700 lines
21 KiB
C
700 lines
21 KiB
C
/* (C) 2016 by sysmocom s.f.m.c. GmbH <info@sysmocom.de>
|
|
* All Rights Reserved
|
|
*
|
|
* Author: Neels Hofmeyr <nhofmeyr@sysmocom.de>
|
|
*
|
|
* This program is free software; you can redistribute it and/or modify
|
|
* it under the terms of the GNU Affero General Public License as published by
|
|
* the Free Software Foundation; either version 3 of the License, or
|
|
* (at your option) any later version.
|
|
*
|
|
* This program is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU Affero General Public License
|
|
* along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
*
|
|
*/
|
|
|
|
#include <stdio.h>
|
|
#include <string.h>
|
|
#include <inttypes.h>
|
|
#include <getopt.h>
|
|
|
|
#include <osmocom/core/application.h>
|
|
#include <osmocom/core/utils.h>
|
|
#include <osmocom/core/logging.h>
|
|
|
|
#include <osmocom/crypt/auth.h>
|
|
|
|
#include <osmocom/hlr/logging.h>
|
|
#include <osmocom/hlr/auc.h>
|
|
|
|
#define comment_start() fprintf(stderr, "\n===== %s\n", __func__);
|
|
#define comment_end() fprintf(stderr, "===== %s: SUCCESS\n\n", __func__);
|
|
|
|
#define VERBOSE_ASSERT(val, expect_op, fmt) \
|
|
do { \
|
|
fprintf(stderr, #val " == " fmt "\n", (val)); \
|
|
OSMO_ASSERT((val) expect_op); \
|
|
} while (0);
|
|
|
|
char *vec_str(const struct osmo_auth_vector *vec)
|
|
{
|
|
static char buf[1024];
|
|
char *pos = buf;
|
|
char *end = buf + sizeof(buf);
|
|
|
|
#define append(what) \
|
|
if (pos >= end) \
|
|
return buf; \
|
|
pos += snprintf(pos, sizeof(buf) - (pos - buf), \
|
|
" " #what ": %s\n", \
|
|
osmo_hexdump_nospc((void*)&vec->what, sizeof(vec->what)))
|
|
|
|
append(rand);
|
|
append(autn);
|
|
append(ck);
|
|
append(ik);
|
|
append(res);
|
|
append(res_len);
|
|
append(kc);
|
|
append(sres);
|
|
append(auth_types);
|
|
#undef append
|
|
|
|
return buf;
|
|
}
|
|
|
|
#define VEC_IS(vec, expect) do { \
|
|
char *_is = vec_str(vec); \
|
|
if (strcmp(_is, expect)) { \
|
|
fprintf(stderr, "MISMATCH! expected ==\n%s\n", \
|
|
expect); \
|
|
char *a = _is; \
|
|
char *b = expect; \
|
|
for (; *a && *b; a++, b++) { \
|
|
if (*a != *b) { \
|
|
fprintf(stderr, "mismatch at %d:\n", \
|
|
(int)(a - _is)); \
|
|
while (a > _is && *(a-1) != '\n') { \
|
|
fprintf(stderr, " "); \
|
|
a--; \
|
|
} \
|
|
fprintf(stderr, "v\n%s", a); \
|
|
break; \
|
|
} \
|
|
} \
|
|
OSMO_ASSERT(false); \
|
|
} else \
|
|
fprintf(stderr, "vector matches expectations\n"); \
|
|
} while (0)
|
|
|
|
uint8_t fake_rand[16] = { 0 };
|
|
bool fake_rand_fixed = true;
|
|
|
|
void next_rand(const char *hexstr, bool fixed)
|
|
{
|
|
osmo_hexparse(hexstr, fake_rand, sizeof(fake_rand));
|
|
fake_rand_fixed = fixed;
|
|
}
|
|
|
|
int rand_get(uint8_t *rand, unsigned int len)
|
|
{
|
|
int i;
|
|
OSMO_ASSERT(len <= sizeof(fake_rand));
|
|
memcpy(rand, fake_rand, len);
|
|
if (!fake_rand_fixed) {
|
|
