pdcp_p,
pdcp_p,
rbid_,
rbid_,
rbid_+2,
rbid_+2,
(ciphering_algorithm ) |(integrity_algorithm << 4),
(ciphering_algorithm ) |(integrity_algorithm << 4),
ASSecConfReq->Ciphering.
kRRCenc,
kRRCenc,
ASSecConfReq->Integrity.
kRRCint,
kRRCint,
ASSecConfReq->Ciphering.
kUPenc);
kUPenc);
rb_idx++;
rb_idx++;
LOG_I(RRC,"Updated PDCP for rb_id %d integrityProtAlgorithm=%d cipheringAlgorithm=%d \n",
LOG_I(RRC,"Updated PDCP for rb_id %d integrityProtAlgorithm=%d cipheringAlgorithm=%d \n",
rb_idx, integrity_algorithm, ciphering_algorithm);
rb_idx, integrity_algorithm, ciphering_algorithm);
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment