pespin has submitted this change. (
https://gerrit.osmocom.org/c/osmo-ttcn3-hacks/+/40413?usp=email )
Change subject: 5gc: Implement AKA authentication
......................................................................
5gc: Implement AKA authentication
deps/nas.git already has some Auth related functionaltities to calculate
XRES*, but I couldn't get them to generate proper output. Furthermore,
using them directly would include a lot of churn we don't want:
* ttcn: Otherwise ttcn/Lib_NG_NAS/LIB_NG_NAS_Functions.ttcn brings in
tons of dependencies about Emulation stuff which is not interesting
for us.
* .cc: We want to implement our own low level functions using our
eclipse Titan API, as well as our own C lib dependencies (because some
code for those dependencies is not really available in the repo).
Hence, instead use our own milenage.c implementation imported from
libosmocore (actually from a slightly modified self-contained copy we
already ported to some development branch of asterisk VoLTE project).
With this patch it is already possible to detect SQN Out-of-sync and
answer with an Auth Failure, then get a new Auth Req from network and
properly answer with an Auth Resp which the network likes and hence
answers with a Security Mode Command.
Change-Id: I11527f47e4310863124f3f02148e3f71da7d911e
---
M 5gc/C5G_Tests.cfg
M 5gc/C5G_Tests.ttcn
M 5gc/gen_links.sh
M 5gc/regen_makefile.sh
M deps/Makefile
M library/General_Types.ttcn
A library/NG_CryptoFunctionDefs.cc
A library/NG_CryptoFunctions.ttcn
M library/NG_NAS_Osmo_Templates.ttcn
A library/milenage/Milenage_FunctionDefs.cc
A library/milenage/Milenage_Functions.ttcn
A library/milenage/milenage.c
A library/milenage/milenage.h
A library/ng_crypto/key_derivation.c
A library/ng_crypto/key_derivation.h
15 files changed, 837 insertions(+), 17 deletions(-)
Approvals:
jolly: Looks good to me, but someone else must approve
Jenkins Builder: Verified
laforge: Looks good to me, but someone else must approve
pespin: Looks good to me, approved
diff --git a/5gc/C5G_Tests.cfg b/5gc/C5G_Tests.cfg
index 85ad9a3..d45b963 100644
--- a/5gc/C5G_Tests.cfg
+++ b/5gc/C5G_Tests.cfg
@@ -16,6 +16,9 @@
mp_5gc_ngap_port := 38412;
mp_local_ngap_ip := "127.0.0.202";
mp_local_ngap_port := 50000;
+mp_imsi := '999700000000000'H;
+mp_usim_key := '762a2206fe0b4151ace403c86a11e479'O;
+mp_usim_opc := '3c6e0b8a9c15224a8228b9a98ca1531d'O;
[MAIN_CONTROLLER]
diff --git a/5gc/C5G_Tests.ttcn b/5gc/C5G_Tests.ttcn
index 9b45298..9cf5ec3 100644
--- a/5gc/C5G_Tests.ttcn
+++ b/5gc/C5G_Tests.ttcn
@@ -19,6 +19,8 @@
import from Osmocom_Types all;
import from GSM_Types all;
+import from Milenage_Functions all;
+
import from NGAP_PDU_Descriptions all;
import from NGAP_IEs all;
import from NGAP_PDU_Contents all;
@@ -31,14 +33,14 @@
import from NGAP_Emulation all;
import from NAS_CommonTypeDefs all;
-
+import from NAS_CommonTemplates all;
import from NG_NAS_Common all;
import from NG_NAS_MsgContainers all;
-import from NAS_CommonTemplates all;
import from NG_NAS_Templates all;
import from NG_NAS_Osmo_Templates all;
import from NG_NAS_Functions all;
+import from NG_CryptoFunctions all;
/* (maximum) number of emulated eNBs */
const integer NUM_NGRAN := 1;
@@ -56,6 +58,8 @@
GsmMcc mp_mcc := '999'H;
GsmMnc mp_mnc := '70'H;
hexstring mp_imsi := '999700000000000'H;
+ octetstring mp_usim_key := '762a2206fe0b4151ace403c86a11e479'O;
+ octetstring mp_usim_opc := '3c6e0b8a9c15224a8228b9a98ca1531d'O;
uint24_t mp_tac := 1;
}
@@ -69,6 +73,8 @@
/* parameters of emulated UE */
type record UeParams {
hexstring imsi,
+ octetstring usim_key,
+ octetstring usim_opc,
charstring ue_ip
}
@@ -145,6 +151,8 @@
uep := {
imsi := f_concat_pad(lengthof(mp_imsi), substr(mp_imsi, 0, lengthof(mp_imsi) - 6),
imsi_suffix),
+ usim_key := mp_usim_key,
+ usim_opc := mp_usim_opc,
ue_ip := "192.168.123.50"
}
}
@@ -211,12 +219,18 @@
iE_Extensions := omit
}
-private function f_SUCI_IMSI() runs on ConnHdlr return octetstring {
+private function f_imsi_plmn_id() runs on ConnHdlr return PLMNIdentity {
var hexstring imsi := g_pars.ue_pars.imsi;
var GsmMcc mcc := substr(imsi, 0, 3);
var GsmMnc mnc := substr(imsi, 3, 2);
- var octetstring imsi_suffix := imsi_hex2oct(substr(imsi, lengthof(imsi)-10, 10));
- return f_enc_mcc_mnc(mcc, mnc) & '21430001'O & imsi_suffix;
