aboutsummaryrefslogtreecommitdiffstats
path: root/openbsc
diff options
context:
space:
mode:
authorNeels Hofmeyr <nhofmeyr@sysmocom.de>2016-04-13 19:15:46 +0200
committerNeels Hofmeyr <nhofmeyr@sysmocom.de>2016-04-20 11:23:00 +0200
commit0b8e6dd2df71a221e2d79b19b0b80aea43b25a6d (patch)
tree32e7b8254dccc2cf8ce2b6debb3478b578639bd2 /openbsc
parent9f2eaf8f56b14a462f0cd92843f11a17b8bfbc71 (diff)
gsm_04_08.c: fix security mode cmd: use auth tuple from MM auth
Diffstat (limited to 'openbsc')
-rw-r--r--openbsc/src/libmsc/gsm_04_08.c14
1 files changed, 2 insertions, 12 deletions
diff --git a/openbsc/src/libmsc/gsm_04_08.c b/openbsc/src/libmsc/gsm_04_08.c
index 4fb1e5d2f..897f97271 100644
--- a/openbsc/src/libmsc/gsm_04_08.c
+++ b/openbsc/src/libmsc/gsm_04_08.c
@@ -1191,18 +1191,8 @@ static int gsm48_rx_mm_auth_resp(struct gsm_subscriber_connection *conn, struct
/* send Security Mode Command (IK) to start integrity
* protection */
-
- /* DEV HACK: hardcoded auth tuple */
- /* instead, employ auth_get_tuple_for_subscr() */
- struct gsm_auth_tuple tp;
- tp = (struct gsm_auth_tuple) {
- .key_seq = 0,
- .rand = { 0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0 },
- .sres = { 0x61, 0xb5, 0x69, 0xf5 },
- .kc = { 0xd9, 0xd9, 0xc2, 0xed, 0x62, 0x7d, 0x68, 0x00 },
- };
-
- return iu_tx_sec_mode_cmd(conn->iu.ue_ctx, &tp, 0, 1);
+ return iu_tx_sec_mode_cmd(conn->iu.ue_ctx,
+ &conn->sec_operation->atuple, 0, 1);
}
/* Only authentication requested, and we're done. */