blob: 0ff8d7bbf2a7879af4536dfe37d2708c6890f525 [file] [log] [blame]
Forest Bond5449c682009-04-25 10:30:44 -04001/*
2 * Copyright (c) 1996, 2003 VIA Networking Technologies, Inc.
3 * All rights reserved.
4 *
5 * This program is free software; you can redistribute it and/or modify
6 * it under the terms of the GNU General Public License as published by
7 * the Free Software Foundation; either version 2 of the License, or
8 * (at your option) any later version.
9 *
10 * This program is distributed in the hope that it will be useful,
11 * but WITHOUT ANY WARRANTY; without even the implied warranty of
12 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
13 * GNU General Public License for more details.
14 *
15 * You should have received a copy of the GNU General Public License along
16 * with this program; if not, write to the Free Software Foundation, Inc.,
17 * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
18 *
19 *
20 * File: key.c
21 *
22 * Purpose: Implement functions for 802.11i Key management
23 *
24 * Author: Jerry Chen
25 *
26 * Date: May 29, 2003
27 *
28 * Functions:
29 * KeyvInitTable - Init Key management table
30 * KeybGetKey - Get Key from table
31 * KeybSetKey - Set Key to table
32 * KeybRemoveKey - Remove Key from table
33 * KeybGetTransmitKey - Get Transmit Key from table
34 *
35 * Revision History:
36 *
37 */
38
Forest Bond5449c682009-04-25 10:30:44 -040039#include "tmacro.h"
Forest Bond5449c682009-04-25 10:30:44 -040040#include "key.h"
Forest Bond5449c682009-04-25 10:30:44 -040041#include "mac.h"
Forest Bond5449c682009-04-25 10:30:44 -040042
43/*--------------------- Static Definitions -------------------------*/
44
45/*--------------------- Static Classes ----------------------------*/
46
47/*--------------------- Static Variables --------------------------*/
48static int msglevel =MSG_LEVEL_INFO;
49//static int msglevel =MSG_LEVEL_DEBUG;
50/*--------------------- Static Functions --------------------------*/
51
52/*--------------------- Export Variables --------------------------*/
53
54/*--------------------- Static Definitions -------------------------*/
55
56/*--------------------- Static Classes ----------------------------*/
57
58/*--------------------- Static Variables --------------------------*/
59
60/*--------------------- Static Functions --------------------------*/
Charles Clément6b35b7b2010-05-07 12:30:19 -070061static void
Charles Clément412b2d02010-06-22 08:54:42 -070062s_vCheckKeyTableValid (PSKeyManagement pTable, unsigned long dwIoBase)
Forest Bond5449c682009-04-25 10:30:44 -040063{
64 int i;
65
66 for (i=0;i<MAX_KEY_TABLE;i++) {
Charles Clément1b120682010-08-01 17:15:48 +020067 if ((pTable->KeyTable[i].bInUse == true) &&
Charles Clément5a5a2a62010-08-01 17:15:49 +020068 (pTable->KeyTable[i].PairwiseKey.bKeyValid == false) &&
69 (pTable->KeyTable[i].GroupKey[0].bKeyValid == false) &&
70 (pTable->KeyTable[i].GroupKey[1].bKeyValid == false) &&
71 (pTable->KeyTable[i].GroupKey[2].bKeyValid == false) &&
72 (pTable->KeyTable[i].GroupKey[3].bKeyValid == false)
Forest Bond5449c682009-04-25 10:30:44 -040073 ) {
Jim Lieb612822f2009-08-12 14:54:03 -070074
Charles Clément5a5a2a62010-08-01 17:15:49 +020075 pTable->KeyTable[i].bInUse = false;
Forest Bond5449c682009-04-25 10:30:44 -040076 pTable->KeyTable[i].wKeyCtl = 0;
Charles Clément5a5a2a62010-08-01 17:15:49 +020077 pTable->KeyTable[i].bSoftWEP = false;
Forest Bond5449c682009-04-25 10:30:44 -040078 MACvDisableKeyEntry(dwIoBase, i);
79 }
80 }
81}
82
83
84/*--------------------- Export Functions --------------------------*/
85
86
87/*
88 * Description: Init Key management table
89 *
90 * Parameters:
91 * In:
92 * pTable - Pointer to Key table
93 * Out:
94 * none
95 *
96 * Return Value: none
97 *
98 */
Charles Clément412b2d02010-06-22 08:54:42 -070099void KeyvInitTable (PSKeyManagement pTable, unsigned long dwIoBase)
Forest Bond5449c682009-04-25 10:30:44 -0400100{
101 int i;
102 int jj;
103
104 for (i=0;i<MAX_KEY_TABLE;i++) {
Charles Clément5a5a2a62010-08-01 17:15:49 +0200105 pTable->KeyTable[i].bInUse = false;
106 pTable->KeyTable[i].PairwiseKey.bKeyValid = false;
Charles Clément830a6192010-05-07 12:30:20 -0700107 pTable->KeyTable[i].PairwiseKey.pvKeyTable = (void *)&pTable->KeyTable[i];
Forest Bond5449c682009-04-25 10:30:44 -0400108 for (jj=0; jj < MAX_GROUP_KEY; jj++) {
Charles Clément5a5a2a62010-08-01 17:15:49 +0200109 pTable->KeyTable[i].GroupKey[jj].bKeyValid = false;
Charles Clément830a6192010-05-07 12:30:20 -0700110 pTable->KeyTable[i].GroupKey[jj].pvKeyTable = (void *)&pTable->KeyTable[i];
Forest Bond5449c682009-04-25 10:30:44 -0400111 }
112 pTable->KeyTable[i].wKeyCtl = 0;
113 pTable->KeyTable[i].dwGTKeyIndex = 0;
Charles Clément5a5a2a62010-08-01 17:15:49 +0200114 pTable->KeyTable[i].bSoftWEP = false;
Forest Bond5449c682009-04-25 10:30:44 -0400115 MACvDisableKeyEntry(dwIoBase, i);
116 }
117}
118
119
120/*
121 * Description: Get Key from table
122 *
123 * Parameters:
124 * In:
125 * pTable - Pointer to Key table
126 * pbyBSSID - BSSID of Key
127 * dwKeyIndex - Key Index (0xFFFFFFFF means pairwise key)
128 * Out:
129 * pKey - Key return
130 *
Charles Clément5a5a2a62010-08-01 17:15:49 +0200131 * Return Value: true if found otherwise false
Forest Bond5449c682009-04-25 10:30:44 -0400132 *
