]> git.ipfire.org Git - thirdparty/hostap.git/blame - hostapd/hlr_auc_gw.c
DPP: Fix hostapd build dependencies for DPP-only build
[thirdparty/hostap.git] / hostapd / hlr_auc_gw.c
CommitLineData
6fc6879b
JM
1/*
2 * HLR/AuC testing gateway for hostapd EAP-SIM/AKA database/authenticator
6774c6a9 3 * Copyright (c) 2005-2007, 2012-2017, Jouni Malinen <j@w1.fi>
6fc6879b 4 *
0f3d578e
JM
5 * This software may be distributed under the terms of the BSD license.
6 * See README for more details.
6fc6879b
JM
7 *
8 * This is an example implementation of the EAP-SIM/AKA database/authentication
9 * gateway interface to HLR/AuC. It is expected to be replaced with an
10 * implementation of SS7 gateway to GSM/UMTS authentication center (HLR/AuC) or
11 * a local implementation of SIM triplet and AKA authentication data generator.
12 *
13 * hostapd will send SIM/AKA authentication queries over a UNIX domain socket
14 * to and external program, e.g., this hlr_auc_gw. This interface uses simple
15 * text-based format:
16 *
17 * EAP-SIM / GSM triplet query/response:
18 * SIM-REQ-AUTH <IMSI> <max_chal>
19 * SIM-RESP-AUTH <IMSI> Kc1:SRES1:RAND1 Kc2:SRES2:RAND2 [Kc3:SRES3:RAND3]
20 * SIM-RESP-AUTH <IMSI> FAILURE
84dc1370
JM
21 * GSM-AUTH-REQ <IMSI> RAND1:RAND2[:RAND3]
22 * GSM-AUTH-RESP <IMSI> Kc1:SRES1:Kc2:SRES2[:Kc3:SRES3]
23 * GSM-AUTH-RESP <IMSI> FAILURE
6fc6879b
JM
24 *
25 * EAP-AKA / UMTS query/response:
26 * AKA-REQ-AUTH <IMSI>
27 * AKA-RESP-AUTH <IMSI> <RAND> <AUTN> <IK> <CK> <RES>
28 * AKA-RESP-AUTH <IMSI> FAILURE
29 *
30 * EAP-AKA / UMTS AUTS (re-synchronization):
31 * AKA-AUTS <IMSI> <AUTS> <RAND>
32 *
33 * IMSI and max_chal are sent as an ASCII string,
34 * Kc/SRES/RAND/AUTN/IK/CK/RES/AUTS as hex strings.
35 *
9a50ee6d 36 * An example implementation here reads GSM authentication triplets from a
6fc6879b
JM
37 * text file in IMSI:Kc:SRES:RAND format, IMSI in ASCII, other fields as hex
38 * strings. This is used to simulate an HLR/AuC. As such, it is not very useful
39 * for real life authentication, but it is useful both as an example
5daba48c
JM
40 * implementation and for EAP-SIM/AKA/AKA' testing.
41 *
9a50ee6d
JM
42 * For a stronger example design, Milenage and GSM-Milenage algorithms can be
43 * used to dynamically generate authenticatipn information for EAP-AKA/AKA' and
44 * EAP-SIM, respectively, if Ki is known.
45 *
5daba48c
JM
46 * SQN generation follows the not time-based Profile 2 described in
47 * 3GPP TS 33.102 Annex C.3.2. The length of IND is 5 bits by default, but this
48 * can be changed with a command line options if needed.
6fc6879b
JM
49 */
50
51#include "includes.h"
52#include <sys/un.h>
597d5d1b
JM
53#ifdef CONFIG_SQLITE
54#include <sqlite3.h>
55#endif /* CONFIG_SQLITE */
6fc6879b
JM
56
57#include "common.h"
43df4cc2 58#include "crypto/milenage.h"
3642c431 59#include "crypto/random.h"
6fc6879b
JM
60
61static const char *default_socket_path = "/tmp/hlr_auc_gw.sock";
62static const char *socket_path;
63static int serv_sock = -1;
53368613
JM
64static char *milenage_file = NULL;
65static int update_milenage = 0;
66static int sqn_changes = 0;
5daba48c 67static int ind_len = 5;
3e6547b5 68static int stdout_debug = 1;
6fc6879b
JM
69
70/* GSM triplets */
71struct gsm_triplet {
72 struct gsm_triplet *next;
73 char imsi[20];
74 u8 kc[8];
75 u8 sres[4];
76 u8 _rand[16];
77};
78
79static struct gsm_triplet *gsm_db = NULL, *gsm_db_pos = NULL;
80
81/* OPc and AMF parameters for Milenage (Example algorithms for AKA). */
82struct milenage_parameters {
83 struct milenage_parameters *next;
84 char imsi[20];
85 u8 ki[16];
86 u8 opc[16];
87 u8 amf[2];
88 u8 sqn[6];
4309ca51 89 int set;
68127824 90 size_t res_len;
6fc6879b
JM
91};
92
93static struct milenage_parameters *milenage_db = NULL;
94
95#define EAP_SIM_MAX_CHAL 3
96
97#define EAP_AKA_RAND_LEN 16