+ return f_enc_mcc_mnc(mcc, mnc);
+}
+
+private function f_SUCI_IMSI() runs on ConnHdlr return octetstring {
+ var hexstring imsi := g_pars.ue_pars.imsi;
+ var PLMNIdentity plmn_id := f_imsi_plmn_id();
+ var octetstring imsi_suffix := imsi_hex2oct(substr(imsi, lengthof(imsi) - 10, 10));
+ return plmn_id & '21430001'O & imsi_suffix;
}
friend function f_ngap_setup(integer idx := 0, template (omit) NGAP_IEs.Cause cause :=
omit) runs on MTC_CT {
@@ -270,17 +284,60 @@
}
}
-private altstep as_ngap_handle_auth() runs on ConnHdlr {
+/* 3GPP TS 24.501 5.4.1.3.2, 3GPP TS 33.501 6.1.3.2 */
+private altstep as_ngap_handle_auth(boolean allow_resync := true) runs on ConnHdlr {
var NG_NAS_DL_Message_Type rx_nas;
var template (present) NAS_KeySetIdentifier kset_id := f_tr_ConnHdlr_kset_id();
[] NGAP.receive(cr_NG_AUTHENTICATION_REQUEST) -> value rx_nas {
log("Rx NAS message: ", rx_nas);
+ var integer ret;
+ var integer my_sqn := 0; /* TODO: move to a ConnHdlr state attribute? */
+ var OCT16 rand := bit2oct(rx_nas.authentication_Request.rand.randValue);
+ var OCT16 autn := bit2oct(rx_nas.authentication_Request.autn.aUTN);
+ var OCT16 ik;
+ var OCT16 ck;
+ var OCT8 res;
+ var OCT14 auts;
g_pars.kset_id := rx_nas.authentication_Request.ngNasKeySetId;
- /* TODO: generate proper RES, 3GPP TS 33.501 A.4 */
- const OCT8 res := '6a91970e838fd079'O;
- NGAP.send(cs_NG_AUTHENTICATION_RESPONSE(cs_AuthenticationResponseParameter(oct2bit(res))));
+ ret := f_milenage_check(g_pars.ue_pars.usim_key,
+ g_pars.ue_pars.usim_opc,
+ int2oct(my_sqn, 8),
+ rand, autn, ik, ck, res, auts);
+ if (ret == -1) {
+ Misc_Helpers.f_shutdown(__BFILE__, __LINE__, fail,
+ log2str("fx_milenage_check() failed! -1"));
+ }
+ if (ret == -2) {
+ if (not allow_resync) {
+ Misc_Helpers.f_shutdown(__BFILE__, __LINE__, fail,
+ log2str("fx_milenage_check() unexpected Resync!"));
+ }
+ log("Milenage: RX-SQN differs from SIM SQN: Re-Sync! AUTS=", auts);
+ /* 3GPP TS 24.501 5.4.1.3.6 d) */
+ NGAP.send(cs_NG_AUTHENTICATION_FAILURE(cs_GMM_GSM_Cause(omit, int2bit(21, 8)),
+ cs_AuthFailParam(oct2bit(auts))));
+ as_ngap_handle_auth(allow_resync := false);
+ return;
+ }
+
+ /* Derive (X)RES* from (X)RES, 3GPP TS 33.501 A.4 */
+ var octetstring ssn := f_NG_NAS_ServingNetworkName_OCT(f_imsi_plmn_id(), omit);
+ var OCT16 res_star := f_kdf_xres_star(ssn, ck, ik, rand, res);
+ log("Auth Response: RES=", res, ", SSN=", ssn, " / ",
oct2char(ssn), ", RES*=", res_star);
+
+ NGAP.send(cs_NG_AUTHENTICATION_RESPONSE(cs_AuthenticationResponseParameter(oct2bit(res_star))));
+ }
+}
+
+private altstep as_ngap_handle_sec_mode() runs on ConnHdlr {
+ var NG_NAS_DL_Message_Type rx_nas;
+
+ [] NGAP.receive(cr_NG_SECURITY_PROTECTED_NAS_MESSAGE) -> value rx_nas {
+ var NG_NAS_DL_Message_Type in_nas :=
dec_NG_NAS_DL_Message_Type(rx_nas.security_Protected_Nas_Message.plainNASMessage);
+ log("PESPIN: Rx inner NAS: ", in_nas);
+ /* TODO: apply below integrity and ciphering based on Security Mode Command */
}
}
@@ -320,6 +377,7 @@
}
as_ngap_handle_auth();
+ as_ngap_handle_sec_mode();
/* TODO: handle Auth, SecurityModeCommand, InitialContextSetup, PDUSessionresource, */
f_sleep(5.0);
diff --git a/5gc/gen_links.sh b/5gc/gen_links.sh
index 295ca24..9f67736 100755
--- a/5gc/gen_links.sh
+++ b/5gc/gen_links.sh
@@ -61,12 +61,21 @@
FILES+="NGAP_EncDec.cc NGAP_Types.ttcn NGAP_Pixits.ttcn NGAP_Templates.ttcn "
gen_links $DIR $FILES
+DIR=../library/milenage
+FILES="milenage.c milenage.h Milenage_FunctionDefs.cc Milenage_Functions.ttcn
"
+gen_links $DIR $FILES
+
+DIR=../library/ng_crypto
+FILES="key_derivation.c key_derivation.h "
+gen_links $DIR $FILES
+
DIR=../library
FILES="Misc_Helpers.ttcn General_Types.ttcn GSM_Types.ttcn Osmocom_Types.ttcn
Native_Functions.ttcn Native_FunctionDefs.cc IPCP_Types.ttcn IPCP_Templates.ttcn "
FILES+="SCTP_Templates.ttcn "
FILES+="DNS_Helpers.ttcn "
FILES+="NGAP_CodecPort.ttcn NGAP_CodecPort_CtrlFunctDef.cc
NGAP_CodecPort_CtrlFunct.ttcn NGAP_Functions.ttcn NGAP_Emulation.ttcn "
FILES+="NG_NAS_Osmo_Templates.ttcn NG_NAS_Functions.ttcn "
+FILES+="NG_CryptoFunctionDefs.cc NG_CryptoFunctions.ttcn "
gen_links $DIR $FILES
gen_links_finish
diff --git a/5gc/regen_makefile.sh b/5gc/regen_makefile.sh
index 44f7a56..0d53583 100755
--- a/5gc/regen_makefile.sh
+++ b/5gc/regen_makefile.sh
@@ -4,13 +4,16 @@
FILES="