for (i = 0; i < len; i++)
|
|
fake_rand[i] += 0x11;
|
|
}
|
|
return len;
|
|
}
|
|
|
|
/* Subscriber with 2G-only (COMP128v1) authentication data */
|
|
static void test_gen_vectors_2g_only(void)
|
|
{
|
|
struct osmo_sub_auth_data2 aud2g;
|
|
struct osmo_sub_auth_data2 aud3g;
|
|
struct osmo_auth_vector vec;
|
|
int rc;
|
|
|
|
comment_start();
|
|
|
|
aud2g = (struct osmo_sub_auth_data2){
|
|
.type = OSMO_AUTH_TYPE_GSM,
|
|
.algo = OSMO_AUTH_ALG_COMP128v1,
|
|
};
|
|
|
|
osmo_hexparse("EB215756028D60E3275E613320AEC880",
|
|
aud2g.u.gsm.ki, sizeof(aud2g.u.gsm.ki));
|
|
|
|
aud3g = (struct osmo_sub_auth_data2){ 0 };
|
|
|
|
next_rand("39fa2f4e3d523d8619a73b4f65c3e14d", true);
|
|
|
|
vec = (struct osmo_auth_vector){ {0} };
|
|
VERBOSE_ASSERT(aud3g.u.umts.sqn, == 0, "%"PRIu64);
|
|
rc = auc_compute_vectors(&vec, 1, &aud2g, &aud3g, NULL, NULL);
|
|
VERBOSE_ASSERT(rc, == 1, "%d");
|
|
|
|
VEC_IS(&vec,
|
|
" rand: 39fa2f4e3d523d8619a73b4f65c3e14d\n"
|
|
" autn: 00000000000000000000000000000000\n"
|
|
" ck: 00000000000000000000000000000000\n"
|
|
" ik: 00000000000000000000000000000000\n"
|
|
" res: 00000000000000000000000000000000\n"
|
|
" res_len: 00\n"
|
|
" kc: 241a5b16aeb8e400\n"
|
|
" sres: 429d5b27\n"
|
|
" auth_types: 01000000\n"
|
|
);
|
|
|
|
VERBOSE_ASSERT(aud3g.u.umts.sqn, == 0, "%"PRIu64);
|
|
|
|
/* even though vec is not zero-initialized, it should produce the same
|
|
* result (regardless of the umts sequence nr) */
|
|
aud3g.u.umts.sqn = 123;
|
|
rc = auc_compute_vectors(&vec, 1, &aud2g, &aud3g, NULL, NULL);
|
|
VERBOSE_ASSERT(rc, == 1, "%d");
|
|
|
|
VEC_IS(&vec,
|
|
" rand: 39fa2f4e3d523d8619a73b4f65c3e14d\n"
|
|
" autn: 00000000000000000000000000000000\n"
|
|
" ck: 00000000000000000000000000000000\n"
|
|
" ik: 00000000000000000000000000000000\n"
|
|
" res: 00000000000000000000000000000000\n"
|
|
" res_len: 00\n"
|
|
" kc: 241a5b16aeb8e400\n"
|
|
" sres: 429d5b27\n"
|
|
" auth_types: 01000000\n"
|
|
);
|
|
|
|
comment_end();
|
|
}
|
|
|
|
/* Subscriber with separate 2G (COMP128v1) and 3G (MILENAGE) authentication data,
|
|
* reflects the default configuration of sysmoUSIM-SJS1 */
|
|
static void test_gen_vectors_2g_plus_3g(void)
|
|
{
|
|
struct osmo_sub_auth_data2 aud2g;
|
|
struct osmo_sub_auth_data2 aud3g;
|
|
struct osmo_auth_vector vec;
|
|
int rc;
|
|
|
|
comment_start();
|
|
|
|
aud2g = (struct osmo_sub_auth_data2){
|
|
.type = OSMO_AUTH_TYPE_GSM,
|
|
.algo = OSMO_AUTH_ALG_COMP128v1,
|
|
};
|
|
|
|
osmo_hexparse("EB215756028D60E3275E613320AEC880",
|
|
aud2g.u.gsm.ki, sizeof(aud2g.u.gsm.ki));
|
|
|
|
aud3g = (struct osmo_sub_auth_data2){
|
|
.type = OSMO_AUTH_TYPE_UMTS,
|
|
.algo = OSMO_AUTH_ALG_MILENAGE,
|
|
.u.umts.k_len = 16,
|
|
.u.umts.opc_len = 16,
|
|
.u.umts.sqn = 31,
|
|
};
|
|
|
|
osmo_hexparse("EB215756028D60E3275E613320AEC880",
|
|
aud3g.u.umts.k, sizeof(aud3g.u.umts.k));
|
|
osmo_hexparse("FB2A3D1B360F599ABAB99DB8669F8308",
