2019-05-27 09:54:11 +00:00
|
|
|
/* GPRS-NS Emulation in TTCN-3
|
|
|
|
* (C) 2018 Harald Welte <laforge@gnumonks.org>
|
|
|
|
* contributions by sysmocom - s.f.m.c. GmbH
|
|
|
|
* All rights reserved.
|
|
|
|
*
|
|
|
|
* Released under the terms of GNU General Public License, Version 2 or
|
|
|
|
* (at your option) any later version.
|
|
|
|
*
|
|
|
|
* SPDX-License-Identifier: GPL-2.0-or-later
|
|
|
|
*/
|
|
|
|
|
2017-07-22 19:36:13 +00:00
|
|
|
module NS_Emulation {
|
|
|
|
import from NS_Types all;
|
|
|
|
import from BSSGP_Types all;
|
2018-02-05 08:13:31 +00:00
|
|
|
import from Osmocom_Gb_Types all;
|
2017-07-22 19:36:13 +00:00
|
|
|
import from NS_CodecPort all;
|
|
|
|
import from NS_CodecPort_CtrlFunct all;
|
|
|
|
import from IPL4asp_Types all;
|
|
|
|
|
|
|
|
type record NsUnitdataRequest {
|
|
|
|
BssgpBvci bvci,
|
|
|
|
Nsei nsei,
|
2017-07-23 14:19:35 +00:00
|
|
|
octetstring sdu optional,
|
2018-02-05 08:13:31 +00:00
|
|
|
PDU_BSSGP bssgp optional
|
2017-07-23 14:19:35 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
template NsUnitdataRequest t_NsUdReq(template Nsei nsei, template BssgpBvci bvci, template octetstring sdu,
|
2018-02-05 08:13:31 +00:00
|
|
|
template PDU_BSSGP bssgp) := {
|
2017-07-23 14:19:35 +00:00
|
|
|
bvci := bvci,
|
|
|
|
nsei := nsei,
|
|
|
|
sdu := sdu,
|
|
|
|
bssgp := bssgp
|
2017-07-22 19:36:13 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
type record NsUnitdataIndication {
|
|
|
|
BssgpBvci bvci,
|
|
|
|
Nsei nsei,
|
2017-07-23 14:19:35 +00:00
|
|
|
octetstring sdu optional,
|
2018-02-05 08:13:31 +00:00
|
|
|
PDU_BSSGP bssgp optional
|
2017-07-23 14:19:35 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
template NsUnitdataIndication t_NsUdInd(Nsei nsei, BssgpBvci bvci, octetstring sdu) := {
|
|
|
|
bvci := bvci,
|
|
|
|
nsei := nsei,
|
|
|
|
sdu := sdu,
|
2018-02-05 08:13:31 +00:00
|
|
|
bssgp := dec_PDU_BSSGP(sdu)
|
2017-07-23 14:19:35 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
type record NsStatusIndication {
|
|
|
|
Nsei nsei,
|
|
|
|
Nsvci nsvci,
|
|
|
|
NseState old_state,
|
|
|
|
NseState new_state
|
|
|
|
}
|
|
|
|
|
|
|
|
template NsStatusIndication t_NsStsInd(Nsei nsei, Nsvci nsvci, NseState old_state, NseState state) := {
|
|
|
|
nsei := nsei,
|
|
|
|
nsvci := nsvci,
|
|
|
|
old_state := old_state,
|
|
|
|
new_state := state
|
2017-07-22 19:36:13 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
type enumerated NseState {
|
2017-07-23 14:19:35 +00:00
|
|
|
NSE_S_DEAD_BLOCKED,
|
|
|
|
NSE_S_WAIT_RESET,
|
|
|
|
NSE_S_ALIVE_BLOCKED,
|
|
|
|
NSE_S_ALIVE_UNBLOCKED
|
|
|
|
}
|
2017-07-22 19:36:13 +00:00
|
|
|
|
|
|
|
