diff options
author | Neels Hofmeyr <nhofmeyr@sysmocom.de> | 2016-04-13 19:15:46 +0200 |
---|---|---|
committer | Neels Hofmeyr <nhofmeyr@sysmocom.de> | 2016-04-20 11:23:00 +0200 |
commit | 0b8e6dd2df71a221e2d79b19b0b80aea43b25a6d (patch) | |
tree | 32e7b8254dccc2cf8ce2b6debb3478b578639bd2 | |
parent | 9f2eaf8f56b14a462f0cd92843f11a17b8bfbc71 (diff) |
gsm_04_08.c: fix security mode cmd: use auth tuple from MM auth
-rw-r--r-- | openbsc/src/libmsc/gsm_04_08.c | 14 |
1 files changed, 2 insertions, 12 deletions
diff --git a/openbsc/src/libmsc/gsm_04_08.c b/openbsc/src/libmsc/gsm_04_08.c index 4fb1e5d2f..897f97271 100644 --- a/openbsc/src/libmsc/gsm_04_08.c +++ b/openbsc/src/libmsc/gsm_04_08.c @@ -1191,18 +1191,8 @@ static int gsm48_rx_mm_auth_resp(struct gsm_subscriber_connection *conn, struct /* send Security Mode Command (IK) to start integrity * protection */ - - /* DEV HACK: hardcoded auth tuple */ - /* instead, employ auth_get_tuple_for_subscr() */ - struct gsm_auth_tuple tp; - tp = (struct gsm_auth_tuple) { - .key_seq = 0, - .rand = { 0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0 }, - .sres = { 0x61, 0xb5, 0x69, 0xf5 }, - .kc = { 0xd9, 0xd9, 0xc2, 0xed, 0x62, 0x7d, 0x68, 0x00 }, - }; - - return iu_tx_sec_mode_cmd(conn->iu.ue_ctx, &tp, 0, 1); + return iu_tx_sec_mode_cmd(conn->iu.ue_ctx, + &conn->sec_operation->atuple, 0, 1); } /* Only authentication requested, and we're done. */ |