msc: add MSC_Tests.TC_call_re_establishment_ciph
Invoke TC_call_re_establishment with ciphering required.
Related: SYS#5130
Change-Id: I8bbe53fc9fced3e455aa30c571ef7684890adb99
diff --git a/msc/MSC_Tests.ttcn b/msc/MSC_Tests.ttcn
index dae27d0..db96d60 100644
--- a/msc/MSC_Tests.ttcn
+++ b/msc/MSC_Tests.ttcn
@@ -6774,6 +6774,29 @@
vc_conn2.done;
}
+testcase TC_call_re_establishment_ciph() runs on MTC_CT {
+ var BSC_ConnHdlr vc_conn1;
+ var BSC_ConnHdlr vc_conn2;
+ f_init();
+
+ f_vty_config(MSCVTY, "network", "authentication required");
+ f_vty_config(MSCVTY, "network", "encryption a5 3");
+
+ var BSC_ConnHdlrPars pars1 := f_init_pars(92);
+ pars1.net.expect_auth := true;
+ pars1.net.expect_ciph := true;
+ pars1.net.kc_support := '08'O; /* A5/3 only */
+ var BSC_ConnHdlrPars pars2 := pars1;
+
+ vc_conn1 := f_start_handler_create(pars1);
+ vc_conn2 := f_start_handler_create(pars2);
+ connect(vc_conn1:COORD, vc_conn2:COORD);
+ f_start_handler_run(vc_conn1, refers(f_tc_call_re_establishment_1), pars1);
+ f_start_handler_run(vc_conn2, refers(f_tc_call_re_establishment_2), pars2);
+ vc_conn1.done;
+ vc_conn2.done;
+}
+
control {
execute( TC_cr_before_reset() );
execute( TC_lu_imsi_noauth_tmsi() );
@@ -6935,6 +6958,7 @@
execute( TC_call_re_establishment() );
execute( TC_call_re_establishment_auth() );
+ execute( TC_call_re_establishment_ciph() );
}