/* port from our (internal) point of view */
|
|
|
|
type port NS_SP_PT message {
|
|
|
|
in NsUnitdataRequest;
|
|
|
|
out NsUnitdataIndication,
|
2017-07-23 14:19:35 +00:00
|
|
|
NsStatusIndication,
|
2017-07-22 19:36:13 +00:00
|
|
|
ASP_Event;
|
|
|
|
} with { extension "internal" };
|
|
|
|
|
|
|
|
/* port from the user point of view */
|
|
|
|
type port NS_PT message {
|
|
|
|
in ASP_Event,
|
2017-07-23 14:19:35 +00:00
|
|
|
NsStatusIndication,
|
2017-07-22 19:36:13 +00:00
|
|
|
NsUnitdataIndication;
|
|
|
|
out NsUnitdataRequest;
|
|
|
|
} with { extension "internal" };
|
|
|
|
|
2018-07-30 22:30:11 +00:00
|
|
|
function NSStart(NSConfiguration init_config) runs on NS_CT {
|
|
|
|
config := init_config;
|
2017-07-22 19:36:13 +00:00
|
|
|
f_init();
|
|
|
|
f_ScanEvents();
|
|
|
|
}
|
|
|
|
|
|
|
|
private function f_init() runs on NS_CT {
|
2017-07-23 14:19:35 +00:00
|
|
|
var Result res;
|
|
|
|
/* Connect the UDP socket */
|
2018-07-30 22:30:11 +00:00
|
|
|
res := f_IPL4_connect(NSCP, config.remote_ip, config.remote_udp_port, config.local_ip, config.local_udp_port, 0, { udp := {}});
|
2018-05-23 18:27:02 +00:00
|
|
|
if (not ispresent(res.connId)) {
|
2018-11-06 18:00:50 +00:00
|
|
|
setverdict(fail, "Could not connect NS UDP socket from " &
|
|
|
|
config.local_ip & ":" & int2str(config.local_udp_port) &
|
|
|
|
" to " & config.remote_ip & ":" & int2str(config.remote_udp_port));
|
2018-07-05 15:35:03 +00:00
|
|
|
mtc.stop;
|
2018-05-23 18:27:02 +00:00
|
|
|
}
|
2017-07-23 14:19:35 +00:00
|
|
|
g_conn_id := res.connId;
|
|
|
|
f_change_state(NSE_S_DEAD_BLOCKED);
|
|
|
|
/* Send the first NS-ALIVE to test the connection */
|
2018-07-05 01:17:00 +00:00
|
|
|
if (not config.role_sgsn) {
|
|
|
|
f_sendReset();
|
|
|
|
}
|
2017-07-22 19:36:13 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
type component NS_CT {
|
|
|
|
/* UDP port towards the bottom (IUT) */
|
|
|
|
port NS_CODEC_PT NSCP;
|
|
|
|
/* NS-User SAP towards the user */
|
|
|
|
port NS_SP_PT NS_SP;
|
|
|
|
|
2018-07-30 22:30:11 +00:00
|
|
|
var NSConfiguration config;
|
|
|
|
|
2017-07-23 14:19:35 +00:00
|
|
|
var NseState g_state := NSE_S_DEAD_BLOCKED;
|
|
|
|
var ConnectionId g_conn_id := -1;
|
|
|
|
|
|
|
|
timer Tns_alive := 3.0;
|
|
|
|
timer Tns_test := 10.0;
|
|
|
|
timer Tns_block := 10.0;
|
2017-07-22 19:36:13 +00:00
|
|
|
}
|
|
|
|
|
2018-07-30 22:30:11 +00:00
|
|
|
type record NSConfiguration {
|
|
|
|
PortNumber local_udp_port,
|
|
|
|
charstring local_ip,
|
|
|
|
PortNumber remote_udp_port,
|
|
|
|
charstring remote_ip,
|
|
|
|
Nsvci nsvci,
|
2018-07-04 22:01:45 +00:00
|
|
|
Nsvci nsei,
|
|
|
|
boolean role_sgsn,
|
