| TCCSecurity.cc | |
| Functions | |
| f__calculateDigestResponse | Calculate digest response | 
| f__calculateDigestHA1 | Calculate digest H(A1) hash | 
| f__TCCSecurity__hex2char | Computes the 8 bit ASCII representation of an hexstring | 
| f__calculateMD5 | Compute MD5 hash value | 
| f__IMSAKA__f1 | Computes network authentication code MAC-A from key K, random challenge RAND, sequence number SQN and authentication management field AMF. | 
| f__IMSAKA__f2 | Takes key K and random challenge RAND, and returns response RES. | 
| f__IMSAKA__f3 | Takes key K and random challenge RAND, and returns confidentiality key CK. | 
| f__IMSAKA__f4 | Takes key K and random challenge RAND, and returns integrity key IK. | 
| f__IMSAKA__f2345 | Takes key K and random challenge RAND, and returns AK, CK, RES | 
| f__IMSAKA__f5 | Takes key K and random challenge RAND, and returns anonymity key AK. | 
| f__IMSAKA__f1star | Computes resynch authentication code MAC-S from key K, random challenge RAND, sequence number SQN and authentication management field AMF. | 
| f__IMSAKA__f5star | Takes key K and random challenge RAND, and returns resynch anonymity key AK. | 
| f__EAPSIM__A3A8 | Takes key Ki and random challenge RAND, and returns Kc and SRES keys | 
| f__IMSAKA__calculateAUTN | Computes authentication token AUTN from anonymity key AK, random challenge RAND, sequence number SQN and authentication management field AMF. | 
| f__calculateHMACMD5 | Calculate the HMAC MD5 value of a message with specified 64 bit key. | 
| f__calculate__HMAC__MD5 | Calculate the HMAC MD5 value of a message with specified key. | 
| f__calculate__HMAC__SHA1 | Calculate the HMAC SHA1 value of a message with specified key. | 
| f__calculate128__EEA3 | Purpose: Encrypt TTCN-3 message using the confidentiality algorithm 128-EEA3 | 
| f__calculate128__EIA3 | Purpose: Calculate 32 bit message authentication code (MAC) using integrity algorithm 128-EIA3 for TTCN-3 message | 
Calculate digest response
| nonce | in charstring - a server-specified data string which may ` be uniquely generated each time a 401 response is made | 
| cnonce | in charstring - client nonce | 
| user | in charstring - user name | 
| realm | in charstring - user realm | 
| passwd | in charstring - user password | 
| alg | in charstring - a string indicating a pair of algorithms used to produce the digest and a checksum | 
| nonceCount | in charstring - nonce count (8 hex digits) | 
| method | in charstring - method (from the request) | 
| qop | in charstring - qop-value: “”, “auth”, “auth-int” | 
| URI | in charstring - digest URI | 
| HEntity | in charstring - H(entity body) if qop=”auth-int” | 
| charstring | digest response | 
-
Support HTTP authentication (detailed description in RFC 2617) using uses one-way hash (md5) specified in RFC 1321. When a request arrives to server for an access-protected object, it responds an “401 Unauthorized” status code and a WWW-Authenticate header (encapsulate nonce and other necessary parameters). The client is expected to retry the request, passing an Authorization header with response field calculated with f_calculateDigestResponse().
Overview: http://en.wikipedia.org
Calculate digest H(A1) hash
| nonce | in charstring - a server-specified data string which may ` be uniquely generated each time a 401 response is made | 
| cnonce | in charstring - client nonce | 
| user | in charstring - user name | 
| realm | in charstring - user realm | 
| passwd | in charstring - user password | 
| alg | in charstring - a string indicating a pair of algorithms used to produce the digest and a checksum | 
| charstring | digest response | 
-
Overview: http://en.wikipedia.org
Computes network authentication code MAC-A from key K, random challenge RAND, sequence number SQN and authentication management field AMF.
| pl__OP | in octetstring - the operator variant algorithm configuration field | 
| pl__k | in octetstring - key | 
| pl__rand | in octetstring - random challenge | 
| pl__sqn | in octetstring - sequence number | 
| pl__amf | in octetstring - authentication management field | 
| octetstring | network authentication code MAC-A | 
-
-
Takes key K and random challenge RAND, and returns response RES.