133 */
Charles Clément7b6a0012010-08-01 17:15:50 +0200134bool KeybGetKey (
Charles Clément3a215e02010-05-12 20:54:39 -0700135 PSKeyManagement pTable,
Charles Clément2989e962010-06-05 15:13:47 -0700136 unsigned char *pbyBSSID,
Charles Clément0f4c60d2010-06-24 11:02:25 -0700137 unsigned long dwKeyIndex,
Charles Clément3cdec552010-05-12 20:54:40 -0700138 PSKeyItem *pKey
Forest Bond5449c682009-04-25 10:30:44 -0400139 )
140{
141 int i;
142
Jim Lieb7e809a92009-07-30 10:27:21 -0700143 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO"KeybGetKey() \n");
Forest Bond5449c682009-04-25 10:30:44 -0400144
145 *pKey = NULL;
146 for (i=0;i<MAX_KEY_TABLE;i++) {
Charles Clément1b120682010-08-01 17:15:48 +0200147 if ((pTable->KeyTable[i].bInUse == true) &&
Charles Clément2ef98c62010-05-19 11:30:54 -0700148 !compare_ether_addr(pTable->KeyTable[i].abyBSSID, pbyBSSID)) {
Forest Bond5449c682009-04-25 10:30:44 -0400149 if (dwKeyIndex == 0xFFFFFFFF) {
Charles Clément1b120682010-08-01 17:15:48 +0200150 if (pTable->KeyTable[i].PairwiseKey.bKeyValid == true) {
Forest Bond5449c682009-04-25 10:30:44 -0400151 *pKey = &(pTable->KeyTable[i].PairwiseKey);
Charles Clément1b120682010-08-01 17:15:48 +0200152 return (true);
Forest Bond5449c682009-04-25 10:30:44 -0400153 }
154 else {
Charles Clément5a5a2a62010-08-01 17:15:49 +0200155 return (false);
Forest Bond5449c682009-04-25 10:30:44 -0400156 }
157 } else if (dwKeyIndex < MAX_GROUP_KEY) {
Charles Clément1b120682010-08-01 17:15:48 +0200158 if (pTable->KeyTable[i].GroupKey[dwKeyIndex].bKeyValid == true) {
Forest Bond5449c682009-04-25 10:30:44 -0400159 *pKey = &(pTable->KeyTable[i].GroupKey[dwKeyIndex]);
Charles Clément1b120682010-08-01 17:15:48 +0200160 return (true);
Forest Bond5449c682009-04-25 10:30:44 -0400161 }
162 else {
Charles Clément5a5a2a62010-08-01 17:15:49 +0200163 return (false);
Forest Bond5449c682009-04-25 10:30:44 -0400164 }
165 }
166 else {
Charles Clément5a5a2a62010-08-01 17:15:49 +0200167 return (false);
Forest Bond5449c682009-04-25 10:30:44 -0400168 }
169 }
170 }
Charles Clément5a5a2a62010-08-01 17:15:49 +0200171 return (false);
Forest Bond5449c682009-04-25 10:30:44 -0400172}
173
174
175/*
176 * Description: Set Key to table
177 *
178 * Parameters:
179 * In:
180 * pTable - Pointer to Key table
181 * pbyBSSID - BSSID of Key
182 * dwKeyIndex - Key index (reference to NDIS DDK)
183 * uKeyLength - Key length
184 * KeyRSC - Key RSC
185 * pbyKey - Pointer to key
186 * Out:
187 * none
188 *
Charles Clément5a5a2a62010-08-01 17:15:49 +0200189 * Return Value: true if success otherwise false
Forest Bond5449c682009-04-25 10:30:44 -0400190 *
191 */
Charles Clément7b6a0012010-08-01 17:15:50 +0200192bool KeybSetKey (
Forest Bond5449c682009-04-25 10:30:44 -0400193 PSKeyManagement pTable,
Charles Clément2989e962010-06-05 15:13:47 -0700194 unsigned char *pbyBSSID,
Charles Clément0f4c60d2010-06-24 11:02:25 -0700195 unsigned long dwKeyIndex,
Charles Clémente3fd16d2010-06-02 09:52:02 -0700196 unsigned long uKeyLength,
Forest Bond5449c682009-04-25 10:30:44 -0400197 PQWORD pKeyRSC,
Charles Clément2989e962010-06-05 15:13:47 -0700198 unsigned char *pbyKey,
Charles Clément3fc9b582010-06-24 11:02:27 -0700199 unsigned char byKeyDecMode,
Charles Clément412b2d02010-06-22 08:54:42 -0700200 unsigned long dwIoBase,
Charles Clément3fc9b582010-06-24 11:02:27 -0700201 unsigned char byLocalID
Forest Bond5449c682009-04-25 10:30:44 -0400202 )
203{
204 int i,j;
Charles Clémentb6e95cd2010-06-02 09:52:01 -0700205 unsigned int ii;
Forest Bond5449c682009-04-25 10:30:44 -0400206 PSKeyItem pKey;
Charles Clémentb6e95cd2010-06-02 09:52:01 -0700207 unsigned int uKeyIdx;
Forest Bond5449c682009-04-25 10:30:44 -0400208
Jim Lieb7e809a92009-07-30 10:27:21 -0700209 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO"Enter KeybSetKey: %lX\n", dwKeyIndex);
Forest Bond5449c682009-04-25 10:30:44 -0400210
211 j = (MAX_KEY_TABLE-1);
212 for (i=0;i<(MAX_KEY_TABLE-1);i++) {
Charles Clément5a5a2a62010-08-01 17:15:49 +0200213 if ((pTable->KeyTable[i].bInUse == false) &&
Forest Bond5449c682009-04-25 10:30:44 -0400214 (j == (MAX_KEY_TABLE-1))) {
215 // found empty table
216 j = i;
217 }
Charles Clément1b120682010-08-01 17:15:48 +0200218 if ((pTable->KeyTable[i].bInUse == true) &&
Charles Clément2ef98c62010-05-19 11:30:54 -0700219 !compare_ether_addr(pTable->KeyTable[i].abyBSSID, pbyBSSID)) {
Forest Bond5449c682009-04-25 10:30:44 -0400220 // found table already exist
221 if ((dwKeyIndex & PAIRWISE_KEY) != 0) {
222 // Pairwise key
223 pKey = &(pTable->KeyTable[i].PairwiseKey);
224 pTable->KeyTable[i].wKeyCtl &= 0xFFF0; // clear pairwise key control filed
225 pTable->KeyTable[i].wKeyCtl |= byKeyDecMode;
226 uKeyIdx = 4; // use HW key entry 4 for pairwise key
227 } else {
228 // Group key
229 if ((dwKeyIndex & 0x000000FF) >= MAX_GROUP_KEY)
Charles Clément5a5a2a62010-08-01 17:15:49 +0200230 return (false);
Forest Bond5449c682009-04-25 10:30:44 -0400231 pKey = &(pTable->KeyTable[i].GroupKey[dwKeyIndex & 0x000000FF]);
232 if ((dwKeyIndex & TRANSMIT_KEY) != 0) {
233 // Group transmit key
234 pTable->KeyTable[i].dwGTKeyIndex = dwKeyIndex;
Jim Lieb7e809a92009-07-30 10:27:21 -0700235 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO"Group transmit key(R)[%lX]: %d\n", pTable->KeyTable[i].dwGTKeyIndex, i);
Forest Bond5449c682009-04-25 10:30:44 -0400236 }
237 pTable->KeyTable[i].wKeyCtl &= 0xFF0F; // clear group key control filed
238 pTable->KeyTable[i].wKeyCtl |= (byKeyDecMode << 4);
239 pTable->KeyTable[i].wKeyCtl |= 0x0040; // use group key for group address
240 uKeyIdx = (dwKeyIndex & 0x000000FF);
241 }
242 pTable->KeyTable[i].wKeyCtl |= 0x8000; // enable on-fly
243
Charles Clément1b120682010-08-01 17:15:48 +0200244 pKey->bKeyValid = true;
Forest Bond5449c682009-04-25 10:30:44 -0400245 pKey->uKeyLength = uKeyLength;
246 pKey->dwKeyIndex = dwKeyIndex;
247 pKey->byCipherSuite = byKeyDecMode;
Jim Lieb51b6d9c2009-08-12 14:54:10 -0700248 memcpy(pKey->abyKey, pbyKey, uKeyLength);
Forest Bond5449c682009-04-25 10:30:44 -0400249 if (byKeyDecMode == KEY_CTL_WEP) {
250 if (uKeyLength == WLAN_WEP40_KEYLEN)
251 pKey->abyKey[15] &= 0x7F;
252 if (uKeyLength == WLAN_WEP104_KEYLEN)
253 pKey->abyKey[15] |= 0x80;
254 }
Charles Clément9d828c42010-06-05 15:13:49 -0700255 MACvSetKeyEntry(dwIoBase, pTable->KeyTable[i].wKeyCtl, i, uKeyIdx, pbyBSSID, (unsigned long *)pKey->abyKey, byLocalID);
Forest Bond5449c682009-04-25 10:30:44 -0400256
257 if ((dwKeyIndex & USE_KEYRSC) == 0) {
258 // RSC set by NIC
Jim Lieb51b6d9c2009-08-12 14:54:10 -0700259 memset(&(pKey->KeyRSC), 0, sizeof(QWORD));
Forest Bond5449c682009-04-25 10:30:44 -0400260 }
261 else {
Jim Lieb51b6d9c2009-08-12 14:54:10 -0700262 memcpy(&(pKey->KeyRSC), pKeyRSC, sizeof(QWORD));
Forest Bond5449c682009-04-25 10:30:44 -0400263 }
264 pKey->dwTSC47_16 = 0;
265 pKey->wTSC15_0 = 0;
266
Jim Lieb7e809a92009-07-30 10:27:21 -0700267 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO"KeybSetKey(R): \n");
268 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO"pKey->bKeyValid: %d\n ", pKey->bKeyValid);
269 //DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO"pKey->uKeyLength: %d\n ", pKey->uKeyLength);
270 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO"pKey->abyKey: ");
Forest Bond5449c682009-04-25 10:30:44 -0400271 for (ii = 0; ii < pKey->uKeyLength; ii++) {
Jim Lieb7e809a92009-07-30 10:27:21 -0700272 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "%02x ", pKey->abyKey[ii]);
Forest Bond5449c682009-04-25 10:30:44 -0400273 }
Jim Lieb7e809a92009-07-30 10:27:21 -0700274 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO"\n");
Forest Bond5449c682009-04-25 10:30:44 -0400275
Jim Lieb7e809a92009-07-30 10:27:21 -0700276 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO"pKey->dwTSC47_16: %lx\n ", pKey->dwTSC47_16);
277 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO"pKey->wTSC15_0: %x\n ", pKey->wTSC15_0);
278 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO"pKey->dwKeyIndex: %lx\n ", pKey->dwKeyIndex);
Forest Bond5449c682009-04-25 10:30:44 -0400279
Charles Clément1b120682010-08-01 17:15:48 +0200280 return (true);
Forest Bond5449c682009-04-25 10:30:44 -0400281 }
282 }
283 if (j < (MAX_KEY_TABLE-1)) {
Charles Clément078b0782010-05-14 19:37:32 -0700284 memcpy(pTable->KeyTable[j].abyBSSID,pbyBSSID,ETH_ALEN);
Charles Clément1b120682010-08-01 17:15:48 +0200285 pTable->KeyTable[j].bInUse = true;
Forest Bond5449c682009-04-25 10:30:44 -0400286 if ((dwKeyIndex & PAIRWISE_KEY) != 0) {
287 // Pairwise key
288 pKey = &(pTable->KeyTable[j].PairwiseKey);
289 pTable->KeyTable[j].wKeyCtl &= 0xFFF0; // clear pairwise key control filed
290 pTable->KeyTable[j].wKeyCtl |= byKeyDecMode;
291 uKeyIdx = 4; // use HW key entry 4 for pairwise key
292 } else {
293 // Group key
294 if ((dwKeyIndex & 0x000000FF) >= MAX_GROUP_KEY)
Charles Clément5a5a2a62010-08-01 17:15:49 +0200295 return (false);
Forest Bond5449c682009-04-25 10:30:44 -0400296 pKey = &(pTable->KeyTable[j].GroupKey[dwKeyIndex & 0x000000FF]);
297 if ((dwKeyIndex & TRANSMIT_KEY) != 0) {
298 // Group transmit key
299 pTable->KeyTable[j].dwGTKeyIndex = dwKeyIndex;
Jim Lieb7e809a92009-07-30 10:27:21 -0700300 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO"Group transmit key(N)[%lX]: %d\n", pTable->KeyTable[j].dwGTKeyIndex, j);
Forest Bond5449c682009-04-25 10:30:44 -0400301 }
302 pTable->KeyTable[j].wKeyCtl &= 0xFF0F; // clear group key control filed
303 pTable->KeyTable[j].wKeyCtl |= (byKeyDecMode << 4);
304 pTable->KeyTable[j].wKeyCtl |= 0x0040; // use group key for group address
305 uKeyIdx = (dwKeyIndex & 0x000000FF);
306 }
307 pTable->KeyTable[j].wKeyCtl |= 0x8000; // enable on-fly
308
Charles Clément1b120682010-08-01 17:15:48 +0200309 pKey->bKeyValid = true;
Forest Bond5449c682009-04-25 10:30:44 -0400310 pKey->uKeyLength = uKeyLength;
311 pKey->dwKeyIndex = dwKeyIndex;
312 pKey->byCipherSuite = byKeyDecMode;
Jim Lieb51b6d9c2009-08-12 14:54:10 -0700313 memcpy(pKey->abyKey, pbyKey, uKeyLength);
Forest Bond5449c682009-04-25 10:30:44 -0400314 if (byKeyDecMode == KEY_CTL_WEP) {
315 if (uKeyLength == WLAN_WEP40_KEYLEN)
316 pKey->abyKey[15] &= 0x7F;
317 if (uKeyLength == WLAN_WEP104_KEYLEN)
318 pKey->abyKey[15] |= 0x80;
319 }
Charles Clément9d828c42010-06-05 15:13:49 -0700320 MACvSetKeyEntry(dwIoBase, pTable->KeyTable[j].wKeyCtl, j, uKeyIdx, pbyBSSID, (unsigned long *)pKey->abyKey, byLocalID);
Forest Bond5449c682009-04-25 10:30:44 -0400321
322 if ((dwKeyIndex & USE_KEYRSC) == 0) {
323 // RSC set by NIC
