blob: 68f4b2a304f75242fce428eb6acdb20b3c349e68 [file] [log] [blame]
Neels Hofmeyr17518fe2017-06-20 04:35:06 +02001/*! \file comp128v23.c
2 * COMP128 version 2 and 3 implementation, common algorithm used for GSM Authentication (A3/A8).
Kevin Redonbe355cd2013-11-02 18:11:01 +01003 *
4 * This code is a C conversion of the original code from
5 * http://www.hackingprojects.net/
Kevin Redonbe355cd2013-11-02 18:11:01 +01006 */
Neels Hofmeyr17518fe2017-06-20 04:35:06 +02007/*
8 * (C) 2013 by Kévin Redon <kevredon@mail.tsaitgaist.info>
Kevin Redonbe355cd2013-11-02 18:11:01 +01009 *
10 * All Rights Reserved
11 *
Harald Weltee08da972017-11-13 01:00:26 +090012 * SPDX-License-Identifier: GPL-2.0+
13 *
Kevin Redonbe355cd2013-11-02 18:11:01 +010014 * This program is free software; you can redistribute it and/or modify
15 * it under the terms of the GNU General Public License as published by
16 * the Free Software Foundation; either version 2 of the License, or
17 * (at your option) any later version.
18 *
19 * This program is distributed in the hope that it will be useful,
20 * but WITHOUT ANY WARRANTY; without even the implied warranty of
21 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
22 * GNU General Public License for more details.
23 *
24 * You should have received a copy of the GNU General Public License along
25 * with this program; if not, write to the Free Software Foundation, Inc.,
26 * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
27 *
28 */
29
30#include <stdint.h>
31#include <string.h>
32
Harald Welte96e2a002017-06-12 21:44:18 +020033/*! \addtogroup auth
34 * @{
Neels Hofmeyr17518fe2017-06-20 04:35:06 +020035 * \file comp128v23.c */
Harald Welte96e2a002017-06-12 21:44:18 +020036
Kevin Redonbe355cd2013-11-02 18:11:01 +010037static const uint8_t table0[256] = {
38 197, 235, 60, 151, 98, 96, 3, 100, 248, 118, 42, 117, 172, 211, 181, 203, 61,
39 126, 156, 87, 149, 224, 55, 132, 186, 63, 238, 255, 85, 83, 152, 33, 160,
40 184, 210, 219, 159, 11, 180, 194, 130, 212, 147, 5, 215, 92, 27, 46, 113,
41 187, 52, 25, 185, 79, 221, 48, 70, 31, 101, 15, 195, 201, 50, 222, 137,
42 233, 229, 106, 122, 183, 178, 177, 144, 207, 234, 182, 37, 254, 227, 231, 54,
43 209, 133, 65, 202, 69, 237, 220, 189, 146, 120, 68, 21, 125, 38, 30, 2,
44 155, 53, 196, 174, 176, 51, 246, 167, 76, 110, 20, 82, 121, 103, 112, 56,
45 173, 49, 217, 252, 0, 114, 228, 123, 12, 93, 161, 253, 232, 240, 175, 67,
46 128, 22, 158, 89, 18, 77, 109, 190, 17, 62, 4, 153, 163, 59, 145, 138,
47 7, 74, 205, 10, 162, 80, 45, 104, 111, 150, 214, 154, 28, 191, 169, 213,
48 88, 193, 198, 200, 245, 39, 164, 124, 84, 78, 1, 188, 170, 23, 86, 226,
49 141, 32, 6, 131, 127, 199, 40, 135, 16, 57, 71, 91, 225, 168, 242, 206,
50 97, 166, 44, 14, 90, 236, 239, 230, 244, 223, 108, 102, 119, 148, 251, 29,
51 216, 8, 9, 249, 208, 24, 105, 94, 34, 64, 95, 115, 72, 134, 204, 43,
52 247, 243, 218, 47, 58, 73, 107, 241, 179, 116, 66, 36, 143, 81, 250, 139,
53 19, 13, 142, 140, 129, 192, 99, 171, 157, 136, 41, 75, 35, 165, 26
54}, table1[256] = {
55 170, 42, 95, 141, 109, 30, 71, 89, 26, 147, 231, 205, 239, 212, 124, 129, 216,
56 79, 15, 185, 153, 14, 251, 162, 0, 241, 172, 197, 43, 10, 194, 235, 6,
57 20, 72, 45, 143, 104, 161, 119, 41, 136, 38, 189, 135, 25, 93, 18, 224,
58 171, 252, 195, 63, 19, 58, 165, 23, 55, 133, 254, 214, 144, 220, 178, 156,
59 52, 110, 225, 97, 183, 140, 39, 53, 88, 219, 167, 16, 198, 62, 222, 76,
60 139, 175, 94, 51, 134, 115, 22, 67, 1, 249, 217, 3, 5, 232, 138, 31,
61 56, 116, 163, 70, 128, 234, 132, 229, 184, 244, 13, 34, 73, 233, 154, 179,
62 131, 215, 236, 142, 223, 27, 57, 246, 108, 211, 8, 253, 85, 66, 245, 193,
63 78, 190, 4, 17, 7, 150, 127, 152, 213, 37, 186, 2, 243, 46, 169, 68,
64 101, 60, 174, 208, 158, 176, 69, 238, 191, 90, 83, 166, 125, 77, 59, 21,
65 92, 49, 151, 168, 99, 9, 50, 146, 113, 117, 228, 65, 230, 40, 82, 54,
66 237, 227, 102, 28, 36, 107, 24, 44, 126, 206, 201, 61, 114, 164, 207, 181,