*.asn
+ *.c
*.ttcn
IPL4asp_PT.cc
IPL4asp_discovery.cc
Native_FunctionDefs.cc
common_ext.cc
+ Milenage_FunctionDefs.cc
NGAP_CodecPort_CtrlFunctDef.cc
NGAP_EncDec.cc
+ NG_CryptoFunctionDefs.cc
TCCConversion.cc
TCCEncoding.cc
TCCInterface.cc
diff --git a/deps/Makefile b/deps/Makefile
index aa2b36c..b7e06cb 100644
--- a/deps/Makefile
+++ b/deps/Makefile
@@ -85,7 +85,7 @@
# Do not put references to branches here, except for local testing: this breaks the
caching
# logic of docker containers, which only invalidate their cached ttcn3 dependencies if
this
# file changed.
-nas_commit= 4371752494b7c85cd5a3bc32bc6f498171c7aa13
+nas_commit= f7921c4d88e204e09067f0975957d075be82e800
titan.Libraries.TCCUsefulFunctions_commit= R.35.B-6-gb3687da
titan.ProtocolEmulations.M3UA_commit= b58f92046e48a7b1ed531e243a2319ebca53bf4c
titan.ProtocolEmulations.SCCP_commit= 750a3e836831e58eae59d4757ef5d0c759f9ca5d
diff --git a/library/General_Types.ttcn b/library/General_Types.ttcn
index 2daa593..163ec47 100644
--- a/library/General_Types.ttcn
+++ b/library/General_Types.ttcn
@@ -84,7 +84,11 @@
type bitstring BIT30 length(30) with { variant "FIELDLENGTH(30)" };
type bitstring BIT31 length(31) with { variant "FIELDLENGTH(31)" };
type bitstring BIT32 length(32) with { variant "FIELDLENGTH(32)" };
+ type bitstring BIT48 length(48) with { variant "FIELDLENGTH(48)" };
type bitstring BIT56 length(56) with { variant "FIELDLENGTH(56)" };
+ type bitstring BIT64 length(64) with { variant "FIELDLENGTH(64)" };
+ type bitstring BIT128 length(128) with { variant "FIELDLENGTH(128)" };
+ type bitstring BIT256 length(256) with { variant "FIELDLENGTH(256)" };
//****************************************************
// Octetstrings
diff --git a/library/NG_CryptoFunctionDefs.cc b/library/NG_CryptoFunctionDefs.cc
new file mode 100644
index 0000000..e45e519
--- /dev/null
+++ b/library/NG_CryptoFunctionDefs.cc
@@ -0,0 +1,40 @@
+/* AKA USIM Utility functions */
+
+#include <stdio.h>
+#include <string.h>
+#include <errno.h>
+#include <stdint.h>
+#include <gnutls/crypto.h>
+
+#include <Addfunc.hh>
+#include <Encdec.hh>
+#include <Boolean.hh>
+#include <Integer.hh>
+#include <Octetstring.hh>
+#include <Bitstring.hh>
+
+#include "key_derivation.h"
+
+namespace NG__CryptoFunctions {
+
+/* 3GPP TS 33.501 A.4 RES* and XRES* derivation function */
+OCTETSTRING f__kdf__xres__star(const OCTETSTRING &ssn, const OCTETSTRING& ck,
const OCTETSTRING& ik,
+ const OCTETSTRING& rand, const OCTETSTRING& xres)
+{
+ TTCN_Buffer ttcn_buf_ssn(ssn);
+ TTCN_Buffer ttcn_buf_ck(ck);
+ TTCN_Buffer ttcn_buf_ik(ik);
+ TTCN_Buffer ttcn_buf_rand(rand);
+ TTCN_Buffer ttcn_buf_xres(xres);
+ uint8_t xres_star[16];
+
+ kdf_xres_star(ttcn_buf_ssn.get_data(), ttcn_buf_ssn.get_len(),
+ ttcn_buf_ck.get_data(),
+ ttcn_buf_ik.get_data(),
+ ttcn_buf_rand.get_data(),
+ ttcn_buf_xres.get_data(), ttcn_buf_xres.get_len(),
+ xres_star);
+ return OCTETSTRING(sizeof(xres_star), xres_star);
+}
+
+}
diff --git a/library/NG_CryptoFunctions.ttcn b/library/NG_CryptoFunctions.ttcn
new file mode 100644
index 0000000..fbbe57e
--- /dev/null
+++ b/library/NG_CryptoFunctions.ttcn
@@ -0,0 +1,78 @@
+/* Utility crypto functions for NG NAS (5G)
+ *
+ * (C) 2025 by sysmocom - s.f.m.c. GmbH <info(a)sysmocom.de>
+ * Author: Pau Espin Pedrol <pespin(a)sysmocom.de
+ * All rights reserved.
+ *
+ * Released under the terms of GNU General Public License, Version 2 or
+ * (at your option) any later version.
+ *
+ * SPDX-License-Identifier: GPL-2.0-or-later
+ */
+
+module NG_CryptoFunctions {
+
+import from General_Types all;
+import from Misc_Helpers all;
+
+import from NAS_CommonTypeDefs all;
+
+/*********************************************************************************
+ * low-level API (external C/C++ code)
+ *********************************************************************************/
+
+/* 3GPP TS 33.102 Figure 9, 3GPP TS 35.206 Annex 3 */
+external function f_kdf_xres_star(octetstring ssn, OCT16 ck, OCT16 ik, OCT16 rand,
+ octetstring xres) return OCT16;
+
+/*********************************************************************************
+ * mid-level API
+ *********************************************************************************/
+
+function f_NG_NAS_SNN_MNC(NAS_PlmnId plmn_id) return charstring
+{
+ var charstring mnc := "";
+ var hexstring plmn_hex := oct2hex(plmn_id);
+
+ if (plmn_hex[2] == 'F'H) {
+ mnc := "0";
+ }
+ mnc := mnc & hex2str(plmn_hex[5]) & hex2str(plmn_hex[4]);
+ if (plmn_hex[2] != 'F'H) {
+ /* add last digit if not F */
+ mnc := mnc & hex2str(plmn_hex[2]);
+ }
+ return mnc;
+}
+
+function f_NG_NAS_SNN_MCC(NAS_PlmnId plmn_id) return charstring
+{
+ var charstring mcc;
+ var hexstring plmn_hex := oct2hex(plmn_id);
+
+ mcc := hex2str(plmn_hex[1]) &
+ hex2str(plmn_hex[0]) &
+ hex2str(plmn_hex[3]);
+
+ return mcc;
+}
+
+function f_NG_NAS_ServingNetworkName(NAS_PlmnId plmn_id, template (omit) hexstring NID :=
omit) return charstring
+{
+ var charstring ssn := "5G:mnc" & f_NG_NAS_SNN_MNC(plmn_id) &
+ ".mcc" & f_NG_NAS_SNN_MCC(plmn_id) &
+ ".3gppnetwork.org";
+
+ if (isvalue(NID)) {
+ ssn := ssn & ":" & hex2str (valueof(NID));
+ }
+
+ return ssn;
+}
+
+function f_NG_NAS_ServingNetworkName_OCT(NAS_PlmnId plmn_id, template (omit) hexstring
NID := omit) return octetstring
+{