|
|
|
boolean handle_sns
|
2018-07-30 22:30:11 +00:00
|
|
|
}
|
2017-07-22 19:36:13 +00:00
|
|
|
|
2017-07-23 14:19:35 +00:00
|
|
|
private function f_change_state(NseState new_state) runs on NS_CT {
|
|
|
|
var NseState old_state := g_state;
|
|
|
|
g_state := new_state;
|
|
|
|
log("NS State Transition: ", old_state, " -> ", new_state);
|
2018-07-30 22:30:11 +00:00
|
|
|
NS_SP.send(t_NsStsInd(config.nsei, config.nsvci, old_state, new_state));
|
2017-07-23 14:19:35 +00:00
|
|
|
}
|
2017-07-22 19:36:13 +00:00
|
|
|
|
2017-07-23 14:19:35 +00:00
|
|
|
private function f_sendReset() runs on NS_CT {
|
2018-06-30 08:27:06 +00:00
|
|
|
NSCP.send(t_NS_Send(g_conn_id, ts_NS_RESET(NS_CAUSE_OM_INTERVENTION, config.nsvci, config.nsei)));
|
2017-07-23 14:19:35 +00:00
|
|
|
g_state := NSE_S_WAIT_RESET;
|
2017-07-22 19:36:13 +00:00
|
|
|
}
|
|
|
|
|
2017-07-23 14:19:35 +00:00
|
|
|
private function f_sendAlive() runs on NS_CT {
|
|
|
|
NSCP.send(t_NS_Send(g_conn_id, t_NS_ALIVE));
|
|
|
|
Tns_alive.start;
|
2017-07-22 19:36:13 +00:00
|
|
|
}
|
|
|
|
|
2017-07-23 14:19:35 +00:00
|
|
|
private function f_sendUnblock() runs on NS_CT {
|
|
|
|
NSCP.send(t_NS_Send(g_conn_id, t_NS_UNBLOCK));
|
|
|
|
Tns_block.start;
|
|
|
|
}
|
|
|
|
|
|
|
|
private function f_sendBlock(NsCause cause) runs on NS_CT {
|
2018-06-30 08:27:06 +00:00
|
|
|
NSCP.send(t_NS_Send(g_conn_id, ts_NS_BLOCK(cause, config.nsvci)));
|
2017-07-23 14:19:35 +00:00
|
|
|
Tns_block.start;
|
|
|
|
}
|
|
|
|
|
|
|
|
altstep as_allstate() runs on NS_CT {
|
|
|
|
var NS_RecvFrom rf;
|
|
|
|
var ASP_Event evt;
|
|
|
|
|
|
|
|
/* transition to DEAD if t_alive times out */
|
2018-03-02 20:40:03 +00:00
|
|
|
[Tns_alive.running] Tns_alive.timeout {
|
2017-07-23 14:19:35 +00:00
|
|
|
log("Tns-alive expired: changing to DEAD_BLOCKED + starting Tns-test");
|
|
|
|
f_change_state(NSE_S_DEAD_BLOCKED);
|
|
|
|
Tns_test.start;
|
2017-07-22 19:36:13 +00:00
|
|
|
}
|
|
|
|
|
2018-03-02 20:40:03 +00:00
|
|
|
[Tns_test.running] Tns_test.timeout {
|
2017-07-23 14:19:35 +00:00
|
|
|
log("Tns-test expired: sending NS-ALIVE");
|
|
|
|
f_sendAlive();
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Stop t_alive when receiving ALIVE-ACK */
|
|
|
|
[] NSCP.receive(t_NS_RecvFrom(t_NS_ALIVE_ACK)) {
|
|
|
|
log("NS-ALIVE-ACK received: stopping Tns-alive; starting Tns-test");
|
|
|
|
Tns_alive.stop;
|
|
|
|
Tns_test.start;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* respond to NS-ALIVE with NS-ALIVE-ACK */
|
|
|
|
[] NSCP.receive(t_NS_RecvFrom(t_NS_ALIVE)) {
|
|
|
|
NSCP.send(t_NS_Send(g_conn_id, t_NS_ALIVE_ACK));
|
2017-07-22 19:36:13 +00:00
|
|
|
}
|
|
|
|
|