|
|
aud3g.u.umts.opc, sizeof(aud3g.u.umts.opc));
|
|
next_rand("39fa2f4e3d523d8619a73b4f65c3e14d", true);
|
|
|
|
vec = (struct osmo_auth_vector){ {0} };
|
|
VERBOSE_ASSERT(aud3g.u.umts.sqn, == 31, "%"PRIu64);
|
|
rc = auc_compute_vectors(&vec, 1, &aud2g, &aud3g, NULL, NULL);
|
|
VERBOSE_ASSERT(rc, == 1, "%d");
|
|
VERBOSE_ASSERT(aud3g.u.umts.sqn, == 32, "%"PRIu64);
|
|
|
|
VEC_IS(&vec,
|
|
" rand: 39fa2f4e3d523d8619a73b4f65c3e14d\n"
|
|
" autn: 8704f5ba55d30000541dde77ea5b1d8c\n"
|
|
" ck: f64735036e5871319c679f4742a75ea1\n"
|
|
" ik: 27497388b6cb044648f396aa155b95ef\n"
|
|
" res: e229c19e791f2e410000000000000000\n"
|
|
" res_len: 08\n"
|
|
" kc: 241a5b16aeb8e400\n"
|
|
" sres: 429d5b27\n"
|
|
" auth_types: 03000000\n"
|
|
);
|
|
|
|
/* even though vec is not zero-initialized, it should produce the same
|
|
* result with the same sequence nr */
|
|
aud3g.u.umts.sqn = 31;
|
|
VERBOSE_ASSERT(aud3g.u.umts.sqn, == 31, "%"PRIu64);
|
|
rc = auc_compute_vectors(&vec, 1, &aud2g, &aud3g, NULL, NULL);
|
|
VERBOSE_ASSERT(rc, == 1, "%d");
|
|
VERBOSE_ASSERT(aud3g.u.umts.sqn, == 32, "%"PRIu64);
|
|
|
|
VEC_IS(&vec,
|
|
" rand: 39fa2f4e3d523d8619a73b4f65c3e14d\n"
|
|
" autn: 8704f5ba55d30000541dde77ea5b1d8c\n"
|
|
" ck: f64735036e5871319c679f4742a75ea1\n"
|
|
" ik: 27497388b6cb044648f396aa155b95ef\n"
|
|
" res: e229c19e791f2e410000000000000000\n"
|
|
" res_len: 08\n"
|
|
" kc: 241a5b16aeb8e400\n"
|
|
" sres: 429d5b27\n"
|
|
" auth_types: 03000000\n"
|
|
);
|
|
|
|
comment_end();
|
|
}
|
|
|
|
void _test_gen_vectors_3g_only__expect_vecs(struct osmo_auth_vector vecs[3])
|
|
{
|
|
fprintf(stderr, "[0]: ");
|
|
VEC_IS(&vecs[0],
|
|
" rand: 897210a0f7de278f0b8213098e098a3f\n"
|
|
" autn: c6b9790dad4b00000cf322869ea6a481\n"
|
|
" ck: e9922bd036718ed9e40bd1d02c3b81a5\n"
|
|
" ik: f19c20ca863137f8892326d959ec5e01\n"
|
|
" res: 9af5a557902d2db80000000000000000\n"
|
|
" res_len: 08\n"
|
|
" kc: 7526fc13c5976685\n"
|
|
" sres: 0ad888ef\n"
|
|
" auth_types: 03000000\n"
|
|
);
|
|
fprintf(stderr, "[1]: ");
|
|
VEC_IS(&vecs[1],
|
|
" rand: 9a8321b108ef38a01c93241a9f1a9b50\n"
|
|
" autn: 79a5113eb0910000be6020540503ffc5\n"
|
|
" ck: 3686f05df057d1899c66ae4eb18cf941\n"
|
|
" ik: 79f21ed53bcb47787de57d136ff803a5\n"
|
|
" res: 43023475cb29292c0000000000000000\n"
|
|
" res_len: 08\n"
|
|
" kc: aef73dd515e86c15\n"
|
|
" sres: 882b1d59\n"
|
|
" auth_types: 03000000\n"
|
|
);
|
|
fprintf(stderr, "[2]: ");
|
|
VEC_IS(&vecs[2],
|
|
" rand: ab9432c2190049b12da4352bb02bac61\n"
|
|
" autn: 24b018d46c3b00009c7e1b47f3a19b2b\n"
|
|
" ck: d86c3191a36fc0602e48202ef2080964\n"
|
|
" ik: 648dab72016181406243420649e63dc9\n"
|
|
" res: 010cab11cc63a6e40000000000000000\n"
|
|
" res_len: 08\n"
|
|
" kc: f0eaf8cb19e0758d\n"
|
|
" sres: cd6f0df5\n"
|
|
" auth_types: 03000000\n"
|
|
);
|
|
}
|
|
|
|
/* Subscriber with only 3G (MILENAGE) authentication data,
|
|
