- 22 May, 2024 40 commits
-
-
Robert Schmidt authored
This reverts commit eaf28414. This assertion was introduced as we (wrongfully) thought we needed to calculate the SSB ARFCN at the CU. Since PBCH might carry one bit, which is not available at the CU, only certain SSB ARFCNs would have been possible. With the availability of the SSB ARFCN through the MeasurementTimingConfiguration, this is not necessary anymore.
-
Robert Schmidt authored
-
Robert Schmidt authored
MeasTimingConfig may not come with F1 Setup Request: some DUs send it with the DU configuration update. Handle this gracefully by checking for MTC before using it.
-
Giulio Carota authored
-
Robert Schmidt authored
-
Robert Schmidt authored
Refactor parts into a separate function, which will be reused within the gNB-DU configuration update function in the next commit.
-
Robert Schmidt authored
The OAI DU does not use this message, and could not roll-back. The LiteOn DU does not seem to like it. It is useless (as of now), so remove it
-
Giulio Carota authored
Use the correct MIB data structure, MIB_t. This is required by 38.473, and the LiteOn DU sends only that. So our CU needs to handle it, so align the OAI DU as well.
-
Robert Schmidt authored
-
Robert Schmidt authored
-
Robert Schmidt authored
-
Robert Schmidt authored
-
Robert Schmidt authored
-
Robert Schmidt authored
-
Giulio Carota authored
-
Robert Schmidt authored
-
Robert Schmidt authored
-
Robert Schmidt authored
-
Jaroslava Fiedlerova authored
-
Laurent THOMAS authored
-
rmagueta authored
-
rmagueta authored
-
rmagueta authored
-
Laurent THOMAS authored
This has no meaning at a global level, we run several slots: one tx, several rx at same time. Some minor cleaning of C style
-
Laurent THOMAS authored
-
Laurent THOMAS authored
The external declarations were incorrect, leading to mismatching prototypes of config_ru and config_rru (true bug in OAI lte!).
-
francescomani authored
-
francescomani authored
-
francescomani authored
-
francescomani authored
-
Jaroslava Fiedlerova authored
-
Jaroslava Fiedlerova authored
For docker version > 25.0.5, "version" field is not relevant and reported as obsolete.
-
Robert Schmidt authored
-
Jaroslava Fiedlerova authored
- replace nrmodule2 by up2 - add matix in CI machines - add info about RAN-SA-2x2-Module-CN5G in list of pipeline - update of 5G OTA testbench image
-
Cedric Roux authored
By using a struct we may have warnings at compilation time in some cases if the type is not used properly. The type definition becomes a bit weird, so we need to properly comment. If too strange, we can revert to the classical "void" definition.
-
Cedric Roux authored
-
Cedric Roux authored
-
Cedric Roux authored
- rename "lib_ctx" to "mac_implementation" which is what is stored because of previous commit - rename "mac" to "mac_context" to be clearer with what is stored in this variable too
-
Cedric Roux authored
The main work of this commit is to rewrite cipher_aes_128_cbc_cmac() which was too slow and created issues when running the 4G eNB on some machines (LLL when using a b210). Instead of creating the security context, use it, and delete it, all in cipher_aes_128_cbc_cmac(), we introduce the function init_aes_128_cbc_cmac() to create it, and we change cipher_aes_128_cbc_cmac() to just use it, and we also adapt free_aes_128_cbc_cmac(). The function aes_128_cbc_cmac() is removed, it does not follow the new init/use/free API. Doing so, on the primary test machine used to do this work (a powerful and fast machine where it is possible to set the CPUs' frequencies) it was possible to limit the CPUs' frequencies to 500 MHz (it was not possible to go lower) without any LLL (using a b210, quectel UE in idle, no data traffic, only periodic measurement reports). Before this commit, it was necessary to set a frequency of at least 1.8 GHz otherwise some LLL would appear. Then we need to adapt the rest of the code to take into account those changes. A notion of security container (stream_security_container_t) containing ciphering and integrity contexts is introduced. And the code is harmonized for, hopefully, better readability. The (opaque) type stream_security_context_t is introduced, used by both integrity and ciphering contexts. The idea is to use a init()/use()/free() API for all the security procedures, identical for all the ciphering and integrity procedures.
-
Cedric Roux authored
-