From ef4cf7aa521bc2260a933d24194e6fb88dd345d1 Mon Sep 17 00:00:00 2001 From: David Rupprecht Date: Tue, 9 Apr 2019 18:41:53 +0200 Subject: [PATCH] First ZUC working test case --- lib/include/srslte/common/liblte_security.h | 10 + lib/include/srslte/common/zuc.h | 39 ++++ lib/src/common/liblte_security.cc | 102 +++++++++ lib/src/common/zuc.cc | 223 ++++++++++++++++++++ lib/test/common/CMakeLists.txt | 4 + lib/test/common/test_eea2.cc | 1 - lib/test/common/test_eea3.cc | 87 ++++++++ 7 files changed, 465 insertions(+), 1 deletion(-) create mode 100644 lib/include/srslte/common/zuc.h create mode 100644 lib/src/common/zuc.cc create mode 100644 lib/test/common/test_eea3.cc diff --git a/lib/include/srslte/common/liblte_security.h b/lib/include/srslte/common/liblte_security.h index 5c5ba0794..a5a370e3f 100644 --- a/lib/include/srslte/common/liblte_security.h +++ b/lib/include/srslte/common/liblte_security.h @@ -38,6 +38,7 @@ #include "srslte/asn1/liblte_common.h" + /******************************************************************************* DEFINES *******************************************************************************/ @@ -103,6 +104,7 @@ typedef enum { LIBLTE_SECURITY_CIPHERING_ALGORITHM_ID_EEA0 = 0, LIBLTE_SECURITY_CIPHERING_ALGORITHM_ID_128_EEA1, LIBLTE_SECURITY_CIPHERING_ALGORITHM_ID_128_EEA2, + LIBLTE_SECURITY_CIPHERING_ALGORITHM_ID_128_EEA3, LIBLTE_SECURITY_CIPHERING_ALGORITHM_ID_N_ITEMS, } LIBLTE_SECURITY_CIPHERING_ALGORITHM_ID_ENUM; static const char liblte_security_ciphering_algorithm_id_text[LIBLTE_SECURITY_CIPHERING_ALGORITHM_ID_N_ITEMS][20] = { @@ -111,6 +113,7 @@ typedef enum { LIBLTE_SECURITY_INTEGRITY_ALGORITHM_ID_EIA0 = 0, LIBLTE_SECURITY_INTEGRITY_ALGORITHM_ID_128_EIA1, LIBLTE_SECURITY_INTEGRITY_ALGORITHM_ID_128_EIA2, + LIBLTE_SECURITY_INTEGRITY_ALGORITHM_ID_128_EIA3, LIBLTE_SECURITY_INTEGRITY_ALGORITHM_ID_N_ITEMS, } LIBLTE_SECURITY_INTEGRITY_ALGORITHM_ID_ENUM; static const char liblte_security_integrity_algorithm_id_text[LIBLTE_SECURITY_INTEGRITY_ALGORITHM_ID_N_ITEMS][20] = { @@ -224,6 +227,13 @@ LIBLTE_ERROR_ENUM liblte_security_encryption_eea2( LIBLTE_ERROR_ENUM liblte_security_decryption_eea2( uint8* key, uint32 count, uint8 bearer, uint8 direction, uint8* ct, uint32 ct_len, uint8* out); +LIBLTE_ERROR_ENUM liblte_security_encryption_eea3(uint8 *key, + uint32 