Projects
osmocom:nightly
open5gs
Sign Up
Log In
Username
Password
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
Expand all
Collapse all
Changes of Revision 384
View file
open5gs_2.6.4.31.cffd6.202307110026.dsc -> open5gs_2.6.4.33.71503.202307120026.dsc
Changed
@@ -2,7 +2,7 @@ Source: open5gs Binary: open5gs-common, open5gs-mme, open5gs-sgwc, open5gs-smf, open5gs-amf, open5gs-sgwu, open5gs-upf, open5gs-hss, open5gs-pcrf, open5gs-nrf, open5gs-scp, open5gs-ausf, open5gs-udm, open5gs-pcf, open5gs-nssf, open5gs-bsf, open5gs-udr, open5gs, open5gs-dbg Architecture: any -Version: 2.6.4.31.cffd6.202307110026 +Version: 2.6.4.33.71503.202307120026 Maintainer: Harald Welte <laforge@gnumonks.org> Uploaders: Sukchan Lee <acetcom@gmail.com> Homepage: https://open5gs.org @@ -31,8 +31,8 @@ open5gs-udr deb net optional arch=any open5gs-upf deb net optional arch=any Checksums-Sha1: - 360b6c6c48e52a66aa72a02795b679f6c3f06936 14123524 open5gs_2.6.4.31.cffd6.202307110026.tar.xz + 80964db5466e9278020a26d511d161b655c7cec8 14124128 open5gs_2.6.4.33.71503.202307120026.tar.xz Checksums-Sha256: - 07a2b4d50188abb36e2d49f8c87424bcbaa712170f9de40964dd95f7ba52d5cd 14123524 open5gs_2.6.4.31.cffd6.202307110026.tar.xz + 152312f69864bfbff44471dc1e7b2fd97da971fbe3c97aedea3752ecf351139e 14124128 open5gs_2.6.4.33.71503.202307120026.tar.xz Files: - 108920eb1084a2855c170fd538a86964 14123524 open5gs_2.6.4.31.cffd6.202307110026.tar.xz + 7ab891ee51edbe4acd9f06fe0da36120 14124128 open5gs_2.6.4.33.71503.202307120026.tar.xz
View file
open5gs_2.6.4.31.cffd6.202307110026.tar.xz/.tarball-version -> open5gs_2.6.4.33.71503.202307120026.tar.xz/.tarball-version
Changed
@@ -1 +1 @@ -2.6.4.31-cffd6.202307110026 +2.6.4.33-71503.202307120026
View file
open5gs_2.6.4.31.cffd6.202307110026.tar.xz/debian/changelog -> open5gs_2.6.4.33.71503.202307120026.tar.xz/debian/changelog
Changed
@@ -1,8 +1,8 @@ -open5gs (2.6.4.31.cffd6.202307110026) unstable; urgency=medium +open5gs (2.6.4.33.71503.202307120026) unstable; urgency=medium * Automatically generated changelog entry for building the Osmocom nightly feed - -- Osmocom OBS scripts <info@osmocom.org> Tue, 11 Jul 2023 00:27:53 +0000 + -- Osmocom OBS scripts <info@osmocom.org> Wed, 12 Jul 2023 00:27:45 +0000 open5gs (2.6.4) unstable; urgency=medium
View file
open5gs_2.6.4.31.cffd6.202307110026.tar.xz/src/mme/meson.build -> open5gs_2.6.4.33.71503.202307120026.tar.xz/src/mme/meson.build
Changed
@@ -21,37 +21,37 @@ mme-context.h s1ap-build.h s1ap-handler.h - s1ap-path.h + s1ap-path.h sgsap-build.h sgsap-handler.h sgsap-conv.h - sgsap-path.h + sgsap-path.h mme-fd-path.h - mme-s6a-handler.h + mme-s6a-handler.h nas-security.h - nas-path.h + nas-path.h emm-handler.h - emm-build.h + emm-build.h esm-handler.h - esm-build.h + esm-build.h mme-gtp-path.h mme-s11-build.h - mme-s11-handler.h + mme-s11-handler.h sbc-message.h sbc-handler.h mme-sm.h mme-path.h - metrics.h + metrics.h mme-init.c mme-event.c mme-timer.c - mme-context.c + mme-context.c s1ap-sm.c s1ap-build.c s1ap-handler.c s1ap-sctp.c - s1ap-path.c + s1ap-path.c sgsap-sm.c sgsap-build.c sgsap-handler.c @@ -59,7 +59,7 @@ sgsap-sctp.c sgsap-path.c mme-fd-path.c - mme-s6a-handler.c + mme-s6a-handler.c nas-security.c nas-path.c emm-sm.c @@ -72,8 +72,8 @@ mme-s11-build.c mme-s11-handler.c mme-sm.c - mme-path.c - sbc-handler.c + mme-path.c + sbc-handler.c metrics.c '''.split())
View file
open5gs_2.6.4.31.cffd6.202307110026.tar.xz/src/mme/mme-event.c -> open5gs_2.6.4.33.71503.202307120026.tar.xz/src/mme/mme-event.c
Changed
@@ -55,9 +55,9 @@ return OGS_FSM_NAME_INIT_SIG; switch (e->id) { - case OGS_FSM_ENTRY_SIG: + case OGS_FSM_ENTRY_SIG: return OGS_FSM_NAME_ENTRY_SIG; - case OGS_FSM_EXIT_SIG: + case OGS_FSM_EXIT_SIG: return OGS_FSM_NAME_EXIT_SIG; case MME_EVENT_S1AP_MESSAGE: @@ -97,7 +97,7 @@ case MME_EVENT_SGSAP_LO_CONNREFUSED: return "MME_EVENT_SGSAP_LO_CONNREFUSED"; - default: + default: break; }
View file
open5gs_2.6.4.31.cffd6.202307110026.tar.xz/src/mme/mme-sm.c -> open5gs_2.6.4.33.71503.202307120026.tar.xz/src/mme/mme-sm.c
Changed
@@ -462,7 +462,7 @@ break; case OGS_DIAM_S6A_CMD_CODE_INSERT_SUBSCRIBER_DATA: mme_s6a_handle_idr(mme_ue, s6a_message); - break; + break; default: ogs_error("Invalid Type%d", s6a_message->cmd_code); break;
View file
open5gs_2.6.4.31.cffd6.202307110026.tar.xz/src/mme/s1ap-build.c -> open5gs_2.6.4.33.71503.202307120026.tar.xz/src/mme/s1ap-build.c
Changed
@@ -142,13 +142,13 @@ S1AP_TimeToWait_t *TimeToWait = NULL; ogs_debug("S1SetupFailure"); - + ogs_debug(" Group%d Cause%d TimeToWait%ld", group, (int)cause, time_to_wait); memset(&pdu, 0, sizeof (S1AP_S1AP_PDU_t)); pdu.present = S1AP_S1AP_PDU_PR_unsuccessfulOutcome; - pdu.choice.unsuccessfulOutcome = + pdu.choice.unsuccessfulOutcome = CALLOC(1, sizeof(S1AP_UnsuccessfulOutcome_t)); unsuccessfulOutcome = pdu.choice.unsuccessfulOutcome; @@ -240,7 +240,7 @@ ie = CALLOC(1, sizeof(S1AP_DownlinkNASTransport_IEs_t)); ASN_SEQUENCE_ADD(&DownlinkNASTransport->protocolIEs, ie); - + ie->id = S1AP_ProtocolIE_ID_id_NAS_PDU; ie->criticality = S1AP_Criticality_reject; ie->value.present = S1AP_DownlinkNASTransport_IEs__value_PR_NAS_PDU; @@ -355,10 +355,10 @@ (long long)mme_ue->ambr.downlink, (long long)mme_ue->ambr.uplink); asn_uint642INTEGER( - &UEAggregateMaximumBitrate->uEaggregateMaximumBitRateUL, + &UEAggregateMaximumBitrate->uEaggregateMaximumBitRateUL, mme_ue->ambr.uplink); asn_uint642INTEGER( - &UEAggregateMaximumBitrate->uEaggregateMaximumBitRateDL, + &UEAggregateMaximumBitrate->uEaggregateMaximumBitRateDL, mme_ue->ambr.downlink); ogs_list_for_each(&mme_ue->sess_list, sess) { @@ -447,7 +447,7 @@ (long long)bearer->qos.gbr.downlink, (long long)bearer->qos.gbr.uplink); - gbrQosInformation = + gbrQosInformation = CALLOC(1, sizeof(struct S1AP_GBR_QosInformation)); asn_uint642INTEGER(&gbrQosInformation->e_RAB_MaximumBitrateDL, bearer->qos.mbr.downlink); @@ -541,7 +541,7 @@ SecurityKey = &ie->value.choice.SecurityKey; SecurityKey->size = OGS_SHA256_DIGEST_SIZE; - SecurityKey->buf = + SecurityKey->buf = CALLOC(SecurityKey->size, sizeof(uint8_t)); SecurityKey->bits_unused = 0; memcpy(SecurityKey->buf, mme_ue->kenb, SecurityKey->size); @@ -791,11 +791,11 @@ UESecurityCapabilities = &ie->value.choice.UESecurityCapabilities; UESecurityCapabilities->encryptionAlgorithms.size = 2; - UESecurityCapabilities->encryptionAlgorithms.buf = - CALLOC(UESecurityCapabilities->encryptionAlgorithms.size, + UESecurityCapabilities->encryptionAlgorithms.buf = + CALLOC(UESecurityCapabilities->encryptionAlgorithms.size, sizeof(uint8_t)); UESecurityCapabilities->encryptionAlgorithms.bits_unused = 0; - UESecurityCapabilities->encryptionAlgorithms.buf0 = + UESecurityCapabilities->encryptionAlgorithms.buf0 = (mme_ue->ue_network_capability.eea << 1); UESecurityCapabilities->integrityProtectionAlgorithms.size = 2; @@ -817,7 +817,7 @@ SecurityKey = &ie->value.choice.SecurityKey; SecurityKey->size = OGS_SHA256_DIGEST_SIZE; - SecurityKey->buf = + SecurityKey->buf = CALLOC(SecurityKey->size, sizeof(uint8_t)); SecurityKey->bits_unused = 0; memcpy(SecurityKey->buf, mme_ue->kenb, SecurityKey->size); @@ -883,11 +883,11 @@ UE_S1AP_IDs->choice.mME_UE_S1AP_ID = enb_ue->mme_ue_s1ap_id; } else { UE_S1AP_IDs->present = S1AP_UE_S1AP_IDs_PR_uE_S1AP_ID_pair; - UE_S1AP_IDs->choice.uE_S1AP_ID_pair = + UE_S1AP_IDs->choice.uE_S1AP_ID_pair = CALLOC(1, sizeof(S1AP_UE_S1AP_ID_pair_t)); - UE_S1AP_IDs->choice.uE_S1AP_ID_pair->mME_UE_S1AP_ID = + UE_S1AP_IDs->choice.uE_S1AP_ID_pair->mME_UE_S1AP_ID = enb_ue->mme_ue_s1ap_id; - UE_S1AP_IDs->choice.uE_S1AP_ID_pair->eNB_UE_S1AP_ID = + UE_S1AP_IDs->choice.uE_S1AP_ID_pair->eNB_UE_S1AP_ID = enb_ue->enb_ue_s1ap_id; } @@ -1138,7 +1138,7 @@ ogs_assert(bearer->qos.gbr.downlink); ogs_assert(bearer->qos.gbr.uplink); - gbrQosInformation = + gbrQosInformation = CALLOC(1, sizeof(S1AP_GBR_QosInformation_t)); asn_uint642INTEGER(&gbrQosInformation->e_RAB_MaximumBitrateDL, bearer->qos.mbr.downlink); @@ -1161,7 +1161,7 @@ } ogs_pkbuf_t *s1ap_build_e_rab_release_command( - mme_bearer_t *bearer, ogs_pkbuf_t *esmbuf, + mme_bearer_t *bearer, ogs_pkbuf_t *esmbuf, S1AP_Cause_PR group, long cause) { S1AP_S1AP_PDU_t pdu; @@ -1461,7 +1461,7 @@ /* Set UE Identity Index value : IMSI mod 4096 */ UEIdentityIndexValue->size = 2; - UEIdentityIndexValue->buf = + UEIdentityIndexValue->buf = CALLOC(UEIdentityIndexValue->size, sizeof(uint8_t)); /* Conver string to value */ @@ -1671,7 +1671,7 @@ SecurityContext->nextHopChainingCount = mme_ue->nhcc; SecurityContext->nextHopParameter.size = OGS_SHA256_DIGEST_SIZE; - SecurityContext->nextHopParameter.buf = + SecurityContext->nextHopParameter.buf = CALLOC(SecurityContext->nextHopParameter.size, sizeof(uint8_t)); SecurityContext->nextHopParameter.bits_unused = 0; @@ -1698,7 +1698,7 @@ memset(&pdu, 0, sizeof (S1AP_S1AP_PDU_t)); pdu.present = S1AP_S1AP_PDU_PR_unsuccessfulOutcome; - pdu.choice.unsuccessfulOutcome = + pdu.choice.unsuccessfulOutcome = CALLOC(1, sizeof(S1AP_UnsuccessfulOutcome_t)); unsuccessfulOutcome = pdu.choice.unsuccessfulOutcome; @@ -1940,7 +1940,7 @@ memset(&pdu, 0, sizeof (S1AP_S1AP_PDU_t)); pdu.present = S1AP_S1AP_PDU_PR_unsuccessfulOutcome; - pdu.choice.unsuccessfulOutcome = + pdu.choice.unsuccessfulOutcome = CALLOC(1, sizeof(S1AP_UnsuccessfulOutcome_t)); unsuccessfulOutcome = pdu.choice.unsuccessfulOutcome; @@ -2128,10 +2128,10 @@ Cause->choice.radioNetwork = cause->choice.radioNetwork; asn_uint642INTEGER( - &UEAggregateMaximumBitrate->uEaggregateMaximumBitRateUL, + &UEAggregateMaximumBitrate->uEaggregateMaximumBitRateUL, mme_ue->ambr.uplink); asn_uint642INTEGER( - &UEAggregateMaximumBitrate->uEaggregateMaximumBitRateDL, + &UEAggregateMaximumBitrate->uEaggregateMaximumBitRateDL, mme_ue->ambr.downlink); ogs_list_for_each(&mme_ue->sess_list, sess) { @@ -2170,7 +2170,7 @@ ogs_assert(bearer->qos.gbr.downlink); ogs_assert(bearer->qos.gbr.uplink); - gbrQosInformation = + gbrQosInformation = CALLOC(1, sizeof(struct S1AP_GBR_QosInformation)); asn_uint642INTEGER(&gbrQosInformation->e_RAB_MaximumBitrateDL, bearer->qos.mbr.downlink); @@ -2199,11 +2199,11 @@ Source_ToTarget_TransparentContainer); UESecurityCapabilities->encryptionAlgorithms.size = 2; - UESecurityCapabilities->encryptionAlgorithms.buf = - CALLOC(UESecurityCapabilities->encryptionAlgorithms.size, + UESecurityCapabilities->encryptionAlgorithms.buf = + CALLOC(UESecurityCapabilities->encryptionAlgorithms.size, sizeof(uint8_t)); UESecurityCapabilities->encryptionAlgorithms.bits_unused = 0; - UESecurityCapabilities->encryptionAlgorithms.buf0 = + UESecurityCapabilities->encryptionAlgorithms.buf0 = (mme_ue->ue_network_capability.eea << 1); UESecurityCapabilities->integrityProtectionAlgorithms.size = 2; @@ -2216,7 +2216,7 @@ SecurityContext->nextHopChainingCount = mme_ue->nhcc; SecurityContext->nextHopParameter.size = OGS_SHA256_DIGEST_SIZE; - SecurityContext->nextHopParameter.buf = + SecurityContext->nextHopParameter.buf = CALLOC(SecurityContext->nextHopParameter.size, sizeof(uint8_t)); SecurityContext->nextHopParameter.bits_unused = 0; @@ -2327,7 +2327,7 @@ target_ue = enb_ue_cycle(target_ue); ogs_assert(target_ue); ogs_assert(enb_statustransfer_transparentContainer); - + ogs_debug("MMEStatusTransfer"); memset(&pdu, 0, sizeof (S1AP_S1AP_PDU_t)); @@ -2433,7 +2433,7 @@ MessageIdentifier = &ie->value.choice.MessageIdentifier; MessageIdentifier->size = (16 / 8); - MessageIdentifier->buf = + MessageIdentifier->buf = CALLOC(MessageIdentifier->size, sizeof(uint8_t)); MessageIdentifier->bits_unused = 0; MessageIdentifier->buf0 = (sbc_pws->message_id >> 8) & 0xFF; @@ -2450,7 +2450,7 @@ SerialNumber = &ie->value.choice.SerialNumber; SerialNumber->size = (16 / 8); - SerialNumber->buf = + SerialNumber->buf = CALLOC(SerialNumber->size, sizeof(uint8_t)); SerialNumber->bits_unused = 0; SerialNumber->buf0 = (sbc_pws->serial_number >> 8) & 0xFF; @@ -2499,7 +2499,7 @@ DataCodingScheme = &ie->value.choice.DataCodingScheme; DataCodingScheme->size = (8 / 8); - DataCodingScheme->buf = + DataCodingScheme->buf = CALLOC(DataCodingScheme->size, sizeof(uint8_t)); DataCodingScheme->bits_unused = 0; DataCodingScheme->buf0 = sbc_pws->data_coding_scheme & 0xFF; @@ -2515,7 +2515,7 @@ WarningMessageContents = &ie->value.choice.WarningMessageContents; WarningMessageContents->size = sbc_pws->message_length;; - WarningMessageContents->buf = + WarningMessageContents->buf = CALLOC(WarningMessageContents->size, sizeof(uint8_t)); memcpy(WarningMessageContents->buf, sbc_pws->message_contents, WarningMessageContents->size); @@ -2567,7 +2567,7 @@ MessageIdentifier = &ie->value.choice.MessageIdentifier; MessageIdentifier->size = (16 / 8); - MessageIdentifier->buf = + MessageIdentifier->buf = CALLOC(MessageIdentifier->size, sizeof(uint8_t)); MessageIdentifier->bits_unused = 0; MessageIdentifier->buf0 = (sbc_pws->message_id >> 8) & 0xFF; @@ -2583,7 +2583,7 @@ SerialNumber = &ie->value.choice.SerialNumber; SerialNumber->size = (16 / 8); - SerialNumber->buf = + SerialNumber->buf = CALLOC(SerialNumber->size, sizeof(uint8_t)); SerialNumber->bits_unused = 0; SerialNumber->buf0 = (sbc_pws->serial_number >> 8) & 0xFF; @@ -2592,7 +2592,7 @@ /* TODO: optional Warning Area List */ ogs_debug(" Message%02x,%02x Serial%02x,%02x", - MessageIdentifier->buf0, MessageIdentifier->buf1, + MessageIdentifier->buf0, MessageIdentifier->buf1, SerialNumber->buf0, SerialNumber->buf1); return ogs_s1ap_encode(&pdu);
View file
open5gs_2.6.4.31.cffd6.202307110026.tar.xz/src/nrf/nrf-sm.c -> open5gs_2.6.4.33.71503.202307120026.tar.xz/src/nrf/nrf-sm.c
Changed
@@ -99,9 +99,22 @@ } break; + CASE(OGS_SBI_HTTP_METHOD_OPTIONS) + ogs_assert( + true == + ogs_sbi_server_send_error( + stream, + OGS_SBI_HTTP_STATUS_NOT_IMPLEMENTED, + &message, "OPTIONS method is not implemented yet", + NULL)); + break; + DEFAULT - nf_instance = ogs_sbi_nf_instance_find( - message.h.resource.component1); + if (message.h.resource.component1) { + nf_instance = ogs_sbi_nf_instance_find( + message.h.resource.component1); + } + if (!nf_instance) { SWITCH(message.h.method) CASE(OGS_SBI_HTTP_METHOD_PUT)
Locations
Projects
Search
Status Monitor
Help
Open Build Service
OBS Manuals
API Documentation
OBS Portal
Reporting a Bug
Contact
Mailing List
Forums
Chat (IRC)
Twitter
Open Build Service (OBS)
is an
openSUSE project
.