+ return char2oct(f_NG_NAS_ServingNetworkName(plmn_id, NID));
+}
+
+}
diff --git a/library/NG_NAS_Osmo_Templates.ttcn b/library/NG_NAS_Osmo_Templates.ttcn
index 1108947..5887fa6 100644
--- a/library/NG_NAS_Osmo_Templates.ttcn
+++ b/library/NG_NAS_Osmo_Templates.ttcn
@@ -54,6 +54,13 @@
res := p_ExpectedRES
}
+ template (value) AuthenticationFailureParameter cs_AuthFailParam(template (value)
B112_Type auts) :=
+ {
+ iei := '30'O, // version 110, and value used in GMM
+ iel := '0E'O,
+ auts := auts
+ };
+
/* 24.501 cl. 8.2.1 */
template (present) NG_NAS_DL_Message_Type
@@ -63,7 +70,7 @@
template AUTN p_AUTN := *,
template EAP_Message p_EAP := *
) :=
-{ /* 24.501 cl. 8.2.1 */
+{
authentication_Request := {
protocolDiscriminator := tsc_EPD_GMM, /* cl. 9.2 M V 1
*/
spareHalfOctet := tsc_SpareHalfOctet, /* cl. 9.3 M V 1/2 */
@@ -84,13 +91,47 @@
template (omit) EAP_Message p_EAP := omit) :=
{
authentication_Response := {
- protocolDiscriminator := tsc_EPD_GMM, /* cl. 9.2 M V 1 */
- spareHalfOctet := tsc_SpareHalfOctet, /* cl. 9.3 M V 1/2 */
- securityHeaderType := tsc_SHT_NoSecurityProtection,
- messageType := tsc_MT_NG_AuthenticationResponse, /* cl. 9.7 M V 1 */
- authResponseParam := p_Res, /* cl. 9.11.3.17 O TLV 18 IEI=2D */
- eapMessage := p_EAP /* cl. 9.11.2.2 O TLV-E 7-1503 IEI=78 */
+ protocolDiscriminator := tsc_EPD_GMM, /* cl. 9.2 M V 1 */
+ spareHalfOctet := tsc_SpareHalfOctet, /* cl. 9.3 M V 1/2 */
+ securityHeaderType := tsc_SHT_NoSecurityProtection,
+ messageType := tsc_MT_NG_AuthenticationResponse, /* cl. 9.7 M V 1 */
+ authResponseParam := p_Res, /* cl. 9.11.3.17 O TLV 18 IEI=2D */
+ eapMessage := p_EAP /* cl. 9.11.2.2 O TLV-E 7-1503 IEI=78 */
+ }
}
+
+/* 24.501 cl. 8.2.4 */
+template (value) NG_NAS_UL_Message_Type cs_NG_AUTHENTICATION_FAILURE(template (value)
GMM_GSM_Cause p_Cause,
+ template (omit) AuthenticationFailureParameter p_AuthFailParam := omit) :=
+{
+ authentication_Failure := {
+ protocolDiscriminator := tsc_EPD_GMM, /* cl. 9.2 M V 1
*/
+ spareHalfOctet := tsc_SpareHalfOctet, /* cl. 9.3 M V 1/2
*/
+ securityHeaderType := tsc_SHT_NoSecurityProtection,
+ messageType := tsc_MT_NG_AuthenticationFailure, /* cl. 9.7 M V 1
*/
+ gmmCause := p_Cause, /* cl. 9.11.3.2 M V 1
*/
+ authFailureParam := p_AuthFailParam /* cl. 9.11.3.12 O TLV 16
IEI=30 */
+ }
+}
+
+
+/* 24.501 cl. 8.2.28 */
+template (present) NG_NAS_DL_Message_Type
+cr_NG_SECURITY_PROTECTED_NAS_MESSAGE(template (present) ExtdProtocolDiscriminator
p_protocolDiscriminator := ?,
+ template (present) SpareHalfOctet p_spareHalfOctet := ?,
+ template (present) SecurityHeaderType p_securityHeaderType := ?,
+ template (present) MessageAuthenticationCode p_messageAuthenticationCode := ?,
+ template (present) NAS_SequenceNumber p_sequenceNumber := ?,
+ template (present) NG_NAS_Message p_plainNASMessage := ?) :=
+{
+ security_Protected_Nas_Message := {
+ protocolDiscriminator := p_protocolDiscriminator, /* cl. 9.2 M V 1 */
+ spareHalfOctet := p_spareHalfOctet, /* cl. 9.5 M V 1/2 */
+ securityHeaderType := p_securityHeaderType, /* cl. 9.3 M V 1/2 */
+ messageAuthenticationCode := p_messageAuthenticationCode, /* cl. 9.8 M V 4 */
+ sequenceNumber := p_sequenceNumber, /* cl. 9.10 M V 1 */
+ plainNASMessage := p_plainNASMessage /* cl. 9.9 M V 3-n */
+ }
}
}
diff --git a/library/milenage/Milenage_FunctionDefs.cc
b/library/milenage/Milenage_FunctionDefs.cc
new file mode 100644
index 0000000..ddd399f
--- /dev/null
+++ b/library/milenage/Milenage_FunctionDefs.cc
@@ -0,0 +1,53 @@
+/* AKA USIM Utility functions */
+
+#include <stdio.h>
+#include <string.h>
+#include <errno.h>
+#include <stdint.h>
+
+#include <Addfunc.hh>
+#include <Encdec.hh>
+#include <Boolean.hh>
+#include <Integer.hh>
+#include <Octetstring.hh>
+#include <Bitstring.hh>
+
+#include "milenage.h"
+
+namespace Milenage__Functions {
+
+/* 3GPP TS 33.102 Figure 9, 3GPP TS 35.206 Annex 3 */
+INTEGER f__milenage__check(const OCTETSTRING& opc, const OCTETSTRING& k,
+ const OCTETSTRING& sqn, const OCTETSTRING& _rand, const OCTETSTRING&
autn,
+ OCTETSTRING& ik, OCTETSTRING& ck, OCTETSTRING& res, OCTETSTRING&
auts)
+{
+ TTCN_Buffer ttcn_buf_opc(opc);
+ TTCN_Buffer ttcn_buf_k(k);
+ TTCN_Buffer ttcn_buf_sqn(sqn);
+ TTCN_Buffer ttcn_buf_rand(_rand);
+ TTCN_Buffer ttcn_buf_autn(autn);
+ uint8_t buf_ik[16];
+ uint8_t buf_ck[16];
+ uint8_t buf_res[8];
+ uint8_t buf_auts[14];
+ size_t res_len = 0;
+ int rc;
+
+ rc = milenage_check(ttcn_buf_opc.get_data(),
+ ttcn_buf_k.get_data(),
+ ttcn_buf_sqn.get_data(),
+ ttcn_buf_rand.get_data(),
+ ttcn_buf_autn.get_data(),
+ buf_ik, buf_ck,
+ buf_res, &res_len,
+ buf_auts);
+
+ ik = OCTETSTRING(16, static_cast<const unsigned char*>(&buf_ik[0]));
+ ck = OCTETSTRING(16, static_cast<const unsigned char*>(&buf_ck[0]));
+ res = OCTETSTRING(res_len, static_cast<const unsigned char*>(&buf_res[0]));
+ auts = OCTETSTRING(14, static_cast<const unsigned char*>(&buf_auts[0]));
+
+ return INTEGER(rc);
+}
+
+}
diff --git a/library/milenage/Milenage_Functions.ttcn
b/library/milenage/Milenage_Functions.ttcn
new file mode 100644
index 0000000..8fb9b04
--- /dev/null
+++ b/library/milenage/Milenage_Functions.ttcn
@@ -0,0 +1,24 @@
+/* Milenage crypto functions (USIM AKA)
+ *
+ * (C) 2025 by sysmocom - s.f.m.c. GmbH <info(a)sysmocom.de>
+ * Author: Pau Espin Pedrol <pespin(a)sysmocom.de
+ * All rights reserved.
