Projects
osmocom:nightly
open5gs
Sign Up
Log In
Username
Password
We truncated the diff of some files because they were too big. If you want to see the full diff for every file,
click here
.
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
Expand all
Collapse all
Changes of Revision 384
View file
open5gs_2.6.4.31.cffd6.202307110026.dsc -> open5gs_2.6.4.33.71503.202307120026.dsc
Changed
@@ -2,7 +2,7 @@ Source: open5gs Binary: open5gs-common, open5gs-mme, open5gs-sgwc, open5gs-smf, open5gs-amf, open5gs-sgwu, open5gs-upf, open5gs-hss, open5gs-pcrf, open5gs-nrf, open5gs-scp, open5gs-ausf, open5gs-udm, open5gs-pcf, open5gs-nssf, open5gs-bsf, open5gs-udr, open5gs, open5gs-dbg Architecture: any -Version: 2.6.4.31.cffd6.202307110026 +Version: 2.6.4.33.71503.202307120026 Maintainer: Harald Welte <laforge@gnumonks.org> Uploaders: Sukchan Lee <acetcom@gmail.com> Homepage: https://open5gs.org @@ -31,8 +31,8 @@ open5gs-udr deb net optional arch=any open5gs-upf deb net optional arch=any Checksums-Sha1: - 360b6c6c48e52a66aa72a02795b679f6c3f06936 14123524 open5gs_2.6.4.31.cffd6.202307110026.tar.xz + 80964db5466e9278020a26d511d161b655c7cec8 14124128 open5gs_2.6.4.33.71503.202307120026.tar.xz Checksums-Sha256: - 07a2b4d50188abb36e2d49f8c87424bcbaa712170f9de40964dd95f7ba52d5cd 14123524 open5gs_2.6.4.31.cffd6.202307110026.tar.xz + 152312f69864bfbff44471dc1e7b2fd97da971fbe3c97aedea3752ecf351139e 14124128 open5gs_2.6.4.33.71503.202307120026.tar.xz Files: - 108920eb1084a2855c170fd538a86964 14123524 open5gs_2.6.4.31.cffd6.202307110026.tar.xz + 7ab891ee51edbe4acd9f06fe0da36120 14124128 open5gs_2.6.4.33.71503.202307120026.tar.xz
View file
open5gs_2.6.4.31.cffd6.202307110026.tar.xz/.tarball-version -> open5gs_2.6.4.33.71503.202307120026.tar.xz/.tarball-version
Changed
@@ -1 +1 @@ -2.6.4.31-cffd6.202307110026 +2.6.4.33-71503.202307120026
View file
open5gs_2.6.4.31.cffd6.202307110026.tar.xz/debian/changelog -> open5gs_2.6.4.33.71503.202307120026.tar.xz/debian/changelog
Changed
@@ -1,8 +1,8 @@ -open5gs (2.6.4.31.cffd6.202307110026) unstable; urgency=medium +open5gs (2.6.4.33.71503.202307120026) unstable; urgency=medium * Automatically generated changelog entry for building the Osmocom nightly feed - -- Osmocom OBS scripts <info@osmocom.org> Tue, 11 Jul 2023 00:27:53 +0000 + -- Osmocom OBS scripts <info@osmocom.org> Wed, 12 Jul 2023 00:27:45 +0000 open5gs (2.6.4) unstable; urgency=medium
View file
open5gs_2.6.4.31.cffd6.202307110026.tar.xz/src/mme/meson.build -> open5gs_2.6.4.33.71503.202307120026.tar.xz/src/mme/meson.build
Changed
@@ -21,37 +21,37 @@ mme-context.h s1ap-build.h s1ap-handler.h - s1ap-path.h + s1ap-path.h sgsap-build.h sgsap-handler.h sgsap-conv.h - sgsap-path.h + sgsap-path.h mme-fd-path.h - mme-s6a-handler.h + mme-s6a-handler.h nas-security.h - nas-path.h + nas-path.h emm-handler.h - emm-build.h + emm-build.h esm-handler.h - esm-build.h + esm-build.h mme-gtp-path.h mme-s11-build.h - mme-s11-handler.h + mme-s11-handler.h sbc-message.h sbc-handler.h mme-sm.h mme-path.h - metrics.h + metrics.h