Jim Lieb51b6d9c2009-08-12 14:54:10 -0700324 memset(&(pKey->KeyRSC), 0, sizeof(QWORD));
Forest Bond5449c682009-04-25 10:30:44 -0400325 }
326 else {
Jim Lieb51b6d9c2009-08-12 14:54:10 -0700327 memcpy(&(pKey->KeyRSC), pKeyRSC, sizeof(QWORD));
Forest Bond5449c682009-04-25 10:30:44 -0400328 }
329 pKey->dwTSC47_16 = 0;
330 pKey->wTSC15_0 = 0;
331
Jim Lieb7e809a92009-07-30 10:27:21 -0700332 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO"KeybSetKey(N): \n");
333 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO"pKey->bKeyValid: %d\n ", pKey->bKeyValid);
334 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO"pKey->uKeyLength: %d\n ", (int)pKey->uKeyLength);
335 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO"pKey->abyKey: ");
Forest Bond5449c682009-04-25 10:30:44 -0400336 for (ii = 0; ii < pKey->uKeyLength; ii++) {
Jim Lieb7e809a92009-07-30 10:27:21 -0700337 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "%02x ", pKey->abyKey[ii]);
Forest Bond5449c682009-04-25 10:30:44 -0400338 }
Jim Lieb7e809a92009-07-30 10:27:21 -0700339 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO"\n");
Forest Bond5449c682009-04-25 10:30:44 -0400340
Jim Lieb7e809a92009-07-30 10:27:21 -0700341 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO"pKey->dwTSC47_16: %lx\n ", pKey->dwTSC47_16);
342 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO"pKey->wTSC15_0: %x\n ", pKey->wTSC15_0);
343 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO"pKey->dwKeyIndex: %lx\n ", pKey->dwKeyIndex);
Forest Bond5449c682009-04-25 10:30:44 -0400344
Charles Clément1b120682010-08-01 17:15:48 +0200345 return (true);
Forest Bond5449c682009-04-25 10:30:44 -0400346 }
Charles Clément5a5a2a62010-08-01 17:15:49 +0200347 return (false);
Forest Bond5449c682009-04-25 10:30:44 -0400348}
349
350
351/*
352 * Description: Remove Key from table
353 *
354 * Parameters:
355 * In:
356 * pTable - Pointer to Key table
357 * pbyBSSID - BSSID of Key
358 * dwKeyIndex - Key Index (reference to NDIS DDK)
359 * Out:
360 * none
361 *
Charles Clément5a5a2a62010-08-01 17:15:49 +0200362 * Return Value: true if success otherwise false
Forest Bond5449c682009-04-25 10:30:44 -0400363 *
364 */
Charles Clément7b6a0012010-08-01 17:15:50 +0200365bool KeybRemoveKey (
Forest Bond5449c682009-04-25 10:30:44 -0400366 PSKeyManagement pTable,
Charles Clément2989e962010-06-05 15:13:47 -0700367 unsigned char *pbyBSSID,
Charles Clément0f4c60d2010-06-24 11:02:25 -0700368 unsigned long dwKeyIndex,
Charles Clément412b2d02010-06-22 08:54:42 -0700369 unsigned long dwIoBase
Forest Bond5449c682009-04-25 10:30:44 -0400370 )
371{
372 int i;
373
Charles Clémentca9e12a2010-05-19 11:30:52 -0700374 if (is_broadcast_ether_addr(pbyBSSID)) {
Forest Bond5449c682009-04-25 10:30:44 -0400375 // dealte all key
376 if ((dwKeyIndex & PAIRWISE_KEY) != 0) {
377 for (i=0;i<MAX_KEY_TABLE;i++) {
Charles Clément5a5a2a62010-08-01 17:15:49 +0200378 pTable->KeyTable[i].PairwiseKey.bKeyValid = false;
Forest Bond5449c682009-04-25 10:30:44 -0400379 }
380 s_vCheckKeyTableValid(pTable, dwIoBase);
Charles Clément1b120682010-08-01 17:15:48 +0200381 return true;
Forest Bond5449c682009-04-25 10:30:44 -0400382 }
383 else if ((dwKeyIndex & 0x000000FF) < MAX_GROUP_KEY) {
384 for (i=0;i<MAX_KEY_TABLE;i++) {
Charles Clément5a5a2a62010-08-01 17:15:49 +0200385 pTable->KeyTable[i].GroupKey[dwKeyIndex & 0x000000FF].bKeyValid = false;
Forest Bond5449c682009-04-25 10:30:44 -0400386 if ((dwKeyIndex & 0x7FFFFFFF) == (pTable->KeyTable[i].dwGTKeyIndex & 0x7FFFFFFF)) {
387 // remove Group transmit key
388 pTable->KeyTable[i].dwGTKeyIndex = 0;
389 }
390 }
391 s_vCheckKeyTableValid(pTable, dwIoBase);
Charles Clément1b120682010-08-01 17:15:48 +0200392 return true;
Forest Bond5449c682009-04-25 10:30:44 -0400393 }
394 else {
Charles Clément5a5a2a62010-08-01 17:15:49 +0200395 return false;
Forest Bond5449c682009-04-25 10:30:44 -0400396 }
397 }
398
399 for (i=0;i<MAX_KEY_TABLE;i++) {
Charles Clément1b120682010-08-01 17:15:48 +0200400 if ((pTable->KeyTable[i].bInUse == true) &&
Charles Clément2ef98c62010-05-19 11:30:54 -0700401 !compare_ether_addr(pTable->KeyTable[i].abyBSSID, pbyBSSID)) {
Forest Bond5449c682009-04-25 10:30:44 -0400402 if ((dwKeyIndex & PAIRWISE_KEY) != 0) {
Charles Clément5a5a2a62010-08-01 17:15:49 +0200403 pTable->KeyTable[i].PairwiseKey.bKeyValid = false;
Forest Bond5449c682009-04-25 10:30:44 -0400404 s_vCheckKeyTableValid(pTable, dwIoBase);
Charles Clément1b120682010-08-01 17:15:48 +0200405 return (true);
Forest Bond5449c682009-04-25 10:30:44 -0400406 }
407 else if ((dwKeyIndex & 0x000000FF) < MAX_GROUP_KEY) {
Charles Clément5a5a2a62010-08-01 17:15:49 +0200408 pTable->KeyTable[i].GroupKey[dwKeyIndex & 0x000000FF].bKeyValid = false;
Forest Bond5449c682009-04-25 10:30:44 -0400409 if ((dwKeyIndex & 0x7FFFFFFF) == (pTable->KeyTable[i].dwGTKeyIndex & 0x7FFFFFFF)) {
410 // remove Group transmit key
411 pTable->KeyTable[i].dwGTKeyIndex = 0;
412 }
413 s_vCheckKeyTableValid(pTable, dwIoBase);
Charles Clément1b120682010-08-01 17:15:48 +0200414 return (true);
Forest Bond5449c682009-04-25 10:30:44 -0400415 }
416 else {
Charles Clément5a5a2a62010-08-01 17:15:49 +0200417 return (false);
Forest Bond5449c682009-04-25 10:30:44 -0400418 }
419 }
420 }
