409 lines
15 KiB
C++
409 lines
15 KiB
C++
/*
|
|
* OpenBTS provides an open source alternative to legacy telco protocols and
|
|
* traditionally complex, proprietary hardware systems.
|
|
*
|
|
* Copyright 2014 Range Networks, Inc.
|
|
*
|
|
* This software is distributed under the terms of the GNU Affero General
|
|
* Public License version 3. See the COPYING and NOTICE files in the main
|
|
* directory for licensing information.
|
|
*
|
|
* This use of this software may be subject to additional restrictions.
|
|
* See the LEGAL file in the main directory for details.
|
|
*/
|
|
|
|
#include <stdlib.h>
|
|
#include "IntegrityProtect.h"
|
|
|
|
// 33.102 Describes the overall Integrity Protection scheme.
|
|
// 35.201 sec 4: f9 algorithm.
|
|
// 35.202 sec 3: Kasumi algorithm.
|
|
// 35.203 and 25.204 supposedly have test data.
|
|
|
|
// ==================================================================
|
|
// Kasumi Algorithm Code from 3GPP 35.202 Annex 2.
|
|
// ==================================================================
|
|
|
|
typedef unsigned char u8;
|
|
typedef unsigned short u16;
|
|
typedef unsigned int u32;
|
|
|
|
/*---------------------------------------------------------
|
|
* Kasumi.h
|
|
*---------------------------------------------------------*/
|
|
typedef unsigned char u8;
|
|
typedef unsigned short u16;
|
|
typedef unsigned int u32;
|
|
//void KeySchedule( u8 *key );
|
|
//void Kasumi( u8 *data );
|
|
|
|
/*-----------------------------------------------------------------------
|
|
* Kasumi.c
|
|
*-----------------------------------------------------------------------
|
|
*
|
|
* A sample implementation of KASUMI, the core algorithm for the
|
|
* 3GPP Confidentiality and Integrity algorithms.
|
|
*
|
|
* This has been coded for clarity, not necessarily for efficiency.
|
|
*
|
|
* This will compile and run correctly on both Intel (little endian)
|
|
* and Sparc (big endian) machines. (Compilers used supported 32-bit ints).
|
|
*
|
|
* Version 1.1 08 May 2000
|
|
*
|
|
*-----------------------------------------------------------------------*/
|
|
//#include "Kasumi.h"
|
|
/*--------- 16 bit rotate left ------------------------------------------*/
|
|
#define ROL16(a,b) (u16)((a<<b)|(a>>(16-b)))
|
|
/*------- unions: used to remove "endian" issues ------------------------*/
|
|
typedef union {
|
|
u32 b32;
|
|
u16 b16[2];
|
|
u8 b8[4];
|
|
} DWORD;
|
|
typedef union {
|
|
u16 b16;
|
|
u8 b8[2];
|
|
} WORD;
|
|
/*-------- globals: The subkey arrays -----------------------------------*/
|
|
static u16 KLi1[8], KLi2[8];
|
|
static u16 KOi1[8], KOi2[8], KOi3[8];
|
|
static u16 KIi1[8], KIi2[8], KIi3[8];
|
|
/*---------------------------------------------------------------------
|
|
* FI()
|
|
* The FI function (fig 3). It includes the S7 and S9 tables.
|
|
* Transforms a 16-bit value.