* reflects the default configuration of sysmoISIM-SJA2. Resulting
|
|
* tuples are suitable for both 2G and 3G authentication */
|
|
static void test_gen_vectors_3g_only(void)
|
|
{
|
|
struct osmo_sub_auth_data2 aud2g;
|
|
struct osmo_sub_auth_data2 aud3g;
|
|
struct osmo_auth_vector vec;
|
|
struct osmo_auth_vector vecs[3];
|
|
uint8_t auts[14];
|
|
uint8_t rand_auts[16];
|
|
int rc;
|
|
|
|
comment_start();
|
|
|
|
aud2g = (struct osmo_sub_auth_data2){ 0 };
|
|
|
|
aud3g = (struct osmo_sub_auth_data2){
|
|
.type = OSMO_AUTH_TYPE_UMTS,
|
|
.algo = OSMO_AUTH_ALG_MILENAGE,
|
|
.u.umts.k_len = 16,
|
|
.u.umts.opc_len = 16,
|
|
.u.umts.sqn = 31,
|
|
};
|
|
|
|
osmo_hexparse("EB215756028D60E3275E613320AEC880",
|
|
aud3g.u.umts.k, sizeof(aud3g.u.umts.k));
|
|
osmo_hexparse("FB2A3D1B360F599ABAB99DB8669F8308",
|
|
aud3g.u.umts.opc, sizeof(aud3g.u.umts.opc));
|
|
next_rand("39fa2f4e3d523d8619a73b4f65c3e14d", true);
|
|
|
|
vec = (struct osmo_auth_vector){ {0} };
|
|
VERBOSE_ASSERT(aud3g.u.umts.sqn, == 31, "%"PRIu64);
|
|
rc = auc_compute_vectors(&vec, 1, &aud2g, &aud3g, NULL, NULL);
|
|
VERBOSE_ASSERT(rc, == 1, "%d");
|
|
VERBOSE_ASSERT(aud3g.u.umts.sqn, == 32, "%"PRIu64);
|
|
|
|
VEC_IS(&vec,
|
|
" rand: 39fa2f4e3d523d8619a73b4f65c3e14d\n"
|
|
" autn: 8704f5ba55d30000541dde77ea5b1d8c\n"
|
|
" ck: f64735036e5871319c679f4742a75ea1\n"
|
|
" ik: 27497388b6cb044648f396aa155b95ef\n"
|
|
" res: e229c19e791f2e410000000000000000\n"
|
|
" res_len: 08\n"
|
|
" kc: 059a4f668f6fbe39\n"
|
|
" sres: 9b36efdf\n"
|
|
" auth_types: 03000000\n"
|
|
);
|
|
|
|
/* Note: 3GPP TS 33.102 6.8.1.2: c3 function to get GSM auth is
|
|
* KC[0..7] == CK[0..7] ^ CK[8..15] ^ IK[0..7] ^ IK[8..15]
|
|
* In [16]: hex( 0xf64735036e587131
|
|
* ^ 0x9c679f4742a75ea1
|
|
* ^ 0x27497388b6cb0446
|
|
* ^ 0x48f396aa155b95ef)
|
|
* Out[16]: '0x59a4f668f6fbe39L'
|
|
* hence expecting kc: 059a4f668f6fbe39
|
|
*/
|
|
|
|
/* even though vec is not zero-initialized, it should produce the same
|
|
* result with the same sequence nr */
|
|
aud3g.u.umts.sqn = 31;
|
|
VERBOSE_ASSERT(aud3g.u.umts.sqn, == 31, "%"PRIu64);
|
|
rc = auc_compute_vectors(&vec, 1, &aud2g, &aud3g, NULL, NULL);
|
|
VERBOSE_ASSERT(rc, == 1, "%d");
|
|
VERBOSE_ASSERT(aud3g.u.umts.sqn, == 32, "%"PRIu64);
|
|
|
|
VEC_IS(&vec,
|
|
" rand: 39fa2f4e3d523d8619a73b4f65c3e14d\n"
|
|
" autn: 8704f5ba55d30000541dde77ea5b1d8c\n"
|
|
" ck: f64735036e5871319c679f4742a75ea1\n"
|
|
" ik: 27497388b6cb044648f396aa155b95ef\n"
|
|
" res: e229c19e791f2e410000000000000000\n"
|
|
" res_len: 08\n"
|
|
" kc: 059a4f668f6fbe39\n"
|
|
" sres: 9b36efdf\n"
|
|
" auth_types: 03000000\n"
|
|
);
|
|
|
|
|
|
fprintf(stderr, "- test AUTS resync\n");
|
|
vec = (struct osmo_auth_vector){};
|
|
aud3g.u.umts.sqn = 31;
|
|
VERBOSE_ASSERT(aud3g.u.umts.sqn, == 31, "%"PRIu64);
|
|
|
|
/* The AUTN sent was 8704f5ba55f30000d2ee44b22c8ea919
|
|
* with the first 6 bytes being SQN ^ AK.