2017-07-23 14:19:35 +00:00
|
|
|
/* Respond to BLOCK for wrong NSVCI */
|
2018-06-30 08:27:06 +00:00
|
|
|
[] NSCP.receive(t_NS_RecvFrom(tr_NS_BLOCK(?, ?))) -> value rf {
|
2017-07-23 14:19:35 +00:00
|
|
|
log("Rx NS-BLOCK for unknown NSVCI");
|
|
|
|
/* FIXME */
|
|
|
|
}
|
2017-07-22 19:36:13 +00:00
|
|
|
|
2017-07-23 14:19:35 +00:00
|
|
|
/* Respond to RESET with correct NSEI/NSVCI */
|
2018-06-30 08:27:06 +00:00
|
|
|
[] NSCP.receive(t_NS_RecvFrom(tr_NS_RESET(?, config.nsvci, config.nsei))) -> value rf {
|
2017-07-23 14:19:35 +00:00
|
|
|
f_change_state(NSE_S_ALIVE_BLOCKED);
|
2018-06-30 08:27:06 +00:00
|
|
|
NSCP.send(t_NS_Send(g_conn_id, ts_NS_RESET_ACK(config.nsvci, config.nsei)));
|
2017-07-23 14:19:35 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/* Respond to RESET with wrong NSEI/NSVCI */
|
2018-06-30 08:27:06 +00:00
|
|
|
[] NSCP.receive(t_NS_RecvFrom(tr_NS_RESET(?, ?, ?))) -> value rf {
|
2017-07-23 14:19:35 +00:00
|
|
|
log("Rx NS-RESET for unknown NSEI/NSVCI");
|
|
|
|
/* FIXME */
|
|
|
|
}
|
|
|
|
|
2018-07-04 22:01:45 +00:00
|
|
|
[config.role_sgsn and config.handle_sns] as_sns_sgsn();
|
|
|
|
|
2017-07-23 14:19:35 +00:00
|
|
|
/* default case of handling unknown PDUs */
|
|
|
|
[] NSCP.receive(t_NS_RecvFrom(?)) -> value rf {
|
|
|
|
log("Rx Unexpected NS PDU ", rf.msg," in state ", g_state);
|
2018-02-05 08:13:31 +00:00
|
|
|
NSCP.send(t_NS_Send(g_conn_id, ts_NS_STATUS(NS_CAUSE_PDU_NOT_COMPATIBLE_WITH_PROTOCOL_STATE, rf.msg)));
|
2017-07-23 14:19:35 +00:00
|
|
|
}
|
|
|
|
/* Forwarding of ASP_Evet to user */
|
|
|
|
[] NSCP.receive(ASP_Event:?) -> value evt { NS_SP.send(evt); }
|
2017-07-22 19:36:13 +00:00
|
|
|
}
|
|
|
|
|
2018-07-04 22:01:45 +00:00
|
|
|
/* simple IP Sub-Network Service responder for the SGSN side. This is not a full implementation
|
|
|
|
* of the protocol, merely sufficient to make the PCU/BSS side happy to proceed */
|
|
|
|
altstep as_sns_sgsn() runs on NS_CT {
|
|
|
|
var NS_RecvFrom rf;
|
|
|
|
[] NSCP.receive(t_NS_RecvFrom(tr_SNS_SIZE(config.nsei))) -> value rf {
|
|
|
|
/* blindly acknowledge whatever the PCU sends */
|
|
|
|
NSCP.send(t_NS_Send(g_conn_id, ts_SNS_SIZE_ACK(config.nsei, omit)));
|
|
|
|
}
|
|
|
|
[] NSCP.receive(t_NS_RecvFrom(tr_SNS_SIZE(?))) {
|
|
|
|
setverdict(fail, "SNS-SIZE from unexpected NSEI");
|
|
|
|
self.stop;
|
|
|
|
}
|
|
|
|
[] NSCP.receive(t_NS_RecvFrom(tr_SNS_CONFIG(config.nsei, true,
|
|
|
|
{tr_SNS_IPv4(config.remote_ip, config.remote_udp_port)}))) -> value rf {
|
|
|
|
/* blindly acknowledge whatever the PCU sends */
|
|
|
|
NSCP.send(t_NS_Send(g_conn_id, ts_SNS_CONFIG_ACK(config.nsei, omit)));
|
|
|
|
