|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
#include "nas-security.h" |
|
|
|
|
|
#define NAS_SECURITY_BEARER 0 |
|
|
#define NAS_SECURITY_MAC_SIZE 4 |
|
|
|
|
|
ogs_pkbuf_t *nas_eps_security_encode( |
|
|
mme_ue_t *mme_ue, ogs_nas_eps_message_t *message) |
|
|
{ |
|
|
int integrity_protected = 0; |
|
|
int new_security_context = 0; |
|
|
int ciphered = 0; |
|
|
ogs_nas_eps_security_header_t h; |
|
|
ogs_pkbuf_t *new = NULL; |
|
|
|
|
|
ogs_assert(mme_ue); |
|
|
ogs_assert(message); |
|
|
|
|
|
switch (message->h.security_header_type) { |
|
|
case OGS_NAS_SECURITY_HEADER_PLAIN_NAS_MESSAGE: |
|
|
return ogs_nas_eps_plain_encode(message); |
|
|
case OGS_NAS_SECURITY_HEADER_INTEGRITY_PROTECTED: |
|
|
integrity_protected = 1; |
|
|
break; |
|
|
case OGS_NAS_SECURITY_HEADER_INTEGRITY_PROTECTED_AND_CIPHERED: |
|
|
integrity_protected = 1; |
|
|
ciphered = 1; |
|
|
break; |
|
|
case OGS_NAS_SECURITY_HEADER_INTEGRITY_PROTECTED_AND_NEW_SECURITY_CONTEXT: |
|
|
integrity_protected = 1; |
|
|
new_security_context = 1; |
|
|
break; |
|
|
case OGS_NAS_SECURITY_HEADER_INTEGRITY_PROTECTED_AND_CIPHTERD_WITH_NEW_INTEGRITY_CONTEXT: |
|
|
integrity_protected = 1; |
|
|
new_security_context = 1; |
|
|
ciphered = 1; |
|
|
break; |
|
|
default: |
|
|
ogs_error("Not implemented(securiry header type:0x%x)", |
|
|
message->h.security_header_type); |
|
|
return NULL; |
|
|
} |
|
|
|
|
|
if (new_security_context) { |
|
|
mme_ue->dl_count = 0; |
|
|
mme_ue->ul_count.i32 = 0; |
|
|
} |
|
|
|
|
|
if (mme_ue->selected_enc_algorithm == 0) |
|
|
ciphered = 0; |
|
|
if (mme_ue->selected_int_algorithm == 0) |
|
|
integrity_protected = 0; |
|
|
|
|
|
memset(&h, 0, sizeof(h)); |
|
|
h.security_header_type = message->h.security_header_type; |
|
|
h.protocol_discriminator = message->h.protocol_discriminator; |
|
|
h.sequence_number = (mme_ue->dl_count & 0xff); |
|
|
|
|
|
new = ogs_nas_eps_plain_encode(message); |
|
|
if (!new) { |
|
|
ogs_error("ogs_nas_eps_plain_encode() failed"); |
|
|
return NULL; |
|
|
} |
|
|
|
|
|
if (ciphered) { |
|
|
|
|
|
ogs_nas_encrypt(mme_ue->selected_enc_algorithm, |
|
|
mme_ue->knas_enc, mme_ue->dl_count, NAS_SECURITY_BEARER, |
|
|
OGS_NAS_SECURITY_DOWNLINK_DIRECTION, new); |
|
|
} |
|
|
|
|
|
|
|
|
ogs_assert(ogs_pkbuf_push(new, 1)); |
|
|
*(uint8_t *)(new->data) = h.sequence_number; |
|
|
|
|
|
if (integrity_protected) { |
|
|
uint8_t mac[NAS_SECURITY_MAC_SIZE]; |
|
|
|
|
|
|
|
|
ogs_nas_mac_calculate(mme_ue->selected_int_algorithm, |
|
|
mme_ue->knas_int, mme_ue->dl_count, NAS_SECURITY_BEARER, |
|
|
OGS_NAS_SECURITY_DOWNLINK_DIRECTION, new, mac); |
|
|
memcpy(&h.message_authentication_code, mac, sizeof(mac)); |
|
|
} |
|
|
|
|
|
|
|
|
mme_ue->dl_count = (mme_ue->dl_count + 1) & 0xffffff; |
|
|
|
|
|
|
|
|
ogs_assert(ogs_pkbuf_push(new, 5)); |
|
|
memcpy(new->data, &h, sizeof(ogs_nas_eps_security_header_t)); |
|
|
|
|
|
mme_ue->security_context_available = 1; |
|
|
|
|
|
return new; |
|
|
} |
|
|
|
|
|
int nas_eps_security_decode(mme_ue_t *mme_ue, |
|
|
ogs_nas_security_header_type_t security_header_type, ogs_pkbuf_t *pkbuf) |
|
|
{ |
|
|
ogs_assert(mme_ue); |
|
|
ogs_assert(pkbuf); |
|
|
ogs_assert(pkbuf->data); |
|
|
|
|
|
if (security_header_type.service_request) { |
|
|
#define SHORT_MAC_SIZE 2 |
|
|
ogs_nas_ksi_and_sequence_number_t *ksi_and_sequence_number = |
|
|
(ogs_nas_ksi_and_sequence_number_t *)(pkbuf->data + 1); |
|
|
uint8_t original_mac[SHORT_MAC_SIZE]; |
|
|
uint8_t estimated_sequence_number; |
|
|
uint8_t sequence_number_high_3bit; |
|
|
uint8_t mac[NAS_SECURITY_MAC_SIZE]; |
|
|
|
|
|
if (mme_ue->selected_int_algorithm == 0) { |
|
|
ogs_warn("integrity algorithm is not defined"); |
|
|
return OGS_ERROR; |
|
|
} |
|
|
|
|
|
ogs_assert(ksi_and_sequence_number); |
|
|
estimated_sequence_number = |
|
|
ksi_and_sequence_number->sequence_number; |
|
|
|
|
|
sequence_number_high_3bit = mme_ue->ul_count.sqn & 0xe0; |
|
|
if ((mme_ue->ul_count.sqn & 0x1f) > estimated_sequence_number) { |
|
|
sequence_number_high_3bit += 0x20; |
|
|
} |
|
|
estimated_sequence_number += sequence_number_high_3bit; |
|
|
|
|
|
if (mme_ue->ul_count.sqn > estimated_sequence_number) |
|
|
mme_ue->ul_count.overflow++; |
|
|
mme_ue->ul_count.sqn = estimated_sequence_number; |
|
|
|
|
|
memcpy(original_mac, pkbuf->data + 2, SHORT_MAC_SIZE); |
|
|
|
|
|
ogs_pkbuf_trim(pkbuf, 2); |
|
|
ogs_nas_mac_calculate(mme_ue->selected_int_algorithm, |
|
|
mme_ue->knas_int, mme_ue->ul_count.i32, NAS_SECURITY_BEARER, |
|
|
OGS_NAS_SECURITY_UPLINK_DIRECTION, pkbuf, mac); |
|
|
|
|
|
ogs_pkbuf_put_data(pkbuf, original_mac, SHORT_MAC_SIZE); |
|
|
if (memcmp(mac + 2, pkbuf->data + 2, 2) != 0) { |
|
|
ogs_warn("NAS MAC verification failed(%x%x != %x%x)", |
|
|
mac[2], mac[3], |
|
|
((unsigned char *)pkbuf->data)[2], |
|
|
((unsigned char *)pkbuf->data)[3]); |
|
|
|
|
|
mme_ue->mac_failed = 1; |
|
|
} |
|
|
|
|
|
return OGS_OK; |
|
|
} |
|
|
|
|
|
if (!mme_ue->security_context_available) { |
|
|
security_header_type.integrity_protected = 0; |
|
|
security_header_type.new_security_context = 0; |
|
|
security_header_type.ciphered = 0; |
|
|
} |
|
|
|
|
|
if (security_header_type.new_security_context) { |
|
|
mme_ue->ul_count.i32 = 0; |
|
|
} |
|
|
|
|
|
if (mme_ue->selected_enc_algorithm == 0) |
|
|
security_header_type.ciphered = 0; |
|
|
if (mme_ue->selected_int_algorithm == 0) |
|
|
security_header_type.integrity_protected = 0; |
|
|
|
|
|
if (security_header_type.ciphered || |
|
|
security_header_type.integrity_protected) { |
|
|
ogs_nas_eps_security_header_t *h = NULL; |
|
|
|
|
|
|
|
|
ogs_assert(ogs_pkbuf_push(pkbuf, 6)); |
|
|
h = (ogs_nas_eps_security_header_t *)pkbuf->data; |
|
|
|
|
|
|
|
|
ogs_assert(ogs_pkbuf_pull(pkbuf, 5)); |
|
|
|
|
|
|
|
|
if (mme_ue->ul_count.sqn > h->sequence_number) |
|
|
mme_ue->ul_count.overflow++; |
|
|
mme_ue->ul_count.sqn = h->sequence_number; |
|
|
|
|
|
if (security_header_type.integrity_protected) { |
|
|
uint8_t mac[NAS_SECURITY_MAC_SIZE]; |
|
|
uint32_t mac32; |
|
|
uint32_t original_mac = h->message_authentication_code; |
|
|
|
|
|
|
|
|
ogs_nas_mac_calculate(mme_ue->selected_int_algorithm, |
|
|
mme_ue->knas_int, mme_ue->ul_count.i32, NAS_SECURITY_BEARER, |
|
|
OGS_NAS_SECURITY_UPLINK_DIRECTION, pkbuf, mac); |
|
|
h->message_authentication_code = original_mac; |
|
|
|
|
|
memcpy(&mac32, mac, NAS_SECURITY_MAC_SIZE); |
|
|
if (h->message_authentication_code != mac32) { |
|
|
ogs_warn("NAS MAC verification failed(0x%x != 0x%x)", |
|
|
be32toh(h->message_authentication_code), be32toh(mac32)); |
|
|
mme_ue->mac_failed = 1; |
|
|
} |
|
|
} |
|
|
|
|
|
|
|
|
ogs_assert(ogs_pkbuf_pull(pkbuf, 1)); |
|
|
|
|
|
if (security_header_type.ciphered) { |
|
|
|
|
|
if (pkbuf->len == 0) { |
|
|
ogs_error("Cannot decrypt Malformed NAS Message"); |
|
|
return OGS_ERROR; |
|
|
} |
|
|
ogs_nas_encrypt(mme_ue->selected_enc_algorithm, |
|
|
mme_ue->knas_enc, mme_ue->ul_count.i32, NAS_SECURITY_BEARER, |
|
|
OGS_NAS_SECURITY_UPLINK_DIRECTION, pkbuf); |
|
|
} |
|
|
} |
|
|
|
|
|
return OGS_OK; |
|
|
} |
|
|
|