|
|
*---------------------------------------------------------------------*/
|
|
static u16 FI( u16 in, u16 subkey )
|
|
{
|
|
u16 nine, seven;
|
|
static u16 S7[] = {
|
|
54, 50, 62, 56, 22, 34, 94, 96, 38, 6, 63, 93, 2, 18,123, 33,
|
|
55,113, 39,114, 21, 67, 65, 12, 47, 73, 46, 27, 25,111,124, 81,
|
|
53, 9,121, 79, 52, 60, 58, 48,101,127, 40,120,104, 70, 71, 43,
|
|
20,122, 72, 61, 23,109, 13,100, 77, 1, 16, 7, 82, 10,105, 98,
|
|
117,116, 76, 11, 89,106, 0,125,118, 99, 86, 69, 30, 57,126, 87,
|
|
112, 51, 17, 5, 95, 14, 90, 84, 91, 8, 35,103, 32, 97, 28, 66,
|
|
102, 31, 26, 45, 75, 4, 85, 92, 37, 74, 80, 49, 68, 29,115, 44,
|
|
64,107,108, 24,110, 83, 36, 78, 42, 19, 15, 41, 88,119, 59, 3};
|
|
static u16 S9[] = {
|
|
167,239,161,379,391,334, 9,338, 38,226, 48,358,452,385, 90,397,
|
|
183,253,147,331,415,340, 51,362,306,500,262, 82,216,159,356,177,
|
|
175,241,489, 37,206, 17, 0,333, 44,254,378, 58,143,220, 81,400,
|
|
95, 3,315,245, 54,235,218,405,472,264,172,494,371,290,399, 76,
|
|
165,197,395,121,257,480,423,212,240, 28,462,176,406,507,288,223,
|
|
501,407,249,265, 89,186,221,428,164, 74,440,196,458,421,350,163,
|
|
232,158,134,354, 13,250,491,142,191, 69,193,425,152,227,366,135,
|
|
344,300,276,242,437,320,113,278, 11,243, 87,317, 36, 93,496, 27,
|
|
487,446,482, 41, 68,156,457,131,326,403,339, 20, 39,115,442,124,
|
|
475,384,508, 53,112,170,479,151,126,169, 73,268,279,321,168,364,
|
|
363,292, 46,499,393,327,324, 24,456,267,157,460,488,426,309,229,
|
|
439,506,208,271,349,401,434,236, 16,209,359, 52, 56,120,199,277,
|
|
465,416,252,287,246, 6, 83,305,420,345,153,502, 65, 61,244,282,
|
|
173,222,418, 67,386,368,261,101,476,291,195,430, 49, 79,166,330,
|
|
280,383,373,128,382,408,155,495,367,388,274,107,459,417, 62,454,
|
|
132,225,203,316,234, 14,301, 91,503,286,424,211,347,307,140,374,
|
|
35,103,125,427, 19,214,453,146,498,314,444,230,256,329,198,285,
|
|
50,116, 78,410, 10,205,510,171,231, 45,139,467, 29, 86,505, 32,
|
|
72, 26,342,150,313,490,431,238,411,325,149,473, 40,119,174,355,
|
|
185,233,389, 71,448,273,372, 55,110,178,322, 12,469,392,369,190,
|
|
1,109,375,137,181, 88, 75,308,260,484, 98,272,370,275,412,111,
|
|
336,318, 4,504,492,259,304, 77,337,435, 21,357,303,332,483, 18,
|
|
47, 85, 25,497,474,289,100,269,296,478,270,106, 31,104,433, 84,
|
|
414,486,394, 96, 99,154,511,148,413,361,409,255,162,215,302,201,
|
|
266,351,343,144,441,365,108,298,251, 34,182,509,138,210,335,133,
|
|
311,352,328,141,396,346,123,319,450,281,429,228,443,481, 92,404,
|
|
485,422,248,297, 23,213,130,466, 22,217,283, 70,294,360,419,127,
|
|
312,377, 7,468,194, 2,117,295,463,258,224,447,247,187, 80,398,
|
|
284,353,105,390,299,471,470,184, 57,200,348, 63,204,188, 33,451,
|
|
97, 30,310,219, 94,160,129,493, 64,179,263,102,189,207,114,402,
|
|
438,477,387,122,192, 42,381, 5,145,118,180,449,293,323,136,380,
|
|
43, 66, 60,455,341,445,202,432, 8,237, 15,376,436,464, 59,461};
|
|
/* The sixteen bit input is split into two unequal halves, *
|
|
* nine bits and seven bits - as is the subkey */
|
|
nine = (u16)(in>>7);
|
|
seven = (u16)(in&0x7F);
|
|
/* Now run the various operations */
|
|
nine = (u16)(S9[nine] ^ seven);
|
|
seven = (u16)(S7[seven] ^ (nine & 0x7F));
|
|
seven ^= (subkey>>9);
|
|
nine ^= (subkey&0x1FF);
|
|
nine = (u16)(S9[nine] ^ seven);
|
|
seven = (u16)(S7[seven] ^ (nine & 0x7F));
|
|
in = (u16)((seven<<9) + nine);
|
|
return( in );
|
|
}
|
|
/*---------------------------------------------------------------------
|
|
* FO()
|
|
* The FO() function.
|
|
* Transforms a 32-bit value. Uses <index> to identify the
|
|
* appropriate subkeys to use.
