| /* |
| * keyDeriveTkip.c |
| * |
| * Copyright(c) 1998 - 2009 Texas Instruments. All rights reserved. |
| * All rights reserved. |
| * |
| * Redistribution and use in source and binary forms, with or without |
| * modification, are permitted provided that the following conditions |
| * are met: |
| * |
| * * Redistributions of source code must retain the above copyright |
| * notice, this list of conditions and the following disclaimer. |
| * * Redistributions in binary form must reproduce the above copyright |
| * notice, this list of conditions and the following disclaimer in |
| * the documentation and/or other materials provided with the |
| * distribution. |
| * * Neither the name Texas Instruments nor the names of its |
| * contributors may be used to endorse or promote products derived |
| * from this software without specific prior written permission. |
| * |
| * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS |
| * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT |
| * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR |
| * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT |
| * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, |
| * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT |
| * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, |
| * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY |
| * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT |
| * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE |
| * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
| */ |
| |
| /** \file wepBroadcastKeyDerivation.c |
| * \brief WEP broadcast key derivation implementation. |
| * |
| * \see wepBroadcastKeyDerivation.h |
| */ |
| |
| /**************************************************************************** |
| * * |
| * MODULE: WEP broadcast key derivation * |
| * PURPOSE: WEP broadcast key derivation * |
| * * |
| ****************************************************************************/ |
| |
| #define __FILE_ID__ FILE_ID_31 |
| #include "osApi.h" |
| #include "report.h" |
| #include "rsnApi.h" |
| |
| #include "keyDerive.h" |
| #include "keyDeriveTkip.h" |
| |
| #include "mainKeysSm.h" |
| |
| /** |
| * |
| * keyDeriveTkip_config |
| * |
| * \b Description: |
| * |
| * TKIP key derivation init function: |
| * - Initializes the derive & remove callback functions |
| * - Resets the key material in the system control block |
| * |
| * \b ARGS: |
| * |
| * None |
| * |
| * \b RETURNS: |
| * |
| * TI_OK on success, TI_NOK otherwise. |
| */ |
| |
| TI_STATUS keyDeriveTkip_config(struct _keyDerive_t *pKeyDerive) |
| { |
| pKeyDerive->derive = keyDeriveTkip_derive; |
| pKeyDerive->remove = keyDeriveTkip_remove; |
| |
| return TI_OK; |
| } |
| |
| |
| /** |
| * |
| * keyDeriveTkip_derive |
| * |
| * \b Description: |
| * |
| * TKIP key derivation function: |
| * - Decodes the key material. |
| * - Distribute the decoded key material to the driver. |
| * |
| * \b ARGS: |
| * |
| * I - p - Pointer to the encoded key material. |
| * |
| * \b RETURNS: |
| * |
| * TI_OK on success, TI_NOK otherwise. |
| */ |
| |
| TI_STATUS keyDeriveTkip_derive(struct _keyDerive_t *pKeyDerive, encodedKeyMaterial_t *pEncodedKey) |
| { |
| TI_STATUS status; |
| TSecurityKeys key; |
| keyMaterialTkip_t *keyMaterialTkip; |
| |
| if (pEncodedKey==NULL) |
| { |
| return TI_NOK; |
| } |
| |
| key.keyType = KEY_TKIP; |
| key.keyIndex = (TI_UINT8)pEncodedKey->keyId; |
| key.encLen = KEY_DERIVE_TKIP_ENC_LEN; |
| |
| /* Note: Reduce 2 bytes from the size of keyMaterialTkip_t in the following check, |
| because it is added as padding at the end due to the OS_PACKED removal. */ |
| if ( pEncodedKey->keyLen < (sizeof(keyMaterialTkip_t) - 2) ) |
| { |
| TRACE1(pKeyDerive->hReport, REPORT_SEVERITY_ERROR, "KEY_DERIVE_TKIP: ERROR: wrong key length %d !!!\n", pEncodedKey->keyLen); |
| return TI_NOK; |
| } |
| |
| keyMaterialTkip = (keyMaterialTkip_t*)pEncodedKey->pData; |
| /* Copy encryption key */ |
| os_memoryCopy(pKeyDerive->hOs, (void *)key.encKey, (void *)keyMaterialTkip->encKey, KEY_DERIVE_TKIP_ENC_LEN); |
| if (pEncodedKey->keyId & 0x10000000) |
| { /* Copy MIC RX */ |
| os_memoryCopy(pKeyDerive->hOs, (void *)key.micTxKey, (void *)keyMaterialTkip->micRxKey, KEY_DERIVE_TKIP_MIC_LEN); |
| /* Copy MIC RX */ |
| os_memoryCopy(pKeyDerive->hOs, (void *)key.micRxKey, (void *)keyMaterialTkip->micTxKey, KEY_DERIVE_TKIP_MIC_LEN); |
| } |
| else |
| { /* Copy MIC RX */ |
| os_memoryCopy(pKeyDerive->hOs, (void *)key.micRxKey, (void *)keyMaterialTkip->micRxKey, KEY_DERIVE_TKIP_MIC_LEN); |
| /* Copy MIC RX */ |
| os_memoryCopy(pKeyDerive->hOs, (void *)key.micTxKey, (void *)keyMaterialTkip->micTxKey, KEY_DERIVE_TKIP_MIC_LEN); |
| } |
| |
| /* Copy MAC address key */ |
| MAC_COPY (key.macAddress, keyMaterialTkip->macAddress); |
| /* Copy RSC */ |
| os_memoryCopy(pKeyDerive->hOs, (void *)key.keyRsc, (void *)keyMaterialTkip->keyRSC, KEY_RSC_LEN); |
| |
| |
| status = pKeyDerive->pMainKeys->setKey(pKeyDerive->pMainKeys, &key); |
| if (status == TI_OK) |
| { |
| os_memoryCopy(pKeyDerive->hOs, &pKeyDerive->key, pEncodedKey, sizeof(encodedKeyMaterial_t)); |
| } |
| |
| return status; |
| } |
| |
| /** |
| * |
| * wepBroadcastKeyDerivationRemove |
| * |
| * \b Description: |
| * |
| * WEP broadcast key removal function: |
| * - Remove the key material from the driver. |
| * |
| * \b ARGS: |
| * |
| * None. |
| * |
| * \b RETURNS: |
| * |
| * TI_OK on success, TI_NOK otherwise. |
| */ |
| |
| TI_STATUS keyDeriveTkip_remove(struct _keyDerive_t *pKeyDerive, encodedKeyMaterial_t *pEncodedKey) |
| { |
| TI_STATUS status; |
| TSecurityKeys key; |
| |
| os_memoryZero(pKeyDerive->hOs, &key, sizeof(TSecurityKeys)); |
| key.keyType = KEY_TKIP; |
| key.keyIndex = (TI_UINT8)pEncodedKey->keyId; |
| key.encLen = KEY_DERIVE_TKIP_ENC_LEN; |
| MAC_COPY (key.macAddress, pEncodedKey->pData); |
| |
| status = pKeyDerive->pMainKeys->removeKey(pKeyDerive->pMainKeys, &key); |
| if (status == TI_OK) |
| { |
| os_memoryZero(pKeyDerive->hOs, &pKeyDerive->key, sizeof(encodedKeyMaterial_t)); |
| } |
| |
| return status; |
| } |
| |