You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
144 lines
4.8 KiB
144 lines
4.8 KiB
// SPDX-License-Identifier: GPL-2.0-only
|
|
/*
|
|
* Digital Voice Modem - Test Suite
|
|
* GPLv2 Open Source. Use is subject to license terms.
|
|
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
|
|
*
|
|
* Copyright (C) 2025 Bryan Biedenkapp, N2PLL
|
|
*
|
|
*/
|
|
#include "host/Defines.h"
|
|
#include "common/p25/P25Defines.h"
|
|
#include "common/p25/Crypto.h"
|
|
#include "common/p25/kmm/KMMRekeyCommand.h"
|
|
#include "common/Log.h"
|
|
#include "common/Utils.h"
|
|
|
|
using namespace p25;
|
|
using namespace p25::crypto;
|
|
using namespace p25::defines;
|
|
using namespace p25::kmm;
|
|
|
|
#include <catch2/catch_test_macros.hpp>
|
|
#include <stdlib.h>
|
|
#include <time.h>
|
|
|
|
TEST_CASE("KMM ReKey Command CBC Test", "[p25][kmm_cbc]") {
|
|
bool failed = false;
|
|
|
|
INFO("P25 KMM ReKey Test");
|
|
|
|
srand((unsigned int)time(NULL));
|
|
|
|
// MAC TEK
|
|
uint8_t macTek[] =
|
|
{
|
|
0x16, 0x85, 0x62, 0x45, 0x3B, 0x3E, 0x7F, 0x61, 0x8D, 0x68, 0xB3, 0x87, 0xE0, 0xB9, 0x97, 0xE1,
|
|
0xFB, 0x0F, 0x26, 0x4F, 0xA8, 0x3B, 0x74, 0xE4, 0x3B, 0x17, 0x29, 0x17, 0xBD, 0x39, 0x33, 0x9F
|
|
};
|
|
|
|
// data block
|
|
uint8_t dataBlock[] =
|
|
{
|
|
0x1E, 0x00, 0x4D, 0xA8, 0x64, 0x3B, 0xA8, 0x71, 0x2B, 0x1D, 0x17, 0x72, 0x00, 0x84, 0x50, 0xBC,
|
|
0x01, 0x00, 0x01, 0x84, 0x28, 0x01, 0x00, 0x00, 0x00, 0x49, 0x83, 0x80, 0x28, 0x9C, 0xF6, 0x35,
|
|
0xFB, 0x68, 0xD3, 0x45, 0xD3, 0x4F, 0x62, 0xEF, 0x06, 0x3B, 0xA4, 0xE0, 0x5C, 0xAE, 0x47, 0x56,
|
|
0xE7, 0xD3, 0x04, 0x46, 0xD1, 0xF0, 0x7C, 0x6E, 0xB4, 0xE9, 0xE0, 0x84, 0x09, 0x45, 0x37, 0x23,
|
|
0x72, 0xFB, 0x80, 0x42, 0xA0, 0x91, 0x56, 0xF0, 0xD4, 0x72, 0x1C, 0x08, 0x84, 0x2F, 0x62, 0x40
|
|
};
|
|
|
|
// Encrypted Key Frame
|
|
uint8_t testWrappedKeyFrame[40U] =
|
|
{
|
|
0x80, 0x28, 0x9C, 0xF6, 0x35, 0xFB, 0x68, 0xD3, 0x45, 0xD3, 0x4F, 0x62, 0xEF, 0x06, 0x3B, 0xA4,
|
|
0xE0, 0x5C, 0xAE, 0x47, 0x56, 0xE7, 0xD3, 0x04, 0x46, 0xD1, 0xF0, 0x7C, 0x6E, 0xB4, 0xE9, 0xE0,
|
|
0x84, 0x09, 0x45, 0x37, 0x23, 0x72, 0xFB, 0x80
|
|
};
|
|
|
|
uint8_t encryptMI[] =
|
|
{
|
|
0x70, 0x30, 0xF1, 0xF7, 0x65, 0x69, 0x26, 0x67
|
|
};
|
|
|
|
// final encrypted block
|
|
uint8_t encryptedBlock[] =
|
|
{
|
|
0x67, 0x75, 0xB1, 0xD1, 0x8A, 0xBD, 0xCF, 0x86, 0x08, 0x54, 0xDF, 0x09, 0x8E, 0xA3, 0x41, 0x29,
|
|
0x13, 0x2A, 0x0E, 0x48, 0x4C, 0xCC, 0x5C, 0xAE, 0x80, 0x08, 0x0B, 0x19, 0xF7, 0x08, 0xAE, 0x8F,
|
|
