eapol/eapol_framework/eapol_symbian/am/type/tls_peap/symbian/eap_am_type_tls_peap_symbian.cpp
changeset 36 c98682f98478
parent 34 ad1f037f1ac2
child 49 43351a4f2da3
equal deleted inserted replaced
34:ad1f037f1ac2 36:c98682f98478
    14 * Description:  EAP and WLAN authentication protocols.
    14 * Description:  EAP and WLAN authentication protocols.
    15 *
    15 *
    16 */
    16 */
    17 
    17 
    18 /*
    18 /*
    19 * %version: 247.2.68 %
    19 * %version: 256 %
    20 */
    20 */
    21 
    21 
    22 // This is enumeration of EAPOL source code.
    22 // This is enumeration of EAPOL source code.
    23 #if defined(USE_EAP_MINIMUM_RELEASE_TRACES)
    23 #if defined(USE_EAP_MINIMUM_RELEASE_TRACES)
    24 	#undef EAP_FILE_NUMBER_ENUM
    24 	#undef EAP_FILE_NUMBER_ENUM
   247 		m_db_user_cert_table_name = KPeapAllowedUserCertsDatabaseTableName;
   247 		m_db_user_cert_table_name = KPeapAllowedUserCertsDatabaseTableName;
   248 		m_db_ca_cert_table_name = KPeapAllowedCACertsDatabaseTableName;
   248 		m_db_ca_cert_table_name = KPeapAllowedCACertsDatabaseTableName;
   249 		m_db_cipher_suite_table_name = KPeapAllowedCipherSuitesDatabaseTableName;
   249 		m_db_cipher_suite_table_name = KPeapAllowedCipherSuitesDatabaseTableName;
   250 		m_db_name = KPeapDatabaseName;	
   250 		m_db_name = KPeapDatabaseName;	
   251 	}
   251 	}
   252 	else if (m_current_eap_type == eap_type_ttls_plain_pap
   252 	else if (m_current_eap_type == eap_expanded_type_ttls_plain_pap.get_type()
   253 			|| m_current_eap_type == eap_type_ttls)
   253 			|| m_current_eap_type == eap_type_ttls)
   254 	{
   254 	{
   255 		m_db_table_name = KTtlsDatabaseTableName;
   255 		m_db_table_name = KTtlsDatabaseTableName;
   256 		m_db_user_cert_table_name = KTtlsAllowedUserCertsDatabaseTableName;
   256 		m_db_user_cert_table_name = KTtlsAllowedUserCertsDatabaseTableName;
   257 		m_db_ca_cert_table_name = KTtlsAllowedCACertsDatabaseTableName;
   257 		m_db_ca_cert_table_name = KTtlsAllowedCACertsDatabaseTableName;
   318 		&& aEapType != eap_type_peap
   318 		&& aEapType != eap_type_peap
   319 #if defined(USE_TTLS_EAP_TYPE)
   319 #if defined(USE_TTLS_EAP_TYPE)
   320 		&& aEapType != eap_type_ttls
   320 		&& aEapType != eap_type_ttls
   321 #endif // #if defined(USE_TTLS_EAP_TYPE)
   321 #endif // #if defined(USE_TTLS_EAP_TYPE)
   322 
   322 
   323 	    && aEapType != eap_type_ttls_plain_pap
   323 	    && aEapType != eap_expanded_type_ttls_plain_pap.get_type()
   324 		
   324 		
   325 #if defined (USE_FAST_EAP_TYPE)
   325 #if defined (USE_FAST_EAP_TYPE)
   326 		&& aEapType != eap_type_fast
   326 		&& aEapType != eap_type_fast
   327 #endif // #if defined (USE_FAST_EAP_TYPE)	
   327 #endif // #if defined (USE_FAST_EAP_TYPE)	
   328 		)
   328 		)
  1769 		{
  1769 		{
  1770 			status = type_configure_read(
  1770 			status = type_configure_read(
  1771 				cf_str_EAP_TTLS_max_session_validity_time.get_field(),
  1771 				cf_str_EAP_TTLS_max_session_validity_time.get_field(),
  1772 				&sessionTimeFromFile);
  1772 				&sessionTimeFromFile);
  1773 		}
  1773 		}
  1774 		else if (m_current_eap_type == eap_type_ttls_plain_pap)
  1774 		else if (m_current_eap_type == eap_expanded_type_ttls_plain_pap.get_type())
  1775 		{
  1775 		{
  1776 			// read PAP session time
  1776 			// read PAP session time
  1777 			status = type_configure_read(
  1777 			status = type_configure_read(
  1778 				cf_str_EAP_TLS_PEAP_ttls_pap_max_session_validity_time.get_field(),
  1778 				cf_str_EAP_TLS_PEAP_ttls_pap_max_session_validity_time.get_field(),
  1779 				&sessionTimeFromFile );
  1779 				&sessionTimeFromFile );