|
|
* K = EB215756028D60E3275E613320AEC880
|
|
* OPC = FB2A3D1B360F599ABAB99DB8669F8308
|
|
* RAND = 39fa2f4e3d523d8619a73b4f65c3e14d
|
|
* --milenage-f5-->
|
|
* AK = 8704f5ba55f3
|
|
*
|
|
* The first six bytes are 8704f5ba55f3,
|
|
* and 8704f5ba55f3 ^ AK = 0.
|
|
* --> SQN = 0.
|
|
*
|
|
* Say the USIM doesn't like that, let's say it is at SQN 23.
|
|
* SQN_MS = 000000000017
|
|
*
|
|
* AUTS = Conc(SQN_MS) || MAC-S
|
|
* Conc(SQN_MS) = SQN_MS ⊕ f5*[K](RAND)
|
|
* MAC-S = f1*[K] (SQN MS || RAND || AMF)
|
|
*
|
|
* f5*--> Conc(SQN_MS) = 000000000017 ^ 979498b1f73a
|
|
* = 979498b1f72d
|
|
* AMF = 0000 (TS 33.102 v7.0.0, 6.3.3)
|
|
*
|
|
* MAC-S = f1*[K] (000000000017 || 39fa2f4e3d523d8619a73b4f65c3e14d || 0000)
|
|
* = 3e28c59fa2e72f9c
|
|
*
|
|
* AUTS = 979498b1f72d || 3e28c59fa2e72f9c
|
|
*
|
|
* verify valid AUTS resulting in SQN 23 with:
|
|
* osmo-auc-gen -3 -a milenage -k EB215756028D60E3275E613320AEC880 \
|
|
* -o FB2A3D1B360F599ABAB99DB8669F8308 \
|
|
* -r 39fa2f4e3d523d8619a73b4f65c3e14d \
|
|
* -A 979498b1f72d3e28c59fa2e72f9c
|
|
*/
|
|
|
|
/* AUTS response by USIM */
|
|
osmo_hexparse("979498b1f72d3e28c59fa2e72f9c",
|
|
auts, sizeof(auts));
|
|
/* RAND sent to USIM, which AUTS was generated from */
|
|
osmo_hexparse("39fa2f4e3d523d8619a73b4f65c3e14d",
|
|
rand_auts, sizeof(rand_auts));
|
|
/* new RAND token for the next key */
|
|
next_rand("897210a0f7de278f0b8213098e098a3f", true);
|
|
rc = auc_compute_vectors(&vec, 1, &aud2g, &aud3g, rand_auts, auts);
|
|
VERBOSE_ASSERT(rc, == 1, "%d");
|
|
/* The USIM's last sqn was 23, the calculated vector was 24 */
|
|
VERBOSE_ASSERT(aud3g.u.umts.sqn, == 24, "%"PRIu64);
|
|
|
|
VEC_IS(&vec,
|
|
" rand: 897210a0f7de278f0b8213098e098a3f\n"
|
|
" autn: c6b9790dad4b00000cf322869ea6a481\n"
|
|
" ck: e9922bd036718ed9e40bd1d02c3b81a5\n"
|
|
" ik: f19c20ca863137f8892326d959ec5e01\n"
|
|
" res: 9af5a557902d2db80000000000000000\n"
|
|
" res_len: 08\n"
|
|
" kc: 7526fc13c5976685\n"
|
|
" sres: 0ad888ef\n"
|
|
" auth_types: 03000000\n"
|
|
);
|
|
|
|
|
|
fprintf(stderr, "- verify N vectors with AUTS resync"
|
|
" == N vectors without AUTS\n"
|
|
"First just set rand and sqn = 23, and compute 3 vectors\n");
|
|
next_rand("897210a0f7de278f0b8213098e098a3f", false);
|
|
aud3g.u.umts.sqn = 23;
|
|
VERBOSE_ASSERT(aud3g.u.umts.sqn, == 23, "%"PRIu64);
|
|
|
|
memset(vecs, 0, sizeof(vecs));
|
|
rc = auc_compute_vectors(vecs, 3, &aud2g, &aud3g, NULL, NULL);
|
|
VERBOSE_ASSERT(rc, == 3, "%d");
|
|
VERBOSE_ASSERT(aud3g.u.umts.sqn, == 26, "%"PRIu64);
|
|
|
|
_test_gen_vectors_3g_only__expect_vecs(vecs);
|
|
|
|
