diff options
author | Holger Hans Peter Freyther <zecke@selfish.org> | 2012-12-26 18:55:54 +0100 |
---|---|---|
committer | Holger Hans Peter Freyther <zecke@selfish.org> | 2012-12-26 18:55:54 +0100 |
commit | 19cf0e81b336ead3c0a55d1c9d6722f986510bc0 (patch) | |
tree | f78ac1ca37b836aa3b7ff1dbfc6b861ac44ab5b4 /src/common/rsl.c | |
parent | 5f408f934ca868ff209049bd92f3b0896a0eccac (diff) |
ciphering: Handle ciphering support for A5/3 correctly
This was found and debugged by Sylvain. The BTS will always support
A5/0 so we do not keep track of that, the first bit of the flags is
used for A5/1, second for A5/2... but for RSL there is an offset to
go from RSL to A5(x). Add a testcase and change the code.
Diffstat (limited to 'src/common/rsl.c')
-rw-r--r-- | src/common/rsl.c | 6 |
1 files changed, 4 insertions, 2 deletions
diff --git a/src/common/rsl.c b/src/common/rsl.c index d53e07b9..481686ed 100644 --- a/src/common/rsl.c +++ b/src/common/rsl.c @@ -593,11 +593,13 @@ static void copy_sacch_si_to_lchan(struct gsm_lchan *lchan) static int encr_info2lchan(struct gsm_lchan *lchan, const uint8_t *val, uint8_t len) { + int rc; struct gsm_bts_role_bts *btsb = bts_role_bts(lchan->ts->trx->bts); /* check if the encryption algorithm sent by BSC is supported! */ - if (!((1 << *val) & btsb->support.ciphers)) - return -ENOTSUP; + rc = bts_supports_cipher(btsb, *val); + if (rc != 1) + return rc; /* length can be '1' in case of no ciphering */ if (len < 1) |