0xB8, 0x40, 0xAA, 0x2E, 0x3E, 0x5E, 0xCD, 0x03, 0x73, 0x52, 0x75, 0xFE, 0xE2, 0x88, 0x0E, 0x6D,
|
|
0xDD, 0x00, 0xC1, 0x11, 0x42, 0x8F, 0xEE, 0x39, 0xC6, 0x2B, 0xF3, 0xC1, 0xD2, 0xEE, 0x3B, 0xEB,
|
|
0xBB, 0x7C, 0x44, 0xA5, 0xE3, 0xC9, 0x30, 0x8C, 0x5D, 0xE9, 0x17, 0x84, 0x7C, 0x17, 0xAF, 0x23
|
|
};
|
|
|
|
Utils::dump(2U, "P25_KMM_ReKey_CBC_Test, MAC TEK", macTek, 32U);
|
|
Utils::dump(2U, "P25_KMM_ReKey_CBC_Test, OFB MI", encryptMI, 8U);
|
|
Utils::dump(2U, "P25_KMM_ReKey_CBC_Test, DataBlock", dataBlock, 80U);
|
|
Utils::dump(2U, "P25_KMM_ReKey_CBC_Test, EncryptedBlock", encryptedBlock, 80U);
|
|
|
|
KMMRekeyCommand outKmm = KMMRekeyCommand();
|
|
|
|
outKmm.setDecryptInfoFmt(KMM_DECRYPT_INSTRUCT_NONE);
|
|
outKmm.setSrcLLId(0x712B1DU);
|
|
outKmm.setDstLLId(0x643BA8U);
|
|
|
|
outKmm.setMACType(KMM_MAC::ENH_MAC);
|
|
outKmm.setMACAlgId(ALGO_AES_256);
|
|
outKmm.setMACKId(0x2F62U);
|
|
outKmm.setMACFormat(KMM_MAC_FORMAT_CBC);
|
|
|
|
outKmm.setMessageNumber(0x1772U);
|
|
|
|
outKmm.setAlgId(ALGO_AES_256);
|
|
outKmm.setKId(0x50BCU);
|
|
|
|
KeysetItem ks;
|
|
ks.keysetId(1U);
|
|
ks.algId(ALGO_AES_256); // we currently can only OTAR AES256 keys
|
|
ks.keyLength(P25DEF::MAX_WRAPPED_ENC_KEY_LENGTH_BYTES);
|
|
|
|
p25::kmm::KeyItem ki = p25::kmm::KeyItem();
|
|
ki.keyFormat(0U);
|
|
ki.sln(0U);
|
|
ki.kId(0x4983U);
|
|
|
|
ki.setKey(testWrappedKeyFrame, 40U);
|
|
ks.push_back(ki);
|
|
|
|
std::vector<KeysetItem> keysets;
|
|
keysets.push_back(ks);
|
|
|
|
outKmm.setKeysets(keysets);
|
|
|
|
UInt8Array kmmFrame = std::make_unique<uint8_t[]>(outKmm.fullLength());
|
|
outKmm.encode(kmmFrame.get());
|
|
outKmm.generateMAC(macTek, kmmFrame.get());
|
|
|
|
Utils::dump(2U, "P25_KMM_ReKey_CBC_Test, GeneratedDataBlock", kmmFrame.get(), outKmm.fullLength());
|
|
|
|
for (uint32_t i = 0; i < outKmm.fullLength(); i++) {
|
|
if (kmmFrame.get()[i] != dataBlock[i]) {
|
|
::LogError("T", "P25_KMM_ReKey_CBC_Test, INVALID AT IDX %d", i);
|
|
failed = true;
|
|
}
|
|
}
|
|
|
|
P25Crypto crypto;
|
|
crypto.setMI(encryptMI);
|
|
crypto.setTEKAlgoId(ALGO_AES_256);
|
|
crypto.setKey(macTek, 32U);
|
|
crypto.generateKeystream();
|
|
|
|
crypto.cryptAES_PDU(kmmFrame.get(), outKmm.fullLength());
|
|
|
|
Utils::dump(2U, "P25_KMM_ReKey_CBC_Test, EncryptedDataBlock", kmmFrame.get(), outKmm.fullLength());
|
|
|
|
for (uint32_t i = 0; i < outKmm.fullLength(); i++) {
|
|
if (kmmFrame.get()[i] != encryptedBlock[i]) {
|
|
::LogError("T", "P25_KMM_ReKey_CBC_Test, INVALID AT IDX %d", i);
|
|
failed = true;
|
|
}
|
|
}
|
|
|
|
REQUIRE(failed==false);
|
|
}
|