/* send a SNS-CONFIG in response and expect a SNS-CONFIG-ACK */
|
|
|
|
var IP4_Elements v4 := { valueof(ts_SNS_IPv4(config.local_ip, config.local_udp_port)) };
|
|
|
|
NSCP.send(t_NS_Send(g_conn_id, ts_SNS_CONFIG(config.nsei, true, v4)));
|
|
|
|
alt {
|
|
|
|
[] NSCP.receive(t_NS_RecvFrom(tr_SNS_CONFIG_ACK(config.nsei, omit))) {
|
|
|
|
/* success */
|
|
|
|
}
|
|
|
|
[] NSCP.receive(t_NS_RecvFrom(tr_SNS_CONFIG_ACK(config.nsei, ?))) {
|
|
|
|
setverdict(fail, "Unexpected SNS-CONFIG-NACK");
|
|
|
|
self.stop;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
[] NSCP.receive(t_NS_RecvFrom(tr_SNS_CONFIG(config.nsei, false, ?))) { /* ignore */}
|
|
|
|
[] NSCP.receive(t_NS_RecvFrom(tr_SNS_CONFIG(config.nsei, true, ?))) {
|
|
|
|
setverdict(fail, "Unexpected SNS-CONFIG content");
|
|
|
|
self.stop;
|
|
|
|
}
|
|
|
|
[] NSCP.receive(t_NS_RecvFrom(tr_SNS_CONFIG(?, ?, ?))) {
|
|
|
|
setverdict(fail, "SNS-CONFIG from unexpected NSEI");
|
|
|
|
self.stop;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-07-22 19:36:13 +00:00
|
|
|
private function f_ScanEvents() runs on NS_CT {
|
|
|
|
var NsUnitdataRequest ud_req;
|
|
|
|
var NS_RecvFrom rf;
|
2017-07-23 14:19:35 +00:00
|
|
|
var default d;
|
2017-07-22 19:36:13 +00:00
|
|
|
|
2017-07-23 14:19:35 +00:00
|
|
|
d := activate(as_allstate());
|
2017-07-22 19:36:13 +00:00
|
|
|
|
2017-07-23 14:19:35 +00:00
|
|
|
while (true) {
|
|
|
|
if (g_state == NSE_S_DEAD_BLOCKED) {
|
2017-07-22 19:36:13 +00:00
|
|
|
alt {
|
2017-07-23 14:19:35 +00:00
|
|
|
[false] any timer.timeout {}
|
|
|
|
}
|
|
|
|
} else if (g_state == NSE_S_WAIT_RESET) {
|
|
|
|
alt {
|
2018-06-30 08:27:06 +00:00
|
|
|
[] NSCP.receive(t_NS_RecvFrom(tr_NS_RESET_ACK(config.nsvci, config.nsei))) -> value rf {
|
2017-07-23 14:19:35 +00:00
|
|
|
f_change_state(NSE_S_ALIVE_BLOCKED);
|
|
|
|
f_sendAlive();
|
|
|
|
f_sendUnblock();
|
2017-07-22 19:36:13 +00:00
|
|
|
}
|
|
|
|
}
|
2017-07-23 14:19:35 +00:00
|
|
|
} else if (g_state == NSE_S_ALIVE_BLOCKED) {
|
2017-07-22 19:36:13 +00:00
|
|
|
alt {
|
2017-07-23 14:19:35 +00:00
|
|
|
/* bogus block, just respond with ACK */
|
2018-06-30 08:27:06 +00:00
|
|
|
[] NSCP.receive(t_NS_RecvFrom(tr_NS_BLOCK(?, config.nsvci))) -> value rf {
|
|
|
|
NSCP.send(t_NS_Send(g_conn_id, ts_NS_BLOCK_ACK(config.nsvci)));
|
2017-07-22 19:36:13 +00:00
|
|
|
}
|
2017-07-23 14:19:35 +00:00
|
|
|
/* Respond to UNBLOCK with UNBLOCK-ACK + change state */
|
2017-07-22 19:36:13 +00:00
|
|
|
[] NSCP.receive(t_NS_RecvFrom(t_NS_UNBLOCK)) -> value rf {
|
2017-07-23 14:19:35 +00:00
|
|
|
NSCP.send(t_NS_Send(g_conn_id, t_NS_UNBLOCK_ACK));
|
|
|
|
Tns_block.stop;
|
|
|
|
f_change_state(NSE_S_ALIVE_UNBLOCKED);