  3358 #endif // #if defined(USE_TTLS_EAP_TYPE)
  3358 #endif // #if defined(USE_TTLS_EAP_TYPE)
  3359 #if defined(USE_FAST_EAP_TYPE)
  3359 #if defined(USE_FAST_EAP_TYPE)
  3360 		|| m_current_eap_type == eap_type_fast
  3360 		|| m_current_eap_type == eap_type_fast
  3361 #endif
  3361 #endif
  3362 
  3362 
  3363 		|| m_current_eap_type == eap_type_ttls_plain_pap
  3363 		|| m_current_eap_type == eap_expanded_type_ttls_plain_pap.get_type()
  3364 	
  3364 	
  3365 		)
  3365 		)
  3366 	{
  3366 	{
  3367 		// Check if the wanted parameter is default type
  3367 		// Check if the wanted parameter is default type
  3368 		eap_variable_data_c wanted_field(m_am_tools);
  3368 		eap_variable_data_c wanted_field(m_am_tools);
  5315 					0);
  5315 					0);
  5316 				EAP_TRACE_END(m_am_tools, TRACE_FLAGS_DEFAULT);
  5316 				EAP_TRACE_END(m_am_tools, TRACE_FLAGS_DEFAULT);
  5317 				return;	
  5317 				return;	
  5318 			}
  5318 			}
  5319 
  5319 
  5320 			TInt error = m_allowed_user_certs.Append(entry->Copy());
  5320 			TInt error = m_allowed_user_certs.Append(entry);
  5321 			if (error != KErrNone)
  5321 			if (error != KErrNone)
  5322 			{
  5322 			{
  5323 				EAP_TRACE_DEBUG(
  5323 				EAP_TRACE_DEBUG(
  5324 					m_am_tools,
  5324 					m_am_tools,
  5325 					TRACE_FLAGS_DEFAULT,
  5325 					TRACE_FLAGS_DEFAULT,
  5333 					eap_status_allocation_error, 
  5333 					eap_status_allocation_error, 
  5334 					false, 
  5334 					false, 
  5335 					0, 
  5335 					0, 
  5336 					false, 
  5336 					false, 
  5337 					0);
  5337 					0);
       
  5338 
       
  5339 				delete entry;
  5338 				
  5340 				
  5339 				EAP_TRACE_END(m_am_tools, TRACE_FLAGS_DEFAULT);	
  5341 				EAP_TRACE_END(m_am_tools, TRACE_FLAGS_DEFAULT);	
  5340 				return;		
  5342 				return;		
  5341 			}
  5343 			}
  5342 		}
  5344 		}
  6812 	{
  6814 	{
  6813 		maxSessionTimeString.Set(cf_str_EAP_FAST_max_session_validity_time_literal);
  6815 		maxSessionTimeString.Set(cf_str_EAP_FAST_max_session_validity_time_literal);
  6814 		lastFullAuthTimeString.Set(KFASTLastFullAuthTime);
  6816 		lastFullAuthTimeString.Set(KFASTLastFullAuthTime);
  6815 	}
  6817 	}
  6816 #endif
  6818 #endif
  6817 	else if (m_current_eap_type == eap_type_ttls_plain_pap)
  6819 	else if (m_current_eap_type == eap_expanded_type_ttls_plain_pap.get_type())
  6818 	{
  6820 	{
  6819 	    // we should not come here, ttls pap has its own
  6821 	    // we should not come here, ttls pap has its own
  6820 	    // method for checking session validity
  6822 	    // method for checking session validity
  6821 	    EAP_TRACE_ERROR( m_am_tools, TRACE_FLAGS_DEFAULT, (
  6823 	    EAP_TRACE_ERROR( m_am_tools, TRACE_FLAGS_DEFAULT, (
  6822 	        EAPL( "ERROR: wrong eap type.\n" ) ) );
  6824 	        EAPL( "ERROR: wrong eap type.\n" ) ) );
  6984 	}
  6986 	}
  6985 	else if (m_current_eap_type == eap_type_ttls)
  6987 	else if (m_current_eap_type == eap_type_ttls)
  6986 	{
  6988 	{
  6987 		lastFullAuthTimeString.Set(KTTLSLastFullAuthTime);
  6989 		lastFullAuthTimeString.Set(KTTLSLastFullAuthTime);
  6988 	}
  6990 	}
  6989 	else if (m_current_eap_type == eap_type_ttls_plain_pap)
  6991 	else if (m_current_eap_type == eap_expanded_type_ttls_plain_pap.get_type())
  6990 	{
  6992 	{
  6991 		lastFullAuthTimeString.Set( KTTLSPAPLastFullAuthTime );
  6993 		lastFullAuthTimeString.Set( KTTLSPAPLastFullAuthTime );
  6992 	}
  6994 	}
  6993 #if defined(USE_FAST_EAP_TYPE)
  6995 #if defined(USE_FAST_EAP_TYPE)
  6994 	else if (m_current_eap_type == eap_type_fast)
  6996 	else if (m_current_eap_type == eap_type_fast)