|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
#include "nas-security.h" |
|
|
|
|
|
#define NAS_SECURITY_MAC_SIZE 4 |
|
|
|
|
|
ogs_pkbuf_t *nas_5gs_security_encode( |
|
|
amf_ue_t *amf_ue, ogs_nas_5gs_message_t *message) |
|
|
{ |
|
|
int integrity_protected = 0; |
|
|
int new_security_context = 0; |
|
|
int ciphered = 0; |
|
|
ogs_nas_5gs_security_header_t h; |
|
|
ogs_pkbuf_t *new = NULL; |
|
|
|
|
|
ogs_assert(amf_ue); |
|
|
ogs_assert(message); |
|
|
|
|
|
switch (message->h.security_header_type) { |
|
|
case OGS_NAS_SECURITY_HEADER_PLAIN_NAS_MESSAGE: |
|
|
return ogs_nas_5gs_plain_encode(message); |
|
|
case OGS_NAS_SECURITY_HEADER_INTEGRITY_PROTECTED: |
|
|
integrity_protected = 1; |
|
|
break; |
|
|
case OGS_NAS_SECURITY_HEADER_INTEGRITY_PROTECTED_AND_CIPHERED: |
|
|
integrity_protected = 1; |
|
|
ciphered = 1; |
|
|
break; |
|
|
case OGS_NAS_SECURITY_HEADER_INTEGRITY_PROTECTED_AND_NEW_SECURITY_CONTEXT: |
|
|
integrity_protected = 1; |
|
|
new_security_context = 1; |
|
|
break; |
|
|
case OGS_NAS_SECURITY_HEADER_INTEGRITY_PROTECTED_AND_CIPHTERD_WITH_NEW_INTEGRITY_CONTEXT: |
|
|
integrity_protected = 1; |
|
|
new_security_context = 1; |
|
|
ciphered = 1; |
|
|
break; |
|
|
default: |
|
|
ogs_error("Not implemented(security header type:0x%x)", |
|
|
message->h.security_header_type); |
|
|
return NULL; |
|
|
} |
|
|
|
|
|
if (new_security_context) { |
|
|
amf_ue->dl_count = 0; |
|
|
amf_ue->ul_count.i32 = 0; |
|
|
} |
|
|
|
|
|
if (amf_ue->selected_enc_algorithm == 0) |
|
|
ciphered = 0; |
|
|
if (amf_ue->selected_int_algorithm == 0) |
|
|
integrity_protected = 0; |
|
|
|
|
|
memset(&h, 0, sizeof(h)); |
|
|
h.security_header_type = message->h.security_header_type; |
|
|
h.extended_protocol_discriminator = |
|
|
message->h.extended_protocol_discriminator; |
|
|
h.sequence_number = (amf_ue->dl_count & 0xff); |
|
|
|
|
|
new = ogs_nas_5gs_plain_encode(message); |
|
|
if (!new) { |
|
|
ogs_error("ogs_nas_5gs_plain_encode() failed"); |
|
|
return NULL; |
|
|
} |
|
|
|
|
|
if (ciphered) { |
|
|
|
|
|
ogs_nas_encrypt(amf_ue->selected_enc_algorithm, |
|
|
amf_ue->knas_enc, amf_ue->dl_count, |
|
|
amf_ue->nas.access_type, |
|
|
OGS_NAS_SECURITY_DOWNLINK_DIRECTION, new); |
|
|
} |
|
|
|
|
|
|
|
|
ogs_assert(ogs_pkbuf_push(new, 1)); |
|
|
*(uint8_t *)(new->data) = h.sequence_number; |
|
|
|
|
|
if (integrity_protected) { |
|
|
uint8_t mac[NAS_SECURITY_MAC_SIZE]; |
|
|
|
|
|
|
|
|
ogs_nas_mac_calculate(amf_ue->selected_int_algorithm, |
|
|
amf_ue->knas_int, amf_ue->dl_count, |
|
|
amf_ue->nas.access_type, |
|
|
OGS_NAS_SECURITY_DOWNLINK_DIRECTION, new, mac); |
|
|
memcpy(&h.message_authentication_code, mac, sizeof(mac)); |
|
|
} |
|
|
|
|
|
|
|
|
amf_ue->dl_count = (amf_ue->dl_count + 1) & 0xffffff; |
|
|
|
|
|
|
|
|
ogs_assert(ogs_pkbuf_push(new, 6)); |
|
|
memcpy(new->data, &h, sizeof(ogs_nas_5gs_security_header_t)); |
|
|
|
|
|
amf_ue->security_context_available = 1; |
|
|
|
|
|
return new; |
|
|
} |
|
|
|
|
|
int nas_5gs_security_decode(amf_ue_t *amf_ue, |
|
|
ogs_nas_security_header_type_t security_header_type, ogs_pkbuf_t *pkbuf) |
|
|
{ |
|
|
ogs_assert(amf_ue); |
|
|
ogs_assert(pkbuf); |
|
|
ogs_assert(pkbuf->data); |
|
|
|
|
|
if (!amf_ue->security_context_available) { |
|
|
security_header_type.integrity_protected = 0; |
|
|
security_header_type.new_security_context = 0; |
|
|
security_header_type.ciphered = 0; |
|
|
} |
|
|
|
|
|
if (security_header_type.new_security_context) { |
|
|
amf_ue->ul_count.i32 = 0; |
|
|
} |
|
|
|
|
|
if (amf_ue->selected_enc_algorithm == 0) |
|
|
security_header_type.ciphered = 0; |
|
|
if (amf_ue->selected_int_algorithm == 0) |
|
|
security_header_type.integrity_protected = 0; |
|
|
|
|
|
if (security_header_type.ciphered || |
|
|
security_header_type.integrity_protected) { |
|
|
ogs_nas_5gs_security_header_t *h = NULL; |
|
|
|
|
|
|
|
|
ogs_assert(ogs_pkbuf_push(pkbuf, 7)); |
|
|
h = (ogs_nas_5gs_security_header_t *)pkbuf->data; |
|
|
|
|
|
|
|
|
ogs_assert(ogs_pkbuf_pull(pkbuf, 6)); |
|
|
|
|
|
|
|
|
if (amf_ue->ul_count.sqn > h->sequence_number) |
|
|
amf_ue->ul_count.overflow++; |
|
|
amf_ue->ul_count.sqn = h->sequence_number; |
|
|
|
|
|
if (security_header_type.integrity_protected) { |
|
|
uint8_t mac[NAS_SECURITY_MAC_SIZE]; |
|
|
uint32_t mac32; |
|
|
uint32_t original_mac = h->message_authentication_code; |
|
|
|
|
|
|
|
|
ogs_nas_mac_calculate(amf_ue->selected_int_algorithm, |
|
|
amf_ue->knas_int, amf_ue->ul_count.i32, |
|
|
amf_ue->nas.access_type, |
|
|
OGS_NAS_SECURITY_UPLINK_DIRECTION, pkbuf, mac); |
|
|
h->message_authentication_code = original_mac; |
|
|
|
|
|
memcpy(&mac32, mac, NAS_SECURITY_MAC_SIZE); |
|
|
if (h->message_authentication_code != mac32) { |
|
|
ogs_warn("NAS MAC verification failed(0x%x != 0x%x)", |
|
|
be32toh(h->message_authentication_code), be32toh(mac32)); |
|
|
amf_ue->mac_failed = 1; |
|
|
} |
|
|
} |
|
|
|
|
|
|
|
|
ogs_assert(ogs_pkbuf_pull(pkbuf, 1)); |
|
|
|
|
|
if (security_header_type.ciphered) { |
|
|
|
|
|
if (pkbuf->len == 0) { |
|
|
ogs_error("Cannot decrypt Malformed NAS Message"); |
|
|
return OGS_ERROR; |
|
|
} |
|
|
ogs_nas_encrypt(amf_ue->selected_enc_algorithm, |
|
|
amf_ue->knas_enc, amf_ue->ul_count.i32, |
|
|
amf_ue->nas.access_type, |
|
|
OGS_NAS_SECURITY_UPLINK_DIRECTION, pkbuf); |
|
|
} |
|
|
} |
|
|
|
|
|
return OGS_OK; |
|
|
} |
|
|
|