Charles Clément5a5a2a62010-08-01 17:15:49 +0200421 return (false);
Forest Bond5449c682009-04-25 10:30:44 -0400422}
423
424
425/*
426 * Description: Remove Key from table
427 *
428 * Parameters:
429 * In:
430 * pTable - Pointer to Key table
431 * pbyBSSID - BSSID of Key
432 * Out:
433 * none
434 *
Charles Clément5a5a2a62010-08-01 17:15:49 +0200435 * Return Value: true if success otherwise false
Forest Bond5449c682009-04-25 10:30:44 -0400436 *
437 */
Charles Clément7b6a0012010-08-01 17:15:50 +0200438bool KeybRemoveAllKey (
Forest Bond5449c682009-04-25 10:30:44 -0400439 PSKeyManagement pTable,
Charles Clément2989e962010-06-05 15:13:47 -0700440 unsigned char *pbyBSSID,
Charles Clément412b2d02010-06-22 08:54:42 -0700441 unsigned long dwIoBase
Forest Bond5449c682009-04-25 10:30:44 -0400442 )
443{
444 int i,u;
445
446 for (i=0;i<MAX_KEY_TABLE;i++) {
Charles Clément1b120682010-08-01 17:15:48 +0200447 if ((pTable->KeyTable[i].bInUse == true) &&
Charles Clément2ef98c62010-05-19 11:30:54 -0700448 !compare_ether_addr(pTable->KeyTable[i].abyBSSID, pbyBSSID)) {
Charles Clément5a5a2a62010-08-01 17:15:49 +0200449 pTable->KeyTable[i].PairwiseKey.bKeyValid = false;
Forest Bond5449c682009-04-25 10:30:44 -0400450 for(u=0;u<MAX_GROUP_KEY;u++) {
Charles Clément5a5a2a62010-08-01 17:15:49 +0200451 pTable->KeyTable[i].GroupKey[u].bKeyValid = false;
Forest Bond5449c682009-04-25 10:30:44 -0400452 }
453 pTable->KeyTable[i].dwGTKeyIndex = 0;
454 s_vCheckKeyTableValid(pTable, dwIoBase);
Charles Clément1b120682010-08-01 17:15:48 +0200455 return (true);
Forest Bond5449c682009-04-25 10:30:44 -0400456 }
457 }
Charles Clément5a5a2a62010-08-01 17:15:49 +0200458 return (false);
Forest Bond5449c682009-04-25 10:30:44 -0400459}
460
461/*
462 * Description: Remove WEP Key from table
463 *
464 * Parameters:
465 * In:
466 * pTable - Pointer to Key table
467 * Out:
468 * none
469 *
Charles Clément5a5a2a62010-08-01 17:15:49 +0200470 * Return Value: true if success otherwise false
Forest Bond5449c682009-04-25 10:30:44 -0400471 *
472 */
Charles Clément6b35b7b2010-05-07 12:30:19 -0700473void KeyvRemoveWEPKey (
Forest Bond5449c682009-04-25 10:30:44 -0400474 PSKeyManagement pTable,
Charles Clément0f4c60d2010-06-24 11:02:25 -0700475 unsigned long dwKeyIndex,
Charles Clément412b2d02010-06-22 08:54:42 -0700476 unsigned long dwIoBase
Forest Bond5449c682009-04-25 10:30:44 -0400477 )
478{
479
480 if ((dwKeyIndex & 0x000000FF) < MAX_GROUP_KEY) {
Charles Clément1b120682010-08-01 17:15:48 +0200481 if (pTable->KeyTable[MAX_KEY_TABLE-1].bInUse == true) {
Forest Bond5449c682009-04-25 10:30:44 -0400482 if (pTable->KeyTable[MAX_KEY_TABLE-1].GroupKey[dwKeyIndex & 0x000000FF].byCipherSuite == KEY_CTL_WEP) {
Charles Clément5a5a2a62010-08-01 17:15:49 +0200483 pTable->KeyTable[MAX_KEY_TABLE-1].GroupKey[dwKeyIndex & 0x000000FF].bKeyValid = false;
Forest Bond5449c682009-04-25 10:30:44 -0400484 if ((dwKeyIndex & 0x7FFFFFFF) == (pTable->KeyTable[MAX_KEY_TABLE-1].dwGTKeyIndex & 0x7FFFFFFF)) {
485 // remove Group transmit key
486 pTable->KeyTable[MAX_KEY_TABLE-1].dwGTKeyIndex = 0;
487 }
488 }
489 }
490 s_vCheckKeyTableValid(pTable, dwIoBase);
491 }
492 return;
493}
494
Charles Clément6b35b7b2010-05-07 12:30:19 -0700495void KeyvRemoveAllWEPKey (
Forest Bond5449c682009-04-25 10:30:44 -0400496 PSKeyManagement pTable,
Charles Clément412b2d02010-06-22 08:54:42 -0700497 unsigned long dwIoBase
Forest Bond5449c682009-04-25 10:30:44 -0400498 )
499{
500 int i;
501
502 for(i=0;i<MAX_GROUP_KEY;i++) {
503 KeyvRemoveWEPKey(pTable, i, dwIoBase);
504 }
505}
506
507/*
508 * Description: Get Transmit Key from table
509 *
510 * Parameters:
511 * In:
512 * pTable - Pointer to Key table
513 * pbyBSSID - BSSID of Key
514 * Out:
515 * pKey - Key return
516 *
Charles Clément5a5a2a62010-08-01 17:15:49 +0200517 * Return Value: true if found otherwise false
Forest Bond5449c682009-04-25 10:30:44 -0400518 *
519 */
Charles Clément7b6a0012010-08-01 17:15:50 +0200520bool KeybGetTransmitKey (
Charles Clément3a215e02010-05-12 20:54:39 -0700521 PSKeyManagement pTable,
Charles Clément2989e962010-06-05 15:13:47 -0700522 unsigned char *pbyBSSID,
Charles Clément0f4c60d2010-06-24 11:02:25 -0700523 unsigned long dwKeyType,
Charles Clément3cdec552010-05-12 20:54:40 -0700524 PSKeyItem *pKey
Forest Bond5449c682009-04-25 10:30:44 -0400525 )
526{
527 int i, ii;
528
529 *pKey = NULL;
530 for (i=0;i<MAX_KEY_TABLE;i++) {
Charles Clément1b120682010-08-01 17:15:48 +0200531 if ((pTable->KeyTable[i].bInUse == true) &&
Charles Clément2ef98c62010-05-19 11:30:54 -0700532 !compare_ether_addr(pTable->KeyTable[i].abyBSSID, pbyBSSID)) {
Forest Bond5449c682009-04-25 10:30:44 -0400533
534 if (dwKeyType == PAIRWISE_KEY) {
535
Charles Clément1b120682010-08-01 17:15:48 +0200536 if (pTable->KeyTable[i].PairwiseKey.bKeyValid == true) {
Forest Bond5449c682009-04-25 10:30:44 -0400537 *pKey = &(pTable->KeyTable[i].PairwiseKey);
538
Jim Lieb7e809a92009-07-30 10:27:21 -0700539 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO"KeybGetTransmitKey:");
540 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO"PAIRWISE_KEY: KeyTable.abyBSSID: ");
Forest Bond5449c682009-04-25 10:30:44 -0400541 for (ii = 0; ii < 6; ii++) {
Jim Lieb7e809a92009-07-30 10:27:21 -0700542 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO"%x ", pTable->KeyTable[i].abyBSSID[ii]);