+ *
+ * Released under the terms of GNU General Public License, Version 2 or
+ * (at your option) any later version.
+ *
+ * SPDX-License-Identifier: GPL-2.0-or-later
+ */
+
+module Milenage_Functions {
+
+import from General_Types all;
+
+/* 3GPP TS 33.102 Figure 9, 3GPP TS 35.206 Annex 3 */
+external function f_milenage_check(OCT16 opc,OCT16 k,
+ OCT8 sqn, OCT16 rand, OCT16 autn,
+ out OCT16 ik, out OCT16 ck,
+ out OCT8 res, out OCT14 auts) return integer;
+
+
+}
diff --git a/library/milenage/milenage.c b/library/milenage/milenage.c
new file mode 100644
index 0000000..d079a3d
--- /dev/null
+++ b/library/milenage/milenage.c
@@ -0,0 +1,424 @@
+/*
+ * 3GPP AKA - Milenage algorithm (3GPP TS 35.205, .206, .207, .208)
+ * Copyright (c) 2006-2007 <j(a)w1.fi>
+ *
+ * This software may be distributed under the terms of the BSD license.
+ * See README for more details.
+ *
+ * This file implements an example authentication algorithm defined for 3GPP
+ * AKA. This can be used to implement a simple HLR/AuC into hlr_auc_gw to allow
+ * EAP-AKA to be tested properly with real USIM cards.
+ *
+ * This implementations assumes that the r1..r5 and c1..c5 constants defined in
+ * TS 35.206 are used, i.e., r1=64, r2=0, r3=32, r4=64, r5=96, c1=00..00,
+ * c2=00..01, c3=00..02, c4=00..04, c5=00..08. The block cipher is assumed to
+ * be AES (Rijndael).
+ */
+
+
+#include "milenage.h"
+
+#include <openssl/err.h> /* for ERR_print_errors_fp */
+#include <openssl/ssl.h> /* for NID_sha1, RSA */
+#include <openssl/evp.h> /* for EVP_PKEY, EVP_sha1(), ... */
+#include <openssl/md5.h> /* for MD5_DIGEST_LENGTH */
+#include <openssl/sha.h> /* for SHA_DIGEST_LENGTH */
+
+#define AST_CRYPTO_RSA_KEY_BITS 1024
+#define AST_CRYPTO_AES_BLOCKSIZE 128
+
+struct ast_aes {
+ unsigned char raw[AST_CRYPTO_AES_BLOCKSIZE / 8];
+};
+
+int ast_aes_set_encrypt_key(const unsigned char *key, struct ast_aes *ctx)
+{
+ if (key == NULL || ctx == NULL)
+ return -1;
+
+ memcpy(ctx->raw, key, AST_CRYPTO_AES_BLOCKSIZE / 8);
+ return 0;
+}
+
+static int evp_cipher_aes_encrypt(const unsigned char *in, unsigned char *out, unsigned
inlen, const struct ast_aes *key)
+{
+ EVP_CIPHER_CTX *ctx = NULL;
+ int res, outlen, finallen;
+ unsigned char final[AST_CRYPTO_AES_BLOCKSIZE / 8];
+
+ if ((ctx = EVP_CIPHER_CTX_new()) == NULL)
+ return -1;
+
+ do {
+ if ((res = EVP_CipherInit(ctx, EVP_aes_128_ecb(), key->raw, NULL, 1)) <= 0)
+ break;
+ EVP_CIPHER_CTX_set_padding(ctx, 0);
+ if ((res = EVP_CipherUpdate(ctx, out, &outlen, in, inlen)) <= 0)
+ break;
+ /* for ECB, this is a no-op */
+ if ((res = EVP_CipherFinal(ctx, final, &finallen)) <= 0)
+ break;
+ res = outlen;
+ } while (0);
+
+ EVP_CIPHER_CTX_free(ctx);
+
+ return res;
+}
+
+int ast_aes_encrypt(const unsigned char *in, unsigned char *out, const struct ast_aes
*key)
+{
+ int res;
+
+ if ((res = evp_cipher_aes_encrypt(in, out, AST_CRYPTO_AES_BLOCKSIZE / 8, key)) <= 0)
{
+ printf("AES encryption failed\n");
+ exit(0);
+ }
+ return res;
+}
+
+static int aes_128_encrypt_block(const u8 *key, const u8 *plain, u8 *encr)
+{
+ struct ast_aes aes_key;
+
+ ast_aes_set_encrypt_key(key, &aes_key);
+ if (ast_aes_encrypt(plain, encr, &aes_key) <= 0) {
+ printf("Failed to ecrypt AES 128.");
+ return -1;
+ }
+
+ return 0;
+}
+
+#define DEBUG
+#ifdef DEBUG
+void hexdump(const char *text, const uint8_t *data, int len)
+{
+ char s[3 * len + 2], *p;
+ int f;
+
+ for (p = s, f = 0; f < len; f++, p += 3)
+ sprintf(p, "%02hhX ", (unsigned char)data[f]);
+
+ printf("%s: %s\n", text, s);
+}
+#endif
+
+
+/**
+ * milenage_f1 - Milenage f1 and f1* algorithms
+ * @opc: OPc = 128-bit value derived from OP and K
+ * @k: K = 128-bit subscriber key
+ * @_rand: RAND = 128-bit random challenge
+ * @sqn: SQN = 48-bit sequence number