98#define EAP_AKA_AUTN_LEN 16
99#define EAP_AKA_AUTS_LEN 14
68127824 100#define EAP_AKA_RES_MIN_LEN 4
6fc6879b
JM
101#define EAP_AKA_RES_MAX_LEN 16
102#define EAP_AKA_IK_LEN 16
103#define EAP_AKA_CK_LEN 16
104
105
597d5d1b
JM
106#ifdef CONFIG_SQLITE
107
108static sqlite3 *sqlite_db = NULL;
109static struct milenage_parameters db_tmp_milenage;
110
111
112static int db_table_exists(sqlite3 *db, const char *name)
113{
114 char cmd[128];
115 os_snprintf(cmd, sizeof(cmd), "SELECT 1 FROM %s;", name);
116 return sqlite3_exec(db, cmd, NULL, NULL, NULL) == SQLITE_OK;
117}
118
119
120static int db_table_create_milenage(sqlite3 *db)
121{
122 char *err = NULL;
123 const char *sql =
124 "CREATE TABLE milenage("
125 " imsi INTEGER PRIMARY KEY NOT NULL,"
126 " ki CHAR(32) NOT NULL,"
127 " opc CHAR(32) NOT NULL,"
128 " amf CHAR(4) NOT NULL,"
68127824
JM
129 " sqn CHAR(12) NOT NULL,"
130 " res_len INTEGER"
597d5d1b
JM
131 ");";
132
133 printf("Adding database table for milenage information\n");
134 if (sqlite3_exec(db, sql, NULL, NULL, &err) != SQLITE_OK) {
135 printf("SQLite error: %s\n", err);
136 sqlite3_free(err);
137 return -1;
138 }
139
140 return 0;
141}
142
143
144static sqlite3 * db_open(const char *db_file)
145{
146 sqlite3 *db;
147
148 if (sqlite3_open(db_file, &db)) {
149 printf("Failed to open database %s: %s\n",
150 db_file, sqlite3_errmsg(db));
151 sqlite3_close(db);
152 return NULL;
153 }
154
155 if (!db_table_exists(db, "milenage") &&
156 db_table_create_milenage(db) < 0) {
157 sqlite3_close(db);
158 return NULL;
159 }
160
161 return db;
162}
163
164
165static int get_milenage_cb(void *ctx, int argc, char *argv[], char *col[])
166{
167 struct milenage_parameters *m = ctx;
168 int i;
169
4309ca51
JM
170 m->set = 1;
171
597d5d1b
JM
172 for (i = 0; i < argc; i++) {
173 if (os_strcmp(col[i], "ki") == 0 && argv[i] &&
174 hexstr2bin(argv[i], m->ki, sizeof(m->ki))) {
175 printf("Invalid ki value in database\n");
176 return -1;
177 }
178
179 if (os_strcmp(col[i], "opc") == 0 && argv[i] &&
180 hexstr2bin(argv[i], m->opc, sizeof(m->opc))) {
181 printf("Invalid opcvalue in database\n");
182 return -1;
183 }
184
185 if (os_strcmp(col[i], "amf") == 0 && argv[i] &&
186 hexstr2bin(argv[i], m->amf, sizeof(m->amf))) {
187 printf("Invalid amf value in database\n");
188 return -1;
189 }
190
191 if (os_strcmp(col[i], "sqn") == 0 && argv[i] &&
192 hexstr2bin(argv[i], m->sqn, sizeof(m->sqn))) {
193 printf("Invalid sqn value in database\n");
194 return -1;
195 }
68127824
JM
196
197 if (os_strcmp(col[i], "res_len") == 0 && argv[i]) {
198 m->res_len = atoi(argv[i]);
199 }
597d5d1b
JM
200 }
201
202 return 0;
203}
204
205
206static struct milenage_parameters * db_get_milenage(const char *imsi_txt)
207{
208 char cmd[128];
209 unsigned long long imsi;
210
211 os_memset(&db_tmp_milenage, 0, sizeof(db_tmp_milenage));
212 imsi = atoll(imsi_txt);
213 os_snprintf(db_tmp_milenage.imsi, sizeof(db_tmp_milenage.imsi),
214 "%llu", imsi);
215 os_snprintf(cmd, sizeof(cmd),
68127824 216 "SELECT * FROM milenage WHERE imsi=%llu;", imsi);
597d5d1b
JM
217 if (sqlite3_exec(sqlite_db, cmd, get_milenage_cb, &db_tmp_milenage,
218 NULL) != SQLITE_OK)
219 return NULL;
220
4309ca51
JM
221 if (!db_tmp_milenage.set)
222 return NULL;
597d5d1b
JM
223 return &db_tmp_milenage;
224}
225
226
227static int db_update_milenage_sqn(struct milenage_parameters *m)
228{
229 char cmd[128], val[13], *pos;
230
3e6547b5
JM
231 if (sqlite_db == NULL)
232 return 0;
233
597d5d1b
JM
234 pos = val;
235 pos += wpa_snprintf_hex(pos, sizeof(val), m->sqn, 6);
236 *pos = '\0';
237 os_snprintf(cmd, sizeof(cmd),
238 "UPDATE milenage SET sqn='%s' WHERE imsi=%s;",
239 val, m->imsi);
240 if (sqlite3_exec(sqlite_db, cmd, NULL, NULL, NULL) != SQLITE_OK) {
241 printf("Failed to update SQN in database for IMSI %s\n",
242 m->imsi);
243 return -1;
244 }
245 return 0;
246}
247
248#endif /* CONFIG_SQLITE */
249
250
6fc6879b
JM
251static int open_socket(const char *path)
252{
253 struct sockaddr_un addr;
254 int s;
255
256 s = socket(PF_UNIX, SOCK_DGRAM, 0);
257 if (s < 0) {
258 perror("socket(PF_UNIX)");
259 return -1;
260 }
261
262 memset(&addr, 0, sizeof(addr));
263 addr.sun_family = AF_UNIX;
264 os_strlcpy(addr.sun_path, path, sizeof(addr.sun_path));
265 if (bind(s, (struct sockaddr *) &addr, sizeof(addr)) < 0) {
9d053747 266 perror("hlr-auc-gw: bind(PF_UNIX)");
6fc6879b
JM
267 close(s);
268 return -1;
269 }
270
271 return s;
272}
273
274
275static int read_gsm_triplets(const char *fname)
276{
277 FILE *f;
278 char buf[200], *pos, *pos2;
279 struct gsm_triplet *g = NULL;
280 int line, ret = 0;
281
282 if (fname == NULL)
283 return -1;
284
285 f = fopen(fname, "r");
286 if (f == NULL) {
d67e63d5 287 printf("Could not open GSM triplet data file '%s'\n", fname);
6fc6879b
JM
288 return -1;
289 }
290
291 line = 0;
292 while (fgets(buf, sizeof(buf), f)) {
293 line++;
294
295 /* Parse IMSI:Kc:SRES:RAND */
296 buf[sizeof(buf) - 1] = '\0';
297 if (buf[0] == '#')
298 continue;
299 pos = buf;
300 while (*pos != '\0' && *pos != '\n')
301 pos++;
302 if (*pos == '\n')
303 *pos = '\0';
304 pos = buf;
305 if (*pos == '\0')
306 continue;
307
308 g = os_zalloc(sizeof(*g));
309 if (g == NULL) {
310 ret = -1;
311 break;
312 }
313
314 /* IMSI */
0fc5707d
JM
315 pos2 = NULL;
316 pos = str_token(buf, ":", &pos2);
317 if (!pos || os_strlen(pos) >= sizeof(g->imsi)) {
318 printf("%s:%d - Invalid IMSI\n", fname, line);
6fc6879b
JM
319 ret = -1;
320 break;
321 }
322 os_strlcpy(g->imsi, pos, sizeof(g->imsi));
6fc6879b
JM
323
324 /* Kc */
0fc5707d
JM
325 pos = str_token(buf, ":", &pos2);
326 if (!pos || os_strlen(pos) != 16 || hexstr2bin(pos, g->kc, 8)) {
327 printf("%s:%d - Invalid Kc\n", fname, line);
6fc6879b
JM
328 ret = -1;
329 break;
330 }
6fc6879b
JM
331
332 /* SRES */
0fc5707d
JM
333 pos = str_token(buf, ":", &pos2);
334 if (!pos || os_strlen(pos) != 8 ||
335 hexstr2bin(pos, g->sres, 4)) {
336 printf("%s:%d - Invalid SRES\n", fname, line);
6fc6879b
JM
337 ret = -1;
338 break;
339 }
6fc6879b
JM
340
341 /* RAND */
0fc5707d
JM
342 pos = str_token(buf, ":", &pos2);
343 if (!pos || os_strlen(pos) != 32 ||
344 hexstr2bin(pos, g->_rand, 16)) {
345 printf("%s:%d - Invalid RAND\n", fname, line);
6fc6879b
JM
346 ret = -1;
347 break;
348 }
6fc6879b
JM
349
350 g->next = gsm_db;
351 gsm_db = g;
352 g = NULL;
353 }
057a92ec 354 os_free(g);
6fc6879b
JM
355
356 fclose(f);
357
358 return ret;
359}
360
361
362static struct gsm_triplet * get_gsm_triplet(const char *imsi)
363{
364 struct gsm_triplet *g = gsm_db_pos;
365
366 while (g) {
367 if (strcmp(g->imsi, imsi) == 0) {
368 gsm_db_pos = g->next;
369 return g;
370 }
371 g = g->next;
372 }
373
374 g = gsm_db;
375 while (g && g != gsm_db_pos) {
376 if (strcmp(g->imsi, imsi) == 0) {
377 gsm_db_pos = g->next;
378 return g;
379 }
380 g = g->next;
381 }
382
383 return NULL;
384}
385
386
387static int read_milenage(const char *fname)
388{
389 FILE *f;
390 char buf[200], *pos, *pos2;
391 struct milenage_parameters *m = NULL;
392 int line, ret = 0;
393
394 if (fname == NULL)
395 return -1;
396
397 f = fopen(fname, "r");
398 if (f == NULL) {
399 printf("Could not open Milenage data file '%s'\n", fname);
400 return -1;
401 }
402
403 line = 0;
404 while (fgets(buf, sizeof(buf), f)) {
405 line++;
406
68127824 407 /* Parse IMSI Ki OPc AMF SQN [RES_len] */
6fc6879b
JM
408 buf[sizeof(buf) - 1] = '\0';
409 if (buf[0] == '#')
410 continue;
411 pos = buf;
412 while (*pos != '\0' && *pos != '\n')
413 pos++;
414 if (*pos == '\n')
415 *pos = '\0';
416 pos = buf;
417 if (*pos == '\0')
418 continue;
419
420 m = os_zalloc(sizeof(*m));
421 if (m == NULL) {
422 ret = -1;
423 break;
424 }
425
426 /* IMSI */
0fc5707d
JM
427 pos2 = NULL;
428 pos = str_token(buf, " ", &pos2);
429 if (!pos || os_strlen(pos) >= sizeof(m->imsi)) {
430 printf("%s:%d - Invalid IMSI\n", fname, line);
6fc6879b
JM
431 ret = -1;
432 break;
433 }
434 os_strlcpy(m->imsi, pos, sizeof(m->imsi));
6fc6879b
JM
435
436 /* Ki */
0fc5707d
JM
437 pos = str_token(buf, " ", &pos2);
438 if (!pos || os_strlen(pos) != 32 ||
439 hexstr2bin(pos, m->ki, 16)) {
440 printf("%s:%d - Invalid Ki\n", fname, line);
6fc6879b
JM
441 ret = -1;
442 break;
443 }
6fc6879b
JM
444
445 /* OPc */
0fc5707d
JM
446 pos = str_token(buf, " ", &pos2);
447 if (!pos || os_strlen(pos) != 32 ||
448 hexstr2bin(pos, m->opc, 16)) {
449 printf("%s:%d - Invalid OPc\n", fname, line);
6fc6879b
JM
450 ret = -1;
451 break;
452 }
6fc6879b
JM
453
454 /* AMF */
0fc5707d
JM
455 pos = str_token(buf, " ", &pos2);
456 if (!pos || os_strlen(pos) != 4 || hexstr2bin(pos, m->amf, 2)) {
457 printf("%s:%d - Invalid AMF\n", fname, line);
6fc6879b
JM
458 ret = -1;
459 break;
460 }
6fc6879b
JM
461
462 /* SQN */
0fc5707d
JM
463 pos = str_token(buf, " ", &pos2);
464 if (!pos || os_strlen(pos) != 12 ||
465 hexstr2bin(pos, m->sqn, 6)) {
466 printf("%s:%d - Invalid SEQ\n", fname, line);
6fc6879b
JM
467 ret = -1;
468 break;
469 }
68127824 470
0fc5707d
JM
471 pos = str_token(buf, " ", &pos2);
472 if (pos) {
68127824
JM
473 m->res_len = atoi(pos);
474 if (m->res_len &&
475 (m->res_len < EAP_AKA_RES_MIN_LEN ||
476 m->res_len > EAP_AKA_RES_MAX_LEN)) {
0fc5707d
JM
477 printf("%s:%d - Invalid RES_len\n",
478 fname, line);
68127824
JM
479 ret = -1;
480 break;
481 }
482 }
6fc6879b
JM
483
484 m->next = milenage_db;
485 milenage_db = m;
486 m = NULL;
487 }
057a92ec 488 os_free(m);
6fc6879b
JM
489
490 fclose(f);
491
492 return ret;
493}
494
495
53368613
JM
496static void update_milenage_file(const char *fname)
497{
498 FILE *f, *f2;
3dfaedb4 499 char name[500], buf[500], *pos;
53368613
JM
500 char *end = buf + sizeof(buf);
501 struct milenage_parameters *m;
502 size_t imsi_len;
503
504 f = fopen(fname, "r");
505 if (f == NULL) {
506 printf("Could not open Milenage data file '%s'\n", fname);
507 return;
508 }
509
3dfaedb4
JM
510 snprintf(name, sizeof(name), "%s.new", fname);
511 f2 = fopen(name, "w");
53368613 512 if (f2 == NULL) {
3dfaedb4 513 printf("Could not write Milenage data file '%s'\n", name);
53368613
JM
514 fclose(f);
515 return;
516 }
517
518 while (fgets(buf, sizeof(buf), f)) {
519 /* IMSI Ki OPc AMF SQN */
520 buf[sizeof(buf) - 1] = '\0';
521
522 pos = strchr(buf, ' ');
523 if (buf[0] == '#' || pos == NULL || pos - buf >= 20)
524 goto no_update;
525
526 imsi_len = pos - buf;
527
528 for (m = milenage_db; m; m = m->next) {
529 if (strncmp(buf, m->imsi, imsi_len) == 0 &&
530 m->imsi[imsi_len] == '\0')
531 break;
532 }
533
534 if (!m)
535 goto no_update;
536
537 pos = buf;
538 pos += snprintf(pos, end - pos, "%s ", m->imsi);
539 pos += wpa_snprintf_hex(pos, end - pos, m->ki, 16);
540 *pos++ = ' ';
541 pos += wpa_snprintf_hex(pos, end - pos, m->opc, 16);
542 *pos++ = ' ';
543 pos += wpa_snprintf_hex(pos, end - pos, m->amf, 2);
544 *pos++ = ' ';
545 pos += wpa_snprintf_hex(pos, end - pos, m->sqn, 6);
546 *pos++ = '\n';
547
548 no_update:
549 fprintf(f2, "%s", buf);
550 }
551
552 fclose(f2);
553 fclose(f);
554
3dfaedb4
JM
555 snprintf(name, sizeof(name), "%s.bak", fname);
556 if (rename(fname, name) < 0) {
53368613
JM
557 perror("rename");
558 return;
559 }
560
3dfaedb4
JM
561 snprintf(name, sizeof(name), "%s.new", fname);
562 if (rename(name, fname) < 0) {
53368613
JM
563 perror("rename");
564 return;
565 }
566
567}
568
569
6fc6879b
JM
570static struct milenage_parameters * get_milenage(const char *imsi)
571{
572 struct milenage_parameters *m = milenage_db;
573
574 while (m) {
575 if (strcmp(m->imsi, imsi) == 0)
576 break;
577 m = m->next;
578 }
579
597d5d1b
JM
580#ifdef CONFIG_SQLITE
581 if (!m)
582 m = db_get_milenage(imsi);
583#endif /* CONFIG_SQLITE */
584
6fc6879b
JM
585 return m;
586}
587
588
3e6547b5 589static int sim_req_auth(char *imsi, char *resp, size_t resp_len)
6fc6879b
JM
590{
591 int count, max_chal, ret;
592 char *pos;
3e6547b5 593 char *rpos, *rend;
6fc6879b
JM
594 struct milenage_parameters *m;
595 struct gsm_triplet *g;
596
3e6547b5 597 resp[0] = '\0';
6fc6879b
JM
598
599 pos = strchr(imsi, ' ');
600 if (pos) {
601 *pos++ = '\0';
602 max_chal = atoi(pos);
77e3094b 603 if (max_chal < 1 || max_chal > EAP_SIM_MAX_CHAL)
6fc6879b
JM
604 max_chal = EAP_SIM_MAX_CHAL;
605 } else
606 max_chal = EAP_SIM_MAX_CHAL;
607
3e6547b5
JM
608 rend = resp + resp_len;
609 rpos = resp;
6fc6879b
JM
610 ret = snprintf(rpos, rend - rpos, "SIM-RESP-AUTH %s", imsi);
611 if (ret < 0 || ret >= rend - rpos)
3e6547b5 612 return -1;
6fc6879b
JM
613 rpos += ret;
614
615 m = get_milenage(imsi);
616 if (m) {
617 u8 _rand[16], sres[4], kc[8];
618 for (count = 0; count < max_chal; count++) {
3642c431 619 if (random_get_bytes(_rand, 16) < 0)
3e6547b5 620 return -1;
6fc6879b
JM
621 gsm_milenage(m->opc, m->ki, _rand, sres, kc);
622 *rpos++ = ' ';
623 rpos += wpa_snprintf_hex(rpos, rend - rpos, kc, 8);
624 *rpos++ = ':';
625 rpos += wpa_snprintf_hex(rpos, rend - rpos, sres, 4);
626 *rpos++ = ':';
627 rpos += wpa_snprintf_hex(rpos, rend - rpos, _rand, 16);
628 }
629 *rpos = '\0';
3e6547b5 630 return 0;
6fc6879b
JM
631 }
632
633 count = 0;
634 while (count < max_chal && (g = get_gsm_triplet(imsi))) {
635 if (strcmp(g->imsi, imsi) != 0)
636 continue;
637
638 if (rpos < rend)
639 *rpos++ = ' ';
640 rpos += wpa_snprintf_hex(rpos, rend - rpos, g->kc, 8);
641 if (rpos < rend)
642 *rpos++ = ':';
643 rpos += wpa_snprintf_hex(rpos, rend - rpos, g->sres, 4);
644 if (rpos < rend)
645 *rpos++ = ':';
646 rpos += wpa_snprintf_hex(rpos, rend - rpos, g->_rand, 16);
647 count++;
648 }
649
650 if (count == 0) {
651 printf("No GSM triplets found for %s\n", imsi);
652 ret = snprintf(rpos, rend - rpos, " FAILURE");
653 if (ret < 0 || ret >= rend - rpos)
3e6547b5 654 return -1;
6fc6879b
JM
655 rpos += ret;
656 }
657
3e6547b5 658 return 0;
6fc6879b
JM
659}
660
661
84dc1370
JM
662static int gsm_auth_req(char *imsi, char *resp, size_t resp_len)
663{
664 int count, ret;
665 char *pos, *rpos, *rend;
666 struct milenage_parameters *m;
667
668 resp[0] = '\0';
669
670 pos = os_strchr(imsi, ' ');
671 if (!pos)
672 return -1;
673 *pos++ = '\0';
674
675 rend = resp + resp_len;
676 rpos = resp;
677 ret = os_snprintf(rpos, rend - rpos, "GSM-AUTH-RESP %s", imsi);
d85e1fc8 678 if (os_snprintf_error(rend - rpos, ret))
84dc1370
JM
679 return -1;
680 rpos += ret;
681
682 m = get_milenage(imsi);
683 if (m) {
684 u8 _rand[16], sres[4], kc[8];
685 for (count = 0; count < EAP_SIM_MAX_CHAL; count++) {
686 if (hexstr2bin(pos, _rand, 16) != 0)
687 return -1;
688 gsm_milenage(m->opc, m->ki, _rand, sres, kc);
689 *rpos++ = count == 0 ? ' ' : ':';
690 rpos += wpa_snprintf_hex(rpos, rend - rpos, kc, 8);
691 *rpos++ = ':';
692 rpos += wpa_snprintf_hex(rpos, rend - rpos, sres, 4);
693 pos += 16 * 2;
694 if (*pos != ':')
695 break;
696 pos++;
697 }
698 *rpos = '\0';
699 return 0;
700 }
701
702 printf("No GSM triplets found for %s\n", imsi);
703 ret = os_snprintf(rpos, rend - rpos, " FAILURE");
d85e1fc8 704 if (os_snprintf_error(rend - rpos, ret))
84dc1370
JM
705 return -1;
706 rpos += ret;
707
708 return 0;
709}
710
711
5daba48c
JM
712static void inc_sqn(u8 *sqn)
713{
714 u64 val, seq, ind;
715
716 /*
717 * SQN = SEQ | IND = SEQ1 | SEQ2 | IND
718 *
719 * The mechanism used here is not time-based, so SEQ2 is void and
720 * SQN = SEQ1 | IND. The length of IND is ind_len bits and the length
721 * of SEQ1 is 48 - ind_len bits.