count, + uint8 bearer, + uint8 direction, + uint8 *msg, + uint32 msg_len, + uint8 *out); /********************************************************************* Name: liblte_security_milenage_f1 diff --git a/lib/include/srslte/common/zuc.h b/lib/include/srslte/common/zuc.h new file mode 100644 index 000000000..d76893da5 --- /dev/null +++ b/lib/include/srslte/common/zuc.h @@ -0,0 +1,39 @@ +#ifndef SRSLTE_ZUC_H +#define SRSLTE_ZUC_H + +typedef unsigned char u8; +typedef unsigned int u32; + +/* the state registers of LFSR */ +typedef struct { + u32 LFSR_S0; + u32 LFSR_S1; + u32 LFSR_S2; + u32 LFSR_S3; + u32 LFSR_S4; + u32 LFSR_S5; + u32 LFSR_S6; + u32 LFSR_S7; + u32 LFSR_S8; + u32 LFSR_S9; + u32 LFSR_S10; + u32 LFSR_S11; + u32 LFSR_S12; + u32 LFSR_S13; + u32 LFSR_S14; + u32 LFSR_S15; + /* the registers of F */ + u32 F_R1; + u32 F_R2; + /* the outputs of BitReorganization */ + u32 BRC_X0; + u32 BRC_X1; + u32 BRC_X2; + u32 BRC_X3; +} zuc_state_t; + +void zuc_initialize(u8* k, u8* iv); +void zuc_generate_keystream(int KeystreamLen, u32* pKeystream); +// void zu_deinitialze(zuc_state_t* zuc_state); + +#endif // SRSLTE_ZUC_H \ No newline at end of file diff --git a/lib/src/common/liblte_security.cc b/lib/src/common/liblte_security.cc index 0038bbf03..d97aea990 100644 --- a/lib/src/common/liblte_security.cc +++ b/lib/src/common/liblte_security.cc @@ -35,6 +35,7 @@ *******************************************************************************/ #include "srslte/common/liblte_security.h" +#include "srslte/common/zuc.h" #include "math.h" #include "srslte/common/liblte_ssl.h" @@ -951,6 +952,104 @@ LIBLTE_ERROR_ENUM liblte_security_decryption_eea2( return liblte_security_encryption_eea2(key, count, bearer, direction, ct, ct_len, out); } + +/********************************************************************* + Name: liblte_security_encryption_eea1 + + Description: 128-bit encryption algorithm EEA1. + + Document Reference: 33.401 v13.1.0 Annex B.1.2 + 35.215 v13.0.0 References + Specification of the 3GPP Confidentiality and + Integrity Algorithms UEA2 & UIA2 D1 v2.1 +*********************************************************************/ +LIBLTE_ERROR_ENUM liblte_security_encryption_eea3(uint8 *key, + uint32 count, + uint8 bearer, + uint8 direction, + uint8 *msg, + uint32 msg_len, + uint8 *out) +{ + LIBLTE_ERROR_ENUM err = LIBLTE_ERROR_INVALID_INPUTS; + S3G_STATE state, *state_ptr; + uint32 k[] = {0,0,0,0}; + uint32 iv[] = {0,0,0,0}; + + uint32 *ks; + int32 i; + uint32 msg_len_block_8, msg_len_block_32, m; + + if (key != NULL && + msg != NULL && + out != NULL) + { + state_ptr = &state; + msg_len_block_8 = (msg_len + 7) / 8; + msg_len_block_32 = (msg_len + 31) / 32; + + // Transform key + for (i = 3; i >= 0; i--) { + k[i] = (key[4 * (3 - i) + 0] << 24) | + (key[4 * (3 - i) + 1] << 16) | + (key[4 * (3 - i) + 2] << 8) | + (key[4 * (3 - i) + 3]); + } + + // Construct iv + uint8_t iv[16] = {0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0}; + + iv[0] = (count >> 24) & 0xFF; + iv[1] = (count >> 16) & 0xFF; + iv[2] = (count >> 8) & 0xFF; + iv[3] = (count)&0xFF; + iv[4] = ((bearer & 0x1F) << 3) | ((direction & 0x01) << 2); + iv[5] = 0; + iv[6] = 0; + iv[7] = 0; + iv[8] = iv[0]; + iv[9] = iv[1]; + iv[10] = iv[2]; + iv[11] = iv[3]; + iv[12] = iv[4]; + iv[13] = iv[5]; + iv[14] = iv[6]; + iv[15] = iv[7]; + + // Initialize keystream + zuc_initialize(key, iv); + + // Generate keystream + + ks = (uint32 *) calloc(msg_len_block_32, sizeof(uint32)); + zuc_generate_keystream(msg_len_block_32, ks); + + // Generate output except last block + for (i = 0; i < (int32_t)msg_len_block_32 - 1; i++) { + out[4 * i + 0] = msg[4 * i + 0] ^ ((ks[i] >> 24) & 0xFF); + out[4 * i + 1] = msg[4 * i + 1] ^ ((ks[i] >> 16) & 0xFF); + out[4 * i + 2] = msg[4 * i + 2] ^ ((ks[i] >> 8) & 0xFF); + out[4 * i + 3] = msg[4 * i + 3] ^ ((ks[i] & 0xFF)); + } + + // Process last bytes + for (i = (msg_len_block_32 - 1) * 4; i < (int32_t)msg_len_block_8; i++) { + out[i] = msg[i] ^ ((ks[i / 4] >> ((3 - (i % 4)) * 8)) & 0xFF); + } + + // Zero tailing bits + zero_tailing_bits(out, msg_len); + + // Clean up + free(ks); + // zuc_deinitialize(state_ptr); + + err = LIBLTE_SUCCESS; + } + + return(err); +} + /********************************************************************* Name: liblte_security_milenage_f1 @@ -1680,3 +1779,6 @@ void s3g_generate_keystream(S3G_STATE* state, uint32 n, uint32* ks) s3g_clock_lfsr(state, 0x0); } } + + + diff --git a/lib/src/common/zuc.cc b/lib/src/common/zuc.cc new file mode 100644 index 000000000..275c6888e --- /dev/null +++ b/lib/src/common/zuc.cc @@ -0,0 +1,223 @@ + + +#include "srslte/common/zuc.h" + +/* ——————————————————————- */ +/* the state registers of LFSR */ +u32 ZUC_LFSR_S0 = 0x00; +u32 ZUC_LFSR_S1 = 0x00; +u32 ZUC_LFSR_S2 = 0x00; +u32 ZUC_LFSR_S3 = 0x00; +u32 ZUC_LFSR_S4 = 0x00; +u32 ZUC_LFSR_S5 = 0x00; +u32 ZUC_LFSR_S6 = 0x00; +u32 ZUC_LFSR_S7 = 0x00; +u32 ZUC_LFSR_S8 = 0x00; +u32 ZUC_LFSR_S9 = 0x00; +u32 ZUC_LFSR_S10 = 0x00; +u32 ZUC_LFSR_S11 = 0x00; +u32 ZUC_LFSR_S12 = 0x00; +u32 ZUC_LFSR_S13 = 0x00; +u32 ZUC_LFSR_S14 = 0x00; +u32 ZUC_LFSR_S15 = 0x00; /* the registers of F */ +u32 F_R1 = 0x00; +u32 F_R2 = 0x00;/* the outputs of BitReorganization */ +u32 BRC_X0 = 0x00; +u32 BRC_X1 = 0x00; +u32 BRC_X2 = 0x00; +u32 BRC_X3 = 0x00; + +#define MAKEU32(a, b, c, d) (((u32)(a) << 24) | ((u32)(b) << 16) | ((u32)(c) << 8) | ((u32)(d))) +#define MulByPow2(x, k) ((((x) << k) | ((x) >> (31 - k))) & 0x7FFFFFFF) +#define MAKEU31(a, b, c) (((u32)(a) << 23) | ((u32)(b) << 8) | (u32)(c)) +#define ROT(a, k) (((a) << k) | ((a) >> (32 - k))) + +/* the s-boxes */ +u8 S0[256] = { + 0x3e, 0x72, 0x5b, 0x47, 0xca, 0xe0, 0x00, 0x33, 0x04, 0xd1, 0x54, 0x98, 0x09, 0xb9, 0x6d, 0xcb, 0x7b, 0x1b, 0xf9, + 0x32, 0xaf, 0x9d, 0x6a, 0xa5, 0xb8, 0x2d, 0xfc, 0x1d, 0x08, 0x53, 0x03, 0x90, 0x4d, 0x4e, 0x84, 0x99, 0xe4, 0xce, + 0xd9, 0x91, 0xdd, 0xb6, 0x85, 0x48, 0x8b, 0x29, 0x6e, 0xac, 0xcd, 0xc1, 0xf8, 0x1e, 0x73, 0x43, 0x69, 0xc6, 0xb5, + 0xbd, 0xfd, 0x39, 0x63, 0x20, 0xd4, 0x38, 0x76, 0x7d, 0xb2, 0xa7, 0xcf, 0xed, 0x57, 0xc5, 0xf3, 0x2c, 0xbb, 0x14, + 0x21, 0x06, 0x55, 0x9b, 0xe3, 0xef, 0x5e, 0x31, 0x4f, 0x7f, 0x5a, 0xa4, 0x0d, 0x82, 0x51, 0x49, 0x5f, 0xba, 0x58, + 0x1c, 0x4a, 0x16, 0xd5, 0x17, 0xa8, 0x92, 0x24, 0x1f, 0x8c, 0xff, 0xd8, 0xae, 0x2e, 0x01, 0xd3, 0xad, 0x3b, 0x4b, + 0xda, 0x46, 0xeb, 0xc9, 0xde, 0x9a, 0x8f, 0x87, 0xd7, 0x3a, 0x80, 0x6f, 0x2f, 0xc8, 0xb1, 0xb4, 0x37, 0xf7, 0x0a, + 0x22, 0x13, 0x28, 0x7c, 0xcc, 0x3c, 0x89, 0xc7, 0xc3, 0x96, 0x56, 0x07, 0xbf, 0x7e, 0xf0, 0x0b, 0x2b, 0x97, 0x52, + 0x35, 0x41, 0x79, 0x61, 0xa6, 0x4c, 0x10, 0xfe, 0xbc, 0x26, 0x95, 0x88, 0x8a, 0xb0, 0xa3, 0xfb, 0xc0, 0x18, 0x94, + 0xf2, 0xe1, 0xe5, 0xe9, 0x5d, 0xd0, 0xdc, 0x11, 0x66, 0x64, 0x5c, 0xec, 0x59, 0x42, 0x75, 0x12, 0xf5, 0x74, 0x9c, + 0xaa, 0x23, 0x0e, 0x86, 0xab, 0xbe, 0x2a, 0x02, 0xe7, 0x67, 0xe6, 0x44, 0xa2, 0x6c, 0xc2, 0x93, 0x9f, 0xf1, 0xf6, + 0xfa, 0x36, 0xd2, 0x50, 0x68, 0x9e, 0x62, 0x71, 0x15, 0x3d, 0xd6, 0x40, 0xc4, 0xe2, 0x0f, 0x8e, 0x83, 0x77, 0x6b, + 0x25, 0x05, 0x3f, 0x0c, 0x30, 0xea, 0x70, 0xb7, 0xa1, 0xe8, 0xa9, 0x65, 0x8d, 0x27, 0x1a, 0xdb, 0x81, 0xb3, 0xa0, + 0xf4, 0x45, 0x7a, 0x19, 0xdf, 0xee, 0x78, 0x34, 0x60}; +u8 S1[256] = { + 0x55, 0xc2, 0x63, 0x71, 0x3b, 0xc8, 0x47, 0x86, 0x9f, 0x3c, 0xda, 0x5b, 0x29, 0xaa, 0xfd, 0x77, 0x8c, 0xc5, 0x94, + 0x0c, 0xa6, 0x1a, 0x13, 0x00, 0xe3, 0xa8, 0x16, 0x72, 0x40, 0xf9, 0xf8, 0x42, 0x44, 0x26, 0x68, 0x96, 0x81, 0xd9, + 0x45, 0x3e, 0x10, 0x76, 0xc6, 0xa7, 0x8b, 0x39, 0x43, 0xe1, 0x3a, 0xb5, 0x56, 0x2a, 0xc0, 0x6d, 0xb3, 0x05, 0x22, + 0x66, 0xbf, 0xdc, 0x0b, 0xfa, 0x62, 0x48, 0xdd, 0x20, 0x11, 0x06, 0x36, 0xc9, 0xc1, 0xcf, 0xf6, 0x27, 0x52, 0xbb, + 0x69, 0xf5, 0xd4, 0x87, 0x7f, 0x84, 0x4c, 0xd2, 0x9c, 0x57, 0xa4, 0xbc, 0x4f, 0x9a, 0xdf, 0xfe, 0xd6, 0x8d, 0x7a, + 0xeb, 0x2b, 0x53, 0xd8, 0x5c, 0xa1, 0x14, 0x17, 0xfb, 0x23, 0xd5, 0x7d, 0x30, 0x67, 0x73, 0x08, 0x09, 0xee, 0xb7, + 0x70, 0x3f, 0x61, 0xb2, 0x19, 0x8e, 0x4e, 0xe5, 0x4b, 0x93, 0x8f, 0x5d, 0xdb, 0xa9, 0xad, 0xf1, 0xae, 0x2e, 0xcb, + 0x0d, 0xfc, 0xf4, 0x2d, 0x46, 0x6e, 0x1d, 0x97, 0xe8, 0xd1, 0xe9, 0x4d, 0x37, 0xa5, 0x75, 0x5e, 0x83, 0x9e, 0xab, + 0x82, 0x9d, 0xb9, 0x1c, 0xe0, 0xcd, 0x49, 0x89, 0x01, 0xb6, 0xbd, 0x58, 0x24, 0xa2, 0x5f, 0x38, 0x78, 0x99, 0x15, + 0x90, 0x50, 0xb8, 0x95, 0xe4, 0xd0, 0x91, 0xc7, 0xce, 0xed, 0x0f, 0xb4, 0x6f, 0xa0, 0xcc, 0xf0, 0x02, 0x4a, 0x79, + 0xc3, 0xde, 0xa3, 0xef, 0xea, 0x51, 0xe6, 0x6b, 0x18, 0xec, 0x1b, 0x2c, 0x80, 0xf7, 0x74, 0xe7, 0xff, 0x21, 0x5a, + 0x6a, 0x54, 0x1e, 0x41, 0x31, 0x92, 0x35, 0xc4, 0x33, 0x07, 0x0a, 0xba, 0x7e, 0x0e, 0x34, 0x88, 0xb1, 0x98, 0x7c, + 0xf3, 0x3d, 0x60, 0x6c, 0x7b, 0xca, 0xd3, 0x1f, 0x32, 0x65, 0x04, 0x28, 0x64, 0xbe, 0x85, 0x9b, 0x2f, 0x59, 0x8a, + 0xd7, 0xb0, 0x25, 0xac, 0xaf, 0x12, 0x03, 0xe2, 0xf2}; /* the constants D */ + +u32 EK_d[16] = {0x44D7, 0x26BC, 0x626B, 0x135E, 0x5789, 0x35E2, 0x7135, 0x09AF, + 0x4D78, 0x2F13, 0x6BC4, 0x1AF1, 0x5E26, 0x3C4D, 0x789A, 0x47AC}; + +/* ——————————————————————- */ +/* c = a + b mod (2^31 – 1) */ + +u32 AddM(u32 a, u32 b) +{ + u32 c = a + b; + return (c & 0x7FFFFFFF) + (c >> 31); +} +/* LFSR with initialization mode */ +void LFSRWithInitialisationMode(u32 u) +{ + u32 f, v; + f = ZUC_LFSR_S0; + v = MulByPow2(ZUC_LFSR_S0, 8); + f = AddM(f, v); + v = MulByPow2(ZUC_LFSR_S4, 