From c8c35eea0926f5a753ac7e661a276469c7432913 Mon Sep 17 00:00:00 2001 From: Neels Hofmeyr Date: Fri, 12 Aug 2016 16:03:09 +0200 Subject: Iu auth wip Change-Id: I44effcca80dc6850178174dc957bcd5608b0ae14 --- openbsc/src/libmsc/gsm_04_08.c | 25 +++++++++++++++++++++++++ 1 file changed, 25 insertions(+) diff --git a/openbsc/src/libmsc/gsm_04_08.c b/openbsc/src/libmsc/gsm_04_08.c index c6211eebe..cf16fcc35 100644 --- a/openbsc/src/libmsc/gsm_04_08.c +++ b/openbsc/src/libmsc/gsm_04_08.c @@ -31,6 +31,7 @@ #include #include #include +#include #include "bscconfig.h" @@ -69,6 +70,7 @@ #include #include #include +#include #include @@ -174,6 +176,29 @@ void allocate_security_operation(struct gsm_subscriber_connection *conn) subscr_con_get(conn); } +int iu_hack__get_hardcoded_auth_tuple(struct gsm_auth_tuple *atuple) +{ + unsigned char tmp_rand[16]; + /* Ki 000102030405060708090a0b0c0d0e0f */ + struct osmo_sub_auth_data auth = { + .type = OSMO_AUTH_TYPE_GSM, + .algo = OSMO_AUTH_ALG_COMP128v1, + .u.gsm.ki = { + 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, + 0x07, 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, + 0x0e, 0x0f + }, + }; + + RAND_bytes(tmp_rand, sizeof(tmp_rand)); + + memset(&atuple->vec, 0, sizeof(atuple->vec)); + osmo_auth_gen_vec(&atuple->vec, &auth, tmp_rand); + + atuple->key_seq = 0; + return AUTH_DO_AUTH; +} + int gsm48_secure_channel(struct gsm_subscriber_connection *conn, int key_seq, gsm_cbfn *cb, void *cb_data) { -- cgit v1.2.3