|
|
|
|
}
|
|
|
|
[] NSCP.receive(t_NS_RecvFrom(t_NS_UNBLOCK_ACK)) -> value rf {
|
|
|
|
Tns_block.stop;
|
|
|
|
f_change_state(NSE_S_ALIVE_UNBLOCKED);
|
2017-07-22 19:36:13 +00:00
|
|
|
}
|
2017-07-23 14:19:35 +00:00
|
|
|
[] Tns_block.timeout {
|
|
|
|
/* repeat unblock transmission */
|
|
|
|
f_sendUnblock();
|
2017-07-22 19:36:13 +00:00
|
|
|
}
|
|
|
|
}
|
2017-07-23 14:19:35 +00:00
|
|
|
} else if (g_state == NSE_S_ALIVE_UNBLOCKED) {
|
2017-07-22 19:36:13 +00:00
|
|
|
alt {
|
2017-07-23 14:19:35 +00:00
|
|
|
/* bogus unblock, just respond with ACK */
|
|
|
|
[] NSCP.receive(t_NS_RecvFrom(t_NS_UNBLOCK)) -> value rf {
|
|
|
|
NSCP.send(t_NS_Send(g_conn_id, t_NS_UNBLOCK_ACK));
|
|
|
|
}
|
|
|
|
/* Respond to BLOCK with BLOCK-ACK + change state */
|
2018-06-30 08:27:06 +00:00
|
|
|
[] NSCP.receive(t_NS_RecvFrom(tr_NS_BLOCK(?, config.nsvci))) -> value rf {
|
|
|
|
NSCP.send(t_NS_Send(g_conn_id, ts_NS_BLOCK_ACK(config.nsvci)));
|
2017-07-23 14:19:35 +00:00
|
|
|
Tns_block.stop;
|
|
|
|
f_change_state(NSE_S_ALIVE_BLOCKED);
|
|
|
|
}
|
2018-06-30 08:27:06 +00:00
|
|
|
[] NSCP.receive(t_NS_RecvFrom(tr_NS_BLOCK_ACK(config.nsvci))) -> value rf {
|
2017-07-23 14:19:35 +00:00
|
|
|
Tns_block.stop;
|
|
|
|
}
|
|
|
|
/* NS-UNITDATA PDU from network to NS-UNITDATA.ind to user */
|
2018-06-30 08:27:06 +00:00
|
|
|
[] NSCP.receive(t_NS_RecvFrom(tr_NS_UNITDATA(?, ?, ?))) -> value rf {
|
2018-07-30 22:30:11 +00:00
|
|
|
NS_SP.send(t_NsUdInd(config.nsei,
|
2018-02-05 08:13:31 +00:00
|
|
|
oct2int(rf.msg.pDU_NS_Unitdata.bVCI),
|
|
|
|
rf.msg.pDU_NS_Unitdata.nS_SDU));
|
2017-07-23 14:19:35 +00:00
|
|
|
}
|
|
|
|
/* NS-UNITDATA.req from user to NS-UNITDATA PDU on network */
|
2018-07-30 22:30:11 +00:00
|
|
|
[] NS_SP.receive(t_NsUdReq(config.nsei, ?, ?, omit)) -> value ud_req {
|
2017-07-23 14:19:35 +00:00
|
|
|
/* using raw octetstring PDU */
|
2018-06-30 08:27:06 +00:00
|
|
|
NSCP.send(t_NS_Send(g_conn_id, ts_NS_UNITDATA(t_SduCtrlB, ud_req.bvci, ud_req.sdu)));
|
2017-07-23 14:19:35 +00:00
|
|
|
}
|
2018-07-30 22:30:11 +00:00
|
|
|
[] NS_SP.receive(t_NsUdReq(config.nsei, ?, omit, ?)) -> value ud_req {
|
2017-07-23 14:19:35 +00:00
|
|
|
/* using decoded BSSGP PDU that we need to encode first */
|
2018-02-05 08:13:31 +00:00
|
|
|
var octetstring enc := enc_PDU_BSSGP(ud_req.bssgp);
|
2018-06-30 08:27:06 +00:00
|
|
|
NSCP.send(t_NS_Send(g_conn_id, ts_NS_UNITDATA(t_SduCtrlB, ud_req.bvci, enc)));
|
2017-07-23 14:19:35 +00:00
|
|
|
}
|
2017-07-22 19:36:13 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-07-23 14:19:35 +00:00
|
|
|
} /* while */
|
|
|
|
//deactivate(d);
|
2017-07-22 19:36:13 +00:00
|
|
|
}
|
|
|
|
}
|