mme: expect authentication during 2g->4G TAU procedure (details)
Commit
0891beff9d786c91a99fc5016f78b90bc48d90f1
by Oliver Smith
testenv: set args.podman = False if action != "run"
Fix "./testenv.py clean":
File "/home/user/code/osmo-dev/src/osmo-ttcn3-hacks/_testenv/testenv/cmd.py", line 85, in run if not no_podman and testenv.args.podman: ^^^^^^^^^^^^^^^^^^^ AttributeError: 'Namespace' object has no attribute 'podman'
Commit
de72acd28406033f295582112a5fe4314f74addc
by Oliver Smith
testenv: cmd: pass all env vars without --podman
As suggested by Pau, pass all environment variables to through testenv if it is running without podman. This way a custom TTCN3_DIR, TTCN3_BIN_DIR and more variables that may make sense when running directly on the host, work as expected.
Commit
9229de94aecdf2313ebead5e3eb6ed9fc51044d8
by Pau Espin Pedrol
S1AP_Emulation: Fix new_ctx never set when building security header
The flag was never set to true. It needs to be set to true when building the security head of Security Mode Complete after receiving Security Mode Command with a new EPS security context. TS 24.301 5.4.3.3
Commit
54047a1303854dbd289ec892ae5c080fb930d956
by Pau Espin Pedrol
S1AP_Emulation: Fix building security headers for Integrity and Ciphering
The fact that the network instructs the UE to use EEA0 encryption (null algo) doesn't mean the UE should mark the NAS frames in the security header as non-ciphered. They need to be marked as IP+ciphered in the outer header, and as plain in the inner one.
Now TTCN3 behaves like a UE recorded while executing a similar test case. Moreover, wireshark is now happy decoding the messages.
Commit
368177254e7ff91637ac36421f5193f8c73d84d0
by Oliver Smith
testenv: add TESTENV_REBUILD_OUTDATED_IMAGE
Add an environment variable that allows rebuilding the podman image whenever it appears to be outdated. This is useful when working on the Dockerfile. As requested by Pau.
Commit
46b706f7fe0c73033dd47643e2bac3c84dd17395
by Pau Espin Pedrol
mme: expect authentication during 2g->4G TAU procedure
If TAU happens without an existing security context, network for sure wants to authenticate the UE. This is the scenario being tested here.
If there was a security context (eg. from a previous 4G Attach), then it's up to the network to decide (or be capable) to implicitly authenticate the UE.