Commit dd3e06bc authored by aligungr's avatar aligungr

Logging bug fix

parent 7d5fe2d5
...@@ -188,8 +188,6 @@ void NasMm::receiveSecurityModeCommand(const nas::SecurityModeCommand &msg) ...@@ -188,8 +188,6 @@ void NasMm::receiveSecurityModeCommand(const nas::SecurityModeCommand &msg)
// ============================ Process the security context ============================ // ============================ Process the security context ============================
m_logger->debug("Selected integrity[%d] ciphering[%d]", (int)nsCtx->integrity, (int)nsCtx->ciphering);
// Clear the NAS count if necessary // Clear the NAS count if necessary
if (clearNasCount) if (clearNasCount)
nsCtx->downlinkCount = {}; nsCtx->downlinkCount = {};
...@@ -212,6 +210,8 @@ void NasMm::receiveSecurityModeCommand(const nas::SecurityModeCommand &msg) ...@@ -212,6 +210,8 @@ void NasMm::receiveSecurityModeCommand(const nas::SecurityModeCommand &msg)
nsCtx->ciphering = msg.selectedNasSecurityAlgorithms.ciphering; nsCtx->ciphering = msg.selectedNasSecurityAlgorithms.ciphering;
keys::DeriveNasKeys(*nsCtx); keys::DeriveNasKeys(*nsCtx);
m_logger->debug("Selected integrity[%d] ciphering[%d]", (int)nsCtx->integrity, (int)nsCtx->ciphering);
// The UE shall in addition reset the uplink NAS COUNT counter if a) the SECURITY MODE COMMAND message is received // The UE shall in addition reset the uplink NAS COUNT counter if a) the SECURITY MODE COMMAND message is received
// in order to take a 5G NAS security context into use created after a successful execution of the 5G AKA based // in order to take a 5G NAS security context into use created after a successful execution of the 5G AKA based
// primary authentication and key agreement procedure or the EAP based ... // primary authentication and key agreement procedure or the EAP based ...
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment