blob: 9e6112b1e46cf1e90425449e9e9e8570347fbe65 [file] [log] [blame]
ptrkrysik18b631e2014-12-15 09:09:18 +01001/* -*- c++ -*- */
Martin Jesper Low Madsenaf769642015-04-28 22:33:43 +02002/*
ptrkrysik18b631e2014-12-15 09:09:18 +01003 * Copyright 2014 <+YOU OR YOUR COMPANY+>.
Martin Jesper Low Madsenaf769642015-04-28 22:33:43 +02004 *
ptrkrysik18b631e2014-12-15 09:09:18 +01005 * This is free software; you can redistribute it and/or modify
6 * it under the terms of the GNU General Public License as published by
7 * the Free Software Foundation; either version 3, or (at your option)
8 * any later version.
Martin Jesper Low Madsenaf769642015-04-28 22:33:43 +02009 *
ptrkrysik18b631e2014-12-15 09:09:18 +010010 * This software is distributed in the hope that it will be useful,
11 * but WITHOUT ANY WARRANTY; without even the implied warranty of
12 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
13 * GNU General Public License for more details.
Martin Jesper Low Madsenaf769642015-04-28 22:33:43 +020014 *
ptrkrysik18b631e2014-12-15 09:09:18 +010015 * You should have received a copy of the GNU General Public License
16 * along with this software; see the file COPYING. If not, write to
17 * the Free Software Foundation, Inc., 51 Franklin Street,
18 * Boston, MA 02110-1301, USA.
19 */
20
21#ifdef HAVE_CONFIG_H
22#include "config.h"
23#endif
24
25#include <gnuradio/io_signature.h>
ptrkrysik18b631e2014-12-15 09:09:18 +010026#include <grgsm/gsmtap.h>
ptrkrysik5817a792015-04-25 18:51:08 +020027#include <grgsm/endian.h>
Roman Khassraf4dec5402015-07-17 18:32:22 +020028#include <numeric>
ptrkrysik18b631e2014-12-15 09:09:18 +010029#include "decryption_impl.h"
ptrkrysik18b631e2014-12-15 09:09:18 +010030
Roman Khassrafc51f12b2015-07-17 15:18:10 +020031extern "C" {
32 #include <osmocom/gsm/a5.h>
33}
ptrkrysik5817a792015-04-25 18:51:08 +020034
ptrkrysik18b631e2014-12-15 09:09:18 +010035const uint32_t BURST_SIZE=148;
36
37namespace gr {
38 namespace gsm {
39
40 decryption::sptr
Roman Khassraf4dec5402015-07-17 18:32:22 +020041 decryption::make(const std::vector<uint8_t> & k_c, unsigned int a5_version)
ptrkrysik18b631e2014-12-15 09:09:18 +010042 {
43 return gnuradio::get_initial_sptr
Roman Khassraf4dec5402015-07-17 18:32:22 +020044 (new decryption_impl(k_c, a5_version));
ptrkrysik18b631e2014-12-15 09:09:18 +010045 }
46
47 /*
48 * The private constructor
49 */
Roman Khassraf4dec5402015-07-17 18:32:22 +020050 decryption_impl::decryption_impl(const std::vector<uint8_t> & k_c, unsigned int a5_version)
ptrkrysik18b631e2014-12-15 09:09:18 +010051 : gr::block("decryption",
52 gr::io_signature::make(0, 0, 0),
Roman Khassraf4dec5402015-07-17 18:32:22 +020053 gr::io_signature::make(0, 0, 0)),
54 d_k_c_valid(false)
ptrkrysik18b631e2014-12-15 09:09:18 +010055 {
56 set_k_c(k_c);
Roman Khassraf4dec5402015-07-17 18:32:22 +020057 set_a5_version(a5_version);
58 validate_k_c();
ptrkrysik18b631e2014-12-15 09:09:18 +010059
60// std::cout << "Be careful with decryption block - it wasn't tested yet!" << std::endl;
61 message_port_register_in(pmt::mp("bursts"));
62 set_msg_handler(pmt::mp("bursts"), boost::bind(&decryption_impl::decrypt, this, _1));
63 message_port_register_out(pmt::mp("bursts"));
64 }
65
66 /*
67 * Virtual destructor
68 */
69 decryption_impl::~decryption_impl()
70 {
71 }
Martin Jesper Low Madsenaf769642015-04-28 22:33:43 +020072
ptrkrysik18b631e2014-12-15 09:09:18 +010073 void decryption_impl::set_k_c(const std::vector<uint8_t> & k_c)
74 {
Roman Khassraf4dec5402015-07-17 18:32:22 +020075 d_k_c = k_c;
76 }
77
78 void decryption_impl::set_a5_version(unsigned int a5_version)
79 {
80 d_a5_version = 1;
81 if (a5_version >= 1 && a5_version <= 4)
Roman Khassrafc51f12b2015-07-17 15:18:10 +020082 {
Roman Khassraf4dec5402015-07-17 18:32:22 +020083 d_a5_version = a5_version;
84 }
85 }
86
87 void decryption_impl::validate_k_c()
88 {
89 if (d_k_c.size() == 0)
90 {
91 d_k_c_valid = false;
92 return;
93 }
94 else if ((d_a5_version < 4 && d_k_c.size() != 8) || (d_a5_version == 4 && d_k_c.size() != 16))
95 {
96 d_k_c_valid = false;
97 return;
Roman Khassrafc51f12b2015-07-17 15:18:10 +020098 }
99 else
100 {
Roman Khassraf4dec5402015-07-17 18:32:22 +0200101 for (int i=0; i<d_k_c.size(); i++)
Roman Khassrafc51f12b2015-07-17 15:18:10 +0200102 {
Roman Khassraf4dec5402015-07-17 18:32:22 +0200103 if (d_k_c[i] != 0)
104 {
105 d_k_c_valid = true;
106 return;
107 }
Roman Khassrafc51f12b2015-07-17 15:18:10 +0200108 }
109 }
ptrkrysik18b631e2014-12-15 09:09:18 +0100110 }
Martin Jesper Low Madsenaf769642015-04-28 22:33:43 +0200111
ptrkrysik18b631e2014-12-15 09:09:18 +0100112 void decryption_impl::decrypt(pmt::pmt_t msg)
113 {
Roman Khassraf4dec5402015-07-17 18:32:22 +0200114 if (!d_k_c_valid)
ptrkrysik18b631e2014-12-15 09:09:18 +0100115 {
116 message_port_pub(pmt::mp("bursts"), msg);
Roman Khassraf4dec5402015-07-17 18:32:22 +0200117 }
118 else
ptrkrysik18b631e2014-12-15 09:09:18 +0100119 {
120 uint8_t decrypted_data[BURST_SIZE];
Roman Khassrafc51f12b2015-07-17 15:18:10 +0200121 uint8_t keystream[114];
Martin Jesper Low Madsenaf769642015-04-28 22:33:43 +0200122
ptrkrysik18b631e2014-12-15 09:09:18 +0100123 pmt::pmt_t header_plus_burst = pmt::cdr(msg);
124 gsmtap_hdr * header = (gsmtap_hdr *)pmt::blob_data(header_plus_burst);
125 uint8_t * burst_binary = (uint8_t *)(pmt::blob_data(header_plus_burst))+sizeof(gsmtap_hdr);
Martin Jesper Low Madsenaf769642015-04-28 22:33:43 +0200126
ptrkrysik4739c942015-02-07 19:51:03 +0100127 uint32_t frame_number = be32toh(header->frame_number);
128 bool uplink_burst = (be16toh(header->arfcn) & 0x4000) ? true : false;
Martin Jesper Low Madsenaf769642015-04-28 22:33:43 +0200129
ptrkrysik18b631e2014-12-15 09:09:18 +0100130 if(uplink_burst){
131 //process uplink burst
Roman Khassraf4dec5402015-07-17 18:32:22 +0200132 osmo_a5(d_a5_version, &d_k_c[0], frame_number, NULL, keystream);
ptrkrysik18b631e2014-12-15 09:09:18 +0100133 } else {
134 //process downlink burst
Roman Khassraf4dec5402015-07-17 18:32:22 +0200135 osmo_a5(d_a5_version, &d_k_c[0], frame_number, keystream, NULL);
ptrkrysik18b631e2014-12-15 09:09:18 +0100136 }
137 /* guard bits */
138 for (int i = 0; i < 3; i++) {
139 decrypted_data[i] = burst_binary[i];
140 }
ptrkrysika1871f52014-12-15 09:38:00 +0100141 //encrypt first part of the burst
ptrkrysik18b631e2014-12-15 09:09:18 +0100142 for (int i = 0; i < 57; i++) {
143 decrypted_data[i+3] = keystream[i] ^ burst_binary[i+3];
144 }
145 /* stealing bits and midamble */
146 for (int i = 60; i < 88; i++) {
147 decrypted_data[i] = burst_binary[i];
148 }
ptrkrysika1871f52014-12-15 09:38:00 +0100149 //encrypt second part of the burst
ptrkrysik18b631e2014-12-15 09:09:18 +0100150 for (int i = 0; i < 57; i++) {
151 decrypted_data[i+88] = keystream[i+57] ^ burst_binary[i+88];
152 }
153 /* guard bits */
154 for (int i = 145; i < 148; i++) {
155 decrypted_data[i] = burst_binary[i];
156 }
157 uint8_t new_header_plus_burst[sizeof(gsmtap_hdr)+BURST_SIZE];
158 memcpy(new_header_plus_burst, header, sizeof(gsmtap_hdr));
159 memcpy(new_header_plus_burst+sizeof(gsmtap_hdr), decrypted_data, BURST_SIZE);
Martin Jesper Low Madsenaf769642015-04-28 22:33:43 +0200160
ptrkrysik18b631e2014-12-15 09:09:18 +0100161 pmt::pmt_t msg_binary_blob = pmt::make_blob(new_header_plus_burst, sizeof(gsmtap_hdr)+BURST_SIZE);
162 pmt::pmt_t msg_out = pmt::cons(pmt::PMT_NIL, msg_binary_blob);
Martin Jesper Low Madsenaf769642015-04-28 22:33:43 +0200163
ptrkrysik18b631e2014-12-15 09:09:18 +0100164 message_port_pub(pmt::mp("bursts"), msg_out);
165 }
166 return;
167 }
168 } /* namespace gsm */
169} /* namespace gr */