fprintf(stderr, "Now reach sqn = 23 with AUTS and expect the same\n");
|
|
/* AUTS response by USIM */
|
|
osmo_hexparse("979498b1f72d3e28c59fa2e72f9c",
|
|
auts, sizeof(auts));
|
|
/* RAND sent to USIM, which AUTS was generated from */
|
|
osmo_hexparse("39fa2f4e3d523d8619a73b4f65c3e14d",
|
|
rand_auts, sizeof(rand_auts));
|
|
next_rand("897210a0f7de278f0b8213098e098a3f", false);
|
|
rc = auc_compute_vectors(vecs, 3, &aud2g, &aud3g, rand_auts, auts);
|
|
|
|
_test_gen_vectors_3g_only__expect_vecs(vecs);
|
|
|
|
comment_end();
|
|
}
|
|
|
|
/* Subscriber with only 3G (XOR) authentication data,
|
|
* reflects the default configuration of sysmoTSIM-SJAx as well
|
|
* as many "Test USIM" cards. Resulting tuples are suitable for both
|
|
* 2G and 3G authentication */
|
|
static void test_gen_vectors_3g_xor(void)
|
|
{
|
|
struct osmo_sub_auth_data2 aud2g;
|
|
struct osmo_sub_auth_data2 aud3g;
|
|
struct osmo_auth_vector vec;
|
|
int rc;
|
|
|
|
comment_start();
|
|
|
|
aud2g = (struct osmo_sub_auth_data2){ 0 };
|
|
|
|
aud3g = (struct osmo_sub_auth_data2){
|
|
.type = OSMO_AUTH_TYPE_UMTS,
|
|
.algo = OSMO_AUTH_ALG_XOR_3G,
|
|
.u.umts.k_len = 16,
|
|
.u.umts.opc_len = 16,
|
|
.u.umts.sqn = 0,
|
|
};
|
|
|
|
osmo_hexparse("000102030405060708090a0b0c0d0e0f",
|
|
aud3g.u.umts.k, sizeof(aud3g.u.umts.k));
|
|
osmo_hexparse("00000000000000000000000000000000",
|
|
aud3g.u.umts.opc, sizeof(aud3g.u.umts.opc));
|
|
next_rand("b5039c57e4a75051551d1a390a71ce48", true);
|
|
|
|
vec = (struct osmo_auth_vector){ {0} };
|
|
VERBOSE_ASSERT(aud3g.u.umts.sqn, == 0, "%"PRIu64);
|
|
rc = auc_compute_vectors(&vec, 1, &aud2g, &aud3g, NULL, NULL);
|
|
VERBOSE_ASSERT(rc, == 1, "%d");
|
|
VERBOSE_ASSERT(aud3g.u.umts.sqn, == 0, "%"PRIu64);
|
|
|
|
VEC_IS(&vec,
|
|
" rand: b5039c57e4a75051551d1a390a71ce48\n"
|
|
" autn: 54e0a256565d0000b5029e54e0a25656\n"
|
|
" ck: 029e54e0a256565d141032067cc047b5\n"
|
|
" ik: 9e54e0a256565d141032067cc047b502\n"
|
|
" res: b5029e54e0a256565d141032067cc047\n"
|
|
" res_len: 10\n"
|
|
" kc: 98e880384887f9fe\n"
|
|
" sres: 0ec81877\n"
|
|
" auth_types: 03000000\n"
|
|
);
|
|
|
|
comment_end();
|
|
}
|
|
|
|
/* Test a variety of invalid authentication data combinations */
|
|
void test_gen_vectors_bad_args(void)
|
|
{
|
|
struct osmo_auth_vector vec;
|
|
uint8_t auts[14];
|
|
uint8_t rand_auts[16];
|
|
int rc;
|
|
int i;
|
|
|
|
struct osmo_sub_auth_data2 aud2g = {
|
|
.type = OSMO_AUTH_TYPE_GSM,
|
|
.algo = OSMO_AUTH_ALG_COMP128v1,
|
|
};
|
|
|
|
struct osmo_sub_auth_data2 aud3g = {
|
|
.type = OSMO_AUTH_TYPE_UMTS,
|
|
.algo = OSMO_AUTH_ALG_MILENAGE,
|
|