|
|
*---------------------------------------------------------------------*/
|
|
static u32 FO( u32 in, int index )
|
|
{
|
|
u16 left, right;
|
|
/* Split the input into two 16-bit words */
|
|
left = (u16)(in>>16);
|
|
right = (u16) in;
|
|
/* Now apply the same basic transformation three times */
|
|
left ^= KOi1[index];
|
|
left = FI( left, KIi1[index] );
|
|
left ^= right;
|
|
right ^= KOi2[index];
|
|
right = FI( right, KIi2[index] );
|
|
right ^= left;
|
|
left ^= KOi3[index];
|
|
left = FI( left, KIi3[index] );
|
|
left ^= right;
|
|
in = (((u32)right)<<16)+left;
|
|
return( in );
|
|
}
|
|
/*---------------------------------------------------------------------
|
|
* FL()
|
|
* The FL() function.
|
|
* Transforms a 32-bit value. Uses <index> to identify the
|
|
* appropriate subkeys to use.
|
|
*---------------------------------------------------------------------*/
|
|
static u32 FL( u32 in, int index )
|
|
{
|
|
u16 l, r, a, b;
|
|
/* split out the left and right halves */
|
|
l = (u16)(in>>16);
|
|
r = (u16)(in);
|
|
/* do the FL() operations */
|
|
a = (u16) (l & KLi1[index]);
|
|
r ^= ROL16(a,1);
|
|
b = (u16)(r | KLi2[index]);
|
|
l ^= ROL16(b,1);
|
|
/* put the two halves back together */
|
|
in = (((u32)l)<<16) + r;
|
|
return( in );
|
|
}
|
|
/*---------------------------------------------------------------------
|
|
* Kasumi()
|
|
* the Main algorithm (fig 1). Apply the same pair of operations
|
|
* four times. Transforms the 64-bit input.
|
|
*---------------------------------------------------------------------*/
|
|
static void Kasumi( u8 *data )
|
|
{
|
|
u32 left, right, temp;
|
|
DWORD *d;
|
|
int n;
|
|
/* Start by getting the data into two 32-bit words (endian corect) */
|
|
d = (DWORD*)data;
|
|
left = (((u32)d[0].b8[0])<<24)+(((u32)d[0].b8[1])<<16)
|
|
+(d[0].b8[2]<<8)+(d[0].b8[3]);
|
|
right = (((u32)d[1].b8[0])<<24)+(((u32)d[1].b8[1])<<16)
|
|
+(d[1].b8[2]<<8)+(d[1].b8[3]);
|
|
n = 0;
|
|
do { temp = FL( left, n );
|
|
temp = FO( temp, n++ );
|
|
right ^= temp;
|
|
temp = FO( right, n );
|
|
temp = FL( temp, n++ );
|
|
left ^= temp;
|
|
} while( n<=7 );
|
|
/* return the correct endian result */
|
|
d[0].b8[0] = (u8)(left>>24); d[1].b8[0] = (u8)(right>>24);
|
|
d[0].b8[1] = (u8)(left>>16); d[1].b8[1] = (u8)(right>>16);
|
|
d[0].b8[2] = (u8)(left>>8); d[1].b8[2] = (u8)(right>>8);
|
|
d[0].b8[3] = (u8)(left); d[1].b8[3] = (u8)(right);
|
|
}
|
|
/*---------------------------------------------------------------------
|
|
* KeySchedule()
|
|
* Build the key schedule. Most "key" operations use 16-bit
|
|
* subkeys so we build u16-sized arrays that are "endian" correct.
|
|
*---------------------------------------------------------------------*/
|
|
static void KeySchedule( u8 *k )
|
|
{
|
|
static u16 C[] = {
|
|
0x0123,0x4567,0x89AB,0xCDEF, 0xFEDC,0xBA98,0x7654,0x3210 };
|
|
u16 key[8], Kprime[8];
|
|
WORD *k16;
|
|
int n;
|
|
/* Start by ensuring the subkeys are endian correct on a 16-bit basis */
|
|
k16 = (WORD *)k;
|
|
for( n=0; n<8; ++n )
|
|
key[n] = (u16)((k16[n].b8[0]<<8) + (k16[n].b8[1]));
|
|
/* Now build the K'[] keys */
|
|
for( n=0; n<8; ++n )
|
|
Kprime[n] = (u16)(key[n] ^ C[n]);
|
|
/* Finally construct the various sub keys */
|
|
for( n=0; n<8; ++n )
|
|
{
|
|
KLi1[n] = ROL16(key[n],1);
|
|
KLi2[n] = Kprime[(n+2)&0x7];
|
|
KOi1[n] = ROL16(key[(n+1)&0x7],5);
|
|
KOi2[n] = ROL16(key[(n+5)&0x7],8);
|
|
KOi3[n] = ROL16(key[(n+6)&0x7],13);
|
|
KIi1[n] = Kprime[(n+4)&0x7];
|
|
KIi2[n] = Kprime[(n+3)&0x7];
|
|
KIi3[n] = Kprime[(n+7)&0x7];
|
|
}
|
|
}
|
|
/*---------------------------------------------------------------------
|
|
* e n d o f k a s u m i . c
|
|
*---------------------------------------------------------------------*/
|
|
|
|
// ==================================================================
|
|
// Integrity Algorithm f9 Code from 3GPP 35.201 Annex 2.