67 29, 91, 64, 221, 255, 48, 155, 192, 111, 180, 210, 182, 247, 203, 148, 209,
68 98, 173, 11, 75, 123, 250, 118, 32, 47, 240, 202, 74, 177, 100, 80, 196,
69 33, 248, 86, 157, 137, 120, 130, 84, 204, 122, 81, 242, 188, 200, 149, 226,
70 218, 160, 187, 106, 35, 87, 105, 96, 145, 199, 159, 12, 121, 103, 112
71};
72
Kevin Redonbe355cd2013-11-02 18:11:01 +010073
74static void
75_comp128v23_internal(uint8_t *output, const uint8_t *kxor, const uint8_t *rand)
76{
Max4f0abc02013-12-02 11:30:32 +010077 uint8_t temp[16];
78 uint8_t km_rm[32];
Kevin Redonbe355cd2013-11-02 18:11:01 +010079 uint8_t i,j,k,z;
80
Max4f0abc02013-12-02 11:30:32 +010081 memset(temp, 0, sizeof(temp));
82 memcpy(km_rm, rand, 16);
83 memcpy(km_rm + 16, kxor, 16);
Kevin Redonbe355cd2013-11-02 18:11:01 +010084
85 for (i=0; i<5; i++) {
86 for (z=0; z<16; z++) {
87 temp[z] = table0[table1[km_rm[16+z]]^km_rm[z]];
88 }
89 j=0;
90 while ((1<<i)>j) {
91 k = 0;
92 while ((1<<(4-i))>k) {
93 km_rm[((2*k+1)<<i)+j] = table0[table1[temp[(k<<i)+j]]^(km_rm[(k<<i)+16+j])];
94 km_rm[(k<<(i+1))+j] = temp[(k<<i)+j];
95 k++;
96 }
97 j++;
98 }
99 }
100
101 memset(output,0,16);
102
103 for (i=0; i<16; i++) {
104 for (j=0; j<8; j++) {
105 output[i] ^= (((km_rm[(19*(j+8*i)+19)%256/8]>>(3*j+3)%8)&1)<< j);
106 }
107 }
108}
109
Neels Hofmeyr87e45502017-06-20 00:17:59 +0200110/*! Perform COMP128v3 algorithm
Harald Welte96e2a002017-06-12 21:44:18 +0200111 * \param[in] ki Secret Key K(i) of subscriber
112 * \param[in] rand Random Challenge
113 * \param[out] sres user-supplied buffer for storing computed SRES value
114 * \param[out] kc user-supplied buffer for storing computed Kc value
115 * \returns 0 */
Kevin Redonbe355cd2013-11-02 18:11:01 +0100116int
Max4f0abc02013-12-02 11:30:32 +0100117comp128v3(const uint8_t *ki, const uint8_t *rand, uint8_t *sres, uint8_t *kc)
Kevin Redonbe355cd2013-11-02 18:11:01 +0100118{
Max4f0abc02013-12-02 11:30:32 +0100119 uint8_t k_mix[16];
120 uint8_t rand_mix[16];
121 uint8_t katyvasz[16];
122 uint8_t output[16];
123 uint8_t i;
Kevin Redonbe355cd2013-11-02 18:11:01 +0100124
Max4f0abc02013-12-02 11:30:32 +0100125 memset(k_mix, 0, sizeof(k_mix));
126 memset(rand_mix, 0, sizeof(rand_mix));
127 memset(katyvasz, 0, sizeof(katyvasz));
128 memset(output, 0, sizeof(output));
Kevin Redonbe355cd2013-11-02 18:11:01 +0100129
130 for (i=0; i<8; i++) {
131 k_mix[i] = ki[15 - i];
132 k_mix[15 - i] = ki[i];
133 }
134
135 for (i=0; i<8; i++) {
136 rand_mix[i] = rand[15 - i];
137 rand_mix[15 - i] = rand[i];
138 }
139
140 for (i=0; i<16; i++) {
141 katyvasz[i] = k_mix[i]^rand_mix[i];
142 }
143
144 for (i=0; i<8; i++) {
145 _comp128v23_internal(rand_mix,katyvasz,rand_mix);
146 }
147
148 for (i=0; i<16; i++) {
149 output[i] = rand_mix[15-i];
150 }
151
Max4f0abc02013-12-02 11:30:32 +0100152 memmove(output + 4, output + 8, 8); /* ignore bytes 4..7 */
Kevin Redonbe355cd2013-11-02 18:11:01 +0100153
154 /* the algorithm uses 16 bytes until this point, but only 12 bytes are effective
155 * also 12 bytes coming out from the SIM card */
Max4f0abc02013-12-02 11:30:32 +0100156 memcpy(sres, output, 4);
157 memcpy(kc, output + 4, 8);
Kevin Redonbe355cd2013-11-02 18:11:01 +0100158
159 return 0;
160}
Max4f0abc02013-12-02 11:30:32 +0100161
Neels Hofmeyr87e45502017-06-20 00:17:59 +0200162/*! Perform COMP128v2 algorithm
Harald Welte96e2a002017-06-12 21:44:18 +0200163 * \param[in] ki Secret Key K(i) of subscriber
164 * \param[in] rand Random Challenge
165 * \param[out] sres user-supplied buffer for storing computed SRES value
166 * \param[out] kc user-supplied buffer for storing computed Kc value
167 * \returns 0 */
Max4f0abc02013-12-02 11:30:32 +0100168int
169comp128v2(const uint8_t *ki, const uint8_t *rand, uint8_t *sres, uint8_t *kc)
170{
171 int r = comp128v3(ki, rand, sres, kc);
172 kc[7] = 0; /* 10 last bits of Kc forced to 0 */
173 kc[6] &= 0xfc;
174 return r;
175}
Harald Welte96e2a002017-06-12 21:44:18 +0200176
177/*! @} */