190 lines
5.3 KiB
C++
190 lines
5.3 KiB
C++
/* Utility functions from ogslib imported to TTCN-3
|
|
*
|
|
* (C) 2019 Harald Welte <laforge@gnumonks.org>
|
|
* All rights reserved.
|
|
*
|
|
* Released under the terms of GNU General Public License, Version 2 or
|
|
* (at your option) any later version.
|
|
*
|
|
* SPDX-License-Identifier: GPL-2.0-or-later
|
|
*/
|
|
|
|
#include <stdio.h>
|
|
#include <string.h>
|
|
#include <errno.h>
|
|
#include <stdint.h>
|
|
|
|
#include <Boolean.hh>
|
|
#include <Integer.hh>
|
|
#include <Octetstring.hh>
|
|
#include <Bitstring.hh>
|
|
|
|
#include "snow-3g.h"
|
|
#include "key_derivation.h"
|
|
|
|
//#define DEBUG
|
|
|
|
#ifdef DEBUG
|
|
static __thread char hexd_buff[4096];
|
|
static const char hex_chars[] = "0123456789abcdef";
|
|
|
|
static const char *_osmo_hexdump_buf(char *out_buf, size_t out_buf_size, const unsigned char *buf, int len, const char *delim,
|
|
bool delim_after_last)
|
|
{
|
|
int i;
|
|
char *cur = out_buf;
|
|
size_t delim_len;
|
|
|
|
if (!out_buf || !out_buf_size)
|
|
return "";
|
|
|
|
delim = delim ? : "";
|
|
delim_len = strlen(delim);
|
|
|
|
for (i = 0; i < len; i++) {
|
|
const char *delimp = delim;
|
|
int len_remain = out_buf_size - (cur - out_buf) - 1;
|
|
if (len_remain < (2 + delim_len)
|
|
&& !(!delim_after_last && i == (len - 1) && len_remain >= 2))
|
|
break;
|
|
|
|
*cur++ = hex_chars[buf[i] >> 4];
|
|
*cur++ = hex_chars[buf[i] & 0xf];
|
|
|
|
if (i == (len - 1) && !delim_after_last)
|
|
break;
|
|
|
|
while (len_remain > 1 && *delimp) {
|
|
*cur++ = *delimp++;
|
|
len_remain--;
|
|
}
|
|
}
|
|
*cur = '\0';
|
|
return out_buf;
|
|
}
|
|
|
|
static char *_osmo_hexdump(const unsigned char *buf, int len)
|
|
{
|
|
_osmo_hexdump_buf(hexd_buff, sizeof(hexd_buff), buf, len, "", true);
|
|
return hexd_buff;
|
|
}
|
|
#endif
|
|
|
|
namespace LTE__CryptoFunctions {
|
|
|
|
|
|
/* f8.
|
|
* Input key: 128 bit Confidentiality Key as OCT16.
|
|
* Input count:32-bit Count, Frame dependent input as INTEGER.
|
|
* Input bearer: 5-bit Bearer identity (in the LSB side) as BIT5.
|
|
* Input is_dlwnlink: Direction of transmission.
|
|
* Input data: length number of bits, input bit stream as OCTETSTRING.
|
|
* Output data: Output bit stream. Assumes data is suitably memory
|
|
* allocated.
|
|
* Encrypts/decrypts blocks of data between 1 and 2^32 bits in length as
|
|
* defined in Section 3.
|
|
*/
|
|
OCTETSTRING f__snow__3g__f8(const OCTETSTRING& key, const INTEGER& count, const INTEGER & bearer,
|
|
const BOOLEAN& is_downlink, const OCTETSTRING& data)
|
|
{
|
|
TTCN_Buffer ttcn_buf_data(data);
|
|
TTCN_Buffer ttcn_buf_key(key);
|
|
uint32_t direction = (uint32_t)is_downlink;
|
|
|
|
snow_3g_f8((u8 *)ttcn_buf_key.get_data(), (u32) count, (u32)bearer, direction,
|
|
(u8 *)ttcn_buf_data.get_data(), ttcn_buf_data.get_len());
|
|
|
|
return OCTETSTRING(ttcn_buf_data.get_len(), ttcn_buf_data.get_data());
|
|
}
|
|
|
|
/* f9.
|
|
* Input key: 128 bit Integrity Key as OCT16.
|
|
* Input count:32-bit Count, Frame dependent input as UINT32.
|
|
* Input fresh: 32-bit Random number as UINT32.
|
|
* Input is_downlink:1 Direction of transmission.
|
|
* Input data: input bit stream.
|
|
* Output : 32 bit block used as MAC
|
|
* Generates 32-bit MAC using UIA2 algorithm as defined in Section 4.