+ * @amf: AMF = 16-bit authentication management field
+ * @mac_a: Buffer for MAC-A = 64-bit network authentication code, or %NULL
+ * @mac_s: Buffer for MAC-S = 64-bit resync authentication code, or %NULL
+ * Returns: 0 on success, -1 on failure
+ */
+int milenage_f1(const u8 *opc, const u8 *k, const u8 *_rand,
+ const u8 *sqn, const u8 *amf, u8 *mac_a, u8 *mac_s)
+{
+ u8 tmp1[16], tmp2[16], tmp3[16];
+ int i;
+
+ /* tmp1 = TEMP = E_K(RAND XOR OP_C) */
+ for (i = 0; i < 16; i++)
+ tmp1[i] = _rand[i] ^ opc[i];
+ if (aes_128_encrypt_block(k, tmp1, tmp1))
+ return -1;
+
+ /* tmp2 = IN1 = SQN || AMF || SQN || AMF */
+ memcpy(tmp2, sqn, 6);
+ memcpy(tmp2 + 6, amf, 2);
+ memcpy(tmp2 + 8, tmp2, 8);
+
+ /* OUT1 = E_K(TEMP XOR rot(IN1 XOR OP_C, r1) XOR c1) XOR OP_C */
+
+ /* rotate (tmp2 XOR OP_C) by r1 (= 0x40 = 8 bytes) */
+ for (i = 0; i < 16; i++)
+ tmp3[(i + 8) % 16] = tmp2[i] ^ opc[i];
+ /* XOR with TEMP = E_K(RAND XOR OP_C) */
+ for (i = 0; i < 16; i++)
+ tmp3[i] ^= tmp1[i];
+ /* XOR with c1 (= ..00, i.e., NOP) */
+
+ /* f1 || f1* = E_K(tmp3) XOR OP_c */
+ if (aes_128_encrypt_block(k, tmp3, tmp1))
+ return -1;
+ for (i = 0; i < 16; i++)
+ tmp1[i] ^= opc[i];
+ if (mac_a)
+ memcpy(mac_a, tmp1, 8); /* f1 */
+ if (mac_s)
+ memcpy(mac_s, tmp1 + 8, 8); /* f1* */
+ return 0;
+}
+
+
+/**
+ * milenage_f2345 - Milenage f2, f3, f4, f5, f5* algorithms
+ * @opc: OPc = 128-bit value derived from OP and K
+ * @k: K = 128-bit subscriber key
+ * @_rand: RAND = 128-bit random challenge
+ * @res: Buffer for RES = 64-bit signed response (f2), or %NULL
+ * @ck: Buffer for CK = 128-bit confidentiality key (f3), or %NULL
+ * @ik: Buffer for IK = 128-bit integrity key (f4), or %NULL
+ * @ak: Buffer for AK = 48-bit anonymity key (f5), or %NULL
+ * @akstar: Buffer for AK = 48-bit anonymity key (f5*), or %NULL
+ * Returns: 0 on success, -1 on failure
+ */
+int milenage_f2345(const u8 *opc, const u8 *k, const u8 *_rand,
+ u8 *res, u8 *ck, u8 *ik, u8 *ak, u8 *akstar)
+{
+ u8 tmp1[16], tmp2[16], tmp3[16];
+ int i;
+
+ /* tmp2 = TEMP = E_K(RAND XOR OP_C) */
+ for (i = 0; i < 16; i++)
+ tmp1[i] = _rand[i] ^ opc[i];
+ if (aes_128_encrypt_block(k, tmp1, tmp2))
+ return -1;
+
+ /* OUT2 = E_K(rot(TEMP XOR OP_C, r2) XOR c2) XOR OP_C */
+ /* OUT3 = E_K(rot(TEMP XOR OP_C, r3) XOR c3) XOR OP_C */
+ /* OUT4 = E_K(rot(TEMP XOR OP_C, r4) XOR c4) XOR OP_C */
+ /* OUT5 = E_K(rot(TEMP XOR OP_C, r5) XOR c5) XOR OP_C */
+
+ /* f2 and f5 */
+ /* rotate by r2 (= 0, i.e., NOP) */
+ for (i = 0; i < 16; i++)
+ tmp1[i] = tmp2[i] ^ opc[i];
+ tmp1[15] ^= 1; /* XOR c2 (= ..01) */
+ /* f5 || f2 = E_K(tmp1) XOR OP_c */
+ if (aes_128_encrypt_block(k, tmp1, tmp3))
+ return -1;
+ for (i = 0; i < 16; i++)
+ tmp3[i] ^= opc[i];
+ if (res)
+ memcpy(res, tmp3 + 8, 8); /* f2 */
+ if (ak)
+ memcpy(ak, tmp3, 6); /* f5 */
+
+ /* f3 */
+ if (ck) {
+ /* rotate by r3 = 0x20 = 4 bytes */
+ for (i = 0; i < 16; i++)
+ tmp1[(i + 12) % 16] = tmp2[i] ^ opc[i];
+ tmp1[15] ^= 2; /* XOR c3 (= ..02) */
+ if (aes_128_encrypt_block(k, tmp1, ck))
+ return -1;
+ for (i = 0; i < 16; i++)
+ ck[i] ^= opc[i];
+ }
+
+ /* f4 */
+ if (ik) {
+ /* rotate by r4 = 0x40 = 8 bytes */
+ for (i = 0; i < 16; i++)
+ tmp1[(i + 8) % 16] = tmp2[i] ^ opc[i];
+ tmp1[15] ^= 4; /* XOR c4 (= ..04) */
+ if (aes_128_encrypt_block(k, tmp1, ik))
+ return -1;
+ for (i = 0; i < 16; i++)
+ ik[i] ^= opc[i];
+ }
+
+ /* f5* */
+ if (akstar) {
+ /* rotate by r5 = 0x60 = 12 bytes */
+ for (i = 0; i < 16; i++)
+ tmp1[(i + 4) % 16] = tmp2[i] ^ opc[i];
+ tmp1[15] ^= 8; /* XOR c5 (= ..08) */
+ if (aes_128_encrypt_block(k, tmp1, tmp1))
+ return -1;
+ for (i = 0; i < 6; i++)
+ akstar[i] = tmp1[i] ^ opc[i];
+ }
+
+ return 0;
+}
+
+
+/**
+ * milenage_generate - Generate AKA AUTN,IK,CK,RES
+ * @opc: OPc = 128-bit operator variant algorithm configuration field (encr.)