722 */
723
724 /* Increment both SEQ and IND by one */
725 val = ((u64) WPA_GET_BE32(sqn) << 16) | ((u64) WPA_GET_BE16(sqn + 4));
726 seq = (val >> ind_len) + 1;
727 ind = (val + 1) & ((1 << ind_len) - 1);
728 val = (seq << ind_len) | ind;
729 WPA_PUT_BE32(sqn, val >> 16);
730 WPA_PUT_BE16(sqn + 4, val & 0xffff);
731}
732
733
3e6547b5 734static int aka_req_auth(char *imsi, char *resp, size_t resp_len)
6fc6879b
JM
735{
736 /* AKA-RESP-AUTH <IMSI> <RAND> <AUTN> <IK> <CK> <RES> */
3e6547b5 737 char *pos, *end;
6fc6879b
JM
738 u8 _rand[EAP_AKA_RAND_LEN];
739 u8 autn[EAP_AKA_AUTN_LEN];
740 u8 ik[EAP_AKA_IK_LEN];
741 u8 ck[EAP_AKA_CK_LEN];
742 u8 res[EAP_AKA_RES_MAX_LEN];
743 size_t res_len;
744 int ret;
745 struct milenage_parameters *m;
e43bd7a1 746 int failed = 0;
6fc6879b
JM
747
748 m = get_milenage(imsi);
749 if (m) {
3642c431 750 if (random_get_bytes(_rand, EAP_AKA_RAND_LEN) < 0)
3e6547b5 751 return -1;
6fc6879b 752 res_len = EAP_AKA_RES_MAX_LEN;
5daba48c 753 inc_sqn(m->sqn);
597d5d1b
JM
754#ifdef CONFIG_SQLITE
755 db_update_milenage_sqn(m);
756#endif /* CONFIG_SQLITE */
53368613 757 sqn_changes = 1;
3e6547b5
JM
758 if (stdout_debug) {
759 printf("AKA: Milenage with SQN=%02x%02x%02x%02x%02x%02x\n",
760 m->sqn[0], m->sqn[1], m->sqn[2],
761 m->sqn[3], m->sqn[4], m->sqn[5]);
762 }
6fc6879b
JM
763 milenage_generate(m->opc, m->amf, m->ki, m->sqn, _rand,
764 autn, ik, ck, res, &res_len);
68127824
JM
765 if (m->res_len >= EAP_AKA_RES_MIN_LEN &&
766 m->res_len <= EAP_AKA_RES_MAX_LEN &&
767 m->res_len < res_len)
768 res_len = m->res_len;
6fc6879b
JM
769 } else {
770 printf("Unknown IMSI: %s\n", imsi);
771#ifdef AKA_USE_FIXED_TEST_VALUES
772 printf("Using fixed test values for AKA\n");
773 memset(_rand, '0', EAP_AKA_RAND_LEN);
774 memset(autn, '1', EAP_AKA_AUTN_LEN);
775 memset(ik, '3', EAP_AKA_IK_LEN);
776 memset(ck, '4', EAP_AKA_CK_LEN);
777 memset(res, '2', EAP_AKA_RES_MAX_LEN);
778 res_len = EAP_AKA_RES_MAX_LEN;
779#else /* AKA_USE_FIXED_TEST_VALUES */
e43bd7a1 780 failed = 1;
6fc6879b
JM
781#endif /* AKA_USE_FIXED_TEST_VALUES */
782 }
783
3e6547b5
JM
784 pos = resp;
785 end = resp + resp_len;
6fc6879b
JM
786 ret = snprintf(pos, end - pos, "AKA-RESP-AUTH %s ", imsi);
787 if (ret < 0 || ret >= end - pos)
3e6547b5 788 return -1;
6fc6879b 789 pos += ret;
e43bd7a1
JM
790 if (failed) {
791 ret = snprintf(pos, end - pos, "FAILURE");
792 if (ret < 0 || ret >= end - pos)
3e6547b5 793 return -1;
e43bd7a1 794 pos += ret;
3e6547b5 795 return 0;
e43bd7a1 796 }
6fc6879b
JM
797 pos += wpa_snprintf_hex(pos, end - pos, _rand, EAP_AKA_RAND_LEN);
798 *pos++ = ' ';
799 pos += wpa_snprintf_hex(pos, end - pos, autn, EAP_AKA_AUTN_LEN);
800 *pos++ = ' ';
801 pos += wpa_snprintf_hex(pos, end - pos, ik, EAP_AKA_IK_LEN);
802 *pos++ = ' ';
803 pos += wpa_snprintf_hex(pos, end - pos, ck, EAP_AKA_CK_LEN);
804 *pos++ = ' ';
805 pos += wpa_snprintf_hex(pos, end - pos, res, res_len);
806
3e6547b5 807 return 0;
6fc6879b
JM
808}
809
810
3e6547b5 811static int aka_auts(char *imsi, char *resp, size_t resp_len)
6fc6879b 812{
2b16c01c 813 char *auts, *__rand;
6fc6879b
JM
814 u8 _auts[EAP_AKA_AUTS_LEN], _rand[EAP_AKA_RAND_LEN], sqn[6];
815 struct milenage_parameters *m;
816
3e6547b5
JM
817 resp[0] = '\0';
818
6fc6879b
JM
819 /* AKA-AUTS <IMSI> <AUTS> <RAND> */
820
821 auts = strchr(imsi, ' ');
822 if (auts == NULL)
3e6547b5 823 return -1;
6fc6879b
JM
824 *auts++ = '\0';
825
2b16c01c 826 __rand = strchr(auts, ' ');
6689218e 827 if (__rand == NULL)
3e6547b5 828 return -1;
2b16c01c 829 *__rand++ = '\0';
6fc6879b 830
3e6547b5
JM