Forest Bond5449c682009-04-25 10:30:44 -0400543 }
Jim Lieb7e809a92009-07-30 10:27:21 -0700544 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO"\n");
Forest Bond5449c682009-04-25 10:30:44 -0400545
546
Charles Clément1b120682010-08-01 17:15:48 +0200547 return (true);
Forest Bond5449c682009-04-25 10:30:44 -0400548 }
549 else {
Charles Clément5a5a2a62010-08-01 17:15:49 +0200550 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO"PairwiseKey.bKeyValid == false\n");
551 return (false);
Forest Bond5449c682009-04-25 10:30:44 -0400552 }
553 } // End of Type == PAIRWISE
554 else {
555 if (pTable->KeyTable[i].dwGTKeyIndex == 0) {
Jim Lieb7e809a92009-07-30 10:27:21 -0700556 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO"ERROR: dwGTKeyIndex == 0 !!!\n");
Charles Clément5a5a2a62010-08-01 17:15:49 +0200557 return false;
Forest Bond5449c682009-04-25 10:30:44 -0400558 }
Charles Clément1b120682010-08-01 17:15:48 +0200559 if (pTable->KeyTable[i].GroupKey[(pTable->KeyTable[i].dwGTKeyIndex&0x000000FF)].bKeyValid == true) {
Forest Bond5449c682009-04-25 10:30:44 -0400560 *pKey = &(pTable->KeyTable[i].GroupKey[(pTable->KeyTable[i].dwGTKeyIndex&0x000000FF)]);
561
Jim Lieb7e809a92009-07-30 10:27:21 -0700562 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO"KeybGetTransmitKey:");
563 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO"GROUP_KEY: KeyTable.abyBSSID\n");
Forest Bond5449c682009-04-25 10:30:44 -0400564 for (ii = 0; ii < 6; ii++) {
Jim Lieb7e809a92009-07-30 10:27:21 -0700565 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO"%x ", pTable->KeyTable[i].abyBSSID[ii]);
Forest Bond5449c682009-04-25 10:30:44 -0400566 }
Jim Lieb7e809a92009-07-30 10:27:21 -0700567 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO"\n");
568 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO"dwGTKeyIndex: %lX\n", pTable->KeyTable[i].dwGTKeyIndex);
Forest Bond5449c682009-04-25 10:30:44 -0400569
Charles Clément1b120682010-08-01 17:15:48 +0200570 return (true);
Forest Bond5449c682009-04-25 10:30:44 -0400571 }
572 else {
Charles Clément5a5a2a62010-08-01 17:15:49 +0200573 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO"GroupKey.bKeyValid == false\n");
574 return (false);
Forest Bond5449c682009-04-25 10:30:44 -0400575 }
576 } // End of Type = GROUP
577 } // BSSID match
578 }
Jim Lieb7e809a92009-07-30 10:27:21 -0700579 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO"ERROR: NO Match BSSID !!! ");
Forest Bond5449c682009-04-25 10:30:44 -0400580 for (ii = 0; ii < 6; ii++) {
Jim Lieb7e809a92009-07-30 10:27:21 -0700581 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO"%02x ", *(pbyBSSID+ii));
Forest Bond5449c682009-04-25 10:30:44 -0400582 }
Jim Lieb7e809a92009-07-30 10:27:21 -0700583 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO"\n");
Charles Clément5a5a2a62010-08-01 17:15:49 +0200584 return (false);
Forest Bond5449c682009-04-25 10:30:44 -0400585}
586
587
588/*
589 * Description: Check Pairewise Key
590 *
591 * Parameters:
592 * In:
593 * pTable - Pointer to Key table
594 * Out:
595 * none
596 *
Charles Clément5a5a2a62010-08-01 17:15:49 +0200597 * Return Value: true if found otherwise false
Forest Bond5449c682009-04-25 10:30:44 -0400598 *
599 */
Charles Clément7b6a0012010-08-01 17:15:50 +0200600bool KeybCheckPairewiseKey (
Charles Clément3a215e02010-05-12 20:54:39 -0700601 PSKeyManagement pTable,
Charles Clément3cdec552010-05-12 20:54:40 -0700602 PSKeyItem *pKey
Forest Bond5449c682009-04-25 10:30:44 -0400603 )
604{
605 int i;
606
607 *pKey = NULL;
608 for (i=0;i<MAX_KEY_TABLE;i++) {
Charles Clément1b120682010-08-01 17:15:48 +0200609 if ((pTable->KeyTable[i].bInUse == true) &&
610 (pTable->KeyTable[i].PairwiseKey.bKeyValid == true)) {
Forest Bond5449c682009-04-25 10:30:44 -0400611 *pKey = &(pTable->KeyTable[i].PairwiseKey);
Charles Clément1b120682010-08-01 17:15:48 +0200612 return (true);
Forest Bond5449c682009-04-25 10:30:44 -0400613 }
614 }
Charles Clément5a5a2a62010-08-01 17:15:49 +0200615 return (false);
Forest Bond5449c682009-04-25 10:30:44 -0400616}
617
618/*
619 * Description: Set Key to table
620 *
621 * Parameters:
622 * In:
623 * pTable - Pointer to Key table
624 * dwKeyIndex - Key index (reference to NDIS DDK)
625 * uKeyLength - Key length
626 * KeyRSC - Key RSC
627 * pbyKey - Pointer to key
628 * Out:
629 * none
630 *
Charles Clément5a5a2a62010-08-01 17:15:49 +0200631 * Return Value: true if success otherwise false
Forest Bond5449c682009-04-25 10:30:44 -0400632 *
633 */
Charles Clément7b6a0012010-08-01 17:15:50 +0200634bool KeybSetDefaultKey (
Forest Bond5449c682009-04-25 10:30:44 -0400635 PSKeyManagement pTable,
Charles Clément0f4c60d2010-06-24 11:02:25 -0700636 unsigned long dwKeyIndex,
Charles Clémente3fd16d2010-06-02 09:52:02 -0700637 unsigned long uKeyLength,
Forest Bond5449c682009-04-25 10:30:44 -0400638 PQWORD pKeyRSC,
Charles Clément2989e962010-06-05 15:13:47 -0700639 unsigned char *pbyKey,
Charles Clément3fc9b582010-06-24 11:02:27 -0700640 unsigned char byKeyDecMode,
Charles Clément412b2d02010-06-22 08:54:42 -0700641 unsigned long dwIoBase,
Charles Clément3fc9b582010-06-24 11:02:27 -0700642 unsigned char byLocalID
Forest Bond5449c682009-04-25 10:30:44 -0400643 )
644{