20); + f = AddM(f, v); + v = MulByPow2(ZUC_LFSR_S10, 21); + f = AddM(f, v); + v = MulByPow2(ZUC_LFSR_S13, 17); + f = AddM(f, v); + v = MulByPow2(ZUC_LFSR_S15, 15); + f = AddM(f, v); + f = AddM(f, u); /* update the state */ + ZUC_LFSR_S0 = ZUC_LFSR_S1; + ZUC_LFSR_S1 = ZUC_LFSR_S2; + ZUC_LFSR_S2 = ZUC_LFSR_S3; + ZUC_LFSR_S3 = ZUC_LFSR_S4; + ZUC_LFSR_S4 = ZUC_LFSR_S5; + ZUC_LFSR_S5 = ZUC_LFSR_S6; + ZUC_LFSR_S6 = ZUC_LFSR_S7; + ZUC_LFSR_S7 = ZUC_LFSR_S8; + ZUC_LFSR_S8 = ZUC_LFSR_S9; + ZUC_LFSR_S9 = ZUC_LFSR_S10; + ZUC_LFSR_S10 = ZUC_LFSR_S11; + ZUC_LFSR_S11 = ZUC_LFSR_S12; + ZUC_LFSR_S12 = ZUC_LFSR_S13; + ZUC_LFSR_S13 = ZUC_LFSR_S14; + ZUC_LFSR_S14 = ZUC_LFSR_S15; + ZUC_LFSR_S15 = f; +} /* LFSR with work mode */ + +void LFSRWithWorkMode() +{ + u32 f, v; + f = ZUC_LFSR_S0; + v = MulByPow2(ZUC_LFSR_S0, 8); + f = AddM(f, v); + v = MulByPow2(ZUC_LFSR_S4, 20); + f = AddM(f, v); + v = MulByPow2(ZUC_LFSR_S10, 21); + f = AddM(f, v); + v = MulByPow2(ZUC_LFSR_S13, 17); + f = AddM(f, v); + v = MulByPow2(ZUC_LFSR_S15, 15); + f = AddM(f, v); /* update the state */ + ZUC_LFSR_S0 = ZUC_LFSR_S1; + ZUC_LFSR_S1 = ZUC_LFSR_S2; + ZUC_LFSR_S2 = ZUC_LFSR_S3; + ZUC_LFSR_S3 = ZUC_LFSR_S4; + ZUC_LFSR_S4 = ZUC_LFSR_S5; + ZUC_LFSR_S5 = ZUC_LFSR_S6; + ZUC_LFSR_S6 = ZUC_LFSR_S7; + ZUC_LFSR_S7 = ZUC_LFSR_S8; + ZUC_LFSR_S8 = ZUC_LFSR_S9; + ZUC_LFSR_S9 = ZUC_LFSR_S10; + ZUC_LFSR_S10 = ZUC_LFSR_S11; + ZUC_LFSR_S11 = ZUC_LFSR_S12; + ZUC_LFSR_S12 = ZUC_LFSR_S13; + ZUC_LFSR_S13 = ZUC_LFSR_S14; + ZUC_LFSR_S14 = ZUC_LFSR_S15; + ZUC_LFSR_S15 = f; +} + +/* BitReorganization */ +void BitReorganization() +{ + BRC_X0 = ((ZUC_LFSR_S15 & 0x7FFF8000) << 1) | (ZUC_LFSR_S14 & 0xFFFF); + BRC_X1 = ((ZUC_LFSR_S11 & 0xFFFF) << 16) | (ZUC_LFSR_S9 >> 15); + BRC_X2 = ((ZUC_LFSR_S7 & 0xFFFF) << 16) | (ZUC_LFSR_S5 >> 15); + BRC_X3 = ((ZUC_LFSR_S2 & 0xFFFF) << 16) | (ZUC_LFSR_S0 >> 15); +} + +/* L1 */ +u32 L1(u32 X) +{ + return (X ^ ROT(X, 2) ^ ROT(X, 10) ^ ROT(X, 18) ^ ROT(X, 24)); +} /* L2 */ + +u32 L2(u32 X) +{ + return (X ^ ROT(X, 8) ^ ROT(X, 14) ^ ROT(X, 22) ^ ROT(X, 30)); +} + +/* F */ +u32 F() +{ + u32 W, W1, W2, u, v; + W = (BRC_X0 ^ F_R1) + F_R2; + W1 = F_R1 + BRC_X1; + W2 = F_R2 ^ BRC_X2; + u = L1((W1 << 16) | (W2 >> 16)); + v = L2((W2 << 16) | (W1 >> 16)); + F_R1 = MAKEU32(S0[u >> 24], S1[(u >> 16) & 0xFF], S0[(u >> 8) & 0xFF], S1[u & 0xFF]); + F_R2 = MAKEU32(S0[v >> 24], S1[(v >> 16) & 0xFF], S0[(v >> 8) & 0xFF], S1[v & 0xFF]); + return W; +} + +/* initialize */ + +void zuc_initialize(u8* k, u8* iv) +{ + u32 w, nCount; /* expand key */ + ZUC_LFSR_S0 = MAKEU31(k[0], EK_d[0], iv[0]); + ZUC_LFSR_S1 = MAKEU31(k[1], EK_d[1], iv[1]); + ZUC_LFSR_S2 = MAKEU31(k[2], EK_d[2], iv[2]); + ZUC_LFSR_S3 = MAKEU31(k[3], EK_d[3], iv[3]); + ZUC_LFSR_S4 = MAKEU31(k[4], EK_d[4], iv[4]); + ZUC_LFSR_S5 = MAKEU31(k[5], EK_d[5], iv[5]); + ZUC_LFSR_S6 = MAKEU31(k[6], EK_d[6], iv[6]); + ZUC_LFSR_S7 = MAKEU31(k[7], EK_d[7], iv[7]); + ZUC_LFSR_S8 = MAKEU31(k[8], EK_d[8], iv[8]); + ZUC_LFSR_S9 = MAKEU31(k[9], EK_d[9], iv[9]); + ZUC_LFSR_S10 = MAKEU31(k[10], EK_d[10], iv[10]); + ZUC_LFSR_S11 = MAKEU31(k[11], EK_d[11], iv[11]); + ZUC_LFSR_S12 = MAKEU31(k[12], EK_d[12], iv[12]); + ZUC_LFSR_S13 = MAKEU31(k[13], EK_d[13], iv[13]); + ZUC_LFSR_S14 = MAKEU31(k[14], EK_d[14], iv[14]); + ZUC_LFSR_S15 = MAKEU31(k[15], EK_d[15], iv[15]); /* set F_R1 and F_R2 to zero */ + F_R1 = 0; + F_R2 = 0; + nCount = 32; + while (nCount > 0) { + BitReorganization(); + w = F(); + LFSRWithInitialisationMode(w >> 1); + nCount--; + } +} + +void zuc_generate_keystream(int KeystreamLen, u32* pKeystream) +{ + int i; + { + BitReorganization(); + F(); /* discard the output of F */ + LFSRWithWorkMode(); + } + for (i = 0; i < KeystreamLen; i++) { + BitReorganization(); + pKeystream[i] = F() ^ BRC_X3; + LFSRWithWorkMode(); + } +} \ No newline at end of file diff --git a/lib/test/common/CMakeLists.txt b/lib/test/common/CMakeLists.txt index 2ceccc687..f4969e54d 100644 --- a/lib/test/common/CMakeLists.txt +++ b/lib/test/common/CMakeLists.txt @@ -41,6 +41,10 @@ add_executable(test_eea2 test_eea2.cc) target_link_libraries(test_eea2 srslte_common srslte_phy ${CMAKE_THREAD_LIBS_INIT}) add_test(test_eea2 test_eea2) +add_executable(test_eea3 test_eea3.cc) +target_link_libraries(test_eea3 srslte_common srslte_phy ${CMAKE_THREAD_LIBS_INIT}) +add_test(test_eea3 test_eea3) + add_executable(test_f12345 test_f12345.cc) target_link_libraries(test_f12345 srslte_common ${CMAKE_THREAD_LIBS_INIT}) add_test(test_f12345 test_f12345) diff --git a/lib/test/common/test_eea2.cc b/lib/test/common/test_eea2.cc index c5bb6fa8c..5fd7c1868 100644 --- a/lib/test/common/test_eea2.cc +++ b/lib/test/common/test_eea2.cc @@ -23,7 +23,6 @@ #include #include -#include "srslte/common/liblte_security.h" #include "srslte/srslte.h" #include "srslte/common/liblte_security.h" diff --git a/lib/test/common/test_eea3.cc b/lib/test/common/test_eea3.cc new file mode 100644 index 000000000..6ec3b1cb9 --- /dev/null +++ b/lib/test/common/test_eea3.cc @@ -0,0 +1,87 @@ +/* + * Includes + */ + +#include +#include +#include + +#include "srslte/common/liblte_security.h" +#include "srslte/srslte.h" + +/* + * Prototypes + */ + +int32 arrcmp(uint8_t const* const a, uint8_t const* const b, uint32 len) +{ + uint32 i = 0; + + for (i = 0; i < len; i++) { + if (a[i] != b[i]) { + return a[i] - b[i]; + } + } + return 0; +} + +/* + * Tests + * + * Document Reference: 33.401 V13.1.0 Annex C.1 + */ + +void test_set_1() +{ + LIBLTE_ERROR_ENUM err_lte = LIBLTE_ERROR_INVALID_INPUTS; + int32 err_cmp = 0; + + uint8_t key[] = {0x17, 0x3d, 0x14, 0xba, 0x50, 0x03, 0x73, 0x1d, 0x7a, 0x60, 0x04, 0x94, 0x70, 0xf0, 0x0a, 0x29}; + uint32_t count = 0x66035492; + uint8_t bearer = 0xf; + uint8_t direction = 0; + uint32_t len_bits = 193; + uint32_t len_bytes = (len_bits + 7) / 8; + + uint8_t msg[] = {0x6c, 0xf6, 0x53, 0x40, 0x73, 0x55, 0x52, 0xab, 0x0c, 0x97, 0x52, 0xfa, 0x6f, 0x90, + 0x25, 0xfe, 0x0b, 0xd6, 0x75, 0xd9, 0x00, 0x58, 0x75, 0xb2, 0x00, 0x00, 0x00, 0x00}; + + uint8_t ct[] = {0xa6, 0xc8, 0x5f, 0xc6, 0x6a, 0xfb, 0x85, 0x33, 0xaa, 0xfc, 0x25, 0x18, 0xdf, 0xe7, + 0x84, 0x94, 0x0e, 0xe1, 0xe4, 0xb0, 0x30, 0x23, 0x8c, 0xc8, 0x00, 0x00, 0x00, 0x00}; + + uint8_t* out = (uint8_t*)calloc(len_bytes, sizeof(uint8_t)); + + // encryption + err_lte = liblte_security_encryption_eea3(key, count, bearer, direction, msg, len_bits, out); + assert(err_lte == LIBLTE_SUCCESS); + + // compare cipher text + err_cmp = arrcmp(ct, out, len_bytes); + for (int i = 0; i < len_bytes; i++){ + printf("%x ", out[i]); + } + + printf("\n"); + if (err_cmp == 0) { + printf("Success\n"); + } else { + printf("Fail\n"); + } + + assert(err_cmp == 0); + + // decryption + // err_lte = liblte_security_decryption_eea3(key, count, bearer, direction, ct, len_bits, out); + // assert(err_lte == LIBLTE_SUCCESS); + + // compare cipher text + // err_cmp = arrcmp(msg, out, len_bytes); + // assert(err_cmp == 0); + + free(out); +} + +int main(int argc, char* argv[]) +{ + test_set_1(); +}