--- /dev/null
+/*
+ * keyDeriveAes.c
+ *
+ * Copyright(c) 1998 - 2009 Texas Instruments. All rights reserved.
+ * All rights reserved.
+ *
+ * Redistribution and use in source and binary forms, with or without
+ * modification, are permitted provided that the following conditions
+ * are met:
+ *
+ * * Redistributions of source code must retain the above copyright
+ * notice, this list of conditions and the following disclaimer.
+ * * Redistributions in binary form must reproduce the above copyright
+ * notice, this list of conditions and the following disclaimer in
+ * the documentation and/or other materials provided with the
+ * distribution.
+ * * Neither the name Texas Instruments nor the names of its
+ * contributors may be used to endorse or promote products derived
+ * from this software without specific prior written permission.
+ *
+ * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
+ * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
+ * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
+ * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
+ * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
+ * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
+ * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
+ * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
+ * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
+ * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
+ * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
+ */
+
+/** \file keyDeriveAes.c
+ * \brief AES encryption key derivation implementation.
+ *
+ * \see aesBroadcastKeyDerivation.h
+*/
+
+/****************************************************************************
+ * *
+ * MODULE: AES broadcast key derivation *
+ * PURPOSE: AES broadcast key derivation *
+ * *
+ ****************************************************************************/
+
+#define __FILE_ID__ FILE_ID_29
+#include "osApi.h"
+#include "report.h"
+#include "rsnApi.h"
+
+#include "keyDerive.h"
+#include "keyDeriveAes.h"
+
+#include "mainKeysSm.h"
+
+/**
+*
+* keyDeriveAes_config
+*
+* \b Description:
+*
+* AES broadcast key derivation configuration function:
+* - Initializes the derive & remove callback functions
+* \b ARGS:
+*
+* None
+*
+* \b RETURNS:
+*
+* TI_OK on success, TI_NOK otherwise.
+*/
+
+TI_STATUS keyDeriveAes_config(struct _keyDerive_t *pKeyDerive)
+{
+ pKeyDerive->derive = keyDeriveAes_derive;
+ pKeyDerive->remove = keyDeriveAes_remove;
+
+ return TI_OK;
+}
+
+
+/**
+*
+* keyDeriveAes_derive
+*
+* \b Description:
+*
+* AES key derivation function:
+* - Decodes the key material.
+* - Distribute the decoded key material to the driver.
+*
+* \b ARGS:
+*
+* I - p - Pointer to the encoded key material.
+*
+* \b RETURNS:
+*
+* TI_OK on success, TI_NOK otherwise.
+*/
+
+TI_STATUS keyDeriveAes_derive(struct _keyDerive_t *pKeyDerive, encodedKeyMaterial_t *pEncodedKey)
+{
+ TI_STATUS status;
+ TSecurityKeys key;
+ keyMaterialAes_t *keyMaterialAes = NULL;
+
+ /* Small verification */
+ if ((pEncodedKey==NULL) || (pKeyDerive == NULL))
+ {
+ return TI_NOK;
+ }
+
+ /* Note: Reduce 2 bytes from the size of keyMaterialAes_t in the following check,
+ because it is added as padding at the end due to the OS_PACKED removal. */
+ if ( pEncodedKey->keyLen < (sizeof(keyMaterialAes_t) - 2) )
+ {
+TRACE1(pKeyDerive->hReport, REPORT_SEVERITY_ERROR, "KEY_DERIVE_AES: ERROR: wrong key length %d !!!\n", pEncodedKey->keyLen);
+ return TI_NOK;
+ }
+
+ keyMaterialAes = (keyMaterialAes_t*)pEncodedKey->pData;
+
+
+ /* Fill security key structure */
+ os_memoryZero(pKeyDerive->hOs, &key, sizeof(TSecurityKeys));
+
+ key.keyType = KEY_AES;
+ key.keyIndex = (TI_UINT8)pEncodedKey->keyId;
+ key.encLen = DERIVE_AES_KEY_LEN;
+ os_memoryCopy(pKeyDerive->hOs, (void *)key.encKey, pEncodedKey->pData + MAC_ADDR_LEN+KEY_RSC_LEN,
+ DERIVE_AES_KEY_LEN);
+
+ /* Copy MAC address key */
+ MAC_COPY (key.macAddress, keyMaterialAes->macAddress);
+ /* Copy RSC */
+ os_memoryCopy(pKeyDerive->hOs, (void *)key.keyRsc, (void *)keyMaterialAes->keyRSC, KEY_RSC_LEN);
+
+ status = pKeyDerive->pMainKeys->setKey(pKeyDerive->pMainKeys, &key);
+ if (status == TI_OK)
+ {
+ os_memoryCopy(pKeyDerive->hOs, &pKeyDerive->key, pEncodedKey, sizeof(encodedKeyMaterial_t));
+ }
+
+ return status;
+}
+
+/**
+*
+* keyDeriveAes_remove
+*
+* \b Description:
+*
+* AES key remove function:
+* - Remove the key material from the driver.
+*
+* \b ARGS:
+*
+* None.
+*
+* \b RETURNS:
+*
+* TI_OK on success, TI_NOK otherwise.
+*/
+
+TI_STATUS keyDeriveAes_remove(struct _keyDerive_t *pKeyDerive, encodedKeyMaterial_t *pEncodedKey)
+{
+ TI_STATUS status;
+ TSecurityKeys key;
+
+ if ((pEncodedKey==NULL) || (pKeyDerive == NULL))
+ {
+ return TI_NOK;
+ }
+
+ os_memoryZero(pKeyDerive->hOs, &key, sizeof(TSecurityKeys));
+ key.keyType = KEY_AES;
+ key.keyIndex = (TI_UINT8)pEncodedKey->keyId;
+ key.encLen = DERIVE_AES_KEY_LEN;
+ MAC_COPY (key.macAddress, pEncodedKey->pData);
+
+ status = pKeyDerive->pMainKeys->removeKey(pKeyDerive->pMainKeys, &key);
+ if (status == TI_OK)
+ {
+ os_memoryZero(pKeyDerive->hOs, &pKeyDerive->key, sizeof(encodedKeyMaterial_t));
+ }
+
+ return status;
+}
+