831 if (stdout_debug) {
832 printf("AKA-AUTS: IMSI=%s AUTS=%s RAND=%s\n",
833 imsi, auts, __rand);
834 }
6fc6879b 835 if (hexstr2bin(auts, _auts, EAP_AKA_AUTS_LEN) ||
2b16c01c 836 hexstr2bin(__rand, _rand, EAP_AKA_RAND_LEN)) {
6fc6879b 837 printf("Could not parse AUTS/RAND\n");
3e6547b5 838 return -1;
6fc6879b
JM
839 }
840
841 m = get_milenage(imsi);
842 if (m == NULL) {
843 printf("Unknown IMSI: %s\n", imsi);
3e6547b5 844 return -1;
6fc6879b
JM
845 }
846
847 if (milenage_auts(m->opc, m->ki, _rand, _auts, sqn)) {
848 printf("AKA-AUTS: Incorrect MAC-S\n");
849 } else {
850 memcpy(m->sqn, sqn, 6);
3e6547b5
JM
851 if (stdout_debug) {
852 printf("AKA-AUTS: Re-synchronized: "
853 "SQN=%02x%02x%02x%02x%02x%02x\n",
854 sqn[0], sqn[1], sqn[2], sqn[3], sqn[4], sqn[5]);
855 }
597d5d1b
JM
856#ifdef CONFIG_SQLITE
857 db_update_milenage_sqn(m);
858#endif /* CONFIG_SQLITE */
53368613 859 sqn_changes = 1;
6fc6879b 860 }
3e6547b5
JM
861
862 return 0;
863}
864
865
866static int process_cmd(char *cmd, char *resp, size_t resp_len)
867{
868 if (os_strncmp(cmd, "SIM-REQ-AUTH ", 13) == 0)
869 return sim_req_auth(cmd + 13, resp, resp_len);
870
84dc1370
JM
871 if (os_strncmp(cmd, "GSM-AUTH-REQ ", 13) == 0)
872 return gsm_auth_req(cmd + 13, resp, resp_len);
873
3e6547b5
JM
874 if (os_strncmp(cmd, "AKA-REQ-AUTH ", 13) == 0)
875 return aka_req_auth(cmd + 13, resp, resp_len);
876
877 if (os_strncmp(cmd, "AKA-AUTS ", 9) == 0)
878 return aka_auts(cmd + 9, resp, resp_len);
879
880 printf("Unknown request: %s\n", cmd);
881 return -1;
6fc6879b
JM
882}
883
884
885static int process(int s)
886{
3e6547b5 887 char buf[1000], resp[1000];
6fc6879b
JM
888 struct sockaddr_un from;
889 socklen_t fromlen;
890 ssize_t res;
891
892 fromlen = sizeof(from);
893 res = recvfrom(s, buf, sizeof(buf), 0, (struct sockaddr *) &from,
894 &fromlen);
895 if (res < 0) {
896 perror("recvfrom");
897 return -1;
898 }
899
900 if (res == 0)
901 return 0;
902
903 if ((size_t) res >= sizeof(buf))
904 res = sizeof(buf) - 1;
905 buf[res] = '\0';
906
907 printf("Received: %s\n", buf);
908
3e6547b5
JM
909 if (process_cmd(buf, resp, sizeof(resp)) < 0) {
910 printf("Failed to process request\n");
911 return -1;
912 }
913
914 if (resp[0] == '\0') {
915 printf("No response\n");
916 return 0;
917 }
918
919 printf("Send: %s\n", resp);
920
921 if (sendto(s, resp, os_strlen(resp), 0, (struct sockaddr *) &from,
922 fromlen) < 0)
923 perror("send");
6fc6879b
JM
924
925 return 0;
926}
927
928
929static void cleanup(void)
930{
931 struct gsm_triplet *g, *gprev;
932 struct milenage_parameters *m, *prev;
933
53368613
JM
934 if (update_milenage && milenage_file && sqn_changes)
935 update_milenage_file(milenage_file);
936
6fc6879b
JM
937 g = gsm_db;
938 while (g) {
939 gprev = g;
940 g = g->next;
057a92ec 941 os_free(gprev);
6fc6879b
JM
942 }
943
944 m = milenage_db;
945 while (m) {
946 prev = m;
947 m = m->next;
057a92ec 948 os_free(prev);
6fc6879b
JM
949 }
950
3e6547b5
JM
951 if (serv_sock >= 0)
952 close(serv_sock);
953 if (socket_path)
954 unlink(socket_path);
597d5d1b
JM
955
956#ifdef CONFIG_SQLITE
957 if (sqlite_db) {
958 sqlite3_close(sqlite_db);
959 sqlite_db = NULL;
960 }
961#endif /* CONFIG_SQLITE */
6fc6879b
JM
962}
963
964
965static void handle_term(int sig)
966{
967 printf("Signal %d - terminate\n", sig);
968 exit(0);
969}
970
971
972static void usage(void)
973{
974 printf("HLR/AuC testing gateway for hostapd EAP-SIM/AKA "
975 "database/authenticator\n"
6774c6a9 976 "Copyright (c) 2005-2017, Jouni Malinen <j@w1.fi>\n"
6fc6879b
JM
977 "\n"
978 "usage:\n"