| pl__OP | in octetstring - the operator variant algorithm configuration field | 
| pl__k | in octetstring - key | 
| pl__rand | in octetstring - random challenge | 
| octetstring | response RES | 
-
-
Takes key K and random challenge RAND, and returns confidentiality key CK.
| pl__OP | in octetstring - the operator variant algorithm configuration field | 
| pl__k | in octetstring - key | 
| pl__rand | in octetstring - random challenge | 
| octetstring | confidentiality key CK | 
-
-
Takes key K and random challenge RAND, and returns integrity key IK.
| pl__OP | in octetstring - the operator variant algorithm configuration field | 
| pl__k | in octetstring - key | 
| pl__rand | in octetstring - random challenge | 
| octetstring | integrity key IK | 
-
-
Takes key K and random challenge RAND, and returns AK, CK, RES
| pl__OP | in octetstring - the operator variant algorithm configuration field | 
| pl__k | in octetstring - key | 
| pl__rand | in octetstring - random challenge | 
TCCSecurity_Keys typed value Errors: -
-
Takes key K and random challenge RAND, and returns anonymity key AK.
| pl__OP | in octetstring - the operator variant algorithm configuration field | 
| pl__k | in octetstring - key | 
| pl__rand | in octetstring - random challenge | 
| octetstring | anonymity key AK | 
-
-
Computes resynch authentication code MAC-S from key K, random challenge RAND, sequence number SQN and authentication management field AMF.
| pl__OP | in octetstring - the operator variant algorithm configuration field | 
| pl__k | in octetstring - key | 
| pl__rand | in octetstring - random challenge | 
| pl__sqn | in octetstring - sequence number | 
| pl__amf | in octetstring - authentication management field | 
| octetstring | resynch authentication code MAC-S | 
-
-
Takes key K and random challenge RAND, and returns resynch anonymity key AK.
| pl__OP | in octetstring - the operator variant algorithm configuration field | 
| pl__k | in octetstring - key | 
| pl__rand | in octetstring - random challenge | 
| octetstring | resynch anonymity key AK | 
-
-
Takes key Ki and random challenge RAND, and returns Kc and SRES keys
| pl__Ki | in octetstring - the shared key | 
| pl__rand | in octetstring - random challenge | 
| pl__sres | out octetstring - authentication result param | 
| pl__Kc | out octetstring - encryption key | 
-
-
-
Computes authentication token AUTN from anonymity key AK, random challenge RAND, sequence number SQN and authentication management field AMF.
| pl__SQN | in octetstring - sequence number | 
| pl__AK | in octetstring - anonymity key | 
| pl__AMF | in octetstring - authentication management field | 
| pl__MAC | in octetstring - encryption key | 
| octetstring | Authentication token - AUTN | 
-
-
Calculate the HMAC MD5 value of a message with specified 64 bit key.
| msg | in octetstring - message to be hashed | 
| key | in OCT_64 - 64 bit key of the hash function | 
| octetstring | Hash value (16 octet - 128 bit) | 
-
Calculate the HMAC MD5 value of a message with specified key.
| pl_key | in octetstring - key of the hash function | 
| pl_input | in octetstring - message to be hashed | 
| pl_length | in integer - length of the output hash value (should be 16 in most of the cases) | 
| octetstring | Hash value | 
-
Calculate the HMAC SHA1 value of a message with specified key.
| pl_key | in octetstring - key of the hash function | 
| pl_input | in octetstring - message to be hashed | 
| pl_length | in integer - length of the output hash value (should be 16 in most of the cases) | 
| octetstring | Hash value | 
-
Purpose: Encrypt TTCN-3 message using the confidentiality algorithm 128-EEA3
| key | in OCT__16 - confidentiality key | 
| count | in OCT__4 - counter | 
| bearer | in INT__5 - bearer identity | 
| direction | in BIT__1 - direction of transmission | 
| msg | in BIT__1__65504 - input bit stream (message to be encrypted) | 
| BIT__1__65504 | output bit stream (encrypted message) | 
-
-
Purpose: Calculate 32 bit message authentication code (MAC) using integrity algorithm 128-EIA3 for TTCN-3 message
| key | in OCT__16 - integrity key key | 
| count | in OCT__4 - counter | 
| bearer | in INT__5 - bearer identity | 
| direction | in BIT__1 - direction of transmission | 
| msg | in BIT__1__65504 - input bit stream (the message) | 
| BIT__32 | message authentication code (MAC) | 
-
-