Commit
8802fe3d1807306f10fb117a5d176552003ff456
by Pau Espin Pedrol
sgsn: Fix running with testenv.py podman setup
The initial testenv.py setup introduced in osmo-ttcn3-hacks.git 6baec93cb85fa8a0051e9aacd0178e90adbfdadc lacked some recent updates to the ttcn3 testsuite setup where a second IP address is added to the container in order to distinguish between RNC and CN in GTPU.
Commit
0891beff9d786c91a99fc5016f78b90bc48d90f1
by Oliver Smith
testenv: set args.podman = False if action != "run"
Fix "./testenv.py clean":
File "/home/user/code/osmo-dev/src/osmo-ttcn3-hacks/_testenv/testenv/cmd.py", line 85, in run if not no_podman and testenv.args.podman: ^^^^^^^^^^^^^^^^^^^ AttributeError: 'Namespace' object has no attribute 'podman'
Commit
de72acd28406033f295582112a5fe4314f74addc
by Oliver Smith
testenv: cmd: pass all env vars without --podman
As suggested by Pau, pass all environment variables to through testenv if it is running without podman. This way a custom TTCN3_DIR, TTCN3_BIN_DIR and more variables that may make sense when running directly on the host, work as expected.
Commit
9229de94aecdf2313ebead5e3eb6ed9fc51044d8
by Pau Espin Pedrol
S1AP_Emulation: Fix new_ctx never set when building security header
The flag was never set to true. It needs to be set to true when building the security head of Security Mode Complete after receiving Security Mode Command with a new EPS security context. TS 24.301 5.4.3.3
Commit
54047a1303854dbd289ec892ae5c080fb930d956
by Pau Espin Pedrol
S1AP_Emulation: Fix building security headers for Integrity and Ciphering
The fact that the network instructs the UE to use EEA0 encryption (null algo) doesn't mean the UE should mark the NAS frames in the security header as non-ciphered. They need to be marked as IP+ciphered in the outer header, and as plain in the inner one.
Now TTCN3 behaves like a UE recorded while executing a similar test case. Moreover, wireshark is now happy decoding the messages.