|
|
// ==================================================================
|
|
|
|
typedef union {
|
|
u32 b32[2];
|
|
u16 b16[4];
|
|
u8 b8[8];
|
|
} REGISTER64;
|
|
|
|
// (pat) The key is IK with length 128 bits.
|
|
// data is the message of specified length.
|
|
// Kasumi is used in a chained mode to generate a 64-bit digest of the
|
|
// message input. Finally the leftmost 32-bits of the digest
|
|
// are taken as the output value MAC-I.
|
|
// This is directly ouf of the spec. I only renamed it and modified the return value.
|
|
uint32_t AlgorithmF9( uint8_t *key, int count, int fresh, int dir, uint8_t *data, int length ) // length in bits
|
|
{
|
|
REGISTER64 A; /* Holds the CBC chained data */
|
|
REGISTER64 B; /* Holds the XOR of all KASUMI outputs */
|
|
u8 FinalBit[8] = {0x80, 0x40, 0x20, 0x10, 8,4,2,1};
|
|
u8 ModKey[16];
|
|
// Pat modified to return 32 bit result.
|
|
//static u8 mac_i[4]; /* static memory for the result */
|
|
int i, n;
|
|
/* Start by initialising the block cipher */
|
|
|
|
|
|
KeySchedule( key );
|
|
// Next initialise the MAC chain. Make sure we *
|
|
// have the data in the right byte order.
|
|
// <A> holds our chaining value...
|
|
// <B> is the running XOR of all KASUMI o/ps
|
|
for( n=0; n<4; ++n )
|
|
{
|
|
A.b8[n] = (u8)(count>>(24-(n*8)));
|
|
A.b8[n+4] = (u8)(fresh>>(24-(n*8)));
|
|
}
|
|
Kasumi( A.b8 );
|
|
B.b32[0] = A.b32[0];
|
|
B.b32[1] = A.b32[1];
|
|
|
|
/* Now run the blocks until we reach the last block */
|
|
|
|
while( length >= 64 )
|
|
{
|
|
for( n=0; n<8; ++n )
|
|
A.b8[n] ^= *data++;
|
|
Kasumi( A.b8 );
|
|
length -= 64;
|
|
B.b32[0] ^= A.b32[0]; /* running XOR across */
|
|
B.b32[1] ^= A.b32[1]; /* the block outputs */
|
|
}
|
|
|
|
/* Process whole bytes in the last block */
|
|
n = 0;
|
|
while( length >=8 )
|
|
{
|
|
A.b8[n++] ^= *data++;
|
|
length -= 8;
|
|
}
|
|
|
|
// Now add the direction bit to the input bit stream
|
|
// If length (which holds the # of data bits in the *
|
|
// last byte) is non-zero we add it in, otherwise
|
|
// it has to start a new byte.
|
|
if( length )
|
|
{
|
|
i = *data;
|
|
if( dir )
|
|
i |= FinalBit[length];
|
|
}
|
|
else
|
|
i = dir ? 0x80 : 0;
|
|
A.b8[n++] ^= (u8)i;
|
|
|
|
// Now add in the final '1' bit. The problem here
|
|
// is if the message length happens to be n*64-1.
|
|
// If so we need to process this block and then
|
|
// create a new input block of 0x8000000000000000.
|
|
if( (length==7) && (n==8 ) ) /* then we've filled the block */
|
|
{
|
|
Kasumi( A.b8 );
|
|
B.b32[0] ^= A.b32[0]; /* running XOR across */
|
|
B.b32[1] ^= A.b32[1]; /* the block outputs */
|
|
A.b8[0] ^= 0x80; /* toggle first bit */
|
|
i = 0x80;
|
|
n = 1;
|
|
}
|
|
else
|
|
{
|
|
if( length == 7 ) /* we finished off the last byte */
|
|
A.b8[n] ^= 0x80; /* so start a new one..... */
|
|
else
|
|
A.b8[n-1] ^= FinalBit[length+1];
|
|
}
|
|
Kasumi( A.b8 );
|
|
B.b32[0] ^= A.b32[0]; /* running XOR across */
|
|
B.b32[1] ^= A.b32[1]; /* the block outputs */
|
|
|
|
/* Final step is to KASUMI what we have using the
|
|
* key XORd with 0xAAAA.....
|
|
*/
|
|
for( n=0; n<16; ++n )
|
|
ModKey[n] = (u8)*key++ ^ 0xAA;
|
|
KeySchedule( ModKey );
|
|
Kasumi( B.b8 );
|
|
|
|
/* We return the left-most 32-bits of the result */
|
|
// Pat modified to return 32 bit result.
|
|
//for( n=0; n<4; ++n ) mac_i[n] = B.b8[n];
|
|
//return( mac_i );
|
|
LOG(INFO) << "MAC: " << (unsigned int) B.b8[0] << " " << (unsigned int) B.b8[1] << " "<< (unsigned int)B.b8[2] << " "<< (unsigned int)B.b8[3] << " " << (unsigned int) B.b32[0];
|
|
//return B.b32[0];
|
|
return ( (B.b8[0] << 24) | (B.b8[1] << 16) | (B.b8[2] << 8) | B.b8[3]);
|
|
|
|
}
|
|
|
|
// ==================================================================
|
|
// Remainder of file added by pat.
|
|
// ==================================================================
|
|
// For UMTS the IK comes from algorithm f4.
|
|
// For GSM subscribers, IK is derived from Kc as per 33.102 6.8.2.3:
|
|
// Where . = concatenation, KC[1] is the 32 high Kc bits, Kc[2] is the low Kc bits.
|
|
// CK = Kc . Kc
|
|
// IK = Kc[1] xor Kc[2] . Kc . Kc[1] xor Kc[2];
|
|
|
|
// (pat) Set the Kc in the integrity protection info,
|
|
// which we use to generate IK.
|
|
void IntegrityProtect::setKc(uint64_t kc)
|
|
{
|
|
mKc = kc; // We dont really need to save this after this.
|
|
uint32_t kc1 = (kc >> 32) & 0x0ffffffffLL;
|
|
uint32_t kc2 = kc & 0x0ffffffffLL;
|
|
uint32_t kcx = kc1 ^ kc2;
|
|
int n;
|
|
uint32_t tmp = kcx;
|
|
for (n = 3; n >= 0; n--) { mIK[n] = mIK[12+n] = tmp&0xff; tmp = tmp >> 8; }
|
|
uint64_t tmp64 = kc;
|
|
for (n = 7; n >= 0; n--) { mIK[4+n] = tmp64&0xff; tmp64 = tmp64 >> 8; }
|
|
}
|
|
|
|
void IntegrityProtect::setKcs(std::string kcs)
|
|
{
|
|
// The strtoull is defined as returning 'long long', which must be 64 bits or better.
|
|
unsigned long long long_long;
|
|
assert(sizeof(long_long) >= sizeof(uint64_t)); // If this fails, add a case for your compiler.
|
|
mKc = strtoull(kcs.c_str(),NULL,16);
|
|
setKc(mKc);
|
|
}
|
|
|
|
uint32_t IntegrityProtect::runF9(unsigned rbid, bool dir, ByteVector &msg)
|
|
{
|
|
// (pat) 12-22-2012: The multitech modem is sometimes sending "asn1 encoding violation"
|
|
// in response to downlink direct transfer messages.
|
|
// Since both the incombing ByteVector (from uperEncode...) and the F9 algorithm both take
|
|
// exact bit lengths, try preserving that exact bit length instead of rounding up to 8 bits.
|
|
// Update: It did not work, got stuck at DL_DCCH AuthenticationAndCiphering.
|
|
return AlgorithmF9(mIK,mDlCounti[rbid],mFresh,(dir ? 1 : 0),msg.begin(),8*msg.size());
|
|
//return AlgorithmF9(mIK,mDlCounti[rbid],mFresh,(dir ? 1 : 0),msg.begin(),msg.sizeBits());
|
|
}
|