|
|
*/
|
|
|
|
OCTETSTRING f__snow__3g__f9(const OCTETSTRING& key, const INTEGER& count, const INTEGER& fresh,
|
|
const BOOLEAN& is_downlink, const OCTETSTRING& data)
|
|
{
|
|
TTCN_Buffer ttcn_buf_data(data);
|
|
TTCN_Buffer ttcn_buf_key(key);
|
|
uint32_t direction = (uint32_t)is_downlink;
|
|
uint8_t tmp[4];
|
|
TTCN_Buffer ttcn_buf_mac;
|
|
|
|
#ifdef DEBUG
|
|
printf("F9: key=%s, count=%u, fresh=%u, direction=%u, ",
|
|
_osmo_hexdump((u8 *)ttcn_buf_key.get_data(), ttcn_buf_key.get_len()), (u32) count,
|
|
(u32) fresh, direction);
|
|
printf("data=%s -> ", _osmo_hexdump(ttcn_buf_data.get_data(), ttcn_buf_data.get_len()));
|
|
#endif
|
|
snow_3g_f9((u8 *)ttcn_buf_key.get_data(), (u32) count, (u32) fresh, direction,
|
|
(u8 *)ttcn_buf_data.get_data(), ttcn_buf_data.get_len()*8, tmp);
|
|
#ifdef DEBUG
|
|
printf("%s\n", _osmo_hexdump(tmp, sizeof(tmp)));
|
|
#endif
|
|
|
|
return OCTETSTRING(4, tmp);
|
|
}
|
|
|
|
OCTETSTRING f__kdf__kasme(const OCTETSTRING& ck, const OCTETSTRING& ik, const OCTETSTRING& plmn_id,
|
|
const OCTETSTRING& sqn, const OCTETSTRING& ak)
|
|
{
|
|
TTCN_Buffer ttcn_buf_ck(ck);
|
|
TTCN_Buffer ttcn_buf_ik(ik);
|
|
TTCN_Buffer ttcn_buf_plmn_id(plmn_id);
|
|
TTCN_Buffer ttcn_buf_sqn(sqn);
|
|
TTCN_Buffer ttcn_buf_ak(ak);
|
|
uint8_t kasme[32];
|
|
|
|
hss_auc_kasme(ttcn_buf_ck.get_data(), ttcn_buf_ik.get_data(), ttcn_buf_plmn_id.get_data(),
|
|
ttcn_buf_sqn.get_data(), ttcn_buf_ak.get_data(), kasme);
|
|
return OCTETSTRING(sizeof(kasme), kasme);
|
|
}
|
|
|
|
OCTETSTRING f__kdf__nas__int(const INTEGER& alg_id, const OCTETSTRING &kasme)
|
|
{
|
|
TTCN_Buffer ttcn_buf_kasme(kasme);
|
|
uint8_t knas[16];
|
|
|
|
mme_kdf_nas(MME_KDF_NAS_INT_ALG, (int)alg_id, (const u8*) ttcn_buf_kasme.get_data(), knas);
|
|
return OCTETSTRING(sizeof(knas), knas);
|
|
}
|
|
|
|
OCTETSTRING f__kdf__nas__enc(const INTEGER& alg_id, const OCTETSTRING &kasme)
|
|
{
|
|
TTCN_Buffer ttcn_buf_kasme(kasme);
|
|
uint8_t knas[16];
|
|
|
|
mme_kdf_nas(MME_KDF_NAS_ENC_ALG, (int)alg_id, (const u8*) ttcn_buf_kasme.get_data(), knas);
|
|
return OCTETSTRING(sizeof(knas), knas);
|
|
}
|
|
|
|
|
|
OCTETSTRING f__kdf__enb(const OCTETSTRING &kasme, const INTEGER &ul_count)
|
|
{
|
|
TTCN_Buffer ttcn_buf_kasme(kasme);
|
|
uint8_t kenb[32];
|
|
|
|
mme_kdf_enb(ttcn_buf_kasme.get_data(), (int)ul_count, kenb);
|
|
return OCTETSTRING(sizeof(kenb), kenb);
|
|
}
|
|
|
|
OCTETSTRING f__kdf__nh(const OCTETSTRING &kasme, const OCTETSTRING &sync_inp)
|
|
{
|
|
TTCN_Buffer ttcn_buf_kasme(kasme);
|
|
TTCN_Buffer ttcn_buf_sync_inp(sync_inp);
|
|
uint8_t kenb[32];
|
|
|
|
mme_kdf_nh(ttcn_buf_kasme.get_data(), ttcn_buf_sync_inp.get_data(), kenb);
|
|
return OCTETSTRING(sizeof(kenb), kenb);
|
|
}
|
|
|
|
|
|
|
|
} // namespace
|