Charles Clémentb6e95cd2010-06-02 09:52:01 -0700645 unsigned int ii;
Forest Bond5449c682009-04-25 10:30:44 -0400646 PSKeyItem pKey;
Charles Clémentb6e95cd2010-06-02 09:52:01 -0700647 unsigned int uKeyIdx;
Forest Bond5449c682009-04-25 10:30:44 -0400648
Jim Lieb7e809a92009-07-30 10:27:21 -0700649 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO"Enter KeybSetDefaultKey: %1x, %d \n", (int)dwKeyIndex, (int)uKeyLength);
Forest Bond5449c682009-04-25 10:30:44 -0400650
651
652 if ((dwKeyIndex & PAIRWISE_KEY) != 0) { // Pairwise key
Charles Clément5a5a2a62010-08-01 17:15:49 +0200653 return (false);
Forest Bond5449c682009-04-25 10:30:44 -0400654 } else if ((dwKeyIndex & 0x000000FF) >= MAX_GROUP_KEY) {
Charles Clément5a5a2a62010-08-01 17:15:49 +0200655 return (false);
Forest Bond5449c682009-04-25 10:30:44 -0400656 }
657
Charles Clément1b120682010-08-01 17:15:48 +0200658 pTable->KeyTable[MAX_KEY_TABLE-1].bInUse = true;
Charles Clément078b0782010-05-14 19:37:32 -0700659 for(ii=0;ii<ETH_ALEN;ii++)
Forest Bond5449c682009-04-25 10:30:44 -0400660 pTable->KeyTable[MAX_KEY_TABLE-1].abyBSSID[ii] = 0xFF;
661
662 // Group key
663 pKey = &(pTable->KeyTable[MAX_KEY_TABLE-1].GroupKey[dwKeyIndex & 0x000000FF]);
664 if ((dwKeyIndex & TRANSMIT_KEY) != 0) {
665 // Group transmit key
666 pTable->KeyTable[MAX_KEY_TABLE-1].dwGTKeyIndex = dwKeyIndex;
Jim Lieb7e809a92009-07-30 10:27:21 -0700667 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO"Group transmit key(R)[%lX]: %d\n", pTable->KeyTable[MAX_KEY_TABLE-1].dwGTKeyIndex, MAX_KEY_TABLE-1);
Forest Bond5449c682009-04-25 10:30:44 -0400668
669 }
670 pTable->KeyTable[MAX_KEY_TABLE-1].wKeyCtl &= 0x7F00; // clear all key control filed
671 pTable->KeyTable[MAX_KEY_TABLE-1].wKeyCtl |= (byKeyDecMode << 4);
672 pTable->KeyTable[MAX_KEY_TABLE-1].wKeyCtl |= (byKeyDecMode);
673 pTable->KeyTable[MAX_KEY_TABLE-1].wKeyCtl |= 0x0044; // use group key for all address
674 uKeyIdx = (dwKeyIndex & 0x000000FF);
675
676 if ((uKeyLength == WLAN_WEP232_KEYLEN) &&
677 (byKeyDecMode == KEY_CTL_WEP)) {
678 pTable->KeyTable[MAX_KEY_TABLE-1].wKeyCtl |= 0x4000; // disable on-fly disable address match
Charles Clément1b120682010-08-01 17:15:48 +0200679 pTable->KeyTable[MAX_KEY_TABLE-1].bSoftWEP = true;
Forest Bond5449c682009-04-25 10:30:44 -0400680 } else {
Charles Clément5a5a2a62010-08-01 17:15:49 +0200681 if (pTable->KeyTable[MAX_KEY_TABLE-1].bSoftWEP == false)
Forest Bond5449c682009-04-25 10:30:44 -0400682 pTable->KeyTable[MAX_KEY_TABLE-1].wKeyCtl |= 0xC000; // enable on-fly disable address match
683 }
684
Charles Clément1b120682010-08-01 17:15:48 +0200685 pKey->bKeyValid = true;
Forest Bond5449c682009-04-25 10:30:44 -0400686 pKey->uKeyLength = uKeyLength;
687 pKey->dwKeyIndex = dwKeyIndex;
688 pKey->byCipherSuite = byKeyDecMode;
Jim Lieb51b6d9c2009-08-12 14:54:10 -0700689 memcpy(pKey->abyKey, pbyKey, uKeyLength);
Forest Bond5449c682009-04-25 10:30:44 -0400690 if (byKeyDecMode == KEY_CTL_WEP) {
691 if (uKeyLength == WLAN_WEP40_KEYLEN)
692 pKey->abyKey[15] &= 0x7F;
693 if (uKeyLength == WLAN_WEP104_KEYLEN)
694 pKey->abyKey[15] |= 0x80;
695 }
Charles Clément9d828c42010-06-05 15:13:49 -0700696 MACvSetKeyEntry(dwIoBase, pTable->KeyTable[MAX_KEY_TABLE-1].wKeyCtl, MAX_KEY_TABLE-1, uKeyIdx, pTable->KeyTable[MAX_KEY_TABLE-1].abyBSSID, (unsigned long *)pKey->abyKey, byLocalID);
Forest Bond5449c682009-04-25 10:30:44 -0400697
698 if ((dwKeyIndex & USE_KEYRSC) == 0) {
699 // RSC set by NIC
Jim Lieb51b6d9c2009-08-12 14:54:10 -0700700 memset(&(pKey->KeyRSC), 0, sizeof(QWORD));
Forest Bond5449c682009-04-25 10:30:44 -0400701 } else {
Jim Lieb51b6d9c2009-08-12 14:54:10 -0700702 memcpy(&(pKey->KeyRSC), pKeyRSC, sizeof(QWORD));
Forest Bond5449c682009-04-25 10:30:44 -0400703 }
704 pKey->dwTSC47_16 = 0;
705 pKey->wTSC15_0 = 0;
706
707
Jim Lieb7e809a92009-07-30 10:27:21 -0700708 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO"KeybSetKey(R): \n");
709 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO"pKey->bKeyValid: %d\n", pKey->bKeyValid);
710 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO"pKey->uKeyLength: %d\n", (int)pKey->uKeyLength);
711 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO"pKey->abyKey: \n");
Forest Bond5449c682009-04-25 10:30:44 -0400712 for (ii = 0; ii < pKey->uKeyLength; ii++) {
Jim Lieb7e809a92009-07-30 10:27:21 -0700713 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO"%x", pKey->abyKey[ii]);
Forest Bond5449c682009-04-25 10:30:44 -0400714 }
Jim Lieb7e809a92009-07-30 10:27:21 -0700715 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO"\n");
Forest Bond5449c682009-04-25 10:30:44 -0400716
Jim Lieb7e809a92009-07-30 10:27:21 -0700717 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO"pKey->dwTSC47_16: %lx\n", pKey->dwTSC47_16);
718 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO"pKey->wTSC15_0: %x\n", pKey->wTSC15_0);
719 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO"pKey->dwKeyIndex: %lx\n", pKey->dwKeyIndex);
Forest Bond5449c682009-04-25 10:30:44 -0400720
Charles Clément1b120682010-08-01 17:15:48 +0200721 return (true);
Forest Bond5449c682009-04-25 10:30:44 -0400722}
723
724
725/*
726 * Description: Set Key to table
727 *
728 * Parameters:
729 * In:
730 * pTable - Pointer to Key table
731 * dwKeyIndex - Key index (reference to NDIS DDK)