+ * @amf: AMF = 16-bit authentication management field
+ * @k: K = 128-bit subscriber key
+ * @sqn: SQN = 48-bit sequence number
+ * @_rand: RAND = 128-bit random challenge
+ * @autn: Buffer for AUTN = 128-bit authentication token
+ * @ik: Buffer for IK = 128-bit integrity key (f4), or %NULL
+ * @ck: Buffer for CK = 128-bit confidentiality key (f3), or %NULL
+ * @res: Buffer for RES = 64-bit signed response (f2), or %NULL
+ * @res_len: Max length for res; set to used length or 0 on failure
+ */
+void milenage_generate(const u8 *opc, const u8 *amf, const u8 *k,
+ const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik,
+ u8 *ck, u8 *res, size_t *res_len)
+{
+ int i;
+ u8 mac_a[8], ak[6];
+
+ if (*res_len < 8) {
+ *res_len = 0;
+ return;
+ }
+ if (milenage_f1(opc, k, _rand, sqn, amf, mac_a, NULL) ||
+ milenage_f2345(opc, k, _rand, res, ck, ik, ak, NULL)) {
+ *res_len = 0;
+ return;
+ }
+ *res_len = 8;
+
+ /* AUTN = (SQN ^ AK) || AMF || MAC */
+ for (i = 0; i < 6; i++)
+ autn[i] = sqn[i] ^ ak[i];
+ memcpy(autn + 6, amf, 2);
+ memcpy(autn + 8, mac_a, 8);
+}
+
+
+/**
+ * milenage_auts - Milenage AUTS validation
+ * @opc: OPc = 128-bit operator variant algorithm configuration field (encr.)
+ * @k: K = 128-bit subscriber key
+ * @_rand: RAND = 128-bit random challenge
+ * @auts: AUTS = 112-bit authentication token from client
+ * @sqn: Buffer for SQN = 48-bit sequence number
+ * Returns: 0 = success (sqn filled), -1 on failure
+ */
+int milenage_auts(const u8 *opc, const u8 *k, const u8 *_rand, const u8 *auts,
+ u8 *sqn)
+{
+ u8 amf[2] = { 0x00, 0x00 }; /* TS 33.102 v7.0.0, 6.3.3 */
+ u8 ak[6], mac_s[8];
+ int i;
+
+ if (milenage_f2345(opc, k, _rand, NULL, NULL, NULL, NULL, ak))
+ return -1;
+ for (i = 0; i < 6; i++)
+ sqn[i] = auts[i] ^ ak[i];
+ if (milenage_f1(opc, k, _rand, sqn, amf, NULL, mac_s) ||
+ memcmp(mac_s, auts + 6, 8) != 0)
+ return -1;
+ return 0;
+}
+
+
+/**
+ * gsm_milenage - Generate GSM-Milenage (3GPP TS 55.205) authentication triplet
+ * @opc: OPc = 128-bit operator variant algorithm configuration field (encr.)
+ * @k: K = 128-bit subscriber key
+ * @_rand: RAND = 128-bit random challenge
+ * @sres: Buffer for SRES = 32-bit SRES
+ * @kc: Buffer for Kc = 64-bit Kc
+ * Returns: 0 on success, -1 on failure
+ */
+int gsm_milenage(const u8 *opc, const u8 *k, const u8 *_rand, u8 *sres, u8 *kc)
+{
+ u8 res[8], ck[16], ik[16];
+ int i;
+
+ if (milenage_f2345(opc, k, _rand, res, ck, ik, NULL, NULL))
+ return -1;
+
+ for (i = 0; i < 8; i++)
+ kc[i] = ck[i] ^ ck[i + 8] ^ ik[i] ^ ik[i + 8];
+
+#ifdef GSM_MILENAGE_ALT_SRES
+ memcpy(sres, res, 4);
+#else /* GSM_MILENAGE_ALT_SRES */
+ for (i = 0; i < 4; i++)
+ sres[i] = res[i] ^ res[i + 4];
+#endif /* GSM_MILENAGE_ALT_SRES */
+ return 0;
+}
+
+
+/**
+ * milenage_generate - Generate AKA AUTN,IK,CK,RES
+ * @opc: OPc = 128-bit operator variant algorithm configuration field (encr.)
+ * @k: K = 128-bit subscriber key
+ * @sqn: SQN = 48-bit sequence number
+ * @_rand: RAND = 128-bit random challenge
+ * @autn: AUTN = 128-bit authentication token
+ * @ik: Buffer for IK = 128-bit integrity key (f4), or %NULL
+ * @ck: Buffer for CK = 128-bit confidentiality key (f3), or %NULL
+ * @res: Buffer for RES = 64-bit signed response (f2), or %NULL
+ * @res_len: Variable that will be set to RES length
+ * @auts: 112-bit buffer for AUTS
+ * Returns: 0 on success, -1 on failure, or -2 on synchronization failure
+ */
+int milenage_check(const u8 *opc, const u8 *k, const u8 *sqn, const u8 *_rand,
+ const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len,
+ u8 *auts)
+{
+ int i;
+ u8 mac_a[8], ak[6], rx_sqn[6];
+ const u8 *amf;
+
+#ifdef DEBUG
+ hexdump("Milenage: OPC", opc, 16);
+ hexdump("Milenage: K", k, 16);
+ hexdump("Milenage: AUTN", autn, 16);
+ hexdump("Milenage: RAND", _rand, 16);
+#endif
+
+ if (milenage_f2345(opc, k, _rand, res, ck, ik, ak, NULL))
+ return -1;
+
+ *res_len = 8;
+#ifdef DEBUG
+ hexdump("Milenage: RES", res, *res_len);
+ hexdump("Milenage: CK", ck, 16);
+ hexdump("Milenage: IK", ik, 16);
+ hexdump("Milenage: AK", ak, 6);
+#endif
+
+ /* AUTN = (SQN ^ AK) || AMF || MAC */
+ for (i = 0; i < 6; i++)
+ rx_sqn[i] = autn[i] ^ ak[i];
+#ifdef DEBUG
+ hexdump("Milenage: RX SQN", rx_sqn, 6);
+ hexdump("Milenage: SQN", sqn, 6);
+#endif
+
+ if (memcmp(rx_sqn, sqn, 6) <= 0) {
+ u8 auts_amf[2] = { 0x00, 0x00 }; /* TS 33.102 v7.0.0, 6.3.3 */
+ if (milenage_f2345(opc, k, _rand, NULL, NULL, NULL, NULL, ak))
+ return -1;
+#ifdef DEBUG
+ hexdump("Milenage: AK*", ak, 6);
+#endif
+ for (i = 0; i < 6; i++)
+ auts[i] = sqn[i] ^ ak[i];
+ if (milenage_f1(opc, k, _rand, sqn, auts_amf, NULL, auts + 6))
+ return -1;
+#ifdef DEBUG
+ hexdump("Milenage: AUTS", auts, 14);
+#endif
+ return -2;
+ }
+
+ amf = autn + 6;
+#ifdef DEBUG
+ hexdump("Milenage: AMF", amf, 2);
+#endif
+ if (milenage_f1(opc, k, _rand, rx_sqn, amf, mac_a, NULL))
+ return -1;
+
+#ifdef DEBUG
+ hexdump("Milenage: MAC_A", mac_a, 8);
+#endif
+
+ if (memcmp(mac_a, autn + 8, 8) != 0) {
+#ifdef DEBUG
+ hexdump("Milenage: MAC mismatch, Received MAC_A",
+ autn + 8, 8);
+#endif
+ return -1;
+ }
+
+ return 0;
+}
diff --git a/library/milenage/milenage.h b/library/milenage/milenage.h
new file mode 100644
index 0000000..238df62
--- /dev/null
+++ b/library/milenage/milenage.h
@@ -0,0 +1,22 @@
+
+#include <stdint.h>
+#include <stddef.h>
+#include <string.h>
+
+typedef uint8_t u8;
+typedef uint16_t u16;
+typedef uint32_t u32;
+
+int milenage_f1(const u8 *opc, const u8 *k, const u8 *_rand,
+ const u8 *sqn, const u8 *amf, u8 *mac_a, u8 *mac_s);
+int milenage_f2345(const u8 *opc, const u8 *k, const u8 *_rand,
+ u8 *res, u8 *ck, u8 *ik, u8 *ak, u8 *akstar);
+void milenage_generate(const u8 *opc, const u8 *amf, const u8 *k,
+ const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik,
+ u8 *ck, u8 *res, size_t *res_len);
+int milenage_auts(const u8 *opc, const u8 *k, const u8 *_rand, const u8 *auts,
+ u8 *sqn);
+int gsm_milenage(const u8 *opc, const u8 *k, const u8 *_rand, u8 *sres, u8 *kc);
+int milenage_check(const u8 *opc, const u8 *k, const u8 *sqn, const u8 *_rand,
+ const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len,
+ u8 *auts);
diff --git a/library/ng_crypto/key_derivation.c b/library/ng_crypto/key_derivation.c
new file mode 100644
index 0000000..29e0849
--- /dev/null
+++ b/library/ng_crypto/key_derivation.c
@@ -0,0 +1,49 @@
+#include <stdint.h>
+#include <string.h>
+#include <arpa/inet.h>
+#include <gnutls/crypto.h>
+
+#include "key_derivation.h"
+
+/* 3GPP TS 33.501 A.4 RES* and XRES* derivation function */
+void kdf_xres_star(const uint8_t *serving_network_name,
+ uint16_t serving_network_name_len,
+ const uint8_t *ck,
+ const uint8_t *ik,
+ const uint8_t *rand,
+ const uint8_t *xres, size_t xres_len,
+ uint8_t *out)
+{
+ uint8_t s[1024];
+ uint8_t key[16*2];
+ uint8_t tmp_out[32];
+ size_t pos = 0;
+ uint16_t lenbe;
+
+ memcpy(key, ck, 16);
+ memcpy(key+16, ik, 16);
+
+ s[pos++] = 0x6B; /* FC Value */
+
+ memcpy(&s[pos], serving_network_name, serving_network_name_len);
+ pos += serving_network_name_len;
+ lenbe = htons(serving_network_name_len);
+ memcpy(&s[pos], &lenbe, 2);
+ pos += 2;
+
+ memcpy(&s[pos], rand, 16);
+ pos += 16;
+ lenbe = htons(16);
+ memcpy(&s[pos], &lenbe, 2);
+ pos += 2;
+
+ memcpy(&s[pos], xres, xres_len);
+ pos += xres_len;
+ lenbe = htons(xres_len);
+ memcpy(&s[pos], &lenbe, 2);
+ pos += 2;
+
+ gnutls_hmac_fast(GNUTLS_MAC_SHA256, key, sizeof(key), s, pos, tmp_out);
+
+ memcpy(out, tmp_out+16, 16);
+}
diff --git a/library/ng_crypto/key_derivation.h b/library/ng_crypto/key_derivation.h
new file mode 100644
index 0000000..f78d746
--- /dev/null
+++ b/library/ng_crypto/key_derivation.h
@@ -0,0 +1,12 @@
+#pragma once
+
+#include <stdint.h>
+#include <unistd.h>
+
+void kdf_xres_star(const uint8_t *serving_network_name,
+ uint16_t serving_network_name_len,
+ const uint8_t *ck,
+ const uint8_t *ik,
+ const uint8_t *rand,
+ const uint8_t *xres, size_t xres_len,
+ uint8_t *out);
--
To view, visit
https://gerrit.osmocom.org/c/osmo-ttcn3-hacks/+/40413?usp=email
To unsubscribe, or for help writing mail filters, visit
https://gerrit.osmocom.org/settings?usp=email
Gerrit-MessageType: merged
Gerrit-Project: osmo-ttcn3-hacks
Gerrit-Branch: master
Gerrit-Change-Id: I11527f47e4310863124f3f02148e3f71da7d911e
Gerrit-Change-Number: 40413
Gerrit-PatchSet: 9
Gerrit-Owner: pespin <pespin(a)sysmocom.de>
Gerrit-Reviewer: Jenkins Builder
Gerrit-Reviewer: daniel <dwillmann(a)sysmocom.de>
Gerrit-Reviewer: fixeria <vyanitskiy(a)sysmocom.de>
Gerrit-Reviewer: jolly <andreas(a)eversberg.eu>
Gerrit-Reviewer: laforge <laforge(a)osmocom.org>
Gerrit-Reviewer: pespin <pespin(a)sysmocom.de>