.u.umts.k_len = 16,
|
|
.u.umts.opc_len = 16,
|
|
};
|
|
|
|
struct osmo_sub_auth_data2 aud2g_noalg = {
|
|
.type = OSMO_AUTH_TYPE_GSM,
|
|
.algo = OSMO_AUTH_ALG_NONE,
|
|
};
|
|
|
|
struct osmo_sub_auth_data2 aud3g_noalg = {
|
|
.type = OSMO_AUTH_TYPE_UMTS,
|
|
.algo = OSMO_AUTH_ALG_NONE,
|
|
.u.umts.k_len = 16,
|
|
.u.umts.opc_len = 16,
|
|
};
|
|
|
|
struct osmo_sub_auth_data2 aud_notype = {
|
|
.type = OSMO_AUTH_TYPE_NONE,
|
|
.algo = OSMO_AUTH_ALG_MILENAGE,
|
|
};
|
|
|
|
struct osmo_sub_auth_data2 no_aud = {
|
|
.type = OSMO_AUTH_TYPE_NONE,
|
|
.algo = OSMO_AUTH_ALG_NONE,
|
|
};
|
|
|
|
struct {
|
|
struct osmo_sub_auth_data2 *aud2g;
|
|
struct osmo_sub_auth_data2 *aud3g;
|
|
uint8_t *rand_auts;
|
|
uint8_t *auts;
|
|
const char *label;
|
|
} tests[] = {
|
|
{ NULL, NULL, NULL, NULL, "no auth data (a)"},
|
|
{ NULL, &aud3g_noalg, NULL, NULL, "no auth data (b)"},
|
|
{ NULL, &aud_notype, NULL, NULL, "no auth data (c)"},
|
|
{ NULL, &no_aud, NULL, NULL, "no auth data (d)"},
|
|
{ &aud2g_noalg, NULL, NULL, NULL, "no auth data (e)"},
|
|
{ &aud2g_noalg, &aud3g_noalg, NULL, NULL, "no auth data (f)"},
|
|
{ &aud2g_noalg, &aud_notype, NULL, NULL, "no auth data (g)"},
|
|
{ &aud2g_noalg, &no_aud, NULL, NULL, "no auth data (h)"},
|
|
{ &aud_notype, NULL, NULL, NULL, "no auth data (i)"},
|
|
{ &aud_notype, &aud3g_noalg, NULL, NULL, "no auth data (j)"},
|
|
{ &aud_notype, &aud_notype, NULL, NULL, "no auth data (k)"},
|
|
{ &aud_notype, &no_aud, NULL, NULL, "no auth data (l)"},
|
|
{ &no_aud, NULL, NULL, NULL, "no auth data (m)"},
|
|
{ &no_aud, &aud3g_noalg, NULL, NULL, "no auth data (n)"},
|
|
{ &no_aud, &aud_notype, NULL, NULL, "no auth data (o)"},
|
|
{ &no_aud, &no_aud, NULL, NULL, "no auth data (p)"},
|
|
{ &aud3g, NULL, NULL, NULL, "wrong auth data type (a)"},
|
|
{ &aud3g, &aud3g_noalg, NULL, NULL, "wrong auth data type (b)"},
|
|
{ &aud3g, &aud_notype, NULL, NULL, "wrong auth data type (c)"},
|
|
{ &aud3g, &no_aud, NULL, NULL, "wrong auth data type (d)"},
|
|
{ NULL, &aud2g, NULL, NULL, "wrong auth data type (e)"},
|
|
{ &aud3g_noalg, &aud2g, NULL, NULL, "wrong auth data type (f)"},
|
|
{ &aud_notype, &aud2g, NULL, NULL, "wrong auth data type (g)"},
|
|
{ &no_aud, &aud2g, NULL, NULL, "wrong auth data type (h)"},
|
|
{ &aud3g, &aud2g, NULL, NULL, "wrong auth data type (i)"},
|
|
{ &aud3g, &aud3g, NULL, NULL, "wrong auth data type (j)"},
|
|
{ &aud2g, &aud2g, NULL, NULL, "wrong auth data type (k)"},
|
|
{ &aud2g, NULL, rand_auts, auts, "AUTS for 2G-only (a)"},
|
|
{ &aud2g, &aud3g_noalg, rand_auts, auts, "AUTS for 2G-only (b)"},
|
|