732 * uKeyLength - Key length
733 * KeyRSC - Key RSC
734 * pbyKey - Pointer to key
735 * Out:
736 * none
737 *
Charles Clément5a5a2a62010-08-01 17:15:49 +0200738 * Return Value: true if success otherwise false
Forest Bond5449c682009-04-25 10:30:44 -0400739 *
740 */
Charles Clément7b6a0012010-08-01 17:15:50 +0200741bool KeybSetAllGroupKey (
Forest Bond5449c682009-04-25 10:30:44 -0400742 PSKeyManagement pTable,
Charles Clément0f4c60d2010-06-24 11:02:25 -0700743 unsigned long dwKeyIndex,
Charles Clémente3fd16d2010-06-02 09:52:02 -0700744 unsigned long uKeyLength,
Forest Bond5449c682009-04-25 10:30:44 -0400745 PQWORD pKeyRSC,
Charles Clément2989e962010-06-05 15:13:47 -0700746 unsigned char *pbyKey,
Charles Clément3fc9b582010-06-24 11:02:27 -0700747 unsigned char byKeyDecMode,
Charles Clément412b2d02010-06-22 08:54:42 -0700748 unsigned long dwIoBase,
Charles Clément3fc9b582010-06-24 11:02:27 -0700749 unsigned char byLocalID
Forest Bond5449c682009-04-25 10:30:44 -0400750 )
751{
752 int i;
Charles Clémentb6e95cd2010-06-02 09:52:01 -0700753 unsigned int ii;
Forest Bond5449c682009-04-25 10:30:44 -0400754 PSKeyItem pKey;
Charles Clémentb6e95cd2010-06-02 09:52:01 -0700755 unsigned int uKeyIdx;
Forest Bond5449c682009-04-25 10:30:44 -0400756
Jim Lieb7e809a92009-07-30 10:27:21 -0700757 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO"Enter KeybSetAllGroupKey: %lX\n", dwKeyIndex);
Forest Bond5449c682009-04-25 10:30:44 -0400758
759
760 if ((dwKeyIndex & PAIRWISE_KEY) != 0) { // Pairwise key
Charles Clément5a5a2a62010-08-01 17:15:49 +0200761 return (false);
Forest Bond5449c682009-04-25 10:30:44 -0400762 } else if ((dwKeyIndex & 0x000000FF) >= MAX_GROUP_KEY) {
Charles Clément5a5a2a62010-08-01 17:15:49 +0200763 return (false);
Forest Bond5449c682009-04-25 10:30:44 -0400764 }
765
766 for (i=0; i < MAX_KEY_TABLE-1; i++) {
Charles Clément1b120682010-08-01 17:15:48 +0200767 if (pTable->KeyTable[i].bInUse == true) {
Forest Bond5449c682009-04-25 10:30:44 -0400768 // found table already exist
769 // Group key
770 pKey = &(pTable->KeyTable[i].GroupKey[dwKeyIndex & 0x000000FF]);
771 if ((dwKeyIndex & TRANSMIT_KEY) != 0) {
772 // Group transmit key
773 pTable->KeyTable[i].dwGTKeyIndex = dwKeyIndex;
Jim Lieb7e809a92009-07-30 10:27:21 -0700774 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO"Group transmit key(R)[%lX]: %d\n", pTable->KeyTable[i].dwGTKeyIndex, i);
Forest Bond5449c682009-04-25 10:30:44 -0400775
776 }
777 pTable->KeyTable[i].wKeyCtl &= 0xFF0F; // clear group key control filed
778 pTable->KeyTable[i].wKeyCtl |= (byKeyDecMode << 4);
779 pTable->KeyTable[i].wKeyCtl |= 0x0040; // use group key for group address
780 uKeyIdx = (dwKeyIndex & 0x000000FF);
781
782 pTable->KeyTable[i].wKeyCtl |= 0x8000; // enable on-fly
783
Charles Clément1b120682010-08-01 17:15:48 +0200784 pKey->bKeyValid = true;
Forest Bond5449c682009-04-25 10:30:44 -0400785 pKey->uKeyLength = uKeyLength;
786 pKey->dwKeyIndex = dwKeyIndex;
787 pKey->byCipherSuite = byKeyDecMode;
Jim Lieb51b6d9c2009-08-12 14:54:10 -0700788 memcpy(pKey->abyKey, pbyKey, uKeyLength);
Forest Bond5449c682009-04-25 10:30:44 -0400789 if (byKeyDecMode == KEY_CTL_WEP) {
790 if (uKeyLength == WLAN_WEP40_KEYLEN)
791 pKey->abyKey[15] &= 0x7F;
792 if (uKeyLength == WLAN_WEP104_KEYLEN)
793 pKey->abyKey[15] |= 0x80;
794 }
Charles Clément9d828c42010-06-05 15:13:49 -0700795 MACvSetKeyEntry(dwIoBase, pTable->KeyTable[i].wKeyCtl, i, uKeyIdx, pTable->KeyTable[i].abyBSSID, (unsigned long *)pKey->abyKey, byLocalID);
Forest Bond5449c682009-04-25 10:30:44 -0400796
797 if ((dwKeyIndex & USE_KEYRSC) == 0) {
798 // RSC set by NIC
Jim Lieb51b6d9c2009-08-12 14:54:10 -0700799 memset(&(pKey->KeyRSC), 0, sizeof(QWORD));
Forest Bond5449c682009-04-25 10:30:44 -0400800 }
801 else {
Jim Lieb51b6d9c2009-08-12 14:54:10 -0700802 memcpy(&(pKey->KeyRSC), pKeyRSC, sizeof(QWORD));
Forest Bond5449c682009-04-25 10:30:44 -0400803 }
804 pKey->dwTSC47_16 = 0;
805 pKey->wTSC15_0 = 0;
806
Jim Lieb7e809a92009-07-30 10:27:21 -0700807 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO"KeybSetKey(R): \n");
808 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO"pKey->bKeyValid: %d\n ", pKey->bKeyValid);
809 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO"pKey->uKeyLength: %d\n ", (int)pKey->uKeyLength);
810 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO"pKey->abyKey: ");
Forest Bond5449c682009-04-25 10:30:44 -0400811 for (ii = 0; ii < pKey->uKeyLength; ii++) {
Jim Lieb7e809a92009-07-30 10:27:21 -0700812 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO"%02x ", pKey->abyKey[ii]);
Forest Bond5449c682009-04-25 10:30:44 -0400813 }
Jim Lieb7e809a92009-07-30 10:27:21 -0700814 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO"\n");
Forest Bond5449c682009-04-25 10:30:44 -0400815
816 //DBG_PRN_GRP12(("pKey->dwTSC47_16: %lX\n ", pKey->dwTSC47_16));
817 //DBG_PRN_GRP12(("pKey->wTSC15_0: %X\n ", pKey->wTSC15_0));
818 //DBG_PRN_GRP12(("pKey->dwKeyIndex: %lX\n ", pKey->dwKeyIndex));
819
Charles Clément1b120682010-08-01 17:15:48 +0200820 } // (pTable->KeyTable[i].bInUse == true)
Forest Bond5449c682009-04-25 10:30:44 -0400821 }
Charles Clément1b120682010-08-01 17:15:48 +0200822 return (true);
Forest Bond5449c682009-04-25 10:30:44 -0400823}