53368613 979 "hlr_auc_gw [-hu] [-s<socket path>] [-g<triplet file>] "
5daba48c 980 "[-m<milenage file>] \\\n"
3e6547b5 981 " [-D<DB file>] [-i<IND len in bits>] [command]\n"
6fc6879b
JM
982 "\n"
983 "options:\n"
984 " -h = show this usage help\n"
53368613 985 " -u = update SQN in Milenage file on exit\n"
6fc6879b
JM
986 " -s<socket path> = path for UNIX domain socket\n"
987 " (default: %s)\n"
988 " -g<triplet file> = path for GSM authentication triplets\n"
5daba48c 989 " -m<milenage file> = path for Milenage keys\n"
597d5d1b 990 " -D<DB file> = path to SQLite database\n"
3e6547b5
JM
991 " -i<IND len in bits> = IND length for SQN (default: 5)\n"
992 "\n"
993 "If the optional command argument, like "
994 "\"AKA-REQ-AUTH <IMSI>\" is used, a single\n"
995 "command is processed with response sent to stdout. Otherwise, "
996 "hlr_auc_gw opens\n"
997 "a control interface and processes commands sent through it "
998 "(e.g., by EAP server\n"
999 "in hostapd).\n",
6fc6879b
JM
1000 default_socket_path);
1001}
1002
1003
1004int main(int argc, char *argv[])
1005{
1006 int c;
6fc6879b 1007 char *gsm_triplet_file = NULL;
597d5d1b 1008 char *sqlite_db_file = NULL;
3e6547b5 1009 int ret = 0;
6fc6879b 1010
057a92ec
JM
1011 if (os_program_init())
1012 return -1;
1013
6fc6879b
JM
1014 socket_path = default_socket_path;
1015
1016 for (;;) {
597d5d1b 1017 c = getopt(argc, argv, "D:g:hi:m:s:u");
6fc6879b
JM
1018 if (c < 0)
1019 break;
1020 switch (c) {
597d5d1b
JM
1021 case 'D':
1022#ifdef CONFIG_SQLITE
1023 sqlite_db_file = optarg;
1024 break;
1025#else /* CONFIG_SQLITE */
1026 printf("No SQLite support included in the build\n");
1027 return -1;
1028#endif /* CONFIG_SQLITE */
6fc6879b
JM
1029 case 'g':
1030 gsm_triplet_file = optarg;
1031 break;
1032 case 'h':
1033 usage();
1034 return 0;
5daba48c
JM
1035 case 'i':
1036 ind_len = atoi(optarg);
1037 if (ind_len < 0 || ind_len > 32) {
1038 printf("Invalid IND length\n");
1039 return -1;
1040 }
1041 break;
6fc6879b
JM
1042 case 'm':
1043 milenage_file = optarg;
1044 break;
1045 case 's':
1046 socket_path = optarg;
1047 break;
53368613
JM
1048 case 'u':
1049 update_milenage = 1;
1050 break;
6fc6879b
JM
1051 default:
1052 usage();
1053 return -1;
1054 }
1055 }
1056
597d5d1b
JM
1057 if (!gsm_triplet_file && !milenage_file && !sqlite_db_file) {
1058 usage();
1059 return -1;
1060 }
1061
1062#ifdef CONFIG_SQLITE
1063 if (sqlite_db_file && (sqlite_db = db_open(sqlite_db_file)) == NULL)
1064 return -1;
1065#endif /* CONFIG_SQLITE */
1066
6fc6879b
JM
1067 if (gsm_triplet_file && read_gsm_triplets(gsm_triplet_file) < 0)
1068 return -1;
1069
1070 if (milenage_file && read_milenage(milenage_file) < 0)
1071 return -1;
1072
3e6547b5
JM
1073 if (optind == argc) {
1074 serv_sock = open_socket(socket_path);
1075 if (serv_sock < 0)
1076 return -1;
6fc6879b 1077
3e6547b5 1078 printf("Listening for requests on %s\n", socket_path);
6fc6879b 1079
3e6547b5
JM
1080 atexit(cleanup);
1081 signal(SIGTERM, handle_term);
1082 signal(SIGINT, handle_term);
6fc6879b 1083
3e6547b5
JM
1084 for (;;)
1085 process(serv_sock);
1086 } else {
1087 char buf[1000];
1088 socket_path = NULL;
1089 stdout_debug = 0;
1090 if (process_cmd(argv[optind], buf, sizeof(buf)) < 0) {
1091 printf("FAIL\n");
1092 ret = -1;
1093 } else {
1094 printf("%s\n", buf);
1095 }
1096 cleanup();
1097 }
6fc6879b 1098
597d5d1b
JM
1099#ifdef CONFIG_SQLITE
1100 if (sqlite_db) {
1101 sqlite3_close(sqlite_db);
1102 sqlite_db = NULL;
1103 }
1104#endif /* CONFIG_SQLITE */
1105
057a92ec
JM
1106 os_program_deinit();
1107
3e6547b5 1108 return ret;
6fc6879b 1109}