{ &aud2g, &aud_notype, rand_auts, auts, "AUTS for 2G-only (c)"},
|
|
{ &aud2g, &no_aud, rand_auts, auts, "AUTS for 2G-only (d)"},
|
|
{ NULL, &aud3g, NULL, auts, "incomplete AUTS (a)"},
|
|
{ NULL, &aud3g, rand_auts, NULL, "incomplete AUTS (b)"},
|
|
{ &aud2g, &aud3g, NULL, auts, "incomplete AUTS (c)"},
|
|
{ &aud2g, &aud3g, rand_auts, NULL, "incomplete AUTS (d)"},
|
|
};
|
|
|
|
comment_start();
|
|
|
|
for (i = 0; i < ARRAY_SIZE(tests); i++) {
|
|
fprintf(stderr, "\n- %s\n", tests[i].label);
|
|
rc = auc_compute_vectors(&vec, 1,
|
|
tests[i].aud2g,
|
|
tests[i].aud3g,
|
|
tests[i].rand_auts,
|
|
tests[i].auts);
|
|
VERBOSE_ASSERT(rc, < 0, "%d");
|
|
}
|
|
|
|
comment_end();
|
|
}
|
|
|
|
static struct {
|
|
bool verbose;
|
|
} cmdline_opts = {
|
|
.verbose = false,
|
|
};
|
|
|
|
static void print_help(const char *program)
|
|
{
|
|
printf("Usage:\n"
|
|
" %s [-v] [N [N...]]\n"
|
|
"Options:\n"
|
|
" -h --help show this text.\n"
|
|
" -v --verbose print source file and line numbers\n",
|
|
program
|
|
);
|
|
}
|
|
|
|
static void handle_options(int argc, char **argv)
|
|
{
|
|
while (1) {
|
|
int option_index = 0, c;
|
|
static struct option long_options[] = {
|
|
{"help", 0, 0, 'h'},
|
|
{"verbose", 1, 0, 'v'},
|
|
{0, 0, 0, 0}
|
|
};
|
|
|
|
c = getopt_long(argc, argv, "hv",
|
|
long_options, &option_index);
|
|
if (c == -1)
|
|
break;
|
|
|
|
switch (c) {
|
|
case 'h':
|
|
print_help(argv[0]);
|
|
exit(0);
|
|
case 'v':
|
|
cmdline_opts.verbose = true;
|
|
break;
|
|
default:
|
|
/* catch unknown options *as well as* missing arguments. */
|
|
fprintf(stderr, "Error in command line options. Exiting.\n");
|
|
exit(-1);
|
|
break;
|
|
}
|
|
}
|
|
|
|
if (optind < argc) {
|
|
fprintf(stderr, "too many args\n");
|
|
exit(-1);
|
|
}
|
|
}
|
|
|
|
int main(int argc, char **argv)
|
|
{
|
|
printf("auc_3g_test.c\n");
|
|
|
|
handle_options(argc, argv);
|
|
|
|
void *tall_ctx = talloc_named_const(NULL, 1, "auc_test");
|
|
|
|
osmo_init_logging2(tall_ctx, &hlr_log_info);
|
|
log_set_print_filename2(osmo_stderr_target,
|
|
cmdline_opts.verbose ?
|
|
LOG_FILENAME_BASENAME :
|
|
LOG_FILENAME_NONE);
|
|
log_set_print_timestamp(osmo_stderr_target, 0);
|
|
log_set_use_color(osmo_stderr_target, 0);
|
|
log_set_print_category_hex(osmo_stderr_target, 0);
|
|
log_set_print_category(osmo_stderr_target, 1);
|
|
log_parse_category_mask(osmo_stderr_target, "DMAIN,1:DDB,1:DAUC,1");
|
|
|
|
test_gen_vectors_2g_only();
|
|
test_gen_vectors_2g_plus_3g();
|
|
test_gen_vectors_3g_only();
|
|
test_gen_vectors_3g_xor();
|
|
test_gen_vectors_bad_args();
|
|
|
|
printf("Done\n");
|
|
return 0;
|
|
}
|