mme-init.c mme-event.c mme-timer.c - mme-context.c + mme-context.c s1ap-sm.c s1ap-build.c s1ap-handler.c s1ap-sctp.c - s1ap-path.c + s1ap-path.c sgsap-sm.c sgsap-build.c sgsap-handler.c @@ -59,7 +59,7 @@ sgsap-sctp.c sgsap-path.c mme-fd-path.c - mme-s6a-handler.c + mme-s6a-handler.c nas-security.c nas-path.c emm-sm.c @@ -72,8 +72,8 @@ mme-s11-build.c mme-s11-handler.c mme-sm.c - mme-path.c - sbc-handler.c + mme-path.c + sbc-handler.c metrics.c '''.split())
View file
open5gs_2.6.4.31.cffd6.202307110026.tar.xz/src/mme/mme-event.c -> open5gs_2.6.4.33.71503.202307120026.tar.xz/src/mme/mme-event.c
Changed
@@ -55,9 +55,9 @@ return OGS_FSM_NAME_INIT_SIG; switch (e->id) { - case OGS_FSM_ENTRY_SIG: + case OGS_FSM_ENTRY_SIG: return OGS_FSM_NAME_ENTRY_SIG; - case OGS_FSM_EXIT_SIG: + case OGS_FSM_EXIT_SIG: return OGS_FSM_NAME_EXIT_SIG; case MME_EVENT_S1AP_MESSAGE: @@ -97,7 +97,7 @@ case MME_EVENT_SGSAP_LO_CONNREFUSED: return "MME_EVENT_SGSAP_LO_CONNREFUSED"; - default: + default: break; }
View file
open5gs_2.6.4.31.cffd6.202307110026.tar.xz/src/mme/mme-sm.c -> open5gs_2.6.4.33.71503.202307120026.tar.xz/src/mme/mme-sm.c
Changed
@@ -462,7 +462,7 @@ break; case OGS_DIAM_S6A_CMD_CODE_INSERT_SUBSCRIBER_DATA: mme_s6a_handle_idr(mme_ue, s6a_message); - break; + break; default: ogs_error("Invalid Type%d", s6a_message->cmd_code); break;
View file
open5gs_2.6.4.31.cffd6.202307110026.tar.xz/src/mme/s1ap-build.c -> open5gs_2.6.4.33.71503.202307120026.tar.xz/src/mme/s1ap-build.c
Changed
@@ -142,13 +142,13 @@ S1AP_TimeToWait_t *TimeToWait = NULL; ogs_debug("S1SetupFailure"); - + ogs_debug(" Group%d Cause%d TimeToWait%ld", group, (int)cause, time_to_wait); memset(&pdu, 0, sizeof (S1AP_S1AP_PDU_t)); pdu.present = S1AP_S1AP_PDU_PR_unsuccessfulOutcome; - pdu.choice.unsuccessfulOutcome = + pdu.choice.unsuccessfulOutcome = CALLOC(1, sizeof(S1AP_UnsuccessfulOutcome_t)); unsuccessfulOutcome = pdu.choice.unsuccessfulOutcome; @@ -240,7 +240,7 @@ ie = CALLOC(1, sizeof(S1AP_DownlinkNASTransport_IEs_t)); ASN_SEQUENCE_ADD(&DownlinkNASTransport->protocolIEs, ie); - + ie->id = S1AP_ProtocolIE_ID_id_NAS_PDU; ie->criticality = S1AP_Criticality_reject; ie->value.present = S1AP_DownlinkNASTransport_IEs__value_PR_NAS_PDU; @@ -355,10 +355,10 @@ (long long)mme_ue->ambr.downlink, (long long)mme_ue->ambr.uplink); asn_uint642INTEGER( - &UEAggregateMaximumBitrate->uEaggregateMaximumBitRateUL, + &UEAggregateMaximumBitrate->uEaggregateMaximumBitRateUL, mme_ue->ambr.uplink); asn_uint642INTEGER( - &UEAggregateMaximumBitrate->uEaggregateMaximumBitRateDL, + &UEAggregateMaximumBitrate->uEaggregateMaximumBitRateDL, mme_ue->ambr.downlink); ogs_list_for_each(&mme_ue->sess_list, sess) { @@ -447,7 +447,7 @@ (long long)bearer->qos.gbr.downlink, (long long)bearer->qos.gbr.uplink); - gbrQosInformation = + gbrQosInformation = CALLOC(1, sizeof(struct S1AP_GBR_QosInformation)); asn_uint642INTEGER(&gbrQosInformation->e_RAB_MaximumBitrateDL, bearer->qos.mbr.downlink); @@ -541,7 +541,7 @@ SecurityKey = &ie->value.choice.SecurityKey; SecurityKey->size = OGS_SHA256_DIGEST_SIZE; - SecurityKey->buf = + SecurityKey->buf = CALLOC(SecurityKey->size, sizeof(uint8_t)); SecurityKey->bits_unused = 0; memcpy(SecurityKey->buf, mme_ue->kenb, SecurityKey->size); @@ -791,11 +791,11 @@ UESecurityCapabilities = &ie->value.choice.UESecurityCapabilities; UESecurityCapabilities->encryptionAlgorithms.size = 2; - UESecurityCapabilities->encryptionAlgorithms.buf = - CALLOC(UESecurityCapabilities->encryptionAlgorithms.size, + UESecurityCapabilities->encryptionAlgorithms.buf = + CALLOC(UESecurityCapabilities->encryptionAlgorithms.size, sizeof(uint8_t)); UESecurityCapabilities->encryptionAlgorithms.bits_unused = 0; - UESecurityCapabilities->encryptionAlgorithms.buf0 = + UESecurityCapabilities->encryptionAlgorithms.buf0 = (mme_ue->ue_network_capability.eea << 1); UESecurityCapabilities->integrityProtectionAlgorithms.size = 2; @@ -817,7 +817,7 @@ SecurityKey = &ie->value.choice.SecurityKey; SecurityKey->size = OGS_SHA256_DIGEST_SIZE; - SecurityKey->buf = + SecurityKey->buf = CALLOC(SecurityKey->size, sizeof(uint8_t)); SecurityKey->bits_unused = 0; memcpy(SecurityKey->buf, mme_ue->kenb, SecurityKey->size); @@ -883,11 +883,11 @@ UE_S1AP_IDs->choice.mME_UE_S1AP_ID = enb_ue->mme_ue_s1ap_id; } else { UE_S1AP_IDs->present = S1AP_UE_S1AP_IDs_PR_uE_S1AP_ID_pair; - UE_S1AP_IDs->choice.uE_S1AP_ID_pair = + UE_S1AP_IDs->choice.uE_S1AP_ID_pair = CALLOC(1, sizeof(S1AP_UE_S1AP_ID_pair_t)); - UE_S1AP_IDs->choice.uE_S1AP_ID_pair->mME_UE_S1AP_ID = + UE_S1AP_IDs->choice.uE_S1AP_ID_pair->mME_UE_S1AP_ID = enb_ue->mme_ue_s1ap_id; - UE_S1AP_IDs->choice.uE_S1AP_ID_pair->eNB_UE_S1AP_ID = + UE_S1AP_IDs->choice.uE_S1AP_ID_pair->eNB_UE_S1AP_ID = enb_ue->enb_ue_s1ap_id; } @@ -1138,7 +1138,7 @@ ogs_assert(bearer->qos.gbr.downlink); ogs_assert(bearer->qos.gbr.uplink); - gbrQosInformation = + gbrQosInformation = CALLOC(1, sizeof(S1AP_GBR_QosInformation_t)); asn_uint642INTEGER(&gbrQosInformation->e_RAB_MaximumBitrateDL, bearer->qos.mbr.downlink); @@ -1161,7 +1161,7 @@ } ogs_pkbuf_t *s1ap_build_e_rab_release_command( - mme_bearer_t *bearer, ogs_pkbuf_t *esmbuf, + mme_bearer_t *bearer, ogs_pkbuf_t *esmbuf, S1AP_Cause_PR group, long cause) { S1AP_S1AP_PDU_t pdu; @@ -1461,7 +1461,7 @@ /* Set UE Identity Index value : IMSI mod 4096 */ UEIdentityIndexValue->size = 2; - UEIdentityIndexValue->buf = + UEIdentityIndexValue->buf = CALLOC(UEIdentityIndexValue->size, sizeof(uint8_t)); /* Conver string to value */ @@ -1671,7 +1671,7 @@ SecurityContext->nextHopChainingCount = mme_ue->nhcc; SecurityContext->nextHopParameter.size = OGS_SHA256_DIGEST_SIZE; - SecurityContext->nextHopParameter.buf = + SecurityContext->nextHopParameter.buf = CALLOC(SecurityContext->nextHopParameter.size, sizeof(uint8_t)); SecurityContext->nextHopParameter.bits_unused = 0; @@ -1698,7 +1698,7 @@ memset(&pdu, 0, sizeof (S1AP_S1AP_PDU_t)); pdu.present = S1AP_S1AP_PDU_PR_unsuccessfulOutcome; - pdu.choice.unsuccessfulOutcome = + pdu.choice.unsuccessfulOutcome = CALLOC(1, sizeof(S1AP_UnsuccessfulOutcome_t)); unsuccessfulOutcome = pdu.choice.unsuccessfulOutcome; @@ -1940,7 +1940,7 @@ memset(&pdu, 0, sizeof (S1AP_S1AP_PDU_t)); pdu.present = S1AP_S1AP_PDU_PR_unsuccessfulOutcome; - pdu.choice.unsuccessfulOutcome = + pdu.choice.unsuccessfulOutcome = CALLOC(1, sizeof(S1AP_UnsuccessfulOutcome_t)); unsuccessfulOutcome = pdu.choice.unsuccessfulOutcome; @@ -2128,10 +2128,10 @@ Cause->choice.radioNetwork = cause->choice.radioNetwork; asn_uint642INTEGER( - &UEAggregateMaximumBitrate->uEaggregateMaximumBitRateUL, + &UEAggregateMaximumBitrate->uEaggregateMaximumBitRateUL, mme_ue->ambr.uplink); asn_uint642INTEGER( - &UEAggregateMaximumBitrate->uEaggregateMaximumBitRateDL, + &UEAggregateMaximumBitrate->uEaggregateMaximumBitRateDL, mme_ue->ambr.downlink); ogs_list_for_each(&mme_ue->sess_list, sess) { @@ -2170,7 +2170,7 @@ ogs_assert(bearer->qos.gbr.downlink); ogs_assert(bearer->qos.gbr.uplink); - gbrQosInformation = + gbrQosInformation = CALLOC(1, sizeof(struct S1AP_GBR_QosInformation)); asn_uint642INTEGER(&gbrQosInformation->e_RAB_MaximumBitrateDL, bearer->qos.mbr.downlink); @@ -2199,11 +2199,11 @@ Source_ToTarget_TransparentContainer); UESecurityCapabilities->encryptionAlgorithms.size = 2; - UESecurityCapabilities->encryptionAlgorithms.buf = - CALLOC(UESecurityCapabilities->encryptionAlgorithms.size, + UESecurityCapabilities->encryptionAlgorithms.buf = + CALLOC(UESecurityCapabilities->encryptionAlgorithms.size, sizeof(uint8_t)); UESecurityCapabilities->encryptionAlgorithms.bits_unused = 0; - UESecurityCapabilities->encryptionAlgorithms.buf0 = + UESecurityCapabilities->encryptionAlgorithms.buf0 = (mme_ue->ue_network_capability.eea << 1); UESecurityCapabilities->integrityProtectionAlgorithms.size = 2; @@ -2216,7 +2216,7 @@ SecurityContext->nextHopChainingCount = mme_ue->nhcc; SecurityContext->nextHopParameter.size = OGS_SHA256_DIGEST_SIZE; - SecurityContext->nextHopParameter.buf = + SecurityContext->nextHopParameter.buf = CALLOC(SecurityContext->nextHopParameter.size, sizeof(uint8_t)); SecurityContext->nextHopParameter.bits_unused = 0; @@ -2327,7 +2327,7 @@ target_ue = enb_ue_cycle(target_ue); ogs_assert(target_ue); ogs_assert(enb_statustransfer_transparentContainer); -
View file
open5gs_2.6.4.31.cffd6.202307110026.tar.xz/src/nrf/nrf-sm.c -> open5gs_2.6.4.33.71503.202307120026.tar.xz/src/nrf/nrf-sm.c
Changed
@@ -99,9 +99,22 @@ } break; + CASE(OGS_SBI_HTTP_METHOD_OPTIONS) + ogs_assert( + true == + ogs_sbi_server_send_error( + stream, + OGS_SBI_HTTP_STATUS_NOT_IMPLEMENTED, + &message, "OPTIONS method is not implemented yet", + NULL)); + break; + DEFAULT - nf_instance = ogs_sbi_nf_instance_find( - message.h.resource.component1); + if (message.h.resource.component1) { + nf_instance = ogs_sbi_nf_instance_find( + message.h.resource.component1); + } + if (!nf_instance) { SWITCH(message.h.method) CASE(OGS_SBI_HTTP_METHOD_PUT)
Locations
Projects
Search
Status Monitor
Help
Open Build Service
OBS Manuals
API Documentation
OBS Portal
Reporting a Bug
Contact
Mailing List
Forums
Chat (IRC)
Twitter
Open Build Service (OBS)
is an
openSUSE project
.