nas,usim: remove use of shadowed variables

This commit is contained in:
Andre Puschmann 2020-07-10 13:21:44 +02:00
parent dc67d28709
commit 138ec1f8e7
2 changed files with 22 additions and 24 deletions

View File

@ -809,7 +809,6 @@ void nas::integrity_generate(uint8_t* key_128,
// This function depends to a valid k_nas_int. // This function depends to a valid k_nas_int.
// This key is generated in the security mode command. // This key is generated in the security mode command.
bool nas::integrity_check(byte_buffer_t* pdu) bool nas::integrity_check(byte_buffer_t* pdu)
{ {
if (pdu == nullptr) { if (pdu == nullptr) {

View File

@ -191,35 +191,35 @@ auth_result_t usim::generate_authentication_response(uint8_t* rand,
uint16_t mnc, uint16_t mnc,
uint8_t* res, uint8_t* res,
int* res_len, int* res_len,
uint8_t* k_asme) uint8_t* k_asme_)
{ {
if (auth_algo_xor == auth_algo) { if (auth_algo_xor == auth_algo) {
return gen_auth_res_xor(rand, autn_enb, mcc, mnc, res, res_len, k_asme); return gen_auth_res_xor(rand, autn_enb, mcc, mnc, res, res_len, k_asme_);
} else { } else {
return gen_auth_res_milenage(rand, autn_enb, mcc, mnc, res, res_len, k_asme); return gen_auth_res_milenage(rand, autn_enb, mcc, mnc, res, res_len, k_asme_);
} }
} }
void usim::generate_nas_keys(uint8_t* k_asme, void usim::generate_nas_keys(uint8_t* k_asme_,
uint8_t* k_nas_enc, uint8_t* k_nas_enc,
uint8_t* k_nas_int, uint8_t* k_nas_int,
CIPHERING_ALGORITHM_ID_ENUM cipher_algo, CIPHERING_ALGORITHM_ID_ENUM cipher_algo,
INTEGRITY_ALGORITHM_ID_ENUM integ_algo) INTEGRITY_ALGORITHM_ID_ENUM integ_algo)
{ {
// Generate K_nas_enc and K_nas_int // Generate K_nas_enc and K_nas_int
security_generate_k_nas(k_asme, cipher_algo, integ_algo, k_nas_enc, k_nas_int); security_generate_k_nas(k_asme_, cipher_algo, integ_algo, k_nas_enc, k_nas_int);
} }
/******************************************************************************* /*******************************************************************************
RRC interface RRC interface
*******************************************************************************/ *******************************************************************************/
void usim::generate_as_keys(uint8_t* k_asme, uint32_t count_ul, srslte::as_security_config_t* sec_cfg) void usim::generate_as_keys(uint8_t* k_asme_, uint32_t count_ul, srslte::as_security_config_t* sec_cfg)
{ {
// Generate K_enb // Generate K_enb
security_generate_k_enb(k_asme, count_ul, k_enb); security_generate_k_enb(k_asme_, count_ul, k_enb);
memcpy(this->k_asme, k_asme, 32); memcpy(k_asme, k_asme_, 32);
// Save initial k_enb // Save initial k_enb
memcpy(k_enb_initial, k_enb, 32); memcpy(k_enb_initial, k_enb, 32);
@ -348,71 +348,70 @@ auth_result_t usim::gen_auth_res_xor(uint8_t* rand,
uint16_t mnc, uint16_t mnc,
uint8_t* res, uint8_t* res,
int* res_len, int* res_len,
uint8_t* k_asme) uint8_t* k_asme_)
{ {
auth_result_t result = AUTH_OK; auth_result_t result = AUTH_OK;
uint32_t i;
uint8_t sqn[6]; uint8_t sqn[6];
uint8_t xdout[16]; uint8_t xdout[16];
uint8_t cdout[8]; uint8_t cdout[8];
// Use RAND and K to compute RES, CK, IK and AK // Use RAND and K to compute RES, CK, IK and AK
for (i = 0; i < 16; i++) { for (uint32_t i = 0; i < 16; i++) {
xdout[i] = k[i] ^ rand[i]; xdout[i] = k[i] ^ rand[i];
} }
for (i = 0; i < 16; i++) { for (uint32_t i = 0; i < 16; i++) {
res[i] = xdout[i]; res[i] = xdout[i];
ck[i] = xdout[(i + 1) % 16]; ck[i] = xdout[(i + 1) % 16];
ik[i] = xdout[(i + 2) % 16]; ik[i] = xdout[(i + 2) % 16];
} }
for (i = 0; i < 6; i++) { for (uint32_t i = 0; i < 6; i++) {
ak[i] = xdout[i + 3]; ak[i] = xdout[i + 3];
} }
*res_len = 8; *res_len = 8;
// Extract sqn from autn // Extract sqn from autn
for (i = 0; i < 6; i++) { for (uint32_t i = 0; i < 6; i++) {
sqn[i] = autn_enb[i] ^ ak[i]; sqn[i] = autn_enb[i] ^ ak[i];
} }
// Extract AMF from autn // Extract AMF from autn
for (int i = 0; i < 2; i++) { for (uint32_t i = 0; i < 2; i++) {
amf[i] = autn_enb[6 + i]; amf[i] = autn_enb[6 + i];
} }
// Generate cdout // Generate cdout
for (i = 0; i < 6; i++) { for (uint32_t i = 0; i < 6; i++) {
cdout[i] = sqn[i]; cdout[i] = sqn[i];
} }
for (i = 0; i < 2; i++) { for (uint32_t i = 0; i < 2; i++) {
cdout[6 + i] = amf[i]; cdout[6 + i] = amf[i];
} }
// Generate MAC // Generate MAC
for (i = 0; i < 8; i++) { for (uint32_t i = 0; i < 8; i++) {
mac[i] = xdout[i] ^ cdout[i]; mac[i] = xdout[i] ^ cdout[i];
} }
// Construct AUTN // Construct AUTN
for (i = 0; i < 6; i++) { for (uint32_t i = 0; i < 6; i++) {
autn[i] = sqn[i] ^ ak[i]; autn[i] = sqn[i] ^ ak[i];
} }
for (i = 0; i < 2; i++) { for (uint32_t i = 0; i < 2; i++) {
autn[6 + i] = amf[i]; autn[6 + i] = amf[i];
} }
for (i = 0; i < 8; i++) { for (uint32_t i = 0; i < 8; i++) {
autn[8 + i] = mac[i]; autn[8 + i] = mac[i];
} }
// Compare AUTNs // Compare AUTNs
for (i = 0; i < 16; i++) { for (uint32_t i = 0; i < 16; i++) {
if (autn[i] != autn_enb[i]) { if (autn[i] != autn_enb[i]) {
result = AUTH_FAILED; result = AUTH_FAILED;
} }
} }
// Generate K_asme // Generate K_asme
security_generate_k_asme(ck, ik, ak, sqn, mcc, mnc, k_asme); security_generate_k_asme(ck, ik, ak, sqn, mcc, mnc